Page 637 -
P. 637
636 Index
controls, 325, 340-341 Simple Storage Service (S3), 215 application software packages, 540, 541-
cyberterrorism and cyberwarfare, 334-336 SimpleDB (Amazon), 249 542, 549
data breaches, 333 The Sims (online game), 513 big data analysis and visualization, 261
defined, 325 Singapore, monitoring and blocking of Internet bugs, 176, 335
digital certificates, 350, 351, 357 access, 15-20 business intelligence, 15-18
disaster recovery planning, 343-344 Siri (Apple), 473 click fraud, 334
electronic evidence, 339-340 six sigma, 521, 548 cloud-based software, 215, 224, 389
electronic records management, 338-340, SkyDrive (Microsoft), 94, 95 as cloud service, 224
357 Skype (software), 93 contemporary platform trends, 219-225,
encryption, 349-350, 352, 357 SLA. See service level agreement 230
firewalls, 347-348, 357 slippery-slope rule, 161 copyright, 172
hackers, 323, 324, 327, 328, 329, 330, 331, small world theory, 425 customer relationship management
333, 338, 357 smart cards, 346, 357 (CRM) systems, 86, 101, 382-385, 392, 518
homeland security, 158-159 "smart" label, 53 database management system (DBMS),
identity management, 345-346 SmartCloud for Business (IBM), 93 244-247, 249-251, 268
internal threats from employees, 335 SmartCloud for Social Business (IBM), 96 debugging, 355
intrusion detection systems, 348, 357 smartphones, 36-37, 53, 109, 134, 140, 210, 307 defined, 51
malicious software (malware), 167, 178, apps, 225 e-business suites, 388
328-330, 333, 336, 337-338 "bring your own device" (BYOD), 210, 212- enterprise applications, 83, 85-87, 101, 208,
medical records, 338-339 213, 353 370-371, 392
mobile platforms, 353 games and entertainment, 434 enterprise solutions, 388
outsourcing, 352 location-based services, 170-171, 432-433, enterprise suites, 388
passwords, 323-324, 346, 357 439 facial recognition software, 189, 303, 346
protecting information resources, 345-353 m-commerce, 413, 432-434, 439 flaws in, 337
public key infrastructure (PKI), 350 processors for, 216 intrusive, 167
risk assessment, 341-342 security, 353 keyloggers, 330, 336
security policy, 342-343, 357 Wikitude.me (service), 433 liability for software bugs, 176
smartphones, 353 sniffers, 331 liability law, 175, 176
spyware, 167, 330 snowboarding, 526-527 localization, 15-21-15-22
system vulnerability, 325-337 SOA. See service-oriented architecture malware, 167, 178, 328-330, 333, 336, 337-
unified threat management (UTM), Sobig.F (malware), 329 338
systems, 348-349 social bookmarking, 456, 475 mashups, 224-225, 230, 304
war driving, 327 social business, 37, 89-91 material inventory tracking system, 277
wireless networks, 349 applications of, 90 open source software, 219, 230
See also computer crime business benefits of, 90-91 outsourcing, 224, 230
security audits, 344 tools for, 96-98, 101 patches, 337
security policy, 342-343, 357 social business tools, 92-97 patents, 172-173
select operation, 247, 248 social classes, equal access to information and piracy, 173
semantic search, 303 computing, 182 potential for catastrophic failure, 176
Semantic Web, 306 social commerce, 90, 425, 427-428 as product, 416
semistructured decisions, 486, 501-502, 508 social complementary assets, 57 project management tools, 580-581
senior managers, 49, 89, 91-92 social computing guidelines, 297 project portfolio management software,
decision-making by, 486, 504-505 social e-commerce, 425 581
failed ethical judgment by, 153-154 social engineering, 335 quality, 353, 355-356
sensitivity analysis, 502, 503 social gaming, 512 RFID, 312
sentiment analysis software, 260 social graph, 512, 513 sentiment analysis software, 260
SEO. See search engine optimization social investments, 58 sniffers, 331
sequences (data analysis), 259 social marketing, 90 software packages, 223, 541, 549
sequential supply chains, 379 social media, 425 spam filters, 181
Server (Microsoft), 207, 209, 286 social networking, 90, 97, 305, 425-426 spyware, 167, 330
servers, 197, 281 business impact of, 36 supply chain management, 376, 392
service industries, 42 e-commerce and, 416, 420-421, 425, 434- system performance and, 176
service jobs, offshoring, 41 438 total cost of ownership (TCO), 227, 568
service level agreement (SLA), 224 enterprise tools, 93, 96 tracking files, 167
service-oriented architecture (SOA), 221, 388, games and networking, 434 trade secret protection, 169
392 malware and, 329 virtualization software, 211
"service platform" perspective, 196 social search, 303, 426 vulnerability of, 335, 337-338
service providers, 415, 416 social shopping, 420 for the Web, 219-220
service set identifiers. See SSIDs social sign-on, 426 Web application development tools, 209
service workers, 49 social technology, in e-commerce, 407, 409 Web browsers, 263
services, 112 social tools, 456 wikis, 305, 329, 475
SFA. See sales force automation sociologists, on information systems, 59, 62 zero defects in, 335, 337
shared workspaces, 90 sociotechnical design, 580 See also collaboration tools
SharePoint (Microsoft), 93, 95, 493 sociotechnical perspective, on information Software and Information Industry Association
SharePoint MySites (Microsoft), 71 systems, 58-61 (SIIA), 174
SharePoint Server 2010 (Microsoft), 71, 72, 95 software, 47 software as a service (SaaS)
Shopkick (mobile app), 434 as a service (SaaS), 215, 224, 230, 249, 389, about, 224, 230, 249, 389, 416, 541, 15-23
shopping bots, 304 416, 541, 15-23 cloud software, 215, 224
SIIA. See Software and Information Industry antivirus and antispyware software, 348, Web service, 117
Association 357 software bugs, 176
Silverlight (plug-in), 220 application server, 200 software controls, 340
MIS13_Index global.indd I636 1/17/2013 2:34:22 PM

