Page 579 - Using MIS
P. 579

Glossary     547

              limited portion of the business. The advantage of pilot   Problem  A  perceived difference between what is and what
              implementation is that if the system fails, the failure   ought to be.  44
              is contained within a limited boundary. This reduces   Procedures  Instructions for humans. One of the five funda-
                exposure of the business and also protects the new sys-  mental components of an information system.  11
              tem from developing a negative reputation throughout
              the organizations.  475                             Process  blueprints  In an ERP application, comprehensive
                                                                    sets of inherent processes for all organizational activities,
            PixelSense  The Microsoft product formerly known as     each of which is documented with diagrams that use a set of
              Surface. It allows many users to process the same tabletop   standardized symbols.  272
              touch interface. Primarily used in hotels and entertain-
              ment centers.  156                                  Process effectiveness  A measure of how well a process
                                                                    achieves organizational strategy.  256
            Platform as a service (PaaS)  Vendors provide hosted com-
              puters, an operating system, and possibly a DBMS.  227  Process efficiency  A measure of the ratio of process outputs
                                                                    to inputs.  255
            Plunge installation  A type of system conversion in which
              the organization shuts off the old system and starts the   Project data  Data that is part of a collaboration’s work
              new system. If the new system fails, the organization is in    product.  46
              trouble: Nothing can be done until either the new system   Project metadata  Data that is used to manage a project.
              is fixed or the old system is reinstalled. Because of the risk,   Schedules, tasks, budgets, and other managerial data are
              organizations should avoid this conversion style if possible.   examples. 46
              Sometimes called direct installation. 476           Protocol  A set of rules and data structures for organizing
            Pooled  The situation in which many different organizations   communication. 214
              use the same physical hardware.  208                Public IP address  An IP address used to identify a par-
            Power curve  A graph that shows the relationship of the   ticular device on the Internet. Such IP addresses are
              power (the utility that one gains from a software product) as   assigned to major institutions in blocks by the Internet
              a function of the time using that product.  65        Corporation for Assigned Names and Numbers (ICANN).
                                                                    Each IP address is unique across all computers on the
            Predictive  policing  Using  data  on past  crimes to  predict
              where future crimes are likely to occur.  343         Internet. 218
                                                                  Public key encryption  A special version of asymmetric en-
            Pretexting  Deceiving someone over the Internet by pretend-
              ing to be another person or organization.  392        cryption that is popular on the Internet. With this method,
                                                                    each site has a public key for encoding messages and a pri-
            Primary activities  Activities  that  contribute  directly  to  the   vate key for decoding them.  405
              production, sale, or service of a product. In Porter’s model
              they are inbound logistics, operations and manufactur-  Publish results  The process of delivering business intelli-
              ing, outbound logistics, sales and marketing, and customer   gence to the knowledge workers who need it.  344
              service. 88                                         Pull publishing  In business intelligence (BI) systems, the
                                                                    mode whereby users must request BI results.  344
            Primary key  One or more columns in a relation whose
                values identify a unique row of that relation. Also known as   Push publishing  In  business  intelligence  (BI)  systems,  the
              a key. 166                                            mode whereby the BI system delivers business intelligence
                                                                    to users without any request from the users, according to
            PRISM  Codename for a secret global surveillance program
              run by the National Security Agency.  418             a schedule, or as a result of an event or particular data
                                                                     condition.  344
            Privacy  The freedom from being observed by other
               people.  418                                       Quad processor  A computer with four CPUs.  116
            Privacy Act of 1974  Federal law that provides protections   Quick Launch  A menu with links to important content on a
              to individuals regarding records maintained by the U.S.   SharePoint site.  76
              government. 402                                     RAM  Random access memory. Another name for a com-
            Private cloud  In-house hosting, delivered via Web service   puter’s main memory.  116
              standards, which can be dynamically configured.  232  Records  Also called rows, groups of columns in a database
            Private IP address  A type of IP address used within private   table. 165
              networks and internets. Private IP addresses are assigned   RFM analysis  A technique readily implemented with basic
              and managed by the company that operates the private net-  reporting operations to analyze and rank customers accord-
              work or internet.  218                                ing to their purchasing patterns.  355
   574   575   576   577   578   579   580   581   582   583   584