Index

A AliResearch, 373 educational, 200–201 Autonomous organization of Aadhaar, 82–83 AliveCor, 249 planning for and justifying IT, assistants, 214 Academic Student Ebook Allstate Insurance, 390, 486 410–413 Autonomous vehicles, 21, 26 Experience Survey, 19 AlphaBay, 112 social, 300 Avalanche, 112 Accenture, 97, 373 Alphabet, 256 strategies for acquiring IT, Axon, 90–91 Accessibility issues, 76 Altaeros, 256 413–418 Accountability, 73, 367 Amazon, 19–20, 221 Applications development B Accounting B2B marketplace, 230–231 managers, 8 B2B. See Business-to-business customer relationship Business, 230–231 Application service providers (B2B) electronic commerce management and, 367 cloud, 19 (ASP), 415–416 B2C. See Business-to-consumer data/knowledge management customer focus, 56, 63 Application software, 451–452 (B2C) electronic commerce and, 165 drones, 366 Applications programmers, 8 BA. See Business analytics (BA) electronic commerce, 235 Echo Look, 375 Apps. See Applications (apps) systems enterprise resource planning experimentation at, 145 Architecture, 410 Babolat, 61 in, 334 freight forwarding business, 7 service-oriented, 472–474 Babson College, 349 ethics in, 87 Fulfillment by Amazon, 372 Arithmetic logic units (ALUs), 440 Babylon Health, 250 functional area information LEO constellation, 254 ARPAnet, 184 Backbone networks, 178 systems, 315–317 marketing, 21 Artificial intelligence (AI), 6, Back doors, 104 networking and, 202 Mechanical Turk, 213 477–489 Backups, 107 social computing and, 306 Pay, 266 applications, 483–487 Backyard Adventures, 312–313 systems acquisition and, 429 Prime, 241 at Bank of America, 55 Baidu, 192 wireless technology and, 273 Prime Wardrobe, 242 computer vision, 484 BakerHostetler, 21 Accuracy issues, 75 Robotics, 365 deep learning, 482 Baltimore ransomware attack, ACID guarantees, 143–144 Simple Storage Service, 469–470 definition of, 477 127–128 Acxiom, 78, 103 supply chain management, 360, expert systems, 480 BAM. See Business activity Ad blockers, 224–226 371–373 intelligent agents, 485–486 monitoring (BAM) Adblock Plus, 225, 226 Walmart vs., 239–243 machine learning, 481 Bandwidth, 176–177, 188–189 Add Grace Period, 234 Web Services, 457 natural intelligence capabilities Bank of America, 54–56, 365 Ad hoc reports, 322 Amazon Effect, 239 compared with, 478 Banner Health, 294 Adidas, 356, 366–367 American Civil Liberties Union natural language processing, Barclays Bank, 114 Advanced Research Project (ACLU), 78 485 Bar codes, 270 Agency (ARPA), 184 American Express, 266 neural networks, 482–483 Bargaining power of suppliers, 60 Advertising America’s Cup, 7 overview, 477–479 Barlow, John Perry, 189 fraudulent affiliate, 233 Analog signals, 179 robotics, 485 Batch processing, 314 linking location and purchase Analysis phase, 44 speech recognition, 485 Beidou, 253 data, 74–75 Analytical customer relationship technologies, 480–483 Benefits administration, 320 mobile, 268 management systems, 348 Ask, 192 Bennett, James Gordon, 1 native, 224, 300 Anderson, Joshua, 339 Association for Computing Best practices, 157, 326–327 newspapers and, 2 Android, 20, 247 Machinery, 73 Better Online Ticket Sales (BOTS) online, 224–226 Angie’s List, 296 Asymmetric encryption, Act, 215 promotion analysis, 15 Angry Birds, 20 118–119 BI. See Business analytics (BA) Snapchat, 310 Animal husbandry, 272 Atlanta ransomware attack, 127 systems social, 300 Ant Financial Services Group, 79 Atlassian, 197 Big Data, 5, 138–147 Adware, 109 Anti-Cybersquatting Consumer ATMs. See Automated teller artificial intelligence and, 479 Adyen, 219 Protection Act, 234 machines (ATMs) characteristics of, 139–141 Affiliate fraud, 233 Anti-malware systems, 118 AT&T, 51, 52, 185, 186, 247, 248 definition of, 138–139 Affinity analysis, 384–385 Antivirus software, 118 Attributes, 136 in functional areas of the Affinity portals, 193 ANXeBusiness, 364 Auctions, 216–217, 229 organization, 146–147 AGCO, 437 ANZ, 486 Auditing managers, 8 issues with, 142 Agile development, 424–425 Apache Hadoop,COPYRIGHTED 143, 155 Audits and MATERIALauditing managing, 142–144 Agile systems development, 6 Apache Struts, 93 external, 316 using, 144–147 Agriculture industry, 21 Apple, 406 functional area information Big Data Institute, The (TBDI), 138 business analytics, 387–388 biometrics, 247 systems for, 316–317 Bim, 266 imaging systems, 254 customer orientation at, 63 information systems, 121–122 Binary, 135 Internet of Things in, 271–272 Find My iPhone, 269 internal, 316 Binary relationships, 160 John Deere, 31–33 iTunes, 20 internal and external, 121–122 Bing, 192 AI. See Artificial intelligence (AI) iTunes Store, 136 Augmented