Page 580 - Using MIS
P. 580
548 Glossary
Regression analysis A type of supervised data mining that es- Self-efficacy A person’s belief that he or she can successfully
timates the values of parameters in a linear equation. Used to perform the tasks required in his or her job. 276
determine the relative influence of variables on an outcome Semantic security Also called data triangulation; con-
and also to predict future values of that outcome. 360 cerns the unintended release of protected data through
Relation A formal name for a database table. 167 the release of a combination of reports or documents that
Relational databases Databases that store data in the form are not protected independently. 374
of relations (tables with certain restrictions) and that repre- Server A computer that provides some type of service, such
sents record relationships using foreign keys. 167 as hosting a database, running a blog, publishing a Web site,
Relationships Associations among entities or entity in- or s elling goods. Server computers are faster, larger, and
stances in an E-R model or an association among rows of a more powerful than client computers. 117
table in a relational database. 180 Server farm A large collection of server computers that is
Remote action system An information system that pro- organized to share work and compensate for one another’s
vides action at a distance, such as telesurgery or telelaw failures. 117
enforcement. 236 Server tier In the three-tier architecture, the tier that con-
Reporting application A business intelligence applica- sists of computers that run Web servers for generating Web
tion that inputs data from one or more sources and ap- pages and responding to requests from browsers. Web serv-
plies reporting operations to that data to produce business ers also process application programs. 220
intelligence. 355 Server virtualization The process of running two or more
Repository In a business process model, a collection of some- operating system instances on the same server. The host
thing; for example, a database is a repository of data. 90 operating system runs virtual operating system instances as
Requirements analysis The second phase in the SDLC, in applications. 129
which developers conduct user interviews; evaluate exist- Service-oriented architecture (SOA) A design philosophy
ing systems; determine new forms/reports/queries; identify that dictates that all interactions among computing devices
new features and functions, including security; and create are defined as services in a formal, standardized way. SOA
the data model. 468 makes the cloud possible. 222
Resources People or information system applications that Showrooming The practice of visiting a brick-and-mortar
are assigned to roles in business processes. 461 store to examine and evaluate products with the intention
Rich directory An employee directory that includes not only of later buying those products on the Internet. 140
the standard name, email, phone, and address but also ex- Simple Mail Transfer Protocol (smtp) The protocol used
pertise, organizational relationships, and other employee for email transmission. 225
data. 370
Site license A license purchased by an organization to equip
Roles In a business process, collections of activities. 461 all the computers on a site with certain software. 130
Rows Also called records, groups of columns in a database SLATES Acronym developed by Andrew McAfee that sum-
table. 165 marizes key characteristics of Enterprise 2.0: search, links,
Safeguard Any action, device, procedure, technique, or other author, tagged, extensions, signaled. 317
measure that reduces a system’s vulnerability to a threat. 390 Small office/home office (SOHO) A business office with
Schedule feasibility Whether an information system can be usually fewer than 10 employees often located in the busi-
developed within the time available. 469 ness professional’s home. 214
Screen-sharing applications Applications that offer users Smart cards Plastic cards similar to credit cards that have
the ability to view the same whiteboard, application, or microchips. The microchip, which holds much more data
other display over a network. 49 than a magnetic strip, is loaded with identifying data.
Secure Sockets Layer (SSL) A protocol that uses both asym- Normally requires a PIN. 404
metric and symmetric encryption. When SSL is in use, the Smart device A device that has processing power, memory,
browser address will begin with https://. The most recent network connectivity, and the ability to interconnect with
version of SSL is called TLS. 405 other devices and applications. 120
Security The state of being free from danger. 418 Sniffing A technique for intercepting computer communi-
Self-driving car An autonomous, or driverless, car that uses cations. With wired networks, sniffing requires a physical
a variety of sensors to navigate like a traditional car but connection to the network. With wireless networks, no such
without human intervention. 121 connection is required. 393