Page 595 - Using MIS
P. 595
Index 563
software components, 297–298 Swift programming language, 136 Team capability, growth of, 41. See also
strength, increase relationship, 306–307 Swim-lane layout, 464–466 Collaboration entries
users, 295 Switching costs, 95 Team survey, collaboration and, 51, 51f
Social media plan development, 313f Symbian, mobile client OS, 126f, 128 Technical feasibility, 469
Social media providers, 294 Symmetric encryption, 405 Technical safeguards, security threats and, 401,
Social networks, 294 Synchronous communication, 48 404–408
Social Security, 7 System, defined, 11 Technology
Soft targets, 412 System conversion, 475–476 change in, BPM and, 462
Software, 11, 11f, 125–132. See also System errors, 393 future of, 22–23
Applications; Computer software System implementation, 475–477 keep up to date on new, 152–153
Adobe, cloud technology and, 238–239 system conversion, 475–476 zulily use of, 32–33
database, 170–172 testing, 475 Technology office, IS organization and, 430
Heartbleed vulnerability, 150–151 System maintenance, 476–477 Telediagnosis, 236
localizing, 504–505 Systems analysts, 26 Telelaw enforcement, 237
mobile, 142–143 Systems development life cycle (SDLC) Teleperformance.com, 101
mobile device agreement (MDM), 147 assess feasibility, 469, 472 Telephones, DSL lines and, 216
for SMIS, 297–298 component design phase, 474f Telesurgery, 236–237
updates, malware and, 408 define system goals/scope, 469 Terabyte (TB), 118
Software as a service (SaaS), 227–228, 227f, 230 definition phase, 469f Termination, employee, security safeguards
SOHO (small office home office) LAN, 216 design system components, 474–477 and, 411–412
Solid-state storage (SSD drive), 116 five phases of, 468f Testing, system, 475
Sorting, data, 355 implementation phase, 475f Test plan, 475
Source code, 134 maintain system, 476–477 Text mining, 241
Spence, Michael, 9, 9n project team, form, 472 Theft by SQL injection, 190–191
Spoofing, 393 requirements analysis phase, 472–474. See Thick-client applications, 126
Spreadsheet example, 164f also Requirement(s) Thinking, quality of, 13
Spying, on employees, 240–241 scrum and, 483–490 Third-party cookie, 381
Spyware programs, 407 system maintenance phase, 477f Threat, security and, 390–391
SQL injection trends in, future of, 490–491 Threat/loss, 390–391
attack, 408 Systems development life cycle (SDLC), project Threats
theft by, 190–191 management computer crime, 391
SQL Server, 170 adjust plan via trade-offs, 481–482 human error, 391
SQL Server Report manager, 372 challenges, manage development, natural events/disasters, 392
Stallman, Richard Matthew, 132 482–483 organizations, respond to security, 400–401
Standard blueprint, ERP and, 282–283 Gantt Chart of project definition responding to security, 397–398
Stand-up, 487 phase, 479f safeguards against, 401, 404–408
Starting phase, of project management, 45 project plan, create, 479–480 3D printing (additive manufacturing), 2,
Static reports, 371 time and costs, estimate, 478–479 124–125, 124f, 133
Steering committee, organizations sponsor, 435 work breakdown structure, 477–478 Three-tier architecture, 220–221, 223–224
Steinhafel, Gregg, 425 Systems procedures, security and, 413–414 Tiffany & Co., 158
Stinson, Liz, 124n Systems thinking skills, 7, 8 Time, estimating cost and, SDLC and, 478–479
Stone, Brad, 120 Timeliness, of information, 19
Storage hardware, 116 T Time-sharing vendors, 211
Stored procedure, 272 Tableau, 6 Top Level Project (TLP), 188
Strategic decisions, 43 Tables, databases, 165 Torvalds, Linus, 132
Strength of a relationship, 306–307 Tablet computers, 116–117 Tradable job, 9
Strong password, 24 Tahmincioglu, Eve, 339n Trade-offs, adjust plan via, 481–482
Structured business processes, 299 Takeuchi, Hirotaka, 486 Train the trainer, 272
Structured decision, 43 Target Transition problems, enterprise systems and,
Structured processes, 252–253f defining, 390 276
Structured query language (SQL), 171 security and, 390–391 Transport Layer Security (TLS), 405. 406f
Sturdevant, Matthew, 288n, 289n Target audience, 314–315 Trigger, computer program, 271–272
Stuxnet (computer virus), 394, 416 Target Corp. data theft, 395, 424–426 Trojan horse, computer malware, 407, 424–426
Subscription, 372 Task dependency, 45 Trojan.POSRAM, 425
Success metrics, 314 Task management, collaboration tools and, 60, True demand information, 510–511f
Sufficiency, of information, 19 62–63 Tunnel, VPN and, 232
Super Users, 272 sample task list using Google Grid, 62f Tuysuz, Gul, 511n
Supervised data mining, 360 SharePoint, sharing task list using, 62–63 Twitter, 6, 294, 332
Supply chain sharing task list, Google Grid, 62
information in, 508–509 TB (terabyte), 118 U
global, 507–511 TCP/IP protocol architecture, 224 Ubuntu (open source OS), 132
relationships/example, 507f, 508f Team, collaboration tools for, 63–67 UHDTV (Ultra High Definition Television), 133
Support, 361 assessing, 65–66 Unauthorized data disclosure, 392–393
Support activities, of value chain, 88–90 comprehensive collaboration tool set, 65 Unified Modeling Language (UML), 179
Surveymonkey.com, 51 good collaboration tool set, 64–65 Unified process, 485
Survey report, sample, 51f minimal collaboration tool set, 64 Uniform resource locator (URL), 219
Sutherland, Jeff, 486 people components, 66 Unix operating system, 126f, 127, 128, 132

