|604 Part 5 Information Systems in Business and Society
comprehensive privacy policies on their sites and to obtain parental consent before they collect
any personal information from children under 13 years of age. Web site operators who violate
the rule could be liable for civil penalties of up to $11,000 per violation.70 The Act has made
an impact in the design and operations of Web sites that cater to children. For example, Lions
Gate Entertainment, the operator of the www.thebratzfilm.com Web site, had to modify its
site after the Council of Better Business Bureaus determined the site failed to meet the
COPPA requirements. The Web site requested personally identifiable information to register
for the Bratz Newsletter and register for a chance to win a trip to the premiere of The Bratz
Movie without first obtaining verifiable parental consent.71
A social network service employs the Web and software to connect people for whatever
purpose. There are thousands of such networks, which have become popular among
teenagers. Some of the more popular social networking Web sites include Bebo,
Classmates.com, Facebook, Hi5, Imbee, MySpace, Namesdatabase.com, Tagged, and XuQa.
Most of these Web sites allow one to easily create a user profile that provides personal details,
photos, even videos that can be viewed by other visitors to the Web site. Some of the Web
sites have age restrictions or require that a parent register their preteen by providing a credit
card to validate the parent’s identity. Teens can provide information about where they live,
go to school, their favorite music, and interests in hopes of meeting new friends. Unfortu-
nately, they can also meet ill-intentioned strangers at these sites. Many documented encoun-
ters involve adults masquerading as teens attempting to meet young people for illicit purposes.
Parents are advised to discuss potential dangers, check their children’s profiles, and monitor
their activities at such Web sites.
Fairness in Information Use
Selling information to other companies can be so lucrative that many companies will continue
to store and sell the data they collect on customers, employees, and others. When is this
information storage and use fair and reasonable to the people whose data is stored and sold?
Do people have a right to know about data stored about them and to decide what data is
stored and used? As shown in Table 14.2, these questions can be broken down into four
issues that should be addressed: knowledge, control, notice, and consent.
In the past few decades, significant laws have been passed regarding a person’s right to
privacy. Others relate to business privacy rights and the fair use of data and information.
Fairness Issues Database Storage Database Usage
The right to know Knowledge Notice
The ability to decide Control Consent
Knowledge. Should people know what data is stored about them? In some cases, people are informed that information about them
is stored in a corporate database. In others, they do not know that their personal information is stored in corporate databases.
Control. Should people be able to correct errors in corporate database systems? This is possible with most organizations, although
it can be difficult in some cases.
Notice. Should an organization that uses personal data for a pu6r0pose other than the original purpose notify individuals in advance?
Most companies don’t do this.
Consent. If information on people is to be used for other purposes, should these people be asked to give their consent before data
on them is used? Many companies do not give people the ability to decide if information on them will be sold or used for other
purposes.
Table 14.2 The Privacy Act of 1974
The major piece of legislation on privacy is the Privacy Act of 1974 (PA74). PA74 applies
The Right to Know and the only to certain federal agencies. The act, which is about 15 pages long, is straightforward and
Ability to Decide Federal Privacy easy to understand. The purpose of this act is to provide certain safeguards for people against
Laws and Regulations an invasion of personal privacy by requiring federal agencies (except as otherwise provided
by law) to do the following:
|The Personal and Social Impact of Computers Chapter 14 605
• Permit people to determine what records pertaining to them are collected, maintained,
used, or disseminated by such agencies
• Permit people to prevent records pertaining to them from being used or made available
for another purpose without their consent
• Permit people to gain access to information pertaining to them in federal agency records,
to have a copy of all or any portion thereof, and to correct or amend such records
• Ensure that they collect, maintain, use, or disseminate any record of identifiable personal
information in a manner that ensures that such action is for a necessary and lawful
purpose, that the information is current and accurate for its intended use, and that
adequate safeguards are provided to prevent misuse of such information
• Permit exemptions from this act only in cases of an important public need for such
exemption, as determined by specific law-making authority
• Be subject to civil suit for any damages that occur as a result of willful or intentional
action that violates anyone’s rights under this act
PA74, which applies to all federal agencies except the CIA and law enforcement agencies,
also established a Privacy Study Commission to study existing databases and to recommend
rules and legislation for consideration by Congress. PA74 also requires training for all fed-
eral employees who interact with a “system of records” under the act. Most of the training
is conducted by the Civil Service Commission and the Department of Defense. Another
interesting aspect of PA74 concerns the use of Social Security numbers—federal, state, and
local governments and agencies cannot discriminate against people for not disclosing or
reporting their Social Security number.
Gramm-Leach-Bliley Act
This act was passed in 1999 and required all financial institutions to protect and secure
customers’ nonpublic data from unauthorized access or use. Under terms of this act, it was
assumed that all customers approve of the financial institutions’ collecting and storing their
personal information. The institutions were required to contact their customers and inform
them of this fact. Customers were required to write separate letters to each of their individual
financial institutions and state in writing that they wanted to opt out of the data collection
and storage process. Most people were overwhelmed with the mass mailings they received
from their financial institutions and simply discarded them without ever understanding their
importance.
USA Patriot Act
As discussed previously, the 2001 Uniting and Strengthening America by Providing Appro-
priate Tools Required to Intercept and Obstruct Terrorism Act (USA Patriot Act) was passed
in response to the September 11 terrorism acts. Proponents argue that it gives necessary new
powers to both domestic law enforcement and international intelligence agencies. Critics
argue that the law removes many of the checks and balances that previously allowed the courts
to ensure that law enforcement agencies did not abuse their powers. For example, under this
act, Internet service providers and telephone companies must turn over customer informa-
tion, including numbers called, without a court order if the FBI claims that the records are
relevant to a terrorism investigation. Also, the company is forbidden to disclose that the FBI
is conducting an investigation.
Other Federal Privacy Laws
In addition to PA74, other pieces of federal legislation relate to privacy. A federal law that
was passed in 1992 bans unsolicited fax advertisements. This law was upheld in a 1995 ruling
by the Ninth U.S. Circuit Court of Appeals, which concluded that the law is a reasonable
way to prevent the shifting of advertising costs to customers. Table 14.3 lists additional laws
related to privacy.
|606 Part 5 Information Systems in Business and Society
Law Provisions
Fair Credit Reporting Act of 1970 (FCRA)
Tax Reform Act of 1976 Regulates operations of credit-reporting bureaus, including how they
Electronic Funds Transfer Act of 1979 collect, store, and use credit information
Right to Financial Privacy Act of 1978
Freedom of Information Act of 1970 Restricts collection and use of certain information by the Internal Revenue
Education Privacy Act Service
Computer Matching and Privacy Act of 1988 Outlines the responsibilities of companies that use electronic funds transfer
Video Privacy Act of 1988 systems, including consumer rights and liability for bank debit cards
Telephone Consumer Protection Act of 1991
Cable Act of 1992 Restricts government access to certain records held by financial institutions
Computer Abuse Amendments Act of 1994
Gramm-Leach-Bliley Act of 1999 Guarantees access for individuals to personal data collected about them and
USA Patriot Act of 2001 about government activities in federal agency files
Table 14.3 Restricts collection and use of data by federally funded educational
Federal Privacy Laws and Their institutions, including specifications for the type of data collected,
Provisions access by parents and students to the data, and limitations on disclosure
Regulates cross-references between federal agencies’ computer files
(e.g.,to verify eligibility for federal programs)
Prevents retail stores from disclosing video rental records without a
court order
Limits telemarketers’ practices
Regulates companies and organizations that provide wireless communications
services, including cellular phones
Prohibits transmissions of harmful computer programs and code, including
viruses
Requires all financial institutions to protect and secure customers’ nonpublic
data from unauthorized access or use
Requires Internet service providers and telephone companies to turn over
customer information, including numbers called, without a court order, if the
FBI claims that the records are relevant to a terrorism investigation
INFORMATION
SYSTEMS @ WORK
Controlling Privacy in Finland’s Largest Information without accessing the actual private data that the system will
System manage.
Arek Oy, Ltd develops information systems and provides sys- Government privacy regulations, although important to cus-
tem services to pension insurance providers in Finland. The govern- tomers and citizens, are particularly burdensome to businesses
ment of Finland has created laws to ensure that anyone earning a and information system developers. To assist developers in com-
paycheck in Finland receives a pension upon retirement. plying with privacy laws, database management systems provided
by major information systems companies such as IBM have com-
Finnish employers are required to maintain records on every pliance embedded in their systems. Arek Oy reduced its stress and
employee, including the employee’s name, national ID number, responsibility by adopting such a system to use for its pension
date of birth, work history, and other private information, along insurance information system.
with an account of every paycheck issued to the employee. Employ-
ers share that information with one of many pension insurance As you might guess, Arek Oy was successful in meeting its
companies. Arek Oy was created by the Finnish Centre for Pen- deadline for Finland’s largest information system. It has deployed
sions (ETK) and the country’s authorized pension insurance a database management system that includes a safe sandbox for
providers to develop and manage the information systems that test-data management that meets the high privacy standards of
collect, store, and deliver employee information to the pension the Finnish government. The many pension insurance companies
insurance industry. that work with the system can develop database applications using
the secure and private environment that Arek Oy has provided.
Arek Oy was established in 2004 to perform an important
task. The mission of the new company was to develop the largest Considering the time and effort that Arek Oy invested in com-
information system used in Finland. The company had 30 months plying with government privacy regulations, it’s clear why many
to complete the task, which may seem generous until you consider companies not governed by regulations are hesitant to commit
the size of the system. The goal of the pension insurance informa- resources to privacy practices. In most cases it isn’t a matter of not
tion system was to manage employment records of every person caring, but of providing the best quality system for the least
that works in Finland. If Arek Oy could not provide a flawless sys- amount of money. The Arek Oy case provides a good example of
tem by the deadline, they would put workers’ pensions at risk, the benefits and costs of government regulations.
acquire hefty fines from the government, and ruin their own repu-
tation, which would most likely mean the end of Arek Oy. Discussion Questions
What made the systems development especially challenging 1. What challenges did Arek Oy face in the Finnish pension sys-
was that Arek Oy had to apply many privacy rules and regulations tems development project?
as defined by the Finnish government. Today’s privacy-sensitive
culture makes database development and maintenance a time 2. What techniques did the company use to meet project require-
and resource-consuming affair for businesses and governments ments and government regulations?
around the globe.
Critical Thinking Questions
In general, sensitive employee data must be hidden from the
eyes of all but approved parties. The systems engineers for Arek 1. Besides government regulations, what other pressure might
Oy were not allowed to see the data stored in the pension persuade a business to employ strict privacy practices?
database. Special data privacy solutions were employed to mask
personal identification information in database records—a practice 2. What are the risks involved for a company that takes shortcuts
called “de-identification.” Arek Oy set up a safe sandbox for devel- and allows systems developers to see private data?
opment that provided realistic, fictionalized data for developers to
use when testing the systems. These types of systems are referred Sources: IBM Staff, “Arek Oy deploys IBM Optim to deliver the largest infor-
to as test-data management systems; they promote information mation management system in Finland,” IBM Case Studies, May 30, 2008,
privacy by allowing database developers to create reliable systems www-01.ibm.com/software/success/cssdb.nsf/CS/LWIS-7F5QWZ?
OpenDocument&Site=default&cty=en_us; Arek Oy Web site, www.arek.fi,
accessed August 2, 2008.
607
|608 Part 5 Information Systems in Business and Society
Corporate Privacy Policies
Even though privacy laws for private organizations are not very restrictive, most organizations
are very sensitive to privacy issues and fairness. They realize that invasions of privacy can hurt
their business, turn away customers, and dramatically reduce revenues and profits. Consider
a major international credit card company. If the company sold confidential financial infor-
mation on millions of customers to other companies, the results could be disastrous. In a
matter of days, the firm’s business and revenues could be reduced dramatically. Therefore,
most organizations maintain privacy policies, even though they are not required by law. Some
companies even have a privacy bill of rights that specifies how the privacy of employees,
clients, and customers will be protected. Corporate privacy policies should address a cus-
tomer’s knowledge, control, notice, and consent over the storage and use of information.
They can also cover who has access to private data and when it can be used.
Multinational companies face an extremely difficult challenge in implementing data-
collection and dissemination processes and policies because of the multitude of differing
country or regional statutes. For example, Australia requires companies to destroy customer
data (including backup files) or make it anonymous after it’s no longer needed. Firms that
transfer customer and personnel data out of Europe must comply with European privacy
laws that allow customers and employees to access data about them and let them determine
how that information can be used.
A few examples of corporate privacy policies are shown in Table 14.4.
Table 14.4 Company URL
Corporate Privacy Policies Starwood Hotels & Resorts www.starwoodhotels.com/corporate/privacy_policy.html
United Parcel Service www.ups.com/content/corp/privacy_policy.html
Visa www.corporate.visa.com/ut/privacy.jsp
Walt Disney Internet Group http://disney.go.com/corporate/privacy/pp_wdig.html
A good database design practice is to assign a single unique identifier to each customer—
so that each has a single record describing all relationships with the company across all its
business units. That way, the organization can apply customer privacy preferences consis-
tently throughout all databases. Failure to do so can expose the organization to legal risks—
aside from upsetting customers who opted out of some collection practices. Again, the 1999
Gramm-Leach-Bliley Financial Services Modernization Act required all financial service in-
stitutions to communicate their data privacy rules and honor customer preferences.
Individual Efforts to Protect Privacy
Although numerous state and federal laws deal with privacy, the laws do not completely
protect individual privacy. In addition, not all companies have privacy policies. As a result,
many people are taking steps to increase their own privacy protection. Some of the steps that
you can take to protect personal privacy include the following:
• Find out what is stored about you in existing databases. Call the major credit bu-
reaus to get a copy of your credit report. You are entitled to a free credit report every
12 months (see freecreditreport.com). You can also obtain a free report if you have been
denied credit in the last 60 days. The major companies are Equifax (800-685-1111,
www.equifax.com), TransUnion (800-916-8800, www.transunion.com), and Experian
(888-397-3742, www.experian.com). You can also submit a Freedom of Information Act
request to a federal agency that you suspect might have information stored on you.
• Be careful when you share information about yourself. Don’t share information unless
it is absolutely necessary. Every time you give information about yourself through an 800,
888, or 900 call, your privacy is at risk. Be vigilant in insisting that your doctor, bank,
or financial institution not share information about you with others without your
written consent.
|The Personal and Social Impact of Computers Chapter 14 609
• Be proactive to protect your privacy. You can get an unlisted phone number and ask the
phone company to block caller ID systems from reading your phone number. If you
change your address, don’t fill out a change-of-address form with the U.S. Postal Service;
you can notify the people and companies that you want to have your new address. Destroy
copies of your charge card bills and shred monthly statements before disposing of them
in the garbage. Be careful about sending personal e-mail messages over a corporate e-mail
system. You can also get help in avoiding junk mail and telemarketing calls by visiting
the Direct Marketing Association Web site at www.the-dma.org. Go to the Web site and
look under Consumer Help-Remove Name from Lists.
• When purchasing anything from a Web site, make sure that you safeguard your credit
card numbers, passwords, and personal information. Do not do business with a site
unless you know that it handles credit card information securely. (Look for a seal of
approval from organizations such as the Better Business Bureau Online or TRUSTe.
When you open the Web page where you enter credit card information or other personal
data, make sure that the Web address begins with https and check to see if a locked padlock
icon appears in the Address bar or status bar). Do not provide personal information
without reviewing the site’s data privacy policy. Many credit card companies issue single-
use credit card numbers on request. Charges appear on your usual bill, but the number
is destroyed after a single use, eliminating the risk of stolen credit card numbers.
THE WORK ENVIRONMENT
The use of computer-based information systems has changed the makeup of the workforce.
Jobs that require IS literacy have increased, and many less-skilled positions have been elim-
inated. Corporate programs, such as reengineering and continuous improvement, bring with
them the concern that, as business processes are restructured and information systems are
integrated within them, the people involved in these processes will be removed.
However, the growing field of computer technology and information systems has opened
up numerous avenues to professionals and nonprofessionals of all backgrounds. Enhanced
telecommunications has been the impetus for new types of business and has created global
markets in industries once limited to domestic markets. Even the simplest tasks have been
aided by computers, making cash registers faster, smoothing order processing, and allowing
people with disabilities to participate more actively in the workforce. As computers and other
IS components drop in cost and become easier to use, more workers will benefit from the
increased productivity and efficiency provided by computers. Yet, despite these increases in
productivity and efficiency, information systems can raise other concerns.
Health Concerns
Organizations can increase employee effectiveness by paying attention to the health concerns
in today’s work environment. For some people, working with computers can cause occupa-
tional stress. Anxieties about job insecurity, loss of control, incompetence, and demotion are
just a few of the fears workers might experience. In some cases, the stress can become so severe
that workers might sabotage computer systems and equipment. Monitoring employee stress
can alert companies to potential problems. Training and counseling can often help the em-
ployee and deter problems.
Heavy computer use can affect one’s physical health as well. A job that requires sitting at
a desk and using a computer for many hours a day qualifies as a sedentary job. Such work
can double the risk of seated immobility thromboembolism (SIT), the formation of blood
clots in the legs or lungs. People leading a sedentary lifestyle are also likely to experience an
undesirable weight gain which can lead to increased fatigue and greater risk of type 2 diabetes,
heart problems, and other serious ailments.
Other work-related health hazards involve emissions from improperly maintained and
used equipment. Some studies show that poorly maintained laser printers can release ozone
|610 Part 5 Information Systems in Business and Society
into the air; others dispute the claim. Numerous studies on the impact of emissions from
display screens have also resulted in conflicting theories. Although some medical authorities
believe that long-term exposure can cause cancer, studies are not conclusive at this time. In
any case, many organizations are developing conservative and cautious policies.
Most computer manufacturers publish technical information on radiation emissions
from their CRT monitors, and many companies pay close attention to this information. San
Francisco was one of the first cities to propose a video display terminal (VDT) bill. The bill
requires companies with 15 or more employees who spend at least four hours a day working
with computer screens to give 15-minute breaks every two hours. In addition, adjustable
chairs and workstations are required if employees request them.
In addition to the possible health risks from radio-frequency exposure, cell phone use has
raised a safety issue—an increased risk of traffic accidents as vehicle operators become dis-
tracted by talking on their cell phones (or operating their laptop computers, car navigation
systems, or other computer devices) while driving. As a result, some states have made it illegal
to operate a cell phone while driving.
Carpal tunnel syndrome (CTS) is an aggravation of the pathway for the nerves that travel
through the wrist (carpal tunnel). CTS involves wrist pain, a feeling of tingling and numbness,
and difficulty grasping and holding objects. In the late 1990s, many worker compensation
claims were filed by people whose job required them to work at a keyboard many hours a
day. However, a 2001 study by the Mayo Clinic found that heavy computer users (up to
seven hours per day) had the same rate of carpal tunnel as the general population. It appears
that CTS is caused by factors other than the repetitive motion of typing on a keyboard.72
Avoiding Health and Environmental Problems
Many computer-related health problems are caused by a poorly designed work environment.
The computer screen can be hard to read, with glare and poor contrast. Desks and chairs can
also be uncomfortable. Keyboards and computer screens might be fixed in place or difficult
to move. The hazardous activities associated with these unfavorable conditions are collectively
referred to as work stressors. Although these problems might not be of major concern to casual
users of computer systems, continued stressors such as repetitive motion, awkward posture,
and eye strain can cause more serious and long-term injuries. If nothing else, these problems
can severely limit productivity and performance.
Research has shown that
developing certain ergonomically
correct habits can reduce the risk of
adverse health effects when using a
computer.
(Source: Courtesy of Balt, Inc.)
ergonomics The science of designing machines, products, and systems to maximize the safety, com-
The science of designing machines, fort, and efficiency of the people who use them, called ergonomics, has suggested some
products, and systems to maximize approaches to reducing these health problems. The slope of the keyboard, the positioning
the safety, comfort, and efficiency of and design of display screens, and the placement and design of computer tables and chairs
the people who use them. have been carefully studied. Flexibility is a major component of ergonomics and an important
feature of computer devices. People come in many sizes, have differing preferences, and
require different positioning of equipment for best results. Some people, for example, want
to place the keyboard in their laps; others prefer it on a solid table. Because of these individual
|The Personal and Social Impact of Computers Chapter 14 611
differences, computer designers are attempting to develop systems that provide a great deal
of flexibility. In fact, the revolutionary design of Apple’s iMac computer came about through
concerns for users’ comfort. After using basically the same keyboard design for over a decade,
Microsoft introduced a new split keyboard called the Natural Ergonomic Keyboard 4000.
The keyboard provides improved ergonomic features such as improved angles that reduce
motion and how much you must stretch your fingers when you type. The design of the
keyboard also provides more convenient wrist and arm postures which make typing more
convenient for users.
Computer users who work at their machines for more than an hour per day should con-
sider using LCD screens, which are much easier on your eyes than CRT screens. If you stare
at a CRT screen all day long, your eye muscles can become fatigued from the screen flicker
and bright backlighting of the monitor. LCD screens provide a much better viewing expe-
rience for your eyes by virtually eliminating flicker while still being bright without harsh
incandescence. Also, remember to blink! We tend to focus hard on the screen and blink much
less than normal. The result is red, dry, itchy eyes. A few drops of artificial tears and changing
focus away from the screen periodically to rest the eyes has been found to help.
In addition to steps taken by hardware manufacturing companies, computer users must
also take action to reduce repetitive stress injury (RSI) caused by overuse of the computer
through repeated movements that affects muscles, tendons, or nerves in the arms, hands, or
upper back. For example, when working at a workstation, the top of the monitor should be
at or just below eye level. Your wrists and hands should be in line with your forearms, with
your elbows close to your body and supported. Your lower back needs to be well supported.
