Page 639 -
P. 639

638    Index


        transnational information systems. See   virtual reality systems, 459, 461, 462, 475  WebFOCUS (software), 540
           international information systems  "virtual water cooler", 97     WebSphere (IBM), 562
        transnational strategy, 15-10, 15-25  virtual worlds, 93             WEP. See Wired Equivalent Privacy
        transnational systems units, 15-11  virtualization, 211, 213, 230    Wi-Fi, 309, 314, 327, 357
        Transport layer, 284               viruses. See computer viruses and worms  Wi-Fi Protected Access 2 (WPA2), 349
        transportation management, 378, 379  VMware, 211                     wide area networks. See WANs
        Trojan horses, 329-330             VoIP (voice over IP), 295, 297-298, 326  WikiLocation-based services, 432
        TRUSTe, 168                        voyage-estimating decision-support system, 81  Wikipedia, 93
        tuples, 247                        VPNs (virtual private networks), 298, 299, 314,   wikis, 90, 93, 305, 329, 475
        twisted pair wire, 287                349, 15-20                     Wikitude.me (service), 433
        Twitter, 36, 89, 97, 210, 297, 304, 305, 329, 381,   VRML (Virtual Reality Modeling Language),   WiMax, 307, 310, 314
           389, 402, 416, 425, 426, 427, 428, 433, 434,   462                Windows 38 operating system, 148, 208
           548                                                               Windows domain network model, 287
        two-tiered client/server architecture, 199  W                        Windows Messenger, 294
                                           W3C. See World Wide Web Consortium  Windows operating system, 139, 148, 200, 207,
        U                                  walkthrough, 355                     208, 286, 318
        ubiquity, in e-commerce, 405, 407  WANs (wide area networks), 286, 287, 314  Windows Server (Microsoft), 207, 209, 286
        unified communications, 298        war driving, 327                  Wintel PCs, 197, 199, 205
        unified threat management (UTM), 348-349  warehouse management, 376, 379, 397  Wire Fraud Act, 333
        unit testing, 530                  Warehouse Management System (WMS), 376  Wired Equivalent Privacy (WEP), 349
        United States                      Web, 298-307                      wireless modems, 285
           cell phone standards, 307          databases and, 262-263, 268    wireless networking standards, 308
           cybersecurity, 336-337             "deep Web", 300                wireless networks, 309, 349, 357
           electrical grid infiltrated, 336     future trends, 305-307       wireless sensor networks (WSNs), 313, 314
           imports and exports, 38            mashups, 225, 230, 304         wireless technology, 307-313
           privacy as constitutional right, 162  pharming, 333                  Bluetooth, 308-309, 314, 327, 328, 336
           spamming regulation, 181           portals, 82, 413-414, 475         cell phones, 35, 36, 170-171, 307
        universal standards, in e-commerce, 407-408     Semantic Web, 306       hotspots, 309, 310
        Unix, 205, 207, 209                   software for, 219-220             Internet access, 309-310
        unstructured decisions, 486, 508, 509     URL (uniform resource locator), 299     malware and, 328
        URL (uniform resource locator), 299     Web 2.0, 304-305                RFID, 277, 310-312, 314
        U.S. Cost of a Data Breach Study (Ponemon      Web 3.0, 305-306         securing wireless networks, 349
           Institute), 333                    Web servers, 199, 209, 300        security vulnerabilities, 327-328
        U.S. legislation                      See also Internet                 Wi-Fi, 309, 314, 327, 357
           behavioral targeting, 164, 167, 439  Web 2.0, 304-305, 420           WiMax, 307, 310, 314
           collection of personal information, 168  Web 3.0, 305-306            wireless sensor networks (WSNs), 313, 314
           computer crime, 333-334         Web addresses, 288-289, 299          See also mobile handheld devices;
           copyright, 172, 184             Web Apps (Microsoft), 95             smartphones
           medical records, 338-339        Web-based online meeting tool, 94  wireless transmission media, 287
           privacy, 162-164, 190           Web-based supply chain management tools,   Wiretap Act, 333
           record retention, 45, 357          376, 379                       wisdom, 450
           spamming regulation, 181        Web beacons, 167                  "wisdom of crowds", 89, 389, 420-421, 439
           trade secrets, 169              Web browsers, 152, 220, 263       WMS. See Warehouse Management System
        user-designer communications gap, 573  Web bugs, 167, 168            Word (Microsoft), 95
        user interface, 560                Web conferencing, 42, 93             work
        Utilitarian Principle, 161         Web-enabled databases, 262-263, 268     changing nature of, 88
        utility computing, 215             Web hosting service, 209             growth of professional work, 89
        UTM. See unified threat management  Web mashups, 225, 230, 304          job loss due to technology, 181-182, 184
                                           Web mining, 260, 268                 See also jobs
        V                                  Web monitoring, tools for, 184    workgroup network model, 286
        value chain                        Web protocols, 221                World Wide Web
           business information, 55-56, 131-133, 143  Web servers, 199, 209, 300     about, 51, 205
           global value chains, 15-19-15-22  Web services, 215, 221, 230, 545, 549     copyrighted information and, 173, 184
           knowledge management, 451-453   Web Services (Amazon), 215, 249      history of, 117
        value chain model, 55-56, 131-133, 143  Web sites, 299               World Wide Web Consortium (W3C), 221, 306,
        value web, 133, 135-136, 143          affiliate Web sites, 420          314
        VAX machines (computers), 197         budgets, 438                   Worldwide Interoperability for Microwave
        Vertica Massively Parallel Processing (MPP)      building, 435-438, 440  Access. See WiMax
           architecture, 512                  for e-commerce, 435-438        worms (malware), 329, 336
        video files, piracy, 174              failure of, 560                WPA2. See Wi-Fi Protected Access 2
        videoconferencing, 42, 93             hosting, 437-438               WSNs. See wireless sensor networks
        viral coefficient, 512                personalization, 422, 423
        virtual companies (virtual organizations), 138,      search engine optimization (SEO), 302  X
           143                                social sign-on, 426            Xalkori (drug), 447
        virtual meeting software, 93          visitor tracking, 164, 165, 166, 169, 421-  Xbox (Microsoft), 318, 419
        virtual meetings, 37                  422, 423, 424                  XenDesktop (Citrix Systems), 213
        virtual private networks. See VPNs  Web tracking. See online tracking  Xerox Alto (computer), 197
        Virtual Reality Modeling Language. See VRML  WebEx (Cisco), 94       XML (Extensible Markup Language), 221, 545








   MIS13_Index global.indd   I638                                                                             1/17/2013   2:34:23 PM
   634   635   636   637   638   639   640   641   642   643   644