Page 581 - Using MIS
P. 581
Glossary 549
Social CRM CRM that includes social networking elements Stand-up In scrum, a 15-minute meeting in which each
and gives the customer much more power and control in team member states what he or she has done in the past
the customer/vendor relationship. 300 day, what he or she will do in the coming day, and any fac-
Social capital The investment in social relations with expec- tors that are blocking his or her progress. 487
tation of future returns in the marketplace. 302 Static reports Business intelligence documents that are fixed
Social media (SM) The use of information technol- at the time of creation and do not change. 371
ogy to support the sharing of content among networks of Steering committee A group of senior managers from a
users. 294 company’s major business functions that works with the
Social media information system (SMIS) An information CIO to set the IS priorities and decide among major IS proj-
system that supports the sharing of content among net- ects and alternatives. 435
works of users. 294 Storage hardware Hardware that saves data and programs.
Social media policy A statement that delineates employees’ Magnetic disks are by far the most common storage device,
rights and responsibilities when generating social media although optical disks, such as CDs and DVDs, also are
content. 319 popular. 116
Social media providers Companies that provide platforms Stored procedure A computer program stored in the data-
that enable the creation of social networks. Facebook, Twitter, base that is used to enforce business rules. 272
LinkedIn, and Google are all social media providers. 294 Strategic decisions Decisions that concern broad-scope, or-
Social networks The social relationships among people with ganizational issues. 43
common interests. 294 Strength of a relationship In social media, the likelihood
Software Instructions for computers. One of the five funda- that a person or other organization in a relationship will do
mental components of an information system. 11 something that will benefit the organization. 306
Software as a service (SaaS) Leasing hardware infrastruc- Strong password A password with the following character-
ture, operating systems, and application programs to an- istics: at least 10 characters; does not contain the user’s
other organization. 227 username, real name, or company name; does not contain a
Source code Computer code as written by humans complete dictionary word in any language; is different from
and that is understandable by humans. Source code the user’s previous passwords; and contains both upper-
must be translated into machine code before it can be and lowercase letters, numbers, and special characters. 24
processed. 134 Structured decision A type of decision for which there
Spoofing When someone pretends to be someone else is a formalized and accepted method for making the
with the intent of obtaining unauthorized data. If you decision. 43
pretend to be your professor, you are spoofing your Structured processes Formally defined, standardized pro-
professor. 393 cesses that involve day-to-day operations; accepting a re-
Spyware Programs installed on the user’s computer without turn, placing an order, and purchasing raw materials are
the user’s knowledge or permission that reside in the back- common examples. 252
ground and, unknown to the user, observe the user’s ac- Structured Query Language (SQL) An international stan-
tions and keystrokes, modify computer activity, and report dard language for processing database data. Can also be
the user’s activities to sponsoring organizations. Malicious used to create and modify database structure. 171
spyware captures keystrokes to obtain usernames, pass-
words, account numbers, and other sensitive information. Subscriptions User requests for particular business intel-
Other spyware is used for marketing analyses, observing ligence results on a stated schedule or in response to par-
what users do, Web sites visited, products examined and ticular events. 372
purchased, and so forth. 407 Success metrics Measures that indicate when you’ve
achieved your goals. 314
SQL Server A popular enterprise-class DBMS product li-
censed by Microsoft. 170 Supervised data mining A form of data mining in which
SQL injection attack The situation that occurs when a user data miners develop a model prior to the analysis and ap-
obtains unauthorized access to data by entering a SQL ply statistical techniques to determine the validity of that
statement into a form in which one is supposed to enter a model and to estimate values of the parameters of the
name or other data. If the program is improperly designed, model. 360
it will accept this statement and make it part of the SQL Support In market-basket terminology, the probability that
command that it issues to the DBMS. 408 two items will be purchased together. 361