1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Business driven technology 8e by baltzan

609 58 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 609
Dung lượng 38,2 MB

Nội dung

Business Driven Technology EIGHTH EDITION Paige Baltzan Daniels College of Business University of Denver BUSINESS DRIVEN TECHNOLOGY, EIGHTH EDITION Published by McGraw-Hill Education, Penn Plaza, New York, NY 10121 Copyright © 2020 by McGraw-Hill Education All rights reserved Printed in the United States of America Previous editions © 2017, 2015, and 2013 No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of McGraw-Hill Education, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning Some ancillaries, including electronic and print components, may not be available to customers outside the United States This book is printed on acid-free paper LWI 21 20 19 ISBN 978-1-259-92492-7 (bound edition) MHID 1-259-92492-0 (bound edition) ISBN 978-1-260-42524-6 (loose-leaf edition) MHID 1-260-42524-x (loose-leaf edition) Senior Portfolio Manager: Brian Sylvester Director: Wyatt Morris Product Developers: David Ploskonka, Kelly Delso Marketing Manager: Corban Quigg Content Project Managers: Melissa M Leick, Bruce Gin, Karen Jozefowicz Buyer: Susan K Culbertson Design: Matt Diamond Content Licensing Specialist: Ann Marie Jannette Cover Image: ©logoboom/Shutterstock Compositor: SPi Global All credits appearing on page or at the end of the book are considered to be an extension of the copyright page Library of Congress Cataloging-in-Publication Data Names: Baltzan, Paige, author Title: Business driven technology / Paige Baltzan, Daniels College of Business University of Denver Description: Eighth Edition | Dubuque : McGraw-Hill Education, [2019] | Revised edition of the author’s Business driven technology, [2018] Identifiers: LCCN 2018052791 | ISBN 9781259924927 (alk paper) Subjects: LCSH: Information technology—Management | Management information systems | Information resources management | Industrial management—Technological innovations Classification: LCC HD30.2 H32 2019 | DDC 658.4/038—dc23 LC record available at https://lccn.loc.gov/2018052791 The Internet addresses listed in the text were accurate at the time of publication The inclusion of a website does not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education does not guarantee the accuracy of the information presented at these sites mheducation.com/highered DEDICATION In memory of Allan R Biggs, my father, my mentor, and my inspiration Paige B R I E F TA B L E O F C O N T E N TS UNITS Achieving Business Success Chapter 1: Business Driven Technology Chapter 2: Identifying Competitive Advantages Chapter 3: Strategic Initiatives for Implementing Competitive Advantages Chapter 4: Measuring the Success of Strategic Initiatives Chapter 5: Organizational Structures That Support Strategic Initiatives Exploring Business Intelligence Chapter 6: Valuing and Storing Organizational Information—Databases Chapter 7: Accessing Organizational Information—Data Warehouses Chapter 8: Understanding Big Data and Its Impact on Business Streamlining Business Operations Chapter 9: Enabling the Organization—Decision Making Chapter 10: Extending the Organization—Supply Chain Management Chapter 11: Building a Customer-Centric Organization—Customer Relationship Management Chapter 12: Integrating the Organization from End to End—Enterprise Resource Planning Building Innovation Chapter 13: Creating Innovative Organizations Chapter 14: Ebusiness Chapter 15: Creating Collaborative Partnerships Chapter 16: Integrating Wireless Technology in Business Transforming Organizations Chapter 17: Developing Software to Streamline Operations Chapter 18: Methodologies for Supporting Agile Organizations Chapter 19: Managing Organizational Projects BUSINESS PLUG-INS B1 B2 B3 B4 B5 B6 Business Basics Business Process Hardware and Software Basics MIS Infrastructures Networks and Telecommunications Information Security B7 Ethics B8 Operations Management B9 Sustainable MIS Infrastructures B10 Business Intelligence B11 Global Information Systems B12 Global Trends TECHNOLOGY PLUG-INS (CONNECT ONLY) T1 T2 T3 T4 T5 T6 Personal Productivity Using IT Basic Skills Using Excel Problem Solving Using Excel Decision Making Using Excel Designing Database Applications Basic Skills Using Access Apply Your Knowledge Projects Notes iv  *  Brief Table of Contents T7 T8 T9 T10 T11 Problem Solving Using Access Decision Making Using Access Designing Web Pages Creating Web Pages Using HTML Creating Gantt Charts with Excel and Microsoft Project Glossary Index TA B L E O F C O N T E N TS About the Author  x Preface xiii UNIT 1  Achieving Business Success  Big Data, Big Analytics  Introduction 6 CHAPTER 1: BUSINESS DRIVEN TECHNOLOGY  Competing in the Information Age  Data 8 Information 10 Business Intelligence  11 Knowledge 12 Systems Thinking and Management Information Systems  14 The MIS Solution  15 Systems Thinking  17 Chapter Case:  The World Is Flat—Thomas Friedman  18 CHAPTER 2: IDENTIFYING COMPETITIVE ADVANTAGES  23 Identifying Competitive Advantages  23 Swot Analysis: Understanding Business Strategies  25 The Five Forces Model—Evaluating Industry Attractiveness 26 Buyer Power  26 Supplier Power  27 Threat of Substitute Products or Services  27 Threat of New Entrants  28 Rivalry Among Existing Competitors  28 Analyzing the Airline Industry  29 The Three Generic Strategies—Choosing a Business Focus 29 Value Chain Analysis—Executing Business Strategies  30 Chapter Case:  Michael Porter on TED—The Case for Letting Business Solve Social Problems  33 CHAPTER 3: STRATEGIC INITIATIVES FOR IMPLEMENTING COMPETITIVE ADVANTAGES  38 Business Process Reengineering  38 Types of Business Processes  39 Using Mis to Improve Business Processes  43 Supply Chain Management  43 Customer Relationship Management  46 Enterprise Resource Planning  48 Chapter Case:  Amazon Drone Knocking  51 CHAPTER 4: MEASURING THE SUCCESS OF STRATEGIC INITIATIVES 56 MIS Roles and Responsibilities  56 Metrics: Measuring Success  59 Efficiency and Effectiveness Metrics  61 The Interrelationship Between Efficiency and Effectiveness MIS Metrics  62 Metrics for Strategic Initiatives  63 Chapter Case:  Manipulating the Data to Find Your Version of the Truth  67 CHAPTER 5: ORGANIZATIONAL STRUCTURES THAT SUPPORT STRATEGIC INITIATIVES  72 Information Ethics  72 Information Does Not Have Ethics: People Do  73 Information Security  75 Hackers: A Dangerous Threat to Business  76 Viruses: A Dangerous Threat to Business  77 Chapter Case:  Fifteen Million Identity Theft Victims  80 Learning Outcome Review  81 Review Questions  81 Making Business Decisions  81 Unit Summary  84 Key Terms  84 Unit Closing Case One:  The Internet of Things  85 Unit Closing Case Two:  Five Ways Hackers Can Get into Your Business  87 Apply Your Knowledge  89 AYK Application Projects  93 UNIT 2  94 Exploring Business Intelligence  94 Bitcoin 95 Introduction 96 CHAPTER 6: VALUING AND STORING ORGANIZATIONAL INFORMATION—DATABASES 97 The Business Benefits of High-Quality Information  97 Information Type: Transactional and Analytical  98 Information Timeliness  99 Information Quality  99 Information Governance  102 Storing Information Using a Relational Database Management System  102 Storing Data Elements in Entities and Attributes  103 Creating Relationships Through Keys  103 Coca-Cola Relational Database Example  104 Using a Relational Database for Business Advantages  106 Increased Flexibility  106 Increased Scalability and Performance  106 Reduced Information Redundancy  107 Increased Information Integrity (Quality)  107 Increased Information Security  107 Driving Websites with Data  108 Website Data  108 Integrating Information among Multiple Databases  110 Data Integration  110 Chapter Case:  Political Microtargeting: What Data Crunchers Did for Obama  112 Table of Contents  * v CHAPTER 7: ACCESSING ORGANIZATIONAL INFORMATION—DATA WAREHOUSES  117 Data Warehousing: Supporting Decisions with Business Intelligence 117 History of the Data Warehouse  117 Data Mart  119 Information Cleansing (Or Scrubbing)  120 Business Intelligence  122 The Problem: Data Rich, Information Poor  123 The Solution: Business Intelligence  123 Chapter Case:  Using Data to Drive Business Operations  125 CHAPTER 8: UNDERSTANDING BIG DATA AND ITS IMPACT ON BUSINESS  130 The Power of Big Data Analytics  130 Distributed Computing  130 Virtualization 132 Analyzing Big Data  132 Data Mining  133 Data-Mining Process Model  134 Data-Mining Analysis Techniques  134 Data Mining Modeling Techniques for Predictions  138 Data Analysis  139 Advanced Data Analytics  140 Data Visualization  140 Chapter Case:  Two Trillion Rows of Data Analyzed Daily—No Problem  143 Learning Outcome Review  144 Review Questions  144 Making Business Decisions  144 Unit Summary  147 Key Terms  147 Unit Closing Case One:  Data Visualization: Stories for the Information Age  148 Unit Closing Case Two:  Informing Information  149 Apply Your Knowledge  152 AYK Application Projects  156 UNIT 3  158 Streamlining Business Operations  158 Robots Took My Job  159 Introduction 161 CHAPTER 9: ENABLING THE ORGANIZATION—DECISION MAKING 162 