Page 587 - Using MIS
P. 587

Index      555

             simultaneous, using whiteboard, 49f  Computer hardware, competitive strategy and,   Credit cards
             software/tools for, 52, 53f           119–125                           chip-and-PIN, 425
             successful outcome, 40–41           Internet of things (IoT), 119–121   phishing and, 420–421
             task management, collaboration tools and,   self-driving cars, 121–124  Target Corp. data theft, 424–426
               60, 62–63                         3D printing, 124–125               CreditScore, 363
             team, choose right tools for, 63–67  Computer languages. See Language,    Crime. See also Security entries
             team capability, growth in, 41        computer                          combatting computer, 416–417
            Collaboration skills, 7, 8          Computer networks, cloud technology and,   cost of computer, 395–396
            Collaboration system, 46               211, 214–217                      phishing, computers and, 420–421
            Collaborative management, 275       Computer software, 125–132. See also   Critical path, 480
            Collaborator, characteristics of, 39f  Applications; Software           Critical path analysis, 480
            Columns, databases, 165, 172f        application types, 131–132         Critical Skills for Nonroutine Cognition, 7f
            Colvin, Geoff, 5n                    categories of, 125f                CRM. See Customer relationship management
            Commerce, cross-border, 502f         firmware, 132                         (CRM) system
            Commerce server, 220–221             future of, 147–149                 Cross-border commerce, 502f
            Commerce server pages, 220f          open source, 132, 134–135, 170     Cross-selling, 361
            Communication                        operating systems, 125–129         Crowdsourcing, 301
             changing, social enterprise network    own vs. license, 130            Crow’s feet, 181
               and, 318                          sources and types, 132f            Crow’s foot diagram, 182
             collaboration tools to improve team,    virtualization, 129–130        Cultural broker, 26
               47–51                            Computer Systems Analysts, 9        Cultural norms, international IS security and,
             content sharing, collaboration and, 47  Computer Systems Design, 9, 10f   512–513
             types of, 48                       Computerworld, 234                  Curse of dimensionality, 354
            Communication channels, 318         comScore Report, 142                Curved Ultra HD TVs, 133
            Communities, social media and, 295–297  Comstock, Beth, 304             Custom-developed software, 131
            Communities of practice, 294        Confidence, probability estimate, 362  Customer-centric organization, 262
            Competitive advantage               Configuration control, 483          Customer life cycle, 262–263
             identifying using IS, 97–99        Connection data, 298                Customer relationship management (CRM)
             open source software and, 132, 134–135  Conner, Cheryl, 323n              system, 262–263
             personal, guide to your, 102–103   Constine, Josh, 308n                Customer service, social media and, 300
             principles of, 95f                 Consumer Electronic Show (CES), 133  Customer summary query, 347f
             using IS to create, 96–97          Content data, 298                   Custom spear-phishing, 399
             via business process, 95–96        Content delivery network (CDN), 228
             via products, 95                   Content management systems (CMS)    D
            Competitive analysis, 315            alternatives to apps for, 369–370  Data, 11, 11f
            Competitive strategy                 challenges of, 368                  accurate, 18
             analysis of industry structure determines,   defining, 368              characteristics, 18–19, 21
               85, 88                           Content sharing, collaboration and, 47. See also   dirty, 350–351, 354
             computer hardware and, 119–125. See also   Shared content               ethics of, 20–21
               Computer hardware, competitive strategy   Content/storage applications, 52  finding information, 17–18
               and                              Control, loss of, outsourcing and,    hierarchy of elements of, 165f
             computer software and, 125–132        441–442                           incorrect modification of, 393
             determines business processes, IS structure   Control flow, 461         just-in-time, 144
               and, 92–93                       Conversion rate, 312                 mobile systems and, 143–144
             emerging global economy, change, 503  Cookie, 381, 398                  preventing loss of, 68–69
             mobile systems and, 139, 142–145. See also   Cooper, Jared, 248–251     privacy, security and, 402–403
               Mobile systems                   Cooperation, collaboration and, 37   processing information, 17
             native vs. web applications, 135–139. See also   Cost                   quality, controlling, process flow
               Native applications; Web          app development and, 452–453          and, 257
               applications                      of computer crime, 395–396          queries on, 171
             personal mobile devices at work, 145–147  of data, 19                   theft of, 100–101, 424–426
            Comprehensive collaboration tool set, 65  estimating SDLC and, 478–479  Data, computer, 117–119
            Computer-based information system, 11  FBA and, 108                      size of, 118–119
            Computer crime                       global IS development, 514f         specifying hardware with, 119
             combatting, 416–417                 Moore’s Law and, 5–6, 7            Data acquisition, BI and, 343, 344
             cost of, 395–396                    net savings in, 99                 Data administration, 409, 430f, 431
             phishing and, 420–421               of business process, 90            Data aggregator, 352–353
             as security threat, 391. See also Security entries  outsourcing and, 439, 442, 448–49  Data analysis, BI and, 344–348
            Computer hackers, 399–400            self-driving cars and, 123         Database
            Computer hardware, 11, 11f, 115–119  switching/reducing, 95              development, data models and,
             components of, 116                  trade-offs and, 481                   178–182
             data, 117–119                       value and, 14–15                    ERP, 271–272
             defined, 116                       Cost feasibility, 469                global, issues with, 505–506
             ERP and, 271                       Cost leader, 88                      in global IS development, 513–514
             future, 147–149                    Counihan, Kevin, 288–289             technology, future of, 187–189
             new, 133                           Count Palatine, of Posen, 419        user role in development, 187
             SMIS and, 297                      Court, David, 316n                  Database administration, 172, 173f, 409
             types of, 116–117                  Cover Oregon, 289, 499–500          Database application program, 173n
   582   583   584   585   586   587   588   589   590   591   592