Management Information Systems 15e by Laudon, Laudon

From CNM Wiki
Jump to: navigation, search

Management Information Systems 15e by Laudon, Laudon is the 15th edition of the Management Information Systems: Managing the Digital Firm textbook authored by Kenneth C. Laudon, New York University, and Jane P. Laudon, Azimuth Information Systems, and published by Pearson Education Limited, Harlow, Essex, England in 2018.

  • 3-D printing. Uses machines to make solid objects, layer by layer, from specifications in a digital file. Also known as additive manufacturing.
  • 3G networks. Cellular networks based on packet-switched technology with speeds ranging from 144 Kbps for mobile users to more than 2 Mbps for stationary users, enabling users to transmit video, graphics, and other rich media in addition to voice.
  • 4G networks. The next evolution in wireless communication is entirely packet switched and capable of providing between 1 Mbps and 1 Gbps speeds; up to 10 times faster than 3G networks.
  • Acceptable use policy (AUP). Defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance.
  • Acceptance testing. Provides the final certification that the system is ready to be used in a production setting.
  • Accountability. The mechanisms for assessing responsibility for decisions made and actions taken.
  • Advertising revenue model. Website generating revenue by attracting a large audience.
  • Affiliate revenue model. An e-commerce revenue model in which websites are paid as "affiliates" for sending their visitors to other sites in return for a referral fee.
  • Agency theory. Economic theory that views the firm as a nexus of contracts among self-interested individuals who must be supervised and managed.
  • Agent-based modeling. Modeling complex phenomena as systems of autonomous agents that follow relatively simple rules for interaction.
  • Agile development. Rapid delivery of working software by breaking a large project into a series of small sub-projects that are completed in short periods of time using iteration and continuous feedback.
  • Analytic platform. Preconfigured hardware-software system that is specifically designed for high-speed analysis of large datasets.
  • Analytical CRM. Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance.
  • Android. A mobile operating system developed by Android, Inc. (purchased by Google) and later the Open Handset Alliance as a flexible, upgradeable mobile device platform.
  • Antivirus software. Software designed to detect, and often eliminate, malware from an information system.
  • Application controls. Specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application.
  • Application server. Software that handles all application operations between browser-based computers and a company's back-end business applications or databases.
  • Apps. Small pieces of software that run on the Internet, on your computer, or on your cell phone and are generally delivered over the Internet.
  • Artificial intelligence (AI). The effort to develop computer-based systems that can behave like humans, with the ability to learn languages, accomplish physical tasks, use a perceptual apparatus, and emulate human expertise and decision making.
  • Attribute. A piece of information describing a particular entity.
  • Augmented reality (AR). A technology for enhancing visualization. Provides a live direct or indirect view of a physical real-world environment whose elements are augmented by virtual computer-generated imagery.
  • Authentication. The ability of each party in a transaction to ascertain the identity of the other party.
  • Automation. Using the computer to speed up the performance of existing tasks.
  • Backward chaining. A strategy for searching the rule base in an expert system that acts like a problem solver by beginning with a hypothesis and seeking out more information until the hypothesis is either proved or disproved.
  • Balanced scorecard method. Framework for operationalizing a firm's strategic plan by focusing on measurable financial, business process, customer, and learning and growth outcomes of firm performance.
  • Bandwidth. The capacity of a communications channel as measured by the difference between the highest and lowest frequencies that can be transmitted by that channel.
  • Behavioral models. Descriptions of management based on behavioral scientists' observations of what managers actually do in their jobs.
  • Behavioral targeting. Tracking the click-streams (history of clicking behavior) of individuals across multiple websites for the purpose of understanding their interests and intentions, and exposing them to advertisements which are uniquely suited to their interests.
  • Benchmarking. Setting strict standards for products, services, or activities and measuring organizational performance against those standards.
  • Best practices. The most successful solutions or problem-solving methods that have been developed by a specific organization or industry.
  • Big data. Data sets with volumes so huge that they are beyond the ability of typical relational DBMS to capture, store, and analyze.The data are often unstructured or semi-structured.
  • Biometric authentication. Technology for authenticating system users that compares a person's unique characteristics such as fingerprints, face, or retinal image against a stored set profile of these characteristics.
  • Bit. A binary digit representing the smallest unit of data in a computer system. It can only have one of two states, representing 0 or 1.
  • Blog. Popular term for "weblog," designating an informal yet structured website where individuals can publish stories, opinions, and links to other websites of interest.
  • Blogosphere. Totality of blog-related websites.
  • Bluetooth. Standard for wireless personal area networks that can transmit up to 722 Kbps within a 10-meter area.
  • Botnet. A group of computers that have been infected with bot malware without users' knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns, or spam.
  • Broadband. High-speed transmission technology. Also designates a single communications medium that can transmit multiple channels of data simultaneously.
  • Bugs. Software program code defects.
  • Bullwhip effect. Distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
  • Business continuity planning. Planning that focuses on how the company can restore business operations after a disaster strikes.
  • Business driver. A force in the environment to which businesses must respond and that influences the direction of business.
  • Business ecosystem. Loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.
  • Business functions. Specialized tasks performed in a business organization, including manufacturing and production, sales and marketing, finance and accounting, and human resources.
  • Business intelligence. Applications and technologies to help users make better business decisions.
  • Business model. An abstraction of what an enterprise is and how the enterprise delivers a product or service, showing how the enterprise creates wealth.
  • Business performance management (BPM). Attempts to systematically translate a firm's strategies (e.g., differentiation, low-cost producer, market share growth, and scope of operation) into operational targets.
  • Business process management (BPM). An approach to business which aims to continuously improve and manage business processes.
  • Business process redesign. Type of organizational change in which business processes are analyzed, simplified, and redesigned.
  • Business processes. The unique ways in which organizations coordinate and organize work activities, information, and knowledge to produce a product or service.
  • Business-to-business (B2B) electronic commerce. Electronic sales of goods and services among businesses.
  • Business-to-consumer (B2C) electronic commerce. Electronic retailing of products and services directly to individual consumers.
  • BYOD. Stands for "bring your own device,"and refers to employees using their own computing devices in the workplace.
  • Byte. A string of bits, usually eight, used to store one number or character in a computer system.
  • Cable Internet connections. Internet connections that use digital cable lines to deliver high-speed Internet access to homes and businesses.
  • Capital budgeting. The process of analyzing and selecting various proposals for capital expenditures.
  • Carpal tunnel syndrome (CTS). Type of RSI in which pressure on the median nerve through the wrist's bony carpal tunnel structure produces pain.
  • Case-based reasoning (CBR). Artificial intelligence technology that represents knowledge as a database of cases and solutions.
  • Change agent. In the context of implementation, the individual acting as the catalyst during the change process to ensure successful organizational adaptation to a new system or innovation.
  • Change management. Managing the impact of organizational change associated with an innovation, such as a new information system.
  • Chat. Live, interactive conversations over a public network.
  • Chatbot. Software agent designed to simulate a conversation with one or more human users via textual or auditory methods.
  • Chief data officer (CDO). Responsible for enterprise-wide governance and utilization of information to maximize the value the organization can realize from its data.
  • Chief information officer (CIO). Senior manager in charge of the information systems function in the firm.
  • Chief knowledge officer (CKO). Senior executive in charge of the organization's knowledge management program.
