Page 594 - Using MIS
P. 594

562       Index

        Resources                             size of problem, 395–397          Simple Mail Transfer Protocol (smtp), 225
          BPM and, 461                        SMIS, organizations and, 319–320  Sims, Chris, 486n, 489n
          changing process, 256             Security, global IS and, 511–513    Singer, Natasha, 352n
          connect to, social media and, 307–308  cultural norms, 512–513        Singe sign-on, for multiple systems, 404
        Revenue models, social media and, 308–309  legal environment, 511–512   Singularity, the, 373, 490
          freemium revenue model, 309         physical security, 512            Site license, 130
          mobility reducing online ad revenue?, 312  Security Guide (feature)   Skills
        RFM analysis, organizational use of, 355–356,   cloud technology, 238–239  collaboration, 38–39
           356f                               collaboration, securing, 68–69      job security and, 6–7
        Rich directory, 370                   data integration and, 280–281       nonroutine, MIS and, 7–10
        Risk, managing employee communication and,   data theft, 100–101        Skype, 49, 418
           319–320                            Heartbleed vulnerability, 150–151  SLATES, enterprise model, 317, 370
        Risk reduction, outsourcing and, 439  industrial espionage, 492–493     SM. See Social media
        Risks, of outsourcing, 441–443        IS security, 446–447              Small office or a home office (SOHO), 214
          benefits vs. long-term costs, 442   NSA PRISM program, 418–419        Smart cards, security and, 404
          loss of control, 441–442            passwords and etiquette of, 24–25  Smart device, 120, 133
          no easy exit, 442–443               semantic security, 374–375        Smart Home, 148–149f
        Roles, in BPM, 461                    social recruiting, securing, 326–327  Smartphones, 116f, 117, 128, 215, 235
        Rolls-Royce, 503–504                  theft by SQL injection, 190–191     ad clicks and, 312
        Rosenbach, Marcel, 342n             Security monitoring, 414–415          development, 120f
        Rosseau, Jean Jacques, 419          Security officers, IS department, 431  Smartwatches, 133
        Rowe, Mark, 240n                    Security safeguards, 401f           SMIS. See social media information system
        Rows, databases, 165                Security threats, safeguards against, 401,   Smith, Cooper, 315n
                                               404–408                          Smith, Craig, 235n
        S                                     biometric authentication, 404     Smith, Vernon, 298
        SaaS (software as a service), 227–228, 227f, 230  design, for secure applications, 408  smtp (Simple Mail Transfer Protocol), 225
        Safari, browser, 224                  encryption, 404–406               Sniffing, 393
        Safeguard, security and, 390–391      firewalls, 406–407                Snowden, Edward, 399, 416, 419
        Sales, social media and, 299–300      how they work, 409                SOA. See Service-oriented architecture (SOA)
        Salesforce.com, 304–305               human safeguards, 409–415. See also Human   SOAP protocol, 225–227
        Samsung Galaxy S5, 117                 safeguards, security threats and  Social Contract or Principles of Political Right,
        SAS Institute Inc., 119n              identification, authentication and, 401, 404  The (Rosseau), 419
        Savage, Charlie, 419n                 malware protection/safeguards, 407–408  Social CRM, 300
        Schedule feasibility, 469             organizations response to, 415–416  Social media
        Schnuck Markets, data theft, 395      safeguards, future of, 416–417      content, problematic, 321–322
        Schone, Mark, 419n                    single sign-on, for multiple systems, 404  cost-effective business applications and, 6
        Schonfeld, Erick, 312n                smart cards, 404                    enterprise social network (ESN) and, 316–319
        Schulz. Thomas, 342n                Sedona, Arizona, social media and, 332–335  Facebook for organizations/machines,
        Screen-sharing applications, 49     Self-describing, 167                   304–305
        Scrum, SDLC and, 483–490            Self-driving cars, 121–124            internal risks from, 322–323
          agile development principles, 485–486  Self-efficacy, 276               knowledge management and, 366
          characteristics of, 489–490       Semantic security, 374–375            PRIDE system and, 291–292, 297, 316, 330
          essentials, 486–487               Server, 125f                          redesigning enterprises for, 324f
          period of work, 487f              Server, computer, 116f, 117           revenue from, 308–309, 312
          requirements and process of, 488–490  Server farm, 116f, 117, 117f      social capital and, 302–303, 305–308
          requirement tasks, 488            Server operating systems, 126f, 128   social recruiting, security and, 326–327
          scheduling tasks, 489             Server tier, 220–221                  work computers, use of on, 436–437
          summary of estimation techniques, 489f  Server virtualization, 129–130  Social media information system (SMIS)
          velocity, finish tasks, 489       Service-oriented architecture (SOA), 222–224  communities, 295–297
        Sculley, John, 157                    SOA analogy, 222–223                connect with resources using, 307–308
        Scumniotales, John, 486               for three-tier architecture, 223–224  customer service and, 300
        SDLC. See Systems development life cycle  Shared content, collaboration tools and, 51–55,   data, 298
        SDTV (Standard Definition Television), 133  58–60                         defining, 294–299
        Search engines, 369                   no control, 53                      employee communication, 319–320
        Secured connection, 68                version control, 58–60              hardware components, 297
        Secure Sockets Layer (SSL), 405, 406f  version management, Google Drive, 53–55,   human resources and, 301–302
        Securities and Exchange Commission (SEC),   58                            inappropriate content, 321–323
           245                              SharePoint, 9, 52                     inbound/outbound logistics, 301
        Security                              share task list using, 62–63        increase relationship numbers, 305–306
          browser-based apps and, 176         version/workflow control and, 58–60  manufacturing and operations and, 301
          cloud technology and, 231–234, 238–239  SharePoint for Students (Cole, Fox & Kroenke),   organizational strategy, 299–302
          information systems and, 12. See also   60                              organizations develop, 313–316
           Information systems (IS) security  Shear, Michael, 419n                people and, 298–299
          personal safeguards, 397f         Sherr, Ian, 158n                      procedures, 298
          PRIDE and, 408, 422               Shinal, John, 309n                    sales/marketing activities and, 299–300
          privacy and, 418–419              Showrooming, 140–141                  social capital and, 302–303, 305–308
          semantic, 374–375                 Siemens, 151                          social media providers, 294
   589   590   591   592   593   594   595   596   597