Page 609 -
P. 609
608 Glossary
botnet A group of computers that have been infected with bot chief information officer (CIO) Senior manager in charge of the
malware without users’ knowledge, enabling a hacker to use the information systems function in the firm.
amassed resources of the computers to launch distributed denial- chief knowledge officer (CKO) Senior executive in charge of the
of-service attacks, phishing campaigns or spam. organization’s knowledge management program.
broadband High-speed transmission technology. Also designates a chief privacy officer (CPO) Responsible for ensuring the
single communications medium that can transmit multiple company complies with existing data privacy laws.
channels of data simultaneously. chief security officer (CSO) Heads a formal security function for
bugs Software program code defects. the organization and is responsible for enforcing the firm’s
bullwhip effect Distortion of information about the demand for a security policy.
product as it passes from one entity to the next across the supply choice Simon’s third stage of decision making, when the individual
chain. selects among the various solution alternatives.
business continuity planning Planning that focuses on how the Chrome OS Google's lightweight computer operating system for
company can restore business operations after a disaster strikes. users who do most of their computing on the Internet; runs on
business driver A force in the environment to which businesses computers ranging from netbooks to desktop computers.
must respond and that influences the direction of business. churn rate Measurement of the number of customers who stop
business ecosystem Loosely coupled but interdependent networks using or purchasing products or services from a company. Used
of suppliers, distributors, outsourcing firms, transportation as an indicator of the growth or decline of a firm’s customer base.
service firms, and technology manufacturers classical model of management Traditional description of
business functions Specialized tasks performed in a business management that focused on its formal functions of planning,
organization, including manufacturing and production, sales and organizing, coordinating, deciding, and controlling.
marketing, finance and accounting, and human resources. click fraud Fraudulently clicking on an online ad in pay
business intelligence Applications and technologies to help users per click advertising to generate an improper charge per click.
make better business decisions. client The user point-of-entry for the required function in client/
business model An abstraction of what an enterprise is and how server computing. Normally a desktop computer, workstation, or
the enterprise delivers a product or service, showing how the laptop computer.
enterprise creates wealth. client/server computing A model for computing that splits
business performance management Attempts to systematically processing between clients and servers on a network, assigning
translate a firm’s strategies (e.g., differentiation, low-cost functions to the machine most able to perform the function.
producer, market share growth, and scope of operation) into cloud computing Web-based applications that are stored on
operational targets. remote servers and accessed via the "cloud" of the Internet using
business process management Business process management a standard Web browser.
(BPM) is an approach to business which aims to continuously collaboration Working with others to achieve shared and explicit
improve and manage business processes. goals.
business process redesign Type of organizational change in co-location a kind of Web site hosting in which firm purchase or
which business processes are analyzed, simplified, and rent a physical server computer at a hosting company's location
redesigned. in order to operate a Web site.
business processes The unique ways in which organizations community provider a Web site business model that creates a
coordinate and organize work activities, information, and digital online environment where people with similar interests
knowledge to produce a product or service. can transact (buy and sell goods); share interests, photos, videos;
business-to-business (B2B) electronic commerce Electronic communicate with like-minded people; receive interest-related
sales of goods and services among businesses. information; and even play out fantasies by adopting online
business-to-consumer (B2C) electronic commerce Electronic personalities called avatars.
retailing of products and services directly to individual communities of practice (COPs) Informal social networks of
consumers. professionals and employees within and outside the firm who
byte A string of bits, usually eight, used to store one number or have similar work-related activities and interests and share
character in a computer system. their knowledge.
competitive forces model Model used to describe the interaction
cable Internet connections Internet connections that use digital of external influences, specifically threats and opportunities, that
cable lines to deliver high-speed Internet access to homes and affect an organization’s strategy and ability to compete.
businesses. complementary assets Additional assets required to derive value
capital budgeting The process of analyzing and selecting various from a primary investment.
proposals for capital expenditures. component-based development Building large software systems
carpal tunnel syndrome (CTS) Type of RSI in which pressure on by combining pre-existing software components.
the median nerve through the wrist’s bony carpal tunnel computer abuse The commission of acts involving a computer
structure produces pain. that may not be illegal but are considered unethical.
case-based reasoning (CBR) Artificial intelligence technology computer crime The commission of illegal acts through the use of
that represents knowledge as a database of cases and solutions. a computer or against a computer system.
cell phone A device that transmits voice or data, using radio waves computer forensics The scientific collection, examination,
to communicate with radio antennas placed within adjacent authentication, preservation, and analysis of data held on or
geographic areas called cells. retrieved from computer storage media in such a way that the
change agent In the context of implementation, the individual information can be used as evidence in a court of law.
acting as the catalyst during the change process to ensure computer hardware Physical equipment used for input,
successful organizational adaptation to a new system or processing, and output activities in an information system.
innovation. computer literacy Knowledge about information technology,
change management Managing the impact of organizational focusing on understanding of how computer-based technologies
change associated with an innovation, such as a new information work.
system. computer software Detailed, preprogrammed instructions that
chat Live, interactive conversations over a public network. control and coordinate the work of computer hardware
components in an information system.
MIS_13_Glossary global.indd 608 1/17/2013 2:34:05 PM

