Page 575 - Using MIS
P. 575
Glossary 543
Honeypots False targets for computer criminals to attack. To industries. Such solutions save time and lower risk. The
an intruder, a honeypot looks like a particularly valuable re- development of industry-specific solutions spurred ERP
source, such as an unprotected Web site, but in actuality the growth. 272
only site content is a program that determines the attacker’s Influencer An individual in a social network whose opinion
IP address. 415 can force a change in others’ behavior and beliefs. 305
Hop In an internet, the movement from one network to Information (1) Knowledge derived from data, where data is
another. 217 defined as recorded facts or figures; (2) data presented in a
Horizontal-market application Software that provides meaningful context; (3) data processed by summing, order-
capabilities common across all organizations and indus- ing, averaging, grouping, comparing, or other similar oper-
tries; examples include word processors, graphics pro- ations; (4) a difference that makes a difference. Information
grams, spreadsheets, and presentation programs. 131 exists only in the minds of humans. 17
Host operating system In virtualization, the operating sys- Information silo A condition that exists when data are iso-
tem that hosts the virtual operating systems. 129 lated in separated information systems. 257
https An indication that a Web browser is using the SSL/TLS Information system (IS) A group of hardware, software,
protocol to provide secure communication. 405 data, procedure, and people components that interact to
produce information. 11
Human capital The investment in human knowledge and
skills with the expectation of future gain. 302 Information technology (IT) The products, methods, in-
ventions, and standards that are used for the purpose of
Human safeguards Steps taken to protect against security
threats by establishing appropriate procedures for users to producing information. 16
following during system use. 409 Infrastructure as a service (IaaS) The cloud hosting of a
bare server computer or data storage. 227
Hyper-social knowledge management The application of
social media and related applications for the management Inherent processes The procedures that must be followed
and delivery of organizational knowledge resources. 370 to effectively use licensed software. For example, the pro-
cesses inherent in ERP systems assume that certain users
Hypertext Transfer Protocol (http) An application-layer will take specified actions in a particular order. In most
protocol used between browsers and Web servers. 224
cases, the organization must conform to the processes in-
ICANN (Internet Corporation for Assigned Names and herent in the software. 255
Numbers) The organization responsible for managing Inter-enterprise information systems Information systems
the assignment of public IP addresses and domain names that support one or more inter-enterprise processes. 255
for use on the Internet. Each public IP address is unique
across all computers on the Internet. 218 Internal firewalls Firewalls that sit inside the organizational
network. 406
Identification The process whereby an information system
identifies a user by requiring the user to sign on with a user- Internet When spelled with a small i, as in internet, a private
name and password. 401 network of networks. When spelled with a capital I, as in
Internet, the public internet known as the Internet. 214
Identifier An attribute (or group of attributes) whose value is
associated with one and only one entity instance. 179 Internet of Things (IoT) The idea that objects are becoming
connected to the Internet so they can interact with other
IEEE 802.11 protocol A standard for packaging and manag- devices, applications, or services. 119
ing traffic on wireless local area networks. 215
Internet service provider (ISP) An ISP provides users with
IEEE 802.3 protocol A standard for packaging and manag- Internet access. An ISP provides a user with a legitimate
ing traffic on wired local area networks. 214 Internet address; it serves as the user’s gateway to the
If/Then rules Statements that specify that if a particular con- Internet; and it passes communications back and forth
dition exists, then a particular action should be taken. Used between the user and the Internet. ISPs also pay for the
in different ways, by both expert systems and decision tree Internet. They collect money from their customers and pay
data mining. 367 access fees and other charges on the users’ behalf. 216
Implementation In the context of the systems development Intranet A private internet (note small i) used within a cor-
life cycle, the phase following the design phase consisting of poration or other organization. 214
tasks to build, test, and convert users to the new system. 475 Intrusion detection system (IDS) A computer program that
Industry-specific solutions An ERP template that is designed senses when another computer is attempting to scan the
to serve the needs of companies or organizations in specific disk or otherwise access a computer. 397