Making Organizational Business Decisions  162 The Decision-Making Essentials  162 Using MIS to Make Business Decisions  165 Operational Support Systems  165 Managerial Support Systems  166 Strategic Support Systems  168 The Future: Artificial Intelligence  170 Expert Systems  172 Neural Networks  173 Genetic Algorithms  174 Intelligent Agents  174 Virtual Reality  175 Chapter Case:  My Virtual Reality Check Bounced  176 vi  *  Table of Contents CHAPTER 10: EXTENDING THE ORGANIZATION—SUPPLY CHAIN MANAGEMENT  181 Information Technology’s Role in the Supply Chain  181 Visibility Into the Supply Chain  182 Technologies Reinventing the Supply Chain  183 3D Printing Supports Procurement  185 RFID Supports Logistics  186 Drones Support Logistics  187 Robotics Supports Materials Management  188 The Extended Supply Chain  189 Chapter 10 Case:  BOGO: Buy One, Get One  191 CHAPTER 11: BUILDING A CUSTOMER-CENTRIC ORGANIZATION—CUSTOMER RELATIONSHIP MANAGEMENT 194 Customer Relationship Management  194 The Power of the Customer  195 Operational and Analytical CRM  195 Marketing and Operational CRM  195 Sales and Operational CRM  198 Customer Service and Operational CRM  200 Analytical CRM  201 Extending Customer Relationship Management  201 Supplier Relationship Management  202 Partner Relationship Management  202 Employee Relationship Management  203 Chapter 11 Case:  Robots are in the House!  204 CHAPTER 12: INTEGRATING THE ORGANIZATION FROM END TO END—ENTERPRISE RESOURCE PLANNING  208 Enterprise Resource Planning (ERP)  208 Bringing the Organization Together  209 The Evolution of ERP  210 Integration Tools  211 Core and Extended ERP Components  212 Core ERP Components  213 Extended ERP Components  214 Measuring ERP Success  216 The Future of ERP  217 On-Premise ERP  217 Cloud ERP  217 Hybrid ERP  219 Chapter 12 Case:  Five Famous ERP Failures  221 Learning Outcome Review  223 Review Questions  223 Making Business Decisions  223 Unit Summary  225 Key Terms  225 Unit Closing Case One:  The Connected Car Revolution  226 Unit Closing Case Two:  Dream It, Design It, 3D Print It  227 Apply Your Knowledge  229 AYK Application Projects  234 UNIT 4  236 Building Innovation  236 Slack-Be Less Busy  237 Introduction 238 CHAPTER 13: CREATING INNOVATIVE ORGANIZATIONS 239 Disruptive Technologies and Web 1.0  239 Disruptive versus Sustaining Technology  239 The Internet and World Wide Web—The Ultimate Business Disruptors 241 Web 1.0: The Catalyst for Ebusiness  242 Advantages of Ebusiness  242 Expanding Global Reach  242 Opening New Markets  243 Reducing Costs  244 Improving Effectiveness  245 Chapter 13 Case:  IBM Watson Taking over the World  248 CHAPTER 14: EBUSINESS  252 Ebusiness Models  252 Business-To-Business (B2B)  252 Business-To-Consumer (B2C)  253 Consumer-To-Business (C2B)  253 Consumer-To-Consumer (C2C)  253 Ebusiness Forms and Revenue-Generating Strategies  253 Ebusiness Fraud  255 Ebusiness Tools for Connecting and Communicating  256 Email 256 Instant Messaging  257 Podcasting 257 Videoconferencing 257 Web Conferencing  257 Content Management Systems  258 The Challenges of Ebusiness  258 Identifying Limited Market Segments  258 Managing Consumer Trust  259 Ensuring Consumer Protection  259 Adhering to Taxation Rules  259 Chapter 14 Case:  Are You Ready for Your Next Gig?  260 CHAPTER 15: CREATING COLLABORATIVE PARTNERSHIPS 264 Web 2.0: Advantages of Business 2.0  264 Content Sharing Through Open Sourcing  264 User-Contributed Content  265 Collaboration Inside the Organization  265 Collaboration Outside the Organization  266 Networking Communities with Business 2.0  267 Social Tagging  268 Business 2.0 Tools for Collaborating  269 Blogs 269 Wikis 270 Mashups 270 The Challenges of Business 2.0  271 Technology Dependence  271 Information Vandalism  271 Violations of Copyright and Plagiarism  271 Web 3.0: Defining the Next Generation of Online Business Opportunities 272 Egovernment: The Government Moves Online  273 Mbusiness: Supporting Anywhere Business  273 Chapter 15 Case:  Stars Website Analytics  274 CHAPTER 16: INTEGRATING WIRELESS TECHNOLOGY IN BUSINESS 279 Wireless Network Categories  279 Personal Area Networks  279 Wireless LANs  280 Wireless MANs  281 Wireless WAN—Cellular Communication System  282 Wireless WAN—Satellite Communication System  283 Protecting Wireless Connections  284 Managing Mobile Devices  285 Business Applications of Wireless Networks  285 Radio-Frequency Identification (RFID)  286 Global Positioning System (GPS)  287 Geographic Information Systems (GIS)  287 Chapter 16 Case:  The Magic Mobility of Disney  289 Learning Outcome Review  290 Review Questions  290 Making Business Decisions  290 Unit Summary  294 Key Terms  294 Unit Closing Case One:  BitCoin 295 Unit Closing Case Two:  Disrupting the Taxi: Uber  296 Apply Your Knowledge  298 AYK Application Projects  301 UNIT 5  302 Transforming Organizations  302 Gamer Delight  303 Introduction 305 CHAPTER 17: DEVELOPING SOFTWARE TO STREAMLINE OPERATIONS 306 The Systems Development Life Cycle (SDLC)  306 Phase 1: Planning  308 Phase 2: Analysis  308 Phase 3: Design  309 Phase 4: Development  310 Phase 5: Testing  312 Phase 6: Implementation  313 Phase 7: Maintenance  314 Chapter 17 Case:  Bugs Everywhere  315 CHAPTER 18: METHODOLOGIES FOR SUPPORTING AGILE ORGANIZATIONS 318 Software Development Methodologies  318 Rapid Application Development (RAD) Methodology  320 Extreme Programming Methodology  320 Rational Unified Process (RUP) Methodology  321 Scrum Methodology  321 Developing a Service-Oriented Architecture  321 Interoperability 321 Loose Coupling  323 Soa Service  324 Chapter 18 Case:  Scratch 325 CHAPTER 19: MANAGING ORGANIZATIONAL PROJECTS  329 Using Project Management to Deliver Successful Projects  329 Unclear or Missing Business Requirements  330 Skipped Phases  330 Table of Contents  * vii Changing Technology  331 The Cost of Finding Errors in the SDLC  331 Balance of the Triple Constraints  332 Primary Project Planning Diagrams  333 Outsourcing Projects  336 Outsourcing Benefits  337 Outsourcing Challenges  337 Chapter 19 Case:  Disaster at Denver International Airport  338 Learning Outcome Review  339 Review Questions  339 Making Business Decisions  340 Unit Summary  342 Key Terms  342 Unit Closing Case One:  Reducing Ambiguity In Business Requirements 343 Unit Closing Case Two:  Getting Your Project on Track  344 Apply Your Knowledge  346 AYK Application Projects  351 Business Plug-Ins  352 B1: Business Basics 352 Introduction 352 Types of Business  352 Sole Proprietorship  353 Partnership 353 Corporation 353 Internal Operations of a Corporation  355 Accounting 355 Financial Statements  355 Finance 357 Financial Analysis  357 Human Resources  358 Management Techniques  358 Sales 359 The Sales Process  359 Market Share  359 Marketing 361 Marketing Mix  361 Customer Segmentation  361 The Product Life Cycle  363 Operations/Production 363 Transforming Corporations  363 Management Information Systems  364 Plug-In Summary  366 Key Terms  366 Making Business Decisions  367 B2: Business Process  368 Business Process Modeling  368 Using MIS to Improve Business Processes  371 Operational Business Processes—Automation  372 Managerial Business Processes—Streamlining  374 Strategic Business Processes—Reengineering  375 Plug-In Summary  380 Key Terms  380 Making Business Decisions  380 viii  *  Table of Contents B3: Hardware and Software Basics  384 Introduction 384 Hardware Basics  384 Central Processing Unit  385 Primary Storage  386 Secondary Storage  388 Input Devices  389 Communication Devices  391 Computer Categories  391 Software Basics  394 System Software  394 Application Software  395 Distributing Application Software  395 Plug-In Summary  397 Key Terms  397 Making Business Decisions  397 B4: MIS Infrastructures  400 The Business Benefits of a Solid MIS Infrastructure  400 Supporting Operations: Information MIS Infrastructure 401 Backup and Recovery Plan  402 Disaster Recovery Plan  403 Business Continuity Plan  405 Supporting Change: Agile MIS Infrastructure  407 Accessibility 407 Availability 408 Maintainability 409 Portability 409 Reliability 409 Scalability 410 Usability 410 Plug-In Summary  411 Key Terms  411 Making Business Decisions  411 B5: Networks and Telecommunications  416 Introduction 416 Network Basics  416 Architecture 417 Peer-To-Peer Networks  418 Client/Server Networks  419 Topology 419 Protocols 419 Ethernet 420 Transmission Control Protocol/Internet Protocol  421 Media 423 Wire Media  423 Wireless Media  424 Plug-In Summary  425 Key Terms  425 Making Business Decisions  425 B6: Information Security  428 The First Line of Defense—People  428 The Second Line of Defense—Technology  429 People: Authentication and Authorization  429 Data: Prevention and Resistance  432 Attack: Detection and Response  434 Plug-In Summary  435 Key Terms  435 Making Business Decisions  435 B7: Ethics  438 Developing Information Management Policies  438 Ethical Computer Use Policy  438 Information Privacy Policy  439 Acceptable Use Policy  440 Email Privacy Policy  440 Social Media Policy  441 Workplace Monitoring Policy  442 Plug-In Summary  444 Key Terms  444 Making Business Decisions  444 B8: Operations