Page 589 - Using MIS
P. 589

Index      557

            Esposito, Richard, 419n             Five-component framework, 11, 11f    information systems and, 503f
            Estimation ethics, 470–471           careers in, 26–27                   value chains, business processes and,
            Ethernet, 214–215                    characteristics of, 13f               503–504
            Ethics Guide                         components ordered by difficulty/  Global information systems, security and,
             accounting issues, 266–267            disruption, 16                      511–513
             data aggregation, 352–353           high-tech vs. low tech systems, 15  Global IS management, 513–516
             deceptive information, 20–21        implementation of, 476f             operational, 515–516
             employees, treatment of, 86–87      MIS and, 13–16                      project management, 514–515
             estimation ethics, 470–471          ordering by difficulty/disruption, 16  setting up IS, in foreign offices, 516
             expense reports, 212–213            problems with, 13, 15               why more challenging?, 513–514
             privacy, securing, 402–403          scope of new, 15                   Global supply chain management, 507–511
             salary inequality, 168–169          self component, 13                  bullwhip effect and, 509–511f
             showrooming, 140–141               Five Forces Model, 83–85             information and, 508–509
             social marketing, or lying, 310–311  Flame (computer virus), 394, 416  Gmail, 151
             utilitarianism, 56–57              Flap, Henk D., 303n                 GNU general public license (GPL) agreement,
             work computer use policies, 436–437  Flash, Apple devices and, 159        132
            Etsy, 151                           Flickr, 151                         GNU open source OS, 132
            Evans, Peter C., 121n               Flores, Romero, 248                 Go Daddy, 219, 219f
            Evernote, data theft, 395           Floretti, Julia, 512n               Good collaboration tool set, 64–65
            Evite.com, 48                       Folksonomy, 317                     Google, 151, 188, 369, 418, 511
            Exabyte (EB), 118                   Forbes, 323                         Google+, 6, 294, 296
            Executive group, communicate IS issues to, 435  Foreign keys, databases, 167  Google Ads, 308–309
            Existing order process, 466f        Foreign Policy (website), 501       Google Analytics, 316
            Expense reports, ethics and, 212–213  Formatting, data, 355             Google Docs, 46, 52
            Experiments, ability to perform, 7, 8–9  Forms, database, 174–175       Google Drive, 9, 53–55, 58
            Expert systems, KM and, 367–368     Fortune magazine, 308               Google Earth, 235
            Expert system shells, 367           Fox, Steve, 60n                     Google Glass, 22
            eXtensible Markup Language (XML), 225–227  Franklin, Benjamin, 306–307  Google Grid, 46, 52
            External sources, of inappropriate content, 321  Freemium revenue model, social media and,   sample task using, 62f
            Extracted data, 345f                   309                               sharing task list on, 62
            Extreme programming, 485            Frequency, data, 355                Google Hangouts, 49
                                                Friedland, Jim, 312                 Google Picasa, 52
            F                                   Friedman, Milton, 213               Google search, 189
            Facebook                            Friedman, Thomas L., 501n           Google text, 49
             data theft, 395                    Friedman, Zev, 248, 249–251         Google Trends, 365, 366f
             for organizations and machines, 304–305  ftp (File Transfer Protocol), 225  Gramm-Leach-Bliley (GLB) Act, 402
             PRISM and, 418                     Fueled.com, 452                     Granularity, 351
             social media, 6, 16, 119, 143, 188, 294, 298  Fulfillment by Amazon (FBA), 108  Graphical queries, 176
            Facebook Page Insights, 316         Functional application, 253         Grouping, data, 355
            Face-to-face meetings, 48–49, 67, 76  Functional information systems, 253  Gruber, Robert E., 188n
            Failure, 476f                       Functional systems, advantages of global, 506  Guide (feature)
            Failures list, 476f                 Future. See 2025                     data mining, 376–377
            Faulty service, 393                                                      egocentric vs. empathetic thinking, 70–71
            Fazio Mechanical Services, 424–426  G                                    ERP, standard blueprints and, 282–283
            FBA. See Fulfillment by Amazon      Gantt chart, 479                     five-component careers, 26–27
            Feasibility, assess, 469, 472, 499–500  Garvin, Glenn, 122n              Immanuel Kant, data modeler, 192–193
            Feedback                            Gates, Bill, 61                      keeping up-to-date on new technology,
             guidelines for giving/receiving, 39, 40f  General Electric (GE), 121, 304  152–153
             importance in collaboration, 38–39  General Motors, 369                 monitoring employees, 240–241
            Ferber, Dan, 125n                   Geotagging, 235–236                  outsourcing, issues with, 448–49
            Fields, databases, 165              Gesenhues, Amy, 295n                 personal brand, developing, 328–329
            Fikes, Andrew, 188n                 Ghemawat, Pankaj, 501–502            personal competitive advantage, 102–103
            Filbin, Bob, 364n                   Ghemawat, Sanjay, 188n               phishing for private information,
            File, databases, 165                Gigabyte (GB), 118                     420–421
            File server, 53                     Glass: A Portrait of Philip in Twelve Parts (film),   using your knowledge, 494–495
            File Transfer Protocol (ftp), 225      494–495
            Filtering, data, 355                Glass, Philip, 494–495              H
            Finalizing phase, project management, 46  Global components of information systems,   Hackers, 399–400
            Financial capital, 315                 504–507                          Hackman, Richard, 40, 41
            FinQloud system, 245–246             databases, issues with, 505–506    Hadoop (BigData processing system), 132,
            Firefox, 52, 126, 132                enterprise applications, 506          365–366
            Firewalls, security and, 406–407, 414  functional systems, 506           cookies and, 381–383
            Firmware, computer software, 132     inherent processes, problems of, 507  Halamka, John, 264
            First Amendment, employer spying, 241  Global economy, 501–504          Hardening, 412
            First Data Corporation, 289          competitive environment, 502–503   Hard targets, 412
            Fitbit One, wearable computer, 133   competitive strategy and, 503      Harrah’s Rio All-Suite hotel, 156
            Five-component careers, 26–27        cross-border commerce, 502f        Hartman, Laura P., 240n
   584   585   586   587   588   589   590   591   592   593   594