• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/327

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

327 Cards in this Set

  • Front
  • Back

Acceptable use policy (AUP)

A policy that a user must agree to follow to be provided to a network or to the Internet

Accounting and financing ERP component

Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

Adware

Software that generate ads that install themselves on a computer when a person downloads some other program from the Internet

Affinity grouping

Determination of which things go together

Agile methodology

Aims for customer satisfaction through early and continuous delivery of useful software components, developed by an iterative process with a design point that uses the bare minimum requirements

Alliance partners

Competitor organizations that co-operate with one another since doing so allows them to compete more successfully with other companies

Analysis latency

The time from which data are made available to the time when analysis is complete

Analysis phase

Analyzing end-user business requirements and refining project goals into defined functions and operations of the intended systems

Analytical CRM

Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

Analytical information

Encompasses all summarized or aggregated transactional data, and its primary purpose it to support the performing of higher-level analysis tasks

Anti-spam policy

States that email users will not send unsolicited emails (or spam)

Application architecture

Determines how applications integrate and relate to each other

Application programming interface (API)

A set of routines, protocols, and tools for building software applications

Application service provider (ASP)

A company that offers ab organization access over the Internet to system and related services that would otherwise have to be located in person or organizational computer

Artificial Intelligence (AI)

Stimulates human intelligence, such as the ability to reason and learn

As-Is process models

Represent the current state of the operation that has been mapped, without any specific improvement or changes to existing processes

Associate programs (affiliate programs)

Businesses can generate commissions or royalties from an Internet site

Association detection

Reveals the degree to which variables are related and the nature and frequency of these relationship in the information

Asynchronous communications

Communications that occur at the same time, such as instant messaging

Attitudes toward using the portal

The values, perceptions, and beliefs that end-users have toward using the portal

Attributes

Characteristics or properties of an entity class

Authentication

A method of confirming users' identities

Authorization

The process of giving someone permission to do or have something

Automatic call distribution

A phone or switch routes inbound calls to available agents

Availability

Addresses when systems can be accesses by users

Backdoor programs

Viruses that open a way into the network for future attacks

Backup

An exact copy or a system's data

Backward Integration

Takes information entered into a given system and sends it automatically to all upstream systems and processes

Balanced scorecard

A management system (not only a measurement system) that enables organizations to clarify their vision and strategy and translate them into actions

Bandwith

The difference between the highest and the lowest frequencies that can be transmitted on a single communication medium; a measure of a communication medium's capacity

Banner ad

Small ad on one Web site that advertises the products and services of another business, usually another e-business

Benchmarking

The process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance

Benchmarks

Baseline values the system seeks to attain

Biometrics

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

Black-hat hackers

Break into other people's computer systems and may just look around or steal and destroy information

Bluetooth

A telecommunications industry specification that describes how mobile phones, computers, personal digital assistants (PDAs), and tablets can be easily interconnected using a short-range wireless connection

Brick-and-mortar business

A business that operate in a physical store without an Internet presence

Broadband

High-speed Internet connections transmitting data at speeds greater than 200 kilobytes per second (Kbps) compared to the 56 Kbps maximum speed offered by traditional dial-up connections

Bullwhip effect

Occurs when distorted product demand information passes from one entity to the next throughout the supply chain

Business continuity planning

A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption

Business-critical integrity constraints

Enforce businesses rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints

Business-driven information system

Systems that are implemented to support a company's competitive business strategy

Business facing processes

Invisible to the external customer but essential to the effective management of the business; include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation

Business intelligence

Applications and technologies that are used to gather, provide access to, and analyze information to support people's decision-making efforts

Business portal

Synonymous with terms corporate portal, enterprise portal

Business process

A standardized set of activities that accomplishes a specific task, such as processing a customer's order

Business process improvement

Attempts to understand and measure a business process and make performance improvements on that process accordingly

Business process management (BPM)

Integrates all of an organization's business processes to make individual processes more efficent

Business process model

A graphic description of a process showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint

Business process modelling (or mapping)

The activity or creating a detailed flow chart, work flow diagram, use case diagram, or process map of a work process showing its inputs, tasks, and activities, in a structured sequence

Business process reengineering (BPR)

The analysis and redesign of workflow within and between enterprises

Business requirment

The detailed set of business requests that the system must meet in order to be successful

Business wikis

Collaborative Web pages that allow users to edit documents, share ideas, or monitor the status of a project

Business-to-business (B2B)

