Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
327 Cards in this Set
- Front
- Back
Acceptable use policy (AUP) |
A policy that a user must agree to follow to be provided to a network or to the Internet |
|
Accounting and financing ERP component |
Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management |
|
Adware |
Software that generate ads that install themselves on a computer when a person downloads some other program from the Internet |
|
Affinity grouping |
Determination of which things go together |
|
Agile methodology |
Aims for customer satisfaction through early and continuous delivery of useful software components, developed by an iterative process with a design point that uses the bare minimum requirements |
|
Alliance partners |
Competitor organizations that co-operate with one another since doing so allows them to compete more successfully with other companies |
|
Analysis latency |
The time from which data are made available to the time when analysis is complete |
|
Analysis phase |
Analyzing end-user business requirements and refining project goals into defined functions and operations of the intended systems |
|
Analytical CRM |
Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers |
|
Analytical information |
Encompasses all summarized or aggregated transactional data, and its primary purpose it to support the performing of higher-level analysis tasks |
|
Anti-spam policy |
States that email users will not send unsolicited emails (or spam) |
|
Application architecture |
Determines how applications integrate and relate to each other |
|
Application programming interface (API) |
A set of routines, protocols, and tools for building software applications |
|
Application service provider (ASP) |
A company that offers ab organization access over the Internet to system and related services that would otherwise have to be located in person or organizational computer |
|
Artificial Intelligence (AI) |
Stimulates human intelligence, such as the ability to reason and learn |
|
As-Is process models |
Represent the current state of the operation that has been mapped, without any specific improvement or changes to existing processes |
|
Associate programs (affiliate programs) |
Businesses can generate commissions or royalties from an Internet site |
|
Association detection |
Reveals the degree to which variables are related and the nature and frequency of these relationship in the information |
|
Asynchronous communications |
Communications that occur at the same time, such as instant messaging |
|
Attitudes toward using the portal |
The values, perceptions, and beliefs that end-users have toward using the portal |
|
Attributes |
Characteristics or properties of an entity class |
|
Authentication |
A method of confirming users' identities |
|
Authorization |
The process of giving someone permission to do or have something |
|
Automatic call distribution |
A phone or switch routes inbound calls to available agents |
|
Availability |
Addresses when systems can be accesses by users |
|
Backdoor programs |
Viruses that open a way into the network for future attacks |
|
Backup |
An exact copy or a system's data |
|
Backward Integration |
Takes information entered into a given system and sends it automatically to all upstream systems and processes |
|
Balanced scorecard |
A management system (not only a measurement system) that enables organizations to clarify their vision and strategy and translate them into actions |
|
Bandwith |
The difference between the highest and the lowest frequencies that can be transmitted on a single communication medium; a measure of a communication medium's capacity |
|
Banner ad |
Small ad on one Web site that advertises the products and services of another business, usually another e-business |
|
Benchmarking |
The process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance |
|
Benchmarks |
Baseline values the system seeks to attain |
|
Biometrics |
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting |
|
Black-hat hackers |
Break into other people's computer systems and may just look around or steal and destroy information |
|
Bluetooth |
A telecommunications industry specification that describes how mobile phones, computers, personal digital assistants (PDAs), and tablets can be easily interconnected using a short-range wireless connection |
|
Brick-and-mortar business |
A business that operate in a physical store without an Internet presence |
|
Broadband |
High-speed Internet connections transmitting data at speeds greater than 200 kilobytes per second (Kbps) compared to the 56 Kbps maximum speed offered by traditional dial-up connections |
|
Bullwhip effect |
Occurs when distorted product demand information passes from one entity to the next throughout the supply chain |
|
Business continuity planning |
A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption |
|
Business-critical integrity constraints |
Enforce businesses rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints |
|
Business-driven information system |
Systems that are implemented to support a company's competitive business strategy |
|
Business facing processes |
Invisible to the external customer but essential to the effective management of the business; include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation |
|
Business intelligence |
Applications and technologies that are used to gather, provide access to, and analyze information to support people's decision-making efforts |
|
Business portal |
Synonymous with terms corporate portal, enterprise portal |
|
Business process |
A standardized set of activities that accomplishes a specific task, such as processing a customer's order |
|
Business process improvement |
Attempts to understand and measure a business process and make performance improvements on that process accordingly |
|