Management 450 Introduction 450 Operations Management Fundamentals  450 MIS’s Role in OM  453 OM Strategic Business Systems  453 Competitive OM Strategy  455 Cost 455 Quality 455 Delivery 456 Flexibility 456 Service 457 OM and the Supply Chain  457 Plug-In Summary  458 Key Terms  458 Making Business Decisions  458 B9: Sustainable MIS Infrastructures  460 MIS and the Environment  460 Increased Electronic Waste  461 Increased Energy Consumption  461 Increased Carbon Emissions  461 Supporting the Environment: Sustainable MIS Infrastructure 462 Grid Computing  462 Virtualized Computing  464 Cloud Computing  468 Utility Computing  473 Plug-In Summary  475 Key Terms  475 Making Business Decisions  476 Plug-In Summary  486 Key Terms  486 Making Business Decisions  486 B11: Global Information Systems  490 Introduction 490 Globalization 490 Cultural Business Challenges  491 Political Business Challenges  491 Global Geoeconomic Business Challenges  492 Global MIS Business Strategies  492 Governance and Compliance  493 Global Enterprise Architectures  495 Global Information Issues  496 Information Privacy  496 Europe 497 The United States  498 Canada 498 Global Systems Development  499 Plug-In Summary  500 Key Terms  500 Making Business Decisions  500 B12: Global Trends 502 Introduction 502 Reasons to Watch Trends  502 Trends Shaping Our Future  503 The World’s Population Will Double in the Next 40 Years  503 People in Developed Countries are Living Longer  504 The Growth in Information Industries is Creating a Knowledge-Dependent Global Society  504 The Global Economy is Becoming More Integrated  505 The Economy and Society are Dominated by Technology  505 Pace of Technological Innovation is Increasing  506 Time is Becoming One of the World’s Most Precious Commodities 506 Technologies Shaping Our Future  506 The Digital Mesh  506 Smart Machines  507 The New IT Reality  508 Plug-In Summary  509 Key Terms  509 Making Business Decisions  509 Apply Your Knowledge Projects  AYK-2 Glossary G-1 Notes N-1 Index I-1 B10: Business Intelligence  480 Operational, Tactical, and Strategic BI  480 BI’s Operational Value  481 Business Benefits of BI  482 Categories of BI Benefits  483 Table of Contents  * ix www.freebookslides.com Distributed computing, 4, 130–132 Distributed denial-of-service (DDoS) attacks, 78 Distributing application software, 395–396 Distribution management systems, 455 Dividends, 356 Documentation, user, 313 Dole Organic, 271 Domain name hosting, 241 Domain squatting, 251 Domino’s Pizza, 263, 441 DoMyStuff.com, 501 DoS (denial-of-service) attacks, 78 Double Robotics Double telepresence robot, 258 Downtime, 74–75 DRaaS (Disaster Recovery as a Service), 473 Dream Works Animation, 462–463 Drill-down, by digital dashboards, 172 Drones as delivery systems, 51–52 logistics supported by, 185, 187–188 DropBox.com, 128, 237 Drucker, Peter, 61 DSSs (decision support systems), 167–168, 453 Dual boot, 394 Dubai Ports World, 232 Dumpster diving, 428 DVD-ROM drive, 389 DVD-RW (digital video disk-read/write) drive, 389 Dynamic business processes, 40 Dynamic catalog, 108 Dynamic information, 108 Dynamic reports, 10 Dynamic scaling, with Infrastructure as a Service (IaaS), 473 E EA (enterprise architects), 401 EAI (enterprise application integration) middleware, 211 Earthlink.net, 256 eBay.com, 112, 143, 244, 253, 262, 270, 379, 491 ebook computer, 392 Ebusiness, 252–264 business-to-business model for, 252–253 business-to-consumer model for, 253 consumer protection challenge, 259 consumer-to-business model for, 253 consumer-to-consumer model for, 253 consumer trust challenge, 259 I-6  * Index content management systems for, 258 cost reductions by, 244–245 description of, 238 effectiveness improved by, 245–248 email as tool for, 256 ERP components for, 215 fraud in, 255–256 gig economy and, 260 global reach of, 242–243 instant messaging as tool for, 257 market segment identification challenge, 258 new markets opened by, 243–244 podcasting as tool for, 257 revenue-generating strategies of, 253–255 taxation rules challenge, 259 videoconferencing as tool for, 257 web conferencing as tool for, 257–258 Web 1.0 as catalyst for, 242 EC2 (Amazon Elastic Compute Cloud), 218, 473–474 Ecommerce, 242, 417 See also Ebusiness Economic Policy Institute, 70 Economy, 505 Edge matching, in GIS, 287–288 EDI (electronic data interchange), 183 Ediscovery, 74 Effectiveness, ebusiness improvements in, 245–248 Effectiveness MIS metrics, 61–63 Efficiency MIS metrics, 61–63 Efficiency of MIS systems, 56–57 Egovernment, 273 EIS (executive information systems), 168–169, 453 Elance.com, 501 Electronic data interchange (EDI), 183 Elevation of privilege, 79 Elogistics, 215 Email, 256, 440–441 Embedded operating system, 394 Emergency notification services, 405–406 Emergency preparedness, 405 Emergency response systems, GPS for, 287 Employee monitoring policy, 442–443 Employee relationship management, 202–203 Employee training and motivation, 452 Encryption, 432–433 Energy consumption, by computer servers, 461, 463 Engineering, collaborative, 190 English, Paul, 299 ENIAC (Electronic Numerical Integrator and Computer), 89 Enterprise application integration (EAI) middleware, 211 Enterprise architects (EA), 401 Enterprise Rent-A-Car, 230 Enterprise resource planning (ERP), 208–234 balanced scorecard metrics for, 64–66 competitive advantage implemented with, 48–51 connected cars, case study on, 226–227 core components of, 212–214 evolution of, 210–211 extended components of, 213–215 failures of, 221–222 future of, 217–220 information sharing with, 209–210 integration tools in, 211–212 overview, 208–209 success measurement of, 216 3D printing, case study on, 227–229 Entities, in relational databases, 103–104 Entity relationship diagrams, 309–310 Entry barriers, 28, 44 Environment See Sustainable management information system (MIS) infrastructures Environmental business processes, 41 EPA (U.S Environmental Protection Agency), 414, 477–478 Eprocurement, 215 Equifax credit reporting, 73 ERP (enterprise resource planning) See Enterprise resource planning (ERP) ESPN, 69 Estimated time enroute (ETE), in navigation, 287 Estimated time of arrival (ETA), in navigation, 287 Estimation analysis, 135–136 Ethernet technology for LAN networks, 420–421 Ethical hacking, 76–77 Ethics, 438–449 in acceptable use policy, 440 in computer use policy, 438–439 data mining and, 145 in email privacy policy, 440–441 information, 72–74 in information privacy policy, 439–440 in social media policy, 441–442 in workplace monitoring policy, 442–443 ETL (extraction, transformation, and loading) of information, 119, 123 Etsy.com, 470 www.freebookslides.com European Union European Commission for Justice, Fundamental Rights, and Citizenship, 445–446 European Court of Justice, 446 privacy regulations of, 497–499 on transborder data flows, 496–497 Evernote.com, 470 Ewaste, 461 Excel software, 102 Execution system, for supply chain, 183 Executive information systems (EIS), 168–169, 453 Exist, Inc., 145 Expedia.com, 243, 491 Expenses, on income statements, 356 Expert systems, 172–173 Explicit knowledge, 266 Exploratory data analysis, 140 Extensible Markup Language (XML), 323 Extraction, transformation, and loading (ETL) of information, 119, 123 Extreme programming (XP) methodology, 319–321 Extricity, Inc., 211 ExxonMobil, 231 ezine magazines, 270–271 F FAA (Federal Aviation Administration), 52, 187 Facebook.com, 4, 7, 21, 77, 86, 98, 142, 145, 218, 228, 262, 267, 276–277, 289, 413, 442, 446–447, 470 Facilitators, knowledge, 12 Facilities location, 452 Facts, 7–8 Failover and failback, in backup and recovery plans in MIS, 403 Fair information practices, 439–440 FAO Schwartz, Inc., 352 Fast Company magazine, 58 Fast data, 140 Fault tolerance, in backup and recovery plans in MIS, 402–403 FCC (Federal Communications Commission), 293 Feasibility of projects, 330–331 Federal Aviation Administration (FAA), 52, 187 Federal Communications Commission (FCC), 293 Federal Reserve Bank, 36, 95, 146 Federal Trade Commission (FTC), 80, 430 FedEx, 24, 200, 375 Feedback, in systems, 17 Fiber-optic cable for network transmission media, 423–424 Fifth-generation languages (5GL), 312 File transfer protocol (FTP), 422 Finance business processes, 41 Finance department in corporations, 357–358 Finance ERP components, 213–214 Financial perspective of balanced scorecard, 66 Financial quarters, 357 Financial statements, 355–356 Financial Times, 185 Firefox browser (Mozilla), 264 Firestone Tire Company, 459 Firewalls, 433–434 FirstGov.gov, 273 First-mover competitive advantage, 28 Flash memory, in computers, 388 Flexibility, 106, 456 Flickr.com, 237, 251, 265, 268, 270, 295, 470 Flight Patterns project, Google Creative Labs, 148 Flipboard application software, 271 Focused strategy, for market entry, 29–30 Focus:HOPE, 354 Folksonomy, 268 Forbes 500, 212 Forbes magazine, Ford, Henry, 250 Ford Motor Company, 226, 250, 459 Forecasting, 139, 452 Foreign keys, in relational databases, 104 Format of information, 97–98 For profit corporations, 353 Forrester Research, 243 Forshaw, James, 77 Fortune 500, 57, 221, 267, 458, 490, 495 Fortune magazine, 33, 92 Fortune 1000, Fortune top 100 companies to work