Page 633 -
P. 633
632 Index
iterative process, 538 Law of Mass Digital Storage, 202, 203, 230 management information systems (MIS)
iTunes (Apple), 43, 75, 123, 129, 173-174, 403, lead generation, 422 about, 48, 59, 77, 79, 80, 102, 496, 501, 508
411-412, 415, 419 leadership, low-cost, 126, 128 globalization and, 41, 62
learning management system (LMS), 457 management issues, IT infrastructure, 225-229,
J Lebanon, cyberwarfare and, 336 230
JAD. See joint application design legacy systems, 209, 223, 519 managerial complementary assets, 57, 58
Java (Oracle-Sun), 209, 219, 220, 230 legal issues managers, 50, 486, 488-489, 496
Java Virtual Machine (Sun), 220 computer crime and abuse, 178, 180 MANs (metropolitan area networks), 286, 287,
Jive (software), 93, 96 computer forensics, 339-340 314
jobs due process, 160 manufacturing, business processes, 74
globalization and, 38, 41 liability, 160, 174-175, 176 MapReduce (Google), 255
growth in IS/MIS jobs, 99-100 privacy, 157-158, 162-169, 170-171, 184, MapReduce (Hadoop), 255
job loss due to technology, 181-182, 184 190 market creators, 414, 415
knowledge work, 49, 177, 449, 457 See also European legislation; U.S. market entry costs, 408
teamwork in, 88-89 legislation market niche, 127-128
join operation, 247, 248 legitimacy, 15-16 marketing
joint application design (JAD), 544, 549 leisure, Internet use, 177 and CRM systems, 383-384
jQuery Mobile (software), 548 liability, 160, 174-175, 176 display ad marketing, 152-153, 422, 424
just-in-time strategy, 374, 429 lifestyle, family, work, and leisure boundaries, e-commerce, 421-426
177 long tail marketing, 421
K Line-haul (Con-Way), 465 micromarketing, 15-6
Kant's Categorical Imperative, 161 "link farms", 302 predictive analytics, 498
key corporate assets, 42 LinkedIn, 305, 323-324, 389, 416, 420, 425 social media and, 426
key field, 247 Linux, 205, 207, 208, 209, 211, 219, 230, 286 "wisdom of crowds", 89, 389, 420-421, 439
key performance indicators (KPIs), 504, 563, Live Meeting (Microsoft), 94 marketspace, 405
566, 582 LMS. See learning management system mashups, 224-225, 230, 304
keyloggers, 330, 336 local area networks. See LANs mass customization, 127
keywords, 456 "Local Shared Object" files, 167 Massively Parallel Processing (MPP)
"kickbucks", 434 localization, software, 15-21-15-22 architecture (Vertica), 512
Kindle (Amazon), 75, 174, 210 location-based advertising, 417-418 material inventory tracking system software,
Kindle Fire (Amazon), 319 location-based services, 170-171, 432-433, 439 277
KMS. See knowledge management systems logical view, 245 material master data management (MMDM),
(KMS) long tail marketing, 421 15-18
knowledge, 450 Long Term Evolution networks. See LTE McAfee, Andrew P., 181
dimensions of, 449-451 networks medical records
equal access to information and "look and feel" copyright infringement, 172 HIPAA legislation, 164, 338, 357
computing, 182 Lotus Notes (IBM), 92, 93, 95, 304, 15-19 security, 338-339
explicit knowledge, 450, 455 Lotus Quickr (IBM), 96 medical research, drug development by
structured knowledge, 455 loyalty programs, 110 structured design, 447-448
tacit knowledge, 450, 454, 463, 475 LTE networks (Long Term Evolution medicine, neural network applications, 471
knowledge acquisition, 452 networks), 307 Megaupload (file-sharing site), 331
knowledge application, 453 Melissa (malware), 329
knowledge base, 465 M menu costs, 410, 439
Knowledge Direct (Digitec), 457 m-commerce (mobile commerce), 413, 432-434, Metcalfe's law, 204, 230
knowledge discovery, 463 439 metropolitan area networks. See MANs
knowledge dissemination, 72, 452-453 machine bureaucracy, 118 microblogging, 304
knowledge management (KM), 449-474 machine learning, 468, 475 micromarketing, 15-6
about, 451-452, 475 Mafia Wars (online game), 512 micropayment systems, 419
case study, 447-448 mainframes, 197, 207, 209 microprocessor chips, 117
taxonomies, 456, 475 maintenance, 532 microprocessors, 201-202
value chain, 451-453 malware, 178, 328-330, 333, 336, 337-338 case study, 367-368
knowledge management systems (KMS), 86-87, browser-based malware, 355 high-performance processors, 216
101 drive-by downloads, 328 Moore's law, 201, 230
enterprise-wide knowledge management keyloggers, 330, 336 multicore processors, 216, 230
systems, 453-454, 454-457, 475 smartphones, 353 power-saving processors, 216, 230
intelligent techniques, 454, 463-474, 475 spyware, 167, 330 Microsoft Access, 246, 250, 251, 540, 15-18
knowledge work systems (KWS), 454, 457-462 SQL injection attacks, 330 Microsoft Advertising, 166
taxonomies, 456, 475 Trojan horses, 329-330 Microsoft Azure, 235
types, 453-454, 475 viruses and worms, 328-329, 336, 348, 357 Microsoft Bing, 300, 318, 413
knowledge management value chain, 451-453 managed security service providers (MSSPs), Microsoft Dynamics CRM, 383
knowledge managers, 453 352 Microsoft Dynamics suite, 388
knowledge network systems, 456 management Microsoft Excel, 95, 502, 540, 15-18
knowledge storage, 452 classical model, 488 Microsoft Expression, 437
knowledge work systems (KWS), 454, 457-462 decision making by, 490 Microsoft Expression Studio, 209
knowledge workers, 49, 177, 449, 457 implementation of new project, 573-574, Microsoft Internet Explorer, 220
KPIs. See key performance indicators 15-15-15-16 Microsoft Internet Explorer 9, 169
KWS. See knowledge work systems information systems (IS) and, 50, 62 Microsoft Internet Explorer 10, 152, 168
of international information systems, Microsoft Live Meeting, 94
L 15-12-15-19 Microsoft .NET family, 209, 222
labor, 112 management capital, 57, 452 Microsoft Office, 95, 148, 473
LANs (local area networks), 219, 286-287, 314, management decision making, 50 Microsoft Office Project 2010, 580-581
327
MIS13_Index global.indd I632 1/17/2013 2:34:22 PM