reality (AR), 35–36, Biohax, 319 Airbnb, 360, 465 pace of innovation, 49 437 Biomeme, 250 Air cargo, 372 Pay, 266 AuraLife, 251 Biometric databases, 82–83 Airlines self-driving car, 21, 141 Authentication, 114–117 Biometrics, 114–115, 116, 247 chatbots, 214 Watch, Boston Red Sox and, Authorization, 117 Bits, 135, 179 loyalty programs, 347–348 70–71 Authorize.net, 218 BitTorrent, 183 social media and, 278–279 Application portfolios, 410 Automated delivery robots, 365 Blackboard, 201 Akihito, Emperor of Japan, 412 Application programs. See Automated teller machines Black boxes, 91 Algorithms, 479 Applications (apps) (ATMs), 63 Black Diamond, 352 Alibaba, 79, 115, 141, 266, 371, 373 Applications (apps), 14 Automatic translation, 192–193 Blacklisting, 118 Alien software, 109–110 collaboration, 196–200 Automobile industry, 21 Blackstone Discovery, 21 Alignment, 64–65 communication, 194–196 Internet of Things, 271 Blimps, Internet, 256 Alipay Wallet, 266 discovery, 191–194 push vs. pull model in, 357 Blockbuster, 20

538

bindex.indd 538 28/08/19 11:58 AM INDEX 539

Blockchain, 217, 222–223 Business analytics (BA) systems, 5, Cache memory, 442 City Football Group (CFG), 466 Blogs, 83, 283–284 14–15, 18 CAD. See Computer-assisted Clerical workers, 16 Bloomberg LP, 400–401 Business case approach, 413 design (CAD) Cleveland Clinic, 51–52 BlueJeans Network, 200 Business continuity, 121 California wineries, 25 Clickbait, 2 Blue Nile, 385 Business dimensions, 149 Call centers, 194–195, 345–346 Clicks-and-mortar organizations, Blue River Technology, 32 Business environment, 47 CAM. See Computer-assisted 212 Bluetooth, 257–258 Business-information technology manufacturing (CAM) Clickstream data, 132 Bluetooth Smart, 258 alignment, 64–65 Cambridge Analytica, 84–86 Clients, 183 Blue Yonder, 227 Business intelligence (BI), 376 Campaign management Client/server computing, 183 Blu-ray discs, 444 Business intelligence (BI) systems. applications, 346 Clinical trials, 27 BMW, 141 See Business analytics (BA) CAPTCHA, 109, 215 CliniCloud, 249 BNSF Railway, 28 systems Carbonite, 107 Cloaking, 233 BNY Mellon, 197 Business majors, 65 Carbon management, 50 Cloud computing, 6, 455–476 Body cameras, 26, 90–91 Business models, 145, 210, Cardinal Health, 231 artificial intelligence and, 479 Boeing Company, 197–198, 365 215–216 Cardinality, 160 benefits of, 467–468 Bonobos, 240 Business partnerships, 365 CareerBuilder, 305, 306 characteristics of, 457–460 Boohoo, 359 Business processes, 34–69 Career opportunities, 7–9 concerns and risks with, 469–472 Book industry, 19–20 alignment, 64–65 Carelessness, 99, 102 definition of, 455 Borders, 20 business majors and, 65 Carnival Corporation, 56–57 ERP, 328–329 Boston Consulting Group, 231 business pressures, 47–53 Carpal tunnel syndrome, 23 overview, 456–457 Boston Red Sox, 70–71 capturing and storing data on, CASE. See Computer-aided private clouds, 54 Botnets, 108–109, 112 40–42 software engineering (CASE) service-oriented architecture, Bots, 108–109, 214–215, 486 case studies, 34–36, 68–69 Cashatt, Aaron, 101–102 472–474 scraping, 228 competitive advantage and, 36, Casper, 361 services, 463–467 BPI. See Business process 58–65 Cassandra, 143 Tour de France and, 169–170 improvement (BPI) cross-functional, 37–40 Catalyte, 146 types of clouds, 461–463 BPM. See Business process customer focus, 56–57 Caterpillar, 345 Walmart, 241 management (BPM) definition of, 37 Cathay Pacific, 223 Web services, 472–474 BPMS. See Business process ERP for, 329–334 CBIS. See Computer-based CloudLock, 470–471 management suites (BPMS) e-ticketing, 39–40 information systems (CBIS) Cloud Spanner, 143–144 BPR. See Business process examples of, 38 Celebrity Cruises, 56 CNN, 3 reengineering (BPR) executing, 40 Cellular radio, 260–261 Coaxial cable, 180 Brainly, 77 flowcharts, 40 Cellular telephones (cell phones), Cobots, 24–26, 366 Brand Keys, 69 improvement, 43–45 260–262 Codes of ethics, 73 Brantner, Paula, 319 information systems and, 40–43 Centaurs, 478 Cognitive computing, 27–28 Brave, 225 management, 45–46 Central processing units (CPUs), Cold sites, 121 Breakage, 276 market pressures, 47–49 440–444 Colis Privé, 372 Breakeven analysis, 413 organizational responses to definition of, 440 Collaboration, 196, 288 Brexit, 48 pressures, 53–58 how they work, 440–441 Collaboration applications, Brick-and-mortar organizations, performance monitoring, 42 memory, 441–444 196–200 212 reengineering, 43 microchip design advances in, Collaborative CRM, 344 Bridge tables, 161 social/political/legal pressures, 441 Collaborative robots, 366 Bring your own device (BYOD), 50–53 CenturyLink, 52 Commercial imaging, 254–255 49–50 