Your feet should be flat on the floor. Take an occasional break to get away from the keyboard
and screen. Stand up and stretch while at your workplace. Do not ignore pain or discomfort.
Many workers ignore early signs of RSI, and as a result, the problem becomes much worse
and more difficult to treat.
It is estimated that nearly 2 billion personal computers have been sold worldwide. This
creates a tremendous disposal problem because personal computers and monitors contain
lead, mercury, cadmium, and other metals defined as hazardous according to federal laws
that govern their disposal. Congress is considering placing an “e-fee” that would be paid like
a sales tax on personal computers, computer monitors, TVs, and some other electronic
devices to cover the cost of their safe disposal. The annual cost could be in the neighborhood
of $300 million. In the meantime, most personal computer manufacturers have implemented
recycling programs and many are trying to redesign their products to reduce material that
cannot be easily recycled. Many firms also specialize in the recycling of old personal com-
puters. Unfortunately, some recycling programs ultimately send electronics waste to devel-
oping nations in Africa and Asia where it is disposed in environmentally unfriendly ways.73
ETHICAL ISSUES IN INFORMATION SYSTEMS
As you’ve seen throughout this book in the “Ethical and Societal Issues” boxes, ethical issues code of ethics
deal with what is generally considered right or wrong. As we have seen, laws do not provide A code that states the principles and
a complete guide to ethical behavior. Just because an activity is defined as legal does not mean core values that are essential to a
that it is ethical. As a result, practitioners in many professions subscribe to a code of ethics set of people and, therefore, govern
that states the principles and core values that are essential to their work and, therefore, govern their behavior.
their behavior. The code can become a reference point for weighing what is legal and what
is ethical. For example, doctors adhere to varying versions of the 2000-year-old Hippocratic
Oath, which medical schools offer as an affirmation to their graduating classes.
Some IS professionals believe that their field offers many opportunities for unethical
behavior. They also believe that unethical behavior can be reduced by top-level managers
developing, discussing, and enforcing codes of ethics. Various IS-related organizations and
associations promote ethically responsible use of information systems and have developed
useful codes of ethics. The Association for Computing Machinery (ACM) is the oldest
computing society, founded in 1947, and boasts more than 80,000 members in more than
|612 Part 5 Information Systems in Business and Society
100 countries. The ACM has a code of ethics and professional conduct that includes eight
general moral imperatives that can be used to help guide the actions of IS professionals. These
guidelines can also be used for those who employ or hire IS professionals to monitor and
guide their work. These imperatives are outlined in the following list:
As an ACM member I will …
1. Contribute to society and human well-being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patents.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
(Source: ACM Code of Ethics and Professional Conduct, www.acm.org/constitution/
code.html accessed August 10, 2008.)
The mishandling of the social issues discussed in this chapter—including waste and mis-
takes, crime, privacy, health, and ethics—can devastate an organization. The prevention of
these problems and recovery from them are important aspects of managing information and
information systems as critical corporate assets. Increasingly, organizations are recognizing
that people are the most important component of a computer-based information system and
that long-term competitive advantage can be found in a well-trained, motivated, and knowl-
edgeable workforce.
|The Personal and Social Impact of Computers Chapter 14 613
SUMMARY
Principle criminal hacker, also called a cracker, is a computer-savvy
person who attempts to gain unauthorized or illegal access
Policies and procedures must be established to avoid to computer systems to steal passwords, corrupt files and
waste and mistakes associated with computer usage. programs, and even transfer money. Script bunnies are
crackers with little technical savvy. Insiders are employees,
Computer waste is the inappropriate use of computer tech- disgruntled or otherwise, working solo or in concert with out-
nology and resources in both the public and private sectors. siders to compromise corporate systems. The greatest fear
Computer mistakes relate to errors, failures, and other prob- of many organizations is the potential harm that can be done
lems that result in output that is incorrect and without value. by insiders who know system logon IDs, passwords, and com-
Waste and mistakes occur in government agencies as well as pany procedures.
corporations. At the corporate level, computer waste and
mistakes impose unnecessarily high costs for an information Computer crimes target computer systems and include
system and drag down profits. Waste often results from poor illegal access to computer systems by criminal hackers,
integration of IS components, leading to duplication of efforts alteration and destruction of data and programs by viruses
and overcapacity. Inefficient procedures also waste IS (system, application, and document), and simple theft of com-
resources, as do thoughtless disposal of useful resources and puter resources. A virus is a program that attaches itself to
misuse of computer time for games and personal processing other programs. A worm functions as an independent pro-
jobs. Inappropriate processing instructions, inaccurate data gram, replicating its own program files until it destroys other
entry, mishandling of IS output, and poor systems design all systems and programs or interrupts the operation of com-
cause computer mistakes. puter systems and networks. Malware is a general term for
software that is harmful or destructive. A Trojan horse pro-
A less dramatic, yet still relevant, example of waste is the gram is a malicious program that disguises itself as a useful
amount of company time and money employees can waste application and purposefully does something the user does
playing computer games, sending unimportant e-mail, or not expect. A logic bomb is designed to “explode” or execute
accessing the Internet. Junk e-mail, also called spam, and at a specified time and date. A variant is a modified version of
junk faxes also cause waste. a virus that is produced by the virus’s author or another per-
son by amending the original virus code. A password sniffer
Preventing waste and mistakes involves establishing, is a small program hidden in a network or computer system
implementing, monitoring, and reviewing effective policies that records identification numbers and passwords. Spyware
and procedures. Careful programming practices, thorough is software installed on a personal computer to intercept or
testing, flexible network interconnections, and rigorous take partial control over the user’s interactions with the com-
backup procedures can help an information system prevent puter without knowledge or permission of the user.
and recover from many kinds of mistakes. Companies should
develop manuals and training programs to avoid waste and Identity theft is a crime in which an imposter steals per-
mistakes. Company policies should specify criteria for new sonal identification information to obtain credit, merchandise,
resource purchases and user-developed processing tools to or services in the name of the victim. Although Internet gam-
help guard against waste and mistakes. Spam filters that bling is popular, its legality is questionable within the United
block unwanted mail should be installed. States.
Principle Because of increased computer use, greater emphasis is
placed on the prevention and detection of computer crime.
Computer crime is a serious and rapidly growing area Antivirus software is used to detect the presence of viruses,
of concern requiring management attention. worms, and logic bombs. Use of an intrusion detection system
(IDS) provides another layer of protection in the event that an
Some crimes use computers as tools (e.g., to manipulate intruder gets past the outer security layers—passwords,
records, counterfeit money and documents, commit fraud via security procedures, and corporate firewall. It monitors sys-
telecommunications links, and make unauthorized electronic tem and network resources and notifies network security
transfers of money). Identity theft is a crime in which an personnel when it senses a possible intrusion. Many small
imposter obtains key pieces of personal identification infor- and mid-sized organizations are outsourcing their network
mation to impersonate someone else. The information is then security operations to managed security service providers
used to obtain credit, merchandise, and services in the name (MSSPs), which monitor, manage, and maintain network
of the victim, or to provide the thief with false credentials. security hardware and software.
A cyberterrorist is someone who intimidates or coerces a Software piracy might represent the most common com-
government or organization to advance his political or social puter crime. It is estimated that the software industry loses
objectives by launching computer-based attacks against nearly $48 billion in revenue each year to software piracy.
computers, networks, and the information stored on them. A Computer scams have cost people and companies thousands
of dollars. Computer crime is also an international issue.
|614 Part 5 Information Systems in Business and Society
Security measures, such as using passwords, identifica- to decide. Platform for Privacy Preferences (P3P) is a screen-
tion numbers, and data encryption, help to guard against ing technology that shields users from Web sites that don’t
illegal computer access, especially when supported by effec- provide the level of privacy protection they desire.
tive control procedures. Encryption enables users of an unse-
cured public network such as the Internet to securely and Principle
privately exchange data through the use of a public and a pri-
vate cryptographic key pair that is obtained and shared Jobs, equipment, and working conditions must be
through a trusted authority. The use of biometrics, involving designed to avoid negative health effects from
the measurement of a person’s unique characteristics, such computers.
as fingerprints, irises, and retinal images, is another way to
protect important data and information systems. Virus-scan- Computers have changed the makeup of the workforce and
ning software identifies and removes damaging computer even eliminated some jobs, but they have also expanded and
programs. Law enforcement agencies armed with new legal enriched employment opportunities in many ways. Jobs that
tools enacted by Congress now actively pursue computer involve heavy use of computers contribute to a sedentary
criminals. lifestyle, which increases the risk of health problems. Some
critics blame computer systems for emissions of ozone and
Although most companies use data files for legitimate, electromagnetic radiation. Use of cell phones while driving
justifiable purposes, opportunities for invasion of privacy has been linked to increased car accidents.
abound. Privacy issues are a concern with government agen-
cies, e-mail use, corporations, and the Internet. The Chil- The study of designing and positioning computer equip-
dren’s Internet Protection Act was enacted to protect minors ment, called ergonomics, has suggested some approaches to
using the Internet. The Privacy Act of 1974, with the support reducing these health problems. Ergonomic design principles
of other federal laws, establishes straightforward and easily help to reduce harmful effects and increase the efficiency of
understandable requirements for data collection, use, and an information system. The slope of the keyboard, the posi-
distribution by federal agencies; federal law also serves as a tioning and design of display screens, and the placement and
nationwide moral guideline for privacy rights and activities by design of computer tables and chairs are essential for good
private organizations. The USA Patriot Act, passed only five health. RSI prevention includes keeping good posture, not
weeks after the September 11 terrorist attacks, requires ignoring pain or problems, performing stretching and
Internet service providers and telephone companies to turn strengthening exercises, and seeking proper treatment.
over customer information, including numbers called, with- Although they can cause negative health consequences,
out a court order, if the FBI claims that the records are information systems can also be used to provide a wealth of
relevant to a terrorism investigation. Also, the company is information on health topics through the Internet and other
forbidden to disclose that the FBI is conducting an investiga- sources.
tion. Only time will tell how this act will be applied in the future.
The Gramm-Leach-Bliley Act requires all financial institu- Principle
tions to protect and secure customers’ nonpublic data from
unauthorized access or use. Under terms of this act, it is Practitioners in many professions subscribe to a code
assumed that all customers approve of the financial institu- of ethics that states the principles and core values
tions collecting and storing their personal information. that are essential to their work.
A business should develop a clear and thorough policy Ethics determine generally accepted and discouraged activi-
about privacy rights for customers, including database ties within a company and society at large. Ethical computer
access. That policy should also address the rights of employ- users define acceptable practices more strictly than just
ees, including electronic monitoring systems and e-mail. refraining from committing crimes; they also consider the
Fairness in information use for privacy rights emphasizes effects of their IS activities, including Internet usage, on other
knowledge, control, notice, and consent for people profiled in people and organizations. The Association for Computing
databases. People should know about the data that is stored Machinery developed guidelines and a code of ethics. Many IS
about them and be able to correct errors in corporate professionals join computer-related associations and agree
database systems. If information on people is to be used for to abide by detailed ethical codes.
other purposes, they should be asked to give their consent
beforehand. Each person has the right to know and the ability
|The Personal and Social Impact of Computers Chapter 14 615
CHAPTER 14: SELF-ASSESSMENT TEST
Policies and procedures must be established to avoid waste 10. Malware capable of spreading itself from one computer to
and mistakes associated with computer usage. another is called a ___________.
a. logic bomb
1. Business managers and end users must work with IS pro- b. Trojan horse
fessionals to implement and follow proper IS usage policies c. virus
to ensure effective use of company resources. True or False? d. worm
2. Computer-related waste and mistakes are major causes of 11. A(n) ____________ is a modified version of a virus that is
computer problems, contributing to unnecessarily high produced by the virus’s author or another person amending
____ and lost ____. the original virus code.
3. Unwanted e-mail is often referred to as __________. 12. The Business Software Alliance estimates that the software
industry lost over $48 billion in 2007 due to worldwide
Computer crime is a serious and rapidly growing area of con- software piracy. True or False?
cern requiring management attention.
13. Phishing is a computer scam that seems to direct users to
4. According to the 2007 FBI Internet Crime Report, the a bank’s Web site but actually captures key personal infor-
dollar amount of Internet crime reported exceeded $250 mation about its victims. True or False?
million. True or False?
Jobs, equipment, and working conditions must be designed
5. ______ is using one’s skills to get computer users to provide to avoid negative health effects from computers.
you with information to access an information system or
its data. 14. CTS, or ______________________, is the aggravation of
the pathway of nerves that travel through the wrist.
6. The vast majority of organizations conduct some form of
computer security audit. True or False? Practitioners in many professions subscribe to a code of ethics
that states the principles and core values that are essential to
7. ____________________ is a crime in which an imposter their work.
obtains key pieces of personal identification information,
such as Social Security or driver’s license numbers, to 15. Just because an activity is defined as legal, it does not mean
impersonate someone else. that it is ethical. True or False?
8. Internet gambling in the United States is completely legal. CHAPTER 14: SELF-ASSESSMENT TEST ANSWERS
True or False?
(1) True (2) costs, profits (3) spam (4) False (5) Social engi-
9. A logic bomb is a type of Trojan horse that executes when neering (6) True (7) Identity theft (8) False (9) True (10) d
specific conditions occur. True or False? (11) variant (12) True (13) True (14) carpal tunnel syndrome
(15) True
REVIEW QUESTIONS
1. What is a spam filter? How does such a program work? 7. What is phishing? What actions can you take to reduce the
What is the issue with image-based spam? likelihood that you will be a victim of this crime?
2. How can antivirus software reduce computer waste? 8. Outline measures you should take to protect yourself
3. Outline a four-step process to prevent computer waste and against viruses and worms.
mistakes. 9. What does intrusion detection software do? What are some
4. Why are all computer crimes not reported to law enforce- of the issues with the use of this software?
ment agencies? 10. Identify at least five tips to follow to avoid becoming a
5. What is a virus? What is a worm? How are they different? victim of a computer scam.
6. What is a variant? What dangers are associated with such
malware?
|616 Part 5 Information Systems in Business and Society
11. What is the difference between a patent and a copyright? 13. What is ergonomics? How can it be applied to office
What copyright issues come into play when downloading workers?
software or music from a Web site?
14. What specific actions can you take to avoid spyware?
12. What is the difference between the Children’s Online 15. What is a code of ethics? Give an example.
Privacy Protection Act and the Children’s Internet Protec-
tion Act?
DISCUSSION QUESTIONS
1. Imagine that your friend regularly downloads copies of 6. Briefly discuss the potential for cyberterrorism to cause a
newly released, full-length motion pictures for free from major disruption in our daily life. What are some likely
the Internet and makes copies for others for a small fee. Do targets of a cyberterrorist? What sort of action could a
you think that this is ethical? Is it legal? Would you express cyberterrorist take against these targets?
any concerns with him?
7. You are the new head of corporate security for a large For-
2. Outline an approach, including specific techniques (e.g., tune 1000 company and are alarmed at the number of
dumpster diving, phishing, social engineering) that you laptop computers your firm’s employees lose each month.
could employ to gain personal data about the members of What actions would you take to cut down on the potential
your class. for loss of personal and/or company confidential data?
3. Your 12-year-old niece shows you a dozen or so photos of 8. Do you believe that the National Security Agency should
herself and a brief biography including address and cell be able to collect the telephone call records of U.S. citizens
phone number she plans to post on MySpace. What advice without the use of search warrants? Why or why not?
might you offer her about posting personal information
and photos? 9. Using information presented in this chapter on federal pri-
vacy legislation, identify which federal law regulates the
4. Imagine that you are a hacker and have developed a Trojan following areas and situations: cross-checking IRS and
horse program. What tactics might you use to get unsus- Social Security files to verify the accuracy of information,
pecting victims to load the program onto their computer? customer liability for debit cards, your right to access data
contained in federal agency files, the IRS obtaining per-
5. Discuss the importance of educating employees in pre- sonal information, the government obtaining financial
venting computer waste and computer crime. Imagine that records, and employers’ access to university transcripts.
you are given the assignment of developing a computer
education program for your employer. What topics would 10. Briefly discuss the difference between acting morally and
you cover in the course? acting legally. Give an example of acting legally and yet
immorally.
PROBLEM-SOLVING EXERCISES
1. Access the Web sites for the Recording Industry Association 2. Using spreadsheet software and appropriate forecasting
of America (RIAA), Motion Picture Association of America routines, develop a forecast for the amount of piracy for
(MPAA), and Business Software Alliance (BSA) to get esti- next year. Document any assumptions you make in devel-
mates of the amount of piracy worldwide for at least three oping your forecast.
years. Use a graphics package to develop a bar chart to show
the amount of music, motion picture, and software piracy 3. Using your word processing software, write a few brief
over a three-year time period. Compare the amount of paragraphs summarizing the trends you see from reviewing
piracy to the total music, motion picture, and software rev- the data for the past few years. Then cut and paste the
enue for the same time period. information from Exercise 1 and your forecast from Exer-
cise 2 into your report.
|The Personal and Social Impact of Computers Chapter 14 617
TEAM ACTIVITIES
1. Visit your school’s library and interview the librarians about 2. Have each member of your team access ten different Web
the use of Internet software filters. What level and kinds of sites and summarize their findings in terms of the existence
complaints are made about the use of filtering software? of data privacy policy statements: Did the site have such a
Who is responsible for updating the list of sites that are policy? Was it easy to find? Was it complete and easy to
deemed “off limits” for minors? What is their opinion about understand? Did you find any sites using the P3P standard
the need for and effectiveness of the software filter? or ICRA rating method?
WEB EXERCISES
1. The Computer Emergency Response Team Coordination 2. Search the Web for a site that provides software to detect
Center (CERT/CC) is located at the Software Engineering and remove spyware. Write a short report for your instruc-
Institute (SEI), a federally funded research and develop- tor summarizing your findings.
ment center at Carnegie Mellon University in Pittsburgh,
Pennsylvania. Do research on the center and write a brief 3. Do research on the Web to discover what role the Business
report summarizing its activities. Software Alliance plays in the protection of software. Doc-
ument some of the tactics it uses to identify and punish
organizations that it determines to practice software piracy.
CAREER EXERCISES
1. You are a senior member of a marketing organization for a 2. You have just begun a new position in customer relations
manufacturer of children’s toys. A recommendation has for a mid-sized bank. Within your first week on the job,
been made to develop a Web site to promote and sell your several customers have expressed concern about potential
firm’s products as well as learn more about what parents theft of customer data from the bank’s computer databases
and their children are looking for in new toys. Develop a and identity theft. Who would you talk with to develop a
list of laws and regulations that will affect the design of the satisfactory response to address your customers’ concerns?
Web site. Describe how these will limit the operation of What key points would you need to verify with bank
your new Web site. employees?
CASE STUDIES
Case One systems analysts. This is a trend that some refer to as IT con-
sumerization. Unfortunately, consumer devices and systems
IT Consumerization and Web 2.0 Security Challenges are introducing a host of new systems vulnerabilities.
In recent years, the direction of investment in information A big concern regarding IT consumerization is the free
technologies has shifted. The shift is in reaction to the fact flow of communications and data sharing. Today’s Web 2.0
that in 2004, independent consumers passed business and technologies make it all too easy for employees to share
government in their consumption of digital electronics information that they shouldn’t. A study in the United Kingdom
devices. More digital devices, such as notebooks, cell phones, revealed that three-quarters of U.K. businesses have banned
and media players, are being designed for consumers rather the use of instant messaging services such as AIM, Windows
than businesses. New and popular technologies are now Live Messenger, and Yahoo Messenger. The primary concern
being introduced into the workplace by employees rather than is the loss of sensitive business information. Even though the
|618 Part 5 Information Systems in Business and Society
IM services could prove useful for business communications, Critical Thinking Questions
most businesses are concerned about security rather than
interested in innovative communication. 1. Do you think that over time consumer devices may
become as secure as banking systems? Why or why not?
Consider the Apple iPhone. Some businesses that have
supported RIM’s Blackberry smartphone are feeling pressure 2. Do you think the “hard line” taken by U.S. Bank in regards
from their employees to support the iPhone as well. Systems to information security policies is justified? Why or why
security experts are hesitant to comply due to concerns over not? Would you be willing to work in that environment?
information privacy. For example, the iPhone 3G does not
include data encryption native to the device. If the phone is Sources: Stokes, Jon, “Analysis: IT consumerization and the future of work,”
lost or stolen, private corporate information is vulnerable. Ars Technica, July 6, 2008, http://arstechnica.com/news.ars/post/20080706-
Systems analysts are stuck trying to serve both a demanding analysis-it-consumerization-and-the-future-of-work.html; Skinner, Carrie-
workforce and corporate security needs. Ann, “U.K businesses ban IM over security concerns,” Computerworld, July 15,
2008, www.computerworld.com/action/article.do?command=
CTO Gary Hodge at U.S. Bank is concerned about Web 2.0 viewArticleBasic&articleId=9110159; Brodkin, Jon, “U.S. Bank suffers Web 2.0
applications. “We always said outside the corporation was security headaches,” Network World, April 30, 2008, www.networkworld.com/
untrusted and inside the corporation was trusted territory. news/2008/043008-interop-bank-web-2-security.html; Hamblen, Matt,
Web 2.0 has changed all that. We’ve had to expose the internal “iPhone 3G, business must wait,” Macworld UK, June 16, 2008,
workings of the corporation. There’s a whole rash of new www.macworld.co.uk/ipod-itunes/news/index.cfm?newsid=21659.
devices coming out to enable people to compute when they
want to, with the iPhones and smartphones.” Hodge worries Case Two
that smartphone manufacturers haven’t paid enough atten-
tion to security. CTOs and CIOs are feeling as though they are San Francisco WAN Held Captive
losing control of their systems and data.