Business process management (BPM) |
Integrates all of an organization's business processes to make individual processes more efficent |
|
Business process model |
A graphic description of a process showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint |
|
Business process modelling (or mapping) |
The activity or creating a detailed flow chart, work flow diagram, use case diagram, or process map of a work process showing its inputs, tasks, and activities, in a structured sequence |
|
Business process reengineering (BPR) |
The analysis and redesign of workflow within and between enterprises |
|
Business requirment |
The detailed set of business requests that the system must meet in order to be successful |
|
Business wikis |
Collaborative Web pages that allow users to edit documents, share ideas, or monitor the status of a project |
|
Business-to-business (B2B) |
Applies to businesses buying from and selling to each other over the Internet |
|
Business-to-business (B2B) marketplace |
An internet based service that brings together many buyers and sellers |
|
Business-to-consumer (B2C) |
Applies to any business that sells its products or services to consumers over the Internet |
|
Buyer power |
High when buyers have many choices of whom to buy from and low when their choices are few |
|
Call-scripting systems |
Access organizational databases that track similar issues or questions and automatically generate the details for the CSR who can then relay them to the customer |
|
Campaign management systems |
Guide users through marketing campaigns, performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis |
|
Capacity planning |
Determines the future IT infrastructure requirements for new equipment and additional network capacity |
|
Change control board (CCB) |
Responsible for approving or rejecting all change requests |
|
Change management |
A set of techniques that aid in evolution, composition, and policy management of the design and implementation of a system |
|
Change management system |
Includes a collection of procedures to a document a change request and define the steps necessary to consider the change based on the expected impact of the change |
|
Chief information officer (CIO) |
Responsible for (1) over seeing all uses of information systems and (2) ensuring the strategic alignment of IT with business goals and objectives |
|
Chief knowledge officer (CKO) |
Responsible for collecting, maintaining, and distributing the organization's knowledge |
|
Chief privacy officer (CPO) |
Responsible for ensuring the ethical and legal use of information within an organization |
|
Chief security officer (CS0) |
Responsible for ensuring the security of IT system and developing strategies and IT safe guards against attacks from hackers and viruses |
|
Chief technology officer (CTO) |
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology |
|
Classification |
The assignment of records to one of a predefined set of classes |
|
Click-and-mortar businesses |
A business that operates in a physical store and on the Internet |
|
Clickstream |
Records information about a customer during a Web surfing session, such as what Web sites were visited, how long the visit was, and what as were viewed, and what was purchased |
|
Clickstream data |
Exact pattern of a consumer's navigation through a site |
|
Click-through |
A count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser |
|
Cloud computing |
A form of client/server computing operating over the Internet where the term "cloud" is used as a metaphor for the term Internet |
|
Cluster analysis |
A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible |
|
Clustering |
Segmentation of a heterogeneous population of records into a number of more homogenous subgroups |
|
Cold site |
A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster |
|
Collaboration system |
An IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information |
|
Collaborative demand planning |
Helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability |
|
Collaborative engineering |
Allows an organization to reduce the cost and time require during the design process of a product |
|
Communication space |
Supports discussion among employees, especially for negotiating collective interpretations and shared meanings about the information accesses and retrieved |
|
Competitive advantage |
A product of service than an organization's customers place a greater value on than similar offerings from a competitor |
|
Computer-supported cooperative work (CSCW) |
A field of research concerned with the development and use of software to help groups increase their competency in working together |
|
Confidentiality |
The assurance that messages and information are available only to those who are authorized to view them |
|
Consolidation |
Involves the aggregation of information and features simple roll-ups to complex groups of interrelated information |
|
Consumer-to-business (C2B) |
Applies to any consumers that sells a product or service to a business over the Internet |
|
Consumer-to-consumer (C2C) |
Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet |
|
Contact center (call center) |
Customer service representatives (CSRs) answer customer inquires and respond to problems through a number of different customer touchpoints |
|
Contact management CRM system |
Maintains customer contact information and identifies prospective customers for future sales |
|
Content filtering |
Occurs when organizations use software that filters content to prevent the transmission of unauthorized information |
|
Content management system |
Provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment |
|
Content space |
Facilitates information access and retrieval |
|
Cookie |
A small file deposited on a hard drive by a Web site containing information about customers and their Web activites |
|