technology pressures, 49–50 CERN, 482 Commercial portals, 193 Broadband, 51–52, 174–176 Business process improvement Certificate authority, 119 Common good approach, 72 definition of, 176–177 (BPI), 37, 43–45, 46 Champlain College, 198–199 Communication applications, wireless, 263 Business process management Champy, James, 43 194–196 Broadcast media, 179–180 (BPM), 37, 45–46 Change management, 324 Communications controls, 113, Broadcast transmission, 252 Business process management Channel conflict, 226 117–121 Brocious, Cody, 101 suites (BPMS), 45 Charter Communications, 174 Communications media and Browder, Joshua, 215 Business process reengineering Chatbots, 55, 71, 108–109, channels, 179–181 BSA Global Software Piracy Study, (BPR), 37, 43, 46 214–215 Compact disc read-only memory 103 Business rules, 159 Chat rooms, 195 (CD-ROM), 443 Budgeting, 315 Business-to-business (B2B) Chevron, 46 Comparative reports, 322 Bugs, 448 electronic commerce, 14–15, Chief information officers (CIOs), Competera, 228 Bullhorn Reach, 304 16, 212, 228–231 8, 81 Competitive advantage, 38–39, Bullwhip effect, 360–361 buy-side marketplaces, 229 Children’s National Health 58–65 Bumble, 392 electronic exchanges, 229–230 System, 402 competitive forces model and, Bundling, 346 sell-side marketplaces, 228–229 China, 79, 115, 192 58–61 Bureau of Labor , 9, 52 Business-to-consumer (B2C) GPS, 253 definition of, 36 Burr, Bill, 116–117 electronic commerce, 14–15, Internet policy, 189–190 strategic systems for, 54–56 Business activity monitoring 16, 212, 220–228 machine learning, 481 strategies for, 63–64 (BAM), 45 electronic storefronts and malls, microblogging, 285 value chain model on, 61–63 Business analysts, 8 220–221 mobile payment apps, 266 Competitive forces model, 58–61 Business analytics (BA), 374–407 issues in, 226–228 multimedia apps, 311 Competitiveness, 468 business intelligence vs., 376 online service industries, 221–226 social computing, 280 Competitive strategy, 58 case studies, 374–376, 405–407 Business-to-employee (B2E) Walmart and, 240 Compliance, 53 definition of, 376 electronic commerce, 213 China Rapid Finance, 79 Component-based development, descriptive, 383, 384–388 Buyer agents, 486 Cho, Minhee, 303 427 managers and decision making, Buyer power, 60 Christian Louboutin, 358 Computer-aided software 377–380 Buy-side marketplaces, 229 Churn, 95, 341, 390 engineering (CASE), 427 overview, 376–377 BYOD, 49–50 CIO. See Chief information officers Computer-assisted design (CAD), 15 predictive, 383, 388–396 Bytes, 135 (CIOs) Computer-assisted manufacturing prescriptive, 383, 396–399 Cisco, 200, 246 (CAM), 15 presentation tools, 383, 399–402 C Citadel, 112 Computer-based information process, 381–383 Cable media, 179–180 Citibank, 63 systems (CBIS), 12–14 tools, 383 Cable modems, 179 Citigroup, 28 components of, 12–13

bindex.indd 539 28/08/19 11:58 AM 540 INDEX

Computer-integrated CryptoDrop, 107 Dark Web, 107, 112 definition of, 148 manufacturing (CIM), 318 Cupris Health, 249 Dashboards, 14–15, 18, 399–401 describing, 148–149 Computer networks, 176–179 Currency exchange, 222 Data enterprise, 155–156 Computer programs, 448 Custom development, 418 bad, 150 generic environment for, Computers Customer care centers, 194–195 Big Data, 5, 138–147 149–154 hierarchy, 436–437 Customer churn, 95, 341, 390 capturing and storing process, governance, 154 memory, 441–444 Customer experience 40–42 metadata, 154 purchasing personal, 438 management, 299–300 clickstream, 132 source systems, 149–150 wired, 245–246 Customer-facing CRM deep Web, 406 users, 154 Computer security managers, 8 applications, 345–346 dirty, 142 Data Warehousing Institute, 5 Computer vision, 484 Customer focus, 56–57 extraction, 153 DBS Bank of Singapore, 28 Concursive, 350 Customer identity management, hierarchy, 135–136 Debate, Connie, 244–245 Configurators, 346 344 independence, 134 Debate, Richard, 130, 244–245 Configured mass customization, 57 Customer interaction centers integration, 150–151 Debois, Patrick, 409 Configure-to-order, 330 (CIC), 345–346 integrity, 134 Debugging, 423 Connected vehicles, 140–141 Customer intimacy, 49, 78, 341 isolation, 134 Decision making, 377–380 Connectivity, 160 Customer orientation strategy, knowledge vs., 157 expert systems, 480 Connect Your Community, 51–52 63, 64 master, 133–134 framework for computerized, Connors, Chris, 313 Customer relationship metadata, 154 379–380 Conrad, Parker, 209, 210 management (CRM), 49, 303, nontraditional unstructured, IT support for, 379 Consumer-generated media, 285 324, 338–352 405–406 phases in, 378 Consumer segmentation, 57 case studies, 338–339 normalization, 161–165 Decision