Part 2 book “Management information systems - Managing the digital firm” has contents: Managing knowledge, enhancing decision making, building information systems, managing projects, managing global systems, e-commerce - digital markets, digital goods,… and other contents.
www.downloadslide.net PART THREE Key System Applications for the Digital Age Chapter Chapter 11 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Managing Knowledge Chapter 10 Enhancing Decision Making Chapter 12 E-commerce: Digital Markets, Digital Goods PART THREE examines the core information system applications businesses are using today to improve operational excellence and decision making These applications include enterprise systems; systems for supply chain management, customer relationship management, and knowledge management; e-commerce applications; and business intelligence systems This part answers questions such as: How can enterprise applications improve business performance? How firms use e-commerce to extend the reach of their businesses? How can systems improve decision making and help companies make better use of their knowledge assets? CHAP TER www.downloadslide.net Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Learning Objectives After reading this chapter, you will be able to answer the following questions: 9-1 How enterprise systems help businesses achieve operational excellence? 9-2 How supply chain management systems coordinate planning, production, and logistics with suppliers? 9-3 How customer relationship management systems help firms achieve customer intimacy? 9-4 What are the challenges that enterprise applications pose, and how are enterprise applications taking advantage of new technologies? MyLab MIS™ Visit mymislab.com for simulations, tutorials, and end-of-chapter problems CHAPTER CASES Alimentation Couche-Tard Competes Using Enterprise Systems Unilever Unifies Globally with Enhanced ERP DP World Takes Port Management to the Next Level with RFID Customer Relationship Management Helps Celcom Become Number One VIDEO CASES Life Time Fitness Gets in Shape with Salesforce CRM Evolution Homecare Manages Patients with Microsoft Dynamics CRM Instructional Video: GSMS Protects Patients by Serializing Every Bottle of Drugs 364 www.downloadslide.net Alimentation Couche-Tard Competes Using Enterprise Systems W hen Alimentation Couche-Tard purchased Statoil Fuel and Retail (SFR) in April 2012, it was the Canadian convenience store giant’s most ambitious acquisition to date (€2.058 billion) SFR, a division of Statoil, the Norwegian State Oil Company, had been spun off from its parent in October 2010 The purchase added 2,300 retail fuel stations—most full-service with a convenience store—throughout North America and expanded CoucheTard’s reach to eight European countries—Norway, Sweden, Denmark, Poland, Estonia, Latvia, Lithuania, and Russia In 2016 the firm had 12,000 sites and employed over 105,000 people SFR operates in both the B2C (sales to consumers) and B2B (sales to other businesses) sectors Fuel products including gasoline blends, diesel fuels, biofuels, and LPG (liquefied petroleum gas) generate 70 percent of its business The full-service retail stations offer product lines that differ according to operator and location factors Some prefer a product mix that concentrates on auto supplies and services while others focus on food-related products, beverages, and even fastfood SFR’s 12 terminals, 38 depots, and 400 road tankers provide bulk sales to commercial customers, including bus and car rental companies, road construction crews, and independent resellers Couche-Tard welcomed both the opportunities and the challenges of its acquisition Immediate synergies between Couche-Tard and SFR could not completely cover the remaining expenses from SFR’s split from Statoil, rebranding efforts, and the replacement of an antiquated IT infrastructure and enterprise resource planning (ERP) system The old system used different processes in each country and market, resulting in over 5,000 custom software objects for the IT department to manage in addition to massive operational inefficiencies SFR needed to maximize supply chain efficiency for its three closely related value chains—the fuel value chain, the grocery value chain, and the lubricants value chain All corporate functions that provided shared services to the © trondur/123rf.com 365 www.downloadslide.net 366 Part Three Key System Applications for the Digital Age value chains had to be standardized and workplace activities coordinated for its 18,500 employees Finally, SFR managers wanted an advanced pricing method for fuel sales to maximize profits in its core low-margin business Oracle’s JD Edwards EnterpriseOne enterprise resource planning system was chosen as the basic platform, and a Web services interface was developed within the ERP system to convert all data into a single format This common source of master data now drives all transactions throughout the supply chains as well as financial and other reports generated by the Oracle Business Intelligence Suite Stock availability and average sales at each service station feed a realtime planning program that projects expected demand and feeds the data to a third-party distribution planning system Onboard computers convey product types and quantities to tanker drivers at terminals and delivery locations Fuel restocking, delivery, and confirmation occur automatically To coordinate workplace activities, Oracle Fusion Middleware integrates data management and communication across social, mobile, and cloud technologies and among multiple systems and regions Called the “Connect Project,” the software coordinates dozens of interfaces throughout the supply chain, implements a consistent fuel pricing structure, and manages multiple complicated excise taxes and regulations In 2014 Statoil began a migration from Oracle database software to SAP’s Business Planning and Consolidation Application As a result, in 2015 Statoil achieved financial consolidation six times faster than before, data processing speeds increased fifteen times, and opening and closing periods for work status is now eight times faster than before In 2015 Couche-Tard re-branded its SFR retail stores to Circle K stores Today it’s one of the largest global players in the convenience store market space with over 12,000 sites in Canada, the U.S., Asia, and Europe, and employs more than 100,000 people In 2016 the company announced it’s largest ever acquisition of Texas-based CST Brands, which will bring it an additional 2,000 locations in the south and southwest U.S states The firm’s prior investments in enterprise systems enable it to manage a sprawling global network of convenience stores The company’s executives promise to double the size of the firm once more in the next five years Not bad for a company that started in 1980 with a single store in Quebec Sources: “Alimentation Couche Tard Inc Is Severely Undervalued,” by Joey Frenette, The Motley Fool, Fool.com, March 1, 2017; “Couche-Tard’s Alain Bouchard Has a Bold Vision: ‘We Will Double the Size of This Company Again’”, by Karl Moore, businessfinancialpost.com, December 8, 2016; “After Shareholder Rebuff Last Year, Couche-Tard Gets Its Focus Back with Largest-Ever Acquisition,” by Barry Crutchley, businessfinancialpost.com, August 22, 2016; “Annual Report 2016,” Alimentation Couche-Tard Inc., http://corpo.couche-tard.com; Alyn Bailey, “Statoil Fuel & Retail the World’s First SAP to Oracle JD Edwards Migration,” http:// www.pcubed.com/bulletins, accessed January 2, 2016; “Statoil: Accelerating Planning and Financial Close Cycles with SAP® EPM powered by SAP HANA® and SAP MaxAttentionTM,” dam.sap.com/28274_Statoil_BTS.htm, accessed January 2, 2016; Jade Vachon, “Statoil Switches from an Oracle DB to the SAP HANA Platform with SAP MaxAttention,” SAP.com, February 21, 2014 C ouche-Tard and Statoil’s efforts to standardize and integrate corporate functions into the supply chain and coordinate workplace activity illustrate the impact of ERP systems on supply chain management (SCM) Couche-Tard www.downloadslide.net Chapter Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Business Challenges • Plan production • Establish inventory requirements • Select new forecasting technology Management • Receive customer orders • Replenish inventory • Revise supply chain processes Organization • Deploy SAP Business Objects Web Technology Intelligence • Deploy SAP Business objects dashboards • Integrate with SAP APO • Volatile demand • Long production lead times • Manual planning processes Information System • Forecast demand more accurately • Reduce forecast time Business Solutions • Reduce costs • Increase sales • Increase customer satisfaction did not have a single source of business data nor uniform methods for handling many critical SCM functions Inventory holding costs were unnecessarily high, the IT department was strained, and lack of coordination was negatively impacting workplace productivity The chapter-opening diagram calls attention to important points raised by this case and this chapter All transactions throughout Couche-Tard’s supply chains are now in a common and consistent format that feeds directly into its reporting software The integrated ERP environment enables real-time planning based on stock availability and average sales at each service station, and a real-time fuel value chain can now accommodate variable demand from both consumer and business customers Benchmarks against which to assess future results by country, terminal, or market are being developed using the advanced pricing method developed by the Connect team On the B2B side, managers will be able to quickly assess the effects of pricing structures and even sales reps will be able to evaluate the effects of purchasing terms Here are some questions to think about: How did Couche-Tard’s lack of standardized processes affect its business operations? How were Couche-Tard’s employees and supply chain management affected by the adoption of standardized interfaces? Why did Couche-Tard retain its legacy systems instead of replacing them entirely? 9-1 How enterprise systems help businesses achieve operational excellence? Around the globe, companies are increasingly becoming more connected, both internally and with other companies If you run a business, you’ll want to be able to react instantaneously when a customer places a large order or when a shipment from a supplier is delayed You may also want to know the impact of these events on every part of the business and how the business is performing 367 www.downloadslide.net 368 Part Three Key System Applications for the Digital Age at any point in time, especially if you’re running a large company Enterprise systems provide the integration to make this possible Let’s look at how they work and what they can for the firm What are Enterprise Systems? Imagine that you had to run a business based on information from tens or even hundreds of databases and systems, none of which could speak to one another Imagine your company had 10 major product lines, each produced in separate factories and each with separate and incompatible sets of systems controlling production, warehousing, and distribution At the very least, your decision making would often be based on manual hard-copy reports, often out of date, and it would be difficult to understand what is happening in the business as a whole Sales personnel might not be able to tell at the time they place an order whether the ordered items are in inventory, and manufacturing could not easily use sales data to plan for new production You now have a good idea of why firms need a special enterprise system to integrate information Chapter introduced enterprise systems, also known as enterprise resource planning (ERP) systems, which are based on a suite of integrated software modules and a common central database The database collects data from many divisions and departments in a firm and from a large number of key business processes in manufacturing and production, finance and accounting, sales and marketing, and human resources, making the data available for applications that support nearly all an organization’s internal business activities When new information is entered by one process, the information is made immediately available to other business processes (see Figure 9.1) FIGURE HOW ENTERPRISE SYSTEMS WORK Enterprise systems feature a set of integrated software modules and a central database by which business processes and