for, 21 Forward integration of data, 110–111 Foursquare.com, 289 Fourth-generation languages (4GL), 312 Franklin, Benjamin, 333 Fraud, ebusiness, 255–256 Freakonomics (Levitt), 82, 317 Friedman, Thomas, 18–19, 21–22, 36, 490 Frito-Lay, 24–25, 384 FTC (Federal Trade Commission), 80, 430 FTP (file transfer protocol), 422 Functional thinking, business processes reflecting, 39 Fuzzy logic, 174 Fwd Powershot, 291 G Gaming industry, 303–304, 359 Gantt charts, in project management, 334–335 Gao, Sunny, 228 Gap, Inc., 253, 361 Gartner/Symposium ITxpo, 506 Gart Sports, 250 Gates, Bill, 7, 19, 21, 91, 317 General Motors (GM), 269 Genetic algorithms, 173–174 Geocaching and geocoins, 287 Geocoding, 288 Geoeconomic business challenges, 492 Geographic information systems (GIS), 287–289 Geographic segmentation of markets, 362 Germanotta, Stefani Joanne, Gigabit Ethernet technology, 421 Gigabytes, storage capacity in, 388 Gigahertz (GHz), as CPU cycles per second measure, 385 Gig economy, 260 GIS (geographic information systems), 287–289 GIS map automation, 288 Gladwell, Malcolm, 91, 317 Global information systems, 490–501 See also Management information systems (MIS) infrastructures Canadian regulations and, 498–499 enterprise architectures in, 495–496 European Union regulations and, 497–498 globalization and, 490–492 information privacy issues in, 496–497 MIS business strategies in, 492–494 systems development and, 499 United States regulations and, 498 Globalization, 18–19 Global positioning systems (GPS), 287 Global warming, 67 GM (General Motors), 269 Goal-seeking analysis, 167 Godin, Seth, 91, 317 Goldman, Eric, 276 Goods, definition of, 16 Goods-services continuum, 452 Google Calendar, 412 Google Cloud Connect, 471 Index  * I-7 www.freebookslides.com Google.com, 18, 51–52, 77, 82–83, 112, 128, 142, 226, 253–254, 270, 272, 292–293, 317, 412, 430, 446, 466–467, 469–470, 487 Google Creative Labs, 148 Google Docs, 277 Google Docs & Spreadsheets, 412 Google Drive, 237 Google Earth, 271, 288 Google Glass, 175 Google Glasses, 3D printed knock-off, 228 Google Gmail, 218, 412–413 Google+, 291 Google Ventures, 297 Gore, Al, 91 Governance of information, 102 Gowalla.com, 289 GPS (global positioning systems), 287 Granularity of information, 97–98, 168 Graphical user interface (GUI), 309 Green, Tonja, 43 Green MIS See Sustainable management information system (MIS) infrastructures Green personal computer (green PC), 460 Grid computing, 462–465 Group Software, 120 Growth, on balanced scorecard, 66 Growth stage, in product life cycle, 363 Grupo Farmanova Intermed (Costa Rica), 214 Guardian, The, 148 GUI (graphical user interface), 309 Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (OECD), 440 Guru.com, 501 H Hackathorn, Richard, 481 Hackers, business infiltration by, 76–77, 87–88 Hadoop software for distributed computing, Hallmark, 152 Hampton University (VA), 128 Hanrahan, Pat, 143 Haptic interface, 175 Hard drive, as magnetic medium secondary computer storage, 389 Hardware central processing unit (CPU), 385–386 communication devices, 391 computers, categories of, 391–393 input and output devices, 389–391 I-8  * Index on network, 400 overview, 384–385 storage, 386–389 Harley-Davidson, 194–195 Harley Owners Group (HOG), 194 Harvard Business School, 26, 33, 64 Harvard University, 128, 299 #GIRLBOSS (Amoruso), 262 Hashtags, 268 Hawking, Stephen, 159 HBOS, Ltd., 202 Health Insurance Portability and Accountability Act of 1996 (HIPAA), 433, 498 Heat maps, 245 Help desk, 313 Hering, Lance, 347 Hernandez-Rebollar, Jose L., 391 Herpen, Iris van, 228 Hershey Foods, Inc., 219, 221 Hewlett-Packard (HP), 221, 394, 442 High availability of systems, 409 High-quality information, 100–102 HIPAA (Health Insurance Portability and Accountability Act) of 1996, 433, 498 HIPAA Security Rule, 433 Histograms, 170–171 Historical analysis of trends, 502 Hitbots (automated clicking programs), 255 Hit metrics, for Websites, 247 Hoaxes, 79 HOG (Harley Owners Group), 194 Home Depot, 36 Horizontal privilege escalation network intrusion attack, 432 Hot site, in disaster recovery plans, 403–404 Hotspots, for wi-fi access, 280 HP, Inc (Hewlett-Packard), 221, 394, 442 HTML (Hypertext Markup Language), 241 HTML 5, 241 HTTP (Hypertext Transfer Protocol), 241, 422 Hub (switch or router), for networking, 417 Hul, Ben, 178 Human-generated data, Human resources business processes, 41 Human resources department, 358–359 Human resources ERP components, 214 Hummer Motor Co., 90 Hundred Monkeys, A, 251 Hybrid clouds, 472–473 Hybrid ERP, 219–220 Hybrid network topology, 420 Hypertext Markup Language (HTML), 241 Hypertext Transfer Protocol (HTTP), 241, 422 Hyundai Motor Co., 90 I I, Robot (Asimov), 189 IaaS (Infrastructure as a Service), 473–474 IBM, Inc., 89, 174, 240, 298, 321, 336, 394, 496 IBM Watson, 178, 248 ICANN (Internet Corporation for Assigned Names and Numbers), 241 ICCS (Institute for Citizen-Centered Service), 492 IDC (International Data Corporation), 36 Identity management, 107–108 Identity theft, 80, 429, 436 IDS (intrusion detection software), 434 IEEE (Institute of Electrical and Electronics Engineers), 280 IEEE 802.11n standard (Wireless-N), 280 IKEA, 298 Illiri, Inc., 436 Imhoff, Claudia, 480 Implementation phase in systems development life cycle (SDLC), 307, 313 Inbound logistics, 184 Incident record and management, 407 Inc magazine, 54 Income statements, 356 Inconsistency, in information, 99 Indiana University, 222 Industry-specific customer-facing processes, 42 Infographics, 140–142, 149–151, 170 Information See also Global information systems; Management information systems (MIS) infrastructures analytical, 98–99 in business systems, 13 cleansing of, 120–122 description and examples of, 10–11 dynamic, 108 enterprise resource planning (ERP) sharing of, 209–210 ethics related to, 72–74 extraction, transformation, and loading (ETL) of, 119, 123 format of, 97–98 governance of, 102 granularity of, 97–98 level of, 97–98 privacy of, 439–440 quality of, 99–102, 122 standardizing, 118, 121 static, 108 www.freebookslides.com timeliness of, 98–99 time-series, 139 transactional, 98–99 vandalism of, 271 Information architecture, 258 Information management information systems (MIS) infrastructures, 401–407 Information of Everything (IoE), 507 Information reach, 242 Information richness, 242 Information security, 428–437 overview, 75–79 people as first line of defense, 428–429 policies and plan for, 428–429 technology as second line of defense, 429–434 Information silos, 14–15 Information Systems Audit and Control Association (ISACA), 493 Information technology See also Database management system (DBMS) big data, 3–5 business intelligence, 11–12 data, 8–10 facts, 7–8 information, 10–11 knowledge, 12–13 overview, in supply chain management, 181–183 systems thinking, 14–19 text format, Information Technology Infrastructure Library (ITIL), 494 Infosys (India), 336 Infrastructure as a Service (IaaS), 473–474 Ingram Micro, 484 Innovation, 239–251 disruptive versus sustaining technology, 239–240 ebusiness advantages, 242–247 IBM Watson, 248 Internet and World Wide Web as disruptive technology, 241–242 Web 1.0 as ebusiness catalyst, 242 Innovator’s Dilemma (Christensen), 240, 250 Inovant, 439 Input and output devices, 389–391 Insiders, in information security, 428 In-sourcing (in-house development), 336 Instant messaging, 257 Institute for Citizen-Centered Service (ICCS), 492 Institute for Public Administration in Canada (IPCA), 492 Institute of Electrical and Electronics Engineers (IEEE), 280 Intangible benefits, 330 Integrated supply chain, 182–183 Integrating data, 110–111 Integration, ERP tools for, 209, 211–212 Integration testing, 313 Integrity of information, 99 Integrity of relational databases, 107 Intel, Inc., 238, 292, 394, 421, 460 Intellectual capital, 12 Intellectual property, 72 Intelligent agents, 173–175 Intelligent Solutions, Inc., 480 Intelligent systems, 172 Interactivity, 245 Intermediaries, in sales, 244 Internal rate of return (IRR), 63, 357 International Data Corporation (IDC), 36 International Organization for Standardization (ISO) quality standards, 456 Internet See also Global information systems business changes from, 490–491 buyer power enhanced by, 27 censorship of, 440 as disruptive technology, 241–242 use policy for, 440 Internet Corporation for Assigned Names and Numbers (ICANN), 241 Internet Explorer browser (Microsoft Corp.),265 Internet layer, in TCP/IP, 421–422 Internet of Things (IoT) examples of, 85–86 Information of Everything (IoE) extension of, 507 machine-to-machine (M2M) communication in, 140 original description of, Internet protocol version (IPv6), 422 Internet service provider (ISP), 256 Interoperability, 321–323, 420 Introduction stage, in product life cycle, 363 Intrusion detection software (IDS), 434 Intuit, Inc., 258 Inventory management and control systems, 452, 454 Inventory turnover, 182–183, 185 IoT (Internet of Things) See Internet of Things (IoT) IPCA (Institute for Public Administration in Canada), 492 iRobot Remote Presence Virtual + Independent Telemedicine Assistant (RPVITA), 258 IRR (internal rate of return), 63, 357 ISACA (Information Systems Audit and Control Association), 