Page 637 -
P. 637

636    Index


           controls, 325, 340-341          Simple Storage Service (S3), 215     application software packages, 540, 541-
           cyberterrorism and cyberwarfare, 334-336  SimpleDB (Amazon), 249     542, 549
           data breaches, 333              The Sims (online game), 513          big data analysis and visualization, 261
           defined, 325                    Singapore, monitoring and blocking of Internet      bugs, 176, 335
           digital certificates, 350, 351, 357  access, 15-20                   business intelligence, 15-18
           disaster recovery planning, 343-344  Siri (Apple), 473               click fraud, 334
           electronic evidence, 339-340    six sigma, 521, 548                  cloud-based software, 215, 224, 389
           electronic records management, 338-340,   SkyDrive (Microsoft), 94, 95     as cloud service, 224
           357                             Skype (software), 93                 contemporary platform trends, 219-225,
           encryption, 349-350, 352, 357   SLA. See service level agreement     230
           firewalls, 347-348, 357         slippery-slope rule, 161             copyright, 172
           hackers, 323, 324, 327, 328, 329, 330, 331,   small world theory, 425     customer relationship management
           333, 338, 357                   smart cards, 346, 357                (CRM) systems, 86, 101, 382-385, 392, 518
           homeland security, 158-159      "smart" label, 53                    database management system (DBMS),
           identity management, 345-346    SmartCloud for Business (IBM), 93    244-247, 249-251, 268
           internal threats from employees, 335  SmartCloud for Social Business (IBM), 96  debugging, 355
           intrusion detection systems, 348, 357  smartphones, 36-37, 53, 109, 134, 140, 210, 307  defined, 51
           malicious software (malware), 167, 178,   apps, 225                  e-business suites, 388
           328-330, 333, 336, 337-338         "bring your own device" (BYOD), 210, 212-     enterprise applications, 83, 85-87, 101, 208,
           medical records, 338-339           213, 353                          370-371, 392
           mobile platforms, 353              games and entertainment, 434      enterprise solutions, 388
           outsourcing, 352                   location-based services, 170-171, 432-433,      enterprise suites, 388
           passwords, 323-324, 346, 357       439                               facial recognition software, 189, 303, 346
           protecting information resources, 345-353     m-commerce, 413, 432-434, 439     flaws in, 337
           public key infrastructure (PKI), 350     processors for, 216         intrusive,  167
           risk assessment, 341-342           security, 353                     keyloggers, 330, 336
           security policy, 342-343, 357      Wikitude.me (service), 433        liability for software bugs, 176
           smartphones, 353                sniffers, 331                        liability law, 175, 176
           spyware, 167, 330               snowboarding, 526-527                localization, 15-21-15-22
           system vulnerability, 325-337   SOA. See service-oriented architecture     malware, 167, 178, 328-330, 333, 336, 337-
           unified threat management (UTM),   Sobig.F (malware), 329            338
           systems, 348-349                social bookmarking, 456, 475         mashups, 224-225, 230, 304
           war driving, 327                social business, 37, 89-91           material inventory tracking system, 277
           wireless networks, 349             applications of, 90               open source software, 219, 230
           See also computer crime            business benefits of, 90-91       outsourcing, 224, 230
        security audits, 344                  tools for, 96-98, 101             patches, 337
        security policy, 342-343, 357      social business tools, 92-97         patents, 172-173
        select operation, 247, 248         social classes, equal access to information and   piracy, 173
        semantic search, 303                  computing, 182                    potential for catastrophic failure, 176
        Semantic Web, 306                  social commerce, 90, 425, 427-428     as product, 416
        semistructured decisions, 486, 501-502, 508  social complementary assets, 57     project management tools, 580-581
        senior managers, 49, 89, 91-92     social computing guidelines, 297     project portfolio management software,
           decision-making by, 486, 504-505  social e-commerce, 425             581
           failed ethical judgment by, 153-154  social engineering, 335         quality, 353, 355-356
        sensitivity analysis, 502, 503     social gaming, 512                   RFID, 312
        sentiment analysis software, 260   social graph, 512, 513               sentiment analysis software, 260
        SEO. See search engine optimization  social investments, 58             sniffers,  331
        sequences (data analysis), 259     social marketing, 90                 software packages, 223, 541, 549
        sequential supply chains, 379      social media, 425                    spam filters, 181
        Server (Microsoft), 207, 209, 286  social networking, 90, 97, 305, 425-426     spyware, 167, 330
        servers, 197, 281                     business impact of, 36            supply chain management, 376, 392
        service industries, 42                e-commerce and, 416, 420-421, 425, 434-     system performance and, 176
        service jobs, offshoring, 41          438                               total cost of ownership (TCO), 227, 568
        service level agreement (SLA), 224     enterprise tools, 93, 96         tracking files, 167
        service-oriented architecture (SOA), 221, 388,      games and networking, 434     trade secret protection, 169
           392                                malware and, 329                  virtualization software, 211
        "service platform" perspective, 196  social search, 303, 426            vulnerability of, 335, 337-338
        service providers, 415, 416        social shopping, 420                 for the Web, 219-220
        service set identifiers. See SSIDs  social sign-on, 426                 Web application development tools, 209
        service workers, 49                social technology, in e-commerce, 407, 409     Web browsers, 263
        services, 112                      social tools, 456                    wikis, 305, 329, 475
        SFA. See sales force automation    sociologists, on information systems, 59, 62     zero defects in, 335, 337
        shared workspaces, 90              sociotechnical design, 580           See also collaboration tools
        SharePoint (Microsoft), 93, 95, 493  sociotechnical perspective, on information   Software and Information Industry Association
        SharePoint MySites (Microsoft), 71    systems, 58-61                    (SIIA), 174
        SharePoint Server 2010 (Microsoft), 71, 72, 95  software, 47         software as a service (SaaS)
        Shopkick (mobile app), 434            as a service (SaaS), 215, 224, 230, 249, 389,      about, 224, 230, 249, 389, 416, 541, 15-23
        shopping bots, 304                    416, 541, 15-23                   cloud software, 215, 224
        SIIA. See Software and Information Industry      antivirus and antispyware software, 348,      Web service, 117
           Association                        357                            software bugs, 176
        Silverlight (plug-in), 220            application server, 200        software controls, 340




   MIS13_Index global.indd   I636                                                                             1/17/2013   2:34:22 PM
   632   633   634   635   636   637   638   639   640   641   642