Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay Business information systems technology developments and management for the e business 5th by bocij and greaslay
www.downloadslide.com Business Information Systems www.downloadslide.com www.downloadslide.com Business Information Systems Technology, Development and Management for the E-Business Fifth edition Paul Bocij, Andrew Greasley and Simon Hickie www.downloadslide.com PEARSON EDUCATION LIMITED Edinburgh Gate Harlow CM20 2JE United Kingdom Tel: +44 (0)1279 623623 Web: www.pearson.com/uk First published 1999 (print) Second edition published 2003 (print) Third edition published 2006 (print) Fourth edition published 2008 (print) Fifth edition published 2015 (print and electronic) © Pearson Education Limited 2015 (print and electronic) The rights of Paul Bocij, Andrew Greasley and Simon Hickie to be identified as authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988 The print publication is protected by copyright Prior to any prohibited reproduction, storage in a retrieval system, distribution or transmission in any form or by any means, electronic, mechanical, recording or otherwise, permission should be obtained from the publisher or, where applicable, a licence permitting restricted copying in the United Kingdom should be obtained from the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS The ePublication is protected by copyright and must not be copied, reproduced, transferred, distributed, leased, licensed or publicly performed or used in any way except as specifically permitted in writing by the publishers, as allowed under the terms and conditions under which it was purchased, or as strictly permitted by applicable copyright law Any unauthorised distribution or use of this text may be a direct infringement of the authors’ and the publisher’s rights and those responsible may be liable in law accordingly All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners The screenshots in this book are reprinted by permission of Microsoft Corporation Pearson Education is not responsible for the content of third-party internet sites The Financial Times With a worldwide network of highly respected journalists, The Financial Times provides global business news, insightful opinion and expert analysis of business, finance and politics With over 500 journalists reporting from 50 countries worldwide, our in-depth coverage of international news is objectively reported and analysed from an independent, global perspective To find out more, visit www.ft.com/pearsonoffer ISBN: 978-0-273-73645-5 (print) 978-0-273-73646-2 (PDF) 978-0-273-78045-8 (eText) British Library Cataloguing-in-Publication Data A catalogue record for the print edition is available from the British Library Library of Congress Cataloging-in-Publication Data Bocij, Paul Business information systems : technology, development and management for the e-business / Paul Bocij, Andrew Greasley and Simon Hickie – Fifth edition pages cm Includes bibliographical references and index ISBN 978-0-273-73645-5 (print) – ISBN 978-0-273-73646-2 (PDF) – ISBN 978-0-273-78045-8 (eText) Business – Computer network resources Business information services Electronic commerce I Greasley, Andrew II Hickie, Simon III Title HF54.56.B63 2015 658.4’038011–dc23 2014030404 10 9 8 7 6 5 4 3 2 18 17 16 15 14 Cover image: © vs 148/Shutterstock Print edition typeset in 10/12pt Minion Pro Regular by 73 Print edition printed and bound in Slovakia by Neografia NOTE THAT ANY PAGE CROSS REFERENCES REFER TO THE PRINT EDITION www.downloadslide.com The authors would like to dedicate this book to Lin Mellor, teacher, mentor and colleague A consummate professional and example to educators everywhere To Clare, without whom my contribution would never have happened From Simon To my wife, Mik From Paul www.downloadslide.com This page intentionally left blank www.downloadslide.com Brief contents Preface xv Guided tour xxii Plan of the book xxiv About the authors xxv Authors’ acknowledgements xxvi Publisher’s acknowledgements xxvii Part INTRODUCTION TO BUSINESS INFORMATION SYSTEMS chapter Basic concepts – understanding information chapter Basic concepts: an introduction to business information systems 35 chapter Hardware and software 65 chapter databases and business intelligence 145 chapter networks, telecommunications and the Internet 177 chapter enterprise and functional BIS 217 Part BUSINESS INFORMATION SYSTEMS DEVELOPMENT chapter an introduction to acquiring and developing BIS 263 chapter Initiating systems development 293 chapter BIS project management 319 chapter 10 Systems analysis 349 chapter 11 Systems design 391 chapter 12 System build, implementation and maintenance: change management 439 Part BUSINESS INFORMATION SYSTEMS MANAGEMENT chapter 13 Information systems strategy 477 chapter 14 Information systems management 507 chapter 15 managing information security 539 chapter 16 end-user computing – providing end-user services 573 chapter 17 ethical, legal and moral constraints on information systems 599 Glossary 634 Index 661 www.downloadslide.com This page intentionally left blank www.downloadslide.com contents in detail e-business systems 46 enterprise systems 49 BIS and strategic advantage 50 Preface xv Guided tour xxii Plan of the book xxiv about the authors xxv authors’ acknowledgements xxvi Publisher’s acknowledgements xxvii Case study 2.1: PayPal eyes in-store retail customers 51 Mini case study: Capital One develops information leadership 56 Case study 2.2: Corporate IT falling short of potential 57 Part INTRODUCTION TO BUSINESS INFORMATION SYSTEMS Summary 58 Exercises 59 References / Further reading / Web links 61 Basic concepts – understanding information Hardware and software Links to other chapters Learning outcomes / Management issues Introduction data and information creating information Qualities of information 11 Case study 1.1: Technology sponsors a complementary form of capitalism 14 knowledge and wisdom 15 The business environment 16 managerial decision making 18 Case study 1.2: Dealing with the data deluge Focus on knowledge management 27 Summary 29 Exercises 29 References / Further reading / Web links 65 Links to other chapters 64 Learning outcomes / Management issues 65 Introduction 66 components of a computer system 66 major categories of computers 67 Case study 3.1: Mainframes are thriving in a cloud world 68 Types of microcomputers 71 Input devices 75 23 Mini case study: Optical mark recognition output devices 81 Focus on printers 84 Storage devices 87 Processors 93 77 Basic concepts: an introduction to business information systems 35 Case study 3.2: Hertz reaps virtualisation rewards 96 Focus on managing technological change categories of software 100 document production software 104 Links to other chapters 34 Learning outcomes / Management issues 35 Introduction 36 Introduction to systems 36 different types of systems 41 Business information systems 42 resources that support BIS 43 categories of business information system 46 Case study 3.3: Business life – rise of the paperless meeting 105 Graphics packages 109 Spreadsheets 111 management applications of productivity software 115 multimedia software 116 Software for using the internet 117 31 97 www.downloadslide.com Glossary visual display unit (VDU) This is normally used to describe the monitor connected to a computer system, but can also refer to any other form of display device will always see preceding the web address of a company) For example, http://www.derby.ac.uk defines the university home page at Derby visualisation This describes a variety of methods used to produce graphical representations of data so that they can be examined from a number of different perspectives web directories or catalogues Web directories provide a structured listing of web sites They are grouped according to categories such as business, entertainment or sport Each category is then subdivided further, for example into football, rugby, swimming, etc voice annotations These can be described as spoken notes or reminders that can be inserted into data files, such as word processing documents Annotations are created and played back via a sound card See sound card voice–data