matrix, 380 Consumer-to-consumer electronic customer touch points, 342–343 quality, 154 Decisions commerce (C2C), 212 data consolidation, 343–345 redundancy, 134 definition of, 378 Consumerworld, 234 definition of, 341 security, 134 nature of, 380 Contact management systems, ERP for, 333–334 storing, 153 Decision-support systems (DSSs), 346 overview, 340 structured, 137 18, 325, 385–386 Containers, 428 strategy, 341–342 transactional, 41–42, 133 Deep learning, 479, 482 Contextual assistants, 214 Customer relationship unstructured, 137 Deep Web, 406 Continuous computing, 4 management (CRM) systems, untapped, 405 Deep Web Technologies, 406 Continuous development, 418 14 Data aggregators, 78 Defense-in-depth, 113 Contract labor, 99 analytical, 348 Database administrators, 8 Define phase, 44 Control and auditing, 316–317 collaborative, 344 Database management systems Degree of digitization, 212 Control phase, 45 customer-facing applications, (DBMS), 136–137 Delivery, 356 Controls, information security, 345–346 Databases Dell, 16, 56, 57, 229, 347 113–123 customer-touching applications, data hierarchy and, 136 distribution portal, 365 access, 113, 114–117 346–348 decisions about, 131–132 pull model at, 357 communications, 117–121 mobile, 349–350 definition of, 12, 13 Deloitte, 52 physical, 113, 114 on-demand, 349 privacy and personal Delta Airlines, 227, 279 Conversational commerce, open-source, 350–351 information in, 81–83 Demand forecasts, 359 214–215 operational, 345–349 relational, 151, 158–166 Demand-to-order, 334 Conversational marketing, 301 real-time, 353 storing data, 153 Dematerialization, 247, 248 Convoy, 360 social, 351–353 Database schemas, 155 Demetrio, Thomas, 279 Cookies, 110, 232 strategy vs., 341–342 Data consolidation, 343–345 Demilitarized zone (DMA), 118 Copyright, 103, 235, 448 Customers Data controllers, 86–87 Denial-of-service attacks, 104, Cordio app, 249 bargaining power of, 60 Data cubes, 149, 151 108–109 Core business, 58 microsegmentation of, 145 Data dictionaries, 159–160 Deontology approach, 72 Coresight Research, 211–212 power of, 49 Data exhaust, 130 Departmental information Corporate clouds, 461–462 Customer satisfaction, 43 Data governance, 133–134, 154 systems, 14 Corporate portals, 193 Customer segmentation, 145 Data integration, 150–151 Department of Homeland Corporate social networks, 288 Customer service, 28, 340 Data items, 11 Security, 53, 80 Corvus Robotics, 366 Customer-touching CRM Data lakes, 155–156 Descriptive analytics, 383, Cost assessment, 412 applications, 346–348 Data management, 132–134, 394 384–388, 394–395 Cost-benefit analysis, 413 Customer touch points, 342–343 for all majors, 165, 166 example applications, 386–388 Cost leadership strategy, 63, 64 Customization Big Data, 138–147 predictive analytics and, Cost reduction, 43 mass, 57, 347 for business analytics, 382–383 394–396 CouchDB, 143 of prewritten applications, 415 case studies, 129–130, 169–170 tools, 384–386 Countermeasures. See Controls, Cuyahoga Metropolitan Housing database approach to, 134–138 Desktop-as-a-service (DaaS), 467 information security Authority, 51 data governance, 133–134 Devers, Rafael, 70 Craigslist, 2, 289, 298, 306 Cybercrime, 95–96, 97 data warehouses and marts, DevOps, 408–409, 426 CrashPlan, 107 cloud computing, 471–472 148–156 Dia & Co., 375 Credit cards health care and, 250–251 difficulties of, 132–133 Dial-up modems, 179 electronic, 217–218 Cybermalls, 217 importance of, 131 Dice Open Web, 305 mobile payment apps, 266 Cyber security, 53 relational databases, 158–166 Differentiation, 43 Credit reports, freezing, 93–94 Cybersource, 218 Data marts, 148–156 Differentiation strategy, 63, 64 Cricket Wireless, 276 Cybersquatting, 234 Data mining, 384–385, 388–389 Digibank, 214 Critical Internet of Things, 262 Cyberterrorism, 95, 111 Data model, 136 DigitalC, 52 CRM. See Customer relationship Cyberwarfare, 95, 110, 111 Data packets, 178–179 Digital certificates, 119 management (CRM) systems Cycle time reduction, 43 Data processors, 86–87 Digital dashboards. See Cross-functional processes, 37–40 Data reduction, 384 Dashboards Cross-selling, 346 D Data rot, 132 Digital divide, 51–53 Crowdfunding, 222 Daimler, 141 Data subjects, 86 Digital dossiers, 78 Crowdsourcing, 198–199 Dairy farms, 272 Data visualization, 399 Digital Humanitarian Network Cruise ships, customer focus on, Dao, David, 278–279 Data Warehouse Institute, 154 (DHN), 282 56–57 Dark analytics, 405–407 Data warehouses, 131, 148–156 Digital literacy, 172 Cruz, Ted, 85 Dark fiber, 52 data integration, 150–151 Digital Millennium Copyright Cryptocurrencies, 217 DarkHotel, 105 data quality, 154 Act, 32

