Management informations systems managing the digital firm 15th global edition by laudon

648 3.6K 1
Management informations systems managing the digital firm 15th global edition by laudon

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Management informations systems managing the digital firm 15th global edition by laudon Management informations systems managing the digital firm 15th global edition by laudon Management informations systems managing the digital firm 15th global edition by laudon Management informations systems managing the digital firm 15th global edition by laudon Management informations systems managing the digital firm 15th global edition by laudon Management informations systems managing the digital firm 15th global edition by laudon v

GLOBAL EDITION Management Information Systems Managing the Digital Firm For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students with the best possible learning tools This Global Edition preserves the cutting-edge approach and pedagogy of the original, but also features alterations, customization, and adaptation from the North American version GLOBAL EDITION Management Information Systems Managing the Digital Firm  FIFTEENTH EDITION Kenneth C Laudon • Jane P Laudon FIFTEENTH EDITION Laudon Laudon G LO B A L EDITION This is a special edition of an established title widely used by colleges and universities throughout the world Pearson published this exclusive edition for the benefit of students outside the United States and Canada If you purchased this book within the United States or Canada, you should be aware that it has been imported without the approval of the Publisher or Author Pearson Global Edition Laudon_15_129221175X_Final.indd 27/04/17 1:42 PM MANAGEMENT INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM FIFTEENTH EDITION GLOBAL EDITION Kenneth C Laudon New York University Jane P Laudon Azimuth Information Systems VP Editorial Director: Andrew Gilfillan Senior Portfolio Manager: Samantha Lewis Content Development Team Lead: Laura Burgess Program Monitor: Ann Pulido/SPi Global Editorial Assistant: Michael Campbell Managing Editor, Global Edition: Steven Jackson Senior Project Editor, Global Edition: Daniel Luiz Manager, Media Production, Global Edition: M Vikram Kumar Senior Manufacturing Controller, Production, Global Edition: Trudy Kimber Product Marketing Manager: Kaylee Carlson Project Manager: Katrina Ostler/Cenveo® Publisher Services Text Designer: Cenveo® Publisher Services Cover Designer: Lumina Datamatics, Inc Cover Art: LIPING/Shutterstock Full-Service Project Management: Cenveo® Publisher Services Unattributed Figures and Chapter Opener Diagrams: Kenneth C Laudon, Jane P Laudon, Management Information Systems, 15 Ed., © 2018, Pearson Education, Inc., New York, NY Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose All such documents and related graphics are provided “as is” without warranty of any kind Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services The documents and related graphics contained herein could include technical inaccuracies or typographical errors Changes are periodically added to the information herein Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time Partial screen shots may be viewed in full within the software version specified Microsoft® Windows®, and Microsoft Office® are registered trademarks of Microsoft Corporation in the U.S.A and other countries This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2018 The rights of Kenneth C Laudon and Jane P Laudon to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Management Information Systems: Managing the Digital Firm, 15th edition, ISBN 978-0-13-463971-0, by Kenneth C Laudon and Jane P Laudon, published by Pearson Education © 2018 All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners ISBN 10: 1-292-21175-X ISBN 13: 978-1-292-21175-6 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 10 14 13 12 11 10 Typeset in 10.5/13 ITC Veljovic by Cenveo® Publisher Services Printed and bound by Vivar, Malaysia About the Authors Kenneth C Laudon is a Professor of Information Systems at New York University’s Stern School of Business He holds a B.A in Economics from Stanford and a Ph.D from Columbia University He has authored 12 books dealing with electronic commerce, information systems, organizations, and society Professor Laudon has also written more than 40 articles concerned with the social, organizational, and management impacts of information systems, privacy, ethics, and multimedia technology Professor Laudon’s current research is on the planning and management of large-scale information systems and multimedia information technology He has received grants from the National Science Foundation to study the evolution of national information systems at the Social Security Administration, the IRS, and the FBI Ken’s research focuses on enterprise system implementation, computer-related organizational and occupational changes in large organizations, changes in management ideology, changes in public policy, and understanding productivity change in the knowledge sector Ken Laudon has testified as an expert before the United States Congress He has been a researcher and consultant to the Office of Technology Assessment (United States Congress), the Department of Homeland Security, and the Office of the President, several executive branch agencies, and Congressional Committees Professor Laudon also acts as an in-house educator for several consulting firms and as a consultant on systems planning and strategy to several Fortune 500 firms At NYU’s Stern School of Business, Ken Laudon teaches courses on Managing the Digital Firm, Information Technology and Corporate Strategy, Professional Responsibility (Ethics), and Electronic Commerce and Digital Markets Ken Laudon’s hobby is sailing Jane Price Laudon is a management consultant in the information systems area and the author of seven books Her special interests include systems analysis, data management, MIS auditing, software evaluation, and teaching business professionals how to design and use information systems Jane received her Ph.D from Columbia University, her M.A from Harvard University, and her B.A from Barnard College She has taught at Columbia University and the New York University Graduate School of Business She maintains a lifelong interest in Oriental languages and civilizations The Laudons have two daughters, Erica and Elisabeth, to whom this book is dedicated Brief Contents PART ONE Organizations, Management, and the Networked Enterprise 29 Chapter Chapter Chapter Chapter Information Systems in Global Business Today 30 PART TWO Information Technology Infrastructure 191 Chapter Chapter IT Infrastructure and Emerging Technologies 192 Chapter Chapter Telecommunications, the Internet, and Wireless Technology 276 PART THREE Key System Applications for the Digital Age 363 Chapter Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 364 Chapter 10 Chapter 11 Chapter 12 E-commerce: Digital Markets, Digital Goods 398 PART FOUR Building and Managing Systems 513 Chapter 13 Chapter 14 Chapter 15 Building Information Systems 514 Glossary Indexes Global E-business and Collaboration 68 Information Systems, Organizations, and Strategy 106 Ethical and Social Issues in Information Systems 150 Foundations of Business Intelligence: Databases and Information Management 238 Securing Information Systems 320 619 631 Managing Knowledge 444 Enhancing Decision Making 480 Managing Projects 554 Managing Global Systems 588 Complete Contents PART ONE Organizations, Management, and the Networked Enterprise 29 Chapter Information Systems in Global Business Today 30 Opening Case: Rugby Football Union Tries Big Data 31 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today? 33 How Information Systems Are Transforming Business 34 • What's New in Management Information Systems? 35 Interactive Session: Management The Mobile Pocket Office 37 Globalization Challenges and Opportunities: A Flattened World 39 • The Emerging Digital Firm 40 • Strategic Business Objectives of Information Systems 41 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations? 44 What Is an Information System? 44 • Dimensions of Information Systems 46 Interactive Session: Technology Digital Transformation of Healthcare at Singapore's JurongHealth Services 51 It Isn't Just Technology: A Business Perspective on Information Systems 52 • Complementary Assets: Organizational Capital and the Right Business Model 54 1-3 What academic disciplines are used to study information systems, and how does each contribute to an understanding of information systems? 56 Technical Approach 56 • Behavioral Approach 57 • Approach of This Text: Sociotechnical Systems 58 Review Summary 59 • Key Terms 60 • Review Questions 60 • Discussion Questions 61 Hands-On MIS Projects 61 Collaboration and Teamwork Project 62 Case Study: Are Farms Becoming Digital Firms? 62 References: 66 Contents Chapter Global E-business and Collaboration 68 Opening Case: Enterprise Social Networking Helps ABB Innovate and Grow 69 2-1 What are business processes? How are they related to information systems? 71 Business Processes 71 • How Information Technology Improves Business Processes 73 2-2 How systems serve the different management groups in a business, and how systems that link the enterprise improve organizational performance? 74 Systems for Different Management Groups 74 • Systems for Linking the Enterprise 79 Interactive Session: Organizations New Systems Help Plan International Manage Its Human Resources 80 E-business, E-commerce, and E-government 84 2-3 Why are systems for collaboration and social business so important, and what technologies they use? 85 What Is Collaboration? 85 • What Is Social Business? 86 • Business Benefits of Collaboration and Social Business 87 • Building a Collaborative Culture and Business Processes 87 • Tools and Technologies for Collaboration and Social Business 89 Interactive Session: Technology Collaborating the Glasscubes Way 91 2-4 What is the role of the information systems function in a business? 95 The Information Systems Department 96 • Organizing the Information Systems Function 97 Review Summary 98 • Key Terms 99 • Review Questions 99 • Discussion Questions 100 Hands-On MIS Projects 100 Collaboration and Teamwork Project 101 Case Study: Social Business: Full Speed Ahead or Proceed with Caution? 101 References: 104 Chapter Information Systems, Organizations, and Strategy 106 Opening Case: Tate & Lyle Devise a Global IT Strategy 107 3-1 Which features of organizations managers need to know about to build and use information systems successfully? 109 What Is an Organization? 110 • Features of Organizations 112 3-2 What is the impact of information systems on organizations? 117 Economic Impacts 117 • Organizational and Behavioral Impacts 118 Interactive Session: Management Can Technology Replace Managers? 120 The Internet and Organizations 122 • Implications for the Design and Understanding of Information Systems 122 Contents 3-3 How Porter's competitive forces model, the value chain model, synergies, core competencies, and network economics help companies develop competitive strategies using information systems? 123 Porter's Competitive Forces Model 123 • Information System Strategies for Dealing with Competitive Forces 125 • The Internet's Impact on Competitive Advantage 128 • The Business Value Chain Model 129 Interactive Session: Technology Smart Products, Smart Companies 130 Synergies, Core Competencies, and Network-Based Strategies 134 3-4 What are the challenges posed by strategic information systems, and how should they be addressed? 