Page 572 - Using MIS
P. 572
540 Glossary
Crow’s-foot diagram A type of entity-relationship diagram that Data storytelling A technique for presenting the results of
uses a crow’s foot symbol to designate a 1:N relationship. 181 business intelligence through an ordered sequence of steps,
Crowdsourcing The dynamic social media process of employ- each of which consists of an interactive dashboard. Like a
ing users to participate in product design or redesign. 301 PowerPoint presentation in which each slide is an interac-
tive data dashboard; the sequence tells a story of what the
Custom-developed software Software that is tailor-made for
a particular organization’s requirements. 131 data reveals. 364
Data triangulation See semantic security. 374
Customer life cycle Taken as a whole, the processes of mar-
keting, customer acquisition, relationship management, and Data warehouse A facility for managing an organization’s BI
loss/churn that must be managed by CRM systems. 262 data. 349
Customer relationship management (CRM) system A suite Database A self-describing collection of integrated records. 164
of applications, a database, and a set of inherent processes Database administration A person or department that de-
for managing all the interactions with the customer, from velops procedures and practices to ensure efficient and
lead generation to customer service. 262 orderly multiuser processing of the database, to control
Data Recorded facts or figures. One of the five fundamental changes to database structure, and to protect the data-
components of an information system. 11 base. 172, 409
Data acquisition In business intelligence systems, the pro- Database application A collection of forms, reports, queries,
cess of obtaining, cleaning, organizing, relating, and cata- and application programs that facilitates users’ processing
loging source data. 343 of a database. A database can be processed by many differ-
Data administration An organization-wide function that ent database applications. 173
develops and enforces data policies and standards. 409 Database management system (DBMS) A program for cre-
Data aggregator See data broker. 352 ating, processing, and administering a database. A DBMS
is a large and complex program that is licensed like an op-
Data broker Also called data aggregator; a company that
acquires and purchases consumer and other data from erating system. Microsoft Access and Oracle Database are
public records, retailers, Internet cookie vendors, social example DBMS products. 170
media trackers, and other sources and uses it to create Database tier In the three-tier architecture, the tier that runs
business intelligence that it sells to companies and the the DBMS and receives and processes requests to retrieve
government. 352 and store data. 220
Data flow A BPMN symbol that documents the movement DB2 A popular, enterprise-class DBMS product licensed by
of data among activities and repositories in a business IBM. 170
process. 461 Decision support systems Some authors define business
Data integrity problem In a database, the situation that ex- intelligence (BI) systems as supporting decision making
ists when data item values disagree with one another. An only, in which case they use this older term as a synonym
example is two different names for the same customer. 183 for decision-making BI systems. 341
Data integrity In a database or a collection of databases, the Decision tree A hierarchical arrangement of criteria that
condition that exists when data values are consistent and in predict a classification or a value. 362
agreement with one another. 258 Deliverables Work products that are the result of the com-
Data mart A data collection, smaller than a data warehouse, pletion of tasks in a development project. 477
that addresses the needs of a particular department or func- Denial of service (DoS) Security problem in which users
tional area of a business. 354 are not able to access an information system; can be caused
Data mining The application of statistical techniques to find by human errors, natural disaster, or malicious activity.
patterns and relationships among data for classification 394
and prediction. 359 Desktop virtualization Also called client virtualization and
Data model A logical representation of the data in a data- PC virtualization. The process of storing a user’s desktop on
base that describes the data and relationships that will be a remote server. It enables users to run their desktop from
stored in the database. Akin to a blueprint. 179 many different client computers. 130
Data safeguards Measures used to protect databases and Digital subscriber line (DSL) A communications line that
other data assets from threats. Includes data rights and re- operates on the same lines as voice telephones, but does so
sponsibilities, encryptions, backup and recovery, and phys- in such a manner that its signals to not interfere with voice
ical security. 409 telephone service. 216