  • Chief privacy officer (CPO). Responsible for ensuring the company complies with existing data privacy laws.
  • Chief security officer (CSO). Heads a formal security function for the organization and is responsible for enforcing the firm's security policy.
  • Choice. Simon's third stage of decision making, when the individual selects among the various solution alternatives.
  • Chrome OS. Google's lightweight computer operating system for users who do most of their computing on the Internet; runs on computers ranging from netbooks to desktop computers.
  • Churn rate. Measurement of the number of customers who stop using or purchasing products or services from a company. Used as an indicator of the growth or decline of a firm's customer base.
  • Classical model of management. Traditional description of management that focused on its formal functions of planning, organizing, coordinating, deciding, and controlling.
  • Click fraud. Fraudulently clicking on an online ad in pay per click advertising to generate an improper charge per click.
  • Client. The user point-of-entry for the required function in client/server computing. Normally a desktop computer, workstation, or laptop computer.
  • Client/server computing. A model for computing that splits processing between clients and servers on a network, assigning functions to the machine most able to perform the function.
  • Cloud computing. Model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over a network, primarily the Internet.
  • Collaboration. Working with others to achieve shared and explicit goals.
  • Community provider. A website business model that creates a digital online environment where people with similar interests can transact (buy and sell goods); share interests, photos, videos; communicate with like-minded people; receive interest-related information; and even play out fantasies by adopting online personalities called avatars.
  • Communities of practice (COPs). Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests and share their knowledge.
  • Competitive forces model. Model used to describe the interaction of external influences, specifically threats and opportunities, that affect an organization's strategy and ability to compete.
  • Complementary assets. Additional assets required to derive value from a primary investment.
  • Component-based development. Building large software systems by combining preexisting software components.
  • Computer abuse. The commission of acts involving a computer that may not be illegal but are considered unethical.
  • Computer crime. The commission of illegal acts through the use of a computer or against a computer system.
  • Computer forensics. The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
  • Computer hardware. Physical equipment used for input, processing, and output activities in an information system.
  • Computer literacy. Knowledge about information technology, focusing on understanding of how computer-based technologies work.
  • Computer software. Detailed, preprogrammed instructions that control and coordinate the work of computer hardware components in an information system.
  • Computer virus. Rogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions.
  • Computer vision syndrome (CVS). Eyestrain condition related to computer display screen use; symptoms include headaches, blurred vision, and dry and irritated eyes.
  • Computer-aided design (CAD). Information system that automates the creation and revision of designs using sophisticated graphics software.
  • Computer-aided software engineering (CASE). Automation of step-by-step methodologies for software and systems development to reduce the amounts of repetitive work the developer needs to do.
  • Consumer-to-consumer (C2C). Consumers selling goods and services electronically to other consumers.
  • Consumerization of IT. New information technology originating in the consumer market that spreads to business organizations.
  • Controls. All of the methods, policies, and procedures that ensure protection of the organization's assets, accuracy and reliability of its records, and operational adherence to management standards.
  • Conversion. The process of changing from the old system to the new system.
  • Cookies. Tiny file deposited on a computer hard drive when an individual visits certain websites. Used to identify the visitor and track visits to the website.
  • Cooptation. Bringing the opposition into the process of designing and implementing a solution without giving up control of the direction and nature of the change.
  • Copyright. A statutory grant that protects creators of intellectual property against copying by others for any purpose for a minimum of 70 years.
  • Core competency. Activity at which a firm excels as a world-class leader.
  • Core systems. Systems that support functions that are absolutely critical to the organization.
  • Cost transparency. The ability of consumers to discover the actual costs merchants pay for products.
  • Counterimplementation. A deliberate strategy to thwart the implementation of an information system or an innovation in an organization.
  • Cross-selling. Marketing complementary products to customers.
  • Crowdsourcing. Using large Internet audiences for advice, market feedback, new ideas, and solutions to business problems. Related to the "wisdom of crowds" theory.
  • Culture. The set of fundamental assumptions about what products the organization should produce, how and where it should produce them, and for whom they should be produced.
  • Customer lifetime value (CLTV). Difference between revenues produced by a specific customer and the expenses for acquiring and servicing that customer minus the cost of promotional marketing over the lifetime of the customer relationship, expressed in today's dollars.
  • Customer relationship management (CRM). Business and technology discipline that uses information systems to coordinate all of the business processes surrounding the firm's interactions with its customers in sales, marketing, and service.
  • Customer relationship management systems. Information systems that track all the ways in which a company interacts with its customers and analyze these interactions to optimize revenue, profitability, customer satisfaction, and customer retention.
  • Customization. The modification of a software package to meet an organization's unique requirements without destroying the package software's integrity.
  • Customization. In e-commerce, changing a delivered product or service based on a user's preferences or prior behavior.
  • Cybervandalism. Intentional disruption, defacement, or destruction of a website or corporate information system.
  • Cyberwarfare. State-sponsored activity designed to cripple and defeat another state or nation by damaging or disrupting its computers or networks.
  • Data. Streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use.
  • Data administration. A special organizational function for managing the organization's data resources, concerned with information policy, data planning, maintenance of data dictionaries, and data quality standards.
  • Data cleansing. Activities for detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant. Also known as data scrubbing.
  • Data definition. DBMS capability that specifies the structure and content of the database.
  • Data dictionary. An automated or manual tool for storing and organizing information about the data maintained in a database.
  • Data element. A field.
  • Data flow diagram (DFD). Primary tool for structured analysis that graphically illustrates a system's component process and the flow of data between them.
  • Data governance. Policies and processes for managing the availability, usability, integrity, and security of the firm's data.
  • Data inconsistency. The presence of different values for same attribute when the same data are stored in multiple locations.
  • Data management technology. Software governing the organization of data on physical storage media.
  • Data manipulation language. A language associated with a database management system that end users and programmers use to manipulate data in the database.
  • Data mart. A small data warehouse containing only a portion of the organization's data for a specified function or population of users.
  • Data mining. Analysis of large pools of data to find patterns and rules that can be used to guide decision making and predict future behavior.
  • Data quality audit. A survey and/or sample of files to determine accuracy and completeness of data in an information system.
  • Data redundancy. The presence of duplicate data in multiple data files.
  • Data visualization. Technology for helping users see patterns and relationships in large amounts of data by presenting the data in graphical form.
  • Data warehouse. A database, with reporting and query tools, that stores current and historical data extracted from various operational systems and consolidated for management reporting and analysis.
  • Data workers. People such as secretaries or bookkeepers who process the organization's paperwork.
  • Database. A group of related files.
  • Database (rigorous definition). A collection of data organized to service many applications at the same time by storing and managing data so that they appear to be in one location.
  • Database administration. Refers to the more technical and operational aspects of managing data, including physical database design and maintenance.
  • Database management system (DBMS). Special software to create and maintain a database and enable individual business applications to extract the data they need without having to create separate files or data definitions in their computer programs.
  • Database server. A computer in a client/server environment that is responsible for running a DBMS to process SQL statements and perform database management tasks.
  • Decisional roles. Mintzberg's classification for managerial roles where managers initiate activities, handle disturbances, allocate resources, and negotiate conflicts.
  • Decision-support systems (DSS). Information systems at the organization's management level that combine data and sophisticated analytical models or data analysis tools to support semi-structured and unstructured decision making.