functional areas throughout the enterprise can share data www.downloadslide.net Chapter Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 369 If a sales representative places an order for tire rims, for example, the system verifies the customer’s credit limit, schedules the shipment, identifies the best shipping route, and reserves the necessary items from inventory If inventory stock is insufficient to fill the order, the system schedules the manufacture of more rims, ordering the needed materials and components from suppliers Sales and production forecasts are immediately updated General ledger and corporate cash levels are automatically updated with the revenue and cost information from the order Users can tap into the system and find out where that particular order is at any minute Management can obtain information at any point in time about how the business was operating The system can also generate enterprise-wide data for management analyses of product cost and profitability Enterprise Software Enterprise software is built around thousands of predefined business processes that reflect best practices Table 9.1 describes some of the major business processes that enterprise software supports Companies implementing this software first have to select the functions of the system they wish to use and then map their business processes to the predefined business processes in the software (One of our Learning Tracks shows how SAP enterprise software handles the procurement process for a new piece of equipment.) Configuration tables provided by the software manufacturer enable the firm to tailor a particular aspect of the system to the way it does business For example, the firm could use these tables to select whether it wants to track revenue by product line, geographical unit, or distribution channel If the enterprise software does not support the way the organization does business, companies can rewrite some of the software to support the way their business processes work However, enterprise software is unusually complex, and extensive customization may degrade system performance, compromising the information and process integration that are the main benefits of the system If companies want to reap the maximum benefits from enterprise software, they must change the way they work to conform to the business processes defined by the software To implement a new enterprise system, Tasty Baking Company identified its existing business processes and then translated them into the business processes built into the SAP ERP software it had selected To ensure that it obtained the maximum benefits from the enterprise software, Tasty Baking Company deliberately planned for customizing less than percent TABLE BUSINESS PROCESSES SUPPORTED BY ENTERPRISE SYSTEMS Financial and accounting processes, including general ledger, accounts payable, accounts receivable, fixed assets, cash management and forecasting, product-cost accounting, cost-center accounting, asset accounting, tax accounting, credit management, and financial reporting Human resources processes, including personnel administration, time accounting, payroll, personnel planning and development, benefits accounting, applicant tracking, time management, compensation, workforce planning, performance management, and travel expense reporting Manufacturing and production processes, including procurement, inventory management, purchasing, shipping, production planning, production scheduling, material requirements planning, quality control, distribution, transportation execution, and plant and equipment maintenance Sales and marketing processes, including order processing, quotations, contracts, product configuration, pricing, billing, credit checking, incentive and commission management, and sales planning www.downloadslide.net 370 Part Three Key System Applications for the Digital Age of the system and made very few changes to the SAP software itself It used as many tools and features that were already built into the SAP software as it could SAP has more than 3,000 configuration tables for its enterprise software Leading enterprise software vendors include SAP, Oracle, IBM, Infor Global Solutions, and Microsoft Versions of enterprise software packages are designed for small and medium-sized businesses and on-demand software services running in the cloud (see the chapter-opening case and Section 9-4) Business Value of Enterprise Systems Enterprise systems provide value by both increasing operational efficiency and providing firmwide information to help managers make better decisions Large companies with many operating units in different locations have used enterprise systems to enforce standard practices and data so that everyone does business the same way worldwide Coca-Cola, for instance, implemented a SAP enterprise system to standardize and coordinate important business processes in 200 countries Lack of standard, companywide business processes prevented the company from using its worldwide buying power to obtain lower prices for raw materials and from reacting rapidly to market changes Crocs used ERP for similar purposes, as described in the Chapter 15 ending case study Enterprise systems help firms respond rapidly to customer requests for information or products Because the system integrates order, manufacturing, and delivery data, manufacturing is better informed about producing only what customers have ordered, procuring exactly the right number of components or raw materials to fill actual orders, staging production, and minimizing the time that components or finished products are in inventory Alcoa, the world’s leading producer of aluminum and aluminum products with operations spanning 31 countries and more than 200 locations, had initially been organized around lines of business, each of which had its own set of information systems Many of these systems were redundant and inefficient Alcoa’s costs for executing requisition-to-pay and financial processes were much higher, and its cycle times were longer than those of other companies in its industry (Cycle time refers to the total elapsed time from the beginning to the end of a process.) The company could not operate as a single worldwide entity After implementing enterprise software from Oracle, Alcoa eliminated many redundant processes and systems The enterprise system helped Alcoa reduce requisition-to-pay cycle time by verifying receipt of goods and automatically generating receipts for payment Alcoa’s accounts payable transaction processing dropped 89 percent Alcoa was able to centralize financial and procurement activities, which helped the company reduce nearly 20 percent of its worldwide costs Enterprise systems provide much valuable information for improving management decision making Corporate headquarters has access to up-tothe-minute data on sales, inventory, and production and uses this information to create more accurate sales and production forecasts Enterprise software includes analytical tools to use data the system captures to evaluate overall organizational performance Enterprise system data have common standardized definitions and formats that are accepted by the entire organization Performance figures mean the same thing across the company Enterprise systems allow senior management to find out easily at any moment how a www.downloadslide.net Chapter Achieving Operational Excellence and Customer Intimacy: Enterprise Applications particular organizational unit is performing, determine which products are most or least profitable, and calculate costs for the company as a whole For example, Alcoa’s enterprise system includes functionality for global human resources management that shows correlations between investment in employee training and quality, measures the companywide costs of delivering services to employees, and measures the effectiveness of employee recruitment, compensation, and training 9-2 How supply chain management systems coordinate planning, production, and logistics with suppliers? If you manage a small firm that makes a few products or sells a few services, chances are you will have a small number of suppliers You could coordinate your supplier orders and deliveries by using just a telephone and fax machine But if you manage a firm that produces more complex products and services, you will have hundreds of suppliers, and each of your suppliers will have its own set of suppliers Suddenly, you will need to coordinate the activities of hundreds or even thousands of other firms to produce your products and services Supply chain management (SCM) systems, which we introduced in Chapter 2, are an answer to the problems of supply chain complexity and scale The Supply Chain A firm’s supply chain is a network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers It links suppliers, manufacturing plants, distribution centers, retail outlets, and customers to supply goods and services from source through consumption Materials, information, and payments flow through the supply chain in both directions Goods start out as raw materials and, as they move through the supply chain, are transformed into intermediate products (also referred to as components or parts) and, finally, into finished products The finished products are shipped to distribution centers and from there to retailers and customers Returned items flow in the reverse direction from the buyer back to the seller Let’s look at the supply chain for Nike sneakers as an example Nike designs, markets, and sells sneakers, socks, athletic clothing, and accessories throughout the world Its primary suppliers are contract manufacturers with factories in China, Thailand, Indonesia, Brazil, and other countries These companies fashion Nike’s finished products Nike’s contract suppliers not manufacture sneakers from scratch They obtain components for the sneakers—the laces, eyelets, uppers, and soles— from other suppliers and then assemble them into finished sneakers These suppliers in turn have their own suppliers For example, the suppliers of soles have suppliers for synthetic rubber, suppliers for chemicals used to melt the rubber for molding, and suppliers for the molds into which to pour the rubber Suppliers of laces have suppliers for their thread, for dyes, and for the plastic lace tips Figure 9.2 provides a simplified illustration of Nike’s supply chain for sneakers; it shows the flow of information and materials among suppliers, Nike, Nike’s 371 www.downloadslide.net 372 Part Three Key System Applications for the Digital Age FIGURE NIKE’S SUPPLY CHAIN This figure illustrates the major entities in Nike’s supply chain and the flow of information upstream and downstream to coordinate the activities involved in buying, making, and moving a product Shown here is a simplified supply chain, with the upstream portion focusing only on the suppliers for sneakers and sneaker soles distributors, retailers, and customers Nike’s contract manufacturers are its primary suppliers The suppliers of soles, eyelets, uppers, and laces are the secondary (Tier 2) suppliers Suppliers to these suppliers are the tertiary (Tier 3) suppliers The upstream portion of the supply chain includes the company’s suppliers, the suppliers’ suppliers, and the processes for managing relationships with them The downstream portion consists of the organizations and processes for distributing and delivering products to the final customers Companies that manufacture, such as Nike’s contract suppliers of sneakers, also manage their own internal supply chain processes for transforming materials, components, and services their suppliers furnish into finished products or intermediate products (components or parts) for their customers and for managing materials and inventory The supply chain illustrated in Figure 9.2 has been simplified It only shows two contract manufacturers for sneakers and only the upstream supply chain for sneaker soles Nike has hundreds of contract manufacturers turning out finished sneakers, socks, and athletic clothing, each with its own set of suppliers The upstream portion of Nike’s supply chain actually comprises thousands of entities Nike also has numerous distributors and many thousands of retail stores where its shoes are sold, so the downstream portion of its supply chain is also large and complex Information Systems and Supply Chain Management Inefficiencies in the supply chain, such as parts shortages, underused plant capacity, excessive finished goods inventory, or high transportation costs, are caused by inaccurate or untimely