Sometimes in protecting a network, the ones to watch are
Dmitri Alperovitch, principal research scientist for Secure within the organization. That’s the lesson learned by the City
Computing, is also concerned about security and Web 2.0. The of San Francisco. The city’s network administrator for its
concern stems from the browser becoming a computing multimillion dollar wide area network (WAN) seized control of
platform itself. Although businesses have learned to protect the network and denied other system administrators access
traditional operating systems, they have little power when the for ten days while jailed.
browser is acting like an operating system. Web 2.0 sites and
social networking sites allow anyone to create applications The network administrator, who had been experiencing
and post files and content. This increases the risks of trans- conflicts with his supervisor, created a super password that
mitting malware and revealing corporate secrets. Gary effectively locked out all administrators but himself to the
Dobbins, director of information security at the University of network’s switches and routers. When he refused to reveal
Notre Dame, has simple and effective advice for information the password, he was arrested and held on a $5 million bond.
security: “Never trust the browser.” The network that he held captive connects various city offices
around San Francisco and supports 60 percent of the munic-
In banking, minor lapses in security can have devastating ipal government’s information traffic. During the system
results. Bank CIOs see Web 2.0 as expanding their security administrator’s incarceration, the city network continued
perimeter. Web 2.0 gives them a much larger area to watch. functioning without incident.
Because of this, many banks are taking a hard line. For exam-
ple, U.S. Bank only allows employees to access business- The system administrator’s lawyer argued the defendant
related content on their PCs. The bank restricts the use of any felt that none of the people who requested the password were
type of portable storage including USB drives and CDs. Every qualified to have it. The defendant claimed his supervisor was
electronic transmission that leaves the bank is monitored. undermining his work. The defendant wanted to uncover the
problems in the city’s Department of Telecommunication
For Gary Hodge, investing in information security at U.S. Information Services (DTIS). His intent was to “expose the
Bank isn’t a matter of ROI, but rather a survival necessity. “We utter mismanagement, negligence, and corruption at DTIS,
protect money. It’s new for us to have to protect vast amounts which if left unchecked, will in fact place the City of San
of information,” Hodge said. “We spend millions of dollars on Francisco in danger,” his motion read. It is assumed that
security but it doesn’t generate any new revenue. I haven’t drastic budget cuts that resulted in losing 200 of 350 employ-
been able to show anybody a return on investment. It comes ees at DTIS were behind the stress that ultimately drove the
down to can we secure the organization at the right risk and administrator to extreme measures.
the right cost. You can’t spend all the money. You have to
figure out what level of risk you’re willing to tolerate.” The network administrator finally revealed the super
password to the network when after ten days in prison, San
Discussion Questions Francisco mayor Gavin Newsom visited him. The two had a
lengthy private discussion that concluded with the mayor
1. What are the differences in information security needs for receiving the password, saving the city the hundreds of thou-
a bank versus a retail store? sands of dollars it would have cost to sequentially reset
hundreds of switches and routers around the city.
2. Why are IT consumerization and Web 2.0 challenging
business information security? This case points to several important lessons for busi-
nesses to observe regarding system administration. Rick
|The Personal and Social Impact of Computers Chapter 14 619
Cook of Computerworld suggests that perhaps policies used Critical Thinking Questions
by nuclear power plants, NASA, and the military might have 1. Should information system security be considered as
prevented San Francisco from losing control of its network.
Nuclear power plants deny access to systems at the slightest important as security at a nuclear facility, as suggested in
sign of suspicious activity. In San Francisco’s case, by the time this article? Why or why not?
the suspicious activity was noticed, it was too late. The system 2. Did this system administrator’s actions create the effect
administrator obviously did not have proper oversight and that he obviously intended? Were his actions justified and
supervision. If the city used a system that logged administra- ethical?
tor activities and assigned security officers to review them
regularly, the damage could have been prevented. Sources: Cook, Rick, “Opinion: How to protect your network from rogue IT
employees,” Computerworld, July 21, 2008, www.computerworld.com/action/
In the military, two people are required to take simulta- article.do?command=viewArticleBasic&taxonomyName=security&articleId=
neous actions to launch nuclear missiles. Similar require- 9110385&taxonomyId=17&intsrc=kc_feat; McMillan, Robert, “San Francisco
ments could be implemented with important system actions IT admin locks up city network,” Computerworld, July 21, 2008,
such as managing switches and routers. www.computerworld.com/action/article.do?command=
viewArticleBasic&articleId=322438; McMillan, Robert, and Venezia, Paul,
A most important preventive step is called identity man- “San Francisco’s mayor gets back keys to the network,” Computerworld,
agement and access control (IM/AC). Identity management July 23, 2008, www.computerworld.com/action/article.do?command=
requires usernames and passwords, which most networks do viewArticleBasic&taxonomyName=security&articleId=9110520&taxonomyId=
effectively. Access control, however, is often undermanaged 17&intsrc=kc_top.
in important networks. Access controls prevent users from
accessing systems and commands for which they do not have QUESTIONS FOR WEB CASE
authority.
See the Web site for this book to read about the Whitmann
Through a combination of close supervision, duplication Price Consulting case for this chapter. Following are ques-
of responsibilities, and identity management and access con- tions concerning this Web case.
trol, the San Francisco WAN kidnapping might have been
avoided. Unfortunately, security measures come at some Whitmann Price Consulting: The Personal and Social
cost. Obviously, with budget cutbacks, the city could not afford Impact of Computers
the level of security needed for such an important network.
As global economies become strained and economies Discussion Questions
increasingly depend on the stability of secure information 1. Why do you think extending access to the Whitmann Price
systems, San Francisco’s dilemma could be played out at a
much grander scale unless security for information systems network beyond the business’s walls dramatically ele-
becomes as important as for nuclear power plants and vated the risk to information security?
missiles. 2. What was the primary tool used to minimize that risk, and
how does it work?
Discussion Questions
Critical Thinking Questions
1. What was the cause of the problems for San Francisco’s 1. Why does information security usually come at the cost of
WAN?
user convenience?
2. How might these problems have been prevented? 2. List the security policies put in place for the AMCI system
and the rationale that you think is behind them.
NOTES
Sources for the opening vignette: Qualys staff, “eBay, Inc. - Securing the 2008, www.ic3.gov/media/annualreport/2007-IC3Report.pdf; About eBay
World’s Online Marketplace with QualysGuard,” Qualys Case Study, Web Page, http://news.ebay.com/about.cfm, accessed July 26, 2008.
May 10, 2008, www.bitpipe.com/detail/RES/1210427689_288.html;
Gross, Grant, “Oregon man sentenced to four years for piracy, ID theft,” 1 “Spam Filter Review 2008,” Top Ten Reviews, http://spam-filter-
Computerworld, July 24, 2008, www.computerworld.com/action/ review.toptenreviews.co, accessed June 23, 2008.
article.do?command=viewArticleBasic&articleId=9110621&source=
rss_news10; Goodin, Dan, “Notorious eBay hacker arrested in Romania,” 2 Westbrook, Jesse, “SEC Asks About Ratings Errors on Structured
The Register, April 18, 2008, www.theregister.co.uk/2008/04/18/ Products,” Bloomberg.com, June 26, 2008.
vladuz_arrested; Sullivan, Bob, “How far has Vladuz hacked into eBay?,”
MSNBC Red Tape Chronicles, March 2, 2008, http://redtape.msnbc.com/ 3 Songini, Marc L., “Computer Glitch Led to Mars Global Surveyor’s
2007/03/how_far_has_vla.html; FBI staff, “2007 IC3 Annual Report,” FBI, Demise,” Computerworld, April 27, 2007.
4 Williams, Martyn, “Computer Glitch Hits Hundreds of Japan Flights,”
Computerworld, May 28, 2007.
|620 Part 5 Information Systems in Business and Society
5 McMillan, Robert and Mullins, Robert, “United Flights Grounded by 41 “DirectRevenue LLC Settles FTC Charges,” Federal Trade Commis-
Computer Glitch,” Computerworld, June 21, 2007. sion Web site, February 16, 2007, www.tfc.gov/opa/2007/02, accessed
6 Colliver, Victoria and Muscat, Sabine, “Wells Fargo ATM, Other July 1, 2008.
Glitches Last Longer Than First Reported,” San Francisco Chroni-
cle, August 22, 2007. 42 Keizer, Gregg, “VA Loses Another Hard Drive, Vet Data At Risk,”
Information Week, February 5, 2007.
7 Barak, Sylvie, “Getting Fired for Using the Internet Becomes
Commonplace,” The Inquirer, March 3, 2008. 43 Vijayan, Jaikumar, “Another Day, Another Laptop Theft: Now, It’s
Connecticut’s Revenue Agency,” Computerworld, August 31, 2007.
8 Stackel, I.M., “Another Collier Employee Fired for Inappropriate
E-mails,” NaplesNews.com, July 2, 2008. 44 Fonseca, Brian, “Personal Data on 800,000 Gap Job Applicants
Exposed in Laptop Theft,” Computerworld, September 26, 2007.
9 Havenstein, Heather, “IT Officials Are Clearing BI Hurdles to Expand
Systems,” Computerworld, May 28, 2007. 45 Claburn, Thomas, “Record Number of Data Breaches Reported in
2007,” Information Week, December 31, 2007.
10 Gumbel, Peter, “4 Things I Learned from Societe Generale,” CNN
Money, February 1, 2008. 46 McGee, Marianne Kolbasuk, “Laptop Stolen with Personal Data on
300,000 Health Insurance Clients,” Information Week, January 30,
11 Schwartz, Nelson D. and Bennhold, Katrin, “Societe Generale Scan-
dal: ‘A Suspicion That This Was Inevitable,’” International Herald 2008.
Tribune, February 5, 2008. 47 Puzzanghera, Jim, “Laptop Seizures at Customs Raise Outcry,” Los
12 Vance, Jeff, “Using Policy and Compliance Tools to Reduce Insider Angeles Times, June 26, 2008.
Threats,” at www.cioupdate.com, accessed June 27, 2008.
48 “What is Software Piracy?” Business Software Alliance Web site,
13 Miller, Chuck, “ATM Hackers Net Millions Using Stolen Information,” www.bsa.org/country.aspx, accessed July 3, 2008.
Secure Computing, June 20, 2008.
49 “Worldwide Software Piracy Rate Holds Steady at 35%; Global Losses
14 Barak, Sylvie, “Hacker Exposes Six Million Chilean’s Data to Make a up 15%,” Business Software Alliance, www.bsa.org/country,
Point,” Secure Computing, May 13, 2008.
accessed July 3, 2008.
15 Thomson, Iain, “Ukrainian Hacker May Get to Keep Profits,” Secure
Computing, February 19, 2008. 50 US Code: Title 17 Copyrights, Cornell University Law School,
www.law.cornell.edu/uscode/17, accessed July 3, 2008.
16 Thurston, Richard, “U.S. School Network Falls Victim to Child
Hacker,” Secure Computing, May 27, 2008. 51 “Judgment Entered Against PA Company for Widespread Unautho-
rized Distribution of Software,” Business Software Alliance Web site,
17 Carr, Jim, “Californian Indicted in US $50,000 Scam of E*Trade, April 24, 2008, www.bsa.org/country, accessed July 3, 2008.
Schwab.com,” Secure Computing, May 30, 2008.
52 “Los Angeles-Area Engineering Company Pays $250,000 to The
18 Regan, Keith, “Web Crime Spikes in 2007, Losses Near $240 M,” Business Software Alliance,” April 14, 2008, www.bsa.org/country,
Electronic Commerce Times, April 4, 2008.
accessed July 3, 2008.
19 “CSI Survey 2007,” GoCSI.com, accessed June 27, 2008.
53 Jones, K.C., “Music Piracy Costs U.S. Economy $12.5 Billion, Report
20 Greenemeier, Larry, “The Threat Within: Employees Pose the Biggest Reveals,” InformationWeek, August 22, 2007.
Security Risk,” InformationWeek, July16, 2007.
54 “Two Site Operators Receive Prison Terms for Criminal Copyright
21 Kaplan, Dan, “MTV Breach Impacts 5,000 Employees, Successful Infringement,” United States Department of Justice Web site, May 14,
Social-Engineering Blamed,” Secure Computing, March 11, 2008. 2008 accessed at www.usdoj.gov/usaso/can/press on July 3, 2008.
22 Ko, Carol, “Malaysia to Build Centre to Study Cyberterrorism,” IT 55 “Jones, K.C., “TorrentSpy Ordered to Pay $100 Million in Piracy
World Canada, June 12, 2008. Case,” InformationWeek, May 8, 2008.
23 Associated Press, “Stung by Cyber Warfare, Estonia, NATO Allies to 56 Claburn, Thomas, “Acer, Apple, Dell and HP Sued for Patent Infringe-
Sign Deal on Cyber Defense Center,” International Herald Tribune, ment,” Information Week, June 30, 2008.
May 14, 2008. 57 “Tellabs Sues Fujitsu Claiming Patent Infringement,” PC World,
24 McMillan, Robert, “CNN Cyberattack Called Off,” CIO, April 19, 2008. June 12, 2008.
25 “2007 Identity Fraud Survey Report: Identity Fraud is Dropping, Con- 58 Kanaracus, Chris, “Red Hat Settles Patent Suits with Firestar,
tinued Vigilance Necessary,” Javelin Strategy & Research, February DataTern,” PC World, June 11, 2008.
2007. 59 Rogers, John, “Gartner: US $3.2 Billion Lost to Phishing Attacks in
One Year,” SC Magazine, December 19, 2007.
26 Varrone, Carl, “What Nobody Else is Saying About Online Poker,” Dog
Ear Publishing, 2007, p. 126. 60 Carr, Jim, “Phishing Scam Uses AOL Address to Target eBay Users,”
SC Magazine, November 13, 2007.
27 Chiang, Jennifer W., “Don’t Bet On It: How Complying with Federal
Internet Gambling Law is Not Enough,” Shidler Journal for Law, 61 “Jet Flash 210 Fingerprint USB Flash Drive,” Transcend Web site at
Commerce + Technology, June 6, 2007. www.transcendusa.com/Products/ModDetail.asp?
ModNo=108&SpNo=2&LangNo=0, accessed July 4, 2008.
28 Havenstein, Heather, “Report: FBI Looks into Facebook March
Madness Betting Pools,” Computerworld, March 17, 2008. 62 “Customer Success Stories: Associated Newspapers,” accessed at
Computer Associates Web site, http://ca.com/us/success/
29 James, Clement, “US House Committee Votes on Web Gambling
Ban,” vnunet.com, June 23, 2008. Collateral.aspx?CID=147880 on June 28,2008.
30 Sowa, Tom, “A Hacker’s Wrong Turn,” SpokesmanReview.com, 63 Children’s Internet Protections Act, Pub. L. 106-552, accessed at
August 20, 2007. http://ifea.net/cipa.html on June 22, 2008.
31 “Newly Discovered Malware,” McAfee Web site http://vil.nai.com/vil/ 64 Welch, Erin, “Child-Proofing Internet Access,” The Orange County
newly_discovered_viruses.aspx, accessed July 4, 2008. Register, January 29, 2008.
32 Hulme, George, “New Ransom-Ware Virus Resurfaces,” Information 65 Houser, Mark, “UPMC Admits Privacy Violation,” Pittsburgh Tribune-
Week, June 9, 2008. Review, April 13, 2007.
33 Keizer, Gregg, “Best Buy Sold Infected Digital Picture Frames, 66 Jones, K.C., “Obama, Clinton, McCain Passport Breaches Expose
Computerworld, January 2, 2008. Human, Not Tech Weakness,” InformationWeek, March 21, 2008.
34 Nichols, Shaun, “Twin Trojans Attack Macs,” Secure Computing, 67 “3/4 of Companies Monitor Employee Web Browsing,” Yahoo! Tech,
June 23, 2008. May 9, 2007.
35 Kirk, Jeremy, “’Mebroot’ Proves to be a Tough Rootkit to Crack,” 68 Singel, Ryan, “Nearly Ten Percent of Companies Have Fired Bloggers,
Computerworld, March 4, 2008. Survey Claims,” Wired, July 19, 2007.
36 Leyden, John, “Dodgy Drug Sales Underpin Storm Worm,” The Reg- 69 Lewan, Todd, “Microchips Everywhere: A Future Vision,” The Seattle
ister, June 12, 2008. Times, January 29, 2008.
37 “About McAfee,” McAfee Web site, http://us.mcafee.com/root/ 70 “Children’s Online Privacy Protection Act – 15 USC 6501 – 6506,”
aboutUs.asp, accessed on June 28, 2008. www.softforyou.com/add/COPPA.pdf, accessed June 23, 2008.
38 “Antivirus Software and Disk Defragmentation,” Tech Republic, 71 Bean, Linda, “CARU Reviews Site Operated by Lions Gate Entertain-
June 23, 2008. ment,” CARU News, October 24, 2007.
39 “Anti-Spyware Software Reviews for 2008,” Top Ten Reviews, http:// 72 Simon, Ellen, “How Are Your Wrists Feeling?” Cincinnati Enquirer,
anti-spyware-review.toptenreviews.com, accessed July 1, 2008. May 28, 2008, p. E1.
40 Lemos, Robert, “Spyware Purveyor DirectRevenue Closes Down,” 73 Gross, Grant, “E-Waste Recycling Faces Challenges, Critics Say,”
SecurityFocus, October 25, 2007. Computerworld, April 20, 2008.
GLOSSARY
acceptance testing Conducting any artificial intelligence (AI) The ability of Bluetooth A wireless communications
tests required by the user. computers to mimic or duplicate the specification that describes how cell
functions of the human brain. phones, computers, faxes, personal digital
accounting MIS An information system assistants, printers, and other electronic
that provides aggregate information on artificial intelligence systems People, devices can be interconnected over
accounts payable, accounts receivable, procedures, hardware, software, data, and distances of 10–30 feet at a rate of about
payroll, and many other applications. knowledge needed to develop computer 2 Mbps.
systems and machines that demonstrate
ad hoc DSS A DSS concerned with the characteristics of intelligence. bot A software tool that searches the
situations or decisions that come up only Web for information such as products
a few times during the life of the asking directly An approach to gather and prices.
organization. data that asks users, stakeholders, and
other managers about what they want and brainstorming A decision-making
Advanced Encryption Standard expect from the new or modified system. approach that often consists of members
(AES) An extremely strong data offering ideas “off the top of their heads.”
encryption standard sponsored by the asynchronous communications A
National Institute of Standards and form of communications where the bridge A telecommunications device
Technology based on a key size of 128 receiver gets the message after some that connects one LAN to another LAN
bits, 192 bits, or 256 bits. delay—sometimes hours or days after the using the same telecommunications
message is sent. protocol.
alpha testing Testing an incomplete or
early version of the system. attribute A characteristic of an entity. broadband communications A
telecommunications system in which a
analog signal A variable signal auditing Analyzing the financial very high rate of data exchange is possible.
continuous in both time and amplitude condition of an organization and
so that any small fluctuations in the signal determining whether financial statements business intelligence The process of
are meaningful. and reports produced by the financial gathering enough of the right
MIS are accurate. information in a timely manner and
antivirus program Software that runs in usable form and analyzing it to have a
the background to protect your computer backward chaining The process of positive impact on business strategy,
from dangers lurking on the Internet and starting with conclusions and working tactics, or operations.
other possible sources of infected files. backward to the supporting facts.
business-to-business (B2B)
application flowcharts Diagrams that backbone One of the Internet’s high- e-commerce A subset of e-commerce
show relationships among applications or speed, long-distance communications where all the participants are
systems. links. organizations.
application program interface (API) batch processing system A form of data business-to-consumer (B2C)
An interface that allows applications to processing where business transactions e-commerce A form of e-commerce in
make use of the operating system. are accumulated over a period of time and which customers deal directly with an
prepared for processing as a single unit or organization and avoid intermediaries.
application service provider (ASP) A batch.
company that provides software, support, byte (B) Eight bits that together
and the computer hardware on which to benchmark test An examination that represent a single character of data.
run the software from the user’s facilities compares computer systems operating
over a network. under the same conditions. cache memory A type of high-speed
memory that a processor can access more
arithmetic/logic unit (ALU) The part best practices The most efficient and rapidly than main memory.
of the CPU that performs mathematical effective ways to complete a business
calculations and makes logical process. Cascading Style Sheet (CSS) A file or
comparisons. portion of an HTML file that defines the
beta testing Testing a complete and visual appearance of content in a Web
ARPANET A project started by the U.S. stable system by end users. page.
Department of Defense (DoD) in 1969
as both an experiment in reliable blade server A server that houses many CASE repository A database of system
networking and a means to link DoD and individual computer motherboards that descriptions, parameters, and objectives.
military research contractors, including include one or more processors,
many universities doing military-funded computer memory, computer storage, central processing unit (CPU) The
research. and computer network connections. part of the computer that consists of three
associated elements: the arithmetic/logic
unit, the control unit, and the register
areas.
