Page 596 - Using MIS
P. 596

564       Index

        Unresolved bug, 476f                Vine, 6                             WhiteHat Security, 399
        Unresolved failure, 476f            Viral hook, 296                     Wholsen, Marcus, 108n
        Unstructured decision, 43           VirtualBox, 129                     “Why the World Isn’t Flat” (Ghemawat), 501–502
        Unsupervised data mining, 359–360   Virtualization, computer software and, 129–130  Wide area network (WAN), 214, 217
        URL (uniform resource locator), 219  Virtual machine (vm), 129, 130f    WikiLeaks, 392
        USB flash drives, 116               Virtual meetings, 48, 49            Wikimedia Foundation, 309n
        U.S. Bureau of Labor Statistics, 9, 26, 390n  Virtual private clouds (VPC), 233–234  Wikipedia, 75, 151
        U.S. Department of Commerce, 219    Virtual private networks (VPNs), 231–232  Wilfong, Kevin, 119n
        U.S. Department of Defense, 131, 467  Virus, computer, malware, 407     Willis, David, 145
        Use increases value, 309            Vishen, Neeraj, 340n                Windows RT, 126f, 128
        User-generated content (UGC), 321   VisualBasic, computer language, 175  Windows Server, 126f, 128
        User interface, computer operating system, 125  VMWare Workstation, 129   hosting two virtual machines, 129f
        User(s)                             Vodafone, data theft, 395           Winehouse, Amy, 320
          IS, rights and responsibilities, 443–445  Vogel, Werner, 188n         Winklevoss, Cameron, 303
          role in database development, 187  Volatile memory, 119               Winklevoss, Tyler, 303
          social media, 295                 Volume data, 363                    Wireless connectivity, 139, 217
          Super Users, 272                  VPNs, virtual private networks, 231–232  Wireless LAN, 215
        Users in motion, 139                Vulnerability, security and, 390–391  Wong, Vanessa, 125n
        User tier, 220–221                                                      Work breakdown structure (WBS), 477–478
        Usurpation, 393                     W                                   Workflow control, version management, 60
        Utilitarianism, ethics and, 56–57   Wadleigh, Jim, 288–289              Workflow problems, 264
                                            Wahlman, Anton, 22n                 Workgroup information system, 253
        V                                   Wallach, Deborah A., 188n           Workgroup processes, 253–254
        Vadon, Mark, 31–33                  Wall Street Journal, The, 153, 309  Work of Nations, The (Reich), 7n, 237
        Vagata, Pamela, 119n                Walmart, 119                        Worm, as computer malware, 407
        Valentine, Brian, 75                  bribery scandal, 512              WORM (write once, read many times) devices,
        Value, 88                             supply chain, 508, 509f              245–246
        Value, business processes and, 90–92  WANs (wide area networks), 214, 217  WSDL (Web Services Description Language),
        Value chain                         WAN wireless connection, 217           225–227
          activities, 299f                  Wardrivers, 393                     Wyatt, Edward, 419n
          for Bicycle Rental Companies, 93f  Warner, Bernhard, 322n             Wyman, Nancy, 288
          business processes, global economy and,   Warnick, Jennifer, 121n
           503–504                          Waterfall method, 483               X
        Value chain structure, 88–90        Watson, Ivan, 511n                  XML (eXtensible Markup Language), 225–227
          business process and, 90–92       Wearable computing devices, 133
          linkages, 90                      Web 2.0, 317                        Y
          primary activities in, 88–89      Web ads, 312                        Yahoo!, 22, 151, 418
        Value of social capital, 303        Web application, 126                Yammer, social media, 304–305, 318
        van Diggelen, Wouter, 49n             characteristics of, 136f          Yarow, Jay, 308n
        Vanity metrics, 314                   developing, 137–139               YouTube, 6, 151
        Variety, data, 363                    native app vs., 139                 PRISM and, 418
        Vaughn-Nichols, Steven J., 128n     Webex.com (webinar app), 49
        Velocity                            Webinar, 49                         Z
          data, 363                         Web page, 220–221                   Zachary, Raven, 452
          tasks and, 489                    Web servers, 220–221                ZB (zettabyte), 118
        Vera, Dusya, 23                     Web services, organizational internal use of,   ZDNet, 152
        Version control, shared content and, 58–60  228–229                     Zettabyte (ZB), 118
          document checkout, 59             Web services, protocols supporting, 224–227  Zetter, Kim, 418n
          permission-limited activity, 59     Internet protocols: ftp, http, https, smtp,   Zuckerberg, Mark, 143, 303
          version history, 59                  224–225                          zulily, 6, 14, 220f, 221f
          workflow control, 60                TCP/IP protocol architecture, 224   business model, 31–32
        Version management, Google Drive,     WSDL, SOAP, XML, JSON, 225–227      growth-management problems, 33
           53–55, 58                        Web Services Description Language (WSDL),   how they did it, 32
        Vertical-market application, 131, 132f  225–227                           learning from, 33
        Vetvik, Ole Jorgen, 316n            Whang, S., 509n                       merchandise variety, 31f
        Vice president of information services, 430  WhatsApp, 316                performance, 32f
        Videoconferencing, 49, 50f          Whiteboard, use in meetings, 48–49    technology use, 32–33
   591   592   593   594   595   596   597