Page 592 - Using MIS
P. 592

560       Index

        Mobile systems, 139, 142–145        Normal forms, 184                     security threats and, 400–401, 415–416
          data, 143–144                     Normalization, database, 182–184      SMIS security and, 319–320
          defined, 139                      Normal operation, system procedure security   Organizations, data mining applications and,
          future of, 147–149                   and, 413–414f                       359–363
          people/workers, and use of, 144–145  NoSQL databases, 188–189           decision tree, 362–363
          procedures of use, 144            NSA. See National Security Agency     market-basket analysis, 360–362
          software, 142–143                                                       supervised data mining, 360
        mobiThinking, 142                   O                                     unsupervised data mining, 359–360
        Modern-style applications, 127, 127f  Objective-C, 143                  Organizations, data reporting applications and,
        Modules, 268                        Object Management Group (OMG), 464     355–359
        Monetize, 308                       Object-oriented language, 136         basic reporting operations, 355
        MongoDB software, 188               Off-the-shelf software, 131, 369      online analytical processing (OLAP), 356–359
        Moore, Gordon, 5                    OLAP cube, 357. See also Online analytical   RFM analysis, 355–356
        Moore’s Law, 5–6, 7                    processing                       Organizations, effective SMIS and, 313–316
        Moretti, Marcus, 312                OneDrive, 9, 46, 52                   goals and, 313–314
        Mulder, Susan, 316n                 One-of-a-kind application, 131, 132f  personal connections and, 315–316
        Müller, Martin U., 342n             One-to-many relationships (1:N), 181, 185f  success metrics and, 314
        Multinational corporations, 515. See also Global   Online analytical processing (OLAP), 356–359  target audience and, 314–315
           entries                          Online sales, 1. See also Amazon.com  values and, 315
        Multiuser processing, 178           Online vendors, showrooming and, 140–141  Organizations, IS planning and, 433–435
        Musil, Steven, 122n                 Open source software, 132, 134–135, 170  align IS with organizational strategy, 433–435
        MYSQL open source software, 132, 170  OpenSSL cryptographic library, 150  communicate issues to executive group, 435
                                            Opera (browser), 126                  develop priorities in IS department, 435
        N                                   Operating systems (OS), 125–129       steering committee, sponsor, 435
        NASDAQ stock exchange, 157, 245–246   GNU, open source, 132             Organizations, knowledge management (KM)
        National Institute of Standards and Technology   major, 126f               role in, 366–371
           (NIST), 413                        mobile client, 126f, 128            content management challenges of, 368
        National Security Agency (NSA), 416, 418–419  nonmobile client operating systems, 126f,   content management applications
          data center, 119                     127                                 alternatives, 369–370
          PRISM program, NSA, 399, 416, 418–419  server, 126f, 128                content management systems, 368
        National Semiconductor, 116         Operational data, problems with, 350–351, 354  expert systems, 367–368
        Native applications, 126            Operational decisions, 42             hyper-social KM alternative media, 370
          characteristics of, 136f          Operations                            hyper-social knowledge sharing, 371
          developing, 136–137                 IS department and, 430f, 431        hyper-social organizations, 369–370
          web app vs., 139                    social media and, 301             Organizations, social media and
        Natural disasters, physical IS security and, 512  Optical discs, portable storage media, 116  Facebook, 304–305
        Natural events/disasters, threats, 392  Oracle (customer relationship management   future of, 323–325
        Neiman Marcus, data theft, 395, 431    (CRM) software), 125               inappropriate content, 321–323
        Nemanich, Louise, 23                Oracle Database, 170                  responding to problems, 321–322
        Nessus, security tool, 414, 415     Order extract, 346f                   revenue from social media, 308–309, 312
        Nestlé, 322                         Oregon Health Authority (OHA), 289–290  social media content, 321–322
        Net Applications, 127, 128          Organizational feasibility, 472       social media policies, 319–320
        Netflix, 218                        Organizational strategy, information systems   social media use, 295
        Net neutrality, carriers and, 217–218  and, 83–84                       Ostroumow, Sergej, 512
        Net savings, in cost, 99              analysis role of industry structure, 85, 88  O’Toole, Quentin, 512
        Network(s)                            determining industry structure, 84–85  Outbound logistics, social media and, 301
          cloud technology and, 211, 214–217  five forces model of industry strategy, 83–84  Outsourcing information systems, 438–443
          supply chain as, 508                value chain structure, 88–90        alternatives to, 440–441
          types of, 211f, 214               Organizations                         cost reduction, 439
        Network of Employers for Traffic Safety, 123n  application software use and, 131  cost vs. benefit, 448–49
        Neural networks, 360                  BigData applications and, 363, 365–366  international, 439–440
        New York Times, The, 352, 398         business intelligence (BI) and. See Business   management advantages, 438–439
        NeXT computing, 157–158                intelligence (BI) entries          risk reduction, 439
        Nexus series, 117                     business process management and, 461–463  risks of, 441–443
        Nichols, Shaun, 151n                  BYOD devices and, 145–147         Outsourcing relations, 430f, 431
        Nielson Company, 142                  cloud technology and, 211, 227–229, 231–234  Over the Internet, 209–210
        Nike company, 124                     customer-centric, 262
        Nike FuelBand, wearable computer, 133  data acquisition, 349–351, 354–355  P
        Nilson, Donald, 66                    enterprise social network (ESN) and, 316–319  PaaS, platform as a service, 227f, 230
        94Fifty, smart basketball, 133        future of management of, 445      Packet, 217
        N:M (many-to-many relationships), 181, 186f  human safeguards, security and, 409–415  Packet-filtering firewalls, 406, 407
        Nonaka, Ikujiro, 486                  incident-response plan, 415–416   Packet sniffer, 240
        Nonemployee personnel, human security   information silos and, 259      Padmanabhan, V., 509n
           safeguards, 412                    internal risks, from social media, 322–323  PageMaker, 131
        Nonmobile client operating systems, 126f, 127  of IS department, 429–433  Paint Shop Pro, 131
        Nonroutine cognition, skills for, 7f  multinational. See Global entries  Paired programming, 487
        Nonvolatile memory, 119               privacy, security and, 402–403, 419  PalTalk, 418
   587   588   589   590   591   592   593   594   595   596   597