138 Sustaining Competitive Advantage 138 • Aligning IT with Business Objectives 139 • Managing Strategic Transitions 140 Review Summary 140 • Key Terms 141 • Review Questions 141 • Discussion Questions 142 Hands-On MIS Projects 142 Collaboration and Teamwork Project 143 Case Study: Deutsche Bank: The Cost of Legacy Systems 144 References: 147 Chapter Ethical and Social Issues in Information Systems 150 Opening Case: The Dark Side of Big Data 151 4-1 What ethical, social, and political issues are raised by information systems? 153 A Model for Thinking About Ethical, Social, and Political Issues 155 • Five Moral Dimensions of the Information Age 156 • Key Technology Trends that Raise Ethical Issues 156 4-2 What specific principles for conduct can be used to guide ethical decisions? 158 Basic Concepts: Responsibility, Accountability, and Liability 159 • Ethical Analysis 160 • Candidate Ethical Principles 160 • Professional Codes of Conduct 161 • Some Real-World Ethical Dilemmas 161 4-3 Why contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? 162 Information Rights: Privacy and Freedom in the Internet Age 162 • Property Rights: Intellectual Property 169 4-4 How have information systems affected laws for establishing accountability and liability and the quality of everyday life? 172 Computer-Related Liability Problems 173 • System Quality: Data Quality and System Errors 174 • Quality of Life: Equity, Access, and Boundaries 174 Interactive Session: Technology Monitoring in the Workplace 178 Health Risks: RSI, CVS, and Cognitive Decline 180 Interactive Session: Organizations Are We Relying Too Much on Computers to Think for Us? 181 Review Summary 183 • Key Terms 184 • Review Questions 184 • Discussion Questions 185 Hands-On MIS Projects 185 Contents Collaboration and Teamwork Project 186 Case Study: Facebook Privacy: What Privacy? 186 References: 190 PART TWO Information Technology Infrastructure 191 Chapter IT Infrastructure and Emerging Technologies 192 Opening Case: EasyJet Flies High with Cloud Computing 193 5-1 What is IT infrastructure, and what are the stages and drivers of IT infrastructure evolution? 195 Defining IT Infrastructure 195 • Evolution of IT Infrastructure 197 • Technology Drivers of Infrastructure Evolution 201 5-2 What are the components of IT infrastructure? 206 Computer Hardware Platforms 207 • Operating System Platforms 208 • Enterprise Software Applications 208 • Data Management and Storage 209 • Networking/Telecommunications Platforms 209 • Internet Platforms 209 • Consulting and System Integration Services 210 5-3 What are the current trends in computer hardware platforms? 210 The Mobile Digital Platform 210 Interactive Session: Technology Wearable Computers Change How We Work 211 Consumerization of IT and BYOD 212 • Quantum Computing 213 • Virtualization 213 • Cloud Computing 213 Interactive Session: Organizations Glory Finds Solutions in the Cloud 216 Green Computing 219 • High-Performance and Power-Saving Processors 220 5-4 What are the current computer software platforms and trends? 220 Linux and Open Source Software 220 • Software for the Web: Java, HTML, and HTML5 221 • Web Services and Service-Oriented Architecture 222 • Software Outsourcing and Cloud Services 224 5-5 What are the challenges of managing IT infrastructure and management solutions? 226 Dealing with Platform and Infrastructure Change 226 • Management and Governance 227 • Making Wise Infrastructure Investments 227 Review Summary 230 • Key Terms 231 • Review Questions 232 • Discussion Questions 232 Hands-On MIS Projects 232 Collaboration and Teamwork Project 233 Case Study: BYOD: Business Opportunity or Big Headache? 234 References: 237 Chapter Foundations of Business Intelligence: Databases and Information Management 238 Opening Case: BAE Systems 239 6-1 What are the problems of managing data resources in a traditional file environment? 241 Contents File Organization Terms and Concepts 242 • Problems with the Traditional File Environment 243 6-2 What are the major capabilities of database management systems (DBMS), and why is a relational DBMS so powerful? 245 Database Management Systems 245 • Capabilities of Database Management Systems 248 • Designing Databases 250 • Non-relational Databases and Databases in the Cloud 253 6-3 What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 254 The Challenge of Big Data 254 • Business Intelligence Infrastructure 255 Interactive Session: Organizations Data-Driven Crime Fighting Goes Global 256 Analytical Tools: Relationships, Patterns, Trends 260 • Databases and the Web 263 6-4 Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 264 Establishing an Information Policy 264 • Ensuring Data Quality 265 Interactive Session: Management Societe Generale Builds an Intelligent System to Manage Information Flow 267 Review Summary 268 • Key Terms 269 • Review Questions 270 • Discussion Questions 270 Hands-On MIS Projects 270 Collaboration and Teamwork Project 272 Case Study: Lego's Enterprise Software Spurs Growth 272 References: 275 Chapter Telecommunications, the Internet, and Wireless Technology 276 Opening Case: Wireless Technology Makes Dundee Precious Metals Good as Gold 277 7-1 What are the principal components of telecommunications networks and key networking technologies? 279 Networking and Communication Trends 279 • What is a Computer Network? 280 • Key Digital Networking Technologies 282 7-2 What are the different types of networks? 285 Signals: Digital Versus Analog 285 • Types of Networks 285 • Transmission Media and Transmission Speed 287 7-3 How the Internet and Internet technology work, and how they support communication and e-business? 287 What is the Internet? 288 • Internet Addressing and Architecture 288 Interactive Session: Organizations The Battle over Net Neutrality 291 Internet Services and Communication Tools 293 Interactive Session: Management Monitoring Employees on Networks: Unethical or Good Business? 296 The Web 298 www.downloadslide.net Index Macy’s, 310–311, 433 Maersk, 594 Mandarin Oriental, 42 MasterCard, 158, 342 Match.com, 416 Matsushita, 471 McAfee, 327 McDonalds, 597 McKinsey & Company, 87, 583 Megaupload, 171 Mercedes-Benz, 461–462 Metal Office Furniture Company, 609 MetLife, 254 Michelin North America, 235 Microsoft Corp., 137, 193–194, 201, 209, 299, 370, 456, 508, 511 Mitsubishi, 471 Mitsubishi Heavy Industries, 466 MobileIron, 235–236 Mobiquity, 544 Monsanto, 63–64 Morpheus, 171 Mosaic, 415 Motorola, 138 Mozilla Foundation, 168 Mrs Fields Cookies, 597 MSN, 413, 433 MyPoints, 417 N Napster, 171 NASA, 102 National Cyber Security Center (NCSC), 305 National Health Service (NHS), 498–499, 568 Nestlé, 375 Netflix, 40, 174, 291, 411, 416, 467 Network Advertising Initiative, 164, 168 NetZero, 288 New York City, 255–257, 431, 459 New York Times, 416 New Zealand Department of Commerce, 454–455 NextBio, 258 Nike, 126, 129–130, 371–372 Nissan, 433 Nordstrom, 354 Novell, 200, 281, 286 O Ocean Minded, 614 1-800-Flowers, 433 Open Handset Alliance, 208 OpenSignal, 234 OpenSource.org, 220 Open Text Corp., 455 Oracle Corp., 101, 201, 208, 209, 216, 221, 366, 381, 388, 394, 445–446, 455, 508, 522, 582, 605 Orville Redenbacher, 550 Overstock.com, 388 P Panda Security, 328 Pandora, 172, 416 Panorama Consulting Solutions, 387 PayPal, 126, 331 Penguin, 303 PeopleSoft, 224 Pepsico, 90, 231, 425, 433 Photobucket.com, 413 Pinterest, 405, 422–423 Piper Jaffray Cos., 64 The Pirate Bay, 171 Pixar Animation Studios, 305 Plan International, 80–81 Plex Systems, 389 Ponemon Institute, 330–331, 353 Priceline.com, 414 PricewaterhouseCoopers (PwC), 551 Privi Organics, Ltd., 45 Procter & Gamble (P&G), 135, 373, 433, 456, 470–471 Progressive Insurance, 502–503 Proofpoint, 297 Q Qualcomm, 456 Quantcast, 167 R Raytheon, 429 Red Hat, 221 Reebok, 136 Renault, 461 Ricoh, 471 Roche, 481–482 Rolls-Royce PLC, 429 Rosendin Electric, 235–236 Rugby Football Union (RFU), 31–33 S Sabre Holdings, 254 SAC Capital, 154 Safeway, 431 SalesForce.com, 201, 211, 215, 218, 225, 381, 389, 415, 590 Samsung Electronics, 138, 171, 207, 429 Sanyo, 471 SAP, 108, 273, 366, 370, 381, 388–389, 394, 482, 508, 516, 609–610 Schneider National, 375, 519 7-Eleven, 440 Shopkick, 433 Six Flags, 84 SKF, 37 Skype, 90, 295, 505 Snapchat, 418, 424 SNCF (French rail service), 494 Snyders of Hanover, 61 Societe Generale, 267-268 The Software Alliance, 171 Sonic Automotive, 37 Sony, 332 Southern Co., 211 Southern Valve & Fitting USA (SVF), 93 Southwest Airlines, 223 Sports Authority, 433 Sportsvite, 415 Spotify, 172, 292, 417 Sprint, 138, 306 Stanford University, 203, 299, 468 Staples, 414 Starbucks, 127, 425, 492, 497 Starhub, 321–322 Statoil Fuel and Retail, 365-367 Steelcase Designs, 609–610 SunGard Availability Services, 342 633 Sun Microsystems, 221 Super Fresh, 431 Sybase, 209 T Taco Bell, 501 TAL Apparel Ltd., 43 Target, 173, 388, 394–396 Tasty Baking Company, 369 Tata Consultancy Services, 475–477 Tate & Lyle, 107-109 TCS, 216 Tenaris, 456 Texas Instruments (TI), 115 ThomasNet.com, 264 TIBCO, 522 Tidal Trade, 614 Time Warner, 288, 295 T-Mobile, 138, 143, 306 Tower Records, 115 Toyota, 117, 123 Trader Joe’s, 431 Travelocity, 129 Treehouse Island Inc., 120–121 Trend Micro, 352 TTX, 545 Tumblr, 415, 422 Twitter, 304, 389, 415, 422 TypePad.com, 304 U Uber, 135, 399–401, 415, 430 Under Armour, 129–131 United Parcel Service (UPS), 49–50, 497 United States International Trade Commission, 171 United States Patent and Trademark Office, 170 United States Telecom Association, 292 Universal Robots, 461 UPS Supply Chain Solutions, 375 U.S Cyber Command (CYBERCOM), 333 U.S Department of Commerce, 165 U.S Department of Defense, 284, 288, 331, 333 U.S Department of Defense Advanced Research Projects Agency (DARPA), 284 U.S Department of Homeland Security, 305 U.S Federal Highway Administration, 451 U.S Forest Service, 497 U.S Internal Revenue Service, 75 U.S National Institute of Standards and Technology (NIST), 214 U.S Patent and Trademark Office, 170 U.S Postal Service (USPS), 255 U.S Securities and Exchange Commission, 301 U.S Social Security Administration, 75 V Vail Resorts, 78 Valiant Entertainment, 353 Verizon, 280 Vestas Wind Systems, 494 VEVO, 411 Virgin Entertainment Group, 295 Visa, 158, 468 Vita Coco, 353 VmAirWatch, 354 Volkswagen, 154, 427, 462 Volkswagen Group, 177 www.downloadslide.net 634 Index W Wall Street Journal, 408, 416 Walmart Inc., 42, 123, 125–126, 138, 310, 331, 376, 394, 414, 433, 439–441 Walt Disney World Resort, 211 Washio, 400 Waze, 430 WebEx, 90 Webvan, 431 Whole Foods, 431 Wipro Technologies, 210 World Bank, 451 WorldCom, 336 World Wide Web Consortium (W3C), 290 WSJ.com, 413 X Xanga.com, 304 Y Yahoo!, 299–300, 416 Yellow Pages (YP), 535 Yelp, 417 YouTube, 389 Yumprint, 440 Z Zappos.com, 120, 130 ZEAL Network SE, 493 Zillow.com, 226 ZipRealty, 226 Subject Index A acceptable use policy (AUP), 296, 341 acceptance testing, 526 access points, 325 access rules, 342f accountability, 156, 159, 184 accounting practices, 596 addressing and architecture, 288 ad hoc query, 493 Ad Network, 419 Adobe Acrobat Reader, 38 Adobe Connect, 90 Adobe Creative Suite, 210 Adobe Flash Player, 327 Adobe Illustrator, 225 advertising, 187, 303 See also marketing blast-and-scatter, 421 display, 403 Google’s revenues from, 35 on mobile devices, 433 native, 421 networks, 421f online, 419 online marketing and, 418t pivot table used for, 502f revenue model, 415–416 affiliate revenue model, 417 agency theory, 118 agent-based modeling, 470 agile development, 541, 546 AI See artificial intelligence air travel, 181 alert system, 256 algorithms, 303 genetic, 469–470, 469f, 472 Hummingbird search, 300–301 Altair 8800, 115 Amazon Alexa, 440 Amazon Prime, 439 Amazon Relational Database Service, 254 Amazon Web Service (AWS), 215f, 218 ambient data, 337 analog signal, 285 analog versus digital, 285 analytical CRM, 383–386, 384f analytic platforms, 