GLOSSARY Flashcards

(335 cards)

1
Q

Access Controls

A

Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accountability

A

A tenet of ethics that refers to determining who is responsible for actions that were taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

Alien software designed to help pop-up advertisements appear on your screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Agile development

A

A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alien software

A

Clandestine software that is installed on your computer through duplicitous methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-malware systems

A

(or antivirus software) Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application

A

(or app) A computer program designed to support a specific task or business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application controls

A

Security countermeasures that protect specific applications in functional areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application portfolio

A

The set of recommended applications resulting from the planning and justification process in application development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application service provider

A

An agent or vendor that assembles the software needed by enterprises and packages them with outsourced development, operations, maintenance, and other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application software

A
Application software
The class of computer instructions that directs a computer system to perform specific processing activities and provide functionality for users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Arithmetic logic unit

A

Portion of the CPU that performs the mathematical calculations and makes logical comparisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribute

A

Each characteristic or quality of a particular entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Auction

A

A competitive process in which either a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers, and prices are determined dynamically by competitive bidding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Audit

A

The accumulation and evaluation of evidence that is used to prepare a report about the information or controls that are being examined, using established criteria and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Augmented reality

A

A live, direct or indirect, view of a physical, real-world environment whose elements are enhanced by computer-generated sensory input such as sound, video, graphics, or GPS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authentication

A

A process that determines the identity of the person requiring access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authorization

A

A process that determines which actions, rights, or privileges the person has, based on verified identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Back door

A

(or trap door) Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Banners

A

Electronic billboards, which typically contain a short text or graphical message to promote a product or a vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Best practices

A

The most effective and efficient ways to do things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Big Data

A

A collection of data so large and complex that it is difficult to manage using traditional database management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Binary relationship

A

A relationship that exists when two entities are associated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Biometrics

