Page 594 - Using MIS
P. 594
562 Index
Resources size of problem, 395–397 Simple Mail Transfer Protocol (smtp), 225
BPM and, 461 SMIS, organizations and, 319–320 Sims, Chris, 486n, 489n
changing process, 256 Security, global IS and, 511–513 Singer, Natasha, 352n
connect to, social media and, 307–308 cultural norms, 512–513 Singe sign-on, for multiple systems, 404
Revenue models, social media and, 308–309 legal environment, 511–512 Singularity, the, 373, 490
freemium revenue model, 309 physical security, 512 Site license, 130
mobility reducing online ad revenue?, 312 Security Guide (feature) Skills
RFM analysis, organizational use of, 355–356, cloud technology, 238–239 collaboration, 38–39
356f collaboration, securing, 68–69 job security and, 6–7
Rich directory, 370 data integration and, 280–281 nonroutine, MIS and, 7–10
Risk, managing employee communication and, data theft, 100–101 Skype, 49, 418
319–320 Heartbleed vulnerability, 150–151 SLATES, enterprise model, 317, 370
Risk reduction, outsourcing and, 439 industrial espionage, 492–493 SM. See Social media
Risks, of outsourcing, 441–443 IS security, 446–447 Small office or a home office (SOHO), 214
benefits vs. long-term costs, 442 NSA PRISM program, 418–419 Smart cards, security and, 404
loss of control, 441–442 passwords and etiquette of, 24–25 Smart device, 120, 133
no easy exit, 442–443 semantic security, 374–375 Smart Home, 148–149f
Roles, in BPM, 461 social recruiting, securing, 326–327 Smartphones, 116f, 117, 128, 215, 235
Rolls-Royce, 503–504 theft by SQL injection, 190–191 ad clicks and, 312
Rosenbach, Marcel, 342n Security monitoring, 414–415 development, 120f
Rosseau, Jean Jacques, 419 Security officers, IS department, 431 Smartwatches, 133
Rowe, Mark, 240n Security safeguards, 401f SMIS. See social media information system
Rows, databases, 165 Security threats, safeguards against, 401, Smith, Cooper, 315n
404–408 Smith, Craig, 235n
S biometric authentication, 404 Smith, Vernon, 298
SaaS (software as a service), 227–228, 227f, 230 design, for secure applications, 408 smtp (Simple Mail Transfer Protocol), 225
Safari, browser, 224 encryption, 404–406 Sniffing, 393
Safeguard, security and, 390–391 firewalls, 406–407 Snowden, Edward, 399, 416, 419
Sales, social media and, 299–300 how they work, 409 SOA. See Service-oriented architecture (SOA)
Salesforce.com, 304–305 human safeguards, 409–415. See also Human SOAP protocol, 225–227
Samsung Galaxy S5, 117 safeguards, security threats and Social Contract or Principles of Political Right,
SAS Institute Inc., 119n identification, authentication and, 401, 404 The (Rosseau), 419
Savage, Charlie, 419n malware protection/safeguards, 407–408 Social CRM, 300
Schedule feasibility, 469 organizations response to, 415–416 Social media
Schnuck Markets, data theft, 395 safeguards, future of, 416–417 content, problematic, 321–322
Schone, Mark, 419n single sign-on, for multiple systems, 404 cost-effective business applications and, 6
Schonfeld, Erick, 312n smart cards, 404 enterprise social network (ESN) and, 316–319
Schulz. Thomas, 342n Sedona, Arizona, social media and, 332–335 Facebook for organizations/machines,
Screen-sharing applications, 49 Self-describing, 167 304–305
Scrum, SDLC and, 483–490 Self-driving cars, 121–124 internal risks from, 322–323
agile development principles, 485–486 Self-efficacy, 276 knowledge management and, 366
characteristics of, 489–490 Semantic security, 374–375 PRIDE system and, 291–292, 297, 316, 330
essentials, 486–487 Server, 125f redesigning enterprises for, 324f
period of work, 487f Server, computer, 116f, 117 revenue from, 308–309, 312
requirements and process of, 488–490 Server farm, 116f, 117, 117f social capital and, 302–303, 305–308
requirement tasks, 488 Server operating systems, 126f, 128 social recruiting, security and, 326–327
scheduling tasks, 489 Server tier, 220–221 work computers, use of on, 436–437
summary of estimation techniques, 489f Server virtualization, 129–130 Social media information system (SMIS)
velocity, finish tasks, 489 Service-oriented architecture (SOA), 222–224 communities, 295–297
Sculley, John, 157 SOA analogy, 222–223 connect with resources using, 307–308
Scumniotales, John, 486 for three-tier architecture, 223–224 customer service and, 300
SDLC. See Systems development life cycle Shared content, collaboration tools and, 51–55, data, 298
SDTV (Standard Definition Television), 133 58–60 defining, 294–299
Search engines, 369 no control, 53 employee communication, 319–320
Secured connection, 68 version control, 58–60 hardware components, 297
Secure Sockets Layer (SSL), 405, 406f version management, Google Drive, 53–55, human resources and, 301–302
Securities and Exchange Commission (SEC), 58 inappropriate content, 321–323
245 SharePoint, 9, 52 inbound/outbound logistics, 301
Security share task list using, 62–63 increase relationship numbers, 305–306
browser-based apps and, 176 version/workflow control and, 58–60 manufacturing and operations and, 301
cloud technology and, 231–234, 238–239 SharePoint for Students (Cole, Fox & Kroenke), organizational strategy, 299–302
information systems and, 12. See also 60 organizations develop, 313–316
Information systems (IS) security Shear, Michael, 419n people and, 298–299
personal safeguards, 397f Sherr, Ian, 158n procedures, 298
PRIDE and, 408, 422 Shinal, John, 309n sales/marketing activities and, 299–300
privacy and, 418–419 Showrooming, 140–141 social capital and, 302–303, 305–308
semantic, 374–375 Siemens, 151 social media providers, 294