  • Deep packet inspection (DPI). Technology for managing network traffic by examining data packets, sorting out lowpriority data from higher priority business-critical data, and sending packets in order of priority.
  • Demand planning. Determining how much product a business needs to make to satisfy all its customers' demands.
  • Denial-of-service (DoS) attack. Flooding a network server or web server with false communications or requests for services in order to crash the network.
  • Design. Simon's second stage of decision making, when the individual conceives of possible alternative solutions to a problem.
  • DevOps. Organizational strategy to create a culture and environment to promote rapid and agile development practices by emphasizing close collaboration between software developers and the IT operational staff.
  • Digital asset management systems. Classify, store, and distribute digital objects such as photographs, graphic images, video, and audio content.
  • Digital certificate. An attachment to an electronic message to verify the identity of the sender and to provide the receiver with the means to encode a reply.
  • Digital dashboard. Displays all of a firm's key performance indicators as graphs and charts on a single screen to provide one-page overview of all the critical measurements necessary to make key executive decisions.
  • Digital divide. Large disparities in access to computers and the Internet among different social groups and different locations.
  • Digital firm. Organization where nearly all significant business processes and relationships with customers, suppliers, and employees are digitally enabled, and key corporate assets are managed through digital means.
  • Digital goods. Goods that can be delivered over a digital network.
  • Digital Millennium Copyright Act (DMCA). Adjusts copyright laws to the Internet Age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials.
  • Digital subscriber line (DSL). A group of technologies providing high-capacity transmission over existing copper telephone lines.
  • Direct cutover strategy. A risky conversion approach where the new system completely replaces the old one on an appointed day.
  • Direct goods. Goods used in a production process.
  • Disaster recovery planning. Planning for the restoration of computing and communications services after they have been disrupted.
  • Disintermediation. The removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
  • Disruptive technologies. Technologies with disruptive impact on industries and businesses, rendering existing products, services, and business models obsolete.
  • Distributed denial-of-service (DDoS attack. Numerous computers inundating and overwhelming a network from numerous launch points.
  • Documentation. Descriptions of how an information system works from either a technical or end-user standpoint.
  • Domain name. English-like name that corresponds to the unique 32-bit numeric Internet Protocol (IP) address for each computer connected to the Internet.
  • Domain Name System (DNS). A hierarchical system of servers maintaining a database enabling the conversion of domain names to their numeric IP addresses.
  • Domestic exporter. Form of business organization characterized by heavy centralization of corporate activities in the home county of origin.
  • Downtime. Period of time in which an information system is not operational.
  • Drill down. The ability to move from summary data to lower and lower levels of detail.
  • Drive-by download. Malware that comes with a downloaded file a user intentionally or unintentionally requests.
  • Due process. A process in which laws are well-known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly.
  • Dynamic pricing. Pricing of items based on real-time interactions between buyers and sellers that determine what a item is worth at any particular moment.
  • E-government. Use of the Internet and related technologies to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government.
  • Efficient customer response system. System that directly links consumer behavior back to distribution, production, and supply chains.
  • Electronic business (e-business). The use of the Internet and digital technology to execute all the business processes in the enterprise. Includes e-commerce as well as processes for the internal management of the firm and for coordination with suppliers and other business partners.
  • Electronic commerce (e-commerce). The process of buying and selling goods and services electronically involving transactions using the Internet, networks, and other digital technologies.
  • Electronic data interchange (EDI). The direct computer-tocomputer exchange between two organizations of standard business transactions, such as orders, shipment instructions, or payments.
  • Email. The computer-to-computer exchange of messages.
  • Employee relationship management (ERM). Software dealing with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.
  • Encryption. The coding and scrambling of messages to prevent their being read or accessed without authorization.
  • End-user development. The development of information systems by end users with little or no formal assistance from technical specialists.
  • End-user interface. The part of an information system through which the end user interacts with the system, such as online screens and commands.
  • End users. Representatives of departments outside the information systems group for whom applications are developed.
  • Enterprise applications. Systems that can coordinate activities, decisions, and knowledge across many different functions, levels, and business units in a firm. Include enterprise systems, supply chain management systems, and knowledge management systems.
  • Enterprise content management (ECM). Help organizations manage structured and semi-structured knowledge, providing corporate repositories of documents, reports, presentations, and best practices and capabilities for collecting and organizing email and graphic objects.
  • Enterprise software. Set of integrated modules for applications such as sales and distribution, financial accounting, investment management, materials management, production planning, plant maintenance, and human resources that allow data to be used by multiple functions and business processes.
  • Enterprise systems. Integrated enterprise-wide information systems that coordinate key internal processes of the firm.
  • Enterprise-wide knowledge management systems. General-purpose, firmwide systems that collect, store, distribute, and apply digital content and knowledge.
  • Entity. A person, place, thing, or event about which information must be kept.
  • Entity-relationship diagram. A methodology for documenting databases illustrating the relationship between various entities in the database.
  • Ergonomics. The interaction of people and machines in the work environment, including the design of jobs, health issues, and the end-user interface of information systems.
  • E-tailer. Online retail stores from the giant Amazon to tiny local stores that have websites where retail goods are sold.
  • Ethical no-free-lunch rule. Assumption that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensation for this work.
  • Ethics. Principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior.
  • Evil twins. Wireless networks that pretend to be legitimate to entice participants to log on and reveal passwords or credit card numbers.
  • Exchange. Third-party Net marketplace that is primarily transaction oriented and that connects many buyers and suppliers for spot purchasing.
  • Executive support systems (ESS). Information systems at the organization's strategic level designed to address unstructured decision making through advanced graphics and communications.
  • Expert system. Knowledge-intensive computer program that captures the expertise of a human in limited domains of knowledge.
  • Explicit knowledge. Knowledge that has been documented.
  • Extensible Markup Language (XML). General-purpose language that describes the structure of a document and can perform presentation, communication, and storage of data, allowing data to be manipulated by the computer.
  • External integration tools. Project management technique that links the work of the implementation team to that of users at all organizational levels.
  • Extranet. Private intranet that is accessible to authorized outsiders.
  • Fair Information Practices (FIP). A set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws.
  • Fault-tolerant computer systems. Systems that contain extra hardware, software, and power supply components that can back a system up and keep it running to prevent system failure.
  • Feasibility study. As part of the systems analysis process, the way to determine whether the solution is achievable, given the organization's resources and constraints.
  • Feedback. Output that is returned to the appropriate members of the organization to help them evaluate or correct input.
  • Field. A grouping of characters into a word, a group of words, or a complete number, such as a person's name or age.
  • File Transfer Protocol (FTP). Tool for retrieving and transferring files from a remote computer.
  • File. A group of records of the same type.
  • Firewall. Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks.
  • Foreign key. Field in a database table that enables users find related information in another database table.
  • Formal control tools. Project management technique that helps monitor the progress toward completion of a task and fulfillment of goals.
  • Formal planning tools. Project management technique that structures and sequences tasks, budgeting time, money, and technical resources required to complete the tasks.
  • Forward chaining. A strategy for searching the rule base in an expert system that begins with the information entered by the user and searches the rule base to arrive at a conclusion.
  • Franchiser. Form of business organization in which a product is created, designed, financed, and initially produced in the home country, but for product-specific reasons relies heavily on foreign personnel for further production, marketing, and human resources.
  • Free/fremium revenue model. An e-commerce revenue model in which a firm offers basic services or content for free while charging a premium for advanced or high-value features.