A

The science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject’s physiological or behavioural characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bit
Short for Binary digit (0s and 1s), the only data that a CPU can process.
26
Blacklisting
A process in which a company identifies certain types of software that are not allowed to run in the company environment.
27
Blog
(or weblog) A personal website, open to the public, in which the site creator expresses his or her feelings or opinions with a series of chronological entries.
28
Blogosphere
The millions of blogs on the Web.
29
Bot
(or zombie) A computer that has been compromised by, and is under the control of, a hacker.
30
Botnet
A network of computers that has been compromised by, and is under the control of, a hacker, who is called the botmaster.
31
Bricks-and-mortar organizations
Organizations in which the product, the process, and the delivery agent are all physical.
32
Business continuity planning
The chain of events linking planning to protection and to recovery.
33
Business environment
The combination of social, legal, economic, physical, and political factors in which businesses conduct their operations.
34
Business intelligence system
A system that provides computer-based support for complex, nonroutine decisions, primarily for middle managers and knowledge workers.
35
Business model
The method by which a company generates revenue to sustain itself.
36
Business process
A collection of related activities that create a product or a service of value to the organization, its business partners, and/or its customers.
37
Business process improvement
An incremental approach to improving business processes. It looks for root causes to problems in process inputs, the process itself, or in process outputs, resulting in less radical and less disruptive business changes.
38
Business process management
A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
39
Business process reengineering
A radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a "clean sheet" (i.e., from scratch).
40
Business rules
Precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information.
41
Business-information technology alignment
The tight integration of the IT function with the strategy, mission, and goals of the organization.
42
Business-to-business electronic commerce
Electronic commerce in which both the sellers and the buyers are business organizations.
43
Business-to-consumer electronic commerce
Electronic commerce in which the sellers are organizations and the buyers are individuals.
44
Business-to-employee electronic commerce
An organization using electronic commerce internally to provide information and services to its employees.
45
Buy-side marketplace
Business-to-business model in which organizations buy needed products or services from other organizations electronically, often through a reverse auction.
46
Byte
An 8-bit string of data, needed to represent any one alphanumeric character or simple mathematical operation.
47
Cache memory
A type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory (random access memory).
48
Cardinality
The uniqueness of data values with a column in a database. High cardinality means that the column has mostly unique values. Low cardinality means that the column has several "repeats" in its data range.
49
Central processing unit (CPU)
Hardware that performs the actual computation or "number crunching" inside any computer.
50
Certificate authority
A third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
51
Channel conflict
The alienation of existing distributors when a company decides to sell to customers directly online.
52
Clicks-and-mortar organizations
Organizations that do business in both the physical and digital dimensions.
53
Clickstream data
Data collected about user behaviour and browsing patterns by monitoring users' activities when they visit a website.
54
Cloud computing
A technology in which tasks are performed by computers physically removed from the user and accessed over a network, in particular the Internet.
55
Code of ethics
A collection of principles intended to guide decision making by members of an organization.
56
Collaborative consumption
Peer-to-peer sharing or renting.
57
Communications controls
(or network controls) Controls that deal with the movement of data across networks.
58
Competitive advantage
An advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-average profits.
59
Competitive forces model
A business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company's position.
60
Component-based development
A software development methodology that uses standard components to build applications.
61
Computer programs
The sequences of instructions for the computer, which comprise software.
62
Computer-aided software engineering (CASE)
A software development approach that uses specialized tools to automate many of the tasks in the systems development life cycle; upper CASE tools automate the early stages of the life cycle and lower CASE tools automate the later stages.
63
Computer-based information system
An information system that uses computer technology to perform some or all of its intended tasks.
64
Connectivity
The classification of a relationship: one-to-one, one-to-many, or many-to-many.
65
Consumer-to-consumer electronic commerce
Electronic commerce in which both the buyer and the seller are individuals (not businesses).
66
Continuous application development
The process of steadily adding new computer code to a software project when the new computer code is ready.
67
Control environment
Controls that encompass management attitudes toward controls, as evidenced by management actions, as well as by stated policies and procedures that address ethical issues and the quality of supervision.
68
Control unit
Portion of the CPU that controls the flow of information.
69
Controls
(or countermeasures) Defence mechanisms used to safeguard assets, optimize the use of the organization's resources, and prevent or detect errors or fraud.
70
Cookies
Small amounts of information that websites store on your computer, temporarily or more or less permanently.
71
Copyright
A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 50 years.
72
Cross-functional business process
A process in which no single functional area is responsible for a process's completion; multiple functional areas collaborate to perform the function.
73