Coordination space |
Supports cooperative work action between employees, facilitates workflow processes, and the accomplishment of work tasks |
|
Copyright |
The legal protection afforded an expression of an idea, such as a song, video games, and some types of proprietary documents |
|
Core competency |
An organization's key strength of business function that is does better than any of its competitors |
|
Core competency strategy |
When an organization chooses to focus specifically on what it does best (its core competency) and forms partnerships and alliances with other specialist organizations to handle non-strategic business processes |
|
Core ERP component |
Traditional components included in most ERP systems and they primarily focus on internal operations |
|
Corporate policy |
A dimension of social responsibility that refers to the position a firm takes on social and political issues |
|
Corporate portals |
Synonym with businesses portal, enterprise portal |
|
Corporate responsibility |
A dimension of social responsibility that includes everything from hiring minority workers to making safe products |
|
Counterfeit software |
Software that is manufactured to look like the real thing and is sold as such |
|
Cracker |
A hacker with criminal intent |
|
Critical path |
A path from the start to the finish that passes through all of the tasks that are critical to completing the project in the shortest amount of time |
|
CRM analysis systems |
Help organizations segment their customers into categories such as best and worst customers |
|
CRM manager |
A person in an organization who is held accountable and is responsible for the continued successful rollout of CRM in that organization |
|
CRM predicting systems |
Help organizations make predictions regarding customer behavior, such as which customers are at risk of leaving |
|
CRM reporting systems |
Help organizations identify their customers across other applications |
|
Cross-selling |
Selling additional products or services to a customer |
|
Crowdsourcing |
The most common form of collective intelligence found outside the organizations is crowdsourcing, which refers to the wisdom of the crowd |
|
Cube |
The common term for the representation of multidimensional information |
|
Customer facing processes |
The results in a product or service that is received by an organization's external customer |
|
Customer relationship management (CRM) |
Involves managing all aspects of a customer's relationship with an organization to increased customer loyalty and retention, and an organization's profitability |
|
Cybermediation |
The creation of new kinds of intermediaries that simply could not have existed before the advent of e-business, including comparison-shopping sites such as Citibank |
|
Cyberterrorist |
Seeks to cause harm to people to destroy critical systems or information; uses the Internet as a weapon of mass destruction |
|
Data |
Raw facts that describes the characteristics of an event |
|
Data architecture |
Identifies where and how important data, like customer records, are maintained and secured |
|
Database |
Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses) |
|
Database-based workflow systems |
Store documents in a central location and automatically ask the team members to access the document when it is their turn to edit the document |
|
Database management systems (DBMS) |
Software through which users and application programs interact with a database |
|
Data-driven Web site |
An interactive Web site kept constantly updated and relevant to the needs of its customers through the use of a database |
|
Data integrity |
A measure of the quality of data |
|
Data latency |
The time duration to make data ready for analysis (ie. the time for extracting, transforming, cleansing, and loading the data into a database) |
|
Data mart |
Contains a subset of data warehouse information |
|
Data mining |
The process of analyzing data to extract information not offered by the raw data alone |
|
Data-mining tools |
Use a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them them that predict future behavior and guide decision making |
|
Data redundancuy |
The duplication of data, or storing the same data in multiple places |
|
Data visualization (information asethetics) |
The ability to visualize data so that information can be communicated clearly and effectively |
|
Data warehouse |
A logical collection of information gathered from many different operational databases that supports business analysis activities and decision-making tasks |
|
Dealers |
Agents who sell products or services on behalf of a company or organization, particularly in the automobile industry |
|
Decision latency |
The time it takes a human to comprehend the analytic result and determine an appropriate action |
|
Decision support system (DSS) |
Models data and information to support managers, analysts, and other business professionals during the decision-making processes for more analytical purposes |
|
Demand planning system |
Generates demand forecasts using statistical tools and forecasting techniques |
|
Denial-of-serivce attack (DoS) |
Floods a Website with so many requests for service that it slows down or crashes the site |
|
Dependency |
A logical relationship that exists between the project tasks, or between a project task and a milestone |
|
Design phase |
Involves describing the desire features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation |
|
Development phase |
Involves taking all of the detailed design documents from the design phase and transforming them into the actual system |
|
Digital asset management system (DAM) |
Through similar to document management, DAM generally works with binary rather than text files, such as multimedia file types |
|
Digital Darwinism |
Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction |
|