  • Fuzzy logic. Rule-based AI that tolerates imprecision by using nonspecific terms called membership functions to solve problems.
  • Gantt chart. Visually representats the timing, duration, and resource requirements of project tasks.
  • General controls. Overall control environment governing the design, security, and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.
  • Genetic algorithms. Problem-solving methods that promote the evolution of solutions to specified problems using the model of living organisms adapting to their environment.
  • Geoadvertising services. Delivering ads to users based on their GPS location.
  • Geographic information system (GIS). System with software that can analyze and display data using digitized maps to enhance planning and decision-making.
  • Geoinformation services. Information on local places and things based on the GPS position of the user.
  • Geosocial services. Social networking based on the GPS location of users.
  • Global culture. The development of common expectations, shared artifacts, and social norms among different cultures and peoples.
  • Golden Rule. Putting oneself in the place of others as the object of a decision.
  • Gramm-Leach-Bliley Act. Requires financial institutions to ensure the security and confidentiality of customer data.
  • Green computing (green IT). Refers to practices and technologies for designing, manufacturing, using, and disposing of computers, servers, and associated devices such as monitors, printers, storage devices, and networking and communications systems to minimize impact on the environment.
  • Group decision-support system (GDSS). An interactive computer-based system to facilitate the solution to unstructured problems by a set of decision makers working together as a group.
  • Hacker. A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
  • Hadoop. Open source software framework that enables distributed parallel processing of huge amounts of data across many inexpensive computers.
  • Hertz. Measure of frequency of electrical impulses per second, with 1 Hertz equivalent to 1 cycle per second.
  • HIPAA. Law outlining rules for medical security, privacy, and the management of healthcare records.
  • Hotspot. A specific geographic location in which an access point provides public Wi-Fi network service.
  • HTML5. Next evolution of HTML, which makes it possible to embed images, video, and audio directly into a document without add-on software.
  • Hubs. Very simple devices that connect network components, sending a packet of data to all other connected devices.
  • Hybrid AI systems. Integration of multiple AI technologies into a single application to take advantage of the best features of these technologies.
  • Hybrid cloud. Computing model where firms use both their own IT infrastructure and also public cloud computing services.
  • Hypertext Markup Language (HTML). Page description language for creating web pages.
  • Hypertext Transfer Protocol (HTTP). The communications standard used to transfer pages on the web. Defines how messages are formatted and transmitted.
  • Identity management. Business processes and software tools for identifying the valid users of a system and controlling their access to system resources.
  • Identity theft. Theft of key pieces of personal information, such as credit card or Social Security numbers, in order to obtain merchandise and services in the name of the victim or to obtain false credentials.
  • Immanuel Kant's categorical imperative. A principle that states that if an action is not right for everyone to take it is not right for anyone.
  • Implementation. All the organizational activities surrounding the adoption, management, and routinization of an innovation, such as a new information system.
  • In-memory computing. Technology for very rapid analysis and processing of large quantities of data by storing the data in the computer's main memory rather than in secondary storage.
  • Indirect goods. Goods not directly used in the production process, such as office supplies.
  • Inference engine. The strategy used to search through the rule base in an expert system; can be forward or backward chaining.
  • Information. Data that have been shaped into a form that is meaningful and useful to human beings.
  • Information asymmetry. Situation where the relative bargaining power of two parties in a transaction is determined by one party in the transaction possessing more information essential to the transaction than the other party.
  • Information density. The total amount and quality of information available to all market participants, consumers, and merchants.
  • Information policy. Formal rules governing the maintenance, distribution, and use of information in an organization.
  • Information requirements. A detailed statement of the information needs that a new system must satisfy; identifies who needs what information, and when, where, and how the information is needed.
  • Information rights. The rights that individuals and organizations have with respect to information that pertains to themselves.
  • Information system. Interrelated components working together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization.
  • Information systems audit. Identifies all the controls tht govern individual information systems and assesses their effectiveness.
  • Information systems department. The formal organizational unit that is responsible for the information systems function in the organization.
  • Information systems literacy. Broad-based understanding of information systems that includes behavioral knowledge about organizations and individuals using information systems as well as technical knowledge about computers.
  • Information systems managers. Leaders of the various specialists in the information systems department.
  • Information systems plan. A road map indicating the direction of systems development: the rationale, the current situation, the management strategy, the implementation plan, and the budget.
  • Information technology (IT). All the hardware and software technologies a firm needs to achieve its business objectives.
  • Information technology infrastructure (IT infrastructure. Computer hardware, software, data, storage technology, and networks providing a portfolio of shared IT resources for the organization.
  • Informational roles. Mintzberg's classification for managerial roles where managers act as the nerve centers of their organizations, receiving and disseminating critical information.
  • Informed consent. Consent given with knowledge of all the facts needed to make a rational decision.
  • Input. The capture or collection of raw data from within the organization or from its external environment for processing in an information system.
  • Instant messaging. Chat service that allows participants to create their own private chat channels so that a person can be alerted whenever someone on his or her private list is online to initiate a chat session with that particular individual.
  • Intangible benefits. Benefits that are not easily quantified; they include more efficient customer service or enhanced decision making.
  • Intellectual property. Intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, and patent law.
  • Intelligence. The first of Simon's four stages of decision making, when the individual collects information to identify problems occurring in the organization.
  • Intelligent agent. Software program that uses a built-in or learned knowledge base to carry out specific, repetitive, and predictable tasks for an individual user, business process, or software application.
  • Intelligent techniques. Technologies that aid human decision makers by capturing individual and collective knowledge, discovering patterns and behaviors in large quantities of data, and generating solutions to problems that are too large and complex for human beings to solve on their own.
  • Internal integration tools. Project management technique that ensures that the implementation team operates as a cohesive unit.
  • International information systems architecture. The basic information systems required by organizations to coordinate worldwide trade and other activities.
  • Internet. Global network of networks using universal standards to connect millions of different networks.
  • Internet of Things. Pervasive web in which each object or machine has a unique identity and is able to use the Internet to link with other machines or send data. Also known as the Industrial Internet.
  • Internet Protocol (IP address). Four-part numeric address indicating a unique computer location on the Internet.
  • Internet service provider (ISP). A commercial organization with a permanent connection to the Internet that sells temporary connections to subscribers.
  • Internet2. Research network with new protocols and transmission speeds that provides an infrastructure for supporting highbandwidth Internet applications.
  • Interorganizational systems. Information systems that automate the flow of information across organizational boundaries and link a company to its customers, distributors, or suppliers.
  • Interpersonal roles. Mintzberg's classification for managerial roles where managers act as figureheads and leaders for the organization.
  • Intranet. An internal network based on Internet and World Wide Web technology and standards.
  • Intrusion detection system. Tools to monitor the most vulnerable points in a network to detect and deter unauthorized intruders.
  • IOS. Operating system for the Apple iPad, iPhone, and iPod Touch.
  • IPv6. New IP addressing system using 128-bit IP addresses. Stands for Internet Protocol version 6.
  • IT governance. Strategy and policies for using information technology within an organization, specifying the decision rights and accountabilities to ensure that information technology supports the organization's strategies and objectives.
  • Iterative. A process of repeating over and over again the steps to build a system.
  • Java. Programming language that can deliver only the software functionality needed for a particular task, such as a small applet downloaded from a network; can run on any computer and operating system.