Cybercrime
Illegal activities executed on the Internet.
74
Cybersquatting
Registering domain names in the hope of selling them later at a higher price.
75
Cyberterrorism
A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
76
Cyberwarfare
War in which a country's information systems could be paralyzed from a massive attack by destructive software.
77
Dashboard
(or digital dashboard) A special form of IS that supports all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
78
Data dictionary
A collection of definitions of data elements; data characteristics that use the data elements; and the individuals, business functions, applications, and reports that use these data elements.
79
Data file
(or table) A collection of logically related records.
80
Data governance
An approach to managing information across an entire organization.
81
Data items
An elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
82
Data mart
A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department.
83
Data model
A diagram that represents entities in the database and their relationships.
84
Data warehouse
A repository of historical data that are organized by subject to support decision makers in the organization.
85
Database
A collection of related files or tables containing data.
86
Database management system (DBMS)
The software program (or group of programs) that provides access to a database.
87
Demilitarized zone
A separate organizational local area network that is located between an organization's internal network and an external network, usually the Internet.
88
Denial-of-service attack
A cyberattack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.
89
Digital certificate
An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
90
Digital divide
The gap between those who have access to information and communications technology and those who do not.
91
Digital dossier
An electronic description of an individual and his or her habits.
92
Digital wallet
An application used for making online payments
93
Direct conversion
A systems implementation process in which the old system is cut off and the new system is turned on at a certain point in time.
94
Disintermediation
Elimination of intermediaries in electronic commerce.
95
Distributed denial-of-service attack
A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.
96
Documentation
Written description of the functions of a software program.
97
E-government
The use of electronic commerce to deliver information and public services to citizens, business partners, and suppliers of government entities, and those working in the public sector.
98
E-procurement
Purchasing by using electronic support.
99
Electronic banking
(or cyberbanking) Various banking activities conducted electronically from home, a business, or on the road instead of at a physical bank location.
100
Electronic business
(or e-business) A broader definition of electronic commerce, including buying and selling of goods and services, and servicing customers, collaborating with business partners, conducting e-learning, and conducting electronic transactions within an organization.
101
Electronic commerce
(or EC or e-commerce) The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet.
102
Electronic commerce systems
A type of interorganizational information system that enables organizations to conduct transactions, called business-to-business electronic commerce, and customers to conduct transactions with businesses, called business-to-consumer electronic commerce.
103
Electronic mall
(or cybermall or e-mall) A collection of individual shops under one Internet address.
104
Electronic marketplace
A virtual market space on the Web where many buyers and many sellers conduct electronic business activities.
105
Electronic payment mechanisms
Computer-based systems that allow customers to pay for goods and services electronically, rather than writing a cheque or using cash.
106
Electronic retailing
(or e-tailing) The direct sale of products and services through storefronts or electronic malls to the end customer, usually designed around an electronic catalogue format and/or auctions.
107
Electronic storefront
The website of a single company, with its own Internet address, at which orders can be placed.
108
Electronic surveillance
Tracking people's activities with the aid of computers.
109
Employee monitoring systems
Systems that monitor employees' computers, email activities, and Internet surfing activities.
110
Encryption
The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
111
End-user development
A software development approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department.
112
Enterprise resource planning systems
Information systems that correct a lack of communication among the functional area ISs by tightly integrating the functional area ISs via a common database.
113
Entity
Any person, place, thing, or event of interest to a user.
114
Entity-relationship (ER) diagram
A document that shows data entities and attributes and relationships among them.
115
Entity-relationship (ER) modelling
The process of designing a database by organizing data entities to be used and identifying the relationships among them.
116
Entry barrier
Product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete.
117
Ergonomics
The science of adapting machines and work environments to people; it focuses on creating an environment that is safe, well lit, and comfortable.
118
Ethics
The principles of right and wrong that individuals use to make choices to guide their behaviours.
119
Exchanges
(or Public exchanges) Electronic marketplaces in which there are many sellers and many buyers, and entry is open to all; frequently owned and operated by a third party.
120
Expert system
A system that attempts to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
121
Explicit knowledge
The more objective, rational, and technical types of knowledge.
122
Exposure
The harm, loss, or damage that can result if a threat compromises an information resource.
123
Extensible markup language (XML)
A computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data.
124
Fat clients
Computers that offer full functionality without having to connect to a network.
125
Feasibility study
An investigation that gauges the probability of success of a proposed project and provides a rough assessment of the project's feasibility.
126
Field
A characteristic of interest that describes an entity.