bindex.indd 540 28/08/19 11:58 AM INDEX 541

Digital mortgage, 54–55 EC. See Electronic commerce Employee relationship Ethics, 53, 70–91 Digital Recognition Network, 80 (e-commerce) management (ERM), 320 case studies, 70–71, 90–91 Digital signals, 179 E-commerce. See Electronic Employees. See also Human codes of, 73 Digital subscriber lines (DSL), 177 commerce (e-commerce) resources cookies, 232 Digital transformation, 5–7 systems bring your own device, 49–50 in the corporate environment, Digital twins, 271 Edge Up Sports, 28 cloud computing impact on, 467 73–75 Digital video discs (DVDs), 444 EDI. See Electronic data with disabilities, 24 definition of, 72 Digital wallets, 265–266 interchange (EDI) health and safety of, 23 for different majors, 87–88 Digitization, degree of, 212 Educational applications, 200–201 information security and human electronic business, 232 Dimension Data, 169–170 Effectiveness, 37 error by, 98–99 electronic commerce, 232–235 Direct conversion, 422 Efficiency, 37 Internet privacy and, 81 ethical frameworks, 72–73 Directly, 213 E-government, 213 IT support for, 16, 18 framework for issues in, 75–76 Direct materials, 229 EHarmony, 390, 391–392 microchipping, 319 information technology and, Direct sales, 298 Eko, 20 quality of life, 24 75–77 Disabilities, IT and opportunities El Arte de Medir, 359 EMV smart cards, 218, 266 privacy and, 78–87 for people with, 24 E-learning, 200–201 Encryption, 75, 118–119 E-ticketing, 39–40 Disaster recovery, 462 Electronic bulletin boards, 83 End user computing, 9 ETL. See Data integration Disaster recovery plans, 121 Electronic business (e-business), End-user development, 420, Etsy, 145, 298 Disaster relief, 281–282 58. See also Electronic 425–426 European Directive on Data Disconnect, 225 commerce (e-commerce) Energy management, 271 Protection, 84, 471 Discovery network applications, case studies, 209–210, 239–243 Enlitic, 484 European Union (EU), 48, 189–190 191–194 definition and concepts in, 212 Enterprise application integration data privacy, 86–87, 470 Dish Network, 20 definition of, 212 (EAI) systems, 329 GPS, 253 Disney, 439 ethical issues, 232 Enterprise computing, 456 Safe Harbor, 470 Distance learning, 200–201 overview, 211–228 Enterprise data, 139 Europol, 108 Distributed denial-of-service Electronic cards, 217–218 Enterprise data warehouses Eurosport, 170 (DDoS) attacks, 108–109 Electronic catalogs, 216 (EDWs), 155–156 Everyblock.com, 289 Distributed processing, 182–183 Electronic chat rooms, 195 Enterprise networks, 178–179 EveryoneOn, 52 Distribution portals, 365 Electronic checks (e-checks), 217 Enterprise resource planning Evil twin attacks, 257 Dixons Carphone, 95 Electronic commerce (ERP), 317, 318 Evolution-Data Optimized (EV-DO) DMAIC (define, measure, analyze, (e-commerce; EC), 58, Enterprise resource planning technology, 261 improve, and control), 209–243 (ERP) systems, 15–16, 18, Exactis, 96 44–45 benefits and limitations of, 219 322–334 Excel, 383 DNS. See Domain name system business models, 215–216 benefits and limitations of, Exception reports, 322 (DNS) business-to-business, 228–231 325–327 Exchanges, 229–230 Docker, 428, 432 business-to-consumer, 14–15, for business processes, 329–334 Execution, 40 Documentation, 448 220–228 definition of, 322 Executive dashboards, 18 Dogpile, 192 case studies, 209–210, 239–243 ERP II, 324 Executives, 16, 18 Domain names, 188, 234 definition of, 211 implementing, 327–329 Experian, 93 Domain Name System (DNS), definitions and concepts, 212 for interorganizational Expert systems (ESs), 18, 480 108–109, 188 ethical issues, 232–235 processes, 333–334 Explicit knowledge, 157 Domino’s Pizza, 68–69 fraud, 232–234 modules, 326 Exposure, 96 DonorsChoose, 51 mechanisms, 216–217 on-premise implementation, Extensible markup language DoNotPay bot, 215 overview, 211–228 327–328 (XML), 473–474 DowDuPont, 254 payment mechanisms, 217–219 for procurement, fulfillment, External auditing, 121–122 Doximity, 250 taxes and fees, 234–235 and production, 329–333 Extranets, 184, 364–365 Doxxing, 107 types of, 212–216 software-as-a-service Doyle, J. Patrick, 68 Electronic commerce implementation, 328–329 F DreamWorks Animation, 21 (e-commerce) systems, 16, 18 Enterprise social networks, 288 FACC Operations GmbH, 105 Drexel Women’s Care Center, Electronic CRM (e-CRM) Entertainment, on-demand, 34–35 Face++, 115 249–250 applications, 347–348 Entity, 136 Facebook, 105 Drill-down reports, 322 Electronic data interchange (EDI), Entity-relationship diagrams, ad blockers, 226 Driverless vehicles, 366, 396, 484 362–364 159–161 Athena, 254 Drones, 25–26 Electronic discussions, 83 Entity-relationship (ER) modeling, Big