  • Joint application design (JAD). Process to accelerate the generation of information requirements by having end users and information systems specialists work together in intensive interactive design sessions.
  • Just-in-time strategy. Scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line.
  • Key field. A field in a record that uniquely identifies instances of that record so that it can be retrieved, updated, or sorted.
  • Key performance indicators. Measures proposed by senior management for understanding how well the firm is performing along specified dimensions.
  • Keylogger. Spyware that records every keystroke made on a computer to steal personal information or passwords or to launch Internet attacks.
  • Knowledge. Concepts, experience, and insight that provide a framework for creating, evaluating, and using information.
  • Knowledge base. Model of human knowledge that is used by expert systems.
  • Knowledge discovery. Identification of novel and valuable patterns in large databases.
  • Knowledge management. The set of processes developed in an organization to create, gather, store, maintain, and disseminate the firm's knowledge.
  • Knowledge management systems. Systems that support the creation, capture, storage, and dissemination of firm expertise and knowledge.
  • Knowledge workers. People such as engineers or architects who design products or services and create knowledge for the organization.
  • Knowledge work systems. Information systems that aid knowledge workers in the creation and integration of new knowledge into the organization.
  • Learning management system (LMS). Tools for the management, delivery, tracking, and assessment of various types of employee learning.
  • Legacy system. A system that has been in existence for a long time and that continues to be used to avoid the high cost of replacing or redesigning it.
  • Legitimacy. The extent to which one's authority is accepted on grounds of competence, vision, or other qualities.
  • Liability. The existence of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations.
  • Linux. Reliable and compactly designed operating system that is an offshoot of UNIX and that can run on many different hardware platforms and is available free or at very low cost. Used as alternative to UNIX.
  • Local area network (LAN). A telecommunications network that requires its own dedicated channels and that encompasses a limited distance, usually one building or several buildings in close proximity.
  • Location-based services. GPS map services available on smartphones.
  • Location analytics. Ability to gain insights from the location (geographic) component of data, including loation data from mobile phones, output from sensors or scanning devices, and data from maps.
  • Long tail marketing. Refers to the ability of firms to profitably market goods to very small online audiences, largely because of the lower costs of reaching very small market segements (people who fall into the long tail ends of a Bell curve).
  • Machine learning. Study of how computer programs can improve their performance without explicit programming.
  • Mainframe. Largest category of computer, used for major business processing.
  • Maintenance. Changes in hardware, software, documentation, or procedures to a production system to correct errors, meet new requirements, or improve processing efficiency.
  • Malware. Malicious software programs such as computer viruses, worms, and Trojan horses.
  • Managed security service provider (MSSP). Company that provides security management services for subscribing clients.
  • Management information systems (MIS). Specific category of information system providing reports on organizational performance to help middle management monitor and control the business.
  • Management information systems (MIS). The study of information systems focusing on their use in business and management.
  • Managerial roles. Expectations of the activities that managers should perform in an organization.
  • Market creator. An e-commerce business model in which firms provide a digital online environment where buyers and sellers can meet, search for products, and engage in transactions.
  • Market entry costs. The cost merchants must pay to bring their goods to market.
  • Marketspace. A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location.
  • Mashups. Composite software applications that depend on highspeed networks, universal communication standards, and open source code.
  • Mass customization. The capacity to offer individually tailored products or services using mass production resources.
  • Massive open online course (MOOC). Online course made available via the web to very large numbers of participants.
  • Menu costs. Merchants' costs of changing prices.
  • Metropolitan area network (MAN). Network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN.
  • Microblogging. Blogging featuring very short posts, such as using Twitter.
  • Micropayment systems. Payment for a very small sum of money, often less than $10.
  • Middle management. People in the middle of the organizational hierarchy who are responsible for carrying out the plans and goals of senior management.
  • Minicomputer. Middle-range computer used in systems for universities, factories, or research laboratories.
  • Mobile commerce (m-commerce). The use of wireless devices, such as smartphones or tablets to conduct both business-toconsumer and business-to-business e-commerce transactions over the Internet.
  • Mobile web app. Internet-enabled app with specific functionality for mobile devices that is accessed through a mobile device's web browser.
  • Mobile website. Version of a regular website that is scaled down in content and navigation for easy access and search on a small mobile screen.
  • Modem. A device for translating a computer's digital signals into analog form for transmission over analog networks or for translating analog signals back into digital form for reception by a computer.
  • Moore's Law. Assertion that the number of components on a chip doubles each year.
  • Multicore processor. Integrated circuit to which two or more processors have been attached for enhanced performance, reduced power consumption, and more efficient simultaneous processing of multiple tasks.
  • Multinational. Form of business organization that concentrates financial management, and control out of a central home base while decentralizing production, sales and marketing.
  • Multitiered client/server architecture (N-tier client/server architecture). Client/server network which the work of the entire network is balanced over several different levels of servers.
  • Multitouch. Interface that features the use of one or more finger gestures to manipulate lists or objects on a screen without using a mouse or keyboard.
  • Nanotechnology. Technology that builds structures and processes based on the manipulation of individual atoms and molecules.
  • Native advertising. Placing ads within social network newsfeeds or traditional editorial content, such as a newspaper article.
  • Native app. Standalone application designed to run on a specific platform and device and is installed directly on the mobile device
  • Near field communication (NFC). Short-range wireless connectivity standard that uses electromagnetic radio fields to enable two compatible devices to exchange data when brought within a few centimeters of each other.
  • Net marketplace. A single digital marketplace based on Internet technology linking many buyers to many sellers.
  • Network. The linking of two or more computers to share data or resources, such as a printer.
  • Network economics. Model of strategic systems at the industry level based on the concept of a network where adding another participant entails zero marginal costs but can create much larger marginal gains.
  • Network operating system (NOS). Special software that routes and manages communications on the network and coordinates network resources.
  • Networking and telecommunications technology. Physical devices and software that link various computer hardware components and transfer data from one physical location to another.
  • Neural network. Hardware or software that attempts to emulate the processing patterns of the biological brain.
  • Non-relational database management system. Database management system for working with large quantities of structured and unstructured data that would be difficult to analyze with a relational model.
  • Nonobvious relationship awareness (NORA). Technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships.
  • Normalization. The process of creating small stable data structures from complex groups of data when designing a relational database.
  • Object. Software building block that combines data and the procedures acting on the data.
  • Object-oriented development. Approach to systems development that uses the object as the basic unit of systems analysis and design.The system is modeled as a collection of objects and the relationship between them.
  • Offshore outsourcing. Outsourcing systems development work or maintenance of existing systems to external vendors in another country.
  • On-demand computing. Firms off-loading peak demand for computing power to remote, large-scale data processing centers, investing just enough to handle average processing loads and paying for only as much additional computing power as the market demands. Also called utility computing.
  • Online analytical processing (OLAP). Capability for manipulating and analyzing large volumes of data from multiple perspectives.
  • Online transaction processing. Transaction processing mode in which transactions entered online are immediately processed by the computer.
  • Open source software. Software that provides free access to its program code, allowing users to modify the program code to make improvements or fix errors.
  • Operating system. Software that manages the resources and activities of the computer.
  • Operational CRM. Customer-facing applications, such as sales force automation, call center and customer service support, and marketing automation.
  • Operational intelligence. Business analytics that delivers insight into data, streaming events and business operations.