Applies to businesses buying from and selling to each other over the Internet

Business-to-business (B2B) marketplace

An internet based service that brings together many buyers and sellers

Business-to-consumer (B2C)

Applies to any business that sells its products or services to consumers over the Internet

Buyer power

High when buyers have many choices of whom to buy from and low when their choices are few

Call-scripting systems

Access organizational databases that track similar issues or questions and automatically generate the details for the CSR who can then relay them to the customer

Campaign management systems

Guide users through marketing campaigns, performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis

Capacity planning

Determines the future IT infrastructure requirements for new equipment and additional network capacity

Change control board (CCB)

Responsible for approving or rejecting all change requests

Change management

A set of techniques that aid in evolution, composition, and policy management of the design and implementation of a system

Change management system

Includes a collection of procedures to a document a change request and define the steps necessary to consider the change based on the expected impact of the change

Chief information officer (CIO)

Responsible for (1) over seeing all uses of information systems and (2) ensuring the strategic alignment of IT with business goals and objectives

Chief knowledge officer (CKO)

Responsible for collecting, maintaining, and distributing the organization's knowledge

Chief privacy officer (CPO)

Responsible for ensuring the ethical and legal use of information within an organization

Chief security officer (CS0)

Responsible for ensuring the security of IT system and developing strategies and IT safe guards against attacks from hackers and viruses

Chief technology officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology

Classification

The assignment of records to one of a predefined set of classes

Click-and-mortar businesses

A business that operates in a physical store and on the Internet

Clickstream

Records information about a customer during a Web surfing session, such as what Web sites were visited, how long the visit was, and what as were viewed, and what was purchased

Clickstream data

Exact pattern of a consumer's navigation through a site

Click-through

A count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser

Cloud computing

A form of client/server computing operating over the Internet where the term "cloud" is used as a metaphor for the term Internet

Cluster analysis

A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible

Clustering

Segmentation of a heterogeneous population of records into a number of more homogenous subgroups

Cold site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

Collaboration system

An IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information

Collaborative demand planning

Helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability

Collaborative engineering

Allows an organization to reduce the cost and time require during the design process of a product

Communication space

Supports discussion among employees, especially for negotiating collective interpretations and shared meanings about the information accesses and retrieved

Competitive advantage

A product of service than an organization's customers place a greater value on than similar offerings from a competitor

Computer-supported cooperative work (CSCW)

A field of research concerned with the development and use of software to help groups increase their competency in working together

Confidentiality

The assurance that messages and information are available only to those who are authorized to view them

Consolidation

Involves the aggregation of information and features simple roll-ups to complex groups of interrelated information

Consumer-to-business (C2B)

Applies to any consumers that sells a product or service to a business over the Internet

Consumer-to-consumer (C2C)

Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet

Contact center (call center)

Customer service representatives (CSRs) answer customer inquires and respond to problems through a number of different customer touchpoints

Contact management CRM system

Maintains customer contact information and identifies prospective customers for future sales

Content filtering

Occurs when organizations use software that filters content to prevent the transmission of unauthorized information

Content management system

Provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment

Content space

Facilitates information access and retrieval

Cookie

A small file deposited on a hard drive by a Web site containing information about customers and their Web activites

Coordination space

Supports cooperative work action between employees, facilitates workflow processes, and the accomplishment of work tasks

Copyright

The legal protection afforded an expression of an idea, such as a song, video games, and some types of proprietary documents

Core competency

An organization's key strength of business function that is does better than any of its competitors

Core competency strategy

When an organization chooses to focus specifically on what it does best (its core competency) and forms partnerships and alliances with other specialist organizations to handle non-strategic business processes

Core ERP component

Traditional components included in most ERP systems and they primarily focus on internal operations

Corporate policy

A dimension of social responsibility that refers to the position a firm takes on social and political issues

Corporate portals

Synonym with businesses portal, enterprise portal

Corporate responsibility

A dimension of social responsibility that includes everything from hiring minority workers to making safe products

Counterfeit software

Software that is manufactured to look like the real thing and is sold as such

Cracker

A hacker with criminal intent

Critical path

A path from the start to the finish that passes through all of the tasks that are critical to completing the project in the shortest amount of time

CRM analysis systems

Help organizations segment their customers into categories such as best and worst customers

CRM manager

A person in an organization who is held accountable and is responsible for the continued successful rollout of CRM in that organization

