Page 613 -
P. 613

612    Glossary


        high-availability computing  Tools and technologies ,including   information systems managers  Leaders of the various specialists
            backup hardware resources, to enable a system to recover quickly   in the information systems department.
            from a crash.                                    information systems plan  A road map indicating the direction of
        HIPAA  Law outlining rules for medical security, privacy, and the   systems development: the rationale, the current situation, the
            management of health care records.                   management strategy, the implementation plan, and the budget.
        hotspot  A specific geographic location in which an access point   information technology (IT)  All the hardware and software
            provides public Wi-Fi network service.               technologies a firm needs to achieve its business objectives.
        HTML (Hypertext Markup Language) Page description    information technology (IT) infrastructure  Computer
            language for creating Web pages.                     hardware, software, data, storage technology, and networks
        HTML5  Next evolution of HTML, which will make it possible to   providing a portfolio of shared IT resources for the organization.
            embed images, video, and audio directly into a document without   informational roles  Mintzberg’s classification for managerial roles
            add-on software.                                     where managers act as the nerve centers of their organizations,
        hubs  Very simple devices that connect network components,   receiving and disseminating critical information.
            sending a packet of data to all other connected devices.  informed consent  Consent given with knowledge of all the facts
        hybrid AI systems  Integration of multiple AI technologies into a   needed to make a rational decision.
            single application to take advantage of the best features of these   input  The capture or collection of raw data from within the
            technologies.                                        organization or from its external environment for processing in
        hybrid cloud  Computing model where firms use  both their own IT   an information system.
            infrastructure and also public cloud  computing services.  instant messaging  Chat service that allows participants to create
        hypertext transfer protocol (HTTP)  The communications   their own private chat channels so that a person can be alerted
            standard used to transfer pages on the Web. Defines how   whenever someone on his or her private list is on-line to initiate
            messages are formatted and transmitted.              a chat session with that particular individual.
                                                             intangible benefits  Benefits that are not easily quantified; they
        identity management  Business processes and software tools for    include more efficient customer service or enhanced decision
            identifying the valid users of a system and controlling their   making.
            access to system resources.                      intellectual property  Intangible property created by individuals
        identity theft  Theft of key pieces of personal information, such as   or corporations that is subject to protections under trade secret,
            credit card or Social Security numbers, in order to obtain   copyright, and patent law.
            merchandise and services in the name of the victim or to obtain   intelligence  The first of Simon’s four stages of decision making,
            false credentials.                                   when the individual collects information to identify problems
        Immanuel Kant’s Categorical Imperative  A principle that   occurring in the organization.
            states that if an action is not right for everyone to take it is not   intelligent agent  Software program that uses a built-in or learned
            right for anyone.                                    knowledge base to carry out specific, repetitive, and predictable
        implementation   All the organizational activities surrounding   tasks for an individual user, business process, or software
            the adoption, management, and routinization of an    application.
            innovation, such as a new information system.    intelligent techniques  Technologies that aid human decision
        in-memory computing  Technology for very rapid analysis and   makers by capturing individual and collective knowledge,
            processing of large quantities of data by storing the data in the   discovering patterns and behaviors in large quantities of data,
            computer’s main memory rather than in secondary storage.  and generating solutions to problems that are too large and
        inference engine  The strategy used to search through the rule   complex for human beings to solve on their own.
            base in an expert system; can be forward or backward chaining.  internal integration tools  Project management technique that
        information  Data that have been shaped into a form that is   ensures that the implementation team operates as a cohesive
            meaningful and useful to human beings.               unit.
        information asymmetry  Situation where the relative bargaining   international information systems architecture  The basic
            power of two parties in a transaction is determined by one party   information systems required by organizations to coordinate
            in the transaction possessing more information essential to the   worldwide trade and other activities.
            transaction than the other party.                Internet  Global network of networks using universal standards to
        information density  The total amount and quality of information   connect millions of different networks.
            available to all market participants, consumers, and merchants.  Internet Protocol (IP) address  Four-part numeric address
        information policy  Formal rules governing the maintenance,   indicating a unique computer location on the Internet.
            distribution, and use of information in an organization.  Internet Service Provider (ISP)  A commercial organization with
        information requirements  A detailed statement of the    a permanent connection to the Internet that sells temporary
            information needs that a new system must satisfy; identifies who   connections to subscribers.
            needs what information, and when, where, and how the   Internet2  Research network with new protocols and transmission
            information is needed.                               speeds that provides an infrastructure for supporting high-
        information rights  The rights that individuals and organizations   bandwidth Internet applications.
            have with respect to information that pertains to themselves.  interorganizational systems  Information systems that automate
        information system  Interrelated components working together to   the flow of information across organizational boundaries and link
            collect, process, store, and disseminate information to support   a company to its customers, distributors, or suppliers.
            decision making, coordination, control, analysis, and   interpersonal roles  Mintzberg’s classification for managerial roles
            visualization in an organization.                    where managers act as figureheads and leaders for the
        information systems department  The formal organizational   organization.
            unit that is responsible for the information systems function in   intranet  An internal network based on Internet and World Wide
            the organization.                                    Web technology and standards.
        information systems literacy  Broad-based understanding of   intrusion detection system  Tools to monitor the most vulnerable
            information systems that includes behavioral knowledge about   points in a network to detect and deter unauthorized intruders.
            organizations and individuals using information systems as well   investment workstation  Powerful desktop computer for financial
            as technical knowledge about computers.              specialists, which is optimized to access and manipulate massive
                                                                 amounts of financial data.






   MIS_13_Glossary global.indd   612                                                                          1/17/2013   2:34:05 PM
   608   609   610   611   612   613   614   615   616   617   618