Page 631 -
P. 631
630 Index
networking, 209 defined, 45, 46, 449 postimplementation audit, 531-532
theft, 341 equal access to information and potential for catastrophic failure, 176
total cost of ownership (TCO), 227, 568 computing, 182 production and maintenance, 531-532
HBase, 255, 256 See also business analytics; business project management, 559-581
HDFS. See Hadoop Distributed File System intelligence quality of life, 156, 176-183
health care, electronic medical records, 164, Information Age, moral dimensions of, 155-156 scalability, 226
338, 357 information asymmetry, 409-410, 439 security, 323-357
health information, privacy legislation, 164 information density, in e-commerce, 407, 408 security policy, 342-343, 357
Health Insurance Portability and information policy, 265-266, 269 sociotechnical perspective on, 59-61
Accountability Act (HIPAA) (1996), 164, information quality, 490 strategic business objectives of, 42-43
338, 357 information requirements, 528 supply chain management and, 374-376
hertz (unit), 287 information resource protection, 345-353 system availability, 350-352
high-availability computing, 351, 357 antivirus and antispyware solutions, 348, system quality, 156, 176
High Performance Analytics Appliance 357 systems analysis, 528, 532, 549
(HANA), 256 auditing, 344-345 systems design, 528-536, 549
HIPAA. See Health Insurance Portability and authentication, 336, 345, 346 technical approach to, 58, 59
Accountability Act digital certificates, 350, 351, 357 testing, 530-531, 532
homeland security, nonobvious relationship encryption, 349-350, 352, 357 total cost of ownership (TCO), 227, 568
awareness (NORA), 158-159 ensuring system availability, 350-352 transaction processing systems (TPS),
host country systems units, 15-11 firewalls, 347-348, 357 76-77, 101, 501
hosting, Web sites, 437-438 identity management, 345-346 types, 75-83
hotspots, 309, 310 intrusion detection systems, 348, 357 See also systems development
HTML (Hypertext Markup Language), 220, public key infrastructure (PKI), 350 information systems controls, 156, 325, 340-341
291, 314 securing wireless networks, 349 risk assessment, 341-342
HTML5, 220, 230 unified threat management (UTM) security policy, 342-343, 357
HTTP (Hypertext Transfer Protocol), 284, 299 systems, 348-349 information systems department, 98, 99-100
hubs, 281 See also information systems controls information systems literacy, 48
human resources, business processes, 74 information rights, 156 information systems managers, 99
hybrid AI systems, 474 information society, ethical and moral issues, information systems plan, 564-566
hybrid cloud computing, 216 155-156, 159-183, 184 information systems projects
HyperPlant (DuPont), 462 information systems (IS) business value of, 567-571, 582
Hypertext, 299 about, 62 cooptation, 15-16
Hypertext Transfer Protocol. See HTTP activities producing information, 46 evaluating, 566-567, 582
auditing, 344-345 failure, 176, 558, 559-560, 573
I behavioral approach to, 58-59 implementation, 572-574, 577-579, 582,
iAd platform (Apple), 434 behavioral impact of, 122 15-15-15-16
IBM BigSheets, 261 building, 517-546 information systems plan, 564-566
IBM Cognos Business Intelligence, 494, 15-18 business continuity planning, 344 key performance indicators (KPIs), 504,
IBM Connections, 93, 96 business impact of, 35-36, 42-43, 62, 101 563, 566, 582
IBM DB2, 246, 250 business intelligence systems, 77, 79-83 management structure for project team,
IBM InfoSphere BigInsights software, 261 business perspective on, 52, 55-56 563-564
IBM Lotus Domino server, 95 capital budgeting for, 569-570 objectives, 560, 562-563
IBM Lotus Notes, 92, 93, 95, 304, 15-19 for competitive advantage, 123-140 pricing models, 570-571
IBM Lotus Quickr, 96 contemporary approaches to, 58-59 project management, 559-581
IBM Netezza, 256 controls, 156, 325, 340-341 project risk, 572-574, 582
IBM SmartCloud for Business, 93 costs and benefits analysis, 568-569 See also project management; systems
IBM SmartCloud for Social Business, 96 defined, 45, 62 development
IBM WebSphere, 562 design of, 123 information systems steering committee, 563
IC3. See Internet Crime Complaint Center documentation, 531 information technology (IT), 184
IdeaExchange (Salesforce), 389 economic impacts of, 119-120 about, 51
Identity Fraud Report (Javelin Strategy & equal access to information and behavioral impact of, 122
Research), 333 computing, 182 "bring your own device" (BYOD), 210, 212-
identity management, 342, 345-346 ethical and moral issues, 155-156, 162-183, 213, 353
identity theft, 332-333 184 business ecosystems and, 139, 143
illegal file sharing, 173-174 ethical dilemmas, 162 business objectives and, 141
ILOVEYOU (malware), 329 failure, 176, 558, 559-560, 573 business processes, 75
IM. See instant messaging functions of, 47 capital investment statistics, 35
Immersive Virtual Environment (Ford), 461 globalization and, 41, 62 defined, 45
implementation information requirements, 528 economic impacts of, 119-120
case study, 578-579 information rights and, 162-169, 170-171 equal access to information and
controls, 341 international information systems, 15-3- computing, 182
counterimplementation, 577 15-24 flattened organizations and, 120-121
postimplementation audit, 531-532 liability law, 160, 175, 176 information rights, 162-169, 170-171
process, 572-574, 577, 582, 15-15-15-16 management and, 50 job loss due to technology, 181-182, 184
in-memory computing, 256, 268 managerial roles supporting IS, 489 liability law, 160, 175, 176
Incentive Compensation module (Oracle), 518 new themes in, 36 organizational change and, 114, 115, 122,
InDesign (Adobe), 437 organization in companies, 100, 101 520-525, 548
indirect goods, 430 organizational change and, 114, 115, 122, organizational impacts of, 120-122
Industrial Revolution, 38 520-525, 548 postindustrial organizations, 121-122
inference engine, 464, 465 organizational impacts of, 120-122 potential for catastrophic failure, 176
information, 47 organizations and, 48-50, 111-119 quality of life, 156, 176-183
MIS13_Index global.indd I630 1/17/2013 2:34:22 PM