  • Operational management. People who monitor the day-to-day activities of the organization.
  • Opt-in. Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
  • Opt-out. Model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected.
  • Organization (behavioral definition). A collection of rights, privileges, obligations, and responsibilities that are delicately balanced over a period of time through conflict and conflict resolution.
  • Organization (technical definition). A stable, formal, social structure that takes resources from the environment and processes them to produce outputs.
  • Organizational and management capital. Investments in organization and management such as new business processes, management behavior, organizational culture, or training.
  • Organizational impact analysis. Study of the way a proposed system will affect organizational structure, attitudes, decision making, and operations.
  • Organizational learning. Creation of new standard operating procedures and business processes that reflect organizations' experience.
  • Output. The distribution of processed information to the people who will use it or to the activities for which it will be used.
  • Outsourcing. The practice of contracting computer center operations, telecommunications networks, or applications development to external vendors.
  • Packet switching. Technology that breaks messages into small, fixed bundles of data and routes them in the most economical way through any available communications channel.
  • Paradigm shift. Radical reconceptualization of the nature of the business and the nature of the organization.
  • Parallel strategy. A safe and conservative conversion approach where both the old system and its potential replacement are run together for a time until everyone is assured that the new one functions correctly.
  • Particularism. Making judgments and taking action on the basis of narrow or personal characteristics, in all its forms (religious, nationalistic, ethnic, regionalism, geopolitical position).
  • Partner relationship management (PRM). Automation of the firm's relationships with its selling partners using customer data and analytical tools to improve coordination and customer sales.
  • Password. Secret word or string of characters for authenticating users so they can access a resource such as a computer system.
  • Patch. Small pieces of software to repair the software flaws without disturbing the proper operation of the software.
  • Patent. A legal document that grants the owner an exclusive monopoly on the ideas behind an invention for 20 years; designed to ensure that inventors of new machines or methods are rewarded for their labor while making widespread use of their inventions.
  • Peer-to-peer. Network architecture that gives equal power to all computers on the network; used primarily in small networks.
  • Personal area network (PAN). Computer network used for communication among digital devices that are close to one person.
  • Personalization. Ability of merchants to target marketing messages to specific individuals by adjusting the message for a person's name, interests, and past purchases.
  • PERT chart. Network diagram depicting project tasks and their interrelationships.
  • Pharming. Phishing technique that redirects users to a bogus web page, even when an individual enters the correct web page address.
  • Phased approach. Introduces the new system in stages either by functions or by organizational units.
  • Phishing. Form of spoofing involving setting up fake websites or sending email messages that resemble those of legitimate businesses that ask users for confidential personal data.
  • Pilot study strategy. A strategy to introduce the new system to a limited area of the organization until it is proven to be fully functional; only then can the conversion to the new system across the entire organization take place.
  • Pivot table. Spreadsheet tool for reorganizing and summarizing two or more dimensions of data in a tabular format.
  • Platform. Business providing information systems, technologies, and services that thousands of other firms in different industries use to enhance their own capabilities.
  • Podcasting. Publishing audio broadcasts via the Internet so that subscribing users can download audio files onto their personal computers or portable music players.
  • Portal. Web interface for presenting integrated personalized content from a variety of sources. Also refers to a website service that provides an initial point of entry to the web.
  • Portfolio analysis. An analysis of the portfolio of potential applications within a firm to determine the risks and benefits, and to select among alternatives for information systems.
  • Post-implementation audit. Formal review process conducted after a system has been placed in production to determine how well the system has met its original objectives.
  • Predictive analytics. The use of data mining techniques, historical data, and assumptions about future conditions to predict outcomes of events, such as the probability a customer will respond to an offer or purchase a specific product.
  • Predictive search. Part of a search alogrithm that predicts what a user query is looking as it is entered based on popular searches.
  • Price discrimination. Selling the same goods, or nearly the same goods, to different targeted groups at different prices.
  • Price transparency. The ease with which consumers can find out the variety of prices in a market.
  • Primary activities. Activities most directly related to the production and distribution of a firm's products or services.
  • Primary key. Unique identifier for all the information in any row of a database table.
  • Privacy. The claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state.
  • Private cloud. A proprietary network or a data center that ties together servers, storage, networks, data, and applications as a set of virtualized services that are shared by users inside a company.
  • Private exchange. Another term for a private industrial network.
  • Private industrial networks. Web-enabled networks linking systems of multiple firms in an industry for the coordination of trans-organizational business processes.
  • Process specifications. Describe the logic of the processes occurring within the lowest levels of a data flow diagram.
  • Processing. The conversion, manipulation, and analysis of raw input into a form that is more meaningful to humans.
  • Product differentiation. Competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors.
  • Production. The stage after the new system is installed and the conversion is complete; during this time the system is reviewed by users and technical specialists to determine how well it has met its original goals.
  • Production or service workers. People who actually produce the products or services of the organization.
  • Profiling. The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals.
  • Program-data dependence. The close relationship between data stored in files and the software programs that update and maintain those files. Any change in data organization or format requires a change in all the programs associated with those files.
  • Programmers. Highly trained technical specialists who write computer software instructions.
  • Programming. The process of translating the system specifications prepared during the design stage into program code.
  • Project. Planned series of related activities for achieving a specific business objective.
  • Project management. Application of knowledge, tools, and techniques to achieve specific targets within a specified budget and time period.
  • Project portfolio management. Helps organizations evaluate and manage portfolios of projects and dependencies among them.
  • Protocol. A set of rules and procedures that govern transmission between the components in a network.
  • Prototype. The preliminary working version of an information system for demonstration and evaluation purposes.
  • Prototyping. The process of building an experimental system quickly and inexpensively for demonstration and evaluation so that users can better determine information requirements.
  • Public cloud. A cloud maintained by an external service provider, accessed through the Internet, and available to the general public.
  • Public key encryption. Uses two keys: one shared (or public) and one private.
  • Public key infrastructure (PKI). System for creating public and private keys using a certificate authority (CA) and digital certificates for authentication.
  • Pull-based model. Supply chain driven by actual customer orders or purchases so that members of the supply chain produce and deliver only what customers have ordered.
  • Push-based model. Supply chain driven by production master schedules based on forecasts or best guesses of demand for products, and products are "pushed" to customers.
  • Quantum computing. Use of principles of quantum physics to represent data and perform operations on the data, with the ability to be in many different states at once and to perform many different computations simultaneously.
  • Query language. Software tool that provides immediate online answers to requests for information that are not predefined.
  • Radio frequency identification (RFID). Technology using tiny tags with embedded microchips containing data about an item and its location to transmit short-distance radio signals to special RFID readers that then pass the data on to a computer for processing.
  • Ransomware. Malware that extorts money from users by taking control of their computers or displaying annoying pop-up messages.
  • Rapid Application Development (RAD). Process for developing systems in a very short time period by using prototyping, state-of-the-art software tools and close teamwork among users and systems specialists.
  • Rationalization of procedures. The streamlining of standard operating procedures, eliminating obvious bottlenecks, so that automation makes operating procedures more efficient.
  • Record. A group of related fields.
  • Referential integrity. Rules to ensure that relationships between coupled database tables remain consistent.
  • Relational DBMS. A type of logical database model that treats data as if they were stored in two-dimensional tables. It can relate data stored in one table to data in another as long as the two tables share a common data element.
  • Repetitive stress injury (RSI). Occupational disease that occurs when muscle groups are forced through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads.