259–260 analytic software, 33 Ancestry.com, 416 Android operating system, 208, 226, 234, 353 Angkasa Library Management system, 316-318 antivirus software, 347, 355 AOL Instant Messenger, 294 Apache, 299 Apache Open for Business (OFBiz), 389 App Internet, 306 Apple Apps, 226 Apple iOS, 470 Apple iPad, 37, 38f, 171, 226, 470, 492, 516 Apple iPhone, 37, 38f, 138, 171, 226, 470, 492, 591f Apple iPod, 126, 171, 226 Apple iTunes, 42, 73, 123, 126, 172, 411 Apple Safari, 221 Apple Watch, 211 application controls, 337 application layer, 284 application proxy filtering, 347 applications international information systems developing, 603 knowledge, 451 location-based service, 430–433 of MIS, 501t of social business, 87t software, 225–226, 536–538 application server, 199 apps, 225–226 AR See augmented reality architecture and governance, 290–292, 290f artificial intelligence (AI), 302, 460, 471 as-is process, 520, 520f asset management systems, 456 associations, 261 ATMs See automated teller machines attribute, 243 auditing, 343, 344f augmented reality (AR), 459 AUP See acceptable use policy authentication, 344–345 automated teller machines (ATMs), 43 automation, 517 avatars, 90, 415 AWS See Amazon Web Service Azure cloud service, 193–196 B B2B See Business-to-business B2C See Business-to-consumer BA See business analytics backward chaining, 462–464 balanced scorecard method, 503–504, 503f bandwidth, 287, 291, 505 Bangle Bartenders, 544 beacon programs, 418–419 behavioral approach, 57–58 behavioral models, 487 behavioral targeting, 418–422 behavioral view, of organization, 111f benchmarking, 132 best-of-breed software, 499 best practices, 132 BI See business intelligence bias, 181 big data analysis of, 31-33, 493–494, 494t challenge of, 254–255 Internet source of, 262–263 management and, 153 for operational intelligence, 496–497 privacy and, 151–153, 183–184 revolution in, 256 Bing, 299 biometric authentication, 345 bit, 242 bits per second (bps), 287 blast-and-scatter advertising, 421 BLE See Bluetooth Low Energy blogosphere, 304 blogroll, 304 blogs, 304 bluetooth, 307–308, 307f, 325 bookstore processes, 520–522, 520f, 521f botnet, 329–330, 358 bot networks, 177 BPM See business performance management BPR See business process reengineering bps See bits per second break-even point, 501 bring your own device (BYOD), 212–213, 234–236, 353–354 broadband connections, 280, 288 broadcast model, 408 Brown Bag Software v Symantec Corp, 170 BSS See business support system bugs, 334 bullwhip effect, 373, 374f business See also industry; organizations collaboration in, 85–86 common user requirements of, 603 customers retained by, 125 global system strategies of, 597–599, 597t, 598f information policy established by, 264–265 information value chain of, 53, 54f Internet as tool for, 296 IS perspective of, 52–54, 59 IS role in, 95–101, 577 IS transforming, 33–35, 59 IT infrastructure impacting, 196f process changes of, 603 reorganizing, 599 restructuring of, 489 risk assessments in, 338–341, 341t security policies of, 341–342 software spending of, 224f supply chain of, 371–372 using social networking, 34–35, 101–102 value chain model in, 129–133, 132f business analytics (BA), 490, 497–499, 505–506 Business ByDesign, 389 www.downloadslide.net Index business challenges, 595–596 business continuity planning, 343 business drivers, 592–594 business ecosystems, 136–138, 137f business functions, 47, 48t business intelligence (BI), 76, 78–79, 255, 259–260, 259f BA and, 505–506 from data, 491 data mining in, 490 decision making analytics and, 491f DSS delivering, 77, 501 elements of, 491–492 in enterprise applications, 390 information streams for, 490 management strategies for, 497–499 production reports in, 492t users of, 500f business models, 42, 412–415 business objectives competitive advantage as, 42 of IS, 41–44 with IT, 139 Business One (SAP), 389 business performance management (BPM), 504 business processes, 47–48, 71–73 change, 603 collaboration in, 87–89 core, 40 enterprise applications and, 387 enterprise systems and, 369t functional, 72 in IT, 73 order fulfillment in, 72–73, 73f routines in, 112, 113f business process management (BPM), 519, 522, 601–602 business process redesign existing processes analysis in, 519–520 new processes design in, 520–522, 521f in organizational change, 518 processes to be changed in, 519 business process reengineering (BPR), 571 business solutions, 71f business support system (BSS), 394 Business-to-business (B2B), 412, 426, 427–429, 436 Business-to-consumer (B2C), 412 business value of decision making, 483, 484t of enterprise systems, 370–371 of SCM, 376–377 BYOD See bring your own device byte, 242 C C2C See Consumer-to-consumer cable Internet connections, 288 cable modems, 285 cable networks, 103, 173, 280 CAD See computer-aided design CAN-SPAM Act, U.S., 177 capital budgeting, 565–566 capital investments, 34f, 117, 195, 565 carpal tunnel syndrome (CTS), 180 CASE See computer-aided software engineering case-based reasoning (CBR), 464–465, 465f cash flow, 566 cash-on-delivery (COD), 607 CAT See consolidated audit trail CBR See case-based reasoning CDMA See Code Division Multiple Access CDO See chief data officer cell phone standards, 306 cellular systems, 306–307 centralization, 390 centralized systems, 599 central systems group, 600 CGI See Common Gateway Interface change See also organizational change agent, 567 business processes, 603 business process redesign, 519 digital market, 411t in IT infrastructure, 226–227 management, 567, 615 MIS technology, 35–39, 36t organizations resistance to, 121–122 record, 526f chatbots, 470 chat systems, 294 Chatter, 103 checkout counters, 44, 45f chief data officer (CDO), 96 chief information officer (CIO), 96, 599 chief knowledge officer (CKO), 96 chief operating officer (COO), 79 chief privacy officer (CPO), 96 chief security officer (CSO), 96 Children’s Online Privacy Protection Act (COPPA), 163 China globalization in, 39 Internet use in, 608 product differentiation in, 126 supply chain of, 371 choice, 485 Choose and Book system, 498–499 Chrome operating system, 208 Chrome web browser, 220–221 chromosomes, 469 churn rate, 387 CIO See chief information officer circuit-switched networks, 283 CISC See complex instruction set computing Cisco Networks, 209 Citrix Podio, 577 CKO See chief knowledge officer Clarizen, 577 class, 530–531, 531f classical model of management, 487 classifications, 261 Clean Air Act, U.S., 177 click fraud, 332 click-throughs, 303, 389 client computers, 199 client/server computing, 282–283 client/server era, 199–200 cloud-based software, 389, 538 cloud collaboration services, 90 cloud computing, 38, 193–196, 227, 306 characteristics of, 214–215 CRM and, 218 databases in, 253–254 data management and, 216-217, 254, 351 enterprise systems, 389 era of, 200–201 635 hybrid, 219 on Internet, 200–201 models compared in, 219t platforms, 214f private and public, 218 SaaS used in, 214–215 security in, 351 service, 174, 454 service types in, 215 software, 225, 536 Cloud Security Alliance (CSA), 351 cloud software service, 536 cloud streaming, 291, 411 CLTV See customer lifetime value clustering, 261 COD See cash-on-delivery Code Division Multiple Access (CDMA), 306, 313 codes of conduct, 161 coercive goals, 116 cognitive failures, 181 cognitive functioning, 182–183 collaboration, 447 benefits of, 87, 88t in business, 85–86, 91-92 in business processes, 87–89 cloud services for, 90 management selecting tools for, 93–95 mobile employees and, 505 requirements in, 88f in software development, 541–542 software investment steps for, 95 software products for, 90–93 technologies used for, 89–90 time/space matrix of, 94f using e-mail, 89, 93, 98, 102 websites for, 304–305 command and control, 87–89 Common Gateway Interface (CGI), 264 common user requirements, 603 communications See also telecommunications technologies analog versus digital signals in, 285 encrypted, 297–298 gap, 570, 570t Internet costs of, 204, 205f near field, 311 network trends in, 279–280 unified, 295–297 communities of practice (COPs), 451 community providers, 415 competition time-based, 175 traditional, 124 competitive advantage, 32, 139, 431, 596 competitive forces model for, 123 core competencies and, 135 decision making and, 43 in globalization, 138 Internet impacted by, 128–129, 128t Internet technology as, 50 IT products providing, 127 knowledge and, 449 outsourcing and, 539 as strategic business objective, 42 sustaining, 138 transnational strategy and, 598 competitive forces model, 123, 124f, 140–141, 229–230, 229f www.downloadslide.net 636 Index cloud computing (continued) competitive strategies, 129–133 Compiere, 389 complacency, from computing, 181–182 complementary assets, 54–56 complex instruction set computing (CISC), 207 component-based development, 542 CompStat, 256 computer abuse, 176–177 computer-aided design (CAD), 452, 458, 472 computer-aided software engineering (CASE), 532 computer crimes, 176–177, 330t See also malware; security botnets, 329–330 click fraud, 332 cyber, 330–331 cybervandalism, 329 cyberwarfare, 333, 339–340 data breaches, 332t DDoS attack, 329 DoS attack, 329 e-mails for fighting, 256 evil twins, 331 hackers, 329 identity theft, 331–332 keyloggers, 328 legislation, 331–332 pharming, 331 phishing, 331 spoofing and sniffing, 329 computer forensics, 336 Computer Fraud and Abuse Act, 331 computer hardware microprocessing power in, 220 platforms, 207–208 telecommunications, 49, 59 trends in, 230 computerized hiring, 152 computerized tomography (CT), 459 computer literacy, 46 computer networks, 280–282, 280f, 312 computers client, 199 enterprise, 200 fault-tolerant, 350 hardware platforms for, 207–208 health risks, 180–183 Internet abuses by, 176–177 mainframe, 197 networks and networking, 280–282, 280f, 312 personal, 197, 199, 206, 329–330 server, 199, 263–264, 281 software, 49 tablet, 210 viruses, 326 Wintel PC, 199, 206 Computer Software Copyright Act, 170 computer-to-computer exchange, 426 computer vision syndrome (CVS), 182 computing See also cloud computing; operating systems client/server, 282–283 complacency from, 181–182 data hierarchy in, 242f decentralized client-server in, 175 green, 219 health risks of, 180–183 in-memory, 258–259 malicious software in, 326–328, 327t mobile, 200–201, 210, 227, 234, 236 on-demand, 218 personal, 197 quantum, 213 service-oriented, 542 social, 297 standards in, 205t system performance in, 174 terms and concepts in, 242–243 wearable devices for, 210–212 Conficker (malware), 359 configure, price and quote (CPQ), 537–538 connectivity, 605–608 consumerization, of IT, 212–213 Consumer Reports, 416 consumers B2C, 412 disintermediation benefiting, 409–410, 409f technologies relationships with, 130 Consumer-to-consumer (C2C), 412 content providers, 414 ContentWorx, 454–455 continuous measurement, 521 continuous quality improvement, 518 controls, 323 control weaknesses, 344f conversational commerce, 403–405 conversations, 86 conversion, in systems development, 527 conversion rates, 394 COO See chief operating officer cookies, 166–167, 166f, 184 cooptation, 604 COPPA See Children’s Online Privacy Protection Act COPs See communities of practice copyright law, 170, 184 core business processes, 40 core competency, 135, 140–141 core systems, 601–602, 601f, 608–611 corporate assets, 40 corporations enterprise applications of, 81–83 firewalls for, 346–347, 346f network infrastructure of, 282f networks in large, 281–282 patchwork international systems of, 596 strategies of, 41–42 costs of cybercrime, 330–331 Internet communications, 204, 205f of IS, 564–565, 565t leadership’s low, 126 of magnetic storage device, 204f menu, 409 of microprocessor chips, 201, 202f negative social, 174–175 of offshore outsourcing, 540f operating, 144 of ownership, 