Digital dashboard |
Integrates information from multiple components and tailors the information to individual preferences |
|
Digitial divide |
When those with access to technology have a great advantages over those without access to technology |
|
Digital wallet |
Both software and information - the software provides security for the transaction and the information includes payment and delivery information (e.g. the cred card number and expiration date) |
|
Dimension |
A particular attribute of information |
|
Disaster recovery cost curve |
Charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time |
|
Disaster recovery plan |
A detailed process for recovering information or an IT system in the event of a catastrophic disaster over time |
|
Disintermediation |
Occurs when a business sells directly the customer online and cuts out the intermediary |
|
Disruptive technology |
A new way of doing things that initially does not meet the needs of existing customers |
|
Distributed denial-of-service attack (DDoS) |
Attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes |
|
Distribution management systems |
Coordinate the process of transporting material from a manufacturer to distribution centers to the final customer |
|
Document management system (DMS) |
Supports the electronic capturing, storage, distribution, archival, and accessing of documents |
|
Drill-down |
Enables users to view details, and details of details, of information |
|
E-business |
The conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners |
|
E-business model |
An approach to conducting electronic business on the Internet |
|
E-commerce |
The buying and selling of goods and services over the internet |
|
Effectiveness IS metrics |
Measures the impact IS has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases |
|
Efficiency IS metrics |
Measures the performance of the IS itself such as throughput, speed and availability |
|
E-government |
Involves the use of strategies and technology to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government |
|
Electronic bill presentment and payment (EBPP) |
System that send bills over the Internet and provides and easy-to use mechanism (such as click on a button) to pay the bill |
|
Electronic catalogue |
Presents customers with information about goods and services offered or sale, bid, or auction on the Internet |
|
Electronic cheque |
Mechanism for sending a payment from a chequing or savings account |
|
Electronic data interchange (EDI) |
A standard format for exchanging business data |
|
Electronic marketplaces (e-marketplaces) |
Interactive business communities providing a central market space where multiple buyers and suppliers can engage in e-business activities |
|
Electronic tagging |
A technique for identifying and tracking assets and individuals via technologies, such as radio frequency identification and smart cards |
|
Elevation of privilege |
Process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system |
|
E-logisitcs |
Manages the transportation and storage of goods |
|
Email privacy policy |
Details the extent to which email messages may be read by others |
|
E-mall |
Consists of a number of e-shops; it serves as a gateway through which a visitor can access other e-shops |
|
Employee relationship management (ERM) |
A management activity that focuses on managing an organization's relationships with its employees |
|
Encryption |
Scrambles information into alternative form that requires a key or password to decrypt the information |
|
Enterprise application integration (EAI) middleware |
Represents a new approach to middleware by packaging together commonly used functionality, such as providing pre-built links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors |
|
Enterprise architech |
Person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business |
|
Enterprise portals |
Single-point Web browser interfaces used within an organizations to promote the gathering, sharing, and dissemination of information throughout the enterprise |
|
Enterprise resource planning (ERP) |
Integrates all departments and functions throughout an organization into a single information system (or integrated set of information systems) so that employees can make decisions by viewing enterprise wide data on all business operations |
|
Entity |
A person, place, thing, transaction, or event about which information is stored |
|
Entity class |
A collection of similar entities |
|
Environmental scanning |
The acquisition and analysis of events and trends in the environment external to an organization |
|
E-policies |
Policies and procedures that address the ethical use of computers and Internet usage in the business environment |
|
E-procurement |
The B2B purchase and sale of supplies and services over the Internet |
|
E-shop (e-store, e-retailer) |
A version of a retail store where customers can shop at any hour of the day without leaving their home or office |
|
Estimation |
Determines values for an unknown continuous variable behavior or estimate future value |
|
Ethical computer use policy |
Contains general principles to guide computer user behavior |
|
Ethics |
Principles and standards that guide our behavior toward other people |
|
E-waste |
Old computer equipment |
|
Executive information system (EIS) |
A specialized DSS that supports senior level executives within the organizations |
|
Excutive sponsor |
The person or group who provides the financial resources for the project |
|
Expert systems |
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems |
|
Explicit knowledge |
Consists of anything that can be documented, archived, and codified, often with the help of information systems |
|
Extended ERP component |
The extra component that meet the organizational needs not covered by the core components and primarily focus and external operations |
|