integration Sometimes known as computer telephony A combination of different communications technologies that provide a range of sophisticated facilities, for example automated call-switching, telephone answering services and fax-on-demand See fax-on-demand voice modem Voice modems offer greater flexibility than conventional modems by combining voice, fax and data facilities At a simple level, a voice modem can be used as a speaker phone or answering machine voice recognition This describes the facility to control a computer program or carry out data entry through spoken commands The user issues instructions via a microphone connected to a sound card Specialised software then attempts to interpret and execute the instruction given VoIP (Voice over IP) A relatively recent technology that enables users to make and receive telephone calls via the Internet volatile memory The memory found in a personal computer is considered volatile, that is, anything held in memory is lost once the power to the computer system is switched off However, non-volatile memory retains its contents until altered or erased volume testing Testing assesses how system performance will change at different levels of usage W walk-through A user executes their actions through using a system or mock-up wax printers Printers which employ a ribbon with a coloured wax coating to form images by heating sections of the ribbon and pressing it against the paper (dye-sublimation) web addresses Web addresses refer to particular pages on a web server which are hosted by a company or organisation The technical name for these is ‘uniform resource locators’, so you often see them referred to as ‘URLs’ web browsers Browsers such as Netscape Navigator and Microsoft Explorer provide an easy method of accessing and viewing information stored as web documents on different servers The web pages stored as HTML files on the servers are accessed through a particular standard supported by the web browsers (this is the hypertext transfer protocol (http), which you web servers Web servers such as Microsoft Internet Information Server are used to store the web pages accessed by web browsers They may also contain databases of customer or product information which can be queried and retrieved from the browser what if? analysis This describes the ability to see the predicted effect of a change made to a numerical model See modelling and spreadsheet wide-area network (WAN) These networks cover a large area to connect businesses in different parts of the same city, different parts of a country or different countries WIMP (windows, icons, mouse and pull-down menus) Often used to describe a GUI (graphical user interface) environment wireless application protocol (WAP) WAP is a technical standard for transferring information to wireless devices, such as mobile phones wireless markup language (WML) Standard for displaying mobile pages such as transferred by WAP word processor A word processor provides the ability to enter, edit, store and print text In addition, word processing packages allow users to alter the layout of documents and often provide a variety of formatting tools word wrap In a word processor, as users type text and move towards the end of a line, the program automatically moves to the beginning of a new line work breakdown structure (WBS) This is a breakdown of the project or a piece of work into its component parts (tasks) workbook In a spreadsheet program, this describes a collection of worksheets workflow management (WFM) Systems for the automation of the movement and processing of information in a business according to a set of procedural rules workgroup A workgroup can be defined as a group of individuals working together on a given task Each member of the workgroup will be attached to the organisation’s network system so that tasks can be organised and information can be shared with other members worksheet An individual area or sheet for entering data in a spreadsheet program workstation This describes a powerful terminal or personal computer system, usually applied to specialised applications, such as computer-aided design (CAD) and animation 659 www.downloadslide.com 660 Glossary World Wide Web The World Wide Web is a medium for publishing information on the Internet It is accessed through web browsers which display web pages and can be used to run business applications Company information is stored on web servers which are usually referred to as ‘web sites’ worm (virus) A worm is a small program that moves through a computer system randomly changing or overwriting pieces of data as it moves WORM (write once, read many) A WORM (write once, read many) storage device allows data to be written only once Once the data have been written, they cannot be changed or erased X XML (extensible markup language) XML describes a standard for creating documents that can store almost any kind of data XML is extremely flexible since it offers the ability to create new language elements – or whole new languages – using standard XML elements XML is seen as a key technology in the area of business-to-business communications since it provides a simple and effective way for organisations to share data XML is also seen as a key technology for areas such as e-commerce and distributed databases Finally, XML forms part of Microsoft’s Net strategy, which is intended to shape the future of operating systems, applications software, software development and the use of the Internet Z zero administration In a network system, zero administration describes a point where the centralised management and control of the computers attached to a network server makes administration costs almost negligible Zero administration is often associated with network computers See network computer zombie A type of Trojan capable of taking full or partial control of a computer when activated by the author Zombie computers are usually organised into large networks (called botnets) so that their combined resources can be used to send spam or launch distributed denial-of-service attacks www.downloadslide.com Index Index note: page numbers in Bold indicate Glossary entries 2.5G (General Packet Radio Service, GPRS) 207, 644 3Com 204 3G mobile services 207 3M 158 4G mobile services 207 A accelerated processing unit (APU) 95 acceptable use policies 579 access control systems see user validation access time (for storage devices) 92, 634 accounting information systems 253–5 accounting packages 255 Ackoff, Russell acquiring a system 263–88, 635, 645 bespoke development 265–6, 274–82 choices and methods 305–13 drivers for IS acquisition 264–5 factors affecting software acquisition 267–9 methods of IS software acquisition 265–7 off-the-shelf purchase 266, 282–5 selecting the supplier and software 306–13 systems development lifecycle (SdLC) 269–74 techniques for comparing systems 306–13 user developed software 266–7, 285–6 active content 634 active data warehousing (AdW) 156–7 Active-x 634 actors 634 ad clicks 634 Adaptive Software development (ASd) 279 adaptive systems 36–7, 42, 634 address book (for e-mail) 121, 634 Adobe Acrobat 28 Adobe Flash 128 adoption levels 634 adware 560–1 affiliate marketing 131 agent 634 agile development 279–80, 358–9 Agile Unified Process (AUP) 279 AI (artificial intelligence) 247–8, 566, 635 Ajax 128 alias (for e-mail) 120, 634 alpha release 452, 634 alpha testing 452, 634 Amazon 131, 132, 133, 160, 197, 550 Amazon Kindle 73 AMd 93–4, 95 Amdahl 67 analogue data 186, 634 analysis see systems analysis analytical cognitive style 19–20 Anderson, Chris 132 Android operating system 72, 73 Andy’s Bonsai Company (ABC) case study 384–6 annotation 634 Anti-terrorism, Crime and Security Act (2001) 623 anti-virus software 558, 634 Apache 135 APM Group 322 app stores 73 Apple iOS operating system 72, 73 Apple iPad 71, 72, 105–7, 158 Apple iTunes 132, 625 Apple Mackintosh computers 71, 634 Apple Siri 73 applets 124, 634 Application Programming Interfaces (APIs) 128 application service providers (ASPs) 136–7, 629, 634 application-specific software 104 applications backlog 587, 634 applications generator 634 applications portfolio 480, 490, 635 applications software 102–4 Argos 577 Arm Holdings 95 artificial intelligence (AI) 247–8, 566, 635 Asian mobile chat services 211–12 assembly language 635 Asus 72 asymmetric digital subscriber line (AdSL) 186, 635 asynchronous exchange of information 237, 635 attachments (e-mail) 121 attribute (in a database) 412 attributes of information quality 11–14, 635 audits 550, 552, 635 autoresponder 635 B B&Q 198 back door access to an information system 544, 635 backbones (communication links) 195, 635 backup procedures 554–6 backup site 550, 635 balanced scorecard tool 167–8, 498–9, 635 bandwidth 635 Bank of America 158 banner 635 bar-code readers 78, 635 bar codes 78, 635 Barclays Bank 162, 449 Barnes & noble nook series 73 batch data processing 422–3, 635 baud 187, 635 Beaverbrooks the Jewellers 393 benchmarks 307, 635 benefits-based testing 447 Berners Lee, Tim 205 bespoke development 265–6, 274–82, 383, 635 beta release 452, 635 beta testing 452, 635 www.downloadslide.com 662 Index big-bang (immediate cutover) method 453, 455, 635 big data 23–4, 157–9 biometric controls 551 BIOS (basic input/output system) 635 BIS see business information systems bit 88, 635 bit-map images 110, 636 BlackBerry 211, 550 blogs (web logs) 128 Bluetooth 190, 636 BMMSoft 154 Boehm, B 655 booking systems 79 bookmarks (in web browsers) 123, 636 botnets 560, 613, 636 see also zombie bots 560, 636 see also zombie bottom-up design 396, 636 boundary of a system 37–8, 636 brainstorming 356–8, 636 brand abuse 563, 636 bridges (data transmission) 187 British Computer Society (BCS) 601–3, 607, 636 British Standards Institute (BSI) 14 broadband services 186–7, 636 Brother 85 browser cache 637 bubble jet printer 636 bugs in software 441–2, 636 build phase see system build builds and release versions 452 bulk emailer 636 bullwhip effect 226–7 bureaucratic form of organisation 19 bus width 93, 636 business activity monitoring (BAM) software 168–9, 636 business-aligning IS strategy 495, 636 business analytics 153, 162–72 business continuity planning 550 business environment, influence of 16–18 business-impacting IS strategy 495, 636 business information systems (BIS) 636 acquisition see acquiring a system and strategic advantage 50–6 business applications 45 categories of 46 competitive strategies 50–1 computer-based systems 44–5 definition 3, 42–3 information technology (IT) 43–4 organisational control systems 39–41 realising the potential of 57–8 supporting resources 43 using IS for strategic advantage 54–6 see also enterprise systems; management information systems; operations information systems business intelligence (BI) 28, 160–1 business intelligence (BI) systems 153–72, 636 business model 636 business process automation (BPA) 456–7, 636 business process improvement (BPI) 456–7, 636 business process management (BPM) 221, 440, 458–63, 636 business process re-engineering (BPR) 455–7, 636 business process simulation (BPS) 461–2 business resource base 17–18, 636 business rules 24–6, 636 Business Software Alliance (BSA) 624, 628, 636 business-to-business (B2B) Internet models 196–7 business-to-business (B2B) transactions 48, 636 business-to-consumer (B2C) Internet models 196–7 business-to-consumer (B2C) transactions 48, 636 business-to-government (B2G) transactions 48 buy-side e-commerce 636 bytes 88, 636 C cable modems 187, 637 cache (browser) 123, 637 cache memory 91, 637 CAD/CAM systems 245 call centres 637 candidate key 412, 416–17 Canon 85 capacity loading graphs 341–2, 637 Capgemini 158 Capital One 56 CCTV 79, 80, 610 CD (compact disc) 90, 92–3, 624, 638 CD-R (CD-recordable) 637 CD-ROM 637 CDRW 637 central processing unit (CPU) 66, 93–7, 637, 648 centralised IS management 514–15, 637 Cerf, Vince 203 CGI (common gateway interface) 637 change management 450–68 change (modification) requests 450–1, 637 changeover methods 452–5, 637 channels 637 Chatworth’s Farm Shop 198 Checkland, Peter 379, 380 checksum digits 427, 558, 637 chip theft 637 Chrome browser 135 Chrome operating system 71 Chromebooks 71, 72, 637 CISC processors 637 Cisco 204 clickstream analysis 160 client/server architecture 70, 637 client/server model of computing 181–4, 402–4, 637 clock speed of a processor 93 close-coupled systems 38 closed-loop control systems 40–1 closed questions 353, 637 closed systems 38, 637 cloud computing 130–1, 484–5, 550 COBIT (Control Objectives for Information and related Technology) 298, 527–32, 639 COBOL 440 Coca-Cola 158 Codd, Dr E 649 codes of conduct 601–3, 637 cognitive style 19–20, 637 Cohen, Fred 556 command line interpreter (CLI) 101, 637 comma-separated values (CSV) file 114, 637 commercial languages 638 commoditisation 56, 638 common gateway interface (CGI) 637 communication formal and informal 10–11 groupware 236, 237–8, 239 monitoring of 610–11 compact disc see CD compatibility of software 310 competitive advantage 50–6, 296, 524–6, 638 competitive intelligence (CI) 29 competitive strategies 50–1, 485, 488 compiler 638 composite key 412 compound key (in a relational database) 149–50, 638 computer-aided design (CAD) 71, 244, 245, 638 computer-aided manufacture (CAM) 245, 638 computer-aided software engineering (CASE) tools 384, 430, 441, 638 computer-based information systems 3, 44–5, 638 computer categories 67–74 computer crime 612–13 see also cybercrime computer criminals 612, 638 www.downloadslide.com Index computer-integrated manufacture (CIM) 245 computer-integrated telephony (CIT) 253 computer-mediated communication (CMC) software 237 computer memory 67, 90–2, 648 Computer Misuse Act (1990) 605, 616–18, 638 computer monitoring 610, 638 computer network 177–81, 638 computer output to microfilm (COM) 83, 638 computer system 66–7, 638 computer telephony see voice–data integration computer viruses 548, 556–9, 638 conceptual resources (intangible assets) 17–18, 638 configuration management 452, 638 constructive cost model (COCOMO) 329–30, 638 consumer-to-consumer (C2C) transactions 48 consumers, shift towards digital services 208 contact manager applications 116, 638 containment strategy 549 content (of a web page) 638 content dimension of information 12, 638 content management systems (CMS) 133, 135, 638 context diagrams 365–6, 638 continuing professional development (CPD) 604 contracts for IS products 310–12 control (project management) 333, 648 control mechanism 37, 638 Control Objectives for Information and related Technology (COBIT) 298, 527–32, 639 control systems in organisations 39–41 cookies 618 copy protection methods for software 623–4, 639 copyright, issues related to IS 619–20 Copyright, Designs and Patents Act (1988) 619, 639 core competencies 639 corporate IT, realising the potential of 57–8 corporate stalking 639 cost–benefit analysis 299–301 cost-effective delivery of IS services 575–6 cost leadership strategy 50–1 cost of ownership 639 cost per megabyte (storage devices) 92, 639 cost per page (printers) 86, 639 countermediation 639 coupling (linkage) between subsystems 38–9, 639 CPM (cost for advertising) 639 CPU (central processing unit) 66, 93–7, 637, 648 crackers (unauthorised access) 546, 639 Creative Commons licences 136 crime and technology 612–13 see also cybercrime Criminal Damage Act (1971) 617 critical activities 639 critical path 338, 639 critical path method (CPM) 338–40, 639 critical success factors (CSFs) 298, 486, 494–5, 529, 639 critical systems see mission-critical applications; safety-critical systems cross-licensing agreements 621, 639 cross-marketing 160 cube analysis 164–5 culture of an organisation 465–6 customer relationship management (CRM) 49, 218, 231–2, 639 customer value 639 customers demands and IT change 501–2 getting rid of ‘devil customers’ 154–5 locking in 55 cybercrime, targets and costs 540–4, 547–8, 561–2 cyberfraud 613 cybermall 639 cybernetic systems 42 cyberslacking 577–8, 615, 639 cyberspace 639 see also Internet cybersquatting 206, 563, 639 cyberstalking 564, 639 cyberterrorism 564, 639 cyberweapons 542 D daisywheel printer 639 dashboards (digital dashboards) 166–7 data 6–8, 639 units of measurement 88–9 data cube 164–5 data deluge, dealing with 23–4 data dictionary 410, 639 data entry form 151, 639 data, information, knowledge, wisdom (DIKW) model 6–7 data marts 153, 154, 156–7, 639 data migration 443, 640 data mining 28, 153, 159–60, 640 data modelling 396, 