228, 228t, 231, 565 project management considering, 559 switching, 127 transaction, 117, 405 cost transparency, 407 counterimplementation, 574 CPO See chief privacy officer CPQ See configure, price and quote credit cards, 134, 520 data from, 127, 157–158 digital certificate system for, 350 ethical issues of, 156–158 hackers obtaining, 173 hotspots and, 309 identity theft from, 331 Internet adoption of, 607–608 mobile devices managing, 433 neural networks for, 467–469 personal information from, 157 predictive analytics for, 493 security systems for, 341 weblining and, 188 crime fighting, 256 Crime Strategies Unit (CSU), 256 CRM See customer relationship management crop yields, 63 cross-channel capabilities, 394 cross-functional systems, 611 cross-selling, 382 crowdsource funding, 415, 425 CryptoLocker, 328 Crystal Reports, 250 CSA See Cloud Security Alliance CSO See chief security officer CSU See Crime Strategies Unit CT See computerized tomography CTS See carpal tunnel syndrome culture, 48, 86 global, 593 information laws and, 595 of organizations, 112–113 currency fluctuations, 596 customer intimacy, 390 customer lifetime value (CLTV), 386 customer relationship management (CRM), 83, 127, 380f, 589–591 analytical, 383–386, 384f capabilities of, 383f cloud computing and, 218 customer intimacy from, 390 customer service with, 381–382 defining, 377–380 direct-marketing campaigns and, 382, 382f enterprise applications and, 387–388 operational, 383–386 sales force automation in, 381 social networking using, 389 software capabilities of, 383f software for, 381 customers, 126 businesses retaining, 125 loyalty map, 384f social networking with, 424–425 supplier’s relationship with, 42–43, 127 customer service, 49, 381–382 customization in e-commerce, 407–408 mass, 126 in software packages, 538 CVS See computer vision syndrome cyberbullying, 175 cybercrime, 330–331 cybervandalism, 329 cyberwarfare, 333, 339–340 www.downloadslide.net Index cycles per second, 287 D DARPA See Department of Defense Advanced Research Projects Agency data, 44, 509 ambient, 337 business intelligence from, 491 from checkout counters, 45f cleansing or scrubbing, 266 from credit cards, 127, 157–158 database quality of, 265–266 definition, 248 dictionary, 248 Europe’s protection of, 164–165 hierarchy, 242f inconsistency, 244 knowledge from, 448–449 managing resources of, 241–245 mart, 257–258, 269 mining, 261–262 MIS TPS, 76f multidimensional model of, 260f personal information collection of, 165 program dependence on, 244 redundancy, 244 relational DBMS grouping of, 251 from RFID tags, 46 sales, 77f, 125f sharing of, 54–245 warehouse, 255–258, 269 data administration, 265 data analysis, 157 database management system (DBMS) capabilities of, 248–250 designing, 250–251 Microsoft Access in, 250f multiple views of, 246f non-relational, 253–254 relational, 246–248, 247f, 249f, 251, 254, 268 software, 245 traditional environment of, 245–246 databases, 245 administration, 265 as alert system, 256 in cloud computing, 253–254 information accessed in, 269 Internet and, 263–264, 263f NoSQL, 253 quality of data in, 265–266 querying of, 248–250, 250f server for, 263–264 software for, 209 data breaches, 332t data brokers, 152, 418–419 data flow, transborder, 595 data flow diagram (DFD), 528, 529f data governance, 265, 267 data management, 268–269, 495 cloud-based, 254 cloud computing and, 254, 351 data quality in, 265–266 IS and, 59–60 IT infrastructure and, 195–196, 206–207 storage and, 209 technology, 49, 144–145, 152 data manipulation language, 248 data mining, 261–262, 269, 417, 452, 460, 490 Data Protection Directive, 595 data quality, 265–266 data transfer rate, 286 data visualization, 492 data warehouse, 499 data workers, 47 DBMS See database management system DDoS See distributed denial-of-service debugging, 352 decentralized client-server, 175 decentralized systems, 599 decisional role, 487–488 decision making automated high-speed, 489–490 BI analytics for, 491f business value of, 483, 484t competitive advantage and, 43 digital dashboard for, 79f DSS and, 98, 506 enterprise systems improving, 370–371 fairness in, 160 improving, 43 information required in, 484f IT influencing, 118–121, 119f managements role in, 486–487 MIS role in, 500–501 pivot tables used for, 502 process of, 485–486 real world, 488 rent-versus-buy, 227 stages of, 486f technologies and, 496 types of, 483–485, 505 value-added activities in, 54 decision-support systems (DSS), 78f BI delivered by, 77, 501 decision making and, 98, 506 group, 504–506 deep packet inspection (DPI), 350 Delivery Information Acquisition Device (DIAD), 53f delivery platform, 492 demand planning, 374 denial-of-service (DoS) attack, 329, 354 Department of Defense, 288 Department of Defense Advanced Research Projects Agency (DARPA), 284 deregulation, 164 design considerations, 122–123, 485 developing countries, 606 DevOps, 541–542, 546 DFD See data flow diagram DIAD See Delivery Information Acquisition Device digital asset management systems, 456 digital certificates, 349f, 350 digital dashboard, 79, 79f, 493 digital divide, 180 digital firm, 40, 137f digital goods, 410–411, 435 digital information, 157 digital markets, 435 flexibility and efficiency of, 408–409 Internet changing, 411t traditional markets and, 410t Digital Millennium Copyright Act (DMCA), 172 digital networks, 171 digital signal, 285 digital strategies, 107–108, 110 637 digital subscriber line (DSL), 288, 312 digital versus analog, 285 direct cutover strategy, 527 direct goods, 427–428 Directive on Data Protection, 164 direct-marketing campaigns, 382, 382f, 384 disaster recovery planning, 342–343 disintermediation, 409–410, 409f display ads, 403 disruptive technologies, 114–116, 115t distributed denial-of-service (DDoS), 321–323, 329 distribution center, 394 distribution model, 410–411 DMCA See Digital Millennium Copyright Act DNS See Domain Name System documentation, 526–527 Dodd-Frank Wall Street Reform and Consumer Protection Act, 44 domain name, 288 Domain Name System (DNS), 288–289, 289f, 313 domestic exporter, 597 Do Not Track system, 164, 169, 421 DoS See denial-of-service attack DoubleClick, 158, 166–168, 419, 421f downstream, supply chain, 372 DPI See deep packet inspection drill down, 493, 504 drive-by downloads, 327 driving habits, 151 Dropbox, 92, 212, 218, 353 DSL See digital subscriber line DSL modems, 285 DSS See decision-support systems due process, 159 duplicated systems, 599 dynamic pricing, 409 E Earthlink, 288 easy-to-handle pieces, 556 e-business, 84 EC2 See Elastic Compute Cloud ECM See enterprise content management e-commerce, 35, 41, 607–608 See also digital markets; Internet behavioral targeting in, 418–422 big data analysis in, 493–494 business models for, 412–415 commitment to, 440 conversational, 403–405 customization in, 407–408 goods and service purchased in, 401–402 growth of, 402–404, 402f information density in, 407 interactivity in, 407 key concepts in, 408–410 management challenges of, 433 marketing transformed by, 417–426, 435 mobile, 412, 430f through mobile devices, 405 personalization in, 407–408 presence map, 434, 434f, 435t revenue models, 415–417, 435 revenues, 403 richness in, 407 social, 422–423, 423t technology and power of, 405–408 www.downloadslide.net 638 Index technology features of, 406t types of, 412 universal standards in, 406–407 economic impacts, of IS, 117–118 economic value, 135 economies of scale, 204–206 ecosystem strategic model, 137f EDI See Electronic Data Interchange efficiency, 408–409 efficient customer response system, 126 e-government, 84 eHarmony, 416 802.11 wireless standards, 308–309 EIM See enterprise information management Elastic Compute Cloud (EC2), 215 electronic business See e-business electronic commerce See e-commerce Electronic Data Interchange (EDI), 426, 427f, 611, 614 electronic document retention policy, 336–337 Electronic Privacy Information Center (EPIC), 188 electronic records management, 335–337 electronic surveillance, 296 e-mail, 122, 434 cellular systems and, 306–307 collaboration using, 89, 93, 98, 102 computer abuse through, 176–177 crime fighting using, 256 digital strategies and, 107–108, 110 employee monitoring and, 178-179, 296 federal law and, 35 free web-based, 167 incompatibility of, 600 as Internet service, 293 malicious software and, 326–327 mobile digital platforms with, 210 organization retention of, 44 phishing, 331 privacy and, 169 sentiment analysis from, 262 spoofing, 329 as unified communications, 295 vulnerabilities of, 324–325 wearable computing with, 211 web-based, 167 employee relationship management (ERM), 381 employment e-mail monitoring in, 178-179, 296 global, 80, 609 internal threats in, 333–334 IS and IT, 97 IS influencing, 161–162 in MIS, 97 mobile, 505 payroll processing in, 75f reengineering work in, 179–180 technologies influencing, 179–180 in U.S., 39–40 encrypted communications, 297–298 encryption, 348–349, 349f, 355 encyclopedia industry, 128 Endomondo, 130 end-users, 97, 569 communication gap with, 570, 570t development, 535–536, 546 graphical interface, 610 interface, 492, 535 IS interface for, 558 overcoming resistance of, 572–574 role of, 524–525 Energetic Bear (malware), 340 enterprise applications, 81–83, 571 architecture of, 82f BI in, 390 business processes and, 387 challenges facing, 387–388 CRM and, 387–388 next-generation, 388–390 social networking tools as, 93, 94t software packages in, 208–209, 224, 369–370, 390 enterprise computers, 200 enterprise content management (ECM), 453–456, 453f enterprise resource planning (ERP) systems, 82, 365-367, 394–395, 515–516, 614–615 SAP, 516, 609 scoring model for, 563, 564t XML and, 222 enterprise software, 208–209, 224, 272-274, 369–370, 390 enterprise solutions, 388 enterprise suites, 388 enterprise systems, 79–83, 365–367, 368f business processes and, 369t business value of, 370–371 centralization from, 390 cloud-based, 389 decision making improved by, 370–371 defining, 368–369 software for, 208–209, 224, 369–370, 390 stand alone, 388 enterprise-wide knowledge management systems, 452 entity, 243 entity-relationship diagram, 252–253, 253f Environmental Protection Agency (EPA), 178 environmental scanning, 114 EPA See Environmental Protection Agency EPIC See Electronic Privacy Information Center ergonomics, 576 ERM See employee relationship management ERP See enterprise resource planning systems ESS See executive support systems e-tailers, 413–414 ethanol, 124 ethernet, 286 ethical analysis, 160 ethical and moral issues computer health risks and, 180–183 of credit cards, 156–158 of intellectual property, 169–172 IS and, 153–155, 154t, 155f, 159–162, 183 management facing, 153–155 of networks and networking, 156–158 of privacy, 165–169 of technologies, 156–158, 157t ethical dilemma, 153, 161–162 ethical no-free-lunch rule, 161 ethics concepts of, 159–160 defining, 154–155 no-free-lunch rule in, 161 principles of, 160–161 E*Trade, 417 EU See European Union Europe, 595–596 data protection in, 164–165 Facebook users in, 188 Internet use in, 606f spam regulations in, 177 European Commission, 164, 329, 359 European Union (EU), 164, 177, 447, 595 evil twins, 331 evolutionary approach, 602 exchanges, 429 executive support systems (ESS), 78, 503–504, 506 expert systems, 460–464, 463f explicit knowledge, 448 exports, 39, 597 extensible markup language (XML), 222, 222t, 542 external integration tools, 572 extranets, 50, 84 F Facebook, 34–35, 101, 103, 167, 186–189, 212, 219, 264, 299, 302, 389, 403, 405, 413, 415, 416, 422–424, 430, 470, 492 Facebook Chat, 294 facial recognition software, 187, 302, 345 factors of production, 594 Fair Information Practices (FIP), 162, 163t farm equipment, 63–64 fault-tolerant computer systems, 350 feasibility study, 523–524 federal laws, 35, 163t Federal Trade