information For example, manufacturers www.downloadslide.net Index Macy’s, 310–311, 433 Maersk, 594 Mandarin Oriental, 42 MasterCard, 158, 342 Match.com, 416 Matsushita, 471 McAfee, 327 McDonalds, 597 McKinsey & Company, 87, 583 Megaupload, 171 Mercedes-Benz, 461–462 Metal Office Furniture Company, 609 MetLife, 254 Michelin North America, 235 Microsoft Corp., 137, 193–194, 201, 209, 299, 370, 456, 508, 511 Mitsubishi, 471 Mitsubishi Heavy Industries, 466 MobileIron, 235–236 Mobiquity, 544 Monsanto, 63–64 Morpheus, 171 Mosaic, 415 Motorola, 138 Mozilla Foundation, 168 Mrs Fields Cookies, 597 MSN, 413, 433 MyPoints, 417 N Napster, 171 NASA, 102 National Cyber Security Center (NCSC), 305 National Health Service (NHS), 498–499, 568 Nestlé, 375 Netflix, 40, 174, 291, 411, 416, 467 Network Advertising Initiative, 164, 168 NetZero, 288 New York City, 255–257, 431, 459 New York Times, 416 New Zealand Department of Commerce, 454–455 NextBio, 258 Nike, 126, 129–130, 371–372 Nissan, 433 Nordstrom, 354 Novell, 200, 281, 286 O Ocean Minded, 614 1-800-Flowers, 433 Open Handset Alliance, 208 OpenSignal, 234 OpenSource.org, 220 Open Text Corp., 455 Oracle Corp., 101, 201, 208, 209, 216, 221, 366, 381, 388, 394, 445–446, 455, 508, 522, 582, 605 Orville Redenbacher, 550 Overstock.com, 388 P Panda Security, 328 Pandora, 172, 416 Panorama Consulting Solutions, 387 PayPal, 126, 331 Penguin, 303 PeopleSoft, 224 Pepsico, 90, 231, 425, 433 Photobucket.com, 413 Pinterest, 405, 422–423 Piper Jaffray Cos., 64 The Pirate Bay, 171 Pixar Animation Studios, 305 Plan International, 80–81 Plex Systems, 389 Ponemon Institute, 330–331, 353 Priceline.com, 414 PricewaterhouseCoopers (PwC), 551 Privi Organics, Ltd., 45 Procter & Gamble (P&G), 135, 373, 433, 456, 470–471 Progressive Insurance, 502–503 Proofpoint, 297 Q Qualcomm, 456 Quantcast, 167 R Raytheon, 429 Red Hat, 221 Reebok, 136 Renault, 461 Ricoh, 471 Roche, 481–482 Rolls-Royce PLC, 429 Rosendin Electric, 235–236 Rugby Football Union (RFU), 31–33 S Sabre Holdings, 254 SAC Capital, 154 Safeway, 431 SalesForce.com, 201, 211, 215, 218, 225, 381, 389, 415, 590 Samsung Electronics, 138, 171, 207, 429 Sanyo, 471 SAP, 108, 273, 366, 370, 381, 388–389, 394, 482, 508, 516, 609–610 Schneider National, 375, 519 7-Eleven, 440 Shopkick, 433 Six Flags, 84 SKF, 37 Skype, 90, 295, 505 Snapchat, 418, 424 SNCF (French rail service), 494 Snyders of Hanover, 61 Societe Generale, 267-268 The Software Alliance, 171 Sonic Automotive, 37 Sony, 332 Southern Co., 211 Southern Valve & Fitting USA (SVF), 93 Southwest Airlines, 223 Sports Authority, 433 Sportsvite, 415 Spotify, 172, 292, 417 Sprint, 138, 306 Stanford University, 203, 299, 468 Staples, 414 Starbucks, 127, 425, 492, 497 Starhub, 321–322 Statoil Fuel and Retail, 365-367 Steelcase Designs, 609–610 SunGard Availability Services, 342 633 Sun Microsystems, 221 Super Fresh, 431 Sybase, 209 T Taco Bell, 501 TAL Apparel Ltd., 43 Target, 173, 388, 394–396 Tasty Baking Company, 369 Tata Consultancy Services, 475–477 Tate & Lyle, 107-109 TCS, 216 Tenaris, 456 Texas Instruments (TI), 115 ThomasNet.com, 264 TIBCO, 522 Tidal Trade, 614 Time Warner, 288, 295 T-Mobile, 138, 143, 306 Tower Records, 115 Toyota, 117, 123 Trader Joe’s, 431 Travelocity, 129 Treehouse Island Inc., 120–121 Trend Micro, 352 TTX, 545 Tumblr, 415, 422 Twitter, 304, 389, 415, 422 TypePad.com, 304 U Uber, 135, 399–401, 415, 430 Under Armour, 129–131 United Parcel Service (UPS), 49–50, 497 United States International Trade Commission, 171 United States Patent and Trademark Office, 170 United States Telecom Association, 292 Universal Robots, 461 UPS Supply Chain Solutions, 375 U.S Cyber Command (CYBERCOM), 333 U.S Department of Commerce, 165 U.S Department of Defense, 284, 288, 331, 333 U.S Department of Defense Advanced Research Projects Agency (DARPA), 284 U.S Department of Homeland Security, 305 U.S Federal Highway Administration, 451 U.S Forest Service, 497 U.S Internal Revenue Service, 75 U.S National Institute of Standards and Technology (NIST), 214 U.S Patent and Trademark Office, 170 U.S Postal Service (USPS), 255 U.S Securities and Exchange Commission, 301 U.S Social Security Administration, 75 V Vail Resorts, 78 Valiant Entertainment, 353 Verizon, 280 Vestas Wind Systems, 494 VEVO, 411 Virgin Entertainment Group, 295 Visa, 158, 468 Vita Coco, 353 VmAirWatch, 354 Volkswagen, 154, 427, 462 Volkswagen Group, 177 www.downloadslide.net 634 Index W Wall Street Journal, 408, 416 Walmart Inc., 42, 123, 125–126, 138, 310, 331, 376, 394, 414, 433, 439–441 Walt Disney World Resort, 211 Washio, 400 Waze, 430 WebEx, 90 Webvan, 431 Whole Foods, 431 Wipro Technologies, 210 World Bank, 451 WorldCom, 336 World Wide Web Consortium (W3C), 290 WSJ.com, 413 X Xanga.com, 304 Y Yahoo!, 299–300, 416 Yellow Pages (YP), 535 Yelp, 417 YouTube, 389 Yumprint, 440 Z Zappos.com, 120, 130 ZEAL Network SE, 493 Zillow.com, 226 ZipRealty, 226 Subject Index A acceptable use policy (AUP), 296, 341 acceptance testing, 526 access points, 325 access rules, 342f accountability, 156, 159, 184 accounting practices, 596 addressing and architecture, 288 ad hoc query, 493 Ad Network, 419 Adobe Acrobat Reader, 38 Adobe Connect, 90 Adobe Creative Suite, 210 Adobe Flash Player, 327 Adobe Illustrator, 225 advertising, 187, 303 See also marketing blast-and-scatter, 421 display, 403 Google’s revenues from, 35 on mobile devices, 433 native, 421 networks, 421f online, 419 online marketing and, 418t pivot table used for, 502f revenue model, 415–416 affiliate revenue model, 417 agency theory, 118 agent-based modeling, 470 agile development, 541, 546 AI See artificial intelligence air travel, 181 alert system, 256 algorithms, 303 genetic, 469–470, 469f, 472 Hummingbird search, 300–301 Altair 8800, 115 Amazon Alexa, 440 Amazon Prime, 439 Amazon Relational Database Service, 254 Amazon Web Service (AWS), 215f, 218 ambient data, 337 analog signal, 285 analog versus digital, 285 analytical CRM, 383–386, 384f analytic platforms, 259–260 analytic software, 33 Ancestry.com, 416 Android operating system, 208, 226, 234, 353 Angkasa Library Management system, 316-318 antivirus software, 347, 355 AOL Instant Messenger, 294 Apache, 299 Apache Open for Business (OFBiz), 389 App Internet, 306 Apple Apps, 226 Apple iOS, 470 Apple iPad, 37, 38f, 171, 226, 470, 492, 516 Apple iPhone, 37, 38f, 138, 171, 226, 470, 492, 591f Apple iPod, 126, 171, 226 Apple iTunes, 42, 73, 123, 126, 172, 411 Apple Safari, 221 Apple Watch, 211 application controls, 337 application layer, 284 application proxy filtering, 347 applications international information systems developing, 603 knowledge, 451 location-based service, 430–433 of MIS, 501t of social business, 87t software, 225–226, 536–538 application server, 199 apps, 225–226 AR See augmented reality architecture and governance, 290–292, 290f artificial intelligence (AI), 302, 460, 471 as-is process, 520, 520f asset management systems, 456 associations, 261 ATMs See automated teller machines attribute, 243 auditing, 343, 344f augmented reality (AR), 459 AUP See acceptable use policy authentication, 344–345 automated teller machines (ATMs), 43 automation, 517 avatars, 90, 415 AWS See Amazon Web Service Azure cloud service, 193–196 B B2B See Business-to-business B2C See Business-to-consumer BA See business analytics backward chaining, 462–464 balanced scorecard method, 503–504, 503f bandwidth, 287, 291, 505 Bangle Bartenders, 544 beacon programs, 418–419 behavioral approach, 57–58 behavioral models, 487 behavioral targeting, 418–422 behavioral view, of organization, 111f benchmarking, 132 best-of-breed software, 499 best practices, 132 BI See business intelligence bias, 181 big data analysis of, 31-33, 493–494, 494t challenge of, 254–255 Internet source of, 262–263 management and, 153 for operational intelligence, 496–497 privacy and, 151–153, 183–184 revolution in, 256 Bing, 299 biometric authentication, 345 bit, 242 bits per second (bps), 287 blast-and-scatter advertising, 421 BLE See Bluetooth Low Energy blogosphere, 304 blogroll, 304 blogs, 304 bluetooth, 307–308, 307f, 325 bookstore processes, 520–522, 520f, 521f botnet, 329–330, 358 bot networks, 177 BPM See business performance management BPR See business process reengineering bps See bits per second break-even point, 501 bring your own device (BYOD), 212–213, 234–236, 353–354 broadband connections, 280, 288 broadcast model, 408 Brown Bag Software v Symantec Corp, 170 BSS See business support system bugs, 334 bullwhip effect, 373, 374f business See also industry; organizations collaboration in, 85–86 common user requirements of, 603 customers retained by, 125 global system strategies of, 597–599, 597t, 598f information policy established by, 264–265 information value chain of, 53, 54f Internet as tool for, 296 IS perspective of, 52–54, 59 IS role in, 95–101, 577 IS transforming, 33–35, 59 IT infrastructure impacting, 196f process changes of, 603 reorganizing, 599 restructuring of, 489 risk assessments in, 338–341, 341t security policies of, 341–342 software spending of, 224f supply chain of, 371–372 using social networking, 34–35, 101–102 value chain model in, 129–133, 132f business analytics (BA), 490, 497–499, 505–506 Business ByDesign, 389 www.downloadslide.net Index business challenges, 595–596 business continuity planning, 343 business drivers, 592–594 business ecosystems, 136–138, 137f business functions, 47, 48t business intelligence (BI), 76, 78–79, 255, 259–260, 259f BA and, 505–506 from data, 491 data mining in, 490 decision making analytics and, 491f DSS delivering, 77, 501 elements of, 491–492 in enterprise applications, 390 information streams for, 490 management strategies for, 497–499 production reports in, 492t users of, 500f business models, 42, 412–415 business objectives competitive advantage as, 42 of IS, 41–44 with IT, 139 Business One (SAP), 389 business performance management (BPM), 504 business processes, 47–48, 71–73 change, 603 collaboration in, 87–89 core, 40 enterprise applications and, 387 enterprise systems and, 369t functional, 72 in IT, 73 order fulfillment in, 72–73, 73f routines in, 112, 113f business process management (BPM), 519, 522, 601–602 business process redesign existing processes analysis in, 519–520 new processes design in, 520–522, 521f in organizational change, 518 processes to be changed in, 519 business process reengineering (BPR), 571 business solutions, 71f business support system (BSS), 394 Business-to-business (B2B), 412, 426, 427–429, 436 Business-to-consumer (B2C), 412 business value of decision making, 483, 484t of enterprise systems, 370–371 of SCM, 376–377 BYOD See bring your own device byte, 242 C C2C See Consumer-to-consumer cable Internet connections, 288 cable modems, 285 cable networks, 103, 173, 280 CAD See computer-aided design CAN-SPAM Act, U.S., 177 capital budgeting, 565–566 capital investments, 34f, 117, 195, 565 carpal tunnel syndrome (CTS), 180 CASE See computer-aided software engineering case-based reasoning (CBR), 464–465, 465f cash flow, 566 cash-on-delivery (COD), 607 CAT See consolidated audit trail CBR See case-based reasoning CDMA See Code Division Multiple Access CDO See chief data officer cell phone standards, 306 cellular systems, 306–307 centralization, 390 centralized systems, 599 central systems group, 600 CGI See Common Gateway Interface change See also organizational change agent, 567 business processes, 603 business process redesign, 519 digital market, 411t in IT infrastructure, 226–227 management, 567, 615 MIS technology, 35–39, 36t organizations resistance to, 121–122 record, 526f chatbots, 470 chat systems, 294 Chatter, 103 checkout counters, 44, 45f chief data officer (CDO), 96 chief information officer (CIO), 96, 599 chief knowledge officer (CKO), 96 chief operating officer (COO), 79 chief privacy officer (CPO), 96 chief security officer (CSO), 96 Children’s Online Privacy Protection Act (COPPA), 163 China globalization in, 39 Internet use in, 608 product differentiation in, 126 supply chain of, 371 choice, 485 Choose and Book system, 498–499 Chrome operating system, 208 Chrome web browser, 220–221 chromosomes, 469 churn rate, 387 CIO See chief information officer circuit-switched networks, 283 CISC See complex instruction set computing Cisco Networks, 209 Citrix Podio, 577 CKO See chief knowledge officer Clarizen, 577 class, 530–531, 531f classical model of management, 487 classifications, 261 Clean Air Act, U.S., 177 click fraud, 332 click-throughs, 303, 389 client computers, 199 client/server computing, 282–283 client/server era, 199–200 cloud-based