Page 586 - Using MIS
P. 586

554       Index

        Bing                                  ERP and, 272                      Chief security officer (CSO), 431
          chat, 49                            flowchart, 93f                    Chief technology officer (CTO), 430f, 431, 435
          search, 369                         IS and, 458–459, 459f             China, Google and, 511
        Biometric authentication, 404         tracking inventory, 198–200       Chrome browser, 52, 126, 224
        BI. See Business intelligence (BI)    value generation and, 90–92       Cisco Systems Inc., 119, 312n
        BI systems. See Business intelligence (BI)   Business process engineering, 261  Citadel, 424–426
           systems                          Business process management (BPM), 91  Clapper, James R., 419
        Bitcoins, 281                         activities, 462–463               Click ratios, 19
        Bits (binary digits), 117, 118f       four stages of, 463f              Clickstream data, 312, 351
        BlackBerry OS, 126f, 128              organizational use of, 461–463    Clicky, 316
        Blackboard, 9                       Business Process Modeling Notation (BPMN),   Clients, 117, 125f
        Black Hat conference, 399–400          464–465, 465f                    Closed source project, 135
        Bladt, Jeff, 364n                   Business process reengineering, 261  Cloud-based resource, 139
        Blue, Violet, 399n                  Business school, importance of MIS in, 5–10  CloudFront (Amazon), 208
        Bluetooth, 215                      Business-to-business (B2B), 301     Cloud Security Alliance, 239n
        Botnets, 399                        Business-to-consumer (B2C), 301     Cloud services, 107, 117
        Boyle, Randall, 415n                Buy-in estimation ethics, 470–471   Cloud technology, 6, 46
        BPM. See Business process management  BYOD (bring your own device)        advantages of, 211
        BPMN. See Business process model notation  organizational policy, 146–147  business use of, 230–231
        Brassfield, Marissa, 321n             personal mobile devices, at work, 145–147  carriers, net neutrality and, 217–218
        Bratton, William J., 343            Bytes, 118                            defining, 207–210
        Bricks-and-mortar store, 140–141                                          future of, 234, 236–237
        Brooks, Fred, 478n, 481             C                                     in-house hosting vs., 210–211
        Brook’s Law, 481                    Cable line, WAN connection, 217       Internet addressing, 218–219
        Browser applications, 224–225       Cache memory, 119                     Internet example, 217
          for collaboration, 52             Camtasia video, 52                    networks and, 211, 214–217
          as web apps, 126                  Capital, defined, 302                 organizational uses of, 227–229
        Browser forms, database, 175–178    Careers                               protocols supporting web services, 224–227
        Browsers                              in data analysis, 168–169           security and, 231–234
          botnets from, 399                   five-component, 26–27               service-oriented architecture (SOA),
          cookies and, 381–383                IS-related job positions, 432–433    222–224
          malware and, 408                    in software development, 149        types of clouds, 227f
        Brunker, Mike, 399n                 Carriers, net neutrality and, 217–218  types of services, 227f
        Brute force attack, 397             Case studies                          web server and, 219–221
        Budnick, Nick, 290n, 500              Amazon.com and innovation, 106–109  when to use, 211
        Bugs list, 476f                       Apple Inc., 157–159               Cluster analysis, 360
        Burrows, Mike, 188n                   databases, inventory, 198–200     CMS. See Content management systems
        Bushey, Ryan, 125n                    dogfooding, 75–79                 CNET News, 152
        Business. See also Organization(s) entries  FinQloud system, 245–246    COBIT (Control Objectives for Information and
          as social activity, 37              Hadoop, 381–383                      related Technology), 463
        Business fundamentals, chances in BPM and, 462  interorganizational ISs, 288–290  COBOL, 175
        Business intelligence (BI), 340       requirements, managing/not managing,   Cole, Carey, 60n
          data acquisition, 349–351, 354–355   499–500                          Cole, Matthew, 399n, 419n
          data mining applications, 359–363   Sedona, 332–335                   Collaboration, defined, 38
          future of, 372–373                  Target Corporation and data theft, 424–426  Collaboration information systems (CIS)
          knowledge management systems role of,   value of ideas, development and, 452–453  become informed, 42
           366–371                            zulily, 31–33. See also zulily      characteristics of, 37–40, 39f
          PRIDE and, 341, 379               Cassandra (NoSQL DBMS), 132, 188, 230,    collaboration needs for decision
          publishing alternatives, 371–372     297, 365                            making, 44f
          reporting applications, 355–359   Categorical imperative, 20–21         communication tools, 47–51
          users, 350                        Cavens, Darrell, 31–33                communication/content sharing, 47
        Business intelligence (BI) analysis, 343  CCleaner, 398                   components of, 46–47
        Business intelligence (BI) applications, 342–343  C# computer language, 176  cooperation and, 37
          defined, 340                      C+ computer language, 175             decision-making, 42–44
          entertainment, 342                CDN (content delivery network), 228   differences, collaboration and, 39–40
          purchasing patterns, changes in and, 342  Cell phones, 120              feedback, 38–40
        Business intelligence (BI) server, functions of, 372  Censorship, international Internet, 511–512  future of, 67
        Business intelligence (BI) systems  Central processing unit (CPU), 116    IS requirements for, 47f
          activities in, 343–349, 343f      Chandra, Tushar, 188n                 meaningful experience with, 41
          BI applications and, 342–343      Chang, Fay, 188n                      problem solving, 44
          in organizations and, 340–343     Chatter, social media, 304–305        project data, 46–47
          predictive policing, 343          Cheflet™ 3D Systems, 125              project management, 44–46
        Business item, 464                  Chief Digital Officers (CDOs), 323    project metadata, 46–47
        Business process                    Chief executive officer (CEO), 430    purposes of, 41–46
          activities in, correlating IS and, 458f  Chief financial officer (CFO), 430  requirements for different collaboration
          competitive advantage via, 95–96  Chief information officer (CIO), 430, 435, 442  purposes, 48f
          development of apps, 457–460. See also   Chief information security officer (CISO), 431  security and, 68–69
           Development entries              Chief operating officer (COO), 430    shared content and, 51–55, 58–60
   581   582   583   584   585   586   587   588   589   590   591