Commission (FTC), 163–164, 163t, 188 feedback, 45f, 46 Festi, 177 field, 242 FieldScripts, 63–64 file organization, 242–243 files, 242, 243f file-sharing services, 171, 325 File Transfer Protocol (FTP), 293 filtering software, 177 financial models, 566 financial services, 195 deregulation of, 164 electronic records management for, 336 laws protecting, 164 multinational strategies in, 597 predictive analysis in, 493 system availability in, 350 transaction brokers for, 414 Financial Services Modernization Act, 336 fingerprint identification devices, 345 FIP See Fair Information Practices Firefox web browser, 220–221 firewalls, 346–347, 346f, 355 Flash, 221 flash cookies, 167 flexibility, 244, 408–409 FlipSide video, 424 forecasting, 261, 493 foreign key, 247 foreign trade, 39 formal control tools, 572 formal planning tools, 572 forward chaining, 462 www.downloadslide.net Index 4G networks, 306 Foursquare service, 430, 432 FPX software, 537 franchisers, 597–598, 599 free/freemium revenue model, 416–417 FTC See Federal Trade Commission FTP See File Transfer Protocol fuzzy logic systems, 465–466, 466f, 472 G Galaxy 5, 171 Gantt chart, 572, 573f, 577 GDP See gross domestic product GDSS See group decision-support systems Genealogy.com, 416 general controls, 337, 338t general practitioner, 568 genetic algorithms, 469–470, 469f, 472 geoadvertising services, 430 geographical information system (GIS), 497 geoinformation services, 430 geosocial services, 430 GIS See geographical information system The Glass Cage: Automation and Us (Carr), 181 global culture, 593 global information systems See international information systems globalization challenges and opportunities of, 39–40 in China, 39 competitive advantages in, 138 local services and, 594 MIS and, 40 particularism influencing, 39 supply chain in, 375, 591f global markets, 594 global networks, 288 Global Positioning System (GPS), 63, 430 global supply chain, 375 Global System for Mobile Communications (GSM), 306, 313 global systems, 603 global telecommunications, 598–599 global threats, 333 global workforce, 80, 609 Golden Rule, 160 goods and service, 401–402 Google, 35, 167, 299 Google +, 90, 302, 415, 422 Google AdSense, 167 Google Apps, 90, 212, 215 Google Chrome, 208 Google Docs, 90, 92 Google Drive, 90, 92, 218, 353 Google Gmail, 167, 212 Google Hangouts, 90, 92, 294 Google Maps, 126, 516 Google Play, 226, 353–354 Google Search, 167, 301f, 467, 489 Google Sites, 90, 92 governance, 97, 265, 267, 290–292, 290f GPS See Global Positioning System Gramm-Leach-Bliley Act, 164, 336 grand design approach, 602 graphical user interface, 610 green computing, 219 green IT, 219 grocery delivery, 432 gross domestic product (GDP), 447 group decision-support systems (GDSS), 504–506 GSM See Global System for Mobile Communications H Hackers, 321, 325, 329, 354, 358–360 smartphones attacked by, 327 Hadoop, 209, 259, 269 Hadoop Distributed File System (HDFS), 258 hard disk drives, 115, 203 HCM See human capital management HD See high-definition TV HDFS See Hadoop Distributed File System Healthbox, 131 healthcare industry, 51-52, 335, 481-483 Health Insurance Portability and Accountability Act (HIPAA), 164, 335 health risks, 180–183 heartbleed bug, 334 hertz, 287 HFTs See high-frequency traders high-performance processors, 220 high-speed Internet, 309 HIPAA See Health Insurance Portability and Accountability Act host country system units, 599 hotspots, 309 HR See human resources HTML See hypertext markup language HTML5, 221 HTTP See hypertext transfer protocol hubs, 281 Huddle, 577 human interface design, 608–610 human resources (HR), 80–81, 243–244, 246f, 550, 556 Hummingbird search algorithm, 300–301 hybrid AI systems, 471 hybrid cloud computing, 219 HyperPlant, 459 hypertext markup language (HTML), 221–222, 263, 298, 313 hypertext transfer protocol (HTTP), 298 I IaaS See infrastructure as a service IAC See Intuit Analytics Cloud IBM Connections, 93, 102 IBM Notes, 93 IBM PureData System, 259 IBM TryTracker, 31-33 IBM WebSphere, 223 IDC See International Data Center identity management, 341, 344–345 identity theft, 331–332 IF-THEN-ELSE rules, 465–466 IIS See Internet Information Services IM See instant messaging IMB See Intelligent Mail bar code system; Internet Movie Database implementation, 485–486 counter, 574 international information systems, 603–604 of IS, 531–532 in project management, 567–569 imports, 39 In-a-Snap Snapchat, 424 639 incremental approach, 602 independent software developers, 138 Independent Software Vendor (ISV), 537 indirect goods, 428–429 Industrial Internet, 509 industrial revolution, 39 industry encyclopedia, 128 healthcare, 335 movie, 411 oil and gas, 509 recording, 172, 410–411 travel agency, 128 inference engine, 462, 463f information, 44 asymmetry, 408 business intelligence streams of, 490 culture and laws on, 595 data mining for, 261–262 decision making and required, 484f pivot tables used for, 502 policy established for, 264–265 quality of, 488, 489t requirements, 524, 562 rights, 156, 162–164 society, 155f value chain, 53, 54f information age, 156 informational role, 487 information density, in e-commerce, 407 information resources, 341, 355 information systems (IS), 33f See also international information systems; systems development alternative methods in, 546 audit, 343 behavioral study of, 57–58 benefits of, 32–33 business and role of, 95–101, 577 business objectives of, 41–44 business perspective on, 52–54, 59 business solutions and, 71f business transformed by, 33–35, 59 capital budgeting for, 565–566 communications gap on, 570, 570t competitive strategies using, 129–133 controls in, 337–338 cost and benefits of, 564–565, 565t counterimplementation in, 574 data management and, 59–60 defining, 44–46 department of, 96–97 dependence on, 176 design considerations of, 122–123 dimensions of, 46–47, 47f economic impacts of, 117–118 employment in, 97 employment influenced by, 161–162 end users relationship in, 569–570 ethical and moral issues and, 153–155, 154t, 155f, 159–162, 183 financial services availability of, 350 functions of, 45f implementation of, 531–532 liability problems from, 173 literacy, 46 management decisions from, 505 management structures for, 559–560 managerial roles in, 488t www.downloadslide.net 640 Index managers, 96 occupations in, 97 organizational resistance and, 122f organization interdependence and, 41f in organizations, 47–49 organizations planning of, 577t organizing functions of, 97–98 outsourcing in, 539–540 plan, 560–562, 561t SCM and, 372–373 study of, 57f systems integration of, 605 systems life cycle in, 533 technical study of, 56–57 user interface of, 558 vulnerability of, 323–324 information systems project change management in, 567 end users resistance to, 572–574 management commitment to, 570 risk factors in, 571, 576–577 technical complexity of, 571–572 information technology (IT), 44 business objectives with, 139 business processes in, 73 capital investments in, 34f competitive advantage from, 127 components of, 49–52 consumerization of, 212–213 decision making influenced by, 118–121, 119f employment in, 97 in farm equipment, 63–64 global telecommunications and, 598–599 governance of, 97 green, 219 hierarchies flattened by, 118–121, 119f investments in, 55f, 56f negative social costs of, 174–175 organizations interaction with, 109–110, 109f, 140 socially responsible use of, 159–160 information technology (IT) infrastructure, 50, 196f changes in, 226–227 competitive forces model for, 229–230, 229f components of, 206–210, 230 data management and, 195–196, 206–207 ecosystem of, 206f evolution of, 197–201, 230 investments in, 227–230 management of, 227 scalability of, 227 stages of, 198f informed consent, 165 infrastructure as a service (IaaS), 215 inheritance, 530–531, 531f in-memory computing, 258–259 input, 45 input controls, 337 Inside+, 69–71 Instagram, 101, 415 instant messaging (IM), 89, 294, 325 in-store experience, 440 insurance rates, 151 intangible benefits, 564 intellectual property rights, 414 challenges to, 171–172 copyright laws on, 170 patents on, 170–171 privacy and, 169–172 trade secrets in, 169 intelligence, 485 intelligent agent software, 302, 470–472, 471f intelligent techniques AI in, 302, 460, 471 CBR in, 464–465, 465f data mining in, 261–262, 269, 417, 452, 460 expert systems in, 460–464, 463f fuzzy logic in, 465–466, 466f, 472 genetic algorithms, 469–470, 469f, 472 knowledge management with, 452, 452f neural networks in, 467–469, 468f, 472 organizational benefits from, 460 interactivity, in e-commerce, 407 interfaces, 264, 325 for core systems, 608–611 end-user, 492, 535 graphical user, 610 human designed, 608–610 IS user, 558 multitouch, 208 network layer, 285 internal integration tool, 571–572 internal rate of return (IRR), 566 internal supply chain processes, 372 International Data Center (IDC), 255 international information systems alternative strategies in, 611 application development for, 603 approach benefits stated for, 602–603 architecture of, 592–593, 592f business challenges in, 595–596 business drivers in, 593–594 business process changes for, 603 business reorganization for, 599 challenges to, 595t, 606t connectivity in, 605–608 core systems in, 601, 601f developmental approach of, 602 global strategies for, 597–599, 597t, 598f identifying core systems in, 601–602 implementation management of, 603–604 local user support for, 604 management challenges of, 592, 600–601, 600t quality architectures for, 596 systems integration of, 605 technical alternatives to, 611–612 Internet, 49 See also networks and networking; web browsers; websites addressing and architecture of, 288 App, 306 architecture and governance of, 290–292, 290f big data source of, 262–263 broadband connections of, 280 as business tool, 296 cable connections to, 288 China’s use of, 608 client/server architecture on, 294f cloud computing on, 200–201 communications costs with, 204, 205f competitive advantage from, 50 competitive advantage impacting, 128–129, 128t computer abuses on, 176–177 connectivity, 605–608 countries use of, 606f credit card adoption on, 607–608 cyberwarfare on, 333 databases and, 263–264, 263f developing countries infrastructure for, 606 digital markets changed by, 411t DNS of, 288–289, 289f Double-Click on, 158 e-mail service on, 293 encrypted communications on, 297–298 Europe’s use of, 606f as global network, 288 global supply chain influenced by, 375 high-speed, 309 industrial, 509 information asymmetry on, 408 Internet 30 and, 293 IPV6 for, 292–293 long tail marketing on, 417 marketing on, 594 media distribution by, 410–411 mobile device users on, 429–430 organizations and, 122 platforms, 209–210 podcasting on, 414 privacy challenges of, 165–169 satellite connections to, 288 self-regulation of, 168 S-HTTP over, 348 smartphones accessing, 306, 403 supply chain driven by, 377f TCP/IP reference model for, 284f TCP/IP used for, 200 user content generation on, 408 U.S use of, 606f value web on, 133, 134f VoIP over, 294–295 VPN on, 298f vulnerabilities of, 325 Web 2.0, 304–305 Web 3.0, 305–306 Internet 2, 293 Internet-based marketing, 594 Internet Explorer, 221 Internet Information Services (IIS), 299 Internet layer, 284 Internet of People (IoP), 305 Internet of Things (IoT), 35, 129, 305, 311, 322, 327–328, 481, 511 Internet Protocol (IP), 284, 288 Internet Protocol version 34 (IPv6), 292–293 Internet service providers (ISPs), 172, 288, 291 Internet services, 293–294, 293t interorganizational system, 83 interpersonal role, 487 intranets, 50, 69, 84 intrusion detection systems, 347 Intuit Analytics Cloud (IAC), 555–556 investments capital, 34f, 117, 195, 565 in IT, 55f, 56f in IT infrastructure, 227–230 return on, 566 social, 55 steps in software, 95 in technology, 64 IoP See Internet of People iOS (Apple), 