Page 627 -
P. 627

626    Index


        Chatter (Salesforce), 93, 96, 389     unified communications, 298       handheld computers, 277
        chief information officer (CIO), 99     See also networks and networking;      health risks, 182-183
        chief knowledge officer (CKO), 99, 453  telecommunications technology     history and evolution of, 197-201
        chief privacy officer (CPO), 99    communities, 90                      history of, 117
        chief security officer (CSO), 99, 323  communities of practice (COPs), 453     as instruments of crime, 332
        child domain, 289                  competition, Porter's competitive forces model,      legacy systems, 209, 223, 519
        Child Pornography Act, 333            124-125, 138, 142, 228-229        machine learning, 468, 475
        Children's Online Privacy Protection Act   competitive advantage        mainframes, 197, 207, 209
           (COPPA), 164                       as business objective, 44-45      netbooks, 210
        China                                 information systems for, 123-140  scalability, 226
           cyberwarfare and, 334              Internet and, 128, 130-137        servers, 197, 281
           imports and exports, 38            sustaining, 140                   supercomputers,  211
           monitoring and blocking of Internet   competitive forces model, 124-125, 138, 142,      tablet computers, 36-37, 173, 210, 319
           access, 15-20                      228-229                           as targets of crime, 332
        Chrome OS (Google), 207, 220       Compiere (open source software), 388-389     "zombie" PCs, 331
        churn rate, 387, 512               complementary assets, about, 56-58, 62  computing
        CIO. See chief information officer  component-based development, 544-545, 549     autonomic computing, 218, 230
        Cisco TelePresence, 84             computer abuse, 180                  client/server computing, 199-200, 282-283,
        Cisco WebEx, 94                    computer-aided design (CAD), 459-461, 462,   293, 295
        Citrix Systems XenDesktop, 213        475                               cloud computing, 36-38, 200, 213-216, 224,
        CityVille (online game), 513       computer-aided software engineering (CASE),   226, 230, 234-236
        CKO. See chief knowledge officer      536                               computer abuse, 180
        class, 535                         computer crime, 177, 330-335         computer crime, 178
        classical model of management, 488     botnets, 180, 181, 331, 334      decentralized vs. centralized, 176-177
        classification (data analysis), 259   bugs, 335                         downtime, 351
        click fraud, 334                      click fraud, 334                  end-user computing, 541
        clickstream behavior, 421, 422        cyberterrorism and cyberwarfare, 334-336     enterprise computing, 200
        client/server computing, 199-200, 282-283, 293,   cybervandalism, 330-331     fault-tolerant computer systems, 351, 357
           295                                data breaches, 333                green computing (green IT), 216, 217-218,
        client/server network, 199            defined, 332                      230
        clients (computers), 199              denial-of-service (DoS) attacks, 331, 357     grid computing, 211, 230
        cloud-based data management services, 249     digital piracy, 173-174, 184     health risks, 182-183
        cloud-based software, 215, 224, 389     employees and, 335              high-availability computing, 351, 357
        cloud computing, 36-38, 200, 213-216, 230     evil twins, 333           history and evolution of, 197-201
           about, 352, 542                    identity theft, 332-333           in-memory computing, 256, 268
           case study, 234-236                keyloggers, 330, 336              lifestyle and, 177
           customer relationship management   legislation, 333-334              mobile computing, 177, 201, 207
           (CRM), 390-391                     pharming, 333                     on-demand computing, 215
           data management services, 249      spoofing and sniffing, 331        recovery-oriented computing, 351
           databases in, 247, 249             spyware, 167, 330                 system availability, 350-352
           hybrid cloud computing, 216        See also malware; security        ubiquitous computing, 177
           limitations of, 215             Computer Crime and Security Survey (Computer      utility computing, 215
           private cloud, 215                 Security Institute), 178          virtualization, 211, 213, 230
           public cloud, 215               computer forensics, 339-340          computing platforms, 36-38, 51, 195, 210-
           reliability, 235                Computer Fraud and Abuse Act (1986), 333  216
           scalability, 226                computer hardware. See hardware      See also mobile digital platform
           security, 352-353               computer literacy, 48             concurrent supply chains, 379
           software as a service, 215, 224  Computer Matching and Privacy Protection Act   Conficker (malware), 329
        cloud infrastructure, as a service, 214-215  (1988), 163             conflict, 50
        cloud platform, as a service, 215  computer networks. See networks and   Connect (Adobe), 94
        CLTV. See customer lifetime value     networking                     Connections (IBM), 93, 96
        clustering (data analysis), 259    computer operations controls, 341  connectivity, global IS, 15-20-15-21
        coaxial cable, 287                 computer programs. See software   consumer privacy
        COBOL (Common Business Oriented    computer security. See security      clickstream behavior, 421, 422
           Language), 205                  Computer Security Act (1987), 163     European legislation, 165
        Code Division Multiple Access. See CDMA  computer software. See software     "right to be forgotten", 165
        codes of conduct, 161              Computer Software Copyright Act (1980), 172     U.S. legislation, 164
        Cognos Business Intelligence (IBM), 494, 15-18  computer viruses and worms, 328-329, 336,   Consumer Product Safety Act, 264
        collaboration, 37, 72, 88-92, 456, 475  348, 357                     consumer-to-consumer e-commerce. See C2C
        collaboration tools, 37, 92-98, 101, 15-22  computer vision syndrome (CVS), 183  e-commerce
        collaborative business culture, 91  computers, 47                    consumerization, of IT, 210-211
        collaborative shopping, with social commerce,      "bring your own device" (BYOD), 210, 212-  contact point, 381
           426                                213, 353                       content management systems, 455-456
        CombineNet ASAP (software system), 15-23-15-  clients, 197           content providers, 414, 415
           24                                 computer-related liability problems, 174-  continuous replenishment system, 126
        Common Business Oriented Language.    175                            controls, 156, 325, 340-341
           See COBOL                          dependence on and vulnerability, 177-178     business value of, 338-340, 357
        Common Gateway Interface (CGI), 263     doubling of computing power every 18      formal control tools, 575
        communication                         months, 157                    "conversations", 89-90
           digital vs. analog signals, 285     equal access to information and   conversion, 530, 532
           trends in, 279-285                 computing, 182                 cookies, 165, 166, 184




   MIS13_Index global.indd   I626                                                                             1/17/2013   2:34:22 PM
   622   623   624   625   626   627   628   629   630   631   632