397, 640 data processes 8–9, 640 data processing 45, 640 data processing (DP) department 489–90, 640 data projectors 82 Data Protection Act (1984, 1998) 613–16, 640 data theft 545–6, 613, 640 data-transfer protocols 204 data transfer rate 92, 640 data validation 426–7, 640 data views 640 data warehouses 153–9, 640 database management systems (DBMS) 148–50, 640 database software 151–2 databases 145–52, 405–7, 640 see also relational databases dataflow diagrams (DFDs) 359, 366–72, 640 dataveillance 609, 640 decentralised IS management 514–15, 640 decision behaviour 8, 19–20, 640 decision making, managerial 18–27 decision-making process 22–7 decision-making theory 24–7 decision support systems (DSS) 245, 246–9, 640 decision tables 24–7, 640 decision trees 24–6, 640 decision types 246 decoupled systems or subsystems 38–9 Defamation Act (1996) 623 deleting a file 558, 640 deletion anomalies 412, 413–14, 415–16, 418, 419, 640 Dell Computer 198, 298 denial of service (DoS) attacks 540, 547, 560, 562, 613, 640 departmental applications 250–5 deployment plan 455, 640 design phase see systems design design strategy 394–5 desktop computers 71, 640 desktop publishing 104–5 detailed design 641 determinant 412 deterministic systems 41 deterrence strategy 549 developer tests 445–6 development programs 102, 103, 641 diagramming software 110 dial-up networking (DUN) 186, 641 dialog box interface 423–4, 641 Digital 516 digital audio tape (DAT) 641 663 www.downloadslide.com 664 Index digital camera 641 digital certificates 641 digital dashboards 166–7, 639 digital data 186, 641 digital divide in society 608–9 digital ID 124, 641 digital versatile disc see DVD DIKW (data, information, knowledge, wisdom) model 6–7 direct capture of data 75, 641 direct file access 421, 422, 641 disaster recovery companies 641 disaster recovery planning 550 discounted cash flow (DCF) 511 disintermediation 196–8, 199–200, 641 disk image files 558–9 display devices 82 disrationalia (smart people making errors) 605–6 docking station 72 document image processing (DIP) 28, 77, 238, 239, 641 document management 105 document production software 104–9 documentation 10, 334, 447–8, 641 documentation review 355–6, 641 domain names 205–6, 641 dongle 624, 641 dot-matrix printer 641 dot-pitch 641 dots per inch (DPI) 86, 641 Dougherty, Dale 126 downstream customers 225–6 drawing programs 110 drill-down feature (levels of data) 250 Drupal 133, 135 dual-core processors 94 duty cycle (printers) 87, 641 DVDs (digital versatile discs) 90, 92–3, 624, 641 DVLA 577 dynamic systems development methodology (DSDM) 279, 280–2, 641 dynamic web page 203, 641 E e-book readers 73 e-business (electronic business) 18, 46–9, 196–202, 642 e-commerce (electronic commerce) 18, 47–8, 449, 642 e-government 48 e-mail (electronic mail) 117, 118–22, 642 legislation on slander and libel 564, 623 spam 120, 618, 623, 655 video e-mail (v-mail) 79 e-procurement 48 e-tailing 49, 642 e-waste (electronic waste) 622 early adopters 641 eBay 51–2 Echelon surveillance system 611 economic feasibility 297, 299–301, 641 economy, impacts of IT 14–15 editing in word processors 107, 642 EDS 516 EE 207 effort time 327–8, 642 EISA (Extended Industry Standard Architecture) 642 elapsed time 327–8, 642 electronic business see e-business electronic commerce see e-commerce Electronic Commerce (EC Directive) Regulations (2002) 623 Electronic Communications Act (2000) 623 electronic data interchange (EDI) 208–10, 642 electronic document management software (EDMS) 642 electronic eavesdropping 617–18, 642 electronic funds transfer (EFT) 208–9, 642 electronic mail see e-mail electronic meeting systems 642 electronic point-of-sale (EPOS) systems 227 electronic publishing systems 642 Emma Maersk 231 employees abuse of Internet resources 563–4 duties and responsibilities 603–6 level of access to the Internet 576–9 monitoring of communications 579 skilling versus deskilling 607–8 use of e-mail 615 employment, impacts of technology 607 encryption techniques 555 end-user computing (EUC) 579–81, 591–2, 642 end-user development (EUD) of applications 574, 585–91, 642 see also user end-user IS services 574–5 end-user IT services 642 end-user services 573–93 see also user end-user tests 446–7 enterprise application integration (EAI) 240, 267, 428 enterprise resource planning (ERP) systems 49, 218, 221–5 enterprise systems (ES) 49–50, 217–33 entity, definition 373 entity relationship diagrams (ERDs) 359, 372–9 entry barriers 54–5 environment, influence on business organisations 16–18 environment of a system 37–8, 642 EPROM (erasable programmable read-only memory) 91, 642 Epson 85 erasing a file 558, 642 ergonomic keyboards 76 error rate 81, 642 errors, made by smart people 605–6 errors per 1000 lines of code (KLOC) 442, 642 estate agent model 199–200 estimation (in project management) 326–30, 642 ethics 600, 642 European Foundation for Quality Management (EFQM) 326 EU-US Safe Harbor agreement 615 executive information systems (EIS) 245, 250, 642 executive support systems (ESS) 250 expansion cards 642 Expedia 160 expert systems 248–9, 642 explicit knowledge 16, 642 export of data 443, 643 exporting files 109 extensible markup language see XML extortion 563 extraction, transformation and load (ETL) software 156 extranets 200–2, 643 F Facebook 129, 130–1, 158, 187, 211, 577, 578, 609 facilities management (FM) 516 facility design 243 failure controls 552 fat client model 403, 657 fax-modem 643 fax-on-demand 643 Fayol, Henri 18–19 feasibility assessment 270–1 feasibility assessment context 270–1 feasibility study 294, 297–313, 643 Federation Against Software Theft (FAST) 627, 628, 643 feedback control 40, 643 feedback mechanism 36, 37, 643 feedforward control 40–1, 643 Fidor Bank 130–1 field (in a database) 405–7, 643 fifth normal form (5NF) 419 www.downloadslide.com Index file access methods 421, 422 file attachments (e-mail) 121, 643 file encryption 553 file index 421, 422 file-processing databases 148 files deleting 558, 640 erasing 558, 642 filter (in a spreadsheet or database) 152, 643 filtering software 579 filters (photo-editing software) 11 financial activities, accounting information systems 253–5 financial applications of spreadsheets 111 Financial Conduct Authority (FCA), monitoring trading activities 162–3 financial EDI 643 financial management 49, 218 financial modelling packages 255 Firefly 649 Firefox browser 135 firewalls 187, 202, 561, 566, 643 firewire 643 first normal form (1NF) 414–16, 643 five forces model (Porter and Millar) 54–6, 485, 486–8, 651 Flash applications 128 flash memory 89–90, 92 flat-file databases 148, 643 flexible manufacturing systems (FMS) 232, 245, 643 floppy disk 643 flow process charts 397–8 fonts 108, 643 foreign key fields (in a relational database) 149–50, 412, 643 form (for on-screen data entry) 423–4, 643 form dimension of information 12, 13, 643 formal communication 10–11, 643 formal security policies 552–3 formulas (in a spreadsheet) 112–13, 643 fourth normal form (4NF) 419 fraud online 564–5 free-form databases 148, 643 Freedom of Information Act (2000) 622 FTP (file transfer protocol) 204, 643 full backup 555, 644 function (in a spreadsheet) 112–13, 644 function point analysis 329–30, 644 functional dependency 412, 416–18 functional testing 446, 644 functionality of software 309, 644 G Gantt charts 340–1, 644 Gates, Bill General Electric (GE) 158 general purpose applications 103–4 geographical information systems (GIS) 169–72, 644 Gerstner, Lou 46 GIF (graphics interchange format) 644 gigabyte (Gb) 88, 644 global business 644 global top-level domain (gTLD) 641 GNU General Public Licence (GNU GPL) 135, 136 goal seeking (statistical analysis) 111, 644 gold release 452 Goodnight, Jim 444 Google 127, 129, 160, 211 Google AdWords 131–2 Google Android operating system 72, 73 Google Chrome operating system 71 Google Play 73 Google Street View 609–10 governance of information technology (IT) 527–32 GPRS (General Packet Radio Service) (2.5G) 207, 644 grandfather, father, son backup method 554–5, 644 graphical user interface (GUI) 76, 101–2, 644, 659 graphics accelerator card 644 graphics packages 109–11 graphics processing unit (GPU) 95 graphics tablets 76, 644 green computing 95, 644 group decision