Page 627 -
P. 627
626 Index
Chatter (Salesforce), 93, 96, 389 unified communications, 298 handheld computers, 277
chief information officer (CIO), 99 See also networks and networking; health risks, 182-183
chief knowledge officer (CKO), 99, 453 telecommunications technology history and evolution of, 197-201
chief privacy officer (CPO), 99 communities, 90 history of, 117
chief security officer (CSO), 99, 323 communities of practice (COPs), 453 as instruments of crime, 332
child domain, 289 competition, Porter's competitive forces model, legacy systems, 209, 223, 519
Child Pornography Act, 333 124-125, 138, 142, 228-229 machine learning, 468, 475
Children's Online Privacy Protection Act competitive advantage mainframes, 197, 207, 209
(COPPA), 164 as business objective, 44-45 netbooks, 210
China information systems for, 123-140 scalability, 226
cyberwarfare and, 334 Internet and, 128, 130-137 servers, 197, 281
imports and exports, 38 sustaining, 140 supercomputers, 211
monitoring and blocking of Internet competitive forces model, 124-125, 138, 142, tablet computers, 36-37, 173, 210, 319
access, 15-20 228-229 as targets of crime, 332
Chrome OS (Google), 207, 220 Compiere (open source software), 388-389 "zombie" PCs, 331
churn rate, 387, 512 complementary assets, about, 56-58, 62 computing
CIO. See chief information officer component-based development, 544-545, 549 autonomic computing, 218, 230
Cisco TelePresence, 84 computer abuse, 180 client/server computing, 199-200, 282-283,
Cisco WebEx, 94 computer-aided design (CAD), 459-461, 462, 293, 295
Citrix Systems XenDesktop, 213 475 cloud computing, 36-38, 200, 213-216, 224,
CityVille (online game), 513 computer-aided software engineering (CASE), 226, 230, 234-236
CKO. See chief knowledge officer 536 computer abuse, 180
class, 535 computer crime, 177, 330-335 computer crime, 178
classical model of management, 488 botnets, 180, 181, 331, 334 decentralized vs. centralized, 176-177
classification (data analysis), 259 bugs, 335 downtime, 351
click fraud, 334 click fraud, 334 end-user computing, 541
clickstream behavior, 421, 422 cyberterrorism and cyberwarfare, 334-336 enterprise computing, 200
client/server computing, 199-200, 282-283, 293, cybervandalism, 330-331 fault-tolerant computer systems, 351, 357
295 data breaches, 333 green computing (green IT), 216, 217-218,
client/server network, 199 defined, 332 230
clients (computers), 199 denial-of-service (DoS) attacks, 331, 357 grid computing, 211, 230
cloud-based data management services, 249 digital piracy, 173-174, 184 health risks, 182-183
cloud-based software, 215, 224, 389 employees and, 335 high-availability computing, 351, 357
cloud computing, 36-38, 200, 213-216, 230 evil twins, 333 history and evolution of, 197-201
about, 352, 542 identity theft, 332-333 in-memory computing, 256, 268
case study, 234-236 keyloggers, 330, 336 lifestyle and, 177
customer relationship management legislation, 333-334 mobile computing, 177, 201, 207
(CRM), 390-391 pharming, 333 on-demand computing, 215
data management services, 249 spoofing and sniffing, 331 recovery-oriented computing, 351
databases in, 247, 249 spyware, 167, 330 system availability, 350-352
hybrid cloud computing, 216 See also malware; security ubiquitous computing, 177
limitations of, 215 Computer Crime and Security Survey (Computer utility computing, 215
private cloud, 215 Security Institute), 178 virtualization, 211, 213, 230
public cloud, 215 computer forensics, 339-340 computing platforms, 36-38, 51, 195, 210-
reliability, 235 Computer Fraud and Abuse Act (1986), 333 216
scalability, 226 computer hardware. See hardware See also mobile digital platform
security, 352-353 computer literacy, 48 concurrent supply chains, 379
software as a service, 215, 224 Computer Matching and Privacy Protection Act Conficker (malware), 329
cloud infrastructure, as a service, 214-215 (1988), 163 conflict, 50
cloud platform, as a service, 215 computer networks. See networks and Connect (Adobe), 94
CLTV. See customer lifetime value networking Connections (IBM), 93, 96
clustering (data analysis), 259 computer operations controls, 341 connectivity, global IS, 15-20-15-21
coaxial cable, 287 computer programs. See software consumer privacy
COBOL (Common Business Oriented computer security. See security clickstream behavior, 421, 422
Language), 205 Computer Security Act (1987), 163 European legislation, 165
Code Division Multiple Access. See CDMA computer software. See software "right to be forgotten", 165
codes of conduct, 161 Computer Software Copyright Act (1980), 172 U.S. legislation, 164
Cognos Business Intelligence (IBM), 494, 15-18 computer viruses and worms, 328-329, 336, Consumer Product Safety Act, 264
collaboration, 37, 72, 88-92, 456, 475 348, 357 consumer-to-consumer e-commerce. See C2C
collaboration tools, 37, 92-98, 101, 15-22 computer vision syndrome (CVS), 183 e-commerce
collaborative business culture, 91 computers, 47 consumerization, of IT, 210-211
collaborative shopping, with social commerce, "bring your own device" (BYOD), 210, 212- contact point, 381
426 213, 353 content management systems, 455-456
CombineNet ASAP (software system), 15-23-15- clients, 197 content providers, 414, 415
24 computer-related liability problems, 174- continuous replenishment system, 126
Common Business Oriented Language. 175 controls, 156, 325, 340-341
See COBOL dependence on and vulnerability, 177-178 business value of, 338-340, 357
Common Gateway Interface (CGI), 263 doubling of computing power every 18 formal control tools, 575
communication months, 157 "conversations", 89-90
digital vs. analog signals, 285 equal access to information and conversion, 530, 532
trends in, 279-285 computing, 182 cookies, 165, 166, 184
MIS13_Index global.indd I626 1/17/2013 2:34:22 PM