CRM predicting systems

Help organizations make predictions regarding customer behavior, such as which customers are at risk of leaving

CRM reporting systems

Help organizations identify their customers across other applications

Cross-selling

Selling additional products or services to a customer

Crowdsourcing

The most common form of collective intelligence found outside the organizations is crowdsourcing, which refers to the wisdom of the crowd

Cube

The common term for the representation of multidimensional information

Customer facing processes

The results in a product or service that is received by an organization's external customer

Customer relationship management (CRM)

Involves managing all aspects of a customer's relationship with an organization to increased customer loyalty and retention, and an organization's profitability

Cybermediation

The creation of new kinds of intermediaries that simply could not have existed before the advent of e-business, including comparison-shopping sites such as Citibank

Cyberterrorist

Seeks to cause harm to people to destroy critical systems or information; uses the Internet as a weapon of mass destruction

Data

Raw facts that describes the characteristics of an event

Data architecture

Identifies where and how important data, like customer records, are maintained and secured

Database

Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)

Database-based workflow systems

Store documents in a central location and automatically ask the team members to access the document when it is their turn to edit the document

Database management systems (DBMS)

Software through which users and application programs interact with a database

Data-driven Web site

An interactive Web site kept constantly updated and relevant to the needs of its customers through the use of a database

Data integrity

A measure of the quality of data

Data latency

The time duration to make data ready for analysis (ie. the time for extracting, transforming, cleansing, and loading the data into a database)

Data mart

Contains a subset of data warehouse information

Data mining

The process of analyzing data to extract information not offered by the raw data alone

Data-mining tools

Use a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them them that predict future behavior and guide decision making

Data redundancuy

The duplication of data, or storing the same data in multiple places

Data visualization (information asethetics)

The ability to visualize data so that information can be communicated clearly and effectively

Data warehouse

A logical collection of information gathered from many different operational databases that supports business analysis activities and decision-making tasks

Dealers

Agents who sell products or services on behalf of a company or organization, particularly in the automobile industry

Decision latency

The time it takes a human to comprehend the analytic result and determine an appropriate action

Decision support system (DSS)

Models data and information to support managers, analysts, and other business professionals during the decision-making processes for more analytical purposes

Demand planning system

Generates demand forecasts using statistical tools and forecasting techniques

Denial-of-serivce attack (DoS)

Floods a Website with so many requests for service that it slows down or crashes the site

Dependency

A logical relationship that exists between the project tasks, or between a project task and a milestone

Design phase

Involves describing the desire features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation

Development phase

Involves taking all of the detailed design documents from the design phase and transforming them into the actual system

Digital asset management system (DAM)

Through similar to document management, DAM generally works with binary rather than text files, such as multimedia file types

Digital Darwinism

Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

Digital dashboard

Integrates information from multiple components and tailors the information to individual preferences

Digitial divide

When those with access to technology have a great advantages over those without access to technology

Digital wallet

Both software and information - the software provides security for the transaction and the information includes payment and delivery information (e.g. the cred card number and expiration date)

Dimension

A particular attribute of information

Disaster recovery cost curve

Charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time

Disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster over time

Disintermediation

Occurs when a business sells directly the customer online and cuts out the intermediary

Disruptive technology

A new way of doing things that initially does not meet the needs of existing customers

Distributed denial-of-service attack (DDoS)

Attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes

Distribution management systems

Coordinate the process of transporting material from a manufacturer to distribution centers to the final customer

Document management system (DMS)

Supports the electronic capturing, storage, distribution, archival, and accessing of documents

Drill-down

Enables users to view details, and details of details, of information

E-business

The conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners

E-business model

An approach to conducting electronic business on the Internet

E-commerce

The buying and selling of goods and services over the internet

Effectiveness IS metrics

Measures the impact IS has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases

Efficiency IS metrics

Measures the performance of the IS itself such as throughput, speed and availability

E-government

Involves the use of strategies and technology to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government

Electronic bill presentment and payment (EBPP)

System that send bills over the Internet and provides and easy-to use mechanism (such as click on a button) to pay the bill

Electronic catalogue

Presents customers with information about goods and services offered or sale, bid, or auction on the Internet

Electronic cheque

Mechanism for sending a payment from a chequing or savings account

Electronic data interchange (EDI)

A standard format for exchanging business data

Electronic marketplaces (e-marketplaces)

Interactive business communities providing a central market space where multiple buyers and suppliers can engage in e-business activities