Extensible Markup Language (XML) |
A markup language for documents, containing structured information |
|
Extraction, transformation, and loading (ETL) |
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse |
|
Extranet |
An intranet that is available to strategic allies (such as customers, suppliers, and partners) |
|
Extreme programming (XP) methodology |
Breaks a project into tiny phases, and developers cannot continue on to the next phases until the first phase is complete |
|
Failover |
Backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) are assumed by a secondary system components when the primary component becomes unavailable through either failure or scheduled down time |
|
Fair dealing |
In certain situations, it is legal to use copy righted material |
|
Fault tolerance |
A computer system designed so that, in the event a component fails, a backup component or procedure can immediately take its place with no loss of service |
|
Feature creep |
Occurs when developers add extra features that were not part of the initial requirements |
|
Financial cybermediary |
Internet-based company that facilitates payments over the Internet |
|
Financial EDI (electronic data interchange) |
Standard electronic process for B2B market purchase payments |
|
Firewall |
Hardware and/or software that guides a private network by analyzing the information leaving and entering the network |
|
First-mover advantage |
An organization can significantly impact its market share by being first to market with a competitive advantage |
|
Five Forces Model |
Helps determine the relative compeitive attractiveness of an industry |
|
Forecasts |
Predictions made on the basis of time-series information |
|
Foreign key |
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables |
|
Forward integration |
Takes information entered into a given system and sends it automatically to all downstream systems and processes |
|
Functional systems |
Information systems that serve a single business unit, such as accounting |
|
Fuzzy logic |
A mathematical method of handling imprecise or subjective information |
|
Gantt chart |
A sample bar chart that depicts project tasks against a calendar |
|
Genetic algorithm |
An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate the increasingly better solutions to a problem |
|
Geographic information system (GIS) |
Designed to work with information that can be shown on a map |
|
Global inventory management systems (GIMS) |
Provide the ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in the supply chain |
|
Global positioning system (GPS) |
A constellation of 24 well spaces satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location |
|
Goal-seeking analysis |
Finds the inputs necessary to achieve a goal such as a desired level of output |
|
Granularity |
The extent of details within data and information (e.g. it can be fine and detailed vs. coarse and abstract) |
|
Grid computing |
An aggregating of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, high quality of service, better utilization, and easier access to data |
|
Groupware |
Software that supports team interaction and dynamics, including calendaring, scheduling, and video conferencing |
|
Hackers |
People very knowledgeable about computers, who use their knowledge to invade other people's computers |
|
Hactivists |
People with philosophical and political reasons for breaking into systems and who often deface the Web site as a protest |
|
Hardware key logger |
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard |
|
Hierarchical database model |
Information is organized into a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships |
|
High availability |
Refers to a system or component that is continuosly operational for a desirably long length of time |
|
Hoaxes |
Attack computer systems by transmitting a virus hoax, with a real virus attached |
|
Horizontal enterprise models |
Enterprise portals that integrate and aggregate information from multiple applications found across the organization |
|
Hot site |
A separate and fully equipped facility where the company can move immediately after a disaster and resume business |
|
Human resource ERP components |
Track employees data including payroll, benefits, compensation, and performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities |
|
Hypertext transport protocol (HTTP) |
The Internet standard that supports the exchange of information on the WWW |
|
Identity theft |
The forging of someone's identity for the purpose of fraud |
|
Implementation phase |
Involves placing the system into production so users can begin to perform actual business operations with the system |
|
Information |
Data converted into a meaningful and useful context |
|
Information access |
The ability to find and retrieve information |
|
Information cleansing (scrubbing) |
A process that weeds out and fixes or discards inconsistent, incorrect, or complete information |
|
Information control |
The degree to which an organization regulates how and what information is created, displayed, shared, and used within an enterprise |
|
Information culture |
How information is shared, the degree to which information overload is minimized, how information can be accessed, the degree to which information is controlled, and people's attitude towards using applications, such as enterprise portals |
|
Information ethics |
The moral principles concerning the creation, collection, duplication, distribution, and processing of information, as well as the development and use of information technologies |
|
Information overload |
The degree to which too much information is available to make informed decisions or remain informed about a topic |
|
Information partnership |
Occurs when two or more organizations cooperate by integrating their information systems, thereby providing customers with the best of what each can offer |
