Page 595 - Using MIS
P. 595

Index      563

             software components, 297–298       Swift programming language, 136     Team capability, growth of, 41. See also
             strength, increase relationship, 306–307  Swim-lane layout, 464–466       Collaboration entries
             users, 295                         Switching costs, 95                 Team survey, collaboration and, 51, 51f
            Social media plan development, 313f  Symbian, mobile client OS, 126f, 128  Technical feasibility, 469
            Social media providers, 294         Symmetric encryption, 405           Technical safeguards, security threats and, 401,
            Social networks, 294                Synchronous communication, 48          404–408
            Social Security, 7                  System, defined, 11                 Technology
            Soft targets, 412                   System conversion, 475–476           change in, BPM and, 462
            Software, 11, 11f, 125–132. See also   System errors, 393                future of, 22–23
               Applications; Computer software  System implementation, 475–477       keep up to date on new, 152–153
             Adobe, cloud technology and, 238–239  system conversion, 475–476        zulily use of, 32–33
             database, 170–172                   testing, 475                       Technology office, IS organization and, 430
             Heartbleed vulnerability, 150–151  System maintenance, 476–477         Telediagnosis, 236
             localizing, 504–505                Systems analysts, 26                Telelaw enforcement, 237
             mobile, 142–143                    Systems development life cycle (SDLC)  Teleperformance.com, 101
             mobile device agreement (MDM), 147  assess feasibility, 469, 472       Telephones, DSL lines and, 216
             for SMIS, 297–298                   component design phase, 474f       Telesurgery, 236–237
             updates, malware and, 408           define system goals/scope, 469     Terabyte (TB), 118
            Software as a service (SaaS), 227–228, 227f, 230  definition phase, 469f  Termination, employee, security safeguards
            SOHO (small office home office) LAN, 216  design system components, 474–477  and, 411–412
            Solid-state storage (SSD drive), 116  five phases of, 468f              Testing, system, 475
            Sorting, data, 355                   implementation phase, 475f         Test plan, 475
            Source code, 134                     maintain system, 476–477           Text mining, 241
            Spence, Michael, 9, 9n               project team, form, 472            Theft by SQL injection, 190–191
            Spoofing, 393                        requirements analysis phase, 472–474. See   Thick-client applications, 126
            Spreadsheet example, 164f              also Requirement(s)              Thinking, quality of, 13
            Spying, on employees, 240–241        scrum and, 483–490                 Third-party cookie, 381
            Spyware programs, 407                system maintenance phase, 477f     Threat, security and, 390–391
            SQL injection                        trends in, future of, 490–491      Threat/loss, 390–391
             attack, 408                        Systems development life cycle (SDLC), project   Threats
             theft by, 190–191                     management                        computer crime, 391
            SQL Server, 170                      adjust plan via trade-offs, 481–482  human error, 391
            SQL Server Report manager, 372       challenges, manage development,     natural events/disasters, 392
            Stallman, Richard Matthew, 132         482–483                           organizations, respond to security, 400–401
            Standard blueprint, ERP and, 282–283  Gantt Chart of project definition    responding to security, 397–398
            Stand-up, 487                          phase, 479f                       safeguards against, 401, 404–408
            Starting phase, of project management, 45  project plan, create, 479–480  3D printing (additive manufacturing), 2,
            Static reports, 371                  time and costs, estimate, 478–479     124–125, 124f, 133
            Steering committee, organizations sponsor, 435  work breakdown structure, 477–478  Three-tier architecture, 220–221, 223–224
            Steinhafel, Gregg, 425              Systems procedures, security and, 413–414  Tiffany & Co., 158
            Stinson, Liz, 124n                  Systems thinking skills, 7, 8       Time, estimating cost and, SDLC and, 478–479
            Stone, Brad, 120                                                        Timeliness, of information, 19
            Storage hardware, 116               T                                   Time-sharing vendors, 211
            Stored procedure, 272               Tableau, 6                          Top Level Project (TLP), 188
            Strategic decisions, 43             Tables, databases, 165              Torvalds, Linus, 132
            Strength of a relationship, 306–307  Tablet computers, 116–117          Tradable job, 9
            Strong password, 24                 Tahmincioglu, Eve, 339n             Trade-offs, adjust plan via, 481–482
            Structured business processes, 299  Takeuchi, Hirotaka, 486             Train the trainer, 272
            Structured decision, 43             Target                              Transition problems, enterprise systems and,
            Structured processes, 252–253f       defining, 390                         276
            Structured query language (SQL), 171  security and, 390–391             Transport Layer Security (TLS), 405. 406f
            Sturdevant, Matthew, 288n, 289n     Target audience, 314–315            Trigger, computer program, 271–272
            Stuxnet (computer virus), 394, 416  Target Corp. data theft, 395, 424–426  Trojan horse, computer malware, 407, 424–426
            Subscription, 372                   Task dependency, 45                 Trojan.POSRAM, 425
            Success metrics, 314                Task management, collaboration tools and, 60,   True demand information, 510–511f
            Sufficiency, of information, 19        62–63                            Tunnel, VPN and, 232
            Super Users, 272                     sample task list using Google Grid, 62f  Tuysuz, Gul, 511n
            Supervised data mining, 360          SharePoint, sharing task list using, 62–63  Twitter, 6, 294, 332
            Supply chain                         sharing task list, Google Grid, 62
             information in, 508–509            TB (terabyte), 118                  U
             global, 507–511                    TCP/IP protocol architecture, 224   Ubuntu (open source OS), 132
             relationships/example, 507f, 508f  Team, collaboration tools for, 63–67  UHDTV (Ultra High Definition Television), 133
            Support, 361                         assessing, 65–66                   Unauthorized data disclosure, 392–393
            Support activities, of value chain, 88–90  comprehensive collaboration tool set, 65  Unified Modeling Language (UML), 179
            Surveymonkey.com, 51                 good collaboration tool set, 64–65  Unified process, 485
            Survey report, sample, 51f           minimal collaboration tool set, 64  Uniform resource locator (URL), 219
            Sutherland, Jeff, 486                people components, 66              Unix operating system, 126f, 127, 128, 132
   590   591   592   593   594   595   596   597