621
|622 Glossary closed shops IS departments in which computer-assisted manufacturing
only authorized operators can run the (CAM) A system that directly controls
centralized processing Processing computers. manufacturing equipment.
alternative in which all processing
occurs at a single location or facility. cloud computing Using a giant computer-based information system
cluster of computers to serve as a host (CBIS) A single set of hardware,
certificate authority (CA) A trusted to run applications that require high- software, databases,
third-party organization or company performance computing. telecommunications, people, and
that issues digital certificates. procedures that are configured to
code of ethics A code that states the collect, manipulate, store, and process
certification A process for testing skills principles and core values that are data into information.
and knowledge, which results in a essential to a set of people and,
statement by the certifying authority therefore, govern their behavior. computer-integrated manufacturing
that confirms an individual is capable of (CIM) Using computers to link the
performing a particular kind of job. cold site A computer environment components of the production process
that includes rooms, electrical service, into an effective system.
change model A representation of telecommunications links, data storage
change theories that identifies the devices, and the like; also called a shell. concurrency control A method of
phases of change and the best way to dealing with a situation in which two or
implement them. command-based user interface A more people need to access the same
user interface that requires you to give record in a database at the same time.
channel bandwidth The rate at which text commands to the computer to
data is exchanged over a perform basic activities. consumer-to-consumer (C2C)
telecommunications channel, usually e-commerce A subset of e-commerce
measured in bits per second (bps). compact disc read-only memory that involves consumers selling directly
(CD-ROM) A common form of to other consumers.
character A basic building block of optical disc on which data, once it has
information, consisting of uppercase been recorded, cannot be modified. content streaming A method for
letters, lowercase letters, numeric digits, transferring multimedia files over the
or special symbols. competitive advantage A significant Internet so that the data stream of voice
and (ideally) long-term benefit to a and pictures plays more or less
chat room A facility that enables two company over its competition. continuously without a break, or very
or more people to engage in interactive few of them; enables users to browse
“conversations” over the Internet. competitive intelligence One aspect large files in real time.
of business intelligence limited to
chief knowledge officer (CKO) A information about competitors and the continuous improvement
top-level executive who helps the ways that knowledge affects strategy, Constantly seeking ways to improve
organization use a KMS to create, store, tactics, and operations. business processes to add value to
and use knowledge to achieve products and services.
organizational goals. compiler A special software program
that converts the programmer’s source control unit The part of the CPU that
choice stage The third stage of code into the machine-language sequentially accesses program
decision making, which requires instructions consisting of binary digits. instructions, decodes them, and
selecting a course of action. coordinates the flow of data in and out
computer literacy Knowledge of of the ALU, registers, primary storage,
click fraud A problem arising in a pay- computer systems and equipment and and even secondary storage and various
per-click online advertising the ways they function; it stresses output devices.
environment where additional clicks equipment and devices (hardware),
are generated beyond those that come programs and instructions (software), coprocessor The part of the computer
from actual, legitimate users. databases, and telecommunications. that speeds processing by executing
specific types of instructions while the
clickstream data The data gathered computer network The CPU works on another processing
based on the Web sites you visit and the communications media, devices, and activity.
items you click. software needed to connect two or more
computer systems or devices. cost center A division within a
client/server An architecture in which company that does not directly generate
multiple computer platforms are computer programs Sequences of revenue.
dedicated to special functions such as instructions for the computer.
database management, printing, cost/benefit analysis An approach
communications, and program computer-aided software that lists the costs and benefits of each
execution. engineering (CASE) Tools that proposed system. After they are
automate many of the tasks required in expressed in monetary terms, all the
clock speed A series of electronic a systems development effort and costs are compared with all the benefits.
pulses produced at a predetermined rate encourage adherence to the SDLC.
that affects machine cycle time.
| Glossary 623
counterintelligence The steps an data analysis The manipulation of data preparation, or data
organization takes to protect collected data so that the development conversion Ensuring all files and
information sought by “hostile” team members who are participating in databases are ready to be used with new
intelligence gatherers. systems analysis can use the data. computer software and systems.
creative analysis The investigation of data cleanup The process of looking data storage The process of updating
new approaches to existing problems. for and fixing inconsistencies to ensure one or more databases with new
that data is accurate and complete. transactions.
criminal hacker (cracker) A
computer-savvy person who attempts data collection Capturing and data store Representation of a storage
to gain unauthorized or illegal access to gathering all data necessary to complete location for data.
computer systems to steal passwords, the processing of transactions.
corrupt files and programs, or even data warehouse A database that
transfer money. data correction The process of collects business information from
reentering data that was not typed or many sources in the enterprise, covering
critical analysis The unbiased and scanned properly. all aspects of the company’s processes,
careful questioning of whether system products, and customers.
elements are related in the most data definition language (DDL) A
effective ways. collection of instructions and database An organized collection of
commands used to define and describe facts and information.
critical path Activities that, if delayed, data and relationships in a specific
would delay the entire project. database. database administrator (DBA) A
skilled IS professional who directs all
critical success factors (CSFs) Factors data dictionary A detailed description activities related to an organization’s
that are essential to the success of a of all the data used in the database. database.
functional area of an organization.
data editing The process of checking database approach to data
cross-platform development A data for validity and completeness. management An approach whereby a
development technique that allows pool of related data is shared by
programmers to develop programs that Data Encryption Standard (DES) multiple application programs.
can run on computer systems having An early data encryption standard
different hardware and operating developed in the 1970s that uses a database management system
systems, or platforms. 56-bit private key algorithm. (DBMS) A group of programs that
manipulate the database and provide an
culture A set of major understandings data entry Converting human- interface between the database and the
and assumptions shared by a group. readable data into a machine-readable user of the database and other
form. application programs.
customer relationship management
(CRM) system A system that helps a data input Transferring machine- data-flow diagram (DFD) A model of
company manage all aspects of readable data into the system. objects, associations, and activities that
customer encounters, including describes how data can flow between
marketing and advertising, sales, data item The specific value of an and around various objects.
customer service after the sale, and attribute.
programs to retain loyal customers. data-flow line Arrows that show the
data manipulation The process of direction of data element movement.
cybermall A single Web site that offers performing calculations and other data
many products and services at one transformations related to business decentralized processing Processing
Internet location. transactions. alternative in which processing devices
are placed at various remote locations.
cyberterrorist Someone who data manipulation language
intimidates or coerces a government or (DML) The commands that are used decision room A room that supports
organization to advance his political or to manipulate the data in a database. decision making, with the decision
social objectives by launching makers in the same building,
computer-based attacks against data mart A subset of a data combining face-to-face verbal
computers, networks, and the warehouse. interaction with technology to make
information stored on them. the meeting more effective and
data mining An information-analysis efficient.
data Raw facts, such as an employee tool that involves the automated
number, total hours worked in a week, discovery of patterns and relationships decision support system (DSS) An
inventory part numbers, or sales orders. in a data warehouse. organized collection of people,
procedures, software, databases, and
data administrator A nontechnical data model A diagram of data entities devices used to support problem-
position responsible for defining and and their relationships. specific decision making.
implementing consistent principles for
a variety of data issues.
|624 Glossary digital subscriber line (DSL) A domain expert The person or group
telecommunications service that who has the expertise or knowledge the
decision-making phase The first part delivers high-speed Internet access to expert system is trying to capture.
of problem solving, including three homes and small businesses over the
stages: intelligence, design, and choice. existing phone lines of the local downsizing Reducing the number of
telephone network. employees to cut costs.
delphi approach A decision-making
approach in which group decision digital video disc (DVD) A storage drill-down report A report providing
makers are geographically dispersed; medium used to store digital video or increasingly detailed data about a
this approach encourages diversity computer data. situation.
among group members and fosters
creativity and original thinking in direct access A retrieval method in dumpster diving Going through the
decision making. which data can be retrieved without the trash cans of an organization to find
need to read and discard other data. secret or confidential information,
demand report A report developed to including information needed to access
give certain information at someone’s direct access storage device an information system or its data.
request. (DASD) A device used for direct access
of secondary storage data. dynamic Web pages Web pages
design report The primary result of containing variable information that
systems design, reflecting the decisions direct conversion (also called plunge are built to respond to a specific Web
made and preparing the way for systems or direct cutover) Stopping the old visitor’s request.
implementation. system and starting the new system on
a given date. economic feasibility The
design stage The second stage of determination of whether the project
decision making, in which alternative direct observation Watching the makes financial sense and whether
solutions to the problem are developed. existing system in action by one or more predicted benefits offset the cost and
members of the analysis team. time needed to obtain them.
desktop computer A relatively small,
inexpensive, single-user computer that disaster recovery The economic order quantity (EOQ)
is highly versatile. implementation of the disaster plan. The quantity that should be reordered
to minimize total inventory costs.
deterrence controls Rules and disaster recovery plan (DRP) A
procedures to prevent problems before formal plan describing the actions that effectiveness A measure of the extent
they occur. must be taken to restore computer to which a system achieves its goals; it
operations and services in the event of a can be computed by dividing the goals
dialogue manager A user interface disaster. actually achieved by the total of the
that allows decision makers to easily stated goals.
access and manipulate the DSS and to disk mirroring A process of storing
use common business terms and data that provides an exact copy that efficiency A measure of what is
phrases. protects users fully in the event of data produced divided by what is consumed.
loss.
digital audio player A device that can e-Government The use of
store, organize, and play digital music distance learning The use of information and communications
files. telecommunications to extend the technology to simplify the sharing of
classroom. information, speed formerly paper-
digital camera An input device used based processes, and improve the
with a PC to record and store images distributed database A database in relationship between citizens and
and video in digital form. which the data can be spread across government.
several smaller databases connected via
digital certificate An attachment to an telecommunications devices. electronic bill presentment A
e-mail message or data embedded in a method of billing whereby a vendor
Web site that verifies the identity of a distributed processing Processing posts an image of your statement on the
sender or Web site. alternative in which computers are Internet and alerts you by e-mail that
placed at remote locations but are your bill has arrived.
digital rights management (DRM) connected to each other via a network.
Refers to the use of any of several electronic business (e-business)
technologies to enforce policies for document production The process of Using information systems and the
controlling access to digital media such generating output records and reports. Internet to perform all business-related
as movies, music, and software. tasks and functions.
documentation The text that
digital signal A signal that represents describes the program functions to help electronic cash An amount of money
bits. the user operate the computer system. that is computerized, stored, and used
as cash for e-commerce transactions.
domain The allowable values for data
attributes. Also, the area of knowledge
addressed by an expert system.
| Glossary 625
electronic commerce (e-commerce) enterprise sphere of influence The explanation facility Component of
Conducting business activities (e.g., sphere of influence that serves the needs an expert system that allows a user or
distribution, buying, selling, of the firm in its interaction with its decision maker to understand how the
marketing, and servicing of products or environment. expert system arrived at certain
services) electronically over computer conclusions or results.
networks such as the Internet, enterprise system A system central to
extranets, and corporate networks. the organization that ensures Extensible Markup Language
information can be shared across all (XML) The markup language for Web
electronic data interchange (EDI) business functions and all levels of documents containing structured
An intercompany, application-to- management to support the running information, including words, pictures,
application communication of data in a and managing of a business. and other elements.
standard format, permitting the
recipient to perform a standard business entity A generalized class of people, external auditing Auditing performed
transaction, such as processing purchase places, or things for which data is by an outside group.
orders. collected, stored, and maintained.
extranet A network based on Web
electronic document distribution A entity symbol Representation of technologies that links selected
process that enables the sending and either a source or destination of a data resources of a company’s intranet with
receiving of documents in a digital form element. its customers, suppliers, or other
without being printed (although business partners.
printing is possible). entity-relationship (ER)
diagrams Data models that use basic feasibility analysis Assessment of the
electronic exchange An electronic graphical symbols to show the technical, economic, legal, operational,
forum where manufacturers, suppliers, organization of and relationships and schedule feasibility of a project.
and competitors buy and sell goods, between data.
trade market information, and run feedback Output that is used to make
back-office operations. environmental design Also called changes to input or processing
green design, it involves systems activities.
electronic funds transfer (EFT) A development efforts that slash power
system of transferring money from one consumption, require less physical field Typically a name, number, or
bank account directly to another space, and result in systems that can be combination of characters that
without any paper money changing disposed in a way that doesn’t describes an aspect of a business object
hands. negatively affect the environment. or activity.
electronic retailing (e-tailing) The ergonomics The science of designing file A collection of related records.
direct sale from business to consumer machines, products, and systems to
through electronic storefronts, typically maximize the safety, comfort, and File Transfer Protocol (FTP) A
designed around an electronic catalog efficiency of the people who use them. protocol that describes a file transfer
and shopping cart model. process between a host and a remote
event-driven review A review computer and allows users to copy files
empowerment Giving employees and triggered by a problem or opportunity from one computer to another.
their managers more responsibility and such as an error, a corporate merger, or
authority to make decisions, take a new market for products. final evaluation A detailed
certain actions, and have more control investigation of the proposals offered by
over their jobs. exception report A report the vendors remaining after the
automatically produced when a preliminary evaluation.
encryption The process of converting situation is unusual or requires
an original message into a form that can management action. financial MIS An information system
only be understood by the intended that provides financial information not
receiver. execution time (E-time) The time it only for executives but also for a broader
takes to execute an instruction and store set of people who need to make better
end-user systems development Any the results. decisions on a daily basis.
systems development project in which
business managers and users assume the executive support system (ESS) five-forces model A widely accepted
primary effort. Specialized DSS that includes all model that identifies five key factors
hardware, software, data, procedures, that can lead to attainment of
enterprise data modeling Data and people used to assist senior-level competitive advantage, including
modeling done at the level of the entire executives within the organization. (1) the rivalry among existing
enterprise. competitors, (2) the threat of new
expert system Hardware and software entrants, (3) the threat of substitute
enterprise resource planning (ERP) that stores knowledge and makes products and services, (4) the
system A set of integrated programs inferences, similar to a human expert. bargaining power of buyers, and (5) the
capable of managing a company’s vital bargaining power of suppliers.
business operations for an entire
multisite, global organization.
|626 Glossary grid chart A table that shows hot site A duplicate, operational
relationships among the various aspects hardware system or immediate access to
flat organizational structure An of a systems development effort. one through a specialized vendor.
organizational structure with a reduced
number of management layers. grid computing The use of a HTML tags Codes that let the Web
collection of computers, often owned browser know how to format text—as a
flexible manufacturing system by multiple individuals or heading, as a list, or as body text—and
(FMS) An approach that allows organizations, to work in a coordinated whether images, sound, and other
manufacturing facilities to rapidly and manner to solve a common problem. elements should be inserted.
efficiently change from making one
product to making another. group consensus Decision making by human resource MIS An information
a group that is appointed and given the system that is concerned with activities
forecasting Predicting future events to responsibility of making the final related to employees and potential
avoid problems. evaluation and selection. employees of an organization, also
called a personnel MIS.
forward chaining The process of group consensus approach A
starting with the facts and working decision-making approach that forces hyperlink Highlighted text or
forward to the conclusions. members in the group to reach a graphics in a Web document that, when
unanimous decision. clicked, opens a new Web page or
front-end processor A special- section of the same page containing
purpose computer that manages group support system (GSS) related content.
communications to and from a Software application that consists of
computer system serving hundreds or most elements in a DSS, plus software Hypertext Markup Language
even thousands of users. to provide effective support in group (HTML) The standard page
decision making; also called group description language for Web pages.
full-duplex channel A decision support system or computerized
communications channel that permits collaborative work system. identify theft A crime in which an
data transmission in both directions at imposter obtains key pieces of personal
the same time, so a full-duplex channel hacker A person who enjoys computer identification information, such as
is like two simplex channels. technology and spends time learning Social Security or driver’s license
and using computer systems. numbers, to impersonate someone else.
game theory The use of information
systems to develop competitive handheld computer A single-user IF-THEN statements Rules that
strategies for people, organizations, or computer that provides ease of suggest certain conclusions.
even countries. portability because of its small size.
image log A separate file that contains
Gantt chart A graphical tool used for hardware Any machinery (most of only changes to applications.
planning, monitoring, and which uses digital circuits) that assists in
coordinating projects. the input, processing, storage, and implementation stage A stage of
output activities of an information problem solving in which a solution is
gateway A telecommunications device system. put into effect.
that serves as an entrance to another
network. half-duplex channel A incremental backup Making a
communications channel that can backup copy of all files changed during
genetic algorithm An approach to transmit data in either direction, but the last few days or the last week.
solving large, complex problems in not simultaneously.
which a number of related operations or inference engine Part of the expert
models change and evolve until the best help facility A program that provides system that seeks information and
one emerges. assistance when users want to know relationships from the knowledge base
more about a program or feature or and provides answers, predictions, and
geographic information system what type of response is expected. suggestions similar to the way a human
(GIS) A computer system capable of expert would.
assembling, storing, manipulating, and heuristics Commonly accepted
displaying geographic information, that guidelines or procedures that usually informatics A specialized system that
is, data identified according to its find a good solution. combines traditional disciplines, such
location. as science and medicine, with computer
hierarchy of data Bits, characters, systems and technology.
gigahertz (GHz) Billions of cycles per fields, records, files, and databases.
second. information A collection of facts
highly structured organized in such a way that they have
graphical user interface (GUI) An problems Problems that are additional value beyond the value of the
interface that uses icons and menus straightforward and require known individual facts.
displayed on screen to send commands facts and relationships.
to the computer system.
| Glossary 627
information center A support integration testing Testing all related joining Manipulating data to combine
function that provides users with systems together. two or more tables.
assistance, training, application
development, documentation, intellectual property Includes works joint application development
equipment selection and setup, of the mind such as books, films, music, (JAD) A process for data collection
standards, technical assistance, and processes, and software, which are and requirements analysis in which
troubleshooting. distinct somehow and are owned and/ users, stakeholders, and IS professionals
or created by a single entity. work together to analyze existing
information service unit A miniature systems, propose possible solutions, and
IS department. intelligence stage The first stage of define the requirements of a new or
decision making, in which potential modified system.
information system (IS) A set of problems or opportunities are
interrelated components that collect, identified and defined. just-in-time (JIT) inventory A
manipulate, store, and disseminate data philosophy of inventory management
and information and provide a feedback intelligent agent Programs and a in which inventory and materials are
mechanism to meet an objective. knowledge base used to perform a delivered just before they are used in
specific task for a person, a process, or manufacturing a product.
information systems literacy another program; also called intelligent
Knowledge of how data and robot or bot. kernel The heart of the operating
information are used by individuals, system, which controls the most critical
groups, and organizations. intelligent behavior The ability to processes.
learn from experiences and apply
information systems planning knowledge acquired from experience, key A field or set of fields in a record
Translating strategic and organizational handle complex situations, solve that is used to identify the record.
goals into systems development problems when important information
initiatives. is missing, determine what is key-indicator report A summary of
important, react quickly and correctly the previous day’s critical activities;
infrared transmission A wireless to a new situation, understand visual typically available at the beginning of
communications technology that images, process and manipulate each workday.
operates at a frequency of 300 GHz and symbols, be creative and imaginative,
above that requires line-of-sight and use heuristics. knowledge The awareness and
transmission and operates over short understanding of a set of information
distances—such as a few yards. internal auditing Auditing performed and ways that information can be made
by individuals within the organization. useful to support a specific task or reach
input The activity of gathering and a decision.
capturing raw data. Internet The world’s largest computer
network, consisting of thousands of knowledge acquisition facility Part
insider An employee, disgruntled or interconnected networks, all freely of the expert system that provides
otherwise, working solo or in concert exchanging information. convenient and efficient means of
with outsiders to compromise corporate capturing and storing all the
systems. Internet Protocol (IP) A components of the knowledge base.
communication standard that enables
installation The process of physically traffic to be routed from one network knowledge base A component of an
placing the computer equipment on the to another as needed. expert system that stores all relevant
site and making it operational. information, data, rules, cases, and
Internet service provider (ISP) Any relationships used by the expert system.
instant messaging A method that company that provides Internet access
allows two or more people to to people or organizations. knowledge engineer A person who
communicate online using the Internet. has training or experience in the design,
intranet An internal network based on development, implementation, and
institutional DSS A DSS that handles Web technologies that allows people maintenance of an expert system.
situations or decisions that occur more within an organization to exchange
than once, usually several times per year information and work on projects. knowledge user The person or group
or more. An institutional DSS is used who uses and benefits from the expert
repeatedly and refined over the years. intrusion detection system (IDS) system.
Software that monitors system and
instruction time (I-time) The time it network resources and notifies network LCD display Flat display that uses
takes to perform the fetch-instruction security personnel when it senses a liquid crystals—organic, oil-like
and decode-instruction steps of the possible intrusion. material placed between two
instruction phase. polarizers—to form characters and
Java An object-oriented programming graphic images on a backlit screen.
integrated development environment language from Sun Microsystems based
(IDE) A development approach that on C++ that allows small programs learning systems A combination of
combines the tools needed for (applets) to be embedded within an software and hardware that allows the
programming with a programming HTML document. computer to change how it functions or
language into one integrated package. reacts to situations based on feedback it
receives.
|628 Glossary market segmentation The mobile commerce (m-commerce)
identification of specific markets to Transactions conducted anywhere,
legal feasibility The determination of target them with advertising messages. anytime.
whether laws or regulations may
prevent or limit a systems development marketing MIS An information model base Part of a DSS that
project. system that supports managerial provides decision makers access to a
activities in product development, variety of models and assists them in
linking Data manipulation that distribution, pricing decisions, and decision making.
combines two or more tables using promotional effectiveness.
common data attributes to form a new model management
table with only the unique data massively parallel processing software Software that coordinates the
attributes. systems A form of multiprocessing use of models in a DSS.
that speeds processing by linking
local area network (LAN) A network hundreds or thousands of processors to modem A telecommunications
that connects computer systems and operate at the same time, or in parallel, hardware device that converts
devices within a small area, such as an with each processor having its own bus, (modulates and demodulates)
office, home, or several floors in a memory, disks, copy of the operating communications signals so they can be
building. system, and applications. transmitted over the communication
media.
logical design A description of the material requirements planning
functional requirements of a system. (MRP) A set of inventory-control monitoring stage The final stage of
techniques that help coordinate the problem-solving process, in which
lookup tables Tables containing data thousands of inventory items when the decision makers evaluate the
that computer programs can develop demand of one item is dependent on the implementation.
and use to simplify and shorten data demand for another.
entry. Moore’s Law A hypothesis stating that
megahertz (MHz) Millions of cycles transistor densities on a single chip
machine cycle The instruction phase per second. double every two years.
followed by the execution phase.
menu-driven system A system in MP3 A standard format for
magnetic disk A common secondary which users simply pick what they want compressing a sound sequence into a
storage medium, with bits represented to do from a list of alternatives. small file.
by magnetized areas.
meta tag A special HTML tag, not multicore microprocessor A
magnetic stripe card A type of card visible on the displayed Web page, that microprocessor that combines two or
that stores limited amounts of data by contains keywords representing your more independent processors into a
modifying the magnetism of tiny iron- site’s content, which search engines to single computer so they can share the
based particles contained in a band on use to build indexes pointing to your workload and improve processing
the card. Web site. capacity.
magnetic tape A secondary storage metropolitan area network (MAN) multiplexer A device that combines
medium; Mylar film coated with iron A telecommunications network that data from multiple data sources into a
oxide with portions of the tape connects users and their devices in a single output signal that carries
magnetized to represent bits. geographical area that spans a campus multiple channels, thus reducing the
or city. number of communications links
mainframe computer A large, needed and therefore, lowering
powerful computer often shared by microcode Predefined, elementary telecommunications costs.
hundreds of concurrent users circuits and logical operations that the
connected to the machine via terminals. processor performs when it executes an multiprocessing The simultaneous
instruction. execution of two or more instructions
maintenance team A special IS team at the same time.
responsible for modifying, fixing, and middleware Software that allows
updating existing software. different systems to communicate and natural language processing
exchange data. Processing that allows the computer to
make-or-buy decision The decision understand and react to statements and
regarding whether to obtain the MIPS Millions of instructions per commands made in a “natural”
necessary software from internal or second, a measure of machine cycle language, such as English.
external sources. time.