|
Information politics |
The human struggle over the governance and management of organizational information |
|
Information privacy |
The legal right or general expectation of individuals, groups, or institutions, to determine for themselves, when, and to what extent, information about them is communicated to others |
|
Information privacy policy |
Contains general principles regarding information privacy |
|
Information reach |
Refers to the number of people a business can communicated with, on a global basis |
|
Information richness |
Refers to the depth and breadth of information transferred between customers and businesses |
|
Information security |
A broad term encompassing the projection of information from accidental or intentional misuse by persons inside or outside an organization |
|
Information security plan |
Details how an organization will implement the information security policies |
|
Information security policies |
Identifies the rules required to maintain information security |
|
Information sharing |
The sharing of information within an organization and the ease with which ideas and facts are transferred readily between workers in an organization |
|
Information systems (IS) |
Computer-based tools that people use to work with information and that support the information and information processing needs of an organization |
|
Information technology (IT) |
The aquisition, processing, storage, and dissemination of vocal, pictorial, textual, and numerical information by a microelectronics based on combination of computing and telecommunications |
|
Information technology monitoring |
Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed |
|
Infrastructure architecture |
Includes the hardware, software, and telecommunications equipment that, when combined, provided the underlying foundation to support the organization's goals |
|
Innovation |
The introduction of new equipment or methods |
|
Insiders |
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident |
|
Insourcing (in-house development) |
A common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems |
|
Instant messaging (IM, IMing) |
A type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real time over the Internet |
|
Integration |
Allows separate systems to communicate directly with each other |
|
Integrity constraints |
The rules that help ensure the quality of information |
|
Intellectual property |
Intangible creative work that is embodied in physical form |
|
Intelligent agent |
A special-purpose knowledge based information system that accomplishes specific tasks on behalf of its users |
|
Intelligent systems |
Various commercial applications of artificial intelligence |
|
Interactive voice response (IVR) |
Directs customers to use touch-tone phones or keywords to navigate or provide information |
|
Interactivity |
Measures the visitor interactions with the target ad |
|
Intermediary agents |
Software or businesses that provide a trading infrastructure to bring buyers and sellers together |
|
International Organization for Standardization (ISO) |
A non-governmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services |
|
Internet |
A global public network of computer networks that pass information from one to another used common computer protocols |
|
Internet service provider (ISP) |
A company that provides individuals and other companies access to the Internet along with additional related services, such as Web site building |
|
Internet use policy |
Contains general principles to guide the proper use of the Internet |
|
Interoperability |
Capability of two or more computer systems to share data and resources, even though they are made by different manufacturers |
|
Intranet |
An internalized portion of the Internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees |
|
Intrusion detection software (IDS) |
Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm |
|
Inventory management and control systems |
Provide control and visibility to the status of individual items maintained in inventory |
|
Iterative development |
A series of tiny projects, which has become the foundation of multiple agile types of methodologies |
|
Joint problem solving |
A process of knowledge transfer where an expert and a novice work actively together on a task or problem as a way of disseminating the expert's knowledge to the novice |
|
Key logger (key trapper) software |
A program that, when installed on a computer, records every keystroke and mouse click |
|
Key performance indicators (KPI) |
Measures that are tied to business drivers |
|
Kill switch |
A trigger than enables a project manager to close the project prior to completion |
|
Kiosk |
Publicly accessible computer system that has been set up to allow interactive information browsing |
|
Knowledge |
Actionable information |
|
Knowledge management (KM) |
Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions |
|
Knowledge management system (KMS) |
Supports the capturing, organization, and dissemination of knowledge (ie. know how) throughout the organization |
|
Legacy systems |
Older computer technology that remains in use even though there are newer systems available |
|
List generators |
Compile customer information from a variety of sources and segment the information for different marketing campaigns |
|
Local area network (LAN) |
Designed to connect a group of computers in a close proximity to each other such as in an office building, a school, or a home |
|
Location-based services (LBS) |
Wireless mobile content services that provide location-specific data to mobile users moving from location to location |
|
Logical view |
Focuses on how users logically access information to meet their particular business needs |
|
Long tail |
The tail of a typical sale curve |
|
Loose coupling |