Data, 139 at Domino’s, 69 Electronic exchanges, 229–230 131, 159–161 Cambridge Analytica scandal, electronic surveillance with, 79 Electronic Frontier Foundation, Entry barriers, 59–60, 211 84–86 Facebook, 186 225 Environmental monitoring, 271 deep learning, 482 in supply chain management, Electronic mail, 194 E-procurement, 229 drones, 186 366 Electronic malls, 217, 220–221 Equifax, 92–94 facial recognition software, 79, DroneScan, 366 Electronic marketplaces ER. See Entity-relationship (ER) 484 Dropbox, 466, 469 (e-marketplaces), 217 modeling fraudulent affiliate marketing DSL modems, 179 Electronic payments, 214, Ergonomics, 23 on, 233 Dumb cards, 115 217–219 Erica, 55 location and purchase data, 74 Duncan Regional Hospital, 485 financial technology, 222 Ericsson, 172, 262 marketing, 21 DuPont, 32 mobile wallets, 265–266 ERM. See Employee relationship market research, 302 Durocher, Leo, 70 Electronic retailing (e-tailing), 220 management (ERM) Messenger, 214–215, 280 Dyn, 108–109 Electronic storefronts, 217, 220–221 ERP. See Enterprise resource in Myanmar, 172 Electronic surveillance, 78–81 planning (ERP); Enterprise New York Times and, 2 EliteSingles, 391 resource planning (ERP) Workplace, 197 E EMC, 155–156 systems Facial recognition software, 79, EAI. See Enterprise application Emergency care, 249, 253 ERP II systems, 324–325 90–91, 115, 483 integration (EAI) systems Emerging technologies managers, ES. See Expert systems (ESs) Fairness approach, 72 Earned media, 299 8 Espionage, 101 FAIS. See Functional area EarthCast Technologies, 255 Empathiq, 294 ESRI, 402 information systems (FAISs) Earthquakes, predicting, 390–391 Employee development, 304–305, E-tailing. See Electronic retailing Fandango, 386, 389, 396 Eavesdropping, 257 319 (e-tailing) FarmVille, 20 EBay, 482 Employee monitoring systems, 121 Ethernet, 181 Fashion industry, 21

bindex.indd 541 28/08/19 11:58 AM 542 INDEX

FASTER, 181 5G, 261–262 GigaPower, 186 Grid computing, 458 Fast Identity Online (FIDO) FiveThirtyEight, 389 Gig jobs, 213 Grocery industry, 61 Alliance, 116 Fixed disk drives, 443 Gigster, 416–417 Groupon, 297 Fat clients, 183, 436–437 Flash memory devices, 444 Giraffe, 483 Group purchasing, 229 FCC. See Federal Communications Flexe, 360–361 GIS. See Geographic information Group shopping, 297 Commission (FCC) Flexibility, 468 systems (GIS) GrubHub, 69 Feasibility studies, 421 Flickr, 20 Glip, 197 Federal Aviation Administration Flipkart, 240 Global Fishing Watch, 255 H (FAA), 79 Flipsy, 298 Globalization, 47–48 Hacker Quarterly, 99 Federal Bureau of Investigation Flirtey, 366 Global positioning systems (GPS), Hackers, 96, 97 (FBI), 108 Flowcharts, 40 253–254 Hadoop, 143, 155 Federal Communications Folksonomies, 283 in agriculture, 21 Halliburton, 406 Commission (FCC), 51, 52, Follow-me robots, 366 electronic surveillance and, Hammer, Michael, 43 176–177 Footprint, 252 78–79 Hancock Regional Hospital, 106 one touch make ready order, 187 Forbes, 5, 8–9 Tour de France and, 169 Handy, 240 on SHAKEN/STIR, 248 Force feedback, 439 Globo, 465 Hangzhou Xiongmai Technology on SpaceBees, 255–256 ForcePoint, 121 GLONASS, 253 Company, 109 on Super Wi-Fi, 260 Ford, Henry, 57 GM Cruise, 26 Hansa, 112 Federal Information Security Ford Autonomous, 26 Goal-seeking analysis, 386 Haptic interfaces, 450 Management Act (FISMA), Ford Motor Company, 57, 141, 146 Golf, professional, 6 Hard drives, 443 471 Foreign keys, 137, 159 Goods-to-person robots, 365 Hardware, 12, 13, 434–446 Federal Trade Commission (FTC), Forward auctions, 216 Google, 105, 192, 481 central processing unit, 440–444 79, 84 Fotolia, 298 ad blockers, 225 definition of, 435 Better Online Ticket Sales 4G LTE, 247, 261 Apps, 470–471 hierarchy of, 436–438 (BOTS) Act, 215 451Research, 118 Big Data, 139 input, 438 Facebook–Cambridge Analytica FoxMeyer Drugs, 327 biometrics, 116 output, 439 scandal, 85 Franks, Herman, 70 Chrome, 225 overview, 434–435 on scams, 232 Fraud, 232–234 Cloud Spanner, 143–144 strategic issues, 435 FedEx, 364, 371, 373, 397 FreedomPop, 276 computer vision, 484 virtual reality, 439 Fiber-optic cable, 180–181 Freemiums, 106 deep learning, 482 Harrah’s Entertainment, 381 Fiber-to-the-home (FTTH), 185, Freight forwarding, 6–7, 372 Docs, 77, 466, 472 Hawk-Eye Innovations, 41 186–187 Freightos, 6 Drive, 197 Health and safety Fidelity Investments, 210 Frequently asked questions driverless car, 396 IT impact on, 23 FIDO. See Fast Identity Online (FAQs), 214, 347 facial recognition software, 79 Health care, 26–27 (FIDO) Alliance FTTH. See Fiber-to-the-home Fi, 275–277 artificial intelligence in, 479, 484 Fields, 135 (FTTH) Fiber, 186–187 dark analytics in, 406 