493 ISO (Internet service provider), 256 ISO 900 quality standards, 456 ISO 14000 quality standards, 456 ISO (International Organization for Standardization) quality standards, 456 IT consumerization, 285 Iterative development methodology, 319 ITIL (Information Technology Infrastructure Library), 494 iTunes.com, 243 J Jackson, Warren, 299 JAD (joint-application development), 308 James, Josh, 69 Jennings, Ken, 248 Jeopardy! (television show), 178, 248 JetBlue Airlines, 18, 232, 250 Jitis, Eleanor, 354 Jobs, Steve, 23–24, 91, 292, 317 John Deere Harvester Works, 456 Johnson, Derek, 92 Johnson, Trevor, 297 JoinAfrica, 299–300 Joint-application development (JAD), 308 Jordan, Chris, 148 Judicial Conference of the United States, 73 K Kalanick, Travis, 297 Kaplan, Robert, 64–65 Kayak.com, 299 Kelkoo.com, 244 Kennedy, John F., 271 Kennedy, Robert F., 271 Keyless entry systems, 437 Key performance indicators (KPIs), 59–60, 62, 170, 375 Kia Motor Co., 90 Kiva micro-lending organization, 277 Kiva Mobile Fulfillment System, 189, 193 K-Mart, Inc., 219 Knight, Philip, 306 Knowledge, 12–13 Knowledge-dependency, increase in, 504–505 Knowledge management system (KMS), 265–266 Koblin, Aaron, 148 Kodak, Inc., 298, 447 Kor Ecologic, 228 Index  * I-9 www.freebookslides.com KPIs (key performance indicators), 59–60, 62, 170, 375 KPMG, Inc., 227 Kroger Co., Inc., 191 L LaChappelle, Easton, 228 Lady Gaga, Lamon, Pam, 291 Land’s End, 119–120 LANs (local area networks) See Local area networks (LANs) Latency of data, 107 Latitude information, GPS for, 287 LBS (location-based services), 288–289 Leading Edge Forum, 496 Learning, on balanced scorecard, 66 Legacy software systems, 306 Legacy systems, 217 LEGOs, 228 Lending Tree, 243 LendingTree.com, 491 Leno, Jay, 228 Level of information, 97–98 Levie, Aaron, 477 Levi Strauss, Inc., 244 Levitt, Steven D., 82, 91, 317 Liabilities, on balance sheets, 356 Library of Congress, 143 Licenses, for software, 395 LifeLock, Inc., 93, 436 Lifelong Kindergarten Group, Media Lab (Massachusetts Institute of Technology), 325 Limited liability corporations (LLC), 353 Limited partnerships, 353 LinkedIn.com, 442, 446 Linux operating system, 394 List generators, 195, 197 LLC (limited liability corporations), 353 Local area networks (LANs) description of, 416–418 Ethernet technology for, 420–421 wireless, 280–281 Location-based services (LBS), for GPS and GIS, 288–289 Locussol, Virgini, 495 Logical view of information, 106 Logic errors, 315 Logistics description of, 184 drones to support, 185–188 radio frequency identification (RFID) to support, 185–187 Longitude information, GPS for, 287 I-10  * Index Long tail, of sales curve, 244 Long Tail: Why the Future of Business Is Selling Less of More, The (Anderson), 250, 317 Lookout antitheft app, 291 Loopt.com, 289 Loose coupling, in service-oriented architecture, 322–323 Losses, 352 Low-quality information, 100–101, 120 Loyalty programs, 27, 191 Lutz, Bob, 269 M Machine-generated data, Machine learning, 172, 507 Machine-to-machine (M2M) communication, 8, 140 Machine vision, 173 Machine vision resolution, 173 Machine vision sensitivity, 173 Mac OS X operating system, 394 Madoff, Bernard, 91 MagicBand (Walt Disney Company), 289 Magnetic medium secondary computer storage, 389 Mahindra Satyam (India), 336 Mail bomb, 441 MailChimp.com, 470 Maintainability of systems, 409 Maintenance phase in systems development life cycle (SDLC), 307, 314 Maker movement, 186 Malcolm Baldrige National Quality Awards, 456 Malicious code, 79 Malware, 77, 87 MAM (mobile application management), 285 Management data-driven decision, 124 of digital rights, 72 identity, 107–108 information quality, 122 Management information systems (MIS) infrastructures See also Global information systems; Sustainable management information system (MIS) infrastructures agile, 401, 407–410 description of, 364–365 information, 401–407 in operations management, 453–455 solid, 400–401 sustainable, 401 Managerial business processes, 373–375 Managerial decisions, 164–166 Managerial support systems, 166–168 MANs (metropolitan area networks), 281–282, 417–418 Manual computer input devices, 390 Manufacturers Bank, 357 Manufacturing business processes, 42 Manugistics, Inc., 221 Marconi, Guglielmo, 279 Market basket analysis, 136–137 Marketing ebusiness segmentation in, 258 operational CRM and, 195–196, 198 segmentation in, 361–363 Marketing communications, 361 Marketing mix, 361–362 Market share, 359–361 Markovich, Ray, 296 Mashups, 270–272 Mashup WYSIWYG tools, 270 Mass customization, 243 Mass text messaging, 92 MasterCard International, 174, 483 Master data management (MDM), 102 Matera, Alison, 348 Materials management description of, 184–185 ERP components for, 214 robotics to support, 185, 188–189 Materials requirement planning (MRP) systems, 454 Maturity stage, in product life cycle, 363 Mbusiness, 273–274 McAfee Security, 474 McCain, John, 112 McDonalds, Inc., 184, 198, 250, 300, 488, 491 MDM (master data management), 102 Measurement of ERP success, 216 Media Lab, MIT (Massachusetts Institute of Technology), 70, 325, 392 Megabytes, storage capacity in, 388 Megahertz (MHz), as CPU cycles per second measure, 385 Memory cards, 388 Memory sticks, 388 Mercedes-Benz Motor Co., 90 Metadata, 103 Meta Group, 216 Metrics for measuring success, 59–63 for strategic initiatives, 63–66 Metropolitan area networks (MANs), 281–282, 417–418 www.freebookslides.com Microblogging, 269–270 Microprocessor (central processing unit), 385–387 Microsoft Corp., 7, 21, 77, 265, 270, 277, 317, 340, 394, 466–467, 469, 471 Microsoft Office Excel software, 165 Microsoft Windows operating system, 394 Middleware software for integration, 211 MIMO (multiple-in/multiple-out) technology for wireless access points (WAPs), 280 Ming, Jenny, 361 Ministry of Defense (MOD, UK), 110 MIS Governance Institute, 493 MIS skills gap, 58 MIT (Massachusetts Institute of Technology), 8, 12, 22, 70, 228, 325, 392 MIT Center for Digital Business, 124 M&M’s, 243 Mobile application management (MAM), 285 Mobile business, 273–274 Mobile devices, 279, 285, 384 See also Wireless technology MOD (Ministry of Defense, UK), 110 Modeling agent-based, 175 business processes, 368–371 in MIS support systems, 165 Modems, for Internet access, 392 Modern Meadow, 228 Module software design, in ERP, 50 Moët et Chandon, 484 Monitoring trends, 502 Moo.com, 470 Moore, Gordon, 460 Moore’s law, 229, 331, 412, 460–461 Mosaic browser, for WWW, 391 Motorola, Inc., 282, 298 Mozilla Firefox, 77 Mozilla Thunderbird email software, 264 Mozy.com, 218, 470 MRP (materials requirement planning) systems, 454 MS-DOS operating system, 394 M2M (machine-to-machine) communication, 8, 140 Mulcahy, Anne, 92 Multiagent systems, 175 Multifactor authentication, 432 Multiple-in/multiple-out (MIMO) technology for wireless access points (WAPs), 280 Multitasking, operating system software to support, 394 Multi-tenancy, in cloud computing, 469 Murray, Bill, 327 Mutation, in genetic algorithms, 174 Myspace.com, 206 My Starbucks Idea, 269 N Nakamoto, Satoshi, 95 Nao robots, 509 Napster online service, 23, 419, 491 Nasty Gal Co., 262 National Aeronautics and Space Administration (NASA), 285 National chief technology officer (CTO), 58 National Institute of Standards and Technology (NIST), 217, 432, 468 National Science Foundation, 299 National Weather Service, 299 Native advertising, 265 Nature Conservancy, 476–477 NBC, 69 Nearshore outsourcing, 336 Neeleman, David, 232 Negroponte, Nicholas, 70 Neiman Marcus, 30 Nestlé, 101 Netflix, 7–8, 135, 142, 145, 231, 243–244, 265, 293, 445 Netflix Prize, 154 Net income, on income statements, 356 Net neutrality, 293 Netscape browser, 391 Network behavior analysis, 434 Network effect, 270 Network interface card (NIC), 417 Network interface layer, in TCP/IP, 421–422 Network operating system (NOS), 419 Networks and telecommunication, 416–427 architecture of, 417–419 international issues in, 495 media for signal carrying for, 423–424 overview, 400, 416–417 protocols for, 419–422 topology of, 419–420 Network virtualization, 465 Netzero.net, 256 Neural networks, 173–174, 312 Newcastle University (UK), 89 New entrants, threat of, 28–29 News Dots data visualization, 146 New York Public Library, 128 New York Times, 148 NextEngine 3D scanner, 228 NIC (network interface card), 417 Nice Systems, 206 NIIT (India), 336 Nike, Inc., 219, 221, 306 94Fifty Smart Sensor, 291 NIST (National Institute of Standards and Technology), 217, 432, 468 Nixon, Richard M., 146 Noisy neighbor effect, in cloud computing, 469 Nokia, 298 Nonrepudiation, in ebusiness, 440 Nonsensitive personally identifiable information (PII), 432–433 Nonvolatile read-only memory (ROM), in computers, 388 Noodles & Company, 125–126 Nordstrom, Inc., 358 Norton, David, 64–65 NOS (network operating system), 419 Not for profit corporations, 353 NPR (National Public Radio), 487 O Obama, Barack, 58, 112–113, 128, 146 Object-oriented languages, 311 Objet Connex 500 multimaterial 3D printer, 228 O’Brian, Conan, 82 OECD (Organisation for Economic Cooperation and Development), 440 Offshore outsourcing, 336 Off-the-shelf application software, 306 OLAP (online analytical processing), 167 Old Navy, a