127
Firewall
A system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network.
128
Flash memory devices
Nonvolatile electronic storage devices that are compact, are portable, require little power, and contain no moving parts.
129
Foreign key
A field (or group of fields) in one table that uniquely identifies a row (or record) of another table.
130
Forward auction
Auction that sellers use as a selling channel to many potential buyers; the highest bidder wins the items.
131
Functional area information system
A system that supports a particular functional area within the organization.
132
Functional dependency
A means of expressing that the value of one particular attribute is associated with, or determines, a specific single value of another attribute.
133
General controls
Controls that apply to more than one functional area.
134
Gesture recognition
An input method that interprets human gestures, in an attempt for computers to begin to understand human body language.
135
Globalization
The integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology.
136
Graphical user interface
Systems software that allows users to have direct control of the hardware by manipulating visible objects (such as icons) and actions, which replace command syntax.
137
Grid computing
A technology that applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.
138
Group purchasing
The aggregation of purchasing orders from many buyers so that a volume discount can be obtained.
139
Hardware
A device such as a processor, monitor, keyboard, or printer. Together, these devices accept, process, and display data and information.
140
HTML5
A page-description language that makes it possible to embed images, audio, and video directly into a document without add-ons. Also makes it easier for web pages to function across different display devices, including mobile devices and desktops, and supports the storage of data offline.
141
Hybrid clouds
Clouds composed of public and private clouds that remain unique entities but are bound together, offering the benefits of multiple deployment models.
142
Hypertext markup language (HTML)
A page-description language for specifying how text, graphics, video, and sound are placed on a web page document.
143
Identity theft
Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.
144
Implementation
The process of converting from an old computer system to a new one.
145
Individual social responsibility
Efforts by organizations or individuals to solve various social problems.
146
Information
Data that have been organized so that they have meaning and value to the recipient.
147
Information privacy
The right to determine when, and to what extent, personal information can be gathered by and/or communicated to others.
148
Information security
Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
149
Information system
A system that collects, processes, stores, analyzes, and disseminates information for a specific purpose.
150
Information systems audit
An examination of information systems, their inputs, outputs, and processing.
151
Information technology
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization.
152
Information technology components
Hardware, software, databases, and networks.
153
Information technology infrastructure
IT components plus IT services.
154
Information technology platform
Formed by the IT components of hardware, software, networks (wireline and wireless), and databases.
155
Information technology services
Services performed by IT personnel using IT components, including developing information systems, overseeing security and risk, and managing data.
156
Informed user
A person knowledgeable about information systems and information technology.
157
Infrastructure-as-a-service (IaaS) model
A model with which cloud computing providers offer remotely accessible servers, networks, and storage capacity.
158
Instance
Each row in a relational table, which is a specific, unique representation of the entity.
159
Integrated CASE (ICASE) tools
CASE tools that provide links between upper CASE and lower CASE tools.
160
Intellectual capital
(or intellectual assets) Other terms for "knowledge."
161
Intellectual property
The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.
162
Interorganizational information systems
Information systems that connect two or more organizations.
163
IS operational plan
A clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.
164
IT governance
A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes.
165
IT steering committee
A committee, composed of a group of managers and staff representing various organizational units, set up to establish IT priorities and to ensure that the MIS function is meeting the needs of the enterprise.
166
IT strategic plan
A set of long-range goals that describe the IT infrastructure and major IT initiatives needed to achieve the goals of the organization.
167
Join operation
A database operation that combines records from two or more tables in a database.
168
Joint application design
A group-based tool for collecting user requirements and creating system designs.
169
Knowledge
Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem or activity.
170
Knowledge management (KM)
A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner.
171
Knowledge management systems (KMSs)
Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management.
172
Knowledge workers
Professional employees such as financial and marketing analysts, engineers, lawyers, and accountants, who are experts in a particular subject area and create information and knowledge, which they integrate into the business.
173
Least privilege
A principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.
174
Liability
A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
175
Logic bombs
Segments of computer code embedded within an organization's existing computer programs.
176
Logical controls
Controls that are implemented by software.
177
Lower CASE tools
Tools used to automate later stages in the systems development life cycle (programming, testing, operation, and maintenance).
178
Magnetic disks
(or hard drives or fixed disk drives) A form of secondary storage on a magnetized disk divided into tracks and sectors that provide addresses for various pieces of data.
179
Magnetic tape
A secondary storage medium on a large open reel or in a smaller cartridge or cassette.
180
Make-to-order