File management environment, Fulfillment process, 38, 42 Glass, 437 Internet of Things, 271 134 Fulfillment time reduction, 43 health information, 27 negative reviews of, 294–295 File servers, 178 Functional area information location and purchase data, smartphones in, 249–251 Filter bubbles, 296 systems (FAISs), 14–15, 18, 74–75 Healthgrades, 294 Fin7, 97 315–322 Maps, 74, 289 Health insurance, Zenefits and, Finance accounting and finance, marketing, 21 209–210 customer relationship 315–317 mobile wallets and payment Health Insurance Portability and management and, 368 activities supported by, 321 apps, 265 Accountability Act (HIPAA), data/knowledge management human resources, 318–320 News, 3 53, 107, 471 and, 165 marketing, 317 New York Times and, 2 HelloFriend, 288 electronic commerce, 235–236 production/operations Pay, 265 Hennes & Mauritz (H&M), 358 enterprise resource planning management, 317–318 Project Loon, 186, 256 Here, 141 in, 334 Functional dependencies, 162 self-driving car, 21, 141 HIPAA. See Health Insurance ethics in, 87 Functional exchanges, 230 Station, 259 Portability and functional area information Fuze, 200 Tez, 265 Accountability Act (HIPAA) systems, 315–317 translation, 192–193, 485 Hiring, 146 information security, 122 G Wallet, 265 Hitsquad, 347 networking, 202 Galileo system, 253 Waze, 141 Hollywood Presbyterian Medical social computing and, 306 Gaming consoles, 451 GoPro, 7 Center, 126–127 supply chain management and, Gartner, 45, 138, 140, 485 Governance, data, 133–134 Homo conexus, 4 368 GasBuddy, 267–268 Government Horizon Blue Cross Blue Shield, systems acquisition and, 429 GE. See General Electric (GE) Big Data in, 147 425–426 wireless technology and, 273 General Data Protection cloud computing, 470–471 Horizontal exchanges, 230 Financial services industry, 21 Regulation (GDPR), 86–87, the Internet and, 189–190 Hotel keycard locks, 101–102 cognitive computing in, 28 189–190 Government regulations, 53, 133, Hot sites, 121 mobile computing, 265–266 General Electric (GE), 44, 272, 471 Hot spots, 258–259 using social data in lending 347, 367 Government-to-business (G2B). Hotspotters, 257 decisions, 287–288 General Motors (GM), 28, 141 See E-government H& Block, 28 Financial technology (Fintech), General Services Administration Government-to-citizen (G2C). See HTML. See Hypertext markup 221, 222–223 (GSA), 468 E-government language (HTML) Find My iPhone, 269 Genesys, 28 GPS. See Global positioning HTML5, 473 Fintech. See Financial technology GEO. See Geostationary-Earth- systems (GPS) HTTP. See Hypertext Transfer (Fintech) orbit (GEO) satellites Grainger, 231 Protocol (HTTP) FinTech, 55 Geofilters, 310 Gramm–Leach–Bliley Act, 53 Huawei Pay, 266 Firewalls, 117–118 Geographic information systems Granular, 254 Huffington Post, 3 First Orion, 248 (GIS), 402 Graphical user interfaces (GUIs), Human errors, 98–100 Fishbowl, 312–313 Geostationary-Earth-orbit (GEO) 24, 190, 450 Human resources FISMA. See Federal Information satellites, 252–253 Graphics processing units (GPUs), Big Data in, 146 Security Management Act Geotags, 78–79, 283 479 bots in, 214–215 (FISMA) Gesture recognition, 438 Green Aero Tech, 32 customer relationship Fitbit, 244–245 Ghostery, 225 Green IT, 50 management and, 368

bindex.indd 542 28/08/19 11:58 AM INDEX 543

data/knowledge management Information privacy, 78. See also strategies for acquiring, Internet Corporation for Assigned and, 165 Privacy 413–418 Names and Numbers development, 319 Information producers, 154 support for managers, 379 (ICANN), 188, 234 electronic commerce, 236 Information security, 92–128 systems development, 423–428 Internet Freedom Fighters, 235 employee development, access controls, 113, 114–117 systems development life cycle, Internet of Things, 6, 106, 269–272 304–305 business continuity planning, 418–423 business analytics, 388 enterprise resource planning 121 Information technology critical, 262 in, 334 case studies, 92–94, 126–128 components, 12–13 definition of, 246, 269 ethics in, 88 cloud computing, 466 Information technology examples of in use, 271–272 functional area information communications controls, 113, infrastructure, 14, 456 massive, 262 systems, 318–320 117–121 Information technology mobile commerce and, 246 information security, 123 controls, 113–123 platforms, 13 radio-frequency identification IT functions, 15 definition of, 96 Information technology services, technology, 270 networking, 202 deliberate threats to, 100–111 13–14 Internet of Us, 319 onboarding, 304 different majors and, 122–123 Informed consent, 84 Internet Protocol (IP), 181 recruiting, 21 difficulties in, 111 Informed users, 4–6 Internet