software, 389, 538 cloud collaboration services, 90 cloud computing, 38, 193–196, 227, 306 characteristics of, 214–215 CRM and, 218 databases in, 253–254 data management and, 216-217, 254, 351 enterprise systems, 389 era of, 200–201 635 hybrid, 219 on Internet, 200–201 models compared in, 219t platforms, 214f private and public, 218 SaaS used in, 214–215 security in, 351 service, 174, 454 service types in, 215 software, 225, 536 Cloud Security Alliance (CSA), 351 cloud software service, 536 cloud streaming, 291, 411 CLTV See customer lifetime value clustering, 261 COD See cash-on-delivery Code Division Multiple Access (CDMA), 306, 313 codes of conduct, 161 coercive goals, 116 cognitive failures, 181 cognitive functioning, 182–183 collaboration, 447 benefits of, 87, 88t in business, 85–86, 91-92 in business processes, 87–89 cloud services for, 90 management selecting tools for, 93–95 mobile employees and, 505 requirements in, 88f in software development, 541–542 software investment steps for, 95 software products for, 90–93 technologies used for, 89–90 time/space matrix of, 94f using e-mail, 89, 93, 98, 102 websites for, 304–305 command and control, 87–89 Common Gateway Interface (CGI), 264 common user requirements, 603 communications See also telecommunications technologies analog versus digital signals in, 285 encrypted, 297–298 gap, 570, 570t Internet costs of, 204, 205f near field, 311 network trends in, 279–280 unified, 295–297 communities of practice (COPs), 451 community providers, 415 competition time-based, 175 traditional, 124 competitive advantage, 32, 139, 431, 596 competitive forces model for, 123 core competencies and, 135 decision making and, 43 in globalization, 138 Internet impacted by, 128–129, 128t Internet technology as, 50 IT products providing, 127 knowledge and, 449 outsourcing and, 539 as strategic business objective, 42 sustaining, 138 transnational strategy and, 598 competitive forces model, 123, 124f, 140–141, 229–230, 229f www.downloadslide.net 636 Index cloud computing (continued) competitive strategies, 129–133 Compiere, 389 complacency, from computing, 181–182 complementary assets, 54–56 complex instruction set computing (CISC), 207 component-based development, 542 CompStat, 256 computer abuse, 176–177 computer-aided design (CAD), 452, 458, 472 computer-aided software engineering (CASE), 532 computer crimes, 176–177, 330t See also malware; security botnets, 329–330 click fraud, 332 cyber, 330–331 cybervandalism, 329 cyberwarfare, 333, 339–340 data breaches, 332t DDoS attack, 329 DoS attack, 329 e-mails for fighting, 256 evil twins, 331 hackers, 329 identity theft, 331–332 keyloggers, 328 legislation, 331–332 pharming, 331 phishing, 331 spoofing and sniffing, 329 computer forensics, 336 Computer Fraud and Abuse Act, 331 computer hardware microprocessing power in, 220 platforms, 207–208 telecommunications, 49, 59 trends in, 230 computerized hiring, 152 computerized tomography (CT), 459 computer literacy, 46 computer networks, 280–282, 280f, 312 computers client, 199 enterprise, 200 fault-tolerant, 350 hardware platforms for, 207–208 health risks, 180–183 Internet abuses by, 176–177 mainframe, 197 networks and networking, 280–282, 280f, 312 personal, 197, 199, 206, 329–330 server, 199, 263–264, 281 software, 49 tablet, 210 viruses, 326 Wintel PC, 199, 206 Computer Software Copyright Act, 170 computer-to-computer exchange, 426 computer vision syndrome (CVS), 182 computing See also cloud computing; operating systems client/server, 282–283 complacency from, 181–182 data hierarchy in, 242f decentralized client-server in, 175 green, 219 health risks of, 180–183 in-memory, 258–259 malicious software in, 326–328, 327t mobile, 200–201, 210, 227, 234, 236 on-demand, 218 personal, 197 quantum, 213 service-oriented, 542 social, 297 standards in, 205t system performance in, 174 terms and concepts in, 242–243 wearable devices for, 210–212 Conficker (malware), 359 configure, price and quote (CPQ), 537–538 connectivity, 605–608 consumerization, of IT, 212–213 Consumer Reports, 416 consumers B2C, 412 disintermediation benefiting, 409–410, 409f technologies relationships with, 130 Consumer-to-consumer (C2C), 412 content providers, 414 ContentWorx, 454–455 continuous measurement, 521 continuous quality improvement, 518 controls, 323 control weaknesses, 344f conversational commerce, 403–405 conversations, 86 conversion, in systems development, 527 conversion rates, 394 COO See chief operating officer cookies, 166–167, 166f, 184 cooptation, 604 COPPA See Children’s Online Privacy Protection Act COPs See communities of practice copyright law, 170, 184 core business processes, 40 core competency, 135, 140–141 core systems, 601–602, 601f, 608–611 corporate assets, 40 corporations enterprise applications of, 81–83 firewalls for, 346–347, 346f network infrastructure of, 282f networks in large, 281–282 patchwork international systems of, 596 strategies of, 41–42 costs of cybercrime, 330–331 Internet communications, 204, 205f of IS, 564–565, 565t leadership’s low, 126 of magnetic storage device, 204f menu, 409 of microprocessor chips, 201, 202f negative social, 174–175 of offshore outsourcing, 540f operating, 144 of ownership, 228, 228t, 231, 565 project management considering, 559 switching, 127 transaction, 117, 405 cost transparency, 407 counterimplementation, 574 CPO See chief privacy officer CPQ See configure, price and quote credit cards, 134, 520 data from, 127, 157–158 digital certificate system for, 350 ethical issues of, 156–158 hackers obtaining, 173 hotspots and, 309 identity theft from, 331 Internet adoption of, 607–608 mobile devices managing, 433 neural networks for, 467–469 personal information from, 157 predictive analytics for, 493 security systems for, 341 weblining and, 188 crime fighting, 256 Crime Strategies Unit (CSU), 256 CRM See customer relationship management crop yields, 63 cross-channel capabilities, 394 cross-functional systems, 611 cross-selling, 382 crowdsource funding, 415, 425 CryptoLocker, 328 Crystal Reports, 250 CSA See Cloud Security Alliance CSO See chief security officer CSU See Crime Strategies Unit CT See computerized tomography CTS See carpal tunnel syndrome culture, 48, 86 global, 593 information laws and, 595 of organizations, 112–113 currency fluctuations, 596 customer intimacy, 390 customer lifetime value (CLTV), 386 customer relationship management (CRM), 83, 127, 380f, 589–591 analytical, 383–386, 384f capabilities of, 383f cloud computing and, 218 customer intimacy from, 390 customer service with, 381–382 defining, 377–380 direct-marketing campaigns and, 382, 382f enterprise applications and, 387–388 operational, 383–386 sales force automation in, 381 social networking using, 389 software capabilities of, 383f software for, 381 customers, 126 businesses retaining, 125 loyalty map, 384f social networking with, 424–425 supplier’s relationship with, 42–43, 127 customer service, 49, 381–382 customization in e-commerce, 407–408 mass, 126 in software packages, 538 CVS See computer vision syndrome cyberbullying, 175 cybercrime, 330–331 cybervandalism, 329 cyberwarfare, 333, 339–340 www.downloadslide.net Index cycles per second, 287 D DARPA See Department of Defense Advanced Research Projects Agency data, 44, 509 ambient, 337 business intelligence from, 491 from checkout counters, 45f cleansing or scrubbing, 266 from credit cards, 127, 157–158 database quality of, 265–266 definition, 248 dictionary, 248 Europe’s protection of, 164–165 hierarchy, 242f inconsistency, 244 knowledge from, 448–449 managing resources of, 241–245 mart, 257–258, 269 mining, 261–262 MIS TPS, 76f multidimensional model of, 260f personal information collection of, 165 program dependence on, 244 redundancy, 244 relational DBMS grouping of, 251 from RFID tags, 46 sales, 77f, 125f sharing of, 54–245 warehouse, 255–258, 269 data administration, 265 data analysis, 157 database management system (DBMS) capabilities of, 248–250 designing, 250–251 Microsoft Access in, 250f multiple views of, 246f non-relational, 253–254 relational, 246–248, 247f, 249f, 251, 254, 268 software, 245 traditional environment of, 245–246 databases, 245 administration, 265 as alert system, 256 in cloud computing, 253–254 information accessed in, 269 Internet and, 263–264, 263f NoSQL, 253 quality of data in, 265–266 querying of, 248–250, 250f server for, 263–264 software for, 209 data breaches, 332t data brokers, 152, 418–419 data flow, transborder, 595 data flow diagram (DFD), 528, 529f data governance, 265, 267 data management, 268–269, 495 cloud-based, 254 cloud computing and, 254, 351 data quality in, 265–266 IS and, 59–60 IT infrastructure and, 195–196, 206–207 storage and, 209 technology, 49, 144–145, 152 data manipulation language, 248 data mining, 261–262, 269, 417, 452, 460, 490 Data Protection Directive, 595 data quality, 265–266 data transfer rate, 286 data visualization, 492 data warehouse, 499 data workers, 47 DBMS See database management system DDoS See distributed denial-of-service debugging, 352 decentralized client-server, 175 decentralized systems, 599 decisional role, 487–488 decision making automated high-speed, 489–490 BI analytics for, 491f business value of, 483, 484t competitive advantage and, 43 digital dashboard for, 79f DSS and, 98, 506 enterprise systems improving, 370–371 fairness in, 160 improving, 43 information required in, 484f IT influencing, 118–121, 119f managements role in, 486–487 MIS role in, 500–501 pivot tables used for, 502 process of, 485–486 real world, 488 rent-versus-buy, 227 stages of, 486f technologies and, 496 types of, 483–485, 505 value-added activities in, 54 decision-support systems (DSS), 78f BI delivered by, 77, 501 decision making and, 98, 506 group, 504–506 deep packet inspection (DPI), 350 Delivery Information Acquisition Device (DIAD), 53f delivery platform, 492 demand planning, 374 denial-of-service (DoS) attack, 329, 354 Department of Defense, 288 Department of Defense Advanced Research Projects Agency (DARPA), 284 deregulation, 164 design considerations, 122–123, 485 developing countries, 606 DevOps, 541–542, 546 DFD See data flow diagram DIAD See Delivery Information Acquisition Device digital asset management systems, 456 digital certificates, 349f, 350 digital dashboard, 79, 79f, 493 digital divide, 180 digital firm, 40, 137f digital goods, 410–411, 435 digital information, 157 digital markets, 435 flexibility and efficiency of, 408–409 Internet changing, 411t traditional markets and, 410t Digital Millennium Copyright Act (DMCA), 172 digital networks, 171 digital signal, 285 digital strategies, 107–108, 110 637 digital subscriber line (DSL), 288, 312 digital versus analog, 285 direct cutover strategy, 527 direct goods, 427–428 Directive on Data Protection, 164 direct-marketing campaigns, 382, 382f, 384 disaster recovery planning, 342–343 disintermediation, 409–410, 409f display ads, 403 disruptive technologies, 114–116, 115t distributed denial-of-service (DDoS), 321–323, 329 distribution center, 394 distribution model, 410–411 DMCA See Digital Millennium Copyright Act DNS See Domain Name System documentation, 526–527 Dodd-Frank Wall Street Reform and Consumer Protection Act, 44 domain name, 288 Domain Name System (DNS), 288–289, 289f, 313 domestic exporter, 597 Do Not Track system, 164, 169, 421 DoS See denial-of-service attack DoubleClick, 158, 166–168, 419, 421f downstream, supply chain, 372 DPI See deep packet inspection drill down, 493, 504 drive-by downloads, 327 driving habits, 151 Dropbox, 92, 212, 218, 353 DSL See digital subscriber line DSL modems, 285 DSS See decision-support systems due process, 159 duplicated systems, 599 dynamic pricing, 409 E Earthlink, 288 easy-to-handle pieces, 556 e-business, 84 EC2 See Elastic Compute Cloud ECM See enterprise content management e-commerce, 35, 41, 607–608 See also digital markets; Internet behavioral targeting in, 418–422 big data analysis in, 493–494 business models for, 412–415 commitment to, 440 conversational, 403–405 customization in, 407–408 goods and service purchased in, 401–402 growth of, 402–404, 402f information density in, 407 interactivity in, 407 key concepts in, 408–410 management challenges of, 433 marketing transformed by, 417–426, 435 mobile, 412, 430f through mobile devices, 405 personalization in, 407–408 presence map, 434, 434f, 435t revenue models, 415–417, 435 revenues, 403 richness in, 407 social, 422–423, 423t technology and power of, 405–408 www.downloadslide.net 638 Index technology features of, 406t types of, 412 universal standards in, 406–407 economic