Near Field Communication (NFC)
management information system mission-critical systems Systems that A very short-range wireless connectivity
(MIS) An organized collection of play a pivotal role in an organization’s technology designed for cell phones and
people, procedures, software, databases, continued operations and goal credit cards.
and devices that provides routine attainment.
information to managers and decision
makers.
| Glossary 629
net present value The net amount by on-demand computing Contracting organizational structure
which project savings exceed project for computer resources to rapidly Organizational subunits and the way
expenses after allowing for the cost of respond to an organization’s varying they relate to the overall organization.
capital and the passage of time. workflow. Also called on-demand
business and utility computing. output Production of useful
network operating system (NOS) information, usually in the form of
Systems software that controls the online analytical processing documents and reports.
computer systems and devices on a (OLAP) Software that allows users to
network and allows them to explore data from a number of outsourcing Contracting with outside
communicate with each other. perspectives. professional services to meet specific
business needs.
network-attached storage (NAS) online transaction processing
Storage devices that attach to a network (OLTP) A form of data processing parallel computing The simultaneous
instead of to a single computer. where each transaction is processed execution of the same task on multiple
immediately, without the delay of processors to obtain results faster.
network-management software accumulating transactions into a batch.
Software that enables a manager on a parallel start-up Running both the
networked desktop to monitor the use open shops IS departments in which old and new systems for a period of time
of individual computers and shared people, such as programmers and and comparing the output of the new
hardware (such as printers), scan for systems analysts, are allowed to run the system closely with the output of the old
viruses, and ensure compliance with computers, in addition to authorized system; any differences are reconciled.
software licenses. operators. When users are comfortable that the
new system is working correctly, the old
networks Computers and equipment open-source software Software that is system is eliminated.
that are connected in a building, around freely available to anyone in a form that
the country, or around the world to can be easily modified. password sniffer A small program
enable electronic communications. hidden in a network or a computer
operating system (OS) A set of system that records identification
neural network A computer system computer programs that controls the numbers and passwords.
that can simulate the functioning of a computer hardware and acts as an
human brain. interface with application programs. patch A minor change to correct a
problem or make a small enhancement.
nominal group technique A decision- operational feasibility The measure It is usually an addition to an existing
making approach that encourages of whether the project can be put into program.
feedback from individual group action or operation.
members, and the final decision is made perceptive system A system that
by voting, similar to the way public optical disc A rigid disc of plastic onto approximates the way a person sees,
officials are elected. which data is recorded by special lasers hears, and feels objects.
that physically burn pits in the disc.
nonprogrammed decision A decision personal area network (PAN) A
that deals with unusual or exceptional optimization model A process to find network that supports the
situations. the best solution, usually the one that interconnection of information
will best help the organization meet its technology within a range of
object-oriented database A database goals. 33 feet or so.
that stores both data and its processing
instructions. organization A formal collection of personal productivity software The
people and other resources established software that enables users to improve
object-oriented database to accomplish a set of goals. their personal effectiveness, increasing
management system (OODBMS) A the amount of work they can perform
group of programs that manipulate an organizational change How for- and enhancing its quality.
object-oriented database and provide a profit and nonprofit organizations plan
user interface and connections to other for, implement, and handle change. personal sphere of influence The
application programs. sphere of influence that serves the needs
organizational culture The major of an individual user.
object-oriented systems development understandings and assumptions for a
(OOSD) An approach to systems business, corporation, or other personalization The process of
development that combines the logic of organization. tailoring Web pages to specifically
the systems development life cycle with target individual consumers.
the power of object-oriented modeling organizational learning The
and programming. adaptations to new conditions or phase-in approach (also called
alterations of organizational practices piecemeal approach) Slowly replacing
object-relational database over time. components of the old system with
management system (ORDBMS) A those of the new one. This process is
DBMS capable of manipulating audio, repeated for each application until the
video, and graphical data. new system is running every application
and performing as expected; also called
a piecemeal approach.
|630 Glossary policy-based storage programmer A specialist responsible
management Automation of storage for modifying or developing programs
phishing A practice that entails using previously defined policies. to satisfy user requirements.
sending bogus messages purportedly
from a legitimate institution to pry portable computer A computer small programming languages Sets of
personal information from customers enough to be carried easily. keywords, symbols, and a system of
by convincing them to go to a “spoofed” rules for constructing statements by
Web site. predictive analysis A form of data which humans can communicate
mining that combines historical data instructions to be executed by a
physical design The specification of with assumptions about future computer.
the characteristics of the system conditions to predict outcomes of
components necessary to put the logical events, such as future product sales or project deadline The date the entire
design into action. the probability that a customer will project is to be completed and
default on a loan. operational.
pilot start-up Running the new
system for one group of users rather preliminary evaluation An initial project milestone A critical date for
than all users. assessment whose purpose is to dismiss the completion of a major part of the
the unwanted proposals; begins after all project.
pipelining A form of CPU operation proposals have been submitted.
in which multiple execution phases are project organizational structure A
performed in a single machine cycle. primary key A field or set of fields that structure centered on major products or
uniquely identifies the record. services.
pixel A dot of color on a photo image
or a point of light on a display screen. primary storage (main memory; project schedule A detailed
memory) The part of the computer description of what is to be done.
planned data redundancy A way of that holds program instructions and
organizing data in which the logical data. projecting Manipulating data to
database design is altered so that certain eliminate columns in a table.
data entities are combined, summary private branch exchange (PBX) A
totals are carried in the data records telephone switching exchange that public network services Systems that
rather than calculated from elemental serves a single organization. give personal computer users access to
data, and some data attributes are vast databases and other services,
repeated in more than one data entity problem solving A process that goes usually for an initial fee plus usage fees.
to improve database performance. beyond decision making to include the
implementation stage. quality The ability of a product
plasma display A plasma display uses (including services) to meet or exceed
thousands of smart cells (pixels) procedures The strategies, policies, customer expectations.
consisting of electrodes and neon and methods, and rules for using a CBIS.
xeon gases which are electrically turned quality control A process that ensures
into plasma (electrically charged atoms process A set of logically related tasks that the finished product meets the
and negatively charged particles) to performed to achieve a defined customers’ needs.
emit light. outcome.
questionnaires A method of gathering
Platform for Privacy Preferences process symbol Representation of a data when the data sources are spread
(P3P) A screening technology that function that is performed. over a wide geographic area.
shields users from Web sites that don’t
provide the level of privacy protection processing Converting or Radio Frequency Identification
they desire. transforming data into useful outputs. (RFID) A technology that employs a
microchip with an antenna that
point evaluation system An productivity A measure of the output broadcasts its unique identifier and
evaluation process in which each achieved divided by the input required. location to receivers.
evaluation factor is assigned a weight, in
percentage points, based on profit center A department within an random access memory (RAM) A
importance. Then each proposed organization that focuses on generating form of memory in which instructions
system is evaluated in terms of this profits. or data can be temporarily stored.
factor and given a score ranging from 0
to 100. The scores are totaled, and the Program Evaluation and Review rapid application development
system with the greatest total score is Technique (PERT) A formalized (RAD) A systems development
selected. approach for developing a project approach that employs tools,
schedule that creates three time techniques, and methodologies
point-of-sale (POS) device A estimates for an activity. designed to speed application
terminal used in retail operations to development.
enter sales information into the programmed decision A decision
computer system. made using a rule, procedure, or
quantitative method.
| Glossary 631
read-only memory (ROM) A return on investment (ROI) One search engine A valuable tool that
nonvolatile form of memory. measure of IS value that investigates the enables you to find information on the
additional profits or benefits that are Web by specifying words that are key to
record A collection of related data generated as a percentage of the a topic of interest, known as keywords.
fields. investment in IS technology.
secondary storage (permanent
redundant array of independent/ revenue center A division within a storage) Devices that store larger
inexpensive disks (RAID) A method company that generates sales or amounts of data, instructions, and
of storing data that generates extra bits revenues. information more permanently than
of data from existing data, allowing the allowed with main memory.
system to create a “reconstruction map” reverse 911 service A
so that if a hard drive fails, the system communications solution that delivers Secure Sockets Layer (SSL) A
can rebuild lost data. emergency notifications to users in a communications protocol is used to
selected geographical area. secure sensitive data during
reengineering (process redesign) e-commerce.
The radical redesign of business rich Internet application Software
processes, organizational structures, that has the functionality and security dashboard Software that
information systems, and values of the complexity of traditional application provides a comprehensive display on a
organization to achieve a breakthrough software, but does not require local single computer screen of all the vital
in business results. installation and runs in a Web browser. data related to an organization’s
security defenses including threats,
register A high-speed storage area in robotics Mechanical or computer exposures, policy compliance and
the CPU used to temporarily hold small devices that perform tasks requiring a incident alerts.
units of program instructions and data high degree of precision or that are
immediately before, during, and after tedious or hazardous for humans. selecting Manipulating data to
execution by the CPU. eliminate rows according to certain
router A telecommunications device criteria.
relational model A database model that forwards data packets across two or
that describes data in which all data more distinct networks toward their semistructured or unstructured
elements are placed in two-dimensional destinations, through a process known problems More complex problems in
tables, called relations, which are the as routing. which the relationships among the
logical equivalent of files. pieces of data are not always clear, the
rule A conditional statement that links data might be in a variety of formats,
release A significant program change conditions to actions or outcomes. and the data is often difficult to
that often requires changes in the manipulate or obtain.
documentation of the software. satisficing model A model that will
find a good—but not necessarily the sequential access A retrieval method
reorder point (ROP) A critical best—problem solution. in which data must be accessed in the
inventory quantity that determines order in which it is stored.
when to order more inventory. scalability The ability to increase the
capability of a computer system to sequential access storage device
replicated database A database that process more transactions in a given (SASD) A device used to sequentially
holds a duplicate set of frequently used period by adding more, or more access secondary storage data.
data. powerful, processors.
server A computer designed for a
report layout A technique that allows schedule feasibility The specific task, such as network or
designers to diagram and format determination of whether the project Internet applications.
printed reports. can be completed in a reasonable
amount of time. service-oriented architecture (SOA)
request for maintenance form A A modular method of developing
form authorizing modification of scheduled report A report produced software and systems that allows users
programs. periodically, or on a schedule, such as to interact with systems, and systems to
daily, weekly, or monthly. interact with each other.
request for proposal (RFP) A
document that specifies in detail schema A description of the entire shared workspace A common work
required resources such as hardware and database. area where authorized project members
software. and colleagues can share documents,
screen layout A technique that allows issues, models, schedules, spreadsheets,
requirements analysis The a designer to quickly and efficiently photos, and all forms of information to
determination of user, stakeholder, and design the features, layout, and format keep each other current on the status of
organizational needs. of a display screen. projects or topics of common interest.
restart procedures Simplified script bunny A cracker with little shareware and freeware Software that
processes to access an application from technical savvy who downloads is very inexpensive or free, but whose
where it stopped. programs called scripts, which source code cannot be modified.
automate the job of breaking into
computers.
|632 Glossary spyware Software that is installed on a synchronous communications A
personal computer to intercept or take form of communications where the
sign-on procedure Identification partial control over the user’s receiver gets the message
numbers, passwords, and other interaction with the computer without instantaneously, when it is sent.
safeguards needed for someone to gain knowledge or permission of the user.
access to computer resources. syntax A set of rules associated with a
stakeholders People who, either programming language.
simplex channel A communications themselves or through the organization
channel that can transmit data in only they represent, ultimately benefit from system A set of elements or
one direction. the systems development project. components that interact to accomplish
goals.
single-user license A software license start-up (also called cutover) The
that permits only one person to use the process of making the final tested system performance measurement
software, typically on only one information system fully operational. Monitoring the system—the number of
computer. errors encountered, the amount of
static Web pages Web pages that memory required, the amount of
site preparation Preparation of the always contain the same information. processing or CPU time needed, and
location of a new system. other problems.
statistical sampling Selecting a
slipstream upgrade An upgrade that random sample of data and applying the system performance
usually requires recompiling all the characteristics of the sample to the products Software that measures all
code, allowing the program to run faster whole group. components of the computer-based
and more efficiently. information system, including
steering committee An advisory hardware, software, database,
smart card A credit card–sized device group consisting of senior management telecommunications, and network
with an embedded microchip to and users from the IS department and systems.
provide electronic memory and other functional areas.
processing capability. system performance standard A
storage area network (SAN) The specific objective of the system.
smartphone A phone that combines technology that provides high-speed
the functionality of a mobile phone, connections between data-storage system testing Testing the entire
personal digital assistant, camera, Web devices and computers over a network. system of programs.
browser, e-mail tool, and other devices
into a single handheld device. storefront broker A company that systems analysis The systems
acts as an intermediary between your development phase that determines
social engineering Using social skills Web site and online merchants who what the information system must do
to get computer users to provide have the products and retail expertise. to solve the problem by studying
information to access an information existing systems and work processes to
system or its data. strategic alliance (strategic identify strengths, weaknesses, and
partnership) An agreement between opportunities for improvement.
software The computer programs that two or more companies that involves
govern the operation of the computer. the joint production and distribution of systems analyst A professional who
goods and services. specializes in analyzing and designing
software as a service (SaaS) A service business systems.
that allows businesses to subscribe to strategic planning Determining long-
Web-delivered business application term objectives by analyzing the systems controls Rules and
software by paying a monthly service strengths and weaknesses of the procedures to maintain data security.
charge or a per-use fee. organization, predicting future trends,
and projecting the development of new systems design The systems
software piracy The act of product lines. development phase that defines how the
unauthorized copying or distribution of information system will do what it must
copyrighted software structured interview An interview do to obtain the problem solution.
where the questions are written in
software suite A collection of single advance. systems development The activity of
application programs packaged in a creating or modifying business systems.
bundle. supercomputers The most powerful
computer systems with the fastest systems implementation The systems
source data automation Capturing processing speeds. development phase involving the
and editing data where it is initially creation or acquisition of various system
created and in a form that can be switch A telecommunications device components detailed in the systems
directly input to a computer, thus that uses the physical device address in design, assembling them, and placing
ensuring accuracy and timeliness. each incoming message on the network the new or modified system into
to determine to which output port it operation.
speech-recognition should forward the message to reach
technology Input devices that another device on the same network.
recognize human speech.
| Glossary 633
systems investigation The systems technology-enabled relationship transaction processing cycle The
development phase during which management Occurs when a firm process of data collection, data editing,
problems and opportunities are obtains detailed information about a data correction, data manipulation,
identified and considered in light of the customer’s behavior, preferences, data storage, and document
goals of the business. needs, and buying patterns and uses production.
that information to set prices, negotiate
systems investigation report A terms, tailor promotions, add product transaction processing system
summary of the results of the systems features, and otherwise customize its (TPS) An organized collection of
investigation and the process of entire relationship with that customer. people, procedures, software, databases,
feasibility analysis and and devices used to record completed
recommendation of a course of action. telecommunications The electronic business transactions.
transmission of signals for
systems maintenance A stage of communications, which enables transaction processing system
systems development that involves organizations to carry out their audit A check of a firm’s TPS systems
checking, changing, and enhancing the processes and tasks through effective to prevent accounting irregularities
system to make it more useful in computer networks. and/or loss of data privacy.
achieving user and organizational goals.
telecommunications medium Any Transmission Control Protocol
systems operation Use of a new or material substance that carries an (TCP) The widely used Transport-
modified system. electronic signal and serves as an layer protocol that most Internet
interface between a sending device and applications use with IP.
systems request form A document a receiving device.
filled out by someone who wants the IS Trojan horse A malicious program
department to initiate systems telecommunications protocol A set that disguises itself as a useful
investigation. of rules that governs the exchange of application or game and purposefully
information over a communications does something the user does not
systems review The final step of medium. expect.
systems development, involving the
analysis of systems to make sure that telecommuting A work arrangement tunneling The process by which
they are operating as intended. whereby employees work away from the VPNs transfer information by
office using personal computers and encapsulating traffic in IP packets over
team organizational structure A networks to communicate via e-mail the Internet.
structure centered on work teams or with other workers and to pick up and
groups. deliver results. ultra wideband (UWB) A wireless
communications technology that
technical documentation Written thin client A low-cost, centrally transmits large amounts of digital data
details used by computer operators to managed computer with essential but over short distances of up to 30 feet
execute the program and by analysts limited capabilities and no extra drives, using a wide spectrum of frequency
and programmers to solve problems or such as a CD or DVD drive, or bands and very low power.
modify the program. expansion slots.
unified communications A
technical feasibility Assessment of time-driven review Review technology solution that provides a
whether the hardware, software, and performed after a specified amount of simple and consistent user experience
other system components can be time. across all types of communications such
acquired or developed to solve the as instant messaging, fixed and mobile
problem. total cost of ownership (TCO) The phone, e-mail, voice mail, and Web
measurement of the total cost of conferencing.
technology acceptance model owning computer equipment,
(TAM) A model that describes the including desktop computers, Uniform Resource Locator (URL)
factors leading to higher levels of networks, and large computers. An assigned address on the Internet for
acceptance and usage of technology. each computer.
traditional approach to data
technology diffusion A measure of management An approach whereby unit testing Testing of individual
how widely technology is spread separate data files are created and stored programs.
throughout the organization. for each application program.
unstructured interview An interview
technology infrastructure All the traditional organizational where the questions are not written in
hardware, software, databases, structure An organizational structure advance.
telecommunications, people, and in which major department heads
procedures that are configured to report to a president or top-level user acceptance document A formal
collect, manipulate, store, and process manager. agreement signed by the user that states
data into information. that a phase of the installation or the
transaction Any business-related complete system is approved.
technology infusion The extent to exchange, such as payments to
which technology is deeply integrated employees, sales to customers, and
into an area or department. payments to suppliers.
|634 Glossary virtual workgroups Teams of people Web site development tools Tools
located around the world working on used to develop a Web site, including
user documentation Written common problems. HTML or visual Web page editor,
descriptions developed for people who software development kits, and Web
use a program, showing users, in easy- virus A computer program file capable page upload support.
to-understand terms, how the program of attaching to disks or other files and
can and should be used. replicating itself repeatedly, typically wide area network (WAN) A
without the user’s knowledge or telecommunications network that ties
user interface The element of the permission. together large geographic regions.
operating system that allows you to
access and command the computer vision systems The hardware and Wi-Fi Protected Access (WPA) A
system. software that permit computers to security protocol that offers
capture, store, and manipulate visual significantly improved protection over
user preparation The process of images. WEP.
readying managers, decision makers,
employees, other users, and voice mail Technology that enables Wired equivalent privacy (WEP) An
stakeholders for new systems. users to send, receive, and store verbal early attempt at securing wireless
messages for and from other people communications based on encryption
users People who will interact with the around the world. using a 64- or 128-bit key that is not
system regularly. difficult for hackers to crack.
Voice over Internet Protocol
utility programs Programs that help (VoIP) A collection of technologies wireless mesh A way to route
to perform maintenance or correct and communications protocols that communications between network
problems with a computer system. enables your voice to be converted into nodes (computers or other devices) by
packets of data that can be sent over a allowing for continuous connections
value chain A series (chain) of data network such as the Internet, a and reconfiguration around blocked
activities that includes inbound WAN or LAN. paths by “hopping” from node to node
logistics, warehouse and storage, until a connection can be established.
production, finished product storage, voice-to-text service A service that
outbound logistics, marketing and captures voice mail messages, converts workgroup Two or more people who
sales, and customer service. them to text, and sends them to an work together to achieve a common
e-mail account. goal.
version A major program change,
typically encompassing many new volume testing Testing the workgroup application
features. application with a large amount of data. software Software that supports
teamwork, whether in one location or
videoconferencing A Web 2.0 The Web as a computing around the world.
telecommunications system that platform that supports software
combines video and phone call applications and the sharing of workgroup sphere of influence The
capabilities with data or document information between users. sphere of influence that serves the needs
conferencing. of a workgroup.