The capability of services to be joined together on demand to create composite services or dissembled just as easily into their functional components |
|
Loyalty programs |
Reward customers based on the amount of business they do with a particular organization |
|
Maintenance phase |
Involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals |
|
Maintenance, repair, and operations (MRO) materials (indirect materials) |
Material necessary for running an organization but to not relate to the company's primary business activities |
|
Malicious code |
Includes a variety of threats such as viruses, worms, and Trojan horses |
|
Management information systems (MIS) |
The function that plans for, develops, implements, and maintains IT hardware, software, and applications that people use to support the goals of an organization |
|
Market basket analysis |
Analyzes such items as Web sites and checkout scanner information to detect customer's buying behavior and predict future behavior by identifying afintities among customer's choices or products and services |
|
Mashup |
See web mashup |
|
Mashup editors |
Software editing tool for mashups |
|
Mass customization |
Ability of an organization to give it customers the opportunity to tailor its products or services to the customers' specifications |
|
Material requirements planning (MRP) systems |
Uses sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company |
|
Messaging-based workflow system |
Send work assignments through an email system |
|
Methodology |
A set of policies, procedures, standards, processes, practices, tools, techniques, and asks that people apply to technical and mangement challenges |
|
Metropolitan area network (MAN) |
A large computer network usually spanning a city |
|
Microwave transmitter |
Uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver |
|
Middleware |
Different types of software that sit in the middle of and provide connectivity between two or more software applications |
|
M-learning |
Uses portable computing devices with wireless capability to enable mobility and mobile learning |
|
Mobile commerce (m-commerce) |
The ability to purchases goods and services through a wireless Internet-enabled device |
|
Multi-dimensional databases |
In data warehouses and data marts, information is multi-dimensional, meaning it contains layers of columns and rows |
|
Nearshore outsourcing |
Contracting an outsourcing agreement with a company in a nearby country |
|
Network |
A communications, data exchange, and resource sharing system created by linking two or more computers and establishing standards, or protocols, so they they can work together |
|
Network database model |
A flexible way of representing objects and their relationships |
|
Neural network (or artificial neural network) |
A category of AI that attempts to emulate the way the human brain works |
|
Non-repudiation |
A contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions |
|
Offshore outsourcing |
Using organizations from developing countries to write code and develop systems |
|
Online ad (banner ad) |
Box running across a web page that is often used to contain advertisements |
|
Online analytical processing (OLAP) |
The analysis of summarized or aggregated information sourced from transaction processing systems data, and sometimes external information from outside industry sources, to create business intelligence in support of strategic decision making |
|
Online service provider (OSP) |
Offers an extensive array of unique services such as its own version of a Web browser |
|
Online transaction processing (OLTP) |
The capturing of transaction and event data using information systems to (1) process the data according to defined business rules, (2) stores the data, and (3) update existing data to reflect the new information |
|
Onshore outsourcing |
The process of engaging another company within the same country for services |
|
Open source |
Refers to any program whose source code is made available for use or modification as users or other developers see fit |
|
Open system |
A broad, general term that describes non-proprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them |
|
Operational CRM |
Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers |
|
Operational planning and control (OP&C) |
Deals with the day-to-day procedures for performing work, including scheduling, inventory, and process management |
|
Operations management |
The management of systems or processes that convert or transform resources (including human resourses) into goods and services |
|
Opportunity management CRM systems |
Target sales opportunities by finding new customers or companies for future sales |
|
Outsourcing |
An arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house |
|
Packet tampering |
Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network |
|
Participatory design (PD) methodology |
A systems design approach originating in Scandinavia that calls for the active involvement of users in design, where users are the experts and systems development staff are coaches or facilitators |
|
Partner realtionship management (PRM) |
Focuses on keeping vendors satisified by managing alliance partner and reseller relationships that proves customers with the optimal sales channels |
|
Performance |
Measures how quickly a system performs a certain process or transaction (in terms of efficiency IT metrics of both speed and throughput) |
|
Personal digital assistants (PDAs) |
small, handheld computers capable of entirely digital communications telecommunications |
|
Personalization |
Occurs when a web site can know enough about a person's like and dislikes that it can fashion offers that are more likely to appeal to that person |
|
PERT (program evaluation and review technique) chart |
A graphical network model that depicts a projects tasks and the relationships between those tasks |