support systems (GDSS) 246 groupware 236, 237–8, 239, 644 GUI see graphical user interface H hackers 546–7, 612, 644 hacktivists 547 Halifax Bank 498 hard (quantitative) data 19, 652 hard disks 89, 90, 92–3, 644 hard systems 42 hardware 66–7, 97–100, 644 Health and Safety at Work Act (1974) 605 help desk 574, 581–5, 592–3 Hertz 96–7 heuristics 558 Hewlett-Packard 70, 72, 85, 189 hierarchical databases 150 hierarchical systems 39, 644 hierarchy of strategies 478, 644 high-speed mobile services 207 Hitachi 67 hits (on a web page) 644 hot plugging 644 hotspots (for Wi-Fi) 191, 644 house style for documentation 10 HTML (hypertext markup language) 13, 122, 124–5, 202, 206, 644 HTTP (hypertext transfer protocol) 204, 205, 652 hubs 187 human activity systems 379, 644 human capital management 49, 218 human–computer interaction (HCI) design 423, 644 human resource management (HRM) information systems 250–2 Human Rights Act (1998) 614, 622 Human Rights Act (2000) 614 hybrid disk drives 89, 644 hyperlinks 202, 644 hypertext 644, 122 hypertext databases 148, 644 I IBM 46, 67, 98,158, 189, 311 IBM-compatible (computer) 70, 645 IBM DB2 151 IBM Global Services 516 identity theft 563 If Then Else statements 645 iMac computers 71 image processing systems 645 immediate cutover (big-bang) changeover 453, 455, 645 implementation see system implementation import of data 443, 645 importing files 109 inbound (inward) logistics 226 incremental backup 555–6, 645 index (of database records) 151, 421, 422, 645 indexed sequential files 151, 421, 422, 645 informal communication 10, 11, 645 information 6–14, 645 information centre (IC) 645 information flow diagrams (IFDs) 359, 361–5, 645 information kiosks 117, 645 information leadership 56, 645 information need 8, 23, 645 information reporting systems (IRS) 245, 249, 645 665 www.downloadslide.com 666 Index information requirements of managers 18–19, 21–2, 23 information silos problem 49–50, 218 information society 606–7, information systems (IS) 3, 43–4, 645 acquisition see acquiring a system change management 452–5 integration with business strategy 495–502 using for strategic advantage 54–6 information systems (IS) capability 524–6 information systems (IS) investment 507–12 information systems (IS) management IS investment 507–12 location of the IS management function 512–13 outsourcing 515–23 structuring IS management 513–15 information systems (IS) strategy 480–3, 645 information technology (IT) definition 43–4 economic impacts 14–15 governance and COBIT 298, 527–32 infrastructure flexibility 526–7 management requirements 512–13 risks associated with complex systems 304–5 information technology (IT) strategy 480–3, 645 information technology (IT) systems, estimating costs and benefits 320–1 information technology (IT) trends, influence on corporate strategies 532–4 information warriors 612, 645 Informix 151 initiation phase 270, 293–313, 645 inkjet printers 85, 645 Inland Revenue 516 innovation 51, 56, 401–2 input 37, 646 design 646 devices 66, 75–81 646 insertion anomalies 412, 413, 414, 418, 419, 646 insider trading detection 566 Instagram 130 intangible assets (conceptual resource base) 17–18, 646 intangible benefits 299–301 intangible costs 299–301 intangible value 9–10, 646 Intel 71, 93–4, 98, 621 intellectual property 613, 619, 646 intelligent agents (IAs) 168, 646 interactive kiosks 79, 646 interdependence among systems 39, 646 interface (systems) 38, 646 interlaced (display) 646 internal rate of return (IRR) 511, 646 International Organization for Standardization (ISO) 14 Internet 194–203, 646 abuse by employees 563–4 access as a human right 608–9 ADSL services 186–7 as a WAN 178 broadband access 186–7 business and consumer models of access 196–202 cyberslacking 577–8, 615, 639 cyberspace 639 definition 117, 194–5, 203 development of 195–6 employee use of 615 HTML format 13 IS security threats related to 562–5 level of employee access 576–9 managing threats to services 565–6 navigating 648 offline 649 online 649 personal privacy issues 609–11 software for using 117–34 software piracy 624–6 variations in access to 608–9 Internet-access software 118 Internet economy 47, 646 Internet EDI 209, 646 Internet Protocol (IP) 203–5 Internet pure-play 646 Internet relay chat (IRC) 646 Internet revenue contribution 649 Internet service providers (ISPs) 195, 646 Internet standards 203–6 Internet tools 117–18 Internet World Stats 608 interoperability of systems 310, 462, 646 interpreted (computer program) 646 interstitial (within a web page) 646 interviewing (analysis technique) 351–4, 646 intranets 200–2, 646 intrusion detection software 566 intuitive cognitive style 19–20 investment see information systems (IS) investment invitation to tender 306 IP (Internet Protocol) 203–5 IP address 204, 646 ISA (Industry Standard Architecture) 646 ISDN (integrated services digital network) 186, 646 IT help desk see help desk J Jackson, Shirley Ann 23–4 Java programming language 124, 647 Javascript 647 John Lewis 155 Joomla 133, 135 joysticks 77 JPEG (joint photographics experts group) format 647 just-in-time (JIT) production 38, 243 justification of text 108, 647 K Kahn, Robert 203 KakaoTalk 211–12 kanban production control system 243 Kelkoo 198–9 key fields (in a relational database) 407–9 key goal indicators 529–30 key loggers (keystroke recorders) 559–60 key performance indicators (KPIs) 298, 530 keyboard/keypad input devices 76 killer apps 112 kilobyte (kb) 88, 647 knowledge 6–7, 15–16, 647 knowledge economy 27 knowledge engineers 27 knowledge management 16, 27–9, 647 knowledge workers 27 KPMG 159, 160–1 L label printers 647 laptop computers 71 Lascelles Fine Foods 286–8 laser printers 84–5, 647 LCD (liquid crystal display) monitors 82 lean software development 277–9, 358–9 LED (light emitting diode) monitors 82 legacy systems 68–70, 647 legal issues 613–29 see also specific legislation Lenovo 72 leverage of resources 56, 647 libel, use of Internet for 564 Lickert scale 637 lightpen 647 www.downloadslide.com Index Line app 211–12 line printer 647 linkage (coupling) between subsystems 38–9 LinkedIn 130 live (production) environment 447, 647 Lloyds Bank Insurance Services 275–6 local-area networks (LANs) 178, 187, 190–3, 647 locking-in customers and suppliers 55 logic bomb 544, 647 long tail concept in retailing 132 loose coupling of systems 462 Lotus 1-2-3 112 low-level language 647 M m-commerce (mobile commerce) 48, 648 m-Health (mobile health) 74–5 machine language 647 machine-orientated programming language 647 macro-environment 481, 647 macros 109, 647 magnetic ink character recognition (MICR) 80, 647 magnetic tape storage 92, 93 mainframe computers 67–70, 151, 647 maintenance 440, 448–50, 656 fault taxonomy 449 software patches 449–50 Malicious Communications Act (1988) 623 malware (malicious software) 547, 556–62, 613 management 18–19 applications of productivity software 115–16 management guidelines, and IT governance 528–30 management information systems (MIS) 46, 218, 245–50, 647 managerial decision making 18–27 and the data deluge 23–4 cognitive style 19–20 competitive intelligence (CI) 29 decision behaviour 19–20 decision-making process 22–7 decision-making theory 24–7 information requirements 18–19, 21–2, 23 knowledge management 27–9 levels of 20–2 operational level 20–2 strategic level 20–2 structured decisions 19–21 tactical level 20–2 unstructured decisions 19–21 managers, professional responsibilities 603–6 managing network services 575–9 managing technological change 97–100 manual filing systems, disadvantages of 146–7 mapping services 127 maps, business value of GIS 170–2 Marimba 652 market relationships 229 marketing, definitions 252 marketing information systems 252–3 mashups 129 materials management systems 226, 242–5 materials requirements planning (MRP) 243–4, 647 maturity models 528–9 McDonald, Mark 57–8 McFarlan’s strategic grid 485, 490–2, 647 mean time between failures (MTBF) 93 mechanistic systems 41 media centre 648 megabyte (Mb) 88, 648 megapixel 648 Mellon Financial 280 memory 67, 90–2, 648 memory cards 90 menu interface 423 metadata 14, 397, 410, 648 Metro Ethernet 192 metropolitan-area network (MAN) 192, 193, 648 metropolitan ethernet 648 microcomputers 70–5, 648 