Web auction An Internet site that
virtual organizational structure A matches buyers and sellers. workstation A more powerful
structure that employs individuals, personal computer that is used for
groups, or complete business units in Web browser Web client software technical computing, such as
geographically dispersed areas that can such as Internet Explorer, Firefox, and engineering, but still fits on a desktop.
last for a few weeks or years, often Safari used to view Web pages.
requiring telecommunications or the World Wide Web A collection of tens
Internet. Web log (blog) A Web site that people of millions of server computers that
can create and use to write about their work together as one in an Internet
virtual private network (VPN) A observations, experiences, and feelings service using hyperlink technology to
private network that uses a public on a wide range of topics. provide information to billions of users.
network (usually the Internet) to
connect multiple remote locations. Web page construction Worldwide Interoperability for
software Software that uses Web Microwave Access (WiMAX) The
virtual reality The simulation of a real editors and extensions to produce both common name for a set of IEEE 802.16
or imagined environment that can be static and dynamic Web pages. wireless metropolitan area network
experienced visually in three standards that support different types of
dimensions. Web services Software modules communications access.
supporting specific business processes
virtual reality system A system that that users can interact with over a worm A parasitic computer program
enables one or more users to move and network (such as the Internet) on an as- that can create copies of itself on the
react in a computer-simulated needed basis. infected computer or send copies to
environment. other computers via a network.
virtual tape A storage device that
manages less frequently needed data so
that it appears to be stored entirely on
tape cartridges, although some parts of
it might actually be located on faster
hard disks.
INDEX
Subject
A boldface page number indicates a key term and the location of its definition in the text.
Numbers electronic and mobile commerce, 321–330
of expert systems, artificial intelligence, 464–465
3-D printers, 113 front-end, back-end, 202
3G wireless communications, 234 rich Internet, 279
4G wireless communications, 234 virtual reality, 467–470
5GLs (fifth-generation languages), 166 applications software, 13
Arey OK, Ltd. and Finnish privacy, 607
arithmetic/logic unit (ALU), 88
A ARPANET project, 269
abbreviations, common e-mail, 286 Art.com’s conversion rate, 493
acceptance testing, 558 artificial intelligence (AI)
access
applications of, 464–465
to data in ERP, 371 described, 24–25, 447
methods, computer, 98 in knowledge management and expert systems, 441
to system resources, security, 139 overview and applications of, 447–456, 473
accessing the Internet, 272 artificial intelligence systems, 448
accounting asking directly, 520
financial and managerial, and ERP, 379–380 ASP (application service provider), 153, 172
and information systems, 31 A-Space, 292–293
TPSs (transaction processing systems), 361–362 Association for Computing Machinery (ACM), 611–612
accounting MISs, 417, 432 asynchronous communications, 226
ACM (Association for Computing Machinery), 611–612 Asynchronous JavaScript and XML (AJAX), 164
activity modeling, 517–518 ATMs (automated teller machines), 108, 345
ad hoc DSS, 420 attached storage methods, 102
Adobe Flash, 164 attacks, computer, 29
Advanced Encryption Standard (AES), 245 attribute (data), 184
advertising auctions, Web, 294, 327
audio books, 296
Internet, 274
auditing, internal and external, 406
and marketing research, 413–414 audits, transaction processing system, 368
mobile, 328–329 authentication, 596–597
AES (Advanced Encryption Standard), 245 automated teller machines (ATMs), 108, 345
agile development, 500 automatic call distributors, 250–251
AI. See artificial intelligence
airlines and information systems, 31
AJAX (Asynchronous JavaScript and XML), 164
algorithms, genetic, 455 B
Alperin, Mark, 374 B2B (business-to-business) e-commerce, 16, 311, 311–313,
alpha testing, 559 339, 347
ALU (arithmetic/logic unit), 88
analog signal, 235 B2C (business-to-consumer) e-commerce, 16, 311
Anderson, Katrina, 69 backbone, Internet, 271
Andressen, Marc, 489 back-end applications, 202
animation, computer, 121 backups, incremental, 541
anomalies (data), 191 backward chaining, 461
antivirus programs, 587–589 Baillargeon, Robert, 133
APIs (application program interfaces), 138 Baird, Nikki, 320
Apple Computers’ operating systems, 141–142 Bangalore’s telecommunications system, 247
Apple Remote, 231 banking
applets, Java, 164, 280
application flowcharts, 518–519 and information systems, 31
application program interfaces (APIs), 138 mobile, 17, 328
application service provider (ASP), 153, 172 banner ads, 274
application software bar-code scanners, 109
Baroco, Daniel, 374
described, 135, 136, 171 batch processing systems, 359–360
types and functions of, 150–163 benchmark test, 548
applications Benner, Kathy, 256
See also specific applications, programs Berners-Lee, Tim, 276
database, 203–213 best practices described, 372
BI (business intelligence)
635
|636 Index cell phone
banking services, 17
described, 206–208, 215, 446 and embedded operating systems, 145–146
and ERP systems, 374–375 and GPS, 256
bioinfomatics, 472 payments using, 346
blade servers, 120 services, 246–249
blocking spam, 148, 579 and VoIP, 249
blogs (Web logs)
business use of, 288–289 central processing unit (CPU), 88, 91
described, 14 centralized processing, 238–239
microblogging sites, 279 certificate authority (CA), 343
Blue Gene supercomputer, 122–123 certification described, 72
Bluetooth wireless communications, 230 Chamberlain, D.D., 197
booting up, 137 Chan, Derek, 253
bots, 283, 294 change, managing, 504
BPR (business process reengineering), 55, 74 change model, 54
brainstorming, 425 channel bandwidth, 227
bridges, 242 channels, basic telecommunications, 226–230
Brief History of Time, A (Hawking), 448 character (data hierarchy), 183
broadband communications, 227, 274 chat rooms, 290–291
broadband over power lines (BPL), 229 Chatter, Mukesh, 326
browsers, Web, 276 chief information officer (CIO), 71
bugs, software, 167, 172 chief knowledge officer (CKO), 444
business chief technology officer (CTO), 71
importance of software to, 134 Child Online Protection Act, 599
information system types, 15–26, 34–35 Children’s Internet Protection Act (CIPA), 599
use of blogs, 288–289 Children’s Online Privacy Protection Act (COPPA),
uses of Internet, 284–298
virtual reality applications, 469 603–604
business intelligence (BI), 208, 215, 374–375, 446 Chinese cyber espionage, 595
business process reengineering (BPR), 55, 74 chips, computer, 90–92, 125
business-to-business (B2B) e-commerce, 16, 311–313, 339, choice stage (decision making), 395
347 CIM (computer-integrated manufacturing), 31, 410
business-to-consumer (B2C) e-commerce, 16, 311 CIO (chief information officer), 71
byte (B), 92 CIPA (Children’s Internet Protection Act), 599
CKO (chief knowledge officer), 444
C cladding, fiber-optic cable, 228
Clark, Beach, 365
C2C (consumer-to-consumer) e-commerce, 313–314, classifying Internet content, 599–600
347 click fraud, 332
clickstream data, 333
cable modems, 241 client/server architecture, 239–240
cache memory, 94 Clinger-Cohen Act of 1996, 71
CAD (computer-aided design), 31, 160, 409 clip art, 158
call centers, 250–251 clock speed, 89–90, 90
Callaby, Mark, 598 closed shops, 542
CAM (computer-assisted manufacturing), 31, 410 cloud computing, 96–97, 299, 489, 555
cameras, digital, 106 CMM (Capability Maturity Model), 506
Campbell, Jeff, 372 CMS (content management system), 280
Cantor, Richard, 445 coaxial cable, 228
Capability Maturity Model (CMM), 506 code
Capek, Karel, 450
CardersMarket, 319 HTML, 277
careers program, 163
cold site, 541
in information systems, 66–73 collaborative software, 161
researching on Internet, 287–288 collaborative tagging, 293
Carlsbad Polska’s information systems, 535–536 Collins, Jim, 60
carpal tunnel syndrome (CTS), 610 command-based user interface, 137–138
Cascading Style Sheet (CSS), 278 commands, SQL, 198
CASE (computer-aided software engineering) tools, 508, commerce. See business, e-commerce
519, 525 commercial off-the-shelf (COTS) development, 554
CASE repository, 519 Communications Decency Act, 599
cases, in expert systems, 460 communications systems
catalog management software, 339–340 specialized, 257
CAVE virtual system, 466 unified, 223–224
CBIS (computer-based information system), 11, 94 communities of practice (COP), 444, 473
CD-ROM (compact disc read-only memory), 101 compact disc read-only memory (CD-ROM), 101
Cell Broadband Engine Architecture, 90, 125
| Index 637
competitive advantage corporations. See organizations
developing, 491–492 cost center, 406
forces leading firms to seek, 60–61 cost leadership, and competitive advantage, 61
in organizations, 59–64, 74 cost/benefit analysis, 548–549
of TPSs, 362 costs
competitive intelligence, 208, 215 balancing systems development with performance goals,
compilers, 166–167 495
computational biology, 472
computed fields, 183 of electronic and mobile commerce, 329
computer animation, 121 total cost of ownership (TCO), 66
computer crime counterfeiting, 332
counterintelligence, 208
computer as object of crime, 585–594 coupons, mobile, 329
computers as criminal tools, 583–585 Cox, Jim, 100
overview of, 582–583, 613–614 CPM (corporate performance management), 62, 357
preventing, 594–601 CPU (central processing unit), 88, 91, 125
computer downsizing, 122 crackers, 586, 589
Computer Emergency Response Team (CERT), 594 creative analysis, 491–492
computer literacy, 30–31 credit
computer network application rules, 460
See also networks in e-commerce, 345
described, 236 reports, 608
computer programs smart cards, 345
See also specific programs crime, computer. See computer crime
described, 134 criminal hackers, 586, 589
computer waste crisis management, 430
described, 578–579, 613 critical analysis, 492
preventing, 580–582 critical path, 507
computer-aided design (CAD), 31, 160, 409 critical success factors (CSFs), 494, 520
computer-aided manufacturing (CAM), 410 CRM (customer relationship management) programs, 47,
computer-aided software engineering (CASE) tools, 508, 525 317
computer-assisted manufacturing (CAM), 31 cross-platform development, 556
computer-based information system (CBIS), 11, 86, 94 crowd sourcing, 488
computer-integrated manufacturing (CIM), 31, 410 Csanda, Carol, 443
computerized collaborative work system, 423, 432 CSFs (critical success factors), 494, 520
computer-related mistakes, 579–580 CSS (Cascading Style Sheet), 278
computers CTO (chief technology officer), 71
See also specific components CTS (carpal tunnel syndrome), 610
hardware, 12, 86–97 Cubby, Inc. v. CompuServe case, 600
health and environmental problems, 610–611 culture
safe disposal of, 591 described, 53
system types, 115–120, 122–124 issues for enterprise systems, 381–383
computing currency
cloud, 96–97, 299, 489, 555 challenges for e-commerce, 330
on-demand. See on-demand computing issues for enterprise systems, 382
utility, 58–59 customer relationship management (CRM)
concurrency control (in databases), 197 programs, 47, 317
Conneighton, Cliff, 324 system, 376–379
consulting in IS, 72 cyber espionage, 595
containers (data), 193 cybermall, 321
content cyberstatus, manipulating, 342
in e-commerce model, 318 cyberterrorism, cyberterrorists, 584
management system (CMS), 280
content streaming, 294 D
continuous improvement
described, 54–56 DaaS (Database as a Service), 201, 556
vs. reengineering, 504 Dahlsten, Ulf, 96
control unit, 88 data
COP (communities of practice), 444, 473
COPPA (Children’s Online Privacy Protection Act), described, 5–6
603–604 management generally, 183–185, 214
coprocessors, 95 normalization, 193
copyrights data administrator, 200–201
software, 167–168 data analysis, 516–519, 525
violations, 29, 591–593 data cleanup, 192
corporate performance management (CPM), 62, 357 data collection
described, 363–364, 366
|638 Index ergomonics, 610–611, 614
systems. See systems design
for systems analysis, 514–516, 525 design reports, 551
synchronization, 211 design stage (decision making), 395
data conversion, 558 desktop computers, 119
data correction, 366 detailed scheduling, 375
data definition language (DDL), 195 deterrence controls, 542
data dictionaries, 195–196 developing Web content, 280–281
data editing, 366 development
Data Encryption Standard (DES), 245 cross-platform, 556
data entry, input, 104 product, 412–413
data items, 184 systems. See systems development
data manipulation, 366 Web site tools, 339
data manipulation language (DML), 197 devices
data marts, 205–206 input, 103–109, 124
data mining, 206–208, 215, 446 output, 103–104, 111–115, 124
data model, 188, 214 secondary storage, 99
data modeling DFD. See data-flow diagrams (DFDs)
and database characteristics, 188–193 dialog manager, 421, 423
described, 214, 516–517, 525 dial-up Internet connections, 274
data preparation (in systems development, 558 differentiation, product, 63
data storage, 366 Digg social bookmarking, 294
data stores in DFDs, 518 digital audio players, 114
data warehouses, 181, 204–205 digital cameras, 106
database administrators (DBAs), 182–183, 200–201 digital certificates, 343
database applications Digital Dashboard (Microsoft), 446
described, 157–158 digital divide, 333
types and functions of, 203–213 digital rights management (DRM), 147, 331–332
database approach to data management, 185–186 digital signal, 235
Database as a Service (DaaS), 201, 556 digital subscriber line (DSL), 248
database management systems. See DBMSs digital video disc (DVD), 101
databases direct access, 98
characteristics, and data modeling, 188–193 direct access storage deviceS (DASDS), 98
in DDS, 421–422 direct conversion, 559
described, 13, 182, 183 direct cutover, 559
distributed, 210–211 direct marketing, 609
replicated, 211 direct observation, 515
virtual, 556 disaster planning and recovery, 540–542
data-driven DSS, 421–422 disaster recovery, 540, 566
data-flow diagrams (DFDs), 518, 519 disaster recovery plans (DRPs), 367
data-flow lines (in DFDs), 518 disintermediation, 313
DBAs (database administrators), 182–183, 200–201 disk defragmentation, 588
DBMSs (database management systems) disk mirroring, 100
See also databases display devices, 111–112
described, 23, 182, 214 disruptive change, 53–54
linking in, 190–191 distance learning, 255, 298
types and functions of, 193–191 distributed databases, 210–211
debit cards, 345 distributed processing, 239
decentralized processing, 239 distribution, electronic, 316–317
decision making and problem solving, 394–399, 431 DLS (digital subscriber line), 248
decision rooms, 427, 428 document production, 366–367
decision support systems (DSSs) documentation
described, 20–24, 34 described, 134
group support systems (GSS), 423–428 technical, user, 556
information and domain (data hierarchy), 189
overview of, 418–421, 432–433 domain expert, 462–463
decision-making phase, 395 domains
decisions, programmed vs. nonprogrammed, 396–397 and domain names, 271
deep packet inspection, 275 knowledge, 462
delphi approach to decision-making, 425 downsizing, 59
demand management, 375 downstream management, 46
demand reports, 403 DRAM (Dynamic Random Access Memory), 93
demodulation, 240 DreamWorks’ telepresence, 253
DES (Data Encryption Standard), 245 drill down (in databases), 204
design drill-down reports, 404
CAD systems, 409
environmental, 545–552
| Index 639
drive-by downloads, 587 matching to job openings, 150
DRM (digital rights management), 147 outsourcing, downsizing, 58–59
DRP (disaster recovery plan), 367 researching careers on Internet, 287–288
DSL (digital subscriber line), 248 staff and line position, 50
DSSs. See decision support systems employment
Dubin-Wander, Laura, 313 See also careers
dumpster diving, 583–584 finding job in IS, 72–73
DVD (digital video disc), 101 work environment issues, 609–610
Dyer, Tom, 536 empowerment of organizational employees, 50–51
Dynamic Random Access Memory (DRAM), 93 encryption
dynamic Web pages, 339 and crime prevention, 596–597
methods, 243–245
E and SSL, 344
end-user systems development, 501
eBay, 294–295, 313, 327, 577–578 energy, computer use of, 90
e-books, 114–115, 296 Energy Star designation, 545
e-boutiques, 327 enterprise
e-business data modeling, 188
operating systems (OSs), 144–145
See also e-commerce sphere of influence, 136
described, 19 storage options, 102–103
e-commerce enterprise application software, 162–163
applications, 321–330 enterprise resource planning. See ERP
described, 16–19, 34, 347–348 enterprise systems
introduction to, 312–320 described, 20, 358
Staples’ system, 311–312 international issues for, 381–383
strategies for successful, 334–337 overview of, 358–363
threats to, 331–334, 347–348 entertainment, virtual reality applications, 469
economic feasibility, 512 entity (data), 183–184
economic order quantity (EOQ), 409 entity-relation (ER) diagrams, 188–191, 516–517, 519
EDI (electronic data interchange), 254 entity symbols in DFDs, 518
EDRs (event data recorders), 12 environmental design, 545–552, 566
education EOQ (economic order quantity), 409
careers in information systems (ISs), 66–68 e-products, 33
and computer literacy, 30 ER (entity-relation) diagrams, 188–191
virtual reality applications in, 468 ergomonics, 610–611, 614
effectiveness, system, 8–9 Ericsson’s expert systems, 441
efficiency, system, 8–9 ERM (electronic management) systems, 5
EFT (electronic funds transfer), 255 ERP (enterprise resource planning)
e-Government described, 314 advantages and disadvantages of, 371–373
Eichinger, Whitney, 232 described, 20, 62, 85, 432
electronic bill presentment, 325 leading systems (table), 383
electronic business. See e-business overview of, 370–371, 384–385
electronic cash, 344 for small and medium-size enterprises, 374
electronic commerce. See e-commerce software, 162–163
electronic data interchange (EDI), 254 e-services, 33
electronic document distribution, 250 espionage, cyber, 595
electronic exchange, 321–322 e-tailing (electronic retailing), 321, 347
electronic funds transfer (EFT), 255 ethical issues of information systems, 28–30, 611–612, 614
electronic health record (EHR), 187 European Union (EU), 33
electronic management (ERM) systems, 5 evaluating systems design, 547–552
electronic payment systems, 343–346 event data recorders (EDRs), 12
electronic procurement (e-procurement), 19 event-driven review, 564–565
electronic products (e-products), 33 exception report, 404
electronic retailing (e-tailing), 321, 347 execution time (E-time), 88
electronic services, 33 executive dashboard reporting system, 402
electronic shopping carts, 340 executive information systems, 24
e-mail executive support systems (ESSs)
business use of, 285–286, 392–393 capabilities of, 430
common expressions (table), 286 described, 429
privacy, 601 expert system shell, 463–464
spam. See spam expert systems
spoofing, 332 applications of, 464–465
embedded operating systems, 145–146 components, user interfaces, 459–463
employees described, 25, 450
IS titles, functions, 71–73, 75
|640 Index freezing systems design specifications, 551
Friedman, Thomas, 32, 35
development tools, techniques, 463–464 front-end processors, 242
overview of, 458–459, 473–474 F-Secure Corporation security products, 587
explanation facility, 459, 461, 474 FTP (File Transfer Protocol), 288
explicit knowledge, 444 full-duplex channel, 226
Extensible Markup Language (XML), 277, 280–281 functional requirements, 522
external auditing, 406 fuzzy logic, 459–460
extranets, 15, 300
extreme programming (XP), 500–501 G
eyebud screens, 115
G2B (government-to-business) e-commerce, 314
F G2C (government-to-consumer) e-commerce, 314
G2G (government-to-government) e-commerce, 314
Facebook, 292 gambling, Internet, 585
fairness in information use, 604–606 game theory, 472
FDD (Feature-Driven Development), 501 Gantt charts, 507–508
feasibility analysis, 511–512 Gates, Bill, 106, 426
feasibility study, 513 gateways, 242
Feature-Driven Development (FDD), 501 genetic algorithm, 455
federal legislation geographic information system (GIS), 417
Georgia Aquarium, 365
See also specific act or law geostationary satellite, 233
regarding Internet content, 599–600 GHz (gigahertz), 90
regarding privacy, 600–601, 604–606 gigahertz (GHz), 90
feedback Global Positioning System (GPS), 256, 357, 550
in information systems, 10–11 Globalization 3.0, 32
mechanisms, 8 Good to Great (Collins), 60
fiber-optic cable, 228–229 Goodall, Jane, 252
fields (data management), 183 Google’s online applications, 161
fifth-generation languages (5GLs), 166 Gosnell, Tom, 71
files (data management), 183 government-to-business (G2B) e-commerce, 314
file management, and OSs, 140 government-to-consumer (G2C) e-commerce, 314
file server systems, 239–240 government-to-government (G2G) e-commerce, 314
File Transfer Protocol (FTP), 288 GPS (Global Positioning System), 256, 357, 550
file-compression utilities, 148 Gramm-Leach-Bliley Act, 368, 605
filtering graphical user interfaces (GUIs), 138