  • Request for proposal (RFP). A detailed list of questions submitted to vendors of software or other services to determine how well the vendor's product can meet the organization's specific requirements.
  • Responsibility. Accepting the potential costs, duties, and obligations for the decisions one makes.
  • Responsive web design. Ability of a website to automatically change screen resolution and image size as a user switches to devices of different sizes, such as a laptop, tablet computer, or smartphone. Eliminates the need for separate design and development work for each new device.
  • Revenue model. A description of how a firm will earn revenue, generate profits, and produce a return on investment.
  • Richness. Measurement of the depth and detail of information that a business can supply to the customer as well as information the business collects about the customer.
  • Risk assessment. Determining the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. Used to determine the cost/benefit of a control.
  • Risk aversion principle. Principle that one should take the action that produces the least harm or incurs the least cost.
  • Router. Specialized communications processor that forwards packets of data from one network to another network.
  • Routines. Precise rules, procedures and practices that have been developed to cope with expected situations.
  • RSS. Technology using aggregator software to pull content from websites and feed it automatically to subscribers' computers.
  • Safe harbor. Private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement.
  • Sales revenue model. Selling goods, information, or services to customers as the main source of revenue for a company.
  • Sarbanes-Oxley Act. Law passed in 2002 that imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.
  • Scalability. The ability of a computer, product, or system to expand to serve a larger number of users without breaking down.
  • Scope. Defines what work is and is not included in a project.
  • Scoring model. A quick method for deciding among alternative systems based on a system of ratings for selected objectives.
  • Search costs. The time and money spent locating a suitable product and determining the best price for that product.
  • Search engine. A tool for locating specific sites or information on the Internet.
  • Search engine marketing. Use of search engines to deliver in their results sponsored links, for which advertisers have paid.
  • Search engine optimization (SEO). The process of changing a website's content, layout, and format in order to increase the ranking of the site on popular search engines and to generate more site visitors.
  • Secure Hypertext Transfer Protocol (S-HTTP). Protocol used for encrypting data flowing over the Internet; limited to individual messages.
  • Secure Sockets Layer (SSL). Enables client and server computers to manage encryption and decryption activities as they communicate with each other during a secure web session.
  • Security. Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
  • Security policy. Statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
  • Semantic search. Search technology capable of understanding human language and behavior.
  • Semi-structured decisions. Decisions in which only part of the problem has a clear-cut answer provided by an accepted procedure.
  • Senior management. People occupying the topmost hierarchy in an organization who are responsible for making long-range decisions.
  • Sensitivity analysis. Models that ask "what-if" questions repeatedly to determine the impact of changes in one or more factors on the outcomes.
  • Sentiment analysis. Mining text comments in an email message, blog, social media conversation, or survey form to detect favorable and unfavorable opinions about specific subjects.
  • Server. Computer specifically optimized to provide software and other resources to other computers over a network.
  • Service level agreement (SLA). Formal contract between customers and their service providers that defines the specific responsibilities of the service provider and the level of service expected by the customer.
  • Service-oriented architecture (SOA). Software architecture of a firm built on a collection of software programs that communicate with each other to perform assigned tasks to create a working software application
  • Shopping bot. Software with varying levels of built-in intelligence to help electronic commerce shoppers locate and evaluate products or service they might wish to purchase.
  • Six sigma. A specific measure of quality, representing 3.4 defects per million opportunities; used to designate a set of methodologies and techniques for improving quality and reducing costs.
  • Smart card. A credit-card-size plastic card that stores digital information and that can be used for electronic payments in place of cash.
  • Smartphone. Wireless phone with voice, text, and Internet capabilities.
  • Sniffer. Type of eavesdropping program that monitors information traveling over a network.
  • Social business. Use of social networking platforms, including Facebook, Twitter, and internal corporate social tools, to engage employees, customers, and suppliers.
  • Social CRM. Tools enabling a business to link customer conversatins, data, and relationships from social networking sites to CRM processes.
  • Social engineering. Tricking people into revealing their passwords by pretending to be legitimate users or members of a company in need of information.
  • Social graph. Map of all significant online social relationships, comparable to a social network describing offline relationships.
  • Social networking sites. Online community for expanding users' business or social contacts by making connections through their mutual business or personal connections.
  • Social search. Effort to provide more relevant and trustworthy search results based on a person's network of social contacts.
  • Social shopping. Use of websites featuring user-created web pages to share knowledge about items of interest to other shoppers.
  • Sociotechnical design. Design to produce information systems that blend technical efficiency with sensitivity to organizational and human needs.
  • Sociotechnical view. Seeing systems as composed of both technical and social elements.
  • Software as a service (SaaS). Services for delivering and providing access to software remotely as a web-based service.
  • Software-defined networking (SDN). Using a central control program separate from network devices to manage the flow of data on a network.
  • Software-defined storage (SDS). Software to manage provisioning and management of data storage independent of the underlying hardware.
  • Software localization. Process of converting software to operate in a second language.
  • Software package. A prewritten, precoded, commercially available set of programs that eliminates the need to write software programs for certain functions.
  • Spam. Unsolicited commercial email.
  • Spoofing. Tricking or deceiving computer systems or other computer users by hiding one's identity or faking the identity of another user on the Internet.
  • Spyware. Technology that aids in gathering information about a person or organization without their knowledge.
  • SQL injection attack. Attacks against a website that take advantage of vulnerabilities in poorly coded SQL (a standard and common database software application) applications in order to introduce malicious program code into a company's systems and networks.
  • Strategic transitions. A movement from one level of sociotechnical system to another. Often required when adopting strategic systems that demand changes in the social and technical elements of an organization.
  • Streaming. A publishing method for music and video files that flows a continuous stream of content to a user's device without being stored locally on the device.
  • Structure chart. System documentation showing each level of design, the relationship among the levels, and the overall place in the design structure; can document one program, one system, or part of one program.
  • Structured. Refers to the fact that techniques are carefully drawn up, step by step, with each step building on a previous one.
  • Structured decisions. Decisions that are repetitive and routine and have a definite procedure for handling them.
  • Structured knowledge. Knowledge in the form of structured documents and reports.
  • Structured Query Language (SQL). The standard data manipulation language for relational database management systems.
  • Subscription revenue model. Website charging a subscription fee for access to some or all of its content or services on an ongoing basis.
  • Supply chain. Network of organizations and business processes for procuring materials, transforming raw materials into intermediate and finished products, and distributing the finished products to customers.
  • Supply chain execution systems. Systems to manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.
  • Supply chain management systems. Information systems that automate the flow of information between a firm and its suppliers in order to optimize the planning, sourcing, manufacturing, and delivery of products and services.
  • Supply chain planning systems. Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.
  • Support activities. Activities that make the delivery of a firm's primary activities possible. Consist of the organization's infrastructure, human resources, technology, and procurement.
  • Switch. Device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
  • Switching costs. The expense a customer or company incurs in lost time and expenditure of resources when changing from one supplier or system to a competing supplier or system.
  • System testing. Tests the functioning of the information system as a whole in order to determine if discrete modules will function together as planned.
  • Systems analysis. The analysis of a problem that the organization will try to solve with an information system.
  • Systems analysts. Specialists who translate business problems and requirements into information requirements and systems, acting as liaison between the information systems department and the rest of the organization.