micro-environment 481, 648 microfilm 83 microphone/sound card 79 Microsoft 98, 158, 516, 649, 660 Microsoft Access 150, 151, 407–9 Microsoft Excel 158 Microsoft Internet Explorer 122, 135, 450, 652, 659 Microsoft Internet Information Server 659 Microsoft MSN 651 Microsoft Office 115 Microsoft PowerPoint 116, 117 Microsoft SQL Server 151 Microsoft Windows 71, 72, 73, 189 middleware 428, 648 MIDI (musical instrument digital interface) devices 83 milestones (in projects) 341, 648 mindmapping technique 358 minicomputers 70, 648 mission-critical applications 151, 236 mission statement 36, 648 mobile chat services in Asia 211–12 mobile commerce (m-commerce) 48, 648 mobile devices 206–8 mobile health (m-Health) 74–5 mobile phones, web-enabled 207 modelling 111, 648 modem (modulator–demodulator) 186, 648 modification requests 450–1, 637 module design 648 module or unit testing 445–6, 648 monitoring of communications 579, 610–11 project management 333, 648 monitors 82 Moore, Gordon 98 Moore’s Law 98 morality 600, 648 motherboard 648 mouse (pointing device) 76, 648 movie piracy 625 Mozilla Firefox web browser 122 multi-core processors 94–6, 648 multidimensional data 163–4, 648 multi-function devices (MFDs) 85–6 multimedia 648 multimedia computers 79 multimedia messaging service (MMS) 207 multimedia software 116–17 multi-user testing 447, 648 music piracy 624–5 musical instrument digital interface (MIDI) devices 83 MySpace 578 N National Criminal Intelligence Centre 622 natural keyboards 76, 648 navigating (the Internet) 648 NavTeq 127 Neath Port Talbot Council 577 negative feedback 41, 651 net PC 648 net present value (NPV) 511, 648 netbooks 71 netcasting 652 Netflix 132 Netscape 450, 649, 651, 652, 659 network analysis (project management) 338–44 network computer (NC) 649 network databases 150 network interface card 649 network management services 575 667 www.downloadslide.com 668 Index network operating systems (NOS) 102, 189, 649 network software 102 network topology 192, 193, 649 networks 178–94 neural networks 249, 649 NHS (National Health Service) 48 niche markets 132 Nissen 158 node name 649 Nolan’s stage model 485, 488–90, 649 non-interlaced (display) 649 non-volatile memory 90, 649 normalisation of data 411–19, 649 notebook computers 71, 649 Novell 189, 204 O O’Reilly, Tim 126–7 obfuscation strategy 560 object-oriented databases 149–50, 649 object-oriented design (OOD) 431–2, 649 Obscene Publications Act (1959) 623 observation (analysis technique) 356, 649 Ocado 160 off-the-shelf software packages 49, 266, 282–5, 383, 649 office automation systems (OAS) 105, 233, 236–40, 649 office management systems 649 Official Secrets Act (1911–1989) 623 offline 121, 649 offline browser 649 offline reader 649 offshoring 607 OLED (organic light emitting diode) monitors 82 Olympic Park project 324–5 on-demand software 136–7 online 121, 649 online analytical processing (OLAP) 153, 163–4, 649 online data processing see real-time data processing online revenue contribution 649 online stock fraud 564, 649 online transaction processing (OLTP) 163 open-loop control systems 39–40, 650 open profiling standard 649 open questions 353, 649 open-source software 134–6, 650 open systems 38, 650 open systems interconnection (OSI) model 204, 650 Open Web APIs 128 OpenLaszlo 128 Opera web browser 122 operating environment 102, 650 operating systems (OS) 71–3, 100–2, 650 operational feasibility 297, 302, 650 operational-level managerial decision making 20–2 operations, using IS to improve efficiency 54, 55 operations information systems (OIS) 46, 218, 233–45, 650 optical character recognition (OCR) 77, 650 optical discs 90 optical mark recognition (OMR) 77, 650 optical scanners 77, 650 optimised production technology (OPT) 243 Oracle 151, 158, 232 organisational change management 455–68 organisational culture 465–6, 650 organisational feasibility 297–9, 650 organisational security procedures 554 orthogonal frequency-division multiplexing (OFDM) 189 outbound (outward) logistics 226 outline design (system design) 650 output 37, 650 design 650 devices 67, 81–7, 650 outsourcing 305, 650 of IS management 515–23 P packaged software 49, 266, 282–5, 383, 650 packets (of data) 204–5, 650 page impressions 650 page printer 650 page requests see page impressions pages per minute (ppm) 87, 650 pages per month (ppm) 87, 650 paint programs 110, 650 paperless meeting 105–7 paperless office 105, 650 parallel port 651 parallel running changeover method 453–4, 455, 651 passwords 553 patch (for software) 449–50 patents 621, 639, 651 payback period 511, 651 payload of a computer virus 558, 651 PayPal 51–2 PCI (peripheral component interconnect) 651 peer-to-peer networks 194, 651 Pepsi 198 personal-area network (PAN) 190 personal certificate 124, 651 personal computers (PCs) 70–1 personal digital assistant (PDA) 651 personal information manager (PIM) 116, 651 personal privacy 609–11 PERT (project evaluation and review technique) 343, 651 phablets 74, 651 phased implementation 453, 454, 455, 651 Philips International 119 phishing 565 photo-editing packages 111, 651 PHP-Nuke 133 physical protection for IS 551 physical resources (tangible assets) 17, 651 pictures and brainstorming 358 pilot implementation 453, 454–5, 651 Pinterest 130 Pirate Bay file-sharing site 625–6 planning (project management) 330 plotters 82–3, 651 plug and play (PnP) 651 plug-ins 124, 651 podcasting 129 Pointcast 652 pointing devices 76, 651 Police Act (1997) 622 polymorphic viruses 558 portable computers 71–5, 651 portable document format (PDF) 28 portals 651 Porter, Michael 658 competitive strategies 485, 488 five forces model 54–6, 485, 486–8, 651 value chain concept 52–3, 492–3 Porter and Millar’s five forces model 54–6, 485, 486–8, 651 positive feedback 41, 651 post-implementation review 273, 450, 651 power supply unit (PSU) 651 PPTE (People, Process, Technology and Environment) model 321 presentation software 116, 651 Pret A Manger 158 PriceRunner 199 primary keys fields (in a relational database) 149–50,408–9, 412, 652 primary storage (computer memory) 87, 90–1, 92, 652 PRINCE methodology 652 PRINCE structure 652 www.downloadslide.com Index PRINCE2 methodology 322, 334–7 print preview 652 printer sharer 652 printers 84–7 Privacy and Electronic Communications (EC Directive) Regulations (2003) 618, 652 private branch exchange (PBX) 194, 652 probabilistic systems 41–2 problem-orientated language 652 process 652 process blueprint 220 process control systems 45, 233, 240–2, 652 process mapping 460–1 process modelling 396, 398, 652 processors (CPU) 66, 93–7, 652 product differentiation strategy 51 product lifecycle management (PLM) 49, 218 production (live) environment 447, 652 production management systems 242–5 productivity paradox 508–9, 652 productivity software 103–4, 115–16, 652 professionalism 600–6, 652 profiling of Internet users 609 programming 440–1 programming languages 102, 103, 124, 638, 652 project, definition 320, 652 project closedown review 450 project constraints 327, 652 project costs graphs 342, 652 project crashing 342–3, 652 project documentation 334, 652 project management 319–44 documentation 334, 652 estimating costs and benefits of IT 320–1 estimation 326–30 key elements 320 lessons from successful delivery 324–5 methodologies compared 337 monitoring and control 333 network analysis 338–44 PRINCE2 methodology 334–7 process 321–6 project organisation 325–6 role of the project manager 322, 325 roles of staff involved 325–6 scheduling and planning stage 330 SDLC context 322–3 software 115, 649 steps in 326–34 why projects fail 323–5 project manager 322, 325 project network simulation 343 project plan 652 project sponsor 325 project user 326 projectors 82 proprietary data formats 13 Protection of Children Act (1978) 623 protocols (Internet) 203, 652 prototyping 275–7, 652 pseudocode (Structured English) 26–7, 429, 655 Public Domain software 136 public safety issues 604–5 pull technology 123, 652 push technology 123, 652 Q qualitative data 19, 652 quality assurance (QA), for software 451 quality manager 326 quality of information 11–14 quantitative data 19, 652 query (for a database) 151, 653 questionnaires (analysis technique) 354–5, 653 R RAID (redundant array of inexpensive disks) 550, 