e-mail for spam, 579 graphics programs, 157–158
Internet content, 599–600 green data centers, 21
final evaluation, systems development, 547 green death, 545
finance green design, 545, 566
See also banking Greenfield Online Web survey solution, 159
and e-commerce, 324–326 grid charts, 518–519
and information systems (ISs), 31 grid computing, 85, 96, 147
financial MISs, 406, 432 Grillet, Dominique, 357
Financial Services Modernization Act, 368 group consensus
fingerprint authentication, 596
Finland’s information system and privacy, 607 approach described, 425
firewalls described, 548
and security, 29 group support systems (GSSs)
software, 148 described, 24, 423, 432–433, 500
first to market, 63–64 types and approaches, software, 423–428
five-forces model, 60 groupthink, 425
flat files, 193–194 groupware, 24, 161, 426, 446
flat organizational structure, 50 GRUMA’s information systems, 485–486
flexible manufacturing system (FMS), 410 GSS. See group support systems
Flickr, 293 guided transmission media, 227
FMX (flexible manufacturing system), 410 GUIs (graphical user interfaces), 138
Folding@home, 96–97
forecasting H
described, 11
sales, 374, 384 hackers, 585, 586
Fowler, Kevin, 25 Hafner, Katie, 270
fraud Halamka, John D., 187
in electronic and mobile commerce, 332, 577–578 half-duplex channel, 226
on the Internet, 301
free credit reports, 608
freeware, 169
| Index 641
handheld computers, 116 industry, information systems in, 31–32
haptic interface, 466–467 inference engine, 459, 461, 474
hard copy, 112 informatics, 472
hard disks, 99–100 information
hardware
concepts, value of, 6–8
acquiring for systems implementation, 552–553 described, 5–6
components, 87–89 database, 13
described, 12, 86 and decision support systems, 20–24, 394
operating system functions, 137 fairness in use, 604–606
support for e- and m-commerce, 338 in knowledge management systems (KMSs), 442
telecommunications, 240–242 MIS inputs, reports, 400, 402–405
utilities, 147 translation services, 298
Harrod, Dr. William, 123 Web research, and search engines, 282–285
Hawking, Stephen, 448 information and decision support systems
head-mounted display (HMD), 25, 26, 465 decision making and problem solving, 394–399
health concerns, work environment, 609–610 decision support systems, 418–423
Health Insurance Portability and Accountability Act of 1996 executive support systems, 429–430
(HIPAA), 87, 187, 368, 598 functional aspects of MIS, 409–418
healthcare group support systems, 423–428
drug interaction system, 394 management information systems (MIS), 399–409
electronic health record (EHR), 187 information centers, 70
electronic management (ERM) systems, 5 information services units, 70
informatics, 472 information systems (ISs)
organizations and information systems (ISs), 31 See also systems, and specific system
help facility, 539 business types, 15–26
Herring, John, 379 careers in, 66–73
heuristics described, 398 components and processes, 10–15, 34–35
Hewick, David, 500 control and management issues, 367–369
hierarchical structure, 50 described, 2–4, 34, 68–69
hierarchy of data, 183–184 ethical issues, 611–612, 614
highly structured problems, 420 executive, 24
“high-speed” Internet service, 273 FedEx’s, 43–44
HIPAA. See Health Insurance Portability and Accountability in global economy, 3–4, 32–33
Act of 1996 literacy, 30–31
Holocaust Database, 201 organizations and, 44–59
Holographic Versatile Disc (HVD), 101–102 privacy and, 600–609
hosted software model for SMEs, 381 R&D, 411
hosts, Internet, 270 in society, business, and industry, 28–32
hot site, 541 typical IT titles, functions, 71–73
HP-UX operating system, 145 unified communications systems, 223–224
HTML (Hypertext Markup Language), 277, 392 information systems planning, 491
HTML tags, 277, 392 infrared transmission, 230–231
Hugos, Michael, 492 infrastructure
human resource management, 31 globalization challenges, 33
human resource MISs, 414–417, 432 information systems hardware, 85
hyperlinks described, 276 issues for enterprise systems, 382
Hypertext Markup Language. See HTML support for e- and m-commerce, 337–346, 348
Hypertext Preprocessor (PHP), 280 technology, 11
upgrading, and ERP, 372
I inkjet printers, 112–113
input devices
ICANN (Internet Corporation for Assigned Names and types of, 103–109, 124
Numbers), 271 for virtual reality, 25
inputs
ICRA (Internet Content Rating Association), 599 information system, 10
ID badges, 543 to MIS, 400
identification, Web server services, 338–339 and productivity, 65
identify theft, 28, 318–319, 582, 584–585, 613 as system concept, 8
Identity Theft and Assumption Deterrence Act of 1998, 585 insiders, 586
IDEs (integrated development environments), 556 installation, 558
IDSs (intrusion detection systems), 597–598 instant messaging (IM)
IEEE 802 network standards, 225 described, 287
IF-THEN statements, 460 privacy issues, 602–603
image logs, 541 institutional DSS, 420
implementation stage (decision making), 395 instruction time (I-time), 88
incremental backups, 541
|642 Index J
integrated application packages, 160 JAD (joint application development), 500–501, 525
integrated development environments (IDEs), 556 Java applets, 164, 280
integration testing, 558 Java described, 280
intellectual property, threats to, 331–332 Jepsen, Mary Lou, 118
intelligence JetBlue’s Valentine’s Day crisis, 367
jobs
artificial. See artificial intelligence (AI)
business. See business intelligence (BI) See also careers
intelligence stage (decision making), 395 in IS, 72–73
intelligent agents, 294, 456 researching on Internet, 287–288
intelligent behavior, 448 joining (databases), 190
interactive processing, 539 joint application development (JAD), 500–501,
interface 525
devices, virtual reality, 465–466 just-in-time (JIT) inventory, 45, 409
graphical user interfaces (GUIs), 138
haptic, 466–467 K
security dashboards, 598
internal auditing, 406 Kande, Takeo, 450, 453
internal rate of return (IRR), 512 Kapinos, Eric, 375
Internet Kasparov, Garry, 448
3-D sites, 297 Kay, Alan, 138
banking, 324–326 Kemp, Sue, 254
careers, 72 kernel, 137
described, 14–15, 268–269, 392 Kerrison, Tony, 249
filtering content, 599–600 keyboards, 103
gambling, 585 key-indicator report, 403
libel concerns, 600–601 keys (data hierarchy), 184–185
linking company databases to, 203 kiosks, 108
management and other issues, 300–301 KMSs (knowledge management systems), 6, 24
offices, 296 knowledge described, 6, 442
phone service, 291 knowledge acquisition facility, 459, 461
preventing crime on, 600 knowledge base, 25, 459–460
privacy issues, 603–604 knowledge engineer, 463
protecting your privacy, 608–609 knowledge management systems (KMSs)
use and functioning of, 268–275
utilities, 148 obtaining, storing, sharing, using knowledge, 445–446
videoconferencing, 291 overview of, 6, 24, 442–444, 473
and Web applications, 282–300 personnel involved in, 444–445
Internet Content Rating Association (ICRA), 599 technology to support, 446–447
Internet Corporation for Assigned Names and Numbers knowledge maps, 446
(ICANN), 271 knowledge repository, 445
Internet Protocol (IP), 270 knowledge user, 463
Internet Relay Chat (IRC), 290–291, 586 knowledge workers (KWs)
Internet Service Provider (ISP), 272, 273, 275 described, 6, 444
Internet2, 270 IS careers, 66–70
interpreters, 166 Kostrzewa, Jay, 444
Interstate Wire Act of 1961, 585 Kurzweil, Ray, 448
intranets, 15, 267, 300
intrusion detection systems (IDSs), 597–598 L
inventory
data dictionary for, 196 LAN administrators, 71
just-in-time (JIT) inventory, 45, 409 LANs (local area networks)
and programmed decisions for, 396–397
investment firms Internet connections via, 272
See also banking, finance types of, 236–237
and e-commerce, 324–326 language
and information systems (ISs), 31 challenges for e-commerce, 330
iPhone, 235 issues for enterprise systems, 381–383
iPods, 114, 294, 332 programming. See programming languages
IRC (Internet Relay Chat), 290–291, 586 Lanier, Jaron, 465
IRR (internal rate of return), 512 Large Hadron Collider (LHC), 97
ISO 9000, 506 laser surgery, 452
ISPs (Internet Service Providers), 272, 273, 275 layout, screen and report, 521
Israel, Michael, 489
| Index 643
LCDs (liquid crystal displays), 111–112 product specification system, 393
learning, organizational, 54 and TPSs, 361
learning systems, 454 manufacturing, repair, and operations (MRO), and
legal e-commerce, 321–323
market segmentation, 323
information systems, 31 marketing, direct, 609
issues for enterprise systems, 382 marketing MISs, 412–414, 432
jurisdiction for e- and m-commerce, 333 Marshall, Jeffrey, 252
legal feasibility, 512 mash-up, 280, 422
lending, and e-commerce, 326 massively parallel processing systems, 95
Leopard (Apple OS), 142 Mateas, Michael, 448
Lewin, Kurt, 54 material requirements planning (MRP), 375–376, 409
libel, Internet concerns, 600–601 McAfee security products, 587
licenses. software, 167–168 McCarthy, John, 447
line positions, 50 McCarthy, Meg, 58
linking McGrew, Andy, 412
databases to Internet, 203 m-commerce
in databases, 190–191 applications, 321–330
Linux operating system, 142–143 described, 16–17, 312, 347–348
liquid crystal displays (LCDs), 111–112 introduction to, 319
Litan, Avivah, 582 strategies for successful, 334–337
literacy, computer and information systems, 30–31 technology needed for, 343
local area decision networks, 427 threats to, 331–334, 347–348
local area networks. See LANs (local area networks) measuring system performance, 564–565
local area network (LAN) administrators, 71 media-sharing, 293
logic bombs, 587 medical knowledge management systems, 457
logical design in systems design, 537 medical virtual reality applications, 467–468
logs, image, 541 medium, telecommunications, 225
Loken, Ryan, 73 Mees, Charles, 367
lookup tables, 539 megahertz (MHz), 90
Lotus Notes, 161, 426–427, 446, 447 Mehler, Mark, 73
low earth orbit (LEO) satellite system, 233 memory
low-cost laptops, 118 management in OSs, 139
lower-CASE tools, 509 primary storage (main memory), 88
Luoma, Eric, 320 secondary storage devices, 99–102
types of, 92–94
M menu-driven system, 539
meta tags on Web pages, 336
Mac OS X Server, 144 methods
Macintosh operating systems, 141–142 in object-oriented databases, 212
machine cycle, 89 in object-oriented programs, 165–166
magnetic disk storage, 99–100 metropolitan area network (MAN), 237–238
magnetic ink character recognition (MICR), 107 MHz (megahertz), 90
magnetic stripe cards, 108 Miami-Dade Police Department’s MAN, 237–238
magnetic tape, 99 MICR devices, 107
mainframe computers microblogging sites, 279
microcode, 90
described, 122 Microsoft. See specific products
enterprise operating systems, 144–145 Microsoft PC operating systems, 140–141
linking personal computers to, 249 Microsoft Silverlight, 164
utilities, 148 Microsoft Windows Rights Management Services, 149
maintenance, systems, 560–564 Microsoft Works, 160
maintenance forms, 562 microwave transmission, 232–233
make-or-buy decision, software, 554 middleware, 149–150
malware, 586 Miggo, Scott, 544
MAN (metropolitan area network), 237–238 military expert systems, 458
managed security service providers (MSSPs), 598–599 Miller, Bode, 424
management, upstream and downstream, 46 Miller, George, 121
management information system. See MIS mining, data, 206–208, 215, 446
management information systems/decision support systems Minneci, JoAnna, 156
(MIS/DSS), 359 MIPS (millions of instructions per second), 89
managerial accounting, 380 MIS (management information system)
Mancino, Renee, 142 described, 22
manufacturing vs. DSS, 421
computer-aided manufacturing (CAM), 410 functional aspects of, 405–418
and information systems (ISs), 31
MISs, 407–411, 432
|644 Index network-management software, 243
networks
overview of, 399–405, 431–432
MIS/DSS (management information systems/decision See also specific type
described, 14
support systems), 359 and distributed processing, 236–245
mission-critical systems, 494 home and small business, 250
MMS (model management system), 23 intranets and extranets, 300
mobile banking, 17, 328 linking personal computers to, 249
mobile commerce. See m-commerce neural, 455
model base (of DSS), 423 newsgroups, 290
model management software, 423–424 NFC (Near-Field Communications), 230
model management system (MMS), 23 Niagra Falls Bridge Commission, 228
model-driven DSSS, 423 niche strategy, 63
models Nike+iPod Sports Kit, 257
nominal group technique, 425
See also specific model nonoperational prototypes, 498
change, 54 nonprogrammed decision, 396–397
modems, 240–241 North American Free Trade Agreement (NAFTA), 382
modulation, 240 NOS (network operating system), 242–243
monitoring stage (decision making), 396 NOT operator, and search engines, 282
Moore, Gordon, 91
Moore’s Law, 91, 125 O
Morphbank, 201–202
mouse, 103 Object Data Standard, 212
movies object query language (OQL), 212
piracy, 592 object-oriented database management system
and virtual reality, 469
moving (in change model), 54 (OODBMS), 212
MP3 format, 114, 148 object-oriented databases, 212, 215
MRP (material requirements planning), 409 object-oriented investigation, systems development,
MS-DOS, 140
MSSPs (managed security service providers), 598–599 512–513
Mueller, Robert, 275 object-oriented programming languages, 164–165
Muhsen, Mohammed, 49 object-oriented systems analysis, 522
multicore microprocessors, 95 object-oriented systems design, 537–538
multileaf collimator (MLC), 151 object-oriented systems development (OOSD), 508–509
multiplexers, 241 object-relational database management system
multiprocessing, 95
municipal Wi-Fi networks, 232 (ORDBMS), 212
music objects in programming languages, 164–165
on the Internet, 294–295 Office PowerPoint, 157
piracy, 592 Office software suite, 159–160
off-the-shelf software, 152–153, 172
N OLAP (online analytic processing), 211, 215
OLEDs (organic light-emitting diodes), 112
NAFTA (North American Free Trade Agreement), 382 OLTP (online transaction processing) systems, 203–206,
NAS (network-attached storage), 102–103
Nash, John, 472 214, 359–360
National Do Not Call Registry, 251 on-demand computing, 554
Nationwide’s data center, 544
natural language processing, 454 business, 58–59
natural languages, 166 outsourcing and, 502–503
Near-Field Communications (NFC), 230 on-demand software, 153
Neeleman, David, 367 OneNote (Microsoft), 193–194
Negroponte, Nicholas, 118 online analytic processing (OLAP), 211, 215
Nelson, Josh, 252 online banking, 324–326
.NET platform, 280, 556 online data entry, input, 104
net present value, 512 online job hunting, 72–73
NetWare, 144 online real estate services, 327
network applications and telecommunications services, Online Reputation Management, 342
online shopping, 319
245–257 online training, 70
network nodes, 236 online transaction processing (OLTP) systems, 203–206,
network operating system (NOS), 242–243 214, 359–360
network utilities, 148 OODBMS (object-oriented database management
network-attached storage (NAS), 102 system), 212
networking OOSD (object-oriented systems development), 508–509
open shops, 542
capabilities of OSs, 139 open-source
social, 30, 291–293 DBMS (database management system), 201
| Index 645
ERP systems, 374 inputs, processing, outputs, feedback, 10–11
operating system, 142 and transaction processing systems (TPSs), 19
software, 168–169 PBX (private branch exchange), 242
operating systems (OSs) PC-DOS, 140
current, 140–143 PDA (personal digital assistant) OSs, 146
enterprise, and special, 144–146 PDF files, 445
overview of, 136–137, 171 pen input devices, 108
types and functions of, 137–140 people and information systems, 15
Operation Copycat, 592 perceptive system, 449
operational feasibility, 512 performance
operational prototypes, 498 indicators, and competitive advantage, 62
optical data readers, 107 system standard described, 9
optical discs, 101 utilities for monitoring Web, 148
optimization performance-based information systems, 64–66
model described, 396–397 personal application software, types of, 155–160
search engine (SEO), 283 personal area networks (PANs), 236
spreadsheet software feature, 156–157 personal computers
OQL (object query language), 212 See also computers
OR operator, and search engines, 282 input devices, 103–109, 124
ORDBMS (object-relational database management linking to mainframes, networks, 249
system), 212 safe disposal of, 591
order processing TPSs, 361 personal information managers (PIMs), 158–159
organic light-emitting diodes (OLEDs), 112 personal productivity software, 136, 155–160
organizational change, 53–54 personal sphere of influence, 136
organizational culture, 53, 74 personalization of Web pages, 337
organizational learning, 54, 446 PERT (Program Evaluation and Review Technique ), 507
organizational structure types, 48–53, 74 phase-in approach, 559
organizations phishing, 332, 593
best for IS work, 67 phones
described, 4, 44, 74 cell. See cell phone
general model of (fig.), 45 iPhone, 235
and information systems (ISs), 44–59 PHP (Hypertext Preprocessor), 280
performance-based systems, 64–66 physical design
privacy policies, 608 of databases, 188
OSs. See operating systems (OSs) in systems design, 537
outplacement services, 417 picocell, 246
output devices, types of, 103–104, 111–115, 124 piecemeal approach (in systems implementation), 559
outputs pilot start-up, 559–560
database, 199–200 PIMs (personal information managers), types of, 158–159
described, 10 pipelining, 89
to MIS, 402–404 piracy, software, 591–592, 613
and productivity, 65 pixels, 111
outsourcing place shifting, 14
described, 58–59 planned data redundancy, 188
and on-demand computing, 502–503 planning
disaster, 540–542
P enterprise resource planning. See ERP
human resource, 415
P3P (Platform for Privacy), 603 IS, 492
PA74 (Privacy Act of 1974), 30, 604–605 material requirements, 409
packet shaping techniques, 275 strategic, 430
Palm OS, 146 plasma display, 111
PANs (personal area networks), 236 Platform for Privacy Preferences (P3P), 603
parallel computing, 95, 96 plug-ins, Web, 276
parallel start-up, 560 plunge (in systems implementation), 559
password sniffers, 590 podcasting, 14, 289–290
patches, 562 point evaluation system, 548–549
patent, copyright violations, 591–593 point-of-sale (POS)
Patterson, David, 95 devices, 108
payments transaction processing system, 364
policies
See also banking, online banking computer-use, 580–582
using cell phones, 346 corporate privacy, 608
payroll systems policy-based storage management, 103
batch processing, 359 pop-up
enterprise applications, 162–163
|646 Index expert system, 463
types and evolution of, 163–167, 172
ads, 274 Web, 280
blocker utilities, 148 programs. See computer programs
portable computers, 116–117 project deadline, 507
portals, Web, 267, 276–277 Project Gutenberg Online Book Catalog, 114–115
Porter, Don, 376 project management tools, and systems development,
Porter, Michael, 45, 60, 64 507–508
POS (point-of-sale) devices, 108 project milestone, 507
poverty, fighting global, 49 project organizational structure, 51
power conservation, 28–29 project schedule, 507
power management companies and ISs, 31 projecting (data), 190
predictive analysis, 206–207 proprietary software, 152, 171
preliminary evaluation, 547 prosthetic limbs, 456
presentation graphics programs, 157–158 protocols. See specific protocol
preventing prototyping in systems development, 498–500, 524
computer crime, 594–601, 613–614 public domain software, 169
computer waste, mistakes, 580–582, 613 public network services, 254
computer-related scams, 593–594 publishing companies and information systems, 31
health and environmental problems, 610–611 purchasing
price comparison, mobile, 328 and e-commerce, 18, 315–316
primary keys (data hierarchy), 184–185 and ERP systems, 20, 376
primary storage (main memory), 88 products on the Internet, 609
printers, types of, 112–113 systems, 362
privacy Push e-mail, 285
and electronic health records, 187
Finland’s information system and, 607 Q
and information systems, 28–30, 600–609
and the Internet, 301 QBE (Query-by-Example), 197–198
laws, and enterprise systems, 382 quality
for online consumers, 333
Privacy Act of 1974 (PA74), 30, 604–605 in organizations, 57–58
private branch exchange (PBX), 242 and standards in systems development, 506–507
problem solving quality control, 410
in DSSs, 418–421 Query-by-Example (QBE), 197–198
and decision making, 395 questionnaires, 516
procedures Quill Corp. vs. North Dakota, 333
described, 15
preventing computer waste, mistakes, 580–582 R
restart, 539
sign-on, 539 RAD (rapid application development), 497, 500,
process design, 55 524–525
process symbols in DFDs, 518
processes described, 6 radio
processing frequency identification. See RFID
described, 8, 10 on the Internet, 294–295
distributed, 210–211
interactive, 539 RAID (redundant array of independent/inexpensive
processors, 88–96, 242 disks), 100
procurement, electronic, 19
product configuration software, 340 RAM (random access memory), 92–93
production, and ERP, 376 Raman, Sundar, 143
productivity described, 65 random access memory (RAM), 92–93
products rapid application development (RAD), 497, 500, 524–525
ordering systems, 396–397 Rational Unified Process (RUP), 501
pricing and marketing, 414 Ray, Amitabh, 503
and quality, 57–58 read-only memory (ROM), 93