impacts, of IS, 117–118 economic value, 135 economies of scale, 204–206 ecosystem strategic model, 137f EDI See Electronic Data Interchange efficiency, 408–409 efficient customer response system, 126 e-government, 84 eHarmony, 416 802.11 wireless standards, 308–309 EIM See enterprise information management Elastic Compute Cloud (EC2), 215 electronic business See e-business electronic commerce See e-commerce Electronic Data Interchange (EDI), 426, 427f, 611, 614 electronic document retention policy, 336–337 Electronic Privacy Information Center (EPIC), 188 electronic records management, 335–337 electronic surveillance, 296 e-mail, 122, 434 cellular systems and, 306–307 collaboration using, 89, 93, 98, 102 computer abuse through, 176–177 crime fighting using, 256 digital strategies and, 107–108, 110 employee monitoring and, 178-179, 296 federal law and, 35 free web-based, 167 incompatibility of, 600 as Internet service, 293 malicious software and, 326–327 mobile digital platforms with, 210 organization retention of, 44 phishing, 331 privacy and, 169 sentiment analysis from, 262 spoofing, 329 as unified communications, 295 vulnerabilities of, 324–325 wearable computing with, 211 web-based, 167 employee relationship management (ERM), 381 employment e-mail monitoring in, 178-179, 296 global, 80, 609 internal threats in, 333–334 IS and IT, 97 IS influencing, 161–162 in MIS, 97 mobile, 505 payroll processing in, 75f reengineering work in, 179–180 technologies influencing, 179–180 in U.S., 39–40 encrypted communications, 297–298 encryption, 348–349, 349f, 355 encyclopedia industry, 128 Endomondo, 130 end-users, 97, 569 communication gap with, 570, 570t development, 535–536, 546 graphical interface, 610 interface, 492, 535 IS interface for, 558 overcoming resistance of, 572–574 role of, 524–525 Energetic Bear (malware), 340 enterprise applications, 81–83, 571 architecture of, 82f BI in, 390 business processes and, 387 challenges facing, 387–388 CRM and, 387–388 next-generation, 388–390 social networking tools as, 93, 94t software packages in, 208–209, 224, 369–370, 390 enterprise computers, 200 enterprise content management (ECM), 453–456, 453f enterprise resource planning (ERP) systems, 82, 365-367, 394–395, 515–516, 614–615 SAP, 516, 609 scoring model for, 563, 564t XML and, 222 enterprise software, 208–209, 224, 272-274, 369–370, 390 enterprise solutions, 388 enterprise suites, 388 enterprise systems, 79–83, 365–367, 368f business processes and, 369t business value of, 370–371 centralization from, 390 cloud-based, 389 decision making improved by, 370–371 defining, 368–369 software for, 208–209, 224, 369–370, 390 stand alone, 388 enterprise-wide knowledge management systems, 452 entity, 243 entity-relationship diagram, 252–253, 253f Environmental Protection Agency (EPA), 178 environmental scanning, 114 EPA See Environmental Protection Agency EPIC See Electronic Privacy Information Center ergonomics, 576 ERM See employee relationship management ERP See enterprise resource planning systems ESS See executive support systems e-tailers, 413–414 ethanol, 124 ethernet, 286 ethical analysis, 160 ethical and moral issues computer health risks and, 180–183 of credit cards, 156–158 of intellectual property, 169–172 IS and, 153–155, 154t, 155f, 159–162, 183 management facing, 153–155 of networks and networking, 156–158 of privacy, 165–169 of technologies, 156–158, 157t ethical dilemma, 153, 161–162 ethical no-free-lunch rule, 161 ethics concepts of, 159–160 defining, 154–155 no-free-lunch rule in, 161 principles of, 160–161 E*Trade, 417 EU See European Union Europe, 595–596 data protection in, 164–165 Facebook users in, 188 Internet use in, 606f spam regulations in, 177 European Commission, 164, 329, 359 European Union (EU), 164, 177, 447, 595 evil twins, 331 evolutionary approach, 602 exchanges, 429 executive support systems (ESS), 78, 503–504, 506 expert systems, 460–464, 463f explicit knowledge, 448 exports, 39, 597 extensible markup language (XML), 222, 222t, 542 external integration tools, 572 extranets, 50, 84 F Facebook, 34–35, 101, 103, 167, 186–189, 212, 219, 264, 299, 302, 389, 403, 405, 413, 415, 416, 422–424, 430, 470, 492 Facebook Chat, 294 facial recognition software, 187, 302, 345 factors of production, 594 Fair Information Practices (FIP), 162, 163t farm equipment, 63–64 fault-tolerant computer systems, 350 feasibility study, 523–524 federal laws, 35, 163t Federal Trade Commission (FTC), 163–164, 163t, 188 feedback, 45f, 46 Festi, 177 field, 242 FieldScripts, 63–64 file organization, 242–243 files, 242, 243f file-sharing services, 171, 325 File Transfer Protocol (FTP), 293 filtering software, 177 financial models, 566 financial services, 195 deregulation of, 164 electronic records management for, 336 laws protecting, 164 multinational strategies in, 597 predictive analysis in, 493 system availability in, 350 transaction brokers for, 414 Financial Services Modernization Act, 336 fingerprint identification devices, 345 FIP See Fair Information Practices Firefox web browser, 220–221 firewalls, 346–347, 346f, 355 Flash, 221 flash cookies, 167 flexibility, 244, 408–409 FlipSide video, 424 forecasting, 261, 493 foreign key, 247 foreign trade, 39 formal control tools, 572 formal planning tools, 572 forward chaining, 462 www.downloadslide.net Index 4G networks, 306 Foursquare service, 430, 432 FPX software, 537 franchisers, 597–598, 599 free/freemium revenue model, 416–417 FTC See Federal Trade Commission FTP See File Transfer Protocol fuzzy logic systems, 465–466, 466f, 472 G Galaxy 5, 171 Gantt chart, 572, 573f, 577 GDP See gross domestic product GDSS See group decision-support systems Genealogy.com, 416 general controls, 337, 338t general practitioner, 568 genetic algorithms, 469–470, 469f, 472 geoadvertising services, 430 geographical information system (GIS), 497 geoinformation services, 430 geosocial services, 430 GIS See geographical information system The Glass Cage: Automation and Us (Carr), 181 global culture, 593 global information systems See international information systems globalization challenges and opportunities of, 39–40 in China, 39 competitive advantages in, 138 local services and, 594 MIS and, 40 particularism influencing, 39 supply chain in, 375, 591f global markets, 594 global networks, 288 Global Positioning System (GPS), 63, 430 global supply chain, 375 Global System for Mobile Communications (GSM), 306, 313 global systems, 603 global telecommunications, 598–599 global threats, 333 global workforce, 80, 609 Golden Rule, 160 goods and service, 401–402 Google, 35, 167, 299 Google +, 90, 302, 415, 422 Google AdSense, 167 Google Apps, 90, 212, 215 Google Chrome, 208 Google Docs, 90, 92 Google Drive, 90, 92, 218, 353 Google Gmail, 167, 212 Google Hangouts, 90, 92, 294 Google Maps, 126, 516 Google Play, 226, 353–354 Google Search, 167, 301f, 467, 489 Google Sites, 90, 92 governance, 97, 265, 267, 290–292, 290f GPS See Global Positioning System Gramm-Leach-Bliley Act, 164, 336 grand design approach, 602 graphical user interface, 610 green computing, 219 green IT, 219 grocery delivery, 432 gross domestic product (GDP), 447 group decision-support systems (GDSS), 504–506 GSM See Global System for Mobile Communications H Hackers, 321, 325, 329, 354, 358–360 smartphones attacked by, 327 Hadoop, 209, 259, 269 Hadoop Distributed File System (HDFS), 258 hard disk drives, 115, 203 HCM See human capital management HD See high-definition TV HDFS See Hadoop Distributed File System Healthbox, 131 healthcare industry, 51-52, 335, 481-483 Health Insurance Portability and Accountability Act (HIPAA), 164, 335 health risks, 180–183 heartbleed bug, 334 hertz, 287 HFTs See high-frequency traders high-performance processors, 220 high-speed Internet, 309 HIPAA See Health Insurance Portability and Accountability Act host country system units, 599 hotspots, 309 HR See human resources HTML See hypertext markup language HTML5, 221 HTTP See hypertext transfer protocol hubs, 281 Huddle, 577 human interface design, 608–610 human resources (HR), 80–81, 243–244, 246f, 550, 556 Hummingbird search algorithm, 300–301 hybrid AI systems, 471 hybrid cloud computing, 219 HyperPlant, 459 hypertext markup language (HTML), 221–222, 263, 298, 313 hypertext transfer protocol (HTTP), 298 I IaaS See infrastructure as a service IAC See Intuit Analytics Cloud IBM Connections, 93, 102 IBM Notes, 93 IBM PureData System, 259 IBM TryTracker, 31-33 IBM WebSphere, 223 IDC See International Data Center identity management, 341, 344–345 identity theft, 331–332 IF-THEN-ELSE rules, 465–466 IIS See Internet Information Services IM See instant messaging IMB See Intelligent Mail bar code system; Internet Movie Database implementation, 485–486 counter, 574 international information systems, 603–604 of IS, 531–532 in project management, 567–569 imports, 39 In-a-Snap Snapchat, 424 639 incremental approach, 602 independent software developers, 138 Independent Software Vendor (ISV), 537 indirect goods, 428–429 Industrial Internet, 509 industrial revolution, 39 industry encyclopedia, 128 healthcare, 335 movie, 411 oil and gas, 509 recording, 172, 410–411 travel agency, 128 inference engine, 462, 463f information, 44 asymmetry, 408 business intelligence streams of, 490 culture and laws on, 595 data mining for, 261–262 decision making and required, 484f pivot tables used for, 502 policy established for, 264–265 quality of, 488, 489t requirements, 524, 562 rights, 156, 162–164 society, 155f value chain, 53, 54f information age, 156 informational role, 487 information density, in e-commerce, 407 information resources, 341, 355 information systems (IS), 33f See also international information systems; systems development alternative methods in, 546 audit, 343 behavioral study of, 57–58 benefits of, 32–33 business and role of, 95–101, 577 business objectives of, 41–44 business perspective on, 52–54, 59 business solutions and, 71f business transformed by, 33–35, 59 capital budgeting for, 565–566 communications gap on, 570, 570t competitive strategies using, 129–133 controls in, 337–338 cost and benefits of, 564–565, 565t counterimplementation in, 574 data management and, 59–60 defining, 44–46 department of, 96–97 dependence on, 176 design considerations of, 122–123 dimensions of, 46–47, 47f economic impacts of, 117–118 employment in, 97 employment influenced by, 161–162 end users relationship in, 569–570 ethical and moral issues and, 153–155, 154t, 155f, 159–162, 183 financial services availability of, 350 functions of, 45f implementation of, 531–532 liability problems from, 173 literacy, 46 management decisions from, 505 management structures for, 559–560 managerial roles in, 488t www.downloadslide.net 640 Index managers, 96 occupations in, 97 organizational resistance and, 122f organization interdependence and, 41f in organizations, 47–49 organizations planning of, 577t organizing functions of, 97–98 outsourcing in, 539–540 plan, 560–562, 561t SCM and, 372–373 study of, 57f systems integration of, 605 systems life cycle in, 533 technical study of, 56–57 user interface of, 558 vulnerability of, 323–324 information systems project change management in, 567 end users resistance to, 572–574 management commitment to, 570 risk factors in, 571, 576–577 technical complexity of, 571–572 information technology (IT), 44 business objectives with, 139 business processes in, 73 capital investments in, 34f competitive advantage from, 127 components of, 49–52 consumerization of, 212–213 decision making influenced by, 118–121, 119f employment in, 97 in farm equipment, 63–64 global telecommunications and, 598–599 governance of, 97 green, 219 hierarchies flattened by, 118–121, 119f investments in, 55f, 56f negative social costs of, 174–175 organizations interaction with, 109–110, 109f, 140 socially responsible use of, 159–160 information technology (IT) infrastructure, 50, 196f changes in, 226–227 competitive forces model for, 229–230, 229f components of, 206–210, 230 data management and, 195–196, 206–207 ecosystem of, 206f evolution of, 197–201, 230 investments in, 227–230 management of, 227 scalability of, 227 stages of, 198f informed consent, 165 infrastructure as a service (IaaS), 215 inheritance, 530–531, 531f in-memory computing, 258–259 input, 45 input controls, 337 Inside+, 69–71 Instagram, 101, 415 instant messaging (IM), 89, 294, 325 in-store experience, 440 insurance rates, 151 intangible benefits, 564 intellectual property rights, 414 challenges to, 171–172 copyright laws on, 170 patents on, 170–171 privacy and, 169–172 trade secrets in, 169 