653 random access memory (RAM) 90, 91, 653 random file access 421, 422, 653 rapid applications development (RAD) 275–7, 280–2, 653 ratings schemes 124, 653 Rational Unified Process (RUP) 279 read-only devices 653 read-only memory (ROM) 90–1, 653 real-time data processing 422–3, 653 real-time data warehousing (RDW) 156–7 recession, role of advanced IT 304–5 record (database) 405–7, 653 record key (of a relational database) 149–50, 653 recovery strategy 550, 653 Red Hat 137 refresh rate (monitor) 653 registered designs 621 regression testing 446, 653 Regulation of Investigatory Powers (RIP) Act (2000) 622 re-intermediation 653 relation (in a database) 412 relational database 149–50, 653 terms used to describe 412 relational database design 405–19 database terminology 405–7 normalisation of data 411–19 role of the database administrator (DBA) 419 relational database management systems (RDBMS) 149–50, 421, 653 relationships between database tables 149–50, 653 release versions 452 remote access 653 remote location 186 repeaters (data transmission) 187 replication (server) 184, 653 replication (virus) 653 request for proposals (RFP) 306, 653 requirements creep 450 requirements specification 359–61, 653 resolution (monitor) 110,653 resource allocation 330, 653 resource-based theory (RBT), and IS capability 524–6 resources and IS 17–18, 43, 56 response time 83, 653 retailers, getting rid of ‘devil customers’ 154–5 return on investment (ROI) 320–1, 511, 653 revenue models 653 reverse engineering 621, 654 review and maintenance 270, 273–4 RFID (radio-frequency identification) tags 78, 227, 609 rich Internet applications (RIAs) 127–30 RISC (reduced instruction set computing) processors 95, 654 risk assessment 511, 512 risk management 302–5, 654 risk manager 326 Roambi 158 Rolls-Royce 51 routers 187 RSS (Really Simple Syndication) 123, 129, 654 S sabotage, IS security risk 544–5 safety-critical systems 544, 604–5, 654 Sainsbury’s 236 Samsung 72, 85 SAP (software vendor) 158, 218, 219, 221, 232 SAS (software vendor) 158, 162, 444 satellite communications systems 186 scalability of the design 396, 654 scanning software 579 scenario 654 scheduling (project management) 330 669 www.downloadslide.com 670 Index scientific programming languages 654 scorecards 167–8 scoring system 654 scripts 124, 654 Scrum 279 SCSI (small computer system interface) 654 SDLC see systems development lifecycle search engines 123, 131–2, 654 second normal form (2NF) 416–18, 654 secondary key fields (in a relational database) 149–50, 654 secondary storage 87, 89–90, 654 Secure Electronic Transactions (SET) 641, 654 secure sockets layer (SSL) 654 security breach 654 security design 429–30 security for IS 539–66 accidents 540–4 audits 550, 552 backup procedures 554–6 business continuity planning 550 common threats 540–8 computer viruses 548 control strategies 548–50 control techniques 552–6 cybercrime targets and costs 540–4, 547–8, 561–2 data theft 545–6 disaster recovery planning 550 formal security policies 552–3 human error 540–4 malware (malicious software) 556–62 managing threats to Internet services 565–6 natural disasters 544 need for controls 540–8 organisational procedures 554 sabotage 544–5 safety-critical systems 544 skills continuity planning 550 theft 545–6 threats related to Internet service 562–5 types of controls 551–2 unauthorised use (hacking) 546–7 vandalism 545 Sedgemoor District Council 312–13 self-organising systems 42 sell-side e-commerce 654 semantic web 14, 654 sensing device 654 sensors 73–5, 654 sequential file access 421, 422, 654 serial port 654 servers 70, 151, 183–5, 654 service catalogue 462 service composition 462 service inventory 462 service-level agreements (SLAs) 301, 520, 654 service-oriented architecture (SOA) 220, 462–4 SET (Secure Electronic Transactions) 641, 654 seven Rs of strategy 482–3 Shareware 136 sharing economy concept 14–15 short messaging service (SMS) 207 signature file (for e-mail) 121–2, 654 signature of viruses 558, 654 Silverlight 128 Simon, H 22 simulation 111, 648 SiSense Prism 10X software 158 site certificate 124, 655 Skandia Life 499 skilling versus deskilling, impacts of IT 607–8 skills continuity planning 550 skills shortage 607, 655 Skype 79, 210 slice-and-dice (cube analysis) 165 smart bar codes 78 smart TVs 73 smartphones 72–3, 655 SMEs, IS/IT and competitive advantage 499–501 SMTP 204 Snow, John 170 SOA (service-oriented architecture) 220, 462–4 SOAP (simple object access protocol) 463 social bookmarking 128–9 social engineering, using the Internet 565 social issues 606–13 social networking sites 129–31, 187, 577, 578 profiling of users 609 see also specific sites soft (qualitative) data 19, 652 soft systems 42 soft systems methodology (SSM) 379–82, 655 software 100, 655 application service providers (ASPs) 136–7 bugs 441–2, 655 categories 100–4 change management 450–2 copy protection methods 623–4 development programs 102, 103, 440–1 distribution models 134–7 documentation 641 licences 135–6, 552, 655 management applications of 115–16 managing technological change 97–100 metrics 442–3, 655 middleware 648 multimedia 116–17 off-the-shelf packages 49, 266, 282–5, 383, 649 on-demand software 136–7 open source applications 134–6, 650 patches 449–50 quality of 441–3, 451, 655 techniques for comparing systems 306–13 see also acquiring a system Software as a Service (SaaS) 136–7, 655 software piracy 613, 620, 623–9 see also software theft Software Publishers Association (SPA) 655 software theft 613, 655 Federation Against Software Theft (FAST) 627, 628, 643 see also software piracy solid state drives (SSD) 90 Sony 616 sound card 79, 655 sound output devices 83 source code file 638 source escrow 619, 655 spam (e-mail) 120, 618, 623, 655 speech synthesis software 655 spiral model 277, 278, 655 spreadsheets 111–15, 166, 255, 655 see also databases spyware 560–1 stage models 655 stakeholders 467, 655 start-up phase see initiation phase static web page 203, 655 statistical analysis using spreadsheets 111 stealth viruses 558 stochastic systems 41–2 stock fraud, using the Internet 564 storage devices 67, 87–93, 655 units of data measurement 88–9 strategic advantage and BIS 50–6 competitive strategies 50–1 using IS 54–6 value chain analysis 52–4 strategic alignment balanced scorecards 498–9 barriers to 497–8 importance of 495–7 www.downloadslide.com Index strategic level managerial decision making 20–2 strategic partnerships and alliances 229 strategy 477–502, 655 and organisational environment 481–3 approaches to strategy formulation 478–9 BIS strategy 479–85 context 478–9 definition 478 hierarchy of strategies 478 impact of cloud computing 484–5 influence of customer demands 501–2 IS and business strategy integration 495–502 IS/IT strategy 480–3 managing end-user computing (EUC) 591–2 seven Rs of 482–3 SMEs and IS/IT 499–501 tools for strategic analysis and definition 485–95 strategy process model 655 streaming media 655 structured decisions 19–21, 655 Structured English (pseudocode) 26–7, 429, 655 Structured Query Language (SQL) 152, 655 stylus (pointing device) 72, 76 sub-notebook 655 subsystems 38–9, 655 Sun Microsystems 70, 71, 137, 154, 189 supplier relationship management (SRM) 49, 218, 232–3 suppliers 55, 306–13 supply chain 225 supply chain management (SCM) 49, 52, 218, 225–31 supply chain visibility 226–7 suprasystems 38, 655 surveillance society 609, 656 switching costs, for customers and suppliers 56 Sybase 151 Symantec 613 synchronous exchange of information 237, 656 synergy 656 system, definition 36–7, 656 system acquisition see acquiring a system system boundary 362–5 system build 270, 439–48, 656 assessing software quality 441–3 context 272–3 data migration 443 definition 440 programming 440–1 system development 440–1 system design (outline design) 656 system implementation 270, 273, 440–8, 656 changeover 270, 273, 452–5 context 273 definition 440 documentation 447–8 testing information systems 443–7 user guides 448 see also change management system maintenance 440, 448–50, 656 system objective 37, 656 system owners 467, 656 system sponsors 467, 656 system testing 446, 656 systems boundary 37–8 characteristics 37–9 closed systems 38 components 37 control systems in organisations 39–41 