division of Gap, Inc., 361 OLTP (online transactional processing), 165 Olympic Games, 69, 447 OM (operations management) See Operations management (OM) O’Marah, Kevin, 450 Omniture, 69 One Laptop per Child project (Negroponte), 70 Online analytical processing (OLAP), 167 Online Privacy Protection Act of 2003 (California), 498 Online training, 313 Online transactional processing (OLTP), 165 On-premise ERP, 217, 219 Onshore outsourcing, 336 Oooooc.com, 251 Open sourcing, 264–265 OpenTable.com, 296 Operating system software, 394–395 Operational business intelligence, 480–482 Operational customer relationship management, 195–200 Operational databases, 117–118 Operational decisions, 163–164, 166 Index  * I-11 www.freebookslides.com Operationalized analytics, 372 Operational planning and control (OP&C), 454 Operational support systems, 165–166 Operations, streamlining See Systems development life cycle (SDLC) Operations management (OM), 450–459 competitive strategy in, 455–457 estimating international costs of, 496 fundamentals of, 450–453 MIS role in, 453–455 overview, 450 supply chain and, 457 Opportunity management CRM systems, 199–200 Optical medium secondary computer storage, 389 Optimization analysis, 167 Optimization model, for predictions, 139 Opting in or out of receiving emails, 441 Oracle, Inc., 120 Organisation for Economic Co-operation and Development (OECD), 440 Organizational projects See Project management Organizational structures, 72–93 hackers, 87–88 identity theft, 80 information security, 75–79 Internet of Things, 85–86 Porter’s three generic strategies, 90 Outbound logistics, 184 Outliers, anomaly detection for, 140 Output and input devices, 389–391 Outright.com, 470 Outsourcing projects, 336–337, 499, 501 Owens & Minor, 484 Owner’s equity, on balance sheets, 356 Oxford University, 128, 159 Oxman, Neri, 228 P PaaS (Platform as a Service), 474 PacifiCorp, 413 Packet-switching, in networks, 419 Packet tampering, 79 PA Consulting, 487 Page, Larry, 317 Paid search, as targeted advertising, 254 Palmer, Shelly, 159 Palmer Group, 159 Pandora online music company, 292 PANs (personal area networks), 279–280 Pantelligent, 86 Paradigm shift, 242 Parallel implementation, in SDLC, 313 I-12  * Index Parallel processing by computers, 391 Parsons, Joey, 203 Partner relationship management, 202–203 Partnerships, 353, 355 Partnerships, collaborative, 264–278 business 2.0 tools for, 269–271 case study on, 274 challenges of, 271 content, user-contributed, 265 content sharing through open sourcing, 264–265 networking communities with business 2.0, 267–268 organization-based, 265–266 outside organization, 266–267 Web 3.0, 272–274 Passive RFID tags, 286 Password construction guidelines, in information security, 429 Password protection policy, in information security, 429 Passwords, 87, 431 Patents, 72 Pattern recognition analysis, 140 Payback method, 63 Payless Shoes Stores, Inc., 30 PayPal, 95, 228 Pay-per-call revenue generation, 254 Pay-per-click revenue generation, 254 Pay-per-conversation revenue generation, 254 PC Magazine, 229 PC World, 82 Peer-to-peer (P2P) networks, 418–419 Peninsular and Oriental Steam Navigation Co (P&O), 232 PeopleSoft ERP components, 214 Performance, 106–107, 410 Personal area networks (PANs), 279–280 Personal information management (PIM) software applications provided by, 395 business processes and, 40–43 for decision making, 165–170 to overcome siloing, 15–17 roles and responsibilities in, 56–58 Personal Information Protection and Electronic Document Act (PIPEDA, Canada), 498–499 Personalization, 244 Personally identifiable information (PII), 432–433 PERT (Program Evaluation and Review Technique) charts, in project management, 334–335 Petabyte of data, 130 Petraeus, David, 91 Pfizer, Inc., 496 Pharming attacks, 430 Phased implementation, in SDLC, 313 Phishing, 88, 430–431 Physical security, 442 Physical view of information, 106 Picasa.com, 470 Pie charts, 170–171 PII (personally identifiable information), 432–433 Pilot implementation, in SDLC, 313 PIM (personal information management) software See Personal information management (PIM) software PIPEDA (Personal Information Protection and Electronic Document Act, Canada), 498–499 Pirated software, 72 Pivot, by digital dashboards, 172 Pixie Scientific, 85 PKE (public key encryption), 433 Plagiarism, 271 Planning primary diagrams in project management, 333–335 project, 308 supply chain, 183 as systems development life cycle (SDLC) phase, 307–308 Platform as a Service (PaaS), 474 Playnix Toys, 352 Plunge implementation, in SDLC, 313 PMI (Project Management Institute), 308, 332–333 Podcasting, 257 Polaroid, Inc., 27, 239 Political business challenges, 491–492 Polymorphic viruses and worms, 78 Population trends, 503–504 Porsche Motor Co., 108 Portability of applications, 409 Porter, Michael, 26, 31, 33–34, 36, 91 Porter’s Five Forces Model, 26–29, 32, 162, 239 Porter’s three generic strategies, 29–30, 32, 90 Predicting technologies, 48–49, 138–139 Predictive analytics, 12–13 Prescriptive analytics, 12–13 Pretexting, 428 Preventive maintenance, in SDLC, 313 Priceline.com, 253 Prices, supplier power to influence, 27 Primary keys, in relational databases, 103–104 www.freebookslides.com Primary planning diagrams in project management, 333–335 Primary storage, in computers, 386–388 Primary value activities, in value chain, 31–32 Princeton University, 228 Print Library Project (Google), 128 Print-on-demand capabilities, 243 Privacy Canadian regulations on, 498–499 definition of, 72 of email, 440–441 European Union regulations on, 497–498 in global information systems, 496–497 of information, 439–440 Rule 41 amendment and, 73 United States regulations on, 498 Privacy Act of 1983 (Canada), 498–499 Private cloud, 471–472 Privilege escalation network intrusion attack, 432 PR Newswire, 149 Process modeling, 309 Procter & Gamble (P&G), 8, 44–45, 231 Procurement, 183–186 Production, defined, 16 Production ERP components, 214 Production management, 450 Production operations, 363–364 Productivity, 16–17, 62 Product life cycle, 363 Products, threat of substitute, 27–29 Profiling of data, 134–135 Profits, 352 Program Evaluation and Review Technique (PERT) charts, in project management, 334–335 Programming languages, 310–312 Progressive insurance, 364, 377 Projections of trends, 502 Project management, 329–352 See also Systems development life cycle (SDLC) business requirements case study, 343–344 definition of, 59, 308 Denver International Airport case study, 338 outsourcing projects, 336–337 primary planning diagrams in, 333–335 project tracking case study, 344–346 reasons for failure of, 330–333 Project Management Body of Knowledge (PMBOK, Project Management Institute), 333 Project Management Institute (PMI), 308, 332–333 Protocols for networks and telecommunication, 417, 419–422 Prototypes, 3D printing and, 186 Prototyping software development methodology, 319 Psychographic segmentation of markets, 362 P2P (peer-to-peer) networks, 418–419 Public cloud, 471–472 Public key encryption (PKE), 433 Pure-play (virtual) business form, 253 ”Purple squirrels,” 58 Q Quality, 455–456 Quality assurance, 452 Quality of information, 99–102, 122 Query-by-example (QBE) tools, 102 Quickbooks.intuit.com, 470 R Rackspace, Inc., 203, 205 Radio frequency identification (RFID) in Disney MagicBand, 289 logistics supported by, 185–187 in retail supply chain, 188 RFID accelerometer, 286 RFID electronic product code (RFID EPC), 187 RFID interrogator, 286 as wireless network application, 286–287 Radiotelephone systems, 279 RAD (rapid application development) methodology, 319–320 Random access memory (RAM), in computers, 386–387 Ransomware, 78, 88 Rapid application development (RAD) methodology, 319–320 Rational unified process (RUP) methodology, 320–321 Read-only memory (ROM), in computers, 388 Real simple syndication (RSS) feeds, 270 Real-time adaptive security, 508 Real-time communication, 257 Real-time information, 99 Real-time systems, 99 Recommendation engine, 135 Recording Industry Association of America, 447 Recycling ewaste, 461 Reding, Viviane, 445 Red Swoosh video-streaming, 297 Reduced instruction set computer (RISC) chips, 386 Redundancy, 107, 375 Regression model, 139 Regulations, 495, 497–499 Reidenberg, Joe, 73 Reintermediation, in ebusiness, 244 Reiser, Paul, 82 Relational database management system (DBMS) flexibility of, 106 integrity of, 107 overview, 102–105 performance of, 106–107 redundancy reduced with, 107 scalability of, 106–107 security of, 107–108 Relational integrity constraints, 107 Reliability of systems, 409–410 RentACoder.com, 501 Replication of data, 134–135 Reporters Without Borders, 495 Reporting CRM technologies for, 48–49 definition of, 10 in systems development life cycle, 314 Repositories of information, 111, 117–118, 123 Reputation system of user-generated content, 265 Requirements definition document, in SDLC analysis, 308 Requirements management, in SDLC analysis, 308 Return on investment (ROI), 60, 63, 357 Reuters, 486 Revenue, on income statements, 356 Revenue-generating ebusiness strategies, 253–255 RFID (radio frequency identification) See Radio frequency identification (RFID) RFID accelerometer, 286 