Electronic tagging

A technique for identifying and tracking assets and individuals via technologies, such as radio frequency identification and smart cards

Elevation of privilege

Process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system

E-logisitcs

Manages the transportation and storage of goods

Email privacy policy

Details the extent to which email messages may be read by others

E-mall

Consists of a number of e-shops; it serves as a gateway through which a visitor can access other e-shops

Employee relationship management (ERM)

A management activity that focuses on managing an organization's relationships with its employees

Encryption

Scrambles information into alternative form that requires a key or password to decrypt the information

Enterprise application integration (EAI) middleware

Represents a new approach to middleware by packaging together commonly used functionality, such as providing pre-built links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors

Enterprise architech

Person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business

Enterprise portals

Single-point Web browser interfaces used within an organizations to promote the gathering, sharing, and dissemination of information throughout the enterprise

Enterprise resource planning (ERP)

Integrates all departments and functions throughout an organization into a single information system (or integrated set of information systems) so that employees can make decisions by viewing enterprise wide data on all business operations

Entity

A person, place, thing, transaction, or event about which information is stored

Entity class

A collection of similar entities

Environmental scanning

The acquisition and analysis of events and trends in the environment external to an organization

E-policies

Policies and procedures that address the ethical use of computers and Internet usage in the business environment

E-procurement

The B2B purchase and sale of supplies and services over the Internet

E-shop (e-store, e-retailer)

A version of a retail store where customers can shop at any hour of the day without leaving their home or office

Estimation

Determines values for an unknown continuous variable behavior or estimate future value

Ethical computer use policy

Contains general principles to guide computer user behavior

Ethics

Principles and standards that guide our behavior toward other people

E-waste

Old computer equipment

Executive information system (EIS)

A specialized DSS that supports senior level executives within the organizations

Excutive sponsor

The person or group who provides the financial resources for the project

Expert systems

Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems

Explicit knowledge

Consists of anything that can be documented, archived, and codified, often with the help of information systems

Extended ERP component

The extra component that meet the organizational needs not covered by the core components and primarily focus and external operations

Extensible Markup Language (XML)

A markup language for documents, containing structured information

Extraction, transformation, and loading (ETL)

A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

Extranet

An intranet that is available to strategic allies (such as customers, suppliers, and partners)

Extreme programming (XP) methodology

Breaks a project into tiny phases, and developers cannot continue on to the next phases until the first phase is complete

Failover

Backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) are assumed by a secondary system components when the primary component becomes unavailable through either failure or scheduled down time

Fair dealing

In certain situations, it is legal to use copy righted material

Fault tolerance

A computer system designed so that, in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

Feature creep

Occurs when developers add extra features that were not part of the initial requirements

Financial cybermediary

Internet-based company that facilitates payments over the Internet

Financial EDI (electronic data interchange)

Standard electronic process for B2B market purchase payments

Firewall

Hardware and/or software that guides a private network by analyzing the information leaving and entering the network

First-mover advantage

An organization can significantly impact its market share by being first to market with a competitive advantage

Five Forces Model

Helps determine the relative compeitive attractiveness of an industry

Forecasts

Predictions made on the basis of time-series information

Foreign key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

Forward integration

Takes information entered into a given system and sends it automatically to all downstream systems and processes

Functional systems

Information systems that serve a single business unit, such as accounting

Fuzzy logic

A mathematical method of handling imprecise or subjective information

Gantt chart

A sample bar chart that depicts project tasks against a calendar

Genetic algorithm

An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate the increasingly better solutions to a problem

Geographic information system (GIS)

Designed to work with information that can be shown on a map

Global inventory management systems (GIMS)

Provide the ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in the supply chain

Global positioning system (GPS)

A constellation of 24 well spaces satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location

Goal-seeking analysis

Finds the inputs necessary to achieve a goal such as a desired level of output

Granularity

The extent of details within data and information (e.g. it can be fine and detailed vs. coarse and abstract)

Grid computing

An aggregating of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, high quality of service, better utilization, and easier access to data

Groupware

Software that supports team interaction and dynamics, including calendaring, scheduling, and video conferencing

Hackers

People very knowledgeable about computers, who use their knowledge to invade other people's computers

Hactivists

People with philosophical and political reasons for breaking into systems and who often deface the Web site as a protest

Hardware key logger

A hardware device that captures keystrokes on their journey from the keyboard to the motherboard

Hierarchical database model

Information is organized into a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships

High availability

Refers to a system or component that is continuosly operational for a desirably long length of time

Hoaxes

Attack computer systems by transmitting a virus hoax, with a real virus attached

Horizontal enterprise models

Enterprise portals that integrate and aggregate information from multiple applications found across the organization

Hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

Human resource ERP components

Track employees data including payroll, benefits, compensation, and performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities

Hypertext transport protocol (HTTP)

The Internet standard that supports the exchange of information on the WWW

Identity theft

The forging of someone's identity for the purpose of fraud

Implementation phase

Involves placing the system into production so users can begin to perform actual business operations with the system

Information

Data converted into a meaningful and useful context

Information access

The ability to find and retrieve information

Information cleansing (scrubbing)

A process that weeds out and fixes or discards inconsistent, incorrect, or complete information

Information control

The degree to which an organization regulates how and what information is created, displayed, shared, and used within an enterprise

Information culture

How information is shared, the degree to which information overload is minimized, how information can be accessed, the degree to which information is controlled, and people's attitude towards using applications, such as enterprise portals

Information ethics

The moral principles concerning the creation, collection, duplication, distribution, and processing of information, as well as the development and use of information technologies

Information overload

The degree to which too much information is available to make informed decisions or remain informed about a topic

Information partnership

Occurs when two or more organizations cooperate by integrating their information systems, thereby providing customers with the best of what each can offer

Information politics

The human struggle over the governance and management of organizational information

Information privacy

The legal right or general expectation of individuals, groups, or institutions, to determine for themselves, when, and to what extent, information about them is communicated to others

Information privacy policy

Contains general principles regarding information privacy

Information reach

Refers to the number of people a business can communicated with, on a global basis

Information richness

Refers to the depth and breadth of information transferred between customers and businesses

Information security

A broad term encompassing the projection of information from accidental or intentional misuse by persons inside or outside an organization

Information security plan

Details how an organization will implement the information security policies

Information security policies

Identifies the rules required to maintain information security

Information sharing

The sharing of information within an organization and the ease with which ideas and facts are transferred readily between workers in an organization

Information systems (IS)

Computer-based tools that people use to work with information and that support the information and information processing needs of an organization

Information technology (IT)

The aquisition, processing, storage, and dissemination of vocal, pictorial, textual, and numerical information by a microelectronics based on combination of computing and telecommunications

Information technology monitoring

Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

Infrastructure architecture

Includes the hardware, software, and telecommunications equipment that, when combined, provided the underlying foundation to support the organization's goals

Innovation

The introduction of new equipment or methods

Insiders

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

Insourcing (in-house development)

A common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems

Instant messaging (IM, IMing)

A type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real time over the Internet

Integration

Allows separate systems to communicate directly with each other

Integrity constraints

The rules that help ensure the quality of information

Intellectual property

Intangible creative work that is embodied in physical form

Intelligent agent

A special-purpose knowledge based information system that accomplishes specific tasks on behalf of its users

Intelligent systems

Various commercial applications of artificial intelligence

Interactive voice response (IVR)

Directs customers to use touch-tone phones or keywords to navigate or provide information

Interactivity

Measures the visitor interactions with the target ad

Intermediary agents

Software or businesses that provide a trading infrastructure to bring buyers and sellers together

International Organization for Standardization (ISO)

A non-governmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services

Internet

A global public network of computer networks that pass information from one to another used common computer protocols

Internet service provider (ISP)

A company that provides individuals and other companies access to the Internet along with additional related services, such as Web site building

Internet use policy

Contains general principles to guide the proper use of the Internet

Interoperability

Capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

Intranet

An internalized portion of the Internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees

Intrusion detection software (IDS)

Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm

Inventory management and control systems

Provide control and visibility to the status of individual items maintained in inventory

Iterative development

A series of tiny projects, which has become the foundation of multiple agile types of methodologies

Joint problem solving

A process of knowledge transfer where an expert and a novice work actively together on a task or problem as a way of disseminating the expert's knowledge to the novice

Key logger (key trapper) software

A program that, when installed on a computer, records every keystroke and mouse click

Key performance indicators (KPI)

Measures that are tied to business drivers

Kill switch

A trigger than enables a project manager to close the project prior to completion

Kiosk

Publicly accessible computer system that has been set up to allow interactive information browsing

Knowledge

Actionable information

Knowledge management (KM)

Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

Knowledge management system (KMS)