208 www.downloadslide.net Index IoT See Internet of Things IP See Internet Protocol IPv6 See Internet Protocol version 34 IRR See internal rate of return IS See information systems ISPs See Internet service providers ISV See Independent Software Vendor IT See information technology item number, 266 iterative process, 534 IVM See Information Value Management J JAD See joint application design Java, 221 jobs See employment joint application design (JAD), 541, 546 Junglee.com, 607 Juniper Networks, 209 just-in-time, 175, 373 K Kaboodle, 423 Kant’s categorical imperative, 160 key field, 247 keyloggers, 328 key performance indicators (KPIs), 102, 503–504, 562 keywords, 167, 221, 299–300, 303, 416, 456 Kindle reader, 73, 522, 543 KMS See knowledge management systems knowledge acquisition, 450 application, 451 base, 462, 594 competitive advantage and, 449 from data, 448–449 data mining discovering, 460 dimensions of, 448t discovery, 460 dissemination, 451 expert systems capturing, 464 explicit, 448 storage, 450–451 structured, 453 tacit, 448 workers, 47, 457 knowledge management systems (KMS), 83, 475–477 enterprise-wide, 239-241, 452 with intelligent techniques, 452, 452f organizational learning and, 449 role of, 447, 472 types of, 452, 452f, 472 in value chain, 449, 450f knowledge work systems (KWS), 452, 457–459 KPIs See key performance indicators KWS See knowledge work systems L LAN See local area networks language, data manipulation, 248 Law of Mass Digital Storage, 203 laws, 201–203 copyright, 170, 184 federal, 35, 163t financial services protected by, 164 information, 595 on information, 595 leadership, low-cost, 126 lean production systems, 596 learning management system (LMS), 456, 550 legacy systems, 210, 571 legal liability, 335 legislation, 336 computer crime, 331–332 Do Not Track and, 165 personal information protected by, 164 privacy, 163–164 safe harbor and, 165 self-regulation and, 168 legitimacy, 603 leisure time, 175 liability, 159, 173 LinkedIn, 415, 422 link farms, 303 Linux, 208, 220–221 liquified natural gas (LNG), 509 LMS See learning management system LNG See liquified natural gas local area networks (LAN), 286, 308–309, 312, 325 local services, 594 local systems, 601f local user support, 604 location analytics, 497 location-based services, 430–433 logical view, 245 long tail marketing, 417 Long Term Evolution (LTE), 307 LTE See Long Term Evolution M MacBooks, 171 machine learning, 467 MAEs See metropolitan area exchanges magnetic resonance imaging (MRI), 459 magnetic storage device, 203, 204f mainframe computers, 197, 207 main memory (RAM), 258 maintenance, in systems development, 527 MakeMyTrip.com, 607 malicious software, 326–328, 327t malware, 334 computer viruses and, 326 drive-by downloads, 327 keyloggers, 328 ransomware, 328 spyware, 167, 328, 347 SQL injection attacks, 328 Trojan horse, 328, 347 worms, 326, 347 MAN See metropolitan area network managed security service providers (MSSPs), 351 management, 49 BA and BI strategies of, 497–499 big data and, 153 capital, 55 change, 567, 615 classical model of, 487 collaboration tools selected by, 93–95 customer loyalty map for, 384f data resource, 241–245 decision making’s role of, 486–487 e-commerce challenges of, 433 electronic records, 335–337 641 employee relationship, 381 enterprise content, 453–456, 453f ethical issues facing, 153–155 filters, 488–489 groups, 74–79 identity, 341, 344–345 information systems project commitment of, 570 international information systems challenges for, 592, 600–601, 600t international information systems implementation by, 603–604 IS and roles of, 488t IS for decisions from, 505 of IT infrastructure, 227 operational, 47, 485 partner relationship, 381 patch, 334 senior, 47, 89, 154t, 485, 504 strategic systems analysis by, 139 structures, 559–560 total quality, 518, 545 unified threat, 348 Management Information Systems (MIS) applications of, 501t decision making and, 500–501 employment in, 97 field of, 46 globalization and, 40 study of, 58 technology changes and, 35–39, 36t TPS data in, 76f transaction processing systems and, 76 managerial roles, 487 manual labor, 461 manufacturing, 461–462 MapMyFitness, 130 MapReduce, 258 market creator, 414–415 marketing campaigns of direct, 382, 382f, 384 CRM campaigns of, 382, 382f e-commerce transforming, 417–426, 435 Internet-based, 594 long tail, 417 online, 418t personal information used in, 158 search engine, 303–304 in social networking, 422–426 wisdom of crowds in, 423 marketing campaigns, 158, 382–383, 383f market niche, 126–127, 137 marketplace, 124, 594 market space, 405 mashups, 225–226 mass customization, 126 massive open online courses (MOOCs), 456 Match.com, 416 m-commerce, 429–430, 433, 436 MDM See master data management measurement, continuous, 521 media, transmission, 287 media distribution, 410–411 menu costs, 409 Metcalfe’s Law, 203 metropolitan area exchanges (MAEs), 290 metropolitan area network (MAN), 286, 312 microblogging, 304 microeconomics, 110f www.downloadslide.net 642 Index micromarketing, 594 micropayment systems, 416 microprocessing power, 201–203, 202f, 220 microprocessor chips, 201, 202f Microsoft Access, 246, 250f Microsoft Cortana, 470 Microsoft Excel, 502 Microsoft NET platform, 223 Microsoft Office, 470, 536 Microsoft OneDrive, 92 Microsoft Project, 577 Microsoft SharePoint, 70, 92–93 Microsoft SQL, 309 Microsoft Xbox Live, 416 middle management, 47, 89, 485 millions of instructions per second (MIPS), 201 MIMO See multiple input multiple output minicomputers, 197 minority groups, 180 MIPS See millions of instructions per second Mirai (malware), 321–322, MIS See Management Information Systems MLB See Major League Baseball MLS See multiple listing service mobile apps, developing, 543–545 mobile computing, 210, 227, 234 era of, 200–201 security of, 236 mobile device management (MDM), 235 mobile devices, 35–38, 324 advertising on, 433 BYOD, 212–213, 234–236, 353–354 credit cards managed through, 433 e-commerce through, 405 Internet users on, 429–430 malware on, 327 privacy issues of, 158 security for, 325, 352, 354 mobile digital platforms, 35–36, 38–39, 210 mobile e-commerce, 412, 430f mobile employees, 505 MobileIron, 236 Mobile Sales App, 516–517 mobile search, 300 mobile web app, 543 mobile website, 543 models See also standards advertising revenue, 415–416 affiliate revenue, 417 agent-based, 470 behavioral, 487 broadcast, 408 business, 42, 412–415 classical management, 487 cloud computing compared in, 219t competitive forces, 123, 124f, 140–141, 229–230, 229f distribution, 410–411 ecosystem strategic, 137f ERP scoring, 564t financial, 566 free/freemium revenue, 416–417 multidimensional data, 260f object-oriented development in, 530–532 opt-in and opt-out, 168 pull-based and push-based, 376, 376f, 439 revenue, 415–417, 435 sales revenue, 416 scoring, 563, 564t structured methodologies in, 528–530 subscription revenue, 416 system design and, 546 transaction fee revenue, 417 value chain, 129–133, 132f, 140 walled garden, 353 modems, 285 functions of, 285f types of, 286f MOOCs See massive open online courses Moore’s Law, 201–203, 202f moral dimensions, 156 moral issues See ethical and moral issues MOST, 37 movie industry, 411 MRI See magnetic resonance imaging MSN, 413 MSSPs See managed security service providers multicore processors, 220 multidimensional data model, 260f multinational company, 600 multinational strategy, 597 multiple input multiple output (MIMO), 309 multiple listing service (MLS), 226 multitiered client/server architecture, 199, 200f, 293, 294f, 324 multitouch interface, 208 MyFitnessPal, 130 MyPoints, 417 My Recipe, 550–551 MySQL, 246 N NAI See Network Advertising Initiative nanotechnology, 203 nanotubes, 203 NAPs See network access points NAT See Network Address Translation National Information Infrastructure Protection Act, 331 National Institute of Standards and Technology (NIST), 214 native advertising, 421 native app, 543 near field communication (NFC), 311 negative social costs, 174–175 Netflix, 411, 416 net marketplaces, 427–428, 428f net neutrality, 291–292 Netscape.com, 402 network access points (NAPs), 290 Network Address Translation (NAT), 347 Network Advertising Initiative (NAI), 168 network-based strategies, 135–138 network economics, 135–136, 203 networked systems, 599 network interface controller (NIC), 325 Network interface layer, 285 network operating system (NOS), 281 networks and networking, 49 See also telecommunications technologies advertising, 421f bandwidth in, 287, 291, 505 bluetooth, 307–308, 307f, 325 bot, 177 cable, 103, 173, 280 circuit-switched, 283 client/server computing in, 282–283 communication trends and, 279–280 computer, 280–282, 280f, 312 corporation infrastructure of, 282f digital, 171 economies of scale and, 204–206 ethical issues of, 156–158 global, 288 international challenges of, 606t in large corporations, 281–282 local area, 286 modems in, 285, 285f, 286f operating systems, 209 packet switching of, 283, 283f peer-to-peer, 286, 295, 325 private industrial, 427, 428f routers for, 281 software-defined, 281 switches in, 127, 281 TCP/IP in, 284–285 TCP/IP reference model for, 284f telephone, 279 3G and 4G, 306 transmission media used in, 287 types of, 285–287, 312 unified communications in, 295–297 VPNs in, 297–298, 298f, 313, 348, 505 WANs, 286, 454 Wi-Fi, 308–309, 313 WSNs, 311, 313 NetZero, 288 neural networks, 467–469, 468f, 472 neurofuzzy systems, 471 New York Times, 416 NFC See near field communication NIC See network interface controller NikeFuel, 130 NIST See National Institute of Standards and Technology nitrogen oxide (NOx), 178 NLP See Neighborhood Liaison Program nonobvious relationships awareness (NORA), 158, 159f non-relational DBMS, 253–254 NORA See nonobvious relationships awareness normalization, 251, 251f, 252f normative goals, 116 NOS See network operating system NoSQL databases, 253 Novell Netware, 200 NOx See nitrogen oxide N-tier See multitiered client/server architecture O objective techniques, 563 object-oriented development, 530–532 object-oriented programming language, 222 observations, passive, 182 OFBiz See Apache Open for Business Office 393, 70 offline media, 434 offshore outsourcing, 539, 540f oil and gas industry, 509 OLAP See online analytical processing OMS See Order Management System on-demand computing, 218 on-demand economy, 400–401, 415 online advertising, 419 online analytical processing (OLAP), 260–261, 384, 490 online dating sites, 416 www.downloadslide.net Index online marketing, 418t Online Privacy Alliance, 168 online retail stores, 413–414 online transaction processing, 350 OnQ system, 127 ooVoo, 90 Open Handset Alliance, 208 open source software, 220–221, 389 operating costs, 144 operating systems Android, 208, 226, 234, 353 Apple’s, 208 Chrome, 208 Linux, 220–221 network, 209 Windows, 200, 206, 208 Windows 38, 208, 226, 544 operational CRM, 383–386 operational intelligence, 494–497 operational management, 47, 485 Operation Green Rights, 329 OPM See Office of Personnel Management opt-in model, 168 opt-out model, 168 Oracle Cloud platform, 536 Oracle Database, 246, 454 Oracle WebCenter Content, 454 order fulfillment, 72–73, 73f order processing, 341t organizational capital, 55 organizational change, 545 business process redesign in, 518 risks and rewards in, 518f systems development and, 517–519 types of, 517 organizational impact analysis, 576 organizational intelligence, 464–465 organizational learning, 449 organizations behavioral view of, 111f change resistance of, 121–122 characteristics of, 112–117 culture of, 112–113 defining, 110–111 e-mail retention by, 44 environment of, 113–114 hierarchies in, 48f inertia and politics of, 489 intelligent techniques benefiting, 460 Internet and, 122 IS and interdependence of, 41f IS and resistance