RFID electronic product code (RFID EPC), 187 RFID interrogator, 286 Ring network topology, 420 RISC (reduced instruction set computer) chips, 386 Rivalry among existing competitors, 28–29 Robotic process automation (RPA), 374 Robotics human employment and, 159–160 materials management supported by, 185, 188–189 Nao robots, 509 telepresence, 204 Index  * I-13 www.freebookslides.com RobotLAB, 509–510 ROI (return on investment), 60, 63, 357 ROM (read-only memory), in computers, 388 Romm, Joseph, 67 Routers, for networking, 417, 419 Rowdil.com, 251 RPA (robotic process automation), 374 RP-VITA (iRobot Remote Presence Virtual + Independent Telemedicine Assistant), 258 RSS (real simple syndication) feeds, 270 Ruby receptionists, 206 Rule 41, in U.S Federal Rules of Criminal Procedure, 72–73 Runtime errors, 315 RUP (rational unified process) methodology, 320–321 R.U.R (Rossum’s Universal Robots, by Capek), 188 Rutter, Brad, 248 S SaaS (Security as a Service), 474 SaaS (Software as a Service), 218–220, 473–474 SABRE Airline Solutions, 417 ”Safe harbor” program, for data privacy, 498 Safe mode, utility software for, 395 Safeway Co., Inc., 191 Sales analytics on, 48 business processes for, 42 corporate departments for, 359–361 operational customer relationship management and, 198–200 Sales force automation (SFA), 199 Salesforce.com, 474 Sales management CRM systems, 199 San Francisco Cab Drivers Association, 297 Santa Clara University School of Law, 276 SAP, 221–222 Sarbanes-Oxley Act of 2002, 102 SAS, 120 SBUs (strategic business units), 454 Scalability, 106–107, 410 Scareware, 78–79 SCEM (supply chain event management), 190 Scheduler.com, 250 Scheduling, 452 Schrenker, Marcus, 347 Schwartz, Jonathan, 269 SCM (supply chain management) See Supply chain management (SCM) I-14  * Index Scope of projects, 308, 332–333 Scratch programming language, 325 Scripting languages, 311 Scrubbing information, 120–122 Scrum methodology, 320–321 SDLC (systems development life cycle See Systems development life cycle (SDLC) Search engine optimization (SEO), 254 Search engine ranking, 254 Sears, Inc., 240, 358 Seattle Aquarium, 291 Secondary storage, in computers, 388–389 Second Life virtual world, 486 Secrecy, in information security, 429 Security, 8, 107–108 See also Information security Security as a Service (SaaS), 474 Security response plan policy, in information security, 429 Segmentation customer, 49, 201 ebusiness market, 258 low-cost market, 455 market, 361–363 Seigenthaler, John, Sr., 271 Selfies, 269 Self-publishing, 243 Selling chain management, 190 Semantic web, 272–273 Semi-passive RFID tags, 286 Semistructured decisions, 165–167 Sensitive personally identifiable information (PII), 432–433 Sensitivity analysis, 167 SEO (search engine optimization), 254 Server networks, 400 Server virtualization, 465 Service, 457 Serviceability of systems, 410 Service-oriented architecture (SOA), 321–325 Services, definition of, 16 SFA (sales force automation), 199 ”Shared value” framework (Porter), 33 Shareholders, in corporations, 353 SharePoint software (Microsoft Corp.), 340–341 Shaw, Danny, 58 Shipping, purchasing, and inventory control business processes, 42 Shopping bots, 174–175 Siebel AG, 221 Sign-off (approval of business requirements), 308 Silva, Ken, 496 Simple Mail Transfer Protocol (SMTP), 422 Simple network management protocol (SNMP), 422 Sinbad, 82 Single-factor authentication, 432 Single-tenancy, in cloud computing, 469 Six Flags, 176 Six sigma quality level, 455 Skype.com, 204, 470 Slack, in project management, 334 Slack.com, 237, 295–296 Slate, 146 Slice-and-dice, by digital dashboards, 172 Sloan School of Management, MIT (Massachusetts Institute of Technology), 12 Smart cards, for authentication, 431–432 SMART criteria for objectives, 334 Smart grids, 463–464 Smart machines, 507 Smartphones, 4, 283 Smith, Dylan, 477 Smith, Fred, 187 SMTP (Simple Mail Transfer Protocol), 422 SmugMug.com, 470 SNA (social networking analysis), 267 Snackable content, 269 Snapshot view of data, Sniffer programs, 79 SNMP (simple network management protocol), 422 SOA (service-oriented architecture), 321–325 Social bookmarking, 268 Social engineering, 88, 428 Social graph, 267 Social issues, business solutions to, 33 Socializr.com, 251 Social media analysis of, 140 description of, 267 ethics in policy on, 441–442 managers for, 442 monitoring of, 442 Social networking, 267, 269 Social networking analysis (SNA), 267 Social tagging, 268 Socialtext.com, 298 Society, knowledge-dependency of, 504–505 Sock puppet marketing, 430 Soden, Michael, 442 Software See also Enterprise resource planning (ERP); Systems development life cycle (SDLC) application, 395 development methodologies for, 318–321 www.freebookslides.com distributing application, 395–396 ERP customization of, 216 on network, 400 systems, 394–395 updating and upgrading, 395 Software as a Service (SaaS), 218–220, 473–474 Software engineering, 309–310 Software Engineering Institute, Carnegie Mellon University, 494 Sole proprietorships, 353, 355 Solid state drive, as secondary computer storage, 389 Solvency, 356 Solving the Ewaste Problem (StEP) Initiative, 475 Sony, Inc., 193, 239, 290, 292, 298 Source code, 264 Source data, 123 Source documents, for transaction processing system (TPS), 166 Southwest Airlines, 250 Spam, 441 Spam blogs, 79 Sparkline, 170–171 Spatial data, in GIS, 288 Spear phishing, 430 Speech analysis, 140 Spoofing, 79 Spotlight Analysis, Inc., 112–113 Spyware, 78–79 SQL (structured query language), 102 Stakeholders, 23–24, 334 Stalk, George, 456 Stamps.com, 92 Standardizing information, 118, 121 Stanford University, 128, 143, 222 Stang, Jeff, 43 Staples Office Stores, 189, 193 Starbucks, Inc., 91, 262, 269, 444 Star network topology, 420 Statement of cash flows, 357 Statement of owner’s equity, 356 Static business processes, 39 Static information, 108 Static reports, 10 StEP (Solving the Ewaste Problem) Initiative, 475 Stolte, Chris, 143 Storage hardware, 386–389 Storage virtualization, 465 Strategic business intelligence, 480–481 Strategic business units (SBUs), 454 Strategic decisions, 164–166 Strategic initiatives manipulating data, 67 measuring success of, 59–63 metrics for, 63–66 MIS roles and responsibilities in, 56–58 Strategic planning, 454 Stratsys Co., 228 Streaming data, 283 Streamlining operations See Systems development life cycle (SDLC) Strengths, weaknesses, opportunities, and threats (SWOT) analysis, 25–26 Strong AI machines, 172 Structured data, 8, 132 Structured decisions, 163–164, 166 Structure decisions, 163–164 Structured query language (SQL), 102 StumbleUpon.com social bookmarking site, 268 Stylus, as computer input device, 389 Substitute products, threat of, 27–29 Suitable Technologies Beam+ telepresence robot, 258 Summit, Scott, 228 Sun Microsystems, 269 Super Bowl, advertising costs for, Supercomputers, 391–392 Superconductors, 505 Supplier power, 27–29, 44 Supplier relationship management, 202 Supply chain, 27 Supply chain event management (SCEM), 190 Supply chain management (SCM), 181–193 competitive advantage implement with, 43–46 drones to support logistics, 187–188 ERP integration with, 211–212, 215 extending, 189–190 failures of, 306 grocery store data collection and, 191 information technology role in, 181–183 metrics for, 64 operations management and, 450, 457 overview, 183–185 RFID to support logistics, 186–187 robotics to support materials management, 188–189 3D printing to support procurement, 185–186 Support value activities, in value chain, 31–32 Sustainable management information system (MIS) infrastructures, 460–479 cloud computing in, 468–473 environment and, 460–461 grid computing in, 462–464 overview, 401 utility computing in, 473–474 virtualized computing in, 464–468 Sustaining technology, disruptive technology versus, 239–240 Swim lane layout of business process models, 370 Swingbyte, 290 Switching costs, 26–27, 44 SWOT (strengths, weaknesses, opportunities, and threats) analysis, 25–26 Symantec, Inc., 298, 474 Synchronous communications, 267 Syntax errors, 315 System clock, utility software for, 395 System restore, utility software for, 395 Systems development life cycle (SDLC), 306–317 See also Project management; Software analysis phase in, 308–309 bug reports case study, 315 design phase in, 309–310 development phase in, 310–312 implementation phase in, 313 maintenance phase in, 314 overview, 306–307 planning phase in, 308 testing phase in, 312–313 Systems software, 394–395 Systems thinking feedback in, 17 MIS solution based on, 15–17 overview, 14–15 static and dynamic business processes differentiated by, 40 System testing, 313 System virtualization, 466 T Tableau software for big data, 143 Tacit knowledge, 266 Tactical business intelligence, 480–481 Tactical planning, 454 Tangible benefits, 330 Target marketing, 136–137 Target Stores, Inc., 36, 352 Tata Consultancy Services (India), 336 Tatango.com, 92 Taxation, ebusiness and, 259 Taxonomy, 258, 268 TaylorMade, 484 TCP/IP (transmission control protocol/Internet protocol) for telecommunications, 421–422 TDF (transborder data flows), 496–497 Index  * I-15 www.freebookslides.com Technology See also Disruptive technologies; Hardware; Software; Wireless