intelligence, 485 intelligent agent software, 302, 470–472, 471f intelligent techniques AI in, 302, 460, 471 CBR in, 464–465, 465f data mining in, 261–262, 269, 417, 452, 460 expert systems in, 460–464, 463f fuzzy logic in, 465–466, 466f, 472 genetic algorithms, 469–470, 469f, 472 knowledge management with, 452, 452f neural networks in, 467–469, 468f, 472 organizational benefits from, 460 interactivity, in e-commerce, 407 interfaces, 264, 325 for core systems, 608–611 end-user, 492, 535 graphical user, 610 human designed, 608–610 IS user, 558 multitouch, 208 network layer, 285 internal integration tool, 571–572 internal rate of return (IRR), 566 internal supply chain processes, 372 International Data Center (IDC), 255 international information systems alternative strategies in, 611 application development for, 603 approach benefits stated for, 602–603 architecture of, 592–593, 592f business challenges in, 595–596 business drivers in, 593–594 business process changes for, 603 business reorganization for, 599 challenges to, 595t, 606t connectivity in, 605–608 core systems in, 601, 601f developmental approach of, 602 global strategies for, 597–599, 597t, 598f identifying core systems in, 601–602 implementation management of, 603–604 local user support for, 604 management challenges of, 592, 600–601, 600t quality architectures for, 596 systems integration of, 605 technical alternatives to, 611–612 Internet, 49 See also networks and networking; web browsers; websites addressing and architecture of, 288 App, 306 architecture and governance of, 290–292, 290f big data source of, 262–263 broadband connections of, 280 as business tool, 296 cable connections to, 288 China’s use of, 608 client/server architecture on, 294f cloud computing on, 200–201 communications costs with, 204, 205f competitive advantage from, 50 competitive advantage impacting, 128–129, 128t computer abuses on, 176–177 connectivity, 605–608 countries use of, 606f credit card adoption on, 607–608 cyberwarfare on, 333 databases and, 263–264, 263f developing countries infrastructure for, 606 digital markets changed by, 411t DNS of, 288–289, 289f Double-Click on, 158 e-mail service on, 293 encrypted communications on, 297–298 Europe’s use of, 606f as global network, 288 global supply chain influenced by, 375 high-speed, 309 industrial, 509 information asymmetry on, 408 Internet 30 and, 293 IPV6 for, 292–293 long tail marketing on, 417 marketing on, 594 media distribution by, 410–411 mobile device users on, 429–430 organizations and, 122 platforms, 209–210 podcasting on, 414 privacy challenges of, 165–169 satellite connections to, 288 self-regulation of, 168 S-HTTP over, 348 smartphones accessing, 306, 403 supply chain driven by, 377f TCP/IP reference model for, 284f TCP/IP used for, 200 user content generation on, 408 U.S use of, 606f value web on, 133, 134f VoIP over, 294–295 VPN on, 298f vulnerabilities of, 325 Web 2.0, 304–305 Web 3.0, 305–306 Internet 2, 293 Internet-based marketing, 594 Internet Explorer, 221 Internet Information Services (IIS), 299 Internet layer, 284 Internet of People (IoP), 305 Internet of Things (IoT), 35, 129, 305, 311, 322, 327–328, 481, 511 Internet Protocol (IP), 284, 288 Internet Protocol version 34 (IPv6), 292–293 Internet service providers (ISPs), 172, 288, 291 Internet services, 293–294, 293t interorganizational system, 83 interpersonal role, 487 intranets, 50, 69, 84 intrusion detection systems, 347 Intuit Analytics Cloud (IAC), 555–556 investments capital, 34f, 117, 195, 565 in IT, 55f, 56f in IT infrastructure, 227–230 return on, 566 social, 55 steps in software, 95 in technology, 64 IoP See Internet of People iOS (Apple), 208 www.downloadslide.net Index IoT See Internet of Things IP See Internet Protocol IPv6 See Internet Protocol version 34 IRR See internal rate of return IS See information systems ISPs See Internet service providers ISV See Independent Software Vendor IT See information technology item number, 266 iterative process, 534 IVM See Information Value Management J JAD See joint application design Java, 221 jobs See employment joint application design (JAD), 541, 546 Junglee.com, 607 Juniper Networks, 209 just-in-time, 175, 373 K Kaboodle, 423 Kant’s categorical imperative, 160 key field, 247 keyloggers, 328 key performance indicators (KPIs), 102, 503–504, 562 keywords, 167, 221, 299–300, 303, 416, 456 Kindle reader, 73, 522, 543 KMS See knowledge management systems knowledge acquisition, 450 application, 451 base, 462, 594 competitive advantage and, 449 from data, 448–449 data mining discovering, 460 dimensions of, 448t discovery, 460 dissemination, 451 expert systems capturing, 464 explicit, 448 storage, 450–451 structured, 453 tacit, 448 workers, 47, 457 knowledge management systems (KMS), 83, 475–477 enterprise-wide, 239-241, 452 with intelligent techniques, 452, 452f organizational learning and, 449 role of, 447, 472 types of, 452, 452f, 472 in value chain, 449, 450f knowledge work systems (KWS), 452, 457–459 KPIs See key performance indicators KWS See knowledge work systems L LAN See local area networks language, data manipulation, 248 Law of Mass Digital Storage, 203 laws, 201–203 copyright, 170, 184 federal, 35, 163t financial services protected by, 164 information, 595 on information, 595 leadership, low-cost, 126 lean production systems, 596 learning management system (LMS), 456, 550 legacy systems, 210, 571 legal liability, 335 legislation, 336 computer crime, 331–332 Do Not Track and, 165 personal information protected by, 164 privacy, 163–164 safe harbor and, 165 self-regulation and, 168 legitimacy, 603 leisure time, 175 liability, 159, 173 LinkedIn, 415, 422 link farms, 303 Linux, 208, 220–221 liquified natural gas (LNG), 509 LMS See learning management system LNG See liquified natural gas local area networks (LAN), 286, 308–309, 312, 325 local services, 594 local systems, 601f local user support, 604 location analytics, 497 location-based services, 430–433 logical view, 245 long tail marketing, 417 Long Term Evolution (LTE), 307 LTE See Long Term Evolution M MacBooks, 171 machine learning, 467 MAEs See metropolitan area exchanges magnetic resonance imaging (MRI), 459 magnetic storage device, 203, 204f mainframe computers, 197, 207 main memory (RAM), 258 maintenance, in systems development, 527 MakeMyTrip.com, 607 malicious software, 326–328, 327t malware, 334 computer viruses and, 326 drive-by downloads, 327 keyloggers, 328 ransomware, 328 spyware, 167, 328, 347 SQL injection attacks, 328 Trojan horse, 328, 347 worms, 326, 347 MAN See metropolitan area network managed security service providers (MSSPs), 351 management, 49 BA and BI strategies of, 497–499 big data and, 153 capital, 55 change, 567, 615 classical model of, 487 collaboration tools selected by, 93–95 customer loyalty map for, 384f data resource, 241–245 decision making’s role of, 486–487 e-commerce challenges of, 433 electronic records, 335–337 641 employee relationship, 381 enterprise content, 453–456, 453f ethical issues facing, 153–155 filters, 488–489 groups, 74–79 identity, 341, 344–345 information systems project commitment of, 570 international information systems challenges for, 592, 600–601, 600t international information systems implementation by, 603–604 IS and roles of, 488t IS for decisions from, 505 of IT infrastructure, 227 operational, 47, 485 partner relationship, 381 patch, 334 senior, 47, 89, 154t, 485, 504 strategic systems analysis by, 139 structures, 559–560 total quality, 518, 545 unified threat, 348 Management Information Systems (MIS) applications of, 501t decision making and, 500–501 employment in, 97 field of, 46 globalization and, 40 study of, 58 technology changes and, 35–39, 36t TPS data in, 76f transaction processing systems and, 76 managerial roles, 487 manual labor, 461 manufacturing, 461–462 MapMyFitness, 130 MapReduce, 258 market creator, 414–415 marketing campaigns of direct, 382, 382f, 384 CRM campaigns of, 382, 382f e-commerce transforming, 417–426, 435 Internet-based, 594 long tail, 417 online, 418t personal information used in, 158 search engine, 303–304 in social networking, 422–426 wisdom of crowds in, 423 marketing campaigns, 158, 382–383, 383f market niche, 126–127, 137 marketplace, 124, 594 market space, 405 mashups, 225–226 mass customization, 126 massive open online courses (MOOCs), 456 Match.com, 416 m-commerce, 429–430, 433, 436 MDM See master data management measurement, continuous, 521 media, transmission, 287 media distribution, 410–411 menu costs, 409 Metcalfe’s Law, 203 metropolitan area exchanges (MAEs), 290 metropolitan area network (MAN), 286, 312 microblogging, 304 microeconomics, 110f www.downloadslide.net 642 Index micromarketing, 594 micropayment systems, 416 microprocessing power, 201–203, 202f, 220 microprocessor chips, 201, 202f Microsoft Access, 246, 250f Microsoft Cortana, 470 Microsoft Excel, 502 Microsoft NET platform, 223 Microsoft Office, 470, 536 Microsoft OneDrive, 92 Microsoft Project, 577 Microsoft SharePoint, 70, 92–93 Microsoft SQL, 309 Microsoft Xbox Live, 416 middle management, 47, 89, 485 millions of instructions per second (MIPS), 201 MIMO See multiple input multiple output minicomputers, 197 minority groups, 180 MIPS See millions of instructions per second Mirai (malware), 321–322, MIS See Management Information Systems MLB See Major League Baseball MLS See multiple listing service mobile apps, developing, 543–545 mobile computing, 210, 227, 234 era of, 200–201 security of, 236 mobile device management (MDM), 235 mobile devices, 35–38, 324 advertising on, 433 BYOD, 212–213, 234–236, 353–354 credit cards managed through, 433 e-commerce through, 405 Internet users on, 429–430 malware on, 327 privacy issues of, 158 security for, 325, 352, 354 mobile digital platforms, 35–36, 38–39, 210 mobile e-commerce, 412, 430f mobile employees, 505 MobileIron, 236 Mobile Sales App, 516–517 mobile search, 300 mobile web app, 543 mobile website, 543 models See also standards advertising revenue, 415–416 affiliate revenue, 417 agent-based, 470 behavioral, 487 broadcast, 408 business, 42, 412–415 classical management, 487 cloud computing compared in, 219t competitive forces, 123, 124f, 140–141, 229–230, 229f distribution, 410–411 ecosystem strategic, 137f ERP scoring, 564t financial, 566 free/freemium revenue, 416–417 multidimensional data, 260f object-oriented development in, 530–532 opt-in and opt-out, 168 pull-based and push-based, 376, 376f, 439 revenue, 415–417, 435 sales revenue, 416 scoring, 563, 564t structured methodologies in, 528–530 subscription revenue, 416 system design and, 546 transaction fee revenue, 417 value chain, 129–133, 132f, 140 walled garden, 353 modems, 285 functions of, 285f types of, 286f MOOCs See massive open online courses Moore’s Law, 201–203, 202f moral dimensions, 156 moral issues See ethical and moral issues MOST, 37 movie industry, 411 MRI See magnetic resonance imaging MSN, 413 MSSPs See managed security service providers multicore processors, 220 multidimensional data model, 260f multinational company, 600 multinational strategy, 597 multiple input multiple output (MIMO), 309 multiple listing service (MLS), 226 multitiered client/server architecture, 199, 200f, 293, 294f, 324 multitouch interface, 208 MyFitnessPal, 130 MyPoints, 417 My Recipe, 550–551 MySQL, 246 N NAI See Network Advertising Initiative nanotechnology, 203 nanotubes, 203 NAPs See network access points NAT See Network Address Translation National Information Infrastructure Protection Act, 331 National Institute of Standards and Technology (NIST), 214 native advertising, 421 native app, 543 near field communication (NFC), 311 negative social costs, 174–175 Netflix, 411, 416 net marketplaces, 427–428, 428f net neutrality, 291–292 Netscape.com, 402 network access points (NAPs), 290 Network Address Translation (NAT), 347 Network Advertising Initiative (NAI), 168 network-based strategies, 135–138 network economics, 135–136, 203 networked systems, 599 network interface controller (NIC), 325 Network interface layer, 285 network operating system (NOS), 281 networks and networking, 49 See also telecommunications technologies advertising, 421f bandwidth in, 287, 291, 505 bluetooth, 307–308, 307f, 325 bot, 177 cable, 103, 173, 280 circuit-switched, 283 client/server computing in, 282–283 communication trends and, 279–280 computer, 280–282, 280f, 312 corporation infrastructure of, 282f digital, 171 economies of scale and, 204–206 ethical issues of, 156–158 global, 288 international challenges of, 606t in large corporations, 281–282 local area, 286 modems