of, 122f IS in, 47–49 IS planning of, 576t IT flattening, 118–121, 119f IT interaction with, 109–110, 109f, 140 microeconomic definition of, 110f politics of, 112 postindustrial, 119–122 reciprocal relationships in, 114f structure of, 116, 116t output, 46 output controls, 337 outsourcing, 546 competitive advantage and, 539 costs of offshore, 540f in IS, 539–540 offshore, 539 of security, 351 software, 225 P P2LU See Pick to the Last Unit PaaS See platform as a service package tracking system, 50, 138 packet filtering, 347 packet switching, 283, 283f Pandora, 172 PANs See personal area networks paperless system, 569 paradigm shift, 519 parallel strategy, 527 parameterized reports, 492 particularism, 595 partner relationship management (PRM), 381 passive observation, 182 passwords, 344 patches, 334 patch management, 334 patents, 170–171 patient records, 568 Patriot Act, 175 pattern recognition, 468 pay-per-click, 332 payroll processing, 75f, 527, 530f PCs See personal computers peer-to-peer networks, 286, 295, 325 Penguin, 303 performance indicators, 79f personal area networks (PANs), 307, 307f personal computers (PCs), 197, 199, 206, 329–330 personal identification number (PIN), 345 personal information, 595 behavioral targeting of, 418 from credit cards, 157 data collection and, 165 Facebook and, 186–189 Google and, 167 identity theft and, 331–332 malicious software and, 328 marketing campaigns using, 158 opt-in and opt-out models involving, 168 privacy legislation protecting, 164 websites and, 166 personalization, 407–408, 420 personnel system, 342f PERT charts, 572, 574f, 577 pharming, 331 phased approach strategy, 527 phishing, 331 physical transmission media, 287t physical view, 245 Pick to the Last Unit (P2LU), 311 pilot study strategy, 527 PIN See personal identification number Pinterest, 302, 422–423 pipeline-management software, 510 pivot table, 502, 502f Pixar wiki, 305 PKI See public key infrastructure platform as a service (PaaS), 215, 218 platforms, 50, 69 analytic, 259–260 business ecosystems and, 136–138 cloud computing, 214f computer hardware, 207–208 delivery, 492 643 Internet, 209–210 Microsoft NET, 223 mobile digital, 35–36, 38–39, 210 Oracle Cloud, 536 real-time bidding, 420 service, 197 software trends of, 231 podcasting, 414 point-of-sale terminals, 126, 395 Point-to-Point Tunneling Protocol (PPTP), 298 political issues, 155f, 183 politics, of organizations, 489 pollution-control technology, 178 portal, 78, 412–413 Porter, Michael, 124f Porter’s competitive forces model, 123 portfolio analysis, 562–563 POS See point-of-sale terminals post-implementation audit, 527 postindustrial organizations, 119–122 PPTP See Point-to-Point Tunneling Protocol precision agriculture, 63–64 predictive analysis, 493 predictive policing, 151, 152 predictive search, 301 Predix, 509 prescriptive planting, 63–64 presence map, 434, 434f, 435t price discrimination, 407 PriceGrabber, 302 price transparency, 407 pricing, dynamic, 409 pricing methods, 291 primary activities, 131 primary key, 247 printing, 3-D, 458–459 print publishers, 173 privacy See also ethical and moral issues; personal information big data and, 151–153, 183–184 e-mail and, 169 ethical and moral issues of, 165–169 Europe’s protection of, 164–165 Facebook and, 186–189 federal laws on, 163t information rights and, 162–164 intellectual property rights and, 169–172 Internet challenges to, 165–169 legislation, 163–164 mobile devices issues of, 158 personal information legislation protecting, 164 technical solutions to, 169 in U.S., 168 website’s policies of, 168 Privacy Act of 1974, 162 Privacy Shield, 595 private cloud, 218 private exchange, 427 private industrial networks, 427, 428f PRM See partner relationship management problem solving activities, 523 processing, 45 processing controls, 337 process specifications, 530 product differentiation, 125, 126 production, in systems development, 527 production reports, 492, 492t production workers, 47 www.downloadslide.net 644 Index product number, 266 products, substitute, 124 professional work, 85 profiling, 158 program-data dependence, 244 Program Evaluation and Review Technique See PERT charts programmatic ad buying, 420 programmers, 96, 539 programming, 215, 525 HTML and HTML5, 221–222 Java in, 221 open source, 220–221 XML, 222–223 project, 558 project management, 558f cost considerations in, 559 implementation in, 567–569 objectives of, 558–559, 577 risk dimensions in, 566–567 scoring models and, 563 software tools for, 576–577 systems control in, 560f of technical complexity, 571–572 of technologies, 567 Project Management Institute, 570 project portfolio management software, 577 project structure, 567 property rights, 156, 169–172 protocol, 284 prototyping, 546 pros and cons of, 535 steps in, 534–535, 534f in systems development, 534–535 public cloud, 218 public key encryption, 348–349, 349f public key infrastructure (PKI), 350 pull-based model, 376, 376f, 439 push-based model, 376, 376f, 439 Pushdo, 330 Python, 222 Q quality, 559 architectures, 596 data, 265–266 of information, 488 of life, 174 of software, 352 system, 156, 174 TQM for, 518, 545 quantum computing, 213 querying, of database, 248–250, 250f query language, 535 R racial divides, 180 racial profiling, 151 RAD See rapid application development radio frequency identification (RFID) tags, 46, 211–212, 277, 313, 316-318, 385–386 functioning of, 310f through supply chain, 309–311 wireless networks with, 278–279 RAM See main memory ransomware, 328 rapid application development (RAD), 541, 546 rationalization of procedures, 518 R&D See research and development Really Simply Syndication (RSS), 304, 313 real-time bidding platforms (RTB), 420 reciprocal relationships, 114f record, 242 record change, 526f recording industry, 172, 410–411 records management, 335–337 reduced instruction set computing (RISC), 207 reengineering work, 179–180, 571 referential integrity, 252 referral fees, 417 Refining Dashboard, 79 regional distribution, 502f regional systems, 599, 601f registration system, 529f regulations, 335–336 relational DBMS, 246, 247f, 249f, 254, 268 data grouping in, 251 operations of, 247–248 rent-versus-buy decisions, 227 repetitive stress injury (RSI), 180–182, 183f request for proposal (RFP), 537, 538 research and development (R&D), 135 responsibility, 159 responsive web design, 543 Retail Link system, 42 return on investment (ROI), 566 revenue e-commerce, 403 Google’s advertising, 35 mobile e-commerce, 430f models for, 415–417, 435 RFID See radio frequency identification tags RFP See request for proposal richness, in e-commerce, 407 ride-sharing service, 399–400 RightMedia, 419 RISC See reduced instruction set computing risk, 559 assessment, 338–341, 341t aversion principle, 161 health, 180–183 information systems project, 571, 576–577 in organizational change, 518f project management dimensions of, 566–567 robots, 461–462 ROI See return on investment routers, 281 routines, 112, 113f RSI See repetitive stress injury RSS See Really Simply Syndication RTB See real-time bidding platforms Ruby, 222 runaway projects, 557–558 S S3 See Simple Storage Service SaaS See software as a service safe harbor, 165 safety stock, 373 sales data, 77f, 125f sales force automation (SFA), 381 Salesforce Chatter, 93, 103 Salesforce.com, 225 sales revenue model, 416 sandboxing, 353 SAP ERP, 108, 516, 609 SAP HANA, 108, 482 SAP NetWeaver, 516 Sarbanes-Oxley Act, 44, 336 satellite Internet connections, 288 scalability, 227 SCM See supply chain management scope, 559 scoring models, 563, 564t SDN See software-defined networking SDS See software-defined storage search engine marketing, 303–304 search engine optimization (SEO), 303 search engines, 299–300, 301f Second Life, 90 Secure Hypertext Transfer Protocol (S-HTTP), 348 Secure Sockets Layer (SSL), 348 security, 323, 348, 355 See also computer crimes; malicious software; malware breaches, 321, 353 in cloud computing, 351 credit card systems for, 341 in electronic records management, 336–337 IoT challenges of, 327–328 lack of, 244 legal liability and, 335 of mobile computing, 236 for mobile devices, 325, 352, 354 outsourcing of, 351 policy, 341–342 of smartphones, 324 threats, 333–334, 358–360 vulnerabilities of, 324f wireless networks challenges of, 325 self-regulation, 168 sellers, third-party, 440 semantic search, 300–301 semi-structured decisions, 493, 501–503 senior management, 47, 89, 154t, 485, 504 sensitivity analysis, 501f sensor-generated data, 509 sentiment analysis, 262 SEO See also search engine optimization sequences, 261 server computers, 199, 263–264, 281 service level agreements (SLA), 225, 351 service-oriented architecture (SOA), 222–223, 388 service-oriented computing, 542 service platform, 197 services, substitute, 124 service set identifiers (SSIDs), 325 service workers, 47 SFA See sales force automation Shaft Align, 37 sharing economy, 415 shopping bots, 302 S-HTTP See Secure Hypertext Transfer Protocol Shutterstock, 255 SIG See Special Interest Group SIIA See Software and Information Industry Association Silverlight, 221 SimpleDB, 253 Simple Storage Service (S3), 215 SIMs See subscriber identity modules SIMS See Sonic Inventory Management System simulation, 452 Siri See Speech Interpretation and Recognition www.downloadslide.net Index Interface six sigma, 518 SKF Data Collection, 37 SKUs See stock-keeping units Skype, 90, 295, 505 SLA See service level agreements slippery slope rule, 161 smart-cap bottle, 131 smart cards, 345 smart companies, 130–131 smartphones, 35–38, 175, 210, 223, 292 See also mobile devices; wireless networks apps for, 226 biometric authentication on, 345 BYOD for, 234–236, 353–354 cellular systems for, 306–307 growth of, 403–405 hackers attacking, 327 Internet accessible on, 306, 403 Java for, 221 Linux for, 220–221 location-based services used by, 430–433 security of, 324 websites on screens of, 543 smart products, 129, 130–131 SMEs See subject matter experts Snapchat, 418 sniffer programs, 325, 326f, 329 SOA See service-oriented architecture social business, 86 applications of, 87t benefits of, 87, 88t software products for, 90–93, 173 technologies used for, 89–90 time/space matrix of, 94f social computing, 297 social CRM, 389 social e-commerce, 422–423, 423t social engineering, 333 social graph, 422 social investments, 55 socially responsibility, 159–160 social media, 434 social networking, 305, 408, 415, 432 businesses using, 34–35, 101–102 COPs in, 451 CRM used for, 389 with customers, 424–425 malware and, 327 marketing in, 422–426 social business using, 86–87 technology for, 102 tools, 93, 94t social search, 301–302 social shopping, 423 sociotechnical design, 576 sociotechnical systems, 58, 140 software, 207 See also applications; computer hardware; computing agile development of, 541 analytic, 33 antivirus, 347, 355 applications, 225–226, 536–538 best-of-breed, 499 business’s spending on, 224f capabilities of CRM, 383f cloud-based, 389, 538 cloud computing, 225, 536 collaboration and investment in, 95 collaboration in development of, 541–542 collaboration products, 90–93 computer, 49 coordinating release of, 604 for CRM, 381 customization of, 538 database, 209 data cleansing, 266 DBMS, 245 debugging, 352 enterprise, 208–209, 224, 369–370, 390 facial recognition, 187, 302, 345 filtering, 177 FPX, 537 human interface design of, 608–610 independent developers of, 138 integration, 210 intelligent agent, 302, 470–472, 471f localization of, 608–611 malicious, 326–328, 327t mashups, 225–226 networks and networking, 281 open source, 220–221, 389 outsourcing, 225 package, 224 pipeline-management, 510 piracy, 171 platform trends of, 231 products, 90–93, 173 programmers, 96, 539 project management tools of, 576–577 project portfolio management, 577 quality of, 352 runaway projects, 