The strategy of producing customized products and services.
181
Malware
Malicious software such as viruses and worms.
182
Mashup
Website that takes different content from a number of other websites and mixes them together to create a new kind of content.
183
Mass customization
A production process in which items are produced in large quantities but are customized to fit the desires of each customer.
184
Master data
A set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span an enterprise's information systems.
185
Master data management
A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for a company's core master data.
186
Microblogging
A form of blogging that allows users to write short messages (or capture an image or embedded video) and publish them.
187
Microprocessor
The CPU, made up of millions of transistors embedded in a circuit on a silicon wafer or chip.
188
Mobile commerce
(or m-commerce) Electronic commerce conducted in a wireless environment.
189
Moore's law
Prediction by Gordon Moore, an Intel cofounder, that microprocessor complexity would double approximately every two years.
190
Multichannelling
A process in which a company makes its products available for sale using both online and off-line channels (for example, through retail stores).
191
Multidimensional structure
Storage of data in more than two dimensions; a common representation is the Data cube.
192
Multimedia technology
Computer-based integration of text, sound, still images, animation, and digitized full-motion video.
193
Network
A connecting system (wireline or wireless) that permits different computers to share resources.
194
Network controls
(or Communications controls) Controls that deal with the movement of data across networks.
195
Normalization
A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
196
Object-oriented development
A systems development methodology that begins with aspects of the real world that must be modelled to perform a task.
197
Office automation system
Software that supports the daily work activities of individuals and groups, such as software for creating documents and preparing emails.
198
On-premise computing
A model of IT management where companies own their IT infrastructure (software, hardware, networks, and data management) and maintain it in their data centres.
199
Open system
Computing products that work together by using the same operating system with compatible software on all the computers that interact in an organization.
200
Open-source software
Software made available in source-code form at no cost to developers.
201
Operating system
The main system control program, which supervises the overall operations of the computer, allocates CPU time and main memory to programs, and provides an interface between the user and the hardware.
202
Opt-in model
A model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it.
203
Opt-out model
A model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.
204
Optical storage devices
A form of secondary storage in which a laser reads the surface of a reflective plastic platter.
205
Organizational social responsibility
(or individual social responsibility) Efforts by organizations or individuals to solve various social problems.
206
Outsourcing
The use of outside contractors or external organizations to acquire IT services.
207
Package
(or software suite) An integrated group of computer programs developed by a vendor and available for purchase in prepackaged form.
208
Password
A private combination of characters that only the user should know.
209
Patent
A document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.
210
Permission marketing
Method of marketing that asks consumers to give their permission to voluntarily accept online advertising and email.
211
Personal application software
General-purpose, off-the-shelf application programs that support general types of processing, rather than being linked to any specific business function.
212
Phased conversion
A systems implementation process that introduces components of the new system in stages, until the entire new system is operational.
213
Phishing attack
An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking email.
214
Physical controls
Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
215
Pilot conversion
A systems implementation process that introduces the new system in one part of the organization on a trial basis; when the new system is working properly, it is introduced in other parts of the organization.
216
Piracy
Copying a software program (other than freeware, demo software, etc.) without making payment to the owner.
217
Platform-as-a-service (PaaS) model
A model with which customers rent servers, operating systems, storage, a database, software development technologies such as Java and .NET, and network capacity over the Internet.
218
Pop-under ad
An advertisement that is automatically launched by some trigger and appears underneath the active window.
219
Pop-up ad
An advertisement that is automatically launched by some trigger and appears in front of the active window.
220
Primary activities
Those business activities related to the production and distribution of the firm's products and services, thus creating value.
221
Primary key
A field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated, and sorted.
222
Primary storage
(or main memory) High-speed storage located directly on the motherboard that stores data to be processed by the CPU, instructions telling the CPU how to process the data, and operating system programs.
223
Privacy
The right to be left alone and to be free of unreasonable personal intrusions.
224
Privacy codes
(or privacy policies) An organization's guidelines for protecting the privacy of customers, clients, and employees.
225
Privacy policies
(or privacy codes) An organization's guidelines for protecting the privacy of customers, clients, and employees.
226
Private clouds
(or Internal clouds or Corporate clouds) IT infrastructures that are accessible only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all the business units within a single organization.
227
Privilege
A collection of related computer system operations that can be performed by users of the system.
228
Procedures
The set of instructions for combining hardware, software, database, and network components in order to process information and generate the desired output.
229
Profiling
The process of forming a digital dossier.
230
