Page 592 - Using MIS
P. 592
560 Index
Mobile systems, 139, 142–145 Normal forms, 184 security threats and, 400–401, 415–416
data, 143–144 Normalization, database, 182–184 SMIS security and, 319–320
defined, 139 Normal operation, system procedure security Organizations, data mining applications and,
future of, 147–149 and, 413–414f 359–363
people/workers, and use of, 144–145 NoSQL databases, 188–189 decision tree, 362–363
procedures of use, 144 NSA. See National Security Agency market-basket analysis, 360–362
software, 142–143 supervised data mining, 360
mobiThinking, 142 O unsupervised data mining, 359–360
Modern-style applications, 127, 127f Objective-C, 143 Organizations, data reporting applications and,
Modules, 268 Object Management Group (OMG), 464 355–359
Monetize, 308 Object-oriented language, 136 basic reporting operations, 355
MongoDB software, 188 Off-the-shelf software, 131, 369 online analytical processing (OLAP), 356–359
Moore, Gordon, 5 OLAP cube, 357. See also Online analytical RFM analysis, 355–356
Moore’s Law, 5–6, 7 processing Organizations, effective SMIS and, 313–316
Moretti, Marcus, 312 OneDrive, 9, 46, 52 goals and, 313–314
Mulder, Susan, 316n One-of-a-kind application, 131, 132f personal connections and, 315–316
Müller, Martin U., 342n One-to-many relationships (1:N), 181, 185f success metrics and, 314
Multinational corporations, 515. See also Global Online analytical processing (OLAP), 356–359 target audience and, 314–315
entries Online sales, 1. See also Amazon.com values and, 315
Multiuser processing, 178 Online vendors, showrooming and, 140–141 Organizations, IS planning and, 433–435
Musil, Steven, 122n Open source software, 132, 134–135, 170 align IS with organizational strategy, 433–435
MYSQL open source software, 132, 170 OpenSSL cryptographic library, 150 communicate issues to executive group, 435
Opera (browser), 126 develop priorities in IS department, 435
N Operating systems (OS), 125–129 steering committee, sponsor, 435
NASDAQ stock exchange, 157, 245–246 GNU, open source, 132 Organizations, knowledge management (KM)
National Institute of Standards and Technology major, 126f role in, 366–371
(NIST), 413 mobile client, 126f, 128 content management challenges of, 368
National Security Agency (NSA), 416, 418–419 nonmobile client operating systems, 126f, content management applications
data center, 119 127 alternatives, 369–370
PRISM program, NSA, 399, 416, 418–419 server, 126f, 128 content management systems, 368
National Semiconductor, 116 Operational data, problems with, 350–351, 354 expert systems, 367–368
Native applications, 126 Operational decisions, 42 hyper-social KM alternative media, 370
characteristics of, 136f Operations hyper-social knowledge sharing, 371
developing, 136–137 IS department and, 430f, 431 hyper-social organizations, 369–370
web app vs., 139 social media and, 301 Organizations, social media and
Natural disasters, physical IS security and, 512 Optical discs, portable storage media, 116 Facebook, 304–305
Natural events/disasters, threats, 392 Oracle (customer relationship management future of, 323–325
Neiman Marcus, data theft, 395, 431 (CRM) software), 125 inappropriate content, 321–323
Nemanich, Louise, 23 Oracle Database, 170 responding to problems, 321–322
Nessus, security tool, 414, 415 Order extract, 346f revenue from social media, 308–309, 312
Nestlé, 322 Oregon Health Authority (OHA), 289–290 social media content, 321–322
Net Applications, 127, 128 Organizational feasibility, 472 social media policies, 319–320
Netflix, 218 Organizational strategy, information systems social media use, 295
Net neutrality, carriers and, 217–218 and, 83–84 Ostroumow, Sergej, 512
Net savings, in cost, 99 analysis role of industry structure, 85, 88 O’Toole, Quentin, 512
Network(s) determining industry structure, 84–85 Outbound logistics, social media and, 301
cloud technology and, 211, 214–217 five forces model of industry strategy, 83–84 Outsourcing information systems, 438–443
supply chain as, 508 value chain structure, 88–90 alternatives to, 440–441
types of, 211f, 214 Organizations cost reduction, 439
Network of Employers for Traffic Safety, 123n application software use and, 131 cost vs. benefit, 448–49
Neural networks, 360 BigData applications and, 363, 365–366 international, 439–440
New York Times, The, 352, 398 business intelligence (BI) and. See Business management advantages, 438–439
NeXT computing, 157–158 intelligence (BI) entries risk reduction, 439
Nexus series, 117 business process management and, 461–463 risks of, 441–443
Nichols, Shaun, 151n BYOD devices and, 145–147 Outsourcing relations, 430f, 431
Nielson Company, 142 cloud technology and, 211, 227–229, 231–234 Over the Internet, 209–210
Nike company, 124 customer-centric, 262
Nike FuelBand, wearable computer, 133 data acquisition, 349–351, 354–355 P
Nilson, Donald, 66 enterprise social network (ESN) and, 316–319 PaaS, platform as a service, 227f, 230
94Fifty, smart basketball, 133 future of management of, 445 Packet, 217
N:M (many-to-many relationships), 181, 186f human safeguards, security and, 409–415 Packet-filtering firewalls, 406, 407
Nonaka, Ikujiro, 486 incident-response plan, 415–416 Packet sniffer, 240
Nonemployee personnel, human security information silos and, 259 Padmanabhan, V., 509n
safeguards, 412 internal risks, from social media, 322–323 PageMaker, 131
Nonmobile client operating systems, 126f, 127 of IS department, 429–433 Paint Shop Pro, 131
Nonroutine cognition, skills for, 7f multinational. See Global entries Paired programming, 487
Nonvolatile memory, 119 privacy, security and, 402–403, 419 PalTalk, 418