557–558 for SCM, 373–375 sentiment analysis, 262 for social business, 90–93, 173 Trojan horse, 328 virtualization, 213 voice recognition, 161 vulnerabilities of, 334–335 Software and Information Industry Association (SIIA), 172 software as a service (SaaS), 59, 254, 306, 415, 539 cloud computing using, 214–215 cloud software, 536 Salesforce.com as, 225 software-defined networking (SDN), 281 software-defined storage (SDS), 213 Sonic Inventory Management System (SIMS), 37 space shifting, 40 spam, 176–177 Special Interest Group (SIG), 379 Spector 360, 178 SpeedForm Gemini 30 Record Equipped, 131 spoofing, 329 SportWatch GPS, 130 Spotify, 172 spyware, 167, 328, 347 SQL See Structured Query Language SQL commands, 250, 250f SQL injection attacks, 328 SSIDs See service set identifiers SSL See Secure Sockets Layer stand alone enterprise systems, 388 standard operating procedures, 112 standards 645 cell phone, 306 in computing, 205t e-commerce universal, 406–407 802.11 wireless, 308–309 technology, 204–206 stateful inspection, 347 stock-keeping units (SKUs), 615 storage data management and, 209 knowledge, 450–451 magnetic, 203, 204f software-defined, 213 strategic business objective, 42 strategic systems analysis, 139, 141 strategic transitions, 140 streaming, 291, 372, 411, 414, 490 structure chart, 530, 530f structured decisions, 484 structured knowledge, 453 structured methodologies, 528–530 Structured Query Language (SQL), 248 Stuxnet (malware), 339–340, subject matter experts (SMEs), 615 subscriber identity modules (SIMs), 394 subscription revenue model, 416 substitute products and services, 124 SuccessFactors system, 80–81, 551, 610 super cookies, 167 suppliers, 42–43, 125, 127 supply and demand, 134f supply chain of businesses, 371–372 of China, 371 demand-driven, 375–376 downstream, 372 global, 375 in globalization, 375, 591f intelligent agent software in, 471f internal processes of, 372 Internet-driven, 377f planning systems, 373 push and pull-based models of, 376f RFID systems in, 309–311 upstream, 372 supply chain execution systems, 374 supply chain management (SCM), 83, 371, 378–379, 390 business value of, 376–377 IS and, 372–373 software for, 373–375 support activities, 131 surveillance, electronic, 296 switches, 281 switching costs, 127 symmetric key encryption, 348 synergies, 134, 140 system design, 524, 525t, 546, 570t system integration services, 210 system portfolio, 563f system quality, 156, 174 systems analysts, 96, 523–524 systems control, 560f systems development See also project management CASE in, 532 communications gap and, 570 conversion in, 527 core activities of, 528t end-user development in, 535–536, 546 www.downloadslide.net 646 Index software, (continued) end users in, 524–525 information requirements in, 524 maintenance in, 527 object-oriented development, 530–532 organizational change and, 517–519 problem solving activities in, 523 process of, 523f, 545–546 production in, 527 programming in, 525 prototyping in, 534–535 sociotechnical design in, 576 structured methodologies in, 528–530 systems analysts in, 523–524 testing in, 525–526 systems integration, 605 systems life cycle, 533 system testing, 526 T T1 lines, 288 tablet computers, 210 tacit knowledge, 448 tag suggest, 302 tangible benefits, 564 tap-and-go services, 311 taxi service, 399–401 taxonomy, 455 TCO See total cost of ownership TCP See Transmission Control Protocol TCP/IP See Transmission Control Protocol/ Internet Protocol teams, 85 Teamwork Projects, 577 technical approach, 56–57 technical complexity, 571–572 technical solutions, to privacy, 169 technology, 203 cognitive functioning and, 182–183 collaboration using, 89–90 competitive advantage from, 50 consumer relationships with, 130 data management, 49, 144–145, 152 decision making and, 496 disruptive, 114–116, 115t e-commerce features of, 406t e-commerce’s power from, 405–408 employment influenced by, 179–180 ethical issues of, 156–158, 157t information resources protected by, 341, 355 investing in, 64 MIS and changes in, 35–39, 36t pollution-control, 178 project management of, 567 social business using, 89–90 for social networks, 102 standards, 204–206 TCO, 228, 228t, 231 telecommunications, 49, 59, 209, 280, 294–295, 325 telecommunications technologies, 209, 280 See also international inerformation systems; networks and networking; radio frequency identification tags computer hardware in, 49, 59 global, 598–599 VoIP, 294–295, 325 telephone networks, 279 telephone systems, 173 telepresence, 90 Telnet, 293 temperature controls, 466f terminals, point-of-sale, 126, 395 testing, in systems development, 525–526 test plan, 526, 526f text mining, 262–263, 269 third-party sellers, 440 Third World, 594 3-D printing, 458–459 3G networks, 306 three-dimensional (3D) systems, 457 three-dimensional (3D) Web, 305 time-based competition, 175 time shifting, 40 time/space matrix, 94f TLS See Transport Layer Security TMT See Thirty Meter Telescope token, 344 total cost of ownership (TCO), 228, 228t, 231, 565 total quality management (TQM), 518, 545 touch point, 380, 384, 434 Toxic Substances Control Act, 43 TPS See transaction processing systems TQM See total quality management trackbacks, 304 tracking files, 167 tractors, 63 trade secrets, 169 traditional markets, 410t transaction brokers, 414 transaction cost theory, 117, 405 transaction fee revenue model, 417 transaction processing systems (TPS), 74–76, 75f, 76f, 267-268 transborder data flow, 595 Transmission Control Protocol (TCP), 284 Transmission Control Protocol/Internet Protocol (TCP/IP), 200, 282, 284–285, 284f transmission media, 287 transnational strategy, 598 transnational systems, 599, 602 transport layer, 284 Transport Layer Security (TLS), 348 travel agency industry, 128 Trojan horse, 328, 347 TRUSTe, 168 Tumblr, 415, 422 tunneling, 298 tuples, 247 Twitter, 101, 103, 212, 304, 415, 422, 424, 425, 492 two-factor authentication, 345 two-tiered client/server architecture, 199 U Ubimax, 211 ubiquity, 405 unified communications, 295–297 unified threat management (UTM), 348 uniform resource locator (URL), 299 United Kingdom, 193 United States (U.S.) CAN-SPAM Act in, 177 cell phone standards in, 306 Clean Air Act in, 177, 178 employment in, 39–40 federal privacy laws in, 163t imports and exports of, 39 Internet use in, 606f privacy in, 168 unit testing, 526 universal standards, in e-commerce, 406–407 Unix, 208 unstructured decisions, 484 upstream, supply chain, 372 URL See uniform resource locator U.S See United States user attention, of websites, 416 user content generation, 408 user-designer communications gap, 570 utilitarian principle, 161 UTM See unified threat management V value-added activities, 54 value chain, 449, 450f value chain model, 129–133, 132f, 140 value web, 133, 134f, 137 vehicle identification number (VIN), 37 Veriato Investigator, 296 VEVO website, 411 video streaming, 291, 411 VIN See vehicle identification number virtual company, 136 virtualization, 213, 219 Virtual Lot, 37 virtual meeting systems, 90 virtual private network (VPN), 297–298, 298f, 313, 348, 505 virtual reality (VR), 452, 459 Virtual Reality Modeling Language (VRML), 459 virtual worlds, 90 visitor tracking, 419f, 421 visual search, 302 visual web, 302 VMware, 213 voice over IP (VoIP), 294–295, 325 voice recognition software, 161 VoIP See voice over IP voyage-estimating systems, 77–78, 78f VPN See virtual private network VR See virtual reality VRML See Virtual Reality Modeling Language W walkthrough, 352 walled garden model, 353 Wall Street Journal, 416, 432, 439 WANs See wide area networks war driving, 325 Warehouse Management System (WMS), 374–375 warehouses, 441 waterfall approach, 533 Waze service, 430 wearable computing devices, 210–212 Web 2.0, 304–305 Web 3.0, 305–306 web-based e-mail, 167 www.downloadslide.net Index web beacons, 167, 168 web browsers, 169 Firefox and Chrome, 220–221 search engines of, 299–300 URL’s used by, 298–299 web bugs, 167 web design, 543 WebFOCUS, 535 web hosting service, 209 weblining, 188 web mining, 262–263, 269 web search tools, 413 web server, 199, 299 web services, 215f, 222–223, 223f, 542, 546 websites, 34–35, 434 collaborative, 304–305 cookies and, 166f HTML basis of, 221–222, 298 liability of, 173 m-commerce, 433 mobile, 543 personal information and, 166 personalization of, 420 privacy policies of, 168 searches tracked by, 166 SEO for, 303 on smartphone screen, 543 social search, 301–302 user attention of, 416 using beacon programs, 418–419 VEVO, 411 visitor tracking of, 419f, 421 wikis, 89–90 WEP See Wired Equivalent Privacy what-if analysis, 501, 510 WHP See Wildfire Hazard Potential wide area networks (WANs), 286, 454 Wi-Fi networks, 308–309, 313 wikis, 89–90, 304 Wildfire Hazard Potential (WHP), 497 WiMax, 309 Windows 10, 208, 226, 544 Windows operating system, 200, 206, 208 Wintel PC computers, 199, 206 Wired Equivalent Privacy (WEP), 348 wireless modems, 285 wireless networks, 33, 108 See also mobile devices bluetooth for, 307–308, 307f, 325 cellular systems and, 306–307 hotspots in, 309 PKI on, 350 with RFID tags, 278–279 security challenges of, 325 sniffer programs on, 325, 326f, 329 WEP for, 348 Wi-Fi, 308–309, 313 WiMax, 309 wireless sensor networks (WSNs), 311, 313 wisdom, 448 wisdom of crowds, 423 WMS See Warehouse Management System WordPress, 304 World Intellectual Property Organization Treaty, 172 World Wide Web, 50 World Wide Web Consortium (W3C), 222 worms, 326, 347 WSNs See wireless sensor networks W3C See World Wide Web Consortium X XML See extensible markup language Y Yahoo!, 299, 413 Yahoo! Messenger, 294 Yammer, 69–70, 93 Yatra.com, 607 Yet Another Hierarchical Officious Oracle See Yahoo! YouTube, 389 YP analytics, 535 Z zero-day vulnerabilities, 334 zero defects, 334 zero-rating practices, 292 Zeus Trojan, 328 Zoho Projects, 577 zombie PCs, 329–330 Zoom, 90 647 .. .MANAGEMENT INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM FIFTEENTH EDITION GLOBAL EDITION Kenneth C Laudon New York University Jane P Laudon Azimuth Information Systems VP Editorial... accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Management Information Systems: Managing the Digital Firm, 15th edition, ISBN... Organization 597 • Global Systems to Fit the Strategy 598 • Reorganizing the Business 599 15-3 What are the challenges posed by global information systems and management solutions for these challenges?

Ngày đăng: 13/06/2018, 10:54

Từ khóa liên quan

Mục lục

  • Cover

  • Title Page

  • Copyright Page

  • About the Authors

  • Brief Contents

  • Complete Contents

  • Business Cases And Interactive Sessions

  • Preface

  • PART ONE Organizations, Management, and the Networked Enterprise

    • Chapter 1 Information Systems in Global Business Today

      • Opening Case: Rugby Football Union Tries Big Data

      • 1-1 How are information systems transforming business, and why are they so essential for running and managing a business today?

        • How Information Systems Are Transforming Business

        • What's New in Management Information Systems?

        • Interactive Session: Management The Mobile Pocket Office

        • Globalization Challenges and Opportunities: A Flattened World

        • The Emerging Digital Firm

        • Strategic Business Objectives of Information Systems

        • 1-2 What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations?

          • What Is an Information System?

          • Dimensions of Information Systems

          • Interactive Session: Technology Digital Transformation of Healthcare at Singapore's JurongHealth Services

          • It Isn't Just Technology: A Business Perspective on Information Systems

          • Complementary Assets: Organizational Capital and the Right Business Model

Tài liệu cùng người dùng

Tài liệu liên quan