Programmers
IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements.
231
Programming
The translation of a system's design specifications into computer code.
232
Proprietary software
Software that has been developed by a company and has restrictions on its use, copying, and modification.
233
Prototype
A small-scale working model of an entire system or a model that contains only the components of the new system that are of most interest to the users.
234
Prototyping
An approach to systems development that defines an initial list of user requirements, builds a prototype system, and then improves the system in several iterations based on users' feedback.
235
Public clouds
Shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations).
236
Public exchanges
(or exchanges) Electronic marketplaces in which there are many sellers and many buyers, and entry is open to all; frequently owned and operated by a third party.
237
Public-key encryption
(or asymmetric encryption) A type of encryption that uses two different keys: a public key and a private key.
238
Query by example (QBE)
Obtaining information from a relational database by filling out a grid or template—also known as a Form—to construct a sample or a description of the data desired.
239
Random access memory
The part of primary storage that holds a software program and small amounts of data when they are brought from secondary storage.
240
Rapid application development
A systems development method that uses special tools and an iterative approach to rapidly produce a high-quality system.
241
Read-only memory
Type of primary storage where certain critical instructions are safeguarded; the storage is nonvolatile and retains the instructions when the power to the computer is turned off.
242
Really Simple Syndication
A technology that allows users to receive the information they want, when they want it, without having to surf thousands of websites.
243
Record
A grouping of logically related fields.
244
Registers
High-speed storage areas in the CPU that store very small amounts of data and instructions for short periods.
245
Relational database model
A data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
246
Relationships
Operators that illustrate an association between two entities.
247
Responsibility
A tenet of ethics in which you accept the consequences of your decisions and actions.
248
Reverse auction
Auction in which one buyer, usually an organization, seeks to buy a product or a service, and suppliers submit bids; the lowest bidder wins.
249
Risk
The likelihood that a threat will occur.
250
Risk acceptance
A strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
251
Risk analysis
The process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
252
Risk limitation
A strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
253
Risk management
A process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels.
254
Risk mitigation
A process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
255
Risk transference
A process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.
256
Scope creep
The addition of functions to an information system after the project has begun.
257
Secondary key
A field that has some identifying information, but typically does not uniquely identify a record with complete accuracy.
258
Secondary storage
Technology that can store very large amounts of data for extended periods.
259
Secure socket layer
(or Transport layer security) An encryption standard used for secure transactions such as credit card purchases and online banking.
260
Sell-side marketplace
Business-to-business model in which organizations sell to other organizations from their own private e-marketplace and/or from a third-party site.
261
Server farms
Collections of hundreds or thousands of networked server computers maintained in a single location and used for applications that require very large amounts of computing power.
262
Server virtualization
A technology that uses software-based partitions to create multiple virtual servers (called Virtual machines) on a single physical server.
263
Servers
Computers that support networks, enabling users to share files, software, and other network devices.
264
Service-oriented architecture
An IT architecture that makes it possible to construct business applications using web services.
265
Smart cards
Cards that contain a microprocessor (chip) that enables the card to store a considerable amount of information (including stored funds) and to conduct processing.
266
Social advertising
Advertising formats that make use of the social context of the user viewing the ad.
267
Social capital
The number of connections a person has within and between social networks.
268
Social commerce
The delivery of electronic commerce activities and transactions through social computing.
269
Social computing
A type of information technology that combines social behaviour and information systems to create value.
270
Social engineering
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
271
Social graph
A map of all relevant links or connections for one member of a social network.
272
Social intelligence
The monitoring, collection, and analysis of socially generated data and the resultant strategic decisions.
273
Social interface
A user interface that guides the user through computer applications by using cartoon-like characters, graphics, animation, and voice commands.
274
Social marketplaces
Online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.
275
Social network
A social structure composed of individuals, groups, or organizations linked by values, visions, ideas, financial exchange, friendship, kinship, conflict, or trade.
276
Social networking
Activities performed using social software tools (e.g., blogging) or social networking features (e.g., media sharing).
277
Social shopping
A method of electronic commerce that takes all of the key aspects of social networks—friends, groups, voting, comments, discussions, reviews, etc.—and focuses them on shopping.
278
Software
A set of computer programs that enable the hardware to process data.
279
Software suite
An integrated group of computer programs developed by a vendor and available for purchase in prepackaged form.
280
Software-as-a-service
A method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the Internet.
281
Software-as-a-service (SaaS) delivery model
