Page 575 - Using MIS
P. 575

Glossary     543

            Honeypots  False targets for computer criminals to attack. To   industries. Such solutions save time and lower risk. The
              an intruder, a honeypot looks like a particularly valuable re-  development  of  industry-specific  solutions  spurred  ERP
              source, such as an unprotected Web site, but in actuality the   growth. 272
              only site content is a program that determines the attacker’s   Influencer  An individual in a social network whose opinion
              IP address.  415                                      can force a change in others’ behavior and beliefs.  305
            Hop  In an internet, the movement from one network to   Information  (1) Knowledge derived from data, where data is
              another. 217                                          defined as recorded facts or figures; (2) data presented in a
            Horizontal-market application  Software that provides   meaningful context; (3) data processed by summing, order-
                capabilities common across all organizations and indus-  ing, averaging, grouping, comparing, or other similar oper-
              tries; examples  include word processors,  graphics pro-  ations; (4) a difference that makes a difference. Information
              grams, spreadsheets, and presentation programs.  131  exists only in the minds of humans.  17
            Host operating system  In virtualization, the operating sys-  Information silo  A condition that exists when data are iso-
              tem that hosts the virtual operating systems.  129    lated in separated information systems.  257
            https  An indication that a Web browser is using the SSL/TLS   Information  system  (IS)  A group of hardware, software,
              protocol to provide secure communication.  405        data, procedure, and people components that interact to
                                                                    produce information.  11
            Human  capital  The investment in human knowledge and
              skills with the expectation of future gain.  302    Information technology (IT)  The products, methods, in-
                                                                    ventions, and standards that are used for the purpose of
            Human safeguards  Steps taken to protect against security
              threats by establishing appropriate procedures for users to   producing information.  16
              following during system use.  409                   Infrastructure as a service (IaaS)  The  cloud  hosting  of  a
                                                                    bare server computer or data storage.  227
            Hyper-social knowledge management  The application of
              social media and related applications for the management   Inherent processes  The  procedures  that  must  be  followed
              and delivery of organizational knowledge resources.  370  to effectively use licensed software. For example, the pro-
                                                                    cesses inherent in ERP systems assume that certain users
            Hypertext Transfer Protocol (http)  An  application-layer   will take specified actions in a particular order. In most
              protocol used between browsers and Web servers.  224
                                                                    cases, the organization must conform to the processes in-
            ICANN  (Internet  Corporation  for  Assigned  Names  and   herent in the software.  255
              Numbers)  The organization responsible for managing   Inter-enterprise information systems  Information systems
              the assignment of public IP addresses and domain names   that support one or more inter-enterprise processes.  255
              for use on the Internet. Each public IP address is unique
              across all computers on the Internet.  218          Internal firewalls  Firewalls that sit inside the organizational
                                                                    network. 406
            Identification  The process whereby an information system
              identifies a user by requiring the user to sign on with a user-  Internet  When spelled with a small i, as in internet, a private
              name and password.  401                               network of networks. When spelled with a capital I, as in
                                                                    Internet, the public internet known as the Internet.  214
            Identifier  An attribute (or group of attributes) whose value is
              associated with one and only one entity instance.  179  Internet of Things (IoT)  The idea that objects are becoming
                                                                    connected  to  the  Internet  so  they  can  interact  with  other
            IEEE 802.11 protocol  A standard for packaging and manag-    devices, applications, or services.  119
              ing traffic on wireless local area networks.  215
                                                                  Internet service provider (ISP)  An ISP provides users with
            IEEE 802.3 protocol  A standard for packaging and manag-  Internet  access.  An  ISP  provides  a  user  with  a  legitimate
              ing traffic on wired local area networks.  214        Internet address; it serves as the user’s gateway to the
            If/Then rules  Statements that specify that if a particular con-  Internet; and it passes communications back and forth
              dition exists, then a particular action should be taken. Used   between the user and the Internet. ISPs also pay for the
              in different ways, by both expert systems and decision tree   Internet. They collect money from their customers and pay
              data mining.  367                                     access fees and other charges on the users’ behalf.  216
            Implementation  In the context of the systems development   Intranet  A private internet (note small i) used within a cor-
              life cycle, the phase following the design phase consisting of   poration or other organization.  214
              tasks to build, test, and convert users to the new system.  475  Intrusion detection system (IDS)  A computer program that
            Industry-specific solutions  An ERP template that is designed   senses  when  another  computer  is  attempting  to  scan  the
              to serve the needs of companies or organizations in specific   disk or otherwise access a computer.  397
   570   571   572   573   574   575   576   577   578   579   580