Page 590 - Using MIS
P. 590
558 Index
Harvard School of Engineering and Applied Impakt Protective, Shockbox football helmet, safeguards against, 401, 404–408
Sciences, 125 smart device, 133 sources of, 391–392
HDTV (High Definition Television), 133 Imperfect duty, 21 Information technology (IT), defined, vs. IS, 16
Healthcare exchange, 288–290, 499–500 Imperva.com, 190n Infrastructure, loos of, 394
Health Insurance Portability and Accountability Implementation, 475 Infrastructure as a service (IaaS), 227–228, 231
Act (HIPPA), 402 Inbound logistics, social media and, 301 Ingraham. Nathan, 159n
Heartbleed vulnerability, 150–151 Incident-response plan, 415–416 Inherent processes, 262, 507
Heino, Hilary, 315n Incorrect data modification, 393 In-house content management application, 369
Help-desk policies, security and, 413 Industrial espionage, 492–493 In-house hosting vs. cloud technology, 210–211
Hertz, 119 Industrial Internet (GE), 121 Innovation, Amazon.com and, 107f
High-tech IS vs. low tech, 15 Industry-specific solutions, ERP and, 272–274 Instagram, 151, 294
Hill, Kashmir, 119n, 309n Influencer, social, 305 Installation, 475–476
Hiring, security safeguards for, 411 Information Institute for Electrical and Electronics
Hitler, Adolf, 56 business intelligence and, 341 Engineers (IEEE), 214
Hlatshwayo, Sandile, 9n collaboration and, 48f Insurance policy, security threats, 401
Hof, Robert, 312 defined, 16–18 Intel Corporation, 5, 116, 320
Hoffman, W. Michael, 240n ethics of, 20–21 Intel Social Media Guidelines, 320
Honeypots, security and, 415 supply chain and, 508–509 Inter-enterprise information systems, 255
Hop, networks and, 217 Information silos, IS and, 257–260 enterprise silos and, 276–277
Horizontal-market application, 131, 132f defined, 257 global supply chain management, 507–511
Horn, Leslie, 236n enterprise system, patient discharge, 259–260 Inter-enterprise processes, 255
Horovitz, Bruce, 425n organizations and problems with, 259 Internal firewalls, 406
Host operating system, 129 PRIDE and, 276–277 International MIS. See Global entries
Howe, Carl, 158n problems with, 258–259 International outsourcing, 439–440
Hsieh, Wilson C., 188n Information system (IS) Internet
http (Hypertext Transfer Protocol), 224 business processes and applications vs., cloud technology and, 209–210
https (encryption protocol), 68, 150, 224–225, 458–459 connecting LAN to, 216–217
405 competitive advantages and, 94–99 defined, 214
Hudl.com, 234 defined, 11 world economy supported by, 502–503
Hughes, Arthur Middleton, 355n department organization, 429–433 Internet addressing, 218–219
Human capital, 302 development of, 457–460. See also private addresses, 218
Human error, threat, 391 Development entries public IP and domain names, 219
Human resources, social media and, finding, 17 Internet Explorer (browser), 126, 224
301–302 five components of, for collaboration, 46–47 Internet of things (IoT), 119–121, 133
Human safeguards, security threats and, high-tech vs. low tech, 15 Internet protocols, 224–225
409–415 identify competitive advantage, 97–99 Internet search engines, 369
account administration, 412–413 information silos and, 257–260 Internet service provider (ISP), 216
dissemination/enforcement and, 411 information technology, differences, 16 Intranet, 214
for employees, 410–412 international components of, 504–507 Intrusion detection system (IDS), 397
hiring/screening, 411 interorganizational, 288–290 Inventory, databases and, 198–200
for nonemployee personnel, 412 jobs in, 432–433 iOS, 126f, 128
position definitions, 410–411 management, PRIDE and, 385 iOS applications, ideas to product, 452–453
security monitoring, 414–415 management of international, 513–516 IP address, 218
system procedure2, 413–414 managing department of, 434 iPhone, 120, 399, 452–453
termination and, 411–412 organizations plan use of, 433–435 IP spoofing, 393
Hurd, Mary, 452 outsourcing and, 438–443 IPv4, 219
Hyper-social KM alternative media, 370 process quality, improving and, 255–257 IPv6, 219
Hyper-social knowledge sharing, resistance security, 446–447. See also Security entries IS. See Information system (IS)
to, 371 strategy and, 92–93, 95–99 IT. See Information technology (IT)
Hyper-social organizations, knowledge two roles for, regarding products, 96f Iteration, collaboration and, 38–49
management, 369–370 user rights and responsibilities, 443–445
Hypertext Transfer Protocol (http), 224–225 using to create competitive advantages, J
96–97 Jacob, Beth, 425
I Information Systems Audit and Control Jang, Yeongjin, 399
IaaS, infrastructure as a service, 227f, 231 Association, 463 Jasc Corporation, 131
IBM, 130 Information systems (IS) security, 390–394 JavaScript, 176, 399
ICANN (Internet Corporation for Assigned data safeguards, 409 JavaScript Object Notation, JSON, 225–227
Names and Numbers), 218, 219 goal of, 394 Jensen, Nicki, 248–251
iCloud, 52, 227 human safeguards, 409–415 Job(s). See also Careers
Identification, security safeguard, 401, 404 loss/threat scenario, 390–391 five components for, 26–27
Identifier, entity, 179 response to incidents, 415–416 growth by sector 1989–2009, 10f
Identity theft, 100–101 security officers, 431 MIS and, 9–10
IEEE 802 Committee, 214 size of problem with, 395–397 security, MIS and, 6–7
IEEE 802.3 protocol, 214 types of loss, 392–394 Jobs, Steve, 61, 157–159, 227
IEEE 802.11 protocol, 215 Information systems (IS) security threats Johanson, Matt, 399
Irfan View, 235 organizations and, 400–401 John, Darwin, 38
If/then rules, 367 responding to, 397–398 Johnson, Hillary Louise, 486n, 489n