Page 590 - Using MIS
P. 590

558       Index

        Harvard School of Engineering and Applied   Impakt Protective, Shockbox football helmet,   safeguards against, 401, 404–408
           Sciences, 125                       smart device, 133                  sources of, 391–392
        HDTV (High Definition Television), 133  Imperfect duty, 21              Information technology (IT), defined, vs. IS, 16
        Healthcare exchange, 288–290, 499–500  Imperva.com, 190n                Infrastructure, loos of, 394
        Health Insurance Portability and Accountability   Implementation, 475   Infrastructure as a service (IaaS), 227–228, 231
           Act (HIPPA), 402                 Inbound logistics, social media and, 301  Ingraham. Nathan, 159n
        Heartbleed vulnerability, 150–151   Incident-response plan, 415–416     Inherent processes, 262, 507
        Heino, Hilary, 315n                 Incorrect data modification, 393    In-house content management application, 369
        Help-desk policies, security and, 413  Industrial espionage, 492–493    In-house hosting vs. cloud technology, 210–211
        Hertz, 119                          Industrial Internet (GE), 121       Innovation, Amazon.com and, 107f
        High-tech IS vs. low tech, 15       Industry-specific solutions, ERP and, 272–274  Instagram, 151, 294
        Hill, Kashmir, 119n, 309n           Influencer, social, 305             Installation, 475–476
        Hiring, security safeguards for, 411  Information                       Institute for Electrical and Electronics
        Hitler, Adolf, 56                     business intelligence and, 341       Engineers (IEEE), 214
        Hlatshwayo, Sandile, 9n               collaboration and, 48f            Insurance policy, security threats, 401
        Hof, Robert, 312                      defined, 16–18                    Intel Corporation, 5, 116, 320
        Hoffman, W. Michael, 240n             ethics of, 20–21                  Intel Social Media Guidelines, 320
        Honeypots, security and, 415          supply chain and, 508–509         Inter-enterprise information systems, 255
        Hop, networks and, 217              Information silos, IS and, 257–260    enterprise silos and, 276–277
        Horizontal-market application, 131, 132f  defined, 257                    global supply chain management, 507–511
        Horn, Leslie, 236n                    enterprise system, patient discharge, 259–260  Inter-enterprise processes, 255
        Horovitz, Bruce, 425n                 organizations and problems with, 259  Internal firewalls, 406
        Host operating system, 129            PRIDE and, 276–277                International MIS. See Global entries
        Howe, Carl, 158n                      problems with, 258–259            International outsourcing, 439–440
        Hsieh, Wilson C., 188n              Information system (IS)             Internet
        http (Hypertext Transfer Protocol), 224  business processes and applications vs.,   cloud technology and, 209–210
        https (encryption protocol), 68, 150, 224–225,   458–459                  connecting LAN to, 216–217
           405                                competitive advantages and, 94–99   defined, 214
        Hudl.com, 234                         defined, 11                         world economy supported by, 502–503
        Hughes, Arthur Middleton, 355n        department organization, 429–433  Internet addressing, 218–219
        Human capital, 302                    development of, 457–460. See also   private addresses, 218
        Human error, threat, 391               Development entries                public IP and domain names, 219
        Human resources, social media and,    finding, 17                       Internet Explorer (browser), 126, 224
           301–302                            five components of, for collaboration, 46–47  Internet of things (IoT), 119–121, 133
        Human safeguards, security threats and,   high-tech vs. low tech, 15    Internet protocols, 224–225
           409–415                            identify competitive advantage, 97–99  Internet search engines, 369
          account administration, 412–413     information silos and, 257–260    Internet service provider (ISP), 216
          dissemination/enforcement and, 411  information technology, differences, 16  Intranet, 214
          for employees, 410–412              international components of, 504–507  Intrusion detection system (IDS), 397
          hiring/screening, 411               interorganizational, 288–290      Inventory, databases and, 198–200
          for nonemployee personnel, 412      jobs in, 432–433                  iOS, 126f, 128
          position definitions, 410–411       management, PRIDE and, 385        iOS applications, ideas to product, 452–453
          security monitoring, 414–415        management of international, 513–516  IP address, 218
          system procedure2, 413–414          managing department of, 434       iPhone, 120, 399, 452–453
          termination and, 411–412            organizations plan use of, 433–435  IP spoofing, 393
        Hurd, Mary, 452                       outsourcing and, 438–443          IPv4, 219
        Hyper-social KM alternative media, 370  process quality, improving and, 255–257  IPv6, 219
        Hyper-social knowledge sharing, resistance   security, 446–447. See also Security entries  IS. See Information system (IS)
           to, 371                            strategy and, 92–93, 95–99        IT. See Information technology (IT)
        Hyper-social organizations, knowledge   two roles for, regarding products, 96f  Iteration, collaboration and, 38–49
           management, 369–370                user rights and responsibilities, 443–445
        Hypertext Transfer Protocol (http), 224–225  using to create competitive advantages,   J
                                               96–97                            Jacob, Beth, 425
        I                                   Information Systems Audit and Control   Jang, Yeongjin, 399
        IaaS, infrastructure as a service, 227f, 231  Association, 463          Jasc Corporation, 131
        IBM, 130                            Information systems (IS) security, 390–394  JavaScript, 176, 399
        ICANN (Internet Corporation for Assigned   data safeguards, 409         JavaScript Object Notation, JSON, 225–227
           Names and Numbers), 218, 219       goal of, 394                      Jensen, Nicki, 248–251
        iCloud, 52, 227                       human safeguards, 409–415         Job(s). See also Careers
        Identification, security safeguard, 401, 404  loss/threat scenario, 390–391  five components for, 26–27
        Identifier, entity, 179               response to incidents, 415–416      growth by sector 1989–2009, 10f
        Identity theft, 100–101               security officers, 431              MIS and, 9–10
        IEEE 802 Committee, 214               size of problem with, 395–397       security, MIS and, 6–7
        IEEE 802.3 protocol, 214              types of loss, 392–394            Jobs, Steve, 61, 157–159, 227
        IEEE 802.11 protocol, 215           Information systems (IS) security threats  Johanson, Matt, 399
        Irfan View, 235                       organizations and, 400–401        John, Darwin, 38
        If/then rules, 367                    responding to, 397–398            Johnson, Hillary Louise, 486n, 489n
   585   586   587   588   589   590   591   592   593   594   595