  • Systems design. Details how a system will meet the information requirements as determined by the systems analysis.
  • Systems development. The activities that go into producing an information systems solution to an organizational problem or opportunity.
  • Systems life cycle. A traditional methodology for developing an information system that partitions the systems development process into formal stages that must be completed sequentially with a very formal division of labor between end users and information systems specialists.
  • T lines. High-speed guaranteed service level data lines leased from communications providers, such as T-1 lines (with a transmission capacity of 1.544 Mbps).
  • Tablet computer. Mobile handheld computer that is larger than a mobile phone and operated primarily by touching a flat screen.
  • Tacit knowledge. Expertise and experience of organizational members that has not been formally documented.
  • Tangible benefits. Benefits that can be quantified and assigned a monetary value; they include lower operational costs and increased cash flows.
  • Taxonomy. Method of classifying things according to a predetermined system.
  • Teams. Formal groups whose members collaborate to achieve specific goals.
  • Teamware. Group collaboration software that is customized for teamwork.
  • Technology standards. Specifications that establish the compatibility of products and the ability to communicate in a network.
  • Telepresence. Telepresence is a technology that allows a person to give the appearance of being present at a location other than his or her true physical location.
  • Telnet. Network tool that allows someone to log on to one computer system while doing work on another.
  • Test plan. Prepared by the development team in conjunction with the users; it includes all of the preparations for the series of tests to be performed on the system.
  • Testing. The exhaustive and thorough process that determines whether the system produces the desired results under known conditions.
  • Text mining. Discovery of patterns and relationships from large sets of unstructured data.
  • Token. Physical device similar to an identification card that is designed to prove the identity of a single user.
  • Total cost of ownership (TCO). Designates the total cost of owning technology resources, including initial purchase costs, the cost of hardware and software upgrades, maintenance, technical support, and training.
  • Total quality management (TQM). A concept that makes quality control a responsibility to be shared by all people in an organization.
  • Touch point. Method of firm interaction with a customer, such as telephone, email, customer service desk, conventional mail, or point-of-purchase.
  • Trade secret. Any intellectual work or product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain.
  • Transaction costs. Costs incurred when a firm buys on the marketplace what it cannot make itself.
  • Transaction cost theory. Economic theory stating that firms grow larger because they can conduct marketplace transactions internally more cheaply than they can with external firms in the marketplace.
  • Transaction fee revenue model. An online e-commerce revenue model where the firm receives a fee for enabling or executing transactions.
  • Transaction processing systems (TPS). Computerized systems that perform and record the daily routine transactions necessary to conduct the business; they serve the organization's operational level.
  • Transborder data flow. The movement of information across international boundaries in any form.
  • Transmission Control Protocol/Internet Protocol (TCP/IP). Dominant model for achieving connectivity among different networks. Provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper addresses, and then reassembling them into coherent messages.
  • Transnational. Truly global form of business organization with no national headquarters; value-added activities are managed from a global perspective without reference to national borders, optimizing sources of supply and demand and local competitive advantage.
  • Trojan horse. A software program that appears legitimate but contains a second hidden function that may cause damage.
  • Tuple. A row or record in a relational database.
  • Two-factor authentication. Validating user identity with two means of identification, one of which is typically a physical token, and the other of which is typically data.
  • Unified communications. Integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes.
  • Unified threat management (UTM). Comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software.
  • Uniform resource locator (URL). The address of a specific resource on the Internet.
  • Unit testing. The process of testing each program separately in the system. Sometimes called program testing.
  • Unix. Operating system for all types of computers, which is machine independent and supports multiuser processing, multitasking, and networking. Used in high-end workstations and servers.
  • Unstructured decisions. Nonroutine decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition; there is no agreed-upon procedure for making such decisions.
  • User interface. The part of the information system through which the end user interacts with the system; type of hardware and the series of on-screen commands and responses required for a user to work with the system.
  • User-designer communications gap. The difference in backgrounds, interests, and priorities that impede communication and problem solving among end users and information systems specialists.
  • Utilitarian principle. Principle that assumes one can put values in rank order of utility and understand the consequences of various courses of action.
  • Value chain model. Model that highlights the primary or support activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage.
  • Value web. Customer-driven network of independent firms who use information technology to coordinate their value chains to collectively produce a product or service for a market.
  • Virtual company. Organization using networks to link people, assets, and ideas to create and distribute products and services without being limited to traditional organizational boundaries or physical location.
  • Virtual private network (VPN). A secure connection between two points across the Internet to transmit corporate data. Provides a low-cost alternative to a private network.
  • Virtual Reality Modeling Language (VRML). A set of specifications for interactive three-dimensional modeling on the World Wide Web.
  • Virtual reality systems. Interactive graphics software and hardware that create computer-generated simulations that provide sensations that emulate real-world activities.
  • Virtualization. Presenting a set of computing resources so that they can all be accessed in ways that are not restricted by physical configuration or geographic location.
  • Visual web. Refers to web linking visual sites such as Pinterest where pictures replace text socuents and where users search on pictures and visual characteristics.
  • Voice over IP (VoIP). Facilities for managing the delivery of voice information using the Internet Protocol (IP).
  • War driving. Technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic.
  • Web 2.0. Second-generation, interactive Internet-based services that enable people to collaborate, share information, and create new services online, including mashups, blogs, RSS, and wikis.
  • Web 3.0. Future vision of the web where all digital information is woven together with intelligent search capabilities.
  • Web beacons. Tiny objects invisibly embedded in email messages and web pages that are designed to monitor the behavior of the user visiting a website or sending email.
  • Web browser. An easy-to-use software tool for accessing the World Wide Web and the Internet.
  • Web hosting service. Company with large web server computers to maintain the websites of fee-paying subscribers.
  • Web mining. Discovery and analysis of useful patterns and information from the World Wide Web.
  • Web server. Software that manages requests for web pages on the computer where they are stored and that delivers the page to the user's computer.
  • Web services. Set of universal standards using Internet technology for integrating different applications from different sources without time-consuming custom coding. Used for linking systems of different organizations or for linking disparate systems within the same organization.
  • Website. All of the World Wide Web pages maintained by an organization or an individual.
  • Wi-Fi. Stands for "wireless fidelity" and refers to the 802.11 family of wireless networking standards.
  • Wide area network (WAN). Telecommunications network that spans a large geographical distance. May consist of a variety of cable, satellite, and microwave technologies.
  • Wiki. Collaborative website where visitors can add, delete, or modify content, including the work of previous authors.
  • WiMax. Popular term for IEEE Standard 802.16 for wireless networking over a range of up to 31 miles with a data transfer rate of up to 75 Mbps. Stands for Worldwide Interoperability for Microwave Access.
  • Windows. Microsoft family of operating systems for both network servers and client computers.
  • Windows 10. Most recent Microsoft Windows client operating system.
  • Wintel PC. Any computer that uses Intel microprocessors (or compatible processors) and a Windows operating system.
  • Wireless sensor networks (WSNs). Networks of interconnected wireless devices with built-in processing, storage, and radio frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces.
  • Wisdom. The collective and individual experience of applying knowledge to the solution of problems.
  • Wisdom of crowds. The belief that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts.
  • World Wide Web. A system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment.
  • Worms. Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
  • Zero-day vulnerabilities. Security vulnerabilities in software, unknown to the creator, that hackers can exploit before the vendor becomes aware of the problem.