in, 285, 285f, 286f operating systems, 209 packet switching of, 283, 283f peer-to-peer, 286, 295, 325 private industrial, 427, 428f routers for, 281 software-defined, 281 switches in, 127, 281 TCP/IP in, 284–285 TCP/IP reference model for, 284f telephone, 279 3G and 4G, 306 transmission media used in, 287 types of, 285–287, 312 unified communications in, 295–297 VPNs in, 297–298, 298f, 313, 348, 505 WANs, 286, 454 Wi-Fi, 308–309, 313 WSNs, 311, 313 NetZero, 288 neural networks, 467–469, 468f, 472 neurofuzzy systems, 471 New York Times, 416 NFC See near field communication NIC See network interface controller NikeFuel, 130 NIST See National Institute of Standards and Technology nitrogen oxide (NOx), 178 NLP See Neighborhood Liaison Program nonobvious relationships awareness (NORA), 158, 159f non-relational DBMS, 253–254 NORA See nonobvious relationships awareness normalization, 251, 251f, 252f normative goals, 116 NOS See network operating system NoSQL databases, 253 Novell Netware, 200 NOx See nitrogen oxide N-tier See multitiered client/server architecture O objective techniques, 563 object-oriented development, 530–532 object-oriented programming language, 222 observations, passive, 182 OFBiz See Apache Open for Business Office 393, 70 offline media, 434 offshore outsourcing, 539, 540f oil and gas industry, 509 OLAP See online analytical processing OMS See Order Management System on-demand computing, 218 on-demand economy, 400–401, 415 online advertising, 419 online analytical processing (OLAP), 260–261, 384, 490 online dating sites, 416 www.downloadslide.net Index online marketing, 418t Online Privacy Alliance, 168 online retail stores, 413–414 online transaction processing, 350 OnQ system, 127 ooVoo, 90 Open Handset Alliance, 208 open source software, 220–221, 389 operating costs, 144 operating systems Android, 208, 226, 234, 353 Apple’s, 208 Chrome, 208 Linux, 220–221 network, 209 Windows, 200, 206, 208 Windows 38, 208, 226, 544 operational CRM, 383–386 operational intelligence, 494–497 operational management, 47, 485 Operation Green Rights, 329 OPM See Office of Personnel Management opt-in model, 168 opt-out model, 168 Oracle Cloud platform, 536 Oracle Database, 246, 454 Oracle WebCenter Content, 454 order fulfillment, 72–73, 73f order processing, 341t organizational capital, 55 organizational change, 545 business process redesign in, 518 risks and rewards in, 518f systems development and, 517–519 types of, 517 organizational impact analysis, 576 organizational intelligence, 464–465 organizational learning, 449 organizations behavioral view of, 111f change resistance of, 121–122 characteristics of, 112–117 culture of, 112–113 defining, 110–111 e-mail retention by, 44 environment of, 113–114 hierarchies in, 48f inertia and politics of, 489 intelligent techniques benefiting, 460 Internet and, 122 IS and interdependence of, 41f IS and resistance of, 122f IS in, 47–49 IS planning of, 576t IT flattening, 118–121, 119f IT interaction with, 109–110, 109f, 140 microeconomic definition of, 110f politics of, 112 postindustrial, 119–122 reciprocal relationships in, 114f structure of, 116, 116t output, 46 output controls, 337 outsourcing, 546 competitive advantage and, 539 costs of offshore, 540f in IS, 539–540 offshore, 539 of security, 351 software, 225 P P2LU See Pick to the Last Unit PaaS See platform as a service package tracking system, 50, 138 packet filtering, 347 packet switching, 283, 283f Pandora, 172 PANs See personal area networks paperless system, 569 paradigm shift, 519 parallel strategy, 527 parameterized reports, 492 particularism, 595 partner relationship management (PRM), 381 passive observation, 182 passwords, 344 patches, 334 patch management, 334 patents, 170–171 patient records, 568 Patriot Act, 175 pattern recognition, 468 pay-per-click, 332 payroll processing, 75f, 527, 530f PCs See personal computers peer-to-peer networks, 286, 295, 325 Penguin, 303 performance indicators, 79f personal area networks (PANs), 307, 307f personal computers (PCs), 197, 199, 206, 329–330 personal identification number (PIN), 345 personal information, 595 behavioral targeting of, 418 from credit cards, 157 data collection and, 165 Facebook and, 186–189 Google and, 167 identity theft and, 331–332 malicious software and, 328 marketing campaigns using, 158 opt-in and opt-out models involving, 168 privacy legislation protecting, 164 websites and, 166 personalization, 407–408, 420 personnel system, 342f PERT charts, 572, 574f, 577 pharming, 331 phased approach strategy, 527 phishing, 331 physical transmission media, 287t physical view, 245 Pick to the Last Unit (P2LU), 311 pilot study strategy, 527 PIN See personal identification number Pinterest, 302, 422–423 pipeline-management software, 510 pivot table, 502, 502f Pixar wiki, 305 PKI See public key infrastructure platform as a service (PaaS), 215, 218 platforms, 50, 69 analytic, 259–260 business ecosystems and, 136–138 cloud computing, 214f computer hardware, 207–208 delivery, 492 643 Internet, 209–210 Microsoft NET, 223 mobile digital, 35–36, 38–39, 210 Oracle Cloud, 536 real-time bidding, 420 service, 197 software trends of, 231 podcasting, 414 point-of-sale terminals, 126, 395 Point-to-Point Tunneling Protocol (PPTP), 298 political issues, 155f, 183 politics, of organizations, 489 pollution-control technology, 178 portal, 78, 412–413 Porter, Michael, 124f Porter’s competitive forces model, 123 portfolio analysis, 562–563 POS See point-of-sale terminals post-implementation audit, 527 postindustrial organizations, 119–122 PPTP See Point-to-Point Tunneling Protocol precision agriculture, 63–64 predictive analysis, 493 predictive policing, 151, 152 predictive search, 301 Predix, 509 prescriptive planting, 63–64 presence map, 434, 434f, 435t price discrimination, 407 PriceGrabber, 302 price transparency, 407 pricing, dynamic, 409 pricing methods, 291 primary activities, 131 primary key, 247 printing, 3-D, 458–459 print publishers, 173 privacy See also ethical and moral issues; personal information big data and, 151–153, 183–184 e-mail and, 169 ethical and moral issues of, 165–169 Europe’s protection of, 164–165 Facebook and, 186–189 federal laws on, 163t information rights and, 162–164 intellectual property rights and, 169–172 Internet challenges to, 165–169 legislation, 163–164 mobile devices issues of, 158 personal information legislation protecting, 164 technical solutions to, 169 in U.S., 168 website’s policies of, 168 Privacy Act of 1974, 162 Privacy Shield, 595 private cloud, 218 private exchange, 427 private industrial networks, 427, 428f PRM See partner relationship management problem solving activities, 523 processing, 45 processing controls, 337 process specifications, 530 product differentiation, 125, 126 production, in systems development, 527 production reports, 492, 492t production workers, 47 www.downloadslide.net 644 Index product number, 266 products, substitute, 124 professional work, 85 profiling, 158 program-data dependence, 244 Program Evaluation and Review Technique See PERT charts programmatic ad buying, 420 programmers, 96, 539 programming, 215, 525 HTML and HTML5, 221–222 Java in, 221 open source, 220–221 XML, 222–223 project, 558 project management, 558f cost considerations in, 559 implementation in, 567–569 objectives of, 558–559, 577 risk dimensions in, 566–567 scoring models and, 563 software tools for, 576–577 systems control in, 560f of technical complexity, 571–572 of technologies, 567 Project Management Institute, 570 project portfolio management software, 577 project structure, 567 property rights, 156, 169–172 protocol, 284 prototyping, 546 pros and cons of, 535 steps in, 534–535, 534f in systems development, 534–535 public cloud, 218 public key encryption, 348–349, 349f public key infrastructure (PKI), 350 pull-based model, 376, 376f, 439 push-based model, 376, 376f, 439 Pushdo, 330 Python, 222 Q quality, 559 architectures, 596 data, 265–266 of information, 488 of life, 174 of software, 352 system, 156, 174 TQM for, 518, 545 quantum computing, 213 querying, of database, 248–250, 250f query language, 535 R racial divides, 180 racial profiling, 151 RAD See rapid application development radio frequency identification (RFID) tags, 46, 211–212, 277, 313, 316-318, 385–386 functioning of, 310f through supply chain, 309–311 wireless networks with, 278–279 RAM See main memory ransomware, 328 rapid application development (RAD), 541, 546 rationalization of procedures, 518 R&D See research and development Really Simply Syndication (RSS), 304, 313 real-time bidding platforms (RTB), 420 reciprocal relationships, 114f record, 242 record change, 526f recording industry, 172, 410–411 records management, 335–337 reduced instruction set computing (RISC), 207 reengineering work, 179–180, 571 referential integrity, 252 referral fees, 417 Refining Dashboard, 79 regional distribution, 502f regional systems, 599, 601f registration system, 529f regulations, 335–336 relational DBMS, 246, 247f, 249f, 254, 268 data grouping in, 251 operations of, 247–248 rent-versus-buy decisions, 227 repetitive stress injury (RSI), 180–182, 183f request for proposal (RFP), 537, 538 research and development (R&D), 135 responsibility, 159 responsive web design, 543 Retail Link system, 42 return on investment (ROI), 566 revenue e-commerce, 403 Google’s advertising, 35 mobile e-commerce, 430f models for, 415–417, 435 RFID See radio frequency identification tags RFP See request for proposal richness, in e-commerce, 407 ride-sharing service, 399–400 RightMedia, 419 RISC See reduced instruction set computing risk, 559 assessment, 338–341, 341t aversion principle, 161 health, 180–183 information systems project, 571, 576–577 in organizational change, 518f project management dimensions of, 566–567 robots, 461–462 ROI See return on investment routers, 281 routines, 112, 113f RSI See repetitive stress injury RSS See Really Simply Syndication RTB See real-time bidding platforms Ruby, 222 runaway projects, 557–558 S S3 See Simple Storage Service SaaS See software as a service safe harbor, 165 safety stock, 373 sales data, 77f, 125f sales force automation (SFA), 381 Salesforce Chatter, 93, 103 Salesforce.com, 225 sales revenue model, 416 sandboxing, 353 SAP ERP, 108, 516, 609 SAP HANA, 108, 482 SAP NetWeaver, 516 Sarbanes-Oxley Act, 44, 336 satellite Internet connections, 288 scalability, 227 SCM See supply chain management scope, 559 scoring models, 563, 564t SDN See software-defined networking SDS See software-defined storage search engine marketing, 303–304 search engine optimization (SEO), 303 search engines, 299–300, 301f Second Life, 90 Secure Hypertext Transfer Protocol (S-HTTP), 348 Secure Sockets Layer (SSL), 348 security, 323, 348, 355 See also computer crimes; malicious software; malware breaches, 321, 353 in cloud computing, 351 credit card systems for, 341 in electronic records management, 336–337 IoT challenges of, 327–328 lack of, 244 legal liability and, 335 of mobile computing, 236 for mobile devices, 325, 352, 354 outsourcing of, 351 policy, 341–342 of smartphones, 324 threats, 333–334, 358–360 vulnerabilities of, 324f wireless networks challenges of, 325 self-regulation, 168 sellers, third-party, 440 semantic search, 300–301 semi-structured decisions, 493, 501–503 senior management, 47, 89, 154t, 485, 504 sensitivity analysis, 501f sensor-generated data, 509 sentiment analysis, 262 SEO See also search engine optimization sequences, 261 server computers, 199, 263–264, 281 service level agreements (SLA), 225, 351 service-oriented architecture (SOA), 222–223, 388 service-oriented computing, 542 service platform, 197 services, substitute, 124 service set identifiers (SSIDs), 325 service workers, 47 SFA See sales force automation Shaft Align, 37 sharing economy, 415 shopping bots, 302 S-HTTP See Secure Hypertext Transfer Protocol Shutterstock, 255 SIG See Special Interest Group SIIA See Software and Information Industry Association Silverlight, 221 SimpleDB, 253 Simple Storage Service (S3), 215 SIMs See subscriber identity modules SIMS See Sonic Inventory Management System simulation, 452 Siri See Speech Interpretation and Recognition www.downloadslide.net Index Interface six sigma, 518 SKF Data Collection, 37 SKUs See stock-keeping units Skype, 90, 295, 505 SLA See service level agreements slippery slope rule, 161 smart-cap bottle, 131 smart cards, 345 smart companies, 130–131 smartphones, 35–38, 175, 210, 223, 292 See also mobile devices; wireless networks apps for, 226 biometric authentication on, 345 BYOD for, 234–236, 353–354 cellular