A delivery model with which cloud computing vendors provide software that is specific to their customers' requirements.
282
Solid-state drives
Data storage devices that serve the same purpose as a hard drive and store data in memory chips.
283
Spam
Unsolicited email.
284
Spamming
Indiscriminate distribution of email without the receiver's permission.
285
Spamware
Alien software that uses your computer as a launch platform for spammers.
286
Spear phishing
An attack that uses deception to target large groups of people, by masquerading as official-looking emails or instant messages.
287
Speech-recognition software
Software that recognizes and interprets human speech, either one word at a time (discrete speech) or in a stream (continuous speech).
288
Spyware
Alien software that can record your keystrokes and/or capture your passwords.
289
Stored-value money cards
A form of electronic cash on which a fixed amount of prepaid money is stored; the amount is reduced each time the card is used.
290
Strategic information systems
Systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity.
291
Structured query language (SQL)
The most popular query language for requesting information from a relational database.
292
Supply chain
The flow of materials, information, money, and services from suppliers of raw materials through factories and warehouses to the end customers.
293
Support activities
Business activities that do not add value directly to a firm's product or service under consideration but support the primary activities that do add value.
294
Systems analysis
The examination of the business problem that the organization plans to solve with an information system.
295
Systems analysts
IS professionals who specialize in analyzing and designing information systems.
296
Systems design
The way in which a new system will resolve a business problem.
297
Systems development life cycle
The traditional structured framework, used for large IT projects, that consists of sequential processes by which information systems are developed.
298
Systems investigation
The initial stage in the traditional systems development life cycle that addresses the business problem (or business opportunity) by means of the feasibility study.
299
Systems software
The class of computer instructions that serve primarily as an intermediary between computer hardware and application programs; provides important self-regulatory functions for computer systems.
300
Systems stakeholders
All people who are affected by changes in information systems.
301
Table
(or Data file) A collection of logically related records.
302
Tacit knowledge
The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.
303
Tag
A keyword or term that describes a piece of information.
304
Technical specialists
Experts in a certain type of technology, such as databases or telecommunications.
305
Ternary relationship
A relationship that exists when three entities are associated.
306
Thin client
A computer that does not offer the full functionality of a fat client.
307
Threat
Any danger to which an information resource may be exposed.
308
Thumb drive
Storage device that fits into the universal serial bus port of a personal computer and is used for portable storage.
309
Trade secret
Intellectual work, such as a business plan, that is a company secret and is not based on public information.
310
Transaction processing system
A system that supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
311
Transport layer security
(or secure socket layer) An encryption standard used for secure transactions such as credit card purchases and online banking.
312
Trap door
(or Back door) Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
313
Trojan horse
A software program containing a hidden function that presents a security risk.
314
Tunnelling
A process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
315
Tweets
Messages and updates posted by users on Twitter.
316
Twitter
A free microblogging service that allows its users to send messages and read other users' messages and updates.
317
Unary relationship
A relationship that exists when an association is maintained within a single entity.
318
Upper CASE tools
Tools that are used to automate the early stages of the systems development life cycle (systems investigation, analysis, and design).
319
Utility computing
A technology whereby a service provider makes computing resources and infrastructure management available to a customer as needed.
320
Value chain
A sequence of activities through which the organization's inputs, whatever they are, are transformed into more valuable outputs, whatever they are.
321
Value chain model
A business framework devised by Michael Porter that shows the primary activities that sequentially add value to the profit margin; also shows the support activities.
322
Value system
A business system that includes the producers, suppliers, distributors, and buyers, all with their value chains.
323
Viral marketing
Online word-of-mouth marketing.
324
Virtual organizations
(or pure play organizations) Organizations in which the product, the process, and the delivery agent are all digital.
325
Virtual private network
A private network that uses a public network (usually the Internet) to securely connect users by using encryption.
326
Virus
Malicious software that can attach itself with (or "infect") other computer programs without the owner of the program being aware of the infection.
327
Vulnerability
The possibility that an information resource will be harmed by a threat.
328
Web 2.0
A loose collection of information technologies and applications, plus the websites that use them.
329
Web 2.0 media
Any website that provides user-generated media content and promotes tagging, rating, commenting, and other interactions among users and their media contributions.
330
Web services
Applications delivered over the Internet that IT developers can select and combine through almost any device, from personal computers to mobile phones.
331
Weblog
(or Blog) A personal website, open to the public, in which the site creator expresses his or her feelings or opinions with a series of chronological entries.
332
Whitelisting
A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
333
Wiki
A website on which anyone can post material and make changes to other material.
334
Worms
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
335
Zombie
(or Bot) A computer that has been compromised by, and is under the control of, a hacker.