Page 587 - Using MIS
P. 587
Index 555
simultaneous, using whiteboard, 49f Computer hardware, competitive strategy and, Credit cards
software/tools for, 52, 53f 119–125 chip-and-PIN, 425
successful outcome, 40–41 Internet of things (IoT), 119–121 phishing and, 420–421
task management, collaboration tools and, self-driving cars, 121–124 Target Corp. data theft, 424–426
60, 62–63 3D printing, 124–125 CreditScore, 363
team, choose right tools for, 63–67 Computer languages. See Language, Crime. See also Security entries
team capability, growth in, 41 computer combatting computer, 416–417
Collaboration skills, 7, 8 Computer networks, cloud technology and, cost of computer, 395–396
Collaboration system, 46 211, 214–217 phishing, computers and, 420–421
Collaborative management, 275 Computer software, 125–132. See also Critical path, 480
Collaborator, characteristics of, 39f Applications; Software Critical path analysis, 480
Columns, databases, 165, 172f application types, 131–132 Critical Skills for Nonroutine Cognition, 7f
Colvin, Geoff, 5n categories of, 125f CRM. See Customer relationship management
Commerce, cross-border, 502f firmware, 132 (CRM) system
Commerce server, 220–221 future of, 147–149 Cross-border commerce, 502f
Commerce server pages, 220f open source, 132, 134–135, 170 Cross-selling, 361
Communication operating systems, 125–129 Crowdsourcing, 301
changing, social enterprise network own vs. license, 130 Crow’s feet, 181
and, 318 sources and types, 132f Crow’s foot diagram, 182
collaboration tools to improve team, virtualization, 129–130 Cultural broker, 26
47–51 Computer Systems Analysts, 9 Cultural norms, international IS security and,
content sharing, collaboration and, 47 Computer Systems Design, 9, 10f 512–513
types of, 48 Computerworld, 234 Curse of dimensionality, 354
Communication channels, 318 comScore Report, 142 Curved Ultra HD TVs, 133
Communities, social media and, 295–297 Comstock, Beth, 304 Custom-developed software, 131
Communities of practice, 294 Confidence, probability estimate, 362 Customer-centric organization, 262
Competitive advantage Configuration control, 483 Customer life cycle, 262–263
identifying using IS, 97–99 Connection data, 298 Customer relationship management (CRM)
open source software and, 132, 134–135 Conner, Cheryl, 323n system, 262–263
personal, guide to your, 102–103 Constine, Josh, 308n Customer service, social media and, 300
principles of, 95f Consumer Electronic Show (CES), 133 Customer summary query, 347f
using IS to create, 96–97 Content data, 298 Custom spear-phishing, 399
via business process, 95–96 Content delivery network (CDN), 228
via products, 95 Content management systems (CMS) D
Competitive analysis, 315 alternatives to apps for, 369–370 Data, 11, 11f
Competitive strategy challenges of, 368 accurate, 18
analysis of industry structure determines, defining, 368 characteristics, 18–19, 21
85, 88 Content sharing, collaboration and, 47. See also dirty, 350–351, 354
computer hardware and, 119–125. See also Shared content ethics of, 20–21
Computer hardware, competitive strategy Content/storage applications, 52 finding information, 17–18
and Control, loss of, outsourcing and, hierarchy of elements of, 165f
computer software and, 125–132 441–442 incorrect modification of, 393
determines business processes, IS structure Control flow, 461 just-in-time, 144
and, 92–93 Conversion rate, 312 mobile systems and, 143–144
emerging global economy, change, 503 Cookie, 381, 398 preventing loss of, 68–69
mobile systems and, 139, 142–145. See also Cooper, Jared, 248–251 privacy, security and, 402–403
Mobile systems Cooperation, collaboration and, 37 processing information, 17
native vs. web applications, 135–139. See also Cost quality, controlling, process flow
Native applications; Web app development and, 452–453 and, 257
applications of computer crime, 395–396 queries on, 171
personal mobile devices at work, 145–147 of data, 19 theft of, 100–101, 424–426
Comprehensive collaboration tool set, 65 estimating SDLC and, 478–479 Data, computer, 117–119
Computer-based information system, 11 FBA and, 108 size of, 118–119
Computer crime global IS development, 514f specifying hardware with, 119
combatting, 416–417 Moore’s Law and, 5–6, 7 Data acquisition, BI and, 343, 344
cost of, 395–396 net savings in, 99 Data administration, 409, 430f, 431
phishing and, 420–421 of business process, 90 Data aggregator, 352–353
as security threat, 391. See also Security entries outsourcing and, 439, 442, 448–49 Data analysis, BI and, 344–348
Computer hackers, 399–400 self-driving cars and, 123 Database
Computer hardware, 11, 11f, 115–119 switching/reducing, 95 development, data models and,
components of, 116 trade-offs and, 481 178–182
data, 117–119 value and, 14–15 ERP, 271–272
defined, 116 Cost feasibility, 469 global, issues with, 505–506
ERP and, 271 Cost leader, 88 in global IS development, 513–514
future, 147–149 Counihan, Kevin, 288–289 technology, future of, 187–189
new, 133 Count Palatine, of Posen, 419 user role in development, 187
SMIS and, 297 Court, David, 316n Database administration, 172, 173f, 409
types of, 116–117 Cover Oregon, 289, 499–500 Database application program, 173n