coupling/decoupling between 38–9 environment 37–8 hierarchies within 39 interdependence 39 interfaces 38 open systems 38 types of 41–2 see also business information systems (BIS); information systems (IS) systems analysis 270, 271–2, 349–86, 656 ABC case study 384–6 analysis techniques 351–8 bespoke software development 383 context 271–2 definition 350 documentation 350, 359–79 fact-finding exercise 350–9 factors affecting choice of tools 383–4 identifying the requirements 350–9 off-the-shelf packages 383 relationship with systems design 395 requirements in a lean or agile environment 358–9 requirements specification 359–61 soft systems methodology (SSM) 379–82 software tools 384 user-developed applications 383–4 systems analysis and design method (SSADM) 656 systems architecture 397–400 systems design 270, 272, 391–432, 656 aims of 392–4 and innovation 401–2 batch data processing 422–3 CASE (computer-aided software engineering) tools 430 client/server model of computing 402–4 constraints on 394–5 context 272 design specification 392 design strategy 394–5 designing enterprise applications 400–1 designing interfaces between systems 428 detailed design (module design) 405 documentation 430 elements of design 395–7 error handling and exceptions 430 features of 392 file access methods 421, 422 file descriptions 421–2 file organisation 422 help for users 430 input design 421–3, 426–7 module design (detailed design) 405 module structure 404 object-oriented design (OOD) 431–2 outline design 397–404 output design 412–3, 428 program structure 404 real-time data processing 422–3 relational database design 405–19 relationship with systems analysis 395 security design 429–30 structure of program modules 428–9 system design (outline design) 397–404 systems integration 428 user interface design 423–8 web sites for B2C e-commerce 424–6 systems development lifecycle (SDLC) 261, 264, 269–74, 656 approach to software development 280, 282–3 context for project management 322–3 stages 264, 654 systems dynamics 656 systems quality 441–3 systems software 100–3, 656 systems theory 36, 41, 656 T table (in a database) 405–7, 412, 656 tablet devices 71–5 tacit knowledge 16, 656 tactical-level managerial decision making 20–2 671 www.downloadslide.com 672 Index tags (in HTML) 124–5 Talburt, John 42 talk-through 656 Tandem 67 tangible assets (physical resource base) 17, 656 tangible benefits 299–301 tangible costs 299–301 tangible value 9–10, 656 tape streamer 656 TCP/IP (transfer control protocol/Internet protocol) 652 TCP/IP (transmission control protocol/ Internet protocol) 203–5, 656 technical feasibility 297, 301–2, 656 technological change 97–100 TeleAtlas 127 telecommunications 656 channels 188–9, 657 controls 551–2 processors 185–8 systems 179 telemarketing software 253 Telephone Preference Service 618 telesales and marketing 618 teleworkers 119, 657 Telnet 657 templates for documents 10 tender document 657 terabyte (TB) 88, 89 Teradata 158 terminate and stay resident (TSR) program 657 Tesco 296, 609 test environment 447, 657 test plan 444, 657 test specification 444, 657 testing information systems 443–7 text messaging 207 text mining 160 theft related to IS 545–6, 613, 640, 657 see also software theft; software piracy thermal printer 657 thin client model 403, 657 third normal form (3NF) 418–19, 657 Thorn Europe 516 three-tier client/server model 403, 657 time bomb see logic bomb time dimension of information 12, 657 time management software 115–16 time sharing contracts 516 top-down design 395–6, 657 total cost of ownership (TCO) 183, 576, 657 total quality management (TQM) 326 touch screen 79, 657 trackball (pointing device) 77, 657 trade marks 622 training, role in system implementation 468 transaction costs 50–1 transaction log files 203, 657 transaction processing 45, 657 transaction processing systems (TPS) 233–6, 657 transformation processes 8, 36, 37, 657 travel industry 197 Tripadvisor 198 Trojans 559–61, 657 see also malware Tumbler 130 Twitter 130, 578 two-tier client/server model 403, 657 U ultrabook computers 71, 72, 657 ultraportable laptop computer 657 ultra-wideband (UWB) 190 unauthorised use (hacking) 546–7 unified modelling language (UML) 657 uniform (universal) resource locators (URLs) 205, 657 unit or module testing 445–6, 658 universal product code 78, 658 universal serial bus (USB) 90, 658 UNIX 189 unnormalised data 412–13 unstructured decisions 19–21, 658 update anomalies 412, 413–15, 418, 419, 658 update queries (for a database) 151–2, 542, 658 upstream suppliers 225–6 usability companies 302 universal serial bus (USB) 90, 658 use-case 658 use-case modelling 658 Usenet newsgroups 658 user acceptance testing 447, 658 user-centred design 658 user-developed software 266–7, 285–6, 383–4, 585–91 see also end-user user guides 448 user interface design 423–8 user validation 554, 658 users, involvement in systems development 466–8 see also end-user utility programs 102, 658 V V-model of systems development 444–5 validation of a design 396, 658 value-added networks (VANs) 194, 209, 658 value chain 52–4, 492–3, 658 value chain analysis 52–4, 486, 492–3 value network 658 value of information 9–10 vector images 110, 658 verification of a design 396, 658 vertical integration 230–1 VGA (video graphics array) 658 video capture cards 79, 658 video conferencing 79, 80 video e-mail (v-mail) 79 video projectors 82, 658 views (user interface) 423–4 viral marketing 131 Virgin Atlantic 577 virtual computing 95–7 virtual machines (VM) 95–7 virtual memory 91 virtual organisations 229–30, 658 virtual private networks (VPNs) 194, 209, 658 virtual reality (VR) 658 virtual value chain (VVC) 53–4 virus scanners 558, 658 virus shields 558, 658 viruses 548, 556–9, 638 Visicalc 112 Visual Basic 441 visual display unit (VDU) 659 visualisation tools 166–72, 659 voice annotations 659 voice–data integration 659 voice modem 659 Voice over IP (VoIP) 79, 210–12, 659 volatile memory 90, 659 volume testing 446, 659 W walk-through 659 Walmart 154, 158 Ward and Peppard’s modified strategic grid 491–2 waterfall approach see systems development lifecycle (SDLC) Waterstones 197 wax printers 659 Web 2.0 126–33 web addresses 659 web browsers 117, 118, 122–6, 202, 203, 659 web directories 659 web-enabled phones 207 web-integrated ERP systems 220 web mining 160 web page standards 206 web servers 203, 659 web services 463 www.downloadslide.com Index web services description language (WSDL) 463 web site content management systems (CMS) 133, 135 web site design, for B2C e-commerce 424–6 webcams (web cameras) 79–80 Weber, Max 19 WeChat app 211–12 WEEE (Waste Electrical and Electronic Equipment) Directive 622 Wells Fargo 158 what if? analysis 111, 659 Wi-Fi (wireless fidelity) 191 wide-area networks (WANs) 178–9, 193–4, 659 Wikileaks 547 Wikipedia 127, 128, 130 Wikis 128 WiMax 192, 193 WIMP (windows, icons, mouse and pull-down menus) 101–2, 659 wireless access devices 206–8 wireless application protocol (WAP) 207, 659 wireless markup language (WML) 659 wireless (unguided) media 189 wisdom 6–7, 16 word processors 104–9, 659 word wrap 108, 659 Wordpress 135 work breakdown structure (WBS) 327, 659 workbooks 114, 659 workflow management systems (WFMS) 236, 238–40, 241, 659 workgroup 659 worksheets 112, 659 workstations 71, 659 World Wide Web (WWW) 23–4, 118, 122–33, 202–3, 660 Worldbuydirect.com 198 worm (virus) 559, 660 see also malware WORM (write one, read many) storage device 660 WSDL (web services description language) 463 X Xerox 85 Xing 130 XML (extensible markup language) 125–6, 206, 428, 660 Y Yahoo 651 YouTube 130–1 Z zero administration 660 zombie computers 560, 660 673 ... among the end-users EXERCISES Self-assessment exercises Explain what the main similarities and differences are between bespoke development and end-user development Why would a small business be more... to help the reader get the most out of it They have been designed to assist understanding, reinforce learning and help readers find information easily The features are described in the order you... Initiating systems development covers the initiation phase of system development when the need for the new system and the feasibility of different development methods are assessed Chapter 9: BIS project