Page 581 - Using MIS
P. 581

Glossary     549

            Social CRM  CRM that includes social networking elements   Stand-up  In scrum, a 15-minute meeting in which each
              and gives the customer much more power and control in   team member states what he or she has done in the past
              the customer/vendor relationship.  300                day, what he or she will do in the coming day, and any fac-
            Social capital  The investment in social relations with expec-  tors that are blocking his or her progress.  487
              tation of future returns in the marketplace.  302   Static reports  Business intelligence documents that are fixed
            Social media (SM)  The use of information technol-      at the time of creation and do not change.  371
              ogy to support the sharing of content among networks of   Steering committee  A group of senior managers from a
              users. 294                                            company’s major business functions that works with the
            Social media information system (SMIS)  An information   CIO to set the IS priorities and decide among major IS proj-
              system that supports the sharing of content among net-  ects and alternatives.  435
              works of users.  294                                Storage hardware  Hardware that saves data and programs.
            Social media policy  A statement that delineates employees’   Magnetic disks are by far the most common storage device,
              rights and responsibilities when generating social media   although optical disks, such as CDs and DVDs, also are
              content. 319                                           popular.  116
            Social media providers  Companies  that  provide platforms   Stored procedure  A computer program stored in the data-
              that enable the creation of social networks. Facebook, Twitter,   base that is used to enforce business rules.  272
              LinkedIn, and Google are all social media  providers.  294  Strategic decisions  Decisions that concern broad-scope, or-
            Social networks  The social relationships among people with   ganizational issues.  43
              common interests.  294                              Strength  of  a  relationship  In social media, the likelihood
            Software  Instructions for computers. One of the five funda-  that a person or other organization in a relationship will do
              mental components of an information system.  11       something that will benefit the organization.  306
            Software as a service (SaaS)  Leasing hardware infrastruc-  Strong password  A password with the following character-
              ture,  operating  systems,  and  application  programs  to  an-  istics: at least 10 characters; does not contain the user’s
              other organization.  227                              username, real name, or company name; does not contain a
            Source code  Computer  code  as  written  by  humans    complete dictionary word in any language; is different from
              and that is understandable by humans. Source code     the user’s previous passwords; and contains both upper-
              must be translated into machine code before it can be   and lowercase letters, numbers, and special  characters.  24
              processed. 134                                      Structured decision  A type of decision for which there
            Spoofing  When someone pretends to be someone else      is a formalized and accepted method for making the
              with the intent of obtaining unauthorized data. If you   decision. 43
              pretend to be your professor, you are spoofing your   Structured processes  Formally defined, standardized pro-
              professor. 393                                        cesses that involve day-to-day operations; accepting a re-
            Spyware  Programs installed on the user’s computer without   turn, placing an order, and purchasing raw materials are
              the user’s knowledge or permission that reside in the back-  common examples.  252
              ground and, unknown to the user, observe the user’s ac-  Structured  Query  Language  (SQL)  An international stan-
              tions and keystrokes, modify computer activity, and report   dard language for processing database data. Can also be
              the user’s activities to sponsoring organizations. Malicious   used to create and modify database structure.  171
              spyware captures keystrokes to obtain usernames, pass-
              words, account numbers, and other sensitive information.   Subscriptions  User requests for particular business intel-
              Other spyware is used for marketing analyses, observing   ligence results on a stated schedule or in response to par-
              what users do, Web sites visited, products examined and   ticular events.  372
              purchased, and so forth.  407                       Success metrics  Measures  that indicate  when  you’ve
                                                                    achieved your goals.  314
            SQL Server  A popular enterprise-class DBMS product li-
              censed by Microsoft.  170                           Supervised data mining  A form of data mining in which
            SQL injection attack  The situation that occurs when a user   data miners develop a model prior to the analysis and ap-
              obtains unauthorized access to data by entering a SQL   ply  statistical  techniques  to determine  the validity of  that
                statement into a form in which one is supposed to enter a   model and to estimate values of the parameters of the
              name or other data. If the program is improperly designed,   model. 360
              it will accept this statement and make  it part of the  SQL   Support  In market-basket terminology, the probability that
              command that it issues to the DBMS.  408              two items will be purchased together.  361
   576   577   578   579   580   581   582   583   584   585   586