technology changing, 331 CRM, 48–49 dependence on, 271 ethical challenges from, 72 human interaction with, 256 information security defended by, 429–434 innovation growth in, 506 international issues in, 495 society and economy affected by, 505 Technology recovery strategies, 407 TechTarget, 404, 406 TED (Technology, Entertainment, Design) conferences, 91, 317 Teergrubing anti-spamming approach, 441 Telecommunication See Networks and telecommunication Telegraph, wireless, 279 Telepresence robots, 204, 257–258 Telnet protocol, 422 Telstar satellite, 279 Terabytes, storage capacity in, 388 Terminator (film), 159 Testing phase in systems development life cycle (SDLC), 307, 312–313 Text analysis, 140 Thiel, Peter, 228 Threat of new entrants, 28–29 Threat of substitute products, 27–29 Threats, 439 3D printing advances in, 507 case study on, 227–229 procurement supported by, 185–186 Thunderbird email software (Mozilla), 264 Thurman, Howard, 328 TIBCO Software Company, 447 Tiffany & Co., 30 Time bombs (computer viruses), 432 Time constraints, 332–333, 506 Timeliness of information, 98–99 Time-series charts, 170–171 Time-series information, 139 Tipping Point, The (Gladwell), 317 T.J Maxx, Inc., 36, 253 T-Mobile, Inc., 298 To-be process models, 368–370 Toggl.com, 470 Tokens, for authentication, 431–432 Top Gear, 51 Torvalds, Linus, 394 Toyota Motor Co., 486 Toys ”R” Us, 231 I-16  * Index TPS (transaction processing system), 165–166, 168–169, 374 Tracking projects, 344–346 Trackur.com, 442 Training, in SDLC, 313 Transactional information, 98–99, 165 Transaction processing system (TPS), 165–166, 168–169, 374 Transactions, in business, 355–356 Transborder data flows (TDF), 496–497 Transformation process, 451 Transformation process (creating, reading, updating, and deleting), 166 Transforming corporations, 363–364 Transmission control protocol/ Internet protocol (TCP/IP) for telecommunications, 421–422 Transportation planning systems, 455 Transport layer, in TCP/IP, 421–422 Trek bicycle products, 43–44 Trends, 502–511 digital mesh, 506–507 economic integration, 505 IT reality, 508 knowledge-dependency growth, 504–505 longevity, 504 methods for assessing, 502–503 population growth, 503–504 smart machines, 507 technological impact on society and economy, 505 technological innovation, pace of, 506 time constraints, 506 Triple constraints (cost, time, and scope), 332–333 Trojan-horse viruses, 78 True Value Hardware, 481 TruServ, Inc., 481 Turner Industries, 212–213 Twisted-pair cable for network transmission media, 423 Twitter.com, 145, 155, 221, 237, 262, 270, 289, 441–442 Two-factor authentication, 432 Typosquatting, 440 Tzu, Sun, 122 U UAS (Unmanned Aircraft Systems) Registration Task Force Aviation Rulemaking Committee, FAA, 52 UAT (user acceptance testing), 313 Unified Communications as a Service (UCaaS), 474 Union Bank of California, 404 United Nations, 475 United States privacy regulations, 497–498 Unit testing, 313 University of Chicago, 82 University of Cincinnati, 82 University of Houston, 92 University of Massachusetts, 222 University of Michigan, 128 University of Minnesota, 276 University of Pennsylvania, 12, 299 University of Southern California, 298 UNIX operating system, 394 Unmanned Aircraft Systems (UAS) Registration Task Force Aviation Rulemaking Committee, FAA, 52 Unstructured data, 9, 132 Unstructured decisions, 165–166 Uplift modeling, in analytical CRM, 201 UPS, Inc., 453 Up-selling, 198 URL (universal resource locator), 241–242 URL shortening, 241 Usability, 410, 474 U.S Bureau of Labor Statistics, 146 U.S Department of Defense, 285, 287, 421 U.S Department of Defense Advanced Research Project Agency (DARPA), 241 U.S Environmental Protection Agency (EPA), 414, 477–478 User acceptance testing (UAT), 313 User documentation, 313 U.S Federal Rules of Criminal Procedure, 72–73 U.S Postal Service, 92 U.S Supreme Court, 193 Utility computing, 473–474 Utility software, 395 V VA (virtual assistant), 507 Validation of data, 102 Valleywag.com, 297 Value-added, OM to increase, 452 Value chain, 372 Value chain analysis, 30–32 Vandalism, information, 271 Variables, definition of, 10 Variety of big data, 131 Velocity of big data, 131 Veracity of big data, 131 VeriSign, 433, 496 Vertical privilege escalation network intrusion attack, 432 Videoconferencing, 27, 257 Video games, 303–304, 359 Virgin enterprises, 317 Virtual bank account, 95 www.freebookslides.com Virtual business form, 253 Virtualized computing, 132–133, 464–468 Virtual reality, 173, 175–176, 506 Virtual workplace, 175 Viruses, computer antivirus software to prevent, 433 overview, 77–78 protection against, 429 time bombs as, 432 Visa credit card systems, 95, 174, 439 Visibility of supply chain, 182–183 Visit metrics, for Websites, 247 Visitor metrics, for Websites, 247 Visualization of data benefits to business of, 148–149 elements of, 170–171 infographics, 140–142 Vitale, Adam, 91 Vitria Technology, Inc., 211 Voice over LTE (VoLTE), 283 Voiceprint, for authentication, 432 Volatility of RAM, in computers, 386 Volkswagen AG, 414, 477–478, 483–484 Volume, of big data, 131 Vulnerability awards, 76 Vulnerability of systems, 410 W WAI (Web accessibility initiative), 408 Wales, Jimmy, 82 Walgreens Stores, Inc., 186 Wall Street Journal, 343, 364 Walmart Stores, Inc., 9–10, 30, 44–45, 52, 62, 98–99, 183, 231–232, 245, 250, 352, 491 Walt Disney Company, 289 Walton, Sam, 231 WANs (wide area networks), 282–284, 417–418 WAPs (wireless access points), for LANs, 280 War chalking, 284 War driving, 284–285 Warm site, in disaster recovery plans, 403–404 Waste Management, Inc., 222 Waterfall software development methodology, 318–319 Watergate investigation, 146 Watson, Thomas, 89, 248 Weak AI machines, 172 Wearable data collection terminals, 285 Web accessibility initiative (WAI), 408 Web analysis, 140 Web-based self-service systems, 200 Web browsers, 241 Web-centric metrics, 63–64 Web conferencing, 257–258 Web 1.0, as ebusiness catalyst, 242 Web real-time communication (WebRTC), 257 Web services, 323 Websites analytics of, 274 bookmarks for, 268 customer power expressed on, 196 databases to drive, 108–109 ebusiness analytics of, 247 name stealing from, 440 personalization of, 201 traffic analytics for, 247 Web 2.0, 264–267, 410 Web 3.0, 272–274 Weiss, Noah, 295 Wendy’s restaurants, 488 WEP (wired equivalent privacy) encryption algorithm, 284 What-if analysis, 167 Wide area networks (WANs), 282–284, 417–418 Wi-Fi infrastructure, 280 Wi-Fi protected access (WPA) wireless security protocol, 284 WikiLeaks, 434 Wikipedia.com, 82, 265, 270, 276, 298, 409 Wikis, 270 Wilburn, Randy and Nicola, 501 WiMAX (Worldwide Interoperability for Microwave Access), 281–282 Windows Azure, 471 Windows Live, 218 Wipro (India), 336 Wired equivalent privacy (WEP) encryption algorithm, 284 Wired magazine, 229, 244, 317 Wireless access points (WAPs), for LANs, 280 Wireless fidelity (Wi-Fi), 280 Wireless LANs, 280–281 Wireless MANs, 281–282 Wireless media for networks and telecommunication, 424 Wireless network topology, 420 Wireless-N standard, 280–281 Wireless technology, 279–301 business applications of, 285–289 case studies on, 289, 295–297 mobile device management, 285 overview, 279 personal area networks (PANs), 279–280 protecting, 284–285 wireless LANs, 280–281 wireless MANs, 281–282 wireless WAN cellular communication system, 282–283, 285 wireless WAN satellite communication system, 283–284 Wire media for networks and telecommunication, 423–424 Woodward, Bob, 146 Workers, knowledge, 12 Workflow control systems, 372 Workplace monitoring, 442–443 Workshop training, 313 World Future Society, 503 World is Flat, The (Friedman), 18–19 Worldwide Interoperability for Microwave Access (WiMAX), 281–282 World Wide Web, as disruptive technology, 241–242 World Wide Web Consortium (W3C), 241, 408 Worms, 78 Worthen, Ben, 357 WPA (Wi-Fi protected access) wireless security protocol, 284 WYSIWYG tools, 270 X Xanga.com, 498 Xcel Energy, 464 Xerox, Inc., 92, 240, 420–421 XML (Extensible Markup Language), 323 XP (extreme programming) methodology, 319–321 X Prize Foundation, 317 Y Yahoo!.com, 270, 272, 430, 467 Yale University, 412 Yelp.com, 233 Ylvis band, 263 Yourdon, Edward, 341 YouTube.com, 4, 83, 131, 195, 206, 232–233, 263, 265, 267, 293, 441–442 Yuuguu.com, 251 Z Zappos.com, 7–8, 108–109, 189, 193 Zepp sensor, 291 Ziff-Davis, 298 Zip codes, in cluster analysis, 136–137 Zoetrope project, 148 Zombie attacks, 430 Zoomr.com, 251 Zuckerberg, Mark, Index  * I-17 www.freebookslides.com www.freebookslides.com www.freebookslides.com .. .Business Driven Technology EIGHTH EDITION Paige Baltzan Daniels College of Business University of Denver BUSINESS DRIVEN TECHNOLOGY, EIGHTH EDITION Published by McGraw-Hill Education,... Contributions By Business Driven Technology U N I T Achieving Business Success What’s in IT for Me? This unit sets the stage for diving into Business Driven Technology It starts from the ground floor by. .. Microsoft Project xii  *  The Technology Plug-Ins PREFACE Unlike any other MIS text, Business Driven Technology, 8e, discusses various business initiatives first and how technology supports those

Ngày đăng: 18/03/2021, 17:28

TỪ KHÓA LIÊN QUAN

w