systems for, 306–307 growth of, 403–405 hackers attacking, 327 Internet accessible on, 306, 403 Java for, 221 Linux for, 220–221 location-based services used by, 430–433 security of, 324 websites on screens of, 543 smart products, 129, 130–131 SMEs See subject matter experts Snapchat, 418 sniffer programs, 325, 326f, 329 SOA See service-oriented architecture social business, 86 applications of, 87t benefits of, 87, 88t software products for, 90–93, 173 technologies used for, 89–90 time/space matrix of, 94f social computing, 297 social CRM, 389 social e-commerce, 422–423, 423t social engineering, 333 social graph, 422 social investments, 55 socially responsibility, 159–160 social media, 434 social networking, 305, 408, 415, 432 businesses using, 34–35, 101–102 COPs in, 451 CRM used for, 389 with customers, 424–425 malware and, 327 marketing in, 422–426 social business using, 86–87 technology for, 102 tools, 93, 94t social search, 301–302 social shopping, 423 sociotechnical design, 576 sociotechnical systems, 58, 140 software, 207 See also applications; computer hardware; computing agile development of, 541 analytic, 33 antivirus, 347, 355 applications, 225–226, 536–538 best-of-breed, 499 business’s spending on, 224f capabilities of CRM, 383f cloud-based, 389, 538 cloud computing, 225, 536 collaboration and investment in, 95 collaboration in development of, 541–542 collaboration products, 90–93 computer, 49 coordinating release of, 604 for CRM, 381 customization of, 538 database, 209 data cleansing, 266 DBMS, 245 debugging, 352 enterprise, 208–209, 224, 369–370, 390 facial recognition, 187, 302, 345 filtering, 177 FPX, 537 human interface design of, 608–610 independent developers of, 138 integration, 210 intelligent agent, 302, 470–472, 471f localization of, 608–611 malicious, 326–328, 327t mashups, 225–226 networks and networking, 281 open source, 220–221, 389 outsourcing, 225 package, 224 pipeline-management, 510 piracy, 171 platform trends of, 231 products, 90–93, 173 programmers, 96, 539 project management tools of, 576–577 project portfolio management, 577 quality of, 352 runaway projects, 557–558 for SCM, 373–375 sentiment analysis, 262 for social business, 90–93, 173 Trojan horse, 328 virtualization, 213 voice recognition, 161 vulnerabilities of, 334–335 Software and Information Industry Association (SIIA), 172 software as a service (SaaS), 59, 254, 306, 415, 539 cloud computing using, 214–215 cloud software, 536 Salesforce.com as, 225 software-defined networking (SDN), 281 software-defined storage (SDS), 213 Sonic Inventory Management System (SIMS), 37 space shifting, 40 spam, 176–177 Special Interest Group (SIG), 379 Spector 360, 178 SpeedForm Gemini 30 Record Equipped, 131 spoofing, 329 SportWatch GPS, 130 Spotify, 172 spyware, 167, 328, 347 SQL See Structured Query Language SQL commands, 250, 250f SQL injection attacks, 328 SSIDs See service set identifiers SSL See Secure Sockets Layer stand alone enterprise systems, 388 standard operating procedures, 112 standards 645 cell phone, 306 in computing, 205t e-commerce universal, 406–407 802.11 wireless, 308–309 technology, 204–206 stateful inspection, 347 stock-keeping units (SKUs), 615 storage data management and, 209 knowledge, 450–451 magnetic, 203, 204f software-defined, 213 strategic business objective, 42 strategic systems analysis, 139, 141 strategic transitions, 140 streaming, 291, 372, 411, 414, 490 structure chart, 530, 530f structured decisions, 484 structured knowledge, 453 structured methodologies, 528–530 Structured Query Language (SQL), 248 Stuxnet (malware), 339–340, subject matter experts (SMEs), 615 subscriber identity modules (SIMs), 394 subscription revenue model, 416 substitute products and services, 124 SuccessFactors system, 80–81, 551, 610 super cookies, 167 suppliers, 42–43, 125, 127 supply and demand, 134f supply chain of businesses, 371–372 of China, 371 demand-driven, 375–376 downstream, 372 global, 375 in globalization, 375, 591f intelligent agent software in, 471f internal processes of, 372 Internet-driven, 377f planning systems, 373 push and pull-based models of, 376f RFID systems in, 309–311 upstream, 372 supply chain execution systems, 374 supply chain management (SCM), 83, 371, 378–379, 390 business value of, 376–377 IS and, 372–373 software for, 373–375 support activities, 131 surveillance, electronic, 296 switches, 281 switching costs, 127 symmetric key encryption, 348 synergies, 134, 140 system design, 524, 525t, 546, 570t system integration services, 210 system portfolio, 563f system quality, 156, 174 systems analysts, 96, 523–524 systems control, 560f systems development See also project management CASE in, 532 communications gap and, 570 conversion in, 527 core activities of, 528t end-user development in, 535–536, 546 www.downloadslide.net 646 Index software, (continued) end users in, 524–525 information requirements in, 524 maintenance in, 527 object-oriented development, 530–532 organizational change and, 517–519 problem solving activities in, 523 process of, 523f, 545–546 production in, 527 programming in, 525 prototyping in, 534–535 sociotechnical design in, 576 structured methodologies in, 528–530 systems analysts in, 523–524 testing in, 525–526 systems integration, 605 systems life cycle, 533 system testing, 526 T T1 lines, 288 tablet computers, 210 tacit knowledge, 448 tag suggest, 302 tangible benefits, 564 tap-and-go services, 311 taxi service, 399–401 taxonomy, 455 TCO See total cost of ownership TCP See Transmission Control Protocol TCP/IP See Transmission Control Protocol/ Internet Protocol teams, 85 Teamwork Projects, 577 technical approach, 56–57 technical complexity, 571–572 technical solutions, to privacy, 169 technology, 203 cognitive functioning and, 182–183 collaboration using, 89–90 competitive advantage from, 50 consumer relationships with, 130 data management, 49, 144–145, 152 decision making and, 496 disruptive, 114–116, 115t e-commerce features of, 406t e-commerce’s power from, 405–408 employment influenced by, 179–180 ethical issues of, 156–158, 157t information resources protected by, 341, 355 investing in, 64 MIS and changes in, 35–39, 36t pollution-control, 178 project management of, 567 social business using, 89–90 for social networks, 102 standards, 204–206 TCO, 228, 228t, 231 telecommunications, 49, 59, 209, 280, 294–295, 325 telecommunications technologies, 209, 280 See also international inerformation systems; networks and networking; radio frequency identification tags computer hardware in, 49, 59 global, 598–599 VoIP, 294–295, 325 telephone networks, 279 telephone systems, 173 telepresence, 90 Telnet, 293 temperature controls, 466f terminals, point-of-sale, 126, 395 testing, in systems development, 525–526 test plan, 526, 526f text mining, 262–263, 269 third-party sellers, 440 Third World, 594 3-D printing, 458–459 3G networks, 306 three-dimensional (3D) systems, 457 three-dimensional (3D) Web, 305 time-based competition, 175 time shifting, 40 time/space matrix, 94f TLS See Transport Layer Security TMT See Thirty Meter Telescope token, 344 total cost of ownership (TCO), 228, 228t, 231, 565 total quality management (TQM), 518, 545 touch point, 380, 384, 434 Toxic Substances Control Act, 43 TPS See transaction processing systems TQM See total quality management trackbacks, 304 tracking files, 167 tractors, 63 trade secrets, 169 traditional markets, 410t transaction brokers, 414 transaction cost theory, 117, 405 transaction fee revenue model, 417 transaction processing systems (TPS), 74–76, 75f, 76f, 267-268 transborder data flow, 595 Transmission Control Protocol (TCP), 284 Transmission Control Protocol/Internet Protocol (TCP/IP), 200, 282, 284–285, 284f transmission media, 287 transnational strategy, 598 transnational systems, 599, 602 transport layer, 284 Transport Layer Security (TLS), 348 travel agency industry, 128 Trojan horse, 328, 347 TRUSTe, 168 Tumblr, 415, 422 tunneling, 298 tuples, 247 Twitter, 101, 103, 212, 304, 415, 422, 424, 425, 492 two-factor authentication, 345 two-tiered client/server architecture, 199 U Ubimax, 211 ubiquity, 405 unified communications, 295–297 unified threat management (UTM), 348 uniform resource locator (URL), 299 United Kingdom, 193 United States (U.S.) CAN-SPAM Act in, 177 cell phone standards in, 306 Clean Air Act in, 177, 178 employment in, 39–40 federal privacy laws in, 163t imports and exports of, 39 Internet use in, 606f privacy in, 168 unit testing, 526 universal standards, in e-commerce, 406–407 Unix, 208 unstructured decisions, 484 upstream, supply chain, 372 URL See uniform resource locator U.S See United States user attention, of websites, 416 user content generation, 408 user-designer communications gap, 570 utilitarian principle, 161 UTM See unified threat management V value-added activities, 54 value chain, 449, 450f value chain model, 129–133, 132f, 140 value web, 133, 134f, 137 vehicle identification number (VIN), 37 Veriato Investigator, 296 VEVO website, 411 video streaming, 291, 411 VIN See vehicle identification number virtual company, 136 virtualization, 213, 219 Virtual Lot, 37 virtual meeting systems, 90 virtual private network (VPN), 297–298, 298f, 313, 348, 505 virtual reality (VR), 452, 459 Virtual Reality Modeling Language (VRML), 459 virtual worlds, 90 visitor tracking, 419f, 421 visual search, 302 visual web, 302 VMware, 213 voice over IP (VoIP), 294–295, 325 voice recognition software, 161 VoIP See voice over IP voyage-estimating systems, 77–78, 78f VPN See virtual private network VR See virtual reality VRML See Virtual Reality Modeling Language W walkthrough, 352 walled garden model, 353 Wall Street Journal, 416, 432, 439 WANs See wide area networks war driving, 325 Warehouse Management System (WMS), 374–375 warehouses, 441 waterfall approach, 533 Waze service, 430 wearable computing devices, 210–212 Web 2.0, 304–305 Web 3.0, 305–306 web-based e-mail, 167 www.downloadslide.net Index web beacons, 167, 168 web browsers, 169 Firefox and Chrome, 220–221 search engines of, 299–300 URL’s used by, 298–299 web bugs, 167 web design, 543 WebFOCUS, 535 web hosting service, 209 weblining, 188 web mining, 262–263, 269 web search tools, 413 web server, 199, 299 web services, 215f, 222–223, 223f, 542, 546 websites, 34–35, 434 collaborative, 304–305 cookies and, 166f HTML basis of, 221–222, 298 liability of, 173 m-commerce, 433 mobile, 543 personal information and, 166 personalization of, 420 privacy policies of, 168 searches tracked by, 166 SEO for, 303 on smartphone screen, 543 social search, 301–302 user attention of, 416 using beacon programs, 418–419 VEVO, 411 visitor tracking of, 419f, 421 wikis, 89–90 WEP See Wired Equivalent Privacy what-if analysis, 501, 510 WHP See Wildfire Hazard Potential wide area networks (WANs), 286, 454 Wi-Fi networks, 308–309, 313 wikis, 89–90, 304 Wildfire Hazard Potential (WHP), 497 WiMax, 309 Windows 10, 208, 226, 544 Windows operating system, 200, 206, 208 Wintel PC computers, 199, 206 Wired Equivalent Privacy (WEP), 348 wireless modems, 285 wireless networks, 33, 108 See also mobile devices bluetooth for, 307–308, 307f, 325 cellular systems and, 306–307 hotspots in, 309 PKI on, 350 with RFID tags, 278–279 security challenges of, 325 sniffer programs on, 325, 326f, 329 WEP for, 348 Wi-Fi, 308–309, 313 WiMax, 309 wireless sensor networks (WSNs), 311, 313 wisdom, 448 wisdom of crowds, 423 WMS See Warehouse Management System WordPress, 304 World Intellectual Property Organization Treaty, 172 World Wide Web, 50 World Wide Web Consortium (W3C), 222 worms, 326, 347 WSNs See wireless sensor networks W3C See World Wide Web Consortium X XML See extensible markup language Y Yahoo!, 299, 413 Yahoo! Messenger, 294 Yammer, 69–70, 93 Yatra.com, 607 Yet Another Hierarchical Officious Oracle See Yahoo! YouTube, 389 YP analytics, 535 Z zero-day vulnerabilities, 334 zero defects, 334 zero-rating practices, 292 Zeus Trojan, 328 Zoho Projects, 577 zombie PCs, 329–330 Zoom, 90 647 ... provided by the software manufacturer enable the firm to tailor a particular aspect of the system to the way it does business For example, the firm could use these tables to select whether it wants... and understand how the information they enter into the system can affect other parts of the company 387 www.downloadslide.net 388 Part Three Key System Applications for the Digital Age This requires... description of the problem The service requests are handled on a first-come-first-served basis After the service work has been completed, Prime calculates the cost of the work, enters the price on the service