specification system, 393 real estate
professional services and information systems, 31–32
profit center, 406 online services, 327
program code, 163 virtual reality applications, 470
Program Evaluation and Review Technique (PERT), 507 Really Simple Syndication (RSS), 290
program trading, 11 records (data management), 183
programmed decision, 396–397 recruiting, human resources, 415–416
programmers, 488 Red Hat Linux, 144
programming languages Reddi, M.N., 247
See also specific language reengineering
described, 54
and continuous improvement, 54–56, 504
| Index 647
refreezing (in change model), 54 administration, 417
register, 88 in IS, 67
relational database model, 189 sales
releases (software), 562 analysis, and marketing research, 414
reorder point (ROP), 409 and marketing, and information systems (ISs), 31
repetitive stress injury (RSI), 611 ordering, and ERP, 379
replicated databases, 211 sales and operations plan (S&OP), 375
report layout, 521 sales forecasting, 374, 384
reports SANs (storage area networks), 102–103, 556
Sarbanes-Oxley Act, 368, 490, 582, 594, 598
See also specific type satisficing model, 398, 431
computer scam, 594 scalability
design, 551 described, 120
and document production, 366–367 of operating systems, 139
marketing manager, 415 scams, computer-related, 593–594
MIS-generated, 402–405, 431 Scanion, David, 411
systems analysis, 522–523 Scanlin, Jim, 98, 181
systems development, 520–522 scanning devices, 106–107
systems investigation, 513 scenarios, 537–538
request for maintenance forms, 562 schedule feasibility, 512
request for proposal (RFP), 546, 566 scheduled reports, 403
requirements analysis, 520, 522, 525–526 scheduling, human resource, 417
rescue disks, 137 Schein, Edgar, 54
research schema (database), 194–195
marketing, 412 SCM (supply chain management), 46–47, 317
search engines and Web, 282–285 screen layout, 521
restart procedures, 539 screen savers, 149
retail companies and information systems (ISs), 31 script bunnies, 586
return on investment (ROI) scripts, 586
described, 64, 65, 74, 491 SDLC (systems development life cycle), 496–503
in electronic and mobile commerce, 333 search engine optimization (SEO), 283, 342
in systems design, 547 search engines, 282
revenue center, 406 secondary storage (permanent storage), 98
reverse 911 service, 249 secure shell (SSH), 288
RFID (Radio Frequency Identification) Secure Sockets Layer (SSL), 344
applications of, 471, 474 securing
and data warehouses, 204 data transmission, 243–244
described, 109 wireless networks, 244
product tracking with, 63 security
tags, 109, 471, 489–490, 603 See also computer crime
RFPs (request for proposals), 546, 566 disposal of personal computers, 591
rich Internet applications, 279 of electronic health records, 187
Ritter, Bill, 26 federal requirements for systems, 537
robotics, 24–25, 450–452 and information systems, 28–30
ROI. See return on investment Internet issues, 301
roll up (data), 204 IS careers, 72
ROM (read-only memory), 93 SaaS tools, 154
rootkits, 587, 595 sensitive personal information breaches, 318
ROP (reorder point), 409 sign-on procedure, 539
Rothbaum, Barbara, 467 in systems design, 539–543
routers, 242 threats to e- and m-commerce, 331
RSI (repetitive stress injury), 611 utilities, 148
RSS (Really Simple Syndication), 290 Web server, 338–339
Ruffles, Walt, 51 security dashboards, 598
rules (conditional statements, 460 Segway scooters, 471
RUP (Rational Unified Process), 501 selecting (data), 189–190
Ryder’s GPS system, 550 semantic Web, 203
semistructured problems, 420
S Sense and Respond (S&R) problem solving, 397
SEO (search engine optimization), 283, 342
SaaS (software as a service), 153–154, 201, 299, 555 sequence diagrams, 538
Sabine, Dr. Ringhofer, 243 sequential access, 98
safety sequential access storage devices (SASDs), 98
Serial Line Internet Protocol (SLIP), 272
See also computer crime, privacy, security server farms, 120
safe work environment, 609–610
salaries
|648 Index Sokolov, Yuri, 445
source data automation, 104, 363
server utilities, 148 sourcing, crowd, 488
servers, 120, 239–240 spam
service-oriented architecture (SOA), 149
services blocking, 28, 148
described, 97, 286, 579
Internet issues, 301 spatial data technology, 213
search engine, 284 speech-recognition technology, 105
shared electronic calendars, 427 speed
shared workspace, 255 clock, 89–90
SharePoint, 297 of goods, information in e-commerce, 329
shareware, 169 Internet issues, 301
shell, 541 of telecommunications media, 225
Shelman, Tom, 71 spiders, 283
shopping carts, electronic, 340 spoofing, 332
shopping on the Web, 294 SPOT (Smart Personal Objects Technology), 471
shoulder surfing, 584 spreadsheet analysis software, 156–157
sign-on procedure, 538 spreadsheets, 419
Simon, Herbert, 395 spyware, 589–590
Simonyi, Charles, 106 SQL (Structured Query Language), 197, 199
simplex channel, 226 SRAM (Static Random Access Memory), 93
single-user license, 168 SSL (Secure Sockets Layer), 344
Singularity Is Near, The (Kurzweil), 448 staff positions, 50
site preparation, 557–558 stakeholders in systems development, 487, 524
SLIP (Serial Line Internet Protocol), 272 standards
slipstream upgrade, 562 popular Web, 277–278
small and medium-size enterprises (SMEs) system performance, 9
ERP for, 374 start-up (in systems implementation), 559
ISM top CRM for (table), 379 Static Random Access Memory (SRAM), 93
TPSs for, 363 static Web pages, 339
smart cards, 345 statistical sampling, 516
smartphones, 116, 146 steering committee, 513
SME. See small and medium-size enterprises Stewart, Nancy, 181
sniffing passwords, 590 storage
SOA (service-oriented architecture), 149 capacity, computer, 92
social bookmarking, 293–294 data, 366
social engineering, 583 databases, 196
social networking, 30, 291–293 OS functions and, 139
Société Générale scandal, 581 secondary, 97–103
software storage area networks (SANs), 102–103, 556
See also specific type storefront brokers, 336
antivirus, 587–589 strategic alliance, partnership, 63
application, 135 strategic planning, 430
bugs, 167, 172 strategies, organizational, 54
CRM (customer relationship management), 376–379 Strong, Gary, 105
described, 13, 171 structured interview, 515
developing in-house, 555–556 Structured Query Language (SQL), 197, 199
e-commerce, 339–341 style sheets, CSS, 278
ERP, 162–163 supercomputers, 122
GSS, 423–428 suppliers, bargaining power of, 61
maintaining, 562 supply chain management (SCM), 46–47, 317,
middleware, 149–150 375–376
model management, 423 support
network, 242–243 global software, 170
network-management, 243 IT department, 70
open-source, 168–169 problem solving, 420
optimization, 397 sustaining change, 53
overview of, 134–136 switches, 242
piracy, 591–592, 613 symmetric DSL (SDSL), 248–249
span-filtering, 286 Sync service for in-car communication, 236
systems. See systems software synchronous communications, 226
trends and issues in, 167–170 syntax of programming languages, 164
upgrades, 170 system controls, 542–543
virtualization, 149, 555 system maintenance and review, 28
Web server, 338 system operators, 68
software as a service (SaaS), 153–154, 201, 299, 555
software suites, 159–160
| Index 649
system performance measurement, 565 technology infrastructure, 11
system performance products, 565 technology infusion, 57
system performance standard, 9 technology-enabled relationship management, 324
system software, 13 telecommunications
system testing, 558
systems described, 13–15
in the global economy, 224–225
See also specific system hardware, 240–242
concepts, components, 8 overview of, 225–236, 258–259
described, 8–9, 34 services and network applications, 245–257
development. See systems development and virtual workers, workgroups, 251–252
mission-critical, 494 telecommunications media, 225
performance-based, 64–66 telecommunications protocol, 225
systems analysis in systems development, 514–523, 525 telecommuting, 14, 251
systems analysts, 488–489, 497, 524 telemarketing, 609
systems design telepresence systems, 467
described, 28, 497 television on the Internet, 294–295
environmental considerations, 545–552 Telnet, 288
interface, controls, system security, 538–543 terminals, computer, 106
logical, physical, object-oriented, 537–538 Terrorist Finance Tracking Program, 594
overview of, 536–537, 566–568 testing
systems development benchmark, 548
described, 26–28, 35 and quality control, 410
factors affecting success, 503–510 in systems implementation, 558–559
failure factors, 505 text messaging, 285–286
in IS departments, 68–70 Thenoz, Philippe, 47
life cycles (SDLCs), 496–503 thin clients, 119
overview of, 486–496, 524–526 thin-film transistor (TFT) LCDs, 111–112
systems analysis, 514–523 threats to electronic and mobile commerce, 331–334,
systems design. See systems design 347–348
systems investigation, 510–513 Three Gorges Dam (China), 209
systems development life cycle (SDLC), 496–503, time-driven review, 565
524–525 Topez Web-performance monitoring utility, 148
systems implementation, 28, 567, 498, 552–559 Torvalds, Linus, 142
systems investigation, 497, 510–513 total cost of ownership (TCO), 66, 547
systems investigation and analysis, 27 total quality management, 58, 74
systems investigation report, 513 touch-screen voting, 109
systems maintenance, 561 touch-sensitive screens, 108
systems maintenance and review, 498 TPSs (transaction processing systems), 19–20, 34
systems operation, maintenance, 560–564, 567 activities of, 363–367
systems request form, 511 control and management issues, 367–369
systems review, 564–565, 568 overview of, 358–363, 384–385
systems software tracking
described, 134 business processes, 359
types of, 136–150 Web site, 339
trade agreements, and globalization, 33
T traditional approach to data management, 185–186
traditional organizational structure, 50
tablet PCs, 117–118 training
tacit knowledge, 444 human resource, 416
tags, RFID, 109, 471, 489–490, 603 online, user, 70
tax software, 283 virtual reality applications, 468
taxation in electronic and mobile commerce, 333–334 transaction processing cycle, 363
TCO (total cost of ownership), 66, 547 transaction processing system audit, 368
TCP (Transmission Control Protocol), 271 transaction processing systems (TPSs), 19–20, 34
team organizational structure, 51 activities of, 363–367
teams control and management issues, 367–369
overview of, 358–363, 384–385
systems development, 487–489 transactions described, 19
virtual, 51–52 transborder data-flow laws, 33
technical documentation, 556 translation services on the Internet, 298
technical feasibility, 511–512 Transmission Control Protocol (TCP), 271
technological infrastructure T-REX data mining tool, 206
described, 11 Trojan horses, 586–587
required for e- and m-commerce, 337–346, 348 tunneling, 300
technology acceptance model (TAM), 57 TurboTax, 160
technology diffusion, 57
|650 Index virtual machines, 149, 552, 553
virtual organizational structure, and collaborative work,
Turek, David, 123
Turing, Alan, 448 51–53
twisted-pair wire, 227–228 virtual private networks (VPNs), 245
Twitter, 293, 427 virtual reality
U described, 25–26, 474
forms and applications of, 467–470
UIGEA (Unlawful Internet Gambling Enforcement Act of interface devices, 465–466
2006), 585 virtual reality system, 465
virtual tape, 101
ultra wideband (UWB), 230 virtual workgroups, 428
UML (Unified Modeling Language), 133, 513 virtualization, 552
unfreezing (in change model), 54 virtualization software, 149, 555
unified communications, 256 viruses
Unified Modeling Language (UML), 133, 513 combating, 586–589
unified threat management (UTM), 540 described, 586
Uniform Resource Locators (URLs), 271 visa programs for foreign IT workers, 68
unit testing, 558, 559 vision systems, 452–453
UNIX operating system, 144 Visual Basic (Microsoft), 164
Unlawful Internet Gambling Enforcement Act of 2006 visual programming languages, 164
vlogs (video logs), 288–289, 290
(UIGEA), 585 VMWare, 149
unmanned combat air vehicles (UCAVs), 452 voice mail, 249
unstructured interviews, 515 Voice over Internet Protocol (VoIP) services, 248–249, 291
unstructured problems, 420 voice recognition, 454
upgrades voice-activated systems, 471
voice-to-text services, 250
slipstream, 562 VoIP (Voice over Internet Protocol) services, 248–249, 291
software, 170 volume testing, 558
upper-CASE tools, 509 von Ahn, Luis, 69–70
upstream management, 46 voting systems, 109
URLs (Uniform Resource Locators), 271 VPNs (virtual private networks), 245
USA Patriot Act, 594, 598, 605
user acceptance document, 560 W
user documentation, 556
user interface Wade, Leslie Anne, 585
described, 137 wage administration, 417
dialog manager, 421 Wales, Jimmy, 284
for expert systems, 459, 462 Walsh, Jeff, 406
user preparation (in systems development), 557 WANs (world area networks), 238
user satisfaction, 56 WAP (wireless application protocol), 273, 343, 348
user software, 155–160, 171 war driving, 244
user training, 70 waste, computer, 578–579
usernet, and newsgroups, 290 Web
users in systems development, 487
utility See also Internet, World Wide Web
companies and information systems (ISs), 31 described, 14–15
computing, 58–59 Internet offices, 296
programs, 171, 147–149 overview of, 392
UTM (unified threat management), 540 semantic, 203
UWB (ultra wideband), 230 shopping on the, 294
unauthorized, 301
V Web 2.0, 15, 279, 293, 392, 400, 427
Web applications, 282–300, 392–393
value added, 8 Web auctions, 294, 327
value chain described, 45 Web browsers, 276
ValueIT utility, 149 Web crawling, 283
variants (virus), 587 Web logs. See blogs
Ventury, Dominic, 346 Web page construction software, 339
versions (software), 562 Web pages
very small aperture terminal (VSAT), 233 See also Web sites
video logs (vlogs), 288–289 creating, 280–281
video on the Internet, 294–295 sending, receiving, 339
videoconferencing, 252, 291 static and dynamic, 339
Vieraitis, Bob, 367 Web plug-ins, 276
virtual database systems, 212–213 Web portals, 267, 276–277
virtual databases, 556
| Index 651
Web programming languages, 280 work environment issues, 609–610
Web server software, 338 workgroup application software, 161
Web services, 280–281, 341 workgroup operating systems, 143–144
Web site development tools, 339 workgroup software, 426
Web sites workgroup sphere of influence, 136
workgroups
3-D, 297
blog sites, 289 described, 136
and e-commerce, 334–337 telecommunications and virtual workers, 251–252
hosting, 334–335 virtual, 428
m-commerce, 320 workstations, 119
social networking, 292–293 wide area networks (WANs), 238
tracking, 339 World Bank, 49
WEP (Wired equivalent privacy), 244 World Is Flat, The (Friedman), 32, 35
wide area wireless network options, 232–235 World Wide Web (WWW)
Wi-Fi Alliance, 231 See also Internet, Web
Wi-Fi phones, 291 described, 14–15, 266, 276
Wi-Fi Protected Access (WPA), 244 overview of, 276–282
Wikipedia, 284–285 Worldwide Interoperability for Microwave Access
wikis, 284–285 (WiMAX), 234
WiMAX (Worldwide Interoperability for Microwave worms, 586, 587
Access), 234 WPA (Wi-Fi Protected Access), 244
Windows Embedded, 146
Windows Mobile, 146 X
Windows Vista, 140
Windows XP, 140 Xing, Song, 314
Wintel, 141 XML (Extensible Markup Language), 277,
Wired equivalent privacy (WEP), 244
wireless 280–281
communications, 229–230 XP (extreme programming), 500–501
connection to Internet, 273
networks, 14, 244 Y
transmission media, 227
wireless application protocol (WAP), 273, 343, 348 Yee, Jim, 55
Wireless Markup Language (WML), 343
wireless mesh, 233–234 Z
wireless networks
securing, 244 Zigbee wireless communications, 231
uses of, 14 Zip disks, 99
WML (Wireless Markup Language), 343 zip files, 148
Wolfensohn, James, 49 z/OS (IBM OS), 145
Word (Microsoft), Track Changes feature, 156 Zuniga, Amanda, 47
word processing applications, 156
|652 Index Associated Press, 13, 275
Association for Computing Machinery (ACM), 611–612
Company Names AstraZeneca, 411
Asus, 118
Numbers AT&T, 17, 108, 144, 231, 234, 235, 246, 256, 273, 291,
14 Commerce, 344 320, 328, 464
37signals.com, 296 Auctions, 327
3VR Security, 471 Audible.com, 295
5DT, Inc., 26 Austin-Hayne, 464
7-Eleven, 239 Autodesk, 426, 592
Avanax, 153
A AVG, 588
Aviall, 317
ABC News, 289–290
AbeBooks.com, 328 B
Accenture, 72, 414, 503, 509
AccuFund, 363 Babel Fish Translation, 298
Ace Hardware, 402 BAE Systems, Inc., 67
Acer, 592 Ball Aerospace, 45
AdMob, Inc., 412 Banc of America Securities Prime Brokerage, 212
Adobe, 13, 276, 279, 280, 281, 299, 339, 445, 592 Bancorp South, 328
Advance America, 127–128 Bank of America, 201, 307, 556
Aelera Coproration, 502 Bank of China, 122
Aeroflex Incorporated, 92 Barclays, 29, 251, 345
AES Technologies, 335 Barcle, 328
Aetna, 59 Barnes & Noble, 313
Aflac, 225 Baseball Hall of Fame, 193
Air Products and Chemicals, Inc., 375 BaseCamp, 427
Aircel Business Solutions, 235 Baskin-Robbins, 162
Alcatel, 243 Bebo, 604Bell Canada, 352
All Nippon Airways Company, 580 Bell South, 599
Allergan, 58 Best Buy, 72, 552, 586
Allstate Insurance, 554 Bharti Airtel, 247
Alltel, 328 Bid4Spots, 414
Amazon.com, 57, 72, 97, 115, 203, 281, 294, 295, 296, Bidzcom, 313
Bigreds.com, 332
306, 311, 313, 321, 503 BikeSomeWhere.com, 328
AMD, 95, 552 BillMeLater, 344, 345
America Online (AOL), 254, 273, 276, 287, 291 Bird & Bird (B&B), 478
American Airlines, 90 BitDefender, 588
American Eagle Outfitters, 313, 324, 378 BizAutomation.com, 381
American Express, 345 BizNova Consulting, 487
American Home Products, 170 BlackBerry (Research in Motion), 249, 285, 328, 377
American Honda, 297 Blagg & Johnson, 458
American of Martinsville, 378 Blair Corporation, 327
Amerisure, 119 Blancco, 561
Ameritrade, 324 Blogcatalog.com, 289
Amherst Alarm, 256 Blogdigger, 289
AMR Research, 337, 555 Blogger.com, 289
Analsys, 314 Blue Cross, 153
Anheuser-Busch Companies, 67 Blue Cross Blue Shield, 542
Animal Logic, 121 Blue Shield, 153
AOL (America Online), 588, 599, 600, 602 BMW, 412
Apache, 598 Bochringer Ingelheim, 404
APPIAN, 436 Boeing, 14, 25, 26, 162, 225, 307, 317, 409, 469
Apple Computers, 14, 63, 90, 114, 117, 119, 141–142, Boekhandels Groep Nederland (BGN), 108
Bombardier Flexjet, 398
144, 147, 149, 171, 203, 231, 235, 237, 257, 273, 280, Boost, 328
285, 287, 289, 295, 332, 344, 377, 586–587, 592, 603, BOSaNOVA, 119
611 Bosch Security Products, 87
Applix, 211 Boston College, 465
Arek Oy, Ltd., 607 Boston Dynamics, 452, 453
Art Technology Group (ATG), 324 BRE Bank, Poland, 494
Art.com, 493
Arvest, 328
Aselsan, 388
Aspen Skiing Company, 561
Associated Newspapers, 598
| Index 653
Brigham and Women’s Hospital, 457 Commerce One, 603
British Airways, 395–396 complaints.com, 342
British Petroleum (BP), 404 CompuServe, 600
British Telcom, 599 Computer Associates International, 455, 500, 594
BroadSpire, 334, 335 Computer Security Institute, 583
BroadVision, 281 comScore Networks, 323
BT, 225, 500 Comtrend Corporation, 229
Burlington Northern Santa Fe Corporation, 372 Connectbeam, 307
Business Objects, 209, 211, 412 Constellation Energy, 488
ContentWatch Inc., 600
C Con-way Inc., 107
Corel, 159, 160
C2Net, 169 Corporate Communications, 335
Cabelas, 547 Costco, 108, 321
Cablecom, 422 Counterpane, 599
Caldera OpenLinux, 142 Course Technology, 271, 288
Callserve, 291 Covisint, 254, 313
Cambridge Health Alliance (CHA), 261 Cox Communications, 252
Canon, 552 Craigslist, 313, 320, 327
Capital Groups Companies, The, 67 Cray, 123, 552
Car Toys, Inc., 381 Creative Artists Agency (CAA), 181
Carbonetworks, 545 CSX Transportation, 118
CardersMarket, 319 CUNA Mutual Group, 71
Careerbuilder.com, 287 Cutting Edge Information, 47
CareerXroads, 73 CVS Corporation, 213
Carnegie Mellon Software Engineering Institute, 547 Cyberhomes, 327
Carnegie Mellon University, 69, 167, 452, 453, 454, 506
Carsberg Breweries, 535–536 D
CBSSports.com, 585
CDW Corporation, 251 DaimlerChrysler, 162
Cedarlane, 374 Dassault Systems, 469
Center Beam, 502 Data, 108
Center for Systems Innovation, 492 DataTern, 593
Central Michigan University, 378 DB2, 280
Champs Sports, 344 Decisioning, Inc., 23
Charles Schwab & Co., 312, 454 Deere & Company, 398
CheapTickets, 334 Del Monte Corporation, 329
Chesapeake Energy, 212 Del Monte Foods, 262
Chevron Corporation, 299 del.icio.us, 279, 293–294
Chico’s, 213 Dell, Inc., 28, 64, 72, 90, 114, 120, 143, 231, 313, 322,
Chiquita Brands, 381
Choctaw Electric, 234 340, 369, 408
Chromalloy Gas Turbine, 409 Dell Computer, 545, 552, 553, 592
Chrysler, 414 Deloitte & Touche, 406
Chubb Commercial Insurance, 445 Deloitte Touche Tohmatsu, 223
Cigna Healthcare, 25 Delta Airlines, 409, 443
Cincinnati Bell, 495 Desktop Search, 149
Cinergy Corporation, 419 Detroit Trading Exchange, 323
Cingular, 320 DHL, 316
Cisco Systems, 72, 223, 224, 225, 243, 262, 312 Dial Directions, 105
Citibank, 17, 330, 345, 381, 582 Digg, 279, 294, 412
Citysearch, 320 Direct Marketing Association, 609
Clarity Systems, 62 DirectRevenue, 590
Classmates.com, 604 Disney, 237, 498
Clear Channel Communications, 289, 506 D-Link, 240
ClearContent, 286 DLJdirect, 454
Clearwire, 234 DoCoMo, 343
Clorox Company, 329 DreamWorks Studios, 253
CMA-CGM, 47 DT Research, 117, 118, 119
CNA, 444 DTE Energy, 509
CNN, 284, 584 Duke University, 487
Coca-Cola Enterprises, 98, 117, 398, 491 Dun & Bradstreet, 341
Cognos, 209, 211, 402 Dunkin’ Brands, 162, 402
Collexis, 446
Comcast, 275, 291 E
E*Trade, 583