Supports the capturing, organization, and dissemination of knowledge (ie. know how) throughout the organization

Legacy systems

Older computer technology that remains in use even though there are newer systems available

List generators

Compile customer information from a variety of sources and segment the information for different marketing campaigns

Local area network (LAN)

Designed to connect a group of computers in a close proximity to each other such as in an office building, a school, or a home

Location-based services (LBS)

Wireless mobile content services that provide location-specific data to mobile users moving from location to location

Logical view

Focuses on how users logically access information to meet their particular business needs

Long tail

The tail of a typical sale curve

Loose coupling

The capability of services to be joined together on demand to create composite services or dissembled just as easily into their functional components

Loyalty programs

Reward customers based on the amount of business they do with a particular organization

Maintenance phase

Involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals

Maintenance, repair, and operations (MRO) materials (indirect materials)

Material necessary for running an organization but to not relate to the company's primary business activities

Malicious code

Includes a variety of threats such as viruses, worms, and Trojan horses

Management information systems (MIS)

The function that plans for, develops, implements, and maintains IT hardware, software, and applications that people use to support the goals of an organization

Market basket analysis

Analyzes such items as Web sites and checkout scanner information to detect customer's buying behavior and predict future behavior by identifying afintities among customer's choices or products and services

Mashup

See web mashup

Mashup editors

Software editing tool for mashups

Mass customization

Ability of an organization to give it customers the opportunity to tailor its products or services to the customers' specifications

Material requirements planning (MRP) systems

Uses sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company

Messaging-based workflow system

Send work assignments through an email system

Methodology

A set of policies, procedures, standards, processes, practices, tools, techniques, and asks that people apply to technical and mangement challenges

Metropolitan area network (MAN)

A large computer network usually spanning a city

Microwave transmitter

Uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver

Middleware

Different types of software that sit in the middle of and provide connectivity between two or more software applications

M-learning

Uses portable computing devices with wireless capability to enable mobility and mobile learning

Mobile commerce (m-commerce)

The ability to purchases goods and services through a wireless Internet-enabled device

Multi-dimensional databases

In data warehouses and data marts, information is multi-dimensional, meaning it contains layers of columns and rows

Nearshore outsourcing

Contracting an outsourcing agreement with a company in a nearby country

Network

A communications, data exchange, and resource sharing system created by linking two or more computers and establishing standards, or protocols, so they they can work together

Network database model

A flexible way of representing objects and their relationships

Neural network (or artificial neural network)

A category of AI that attempts to emulate the way the human brain works

Non-repudiation

A contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions

Offshore outsourcing

Using organizations from developing countries to write code and develop systems

Online ad (banner ad)

Box running across a web page that is often used to contain advertisements

Online analytical processing (OLAP)

The analysis of summarized or aggregated information sourced from transaction processing systems data, and sometimes external information from outside industry sources, to create business intelligence in support of strategic decision making

Online service provider (OSP)

Offers an extensive array of unique services such as its own version of a Web browser

Online transaction processing (OLTP)

The capturing of transaction and event data using information systems to (1) process the data according to defined business rules, (2) stores the data, and (3) update existing data to reflect the new information

Onshore outsourcing

The process of engaging another company within the same country for services

Open source

Refers to any program whose source code is made available for use or modification as users or other developers see fit

Open system

A broad, general term that describes non-proprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them

Operational CRM

Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers

Operational planning and control (OP&C)

Deals with the day-to-day procedures for performing work, including scheduling, inventory, and process management

Operations management

The management of systems or processes that convert or transform resources (including human resourses) into goods and services

Opportunity management CRM systems

Target sales opportunities by finding new customers or companies for future sales

Outsourcing

An arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house

Packet tampering

Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network

Participatory design (PD) methodology

A systems design approach originating in Scandinavia that calls for the active involvement of users in design, where users are the experts and systems development staff are coaches or facilitators

Partner realtionship management (PRM)

Focuses on keeping vendors satisified by managing alliance partner and reseller relationships that proves customers with the optimal sales channels

Performance

Measures how quickly a system performs a certain process or transaction (in terms of efficiency IT metrics of both speed and throughput)

Personal digital assistants (PDAs)

small, handheld computers capable of entirely digital communications telecommunications

Personalization

Occurs when a web site can know enough about a person's like and dislikes that it can fashion offers that are more likely to appeal to that person

PERT (program evaluation and review technique) chart

A graphical network model that depicts a projects tasks and the relationships between those tasks