Page 593 - Using MIS
P. 593
Index 561
Pandora, 6 PRIDE (Performance, Recording, Integration, Project plan, create, SLDC and, 479–480
Panis, Constantijn, W. A., 7n Delivery and Evaluation) system, 247–251, Project team, form a, 472
Parallel installation, 476 254f Protocol, 214
Partitioned database, 506 BI and, 341, 379 Protocols supporting web services, 224–227
Passwords information silos and, 276–277 Prototype. role of, 473–474
etiquette, security and, 24–25 information systems management and, 385 Proudfoot, Jeffrey, 415
management, security and, 413 security and, 408, 422 Public IP address, 218, 219
Payload, 407 social media and, 291–292, 297, 316, 330 Public key encryption, 405
Pay-per-click advertising, 309 Primary activities, of value chain, 88–89 Publishing alternatives, for BI, 371–372
PB (petabyte), 118 Primary key, database, 166 Publish results, 344, 348–349
PC virtualization, 129, 130 Prime Air, Amazon services, 108 Pull publishing, 344
PDF files, 52 Priorities, IS department, 435 Purchasing patterns, 342
Peak, D., 264n Printing, 3D (additive manufacturing), 2, Push publishing, 344
Pebble Steel Smartwatch, 133 124–125, 124f, 133
Peering agreements, 217 PRISM program (NSA), 399, 416, 418–419 Q
People, component-framework and, 11, 11f Privacy Quad-processor, 116
Pepsi-Cola, 157 employee, on work computers, 436–437 Quality improvement, 463
Perfect duty, 21 international, Internet and, 512 Quantcast.com, 315
Perimeter firewall, 406 securing computer, 402–403 Queries, database, 174–178
Permission-limited activity, version control, 59 security vs., 418–419 Quick-Books, 131
Personal brand, developing, 328–329 Privacy Act of 1974, 402 Quick Launch, 76
Personal computers (PCs), 116 Privacy Principles of the Australian Privacy Act
Personal connections, social media and, 315–316 of 1988, 402 R
Personal identification number (PIN), 404, Private cloud, 232–233 RAM (random access memory), 116
420–421 Private IP addresses, 218 RAND Corporation, 7, 157
Personal mobile devices, at work, 145–147 Private key decryption, 405 Rapid application development, 485
Petabyte (PB), 118 Problematic data, 350–351, 354 Rashid, Fahmida Y., 399n
Petrich, Dean, 198–200 Problem-solving Ratio to price to performance, 5–6
Pew Research Center, 151, 295n business intelligence and, 341 Razer Nabu wristband, 133
Pfizer, 102 collaboration and, 44, 48f Recency, data, 355
Phased installation, 476 Procedures, 11, 11f Records, databases, 165
Phisher, 393, 420–421 Process activity, ISs, quality and, 257 Recovery, system procedure, security, 413–414f
Phishing, 393, 420–421 Process blueprints, 272 Recruiting, social media, security and, 326–327
Photoshop, 52, 131 Process effectiveness, 257 RedFlex Group, 237
Physical security Process efficiency, 255 RedHat, 130
data, 409 Processes, basic types of, 251–255 Red Robin, 318
international IS and, 512 enterprise processes, 255 Reduce phase, 365
Picozu.com, 139 inter-enterprise processes, 255 Regression analysis, 360
Pig (Hadoop query language), 366 structured vs. dynamic, 252–253f Reich, Robert, 7, 7n, 237
Pilot installation, 475 workgroup, 253–254 Reisinger, Don, 218
Pinterest, 6, 151, 294 Processes, management of REI ski supplies, 508
PixelSense, 156–157 improve process quality, 461 Relation, 167, 181f, 182f
Pizza Hut, 22 technology, change in, 462 Relational databases, 167, 187–188
Planning. See Enterprise resource planning Process flow, controlling data quality, 257 Relationship among rows (databases), 165–167
(ERP) Processing, on web server, 219–221 Relationships
Planning phase, of project management, 45–46 three-tier architecture, 220–221 entity, 180–182
Platform as a service (PaaS), 227, 230 Process quality, 255–257, 461 representing, in databases, 184–187
Plunge installation, 476 Process structure, changing, 256 social media and, 306–307
•
PMBOK Guide, 514 Product offer pages, 220f Relevancy of information, 19
Pollard, Dave, 38 Product quality assurance (PQA) test Remote action systems, 236
Ponemon Institute, 395–397 engineers, 475 Reorder quantity, 509
Pooled, as cloud attribute, 208–209 Products, competitive advantage via, 95 Replicated database, 506
Portable audio players, 120 Programmers, 26 Reporting applications (data), organizational
Porter, Michael, 83–84, 85n, 88, 89 Objective-C, 143 use of, 355–359
Porter’s Five Forces Model of Industry open source software and, 134, 135 Reports, database, 174–178
Structure, 84f Project data, 46–47 Report servers, 344
Porter’s Four Competitive Strategies, 85f Project management Repository, 90, 461, 464
Position definitions, employee security business intelligence and, 341 Requirement gaps, 275
safeguards, 410–411 global, challenges of, 514–515 Requirement(s)
Poulin, Chris, 424n Project management, collaboration and, approve, 474
Power curve, 65, 65f, 66f 44–46, 48f determine system, 472–474
Pozadzides, John, 397 doing phase, 46 global IS and, 514–515
Prafder, Erika Wetz, 326n finalizing phase, 46 managing/not managing, 499–500
Predictive policing, BI and, 343 planning phase, 45–46 prototype, role of, 473–474
Pretexting, 392 starting phase, 45 sources of, 472–473
Price Check, Amazon.com, 139 tasks, 45f tasks, creating, 488
Price/Performance Ratio of Intel Processors, 6f Project metadata, 46–47 Research and development, security and, 68