Protocol (IP) addresses, social computing in, 304–307 human errors, 98–100 Infrastructure, 14, 54, 246, 456 187–188 supply chain management and, information systems auditing, Infrastructure-as-a-service (IaaS), Internet service providers (ISPs), 368–369 121–122 463–464 185 systems acquisition and, 429 physical controls, 113, 114 Infrastructure management, 271 Internet telephony, 195 wireless technology and, 273 protection of information Infrastructure planning, 10 Interorganizational information Humatics, 258 resources, 111–113 Innovation strategy, 63, 64 systems (IOSs), 16, 356 Hurricane Harvey, 281–282 social engineering, 100 Inputs, 37, 377, 438 Interorganizational processes, Hutchins, Marcus, 126 software attacks, 103–109 INRIX Traffic Scorecard, 147 333–334 Hybrid clouds, 462 unintentional threats and, 97–100 InSided, 213 Intranets, 184 Hyperlinks, 190 Information services, 11. See also Instacart, 360 Inventory, 331, 361–362 Hypertext, 190 Information systems (IS) Instagram, 20, 311 Inventory control, 312–313 Hypertext markup language Information sharing, 362 Instance level, 42 Inventory management, 317 (HTML), 473 Information silos, 322 Instances, 136 Investment management, 316 Hypertext Transfer Protocol Information systems (IS), 1–33 Instant Blood Pressure, 251 IOS. See Interorganizational (HTTP), 182, 191 acquiring, 408–433 Institute of Electrical and information systems (IOSs) auditing, 121–122 Electronics Engineers (IEEE), IP. See Internet Protocol (IP) I breadth of, 14–16 258 IPhone, 269 IAdvize, 213 business processes and, 40–43 Integrated CASE (iCASE) tools, Iron Mountain, 361 IBIS World, 391 capabilities of, 14 420, 427 IS. See Information systems (IS) IBM, 141, 142, 478 career opportunities, 7–9 Intellectual assets, 157, 448–449 IS director, 8 IBM Watson, 27–28, 484, 485, 486 case studies, 1–3, 6–7, 17–18, Intellectual capital, 157 ISP. See Internet service providers ICANN. See Internet Corporation 31–33, 312–313, 336–337 Intellectual property, 103, 235 (ISPs) for Assigned Names and changing role of, 9–10 Intellectual property law, 32 IT. See Information technology (IT) Numbers (ICANN) computer-based, 12–19 Intelligent agents, 485–486 IT architecture, 410 ICARUS, 391 definition of, 3 Intelligent mobile hot spots, 259 IT steering committees, 411 ICEYE, 255 departmental, 14 InterContinental Hotels Group IT strategic plans, 411 IDC, 138 employee health and safety (IHG), 147 ID cards, 115 and, 23 Intermediation role, 59 J Identity theft, 103 employee support, 16, 18 Internal auditing, 121–122 JAD. See Joint application design IDrive, 107 functional area, 14 Internal clouds, 461–462 (JAD) IHealthspot, 295 health care, 26–27 International Monetary Fund, 172 Jamming devices, 247, 257 Images, 139 importance of to society, 24–28 Internet, 184–191. See also Japan, 181, 240, 272, 390, Imazon, 255 introduction to, 3–4 Electronic commerce 459–460 Implementation, 422 managing resources, 9–10 (e-commerce); Networks JDA, 144 Impressions, 224 within the organization, 312–337 accessing, 185–188 JD.com, 240 Improve phase, 44–45 organizational impact of, 19–24 access in Myanmar, 171–173 Jennings, Ken, 27 Inbound logistics, 61, 62 overview of, 11–19 addresses, 187–188 Jeopardy!, 27 India, 82–83, 195 people with disabilities and, 24 artificial intelligence and, 479 Jetblack, 240 Digibank, 214 quality of life and, 24 broadband, 174–176 Jet.com, 240 Flipkart, 240 reasons to study, 4–10 bulletin boards, privacy in, 83 Jetlore, 359 nanosatellites, 255–256 reports, 321–322 competitive forces model and, Jobs Wi-Fi, 259 robots, 24–26 59 eliminated by IS, 22 Indiana University Health, 406 types of, 18 digital divide, 51–53 finding, 305–306 IndigoAg Inc., 255, 387, 388 Information Systems Audit and employee privacy and, 81 gig, 213 Indirect materials, 229 Control Association, 122 foreign-language material, in information technology, 7–9 Inditex, 359 Information systems auditing, 192–193 online job market, 221 Individual social responsibility, 121–122 fraud, 232–234 reduced umber of middle 50–53 Information technology (IT), 11 future of, 188–190 management, 22 Industry value chains, 63 business alignment with, 64–65 global importance of, 173–174 Job stress, 23 Industrywide portals, 193 career opportunities, 7–9 information overload, 50 Jobvite, 305 Information. See also Privacy definition of, 3 neutrality, 189, 190, 206–208 Jochim, Jon, 70 definition of, 11–12, 130 green, 50 newspapers and, 1–3 John Deere, 31–33 knowledge vs., 157 impact of on employees, 22–24 over satellite, 254 Join operation, 164–166 theft, 101, 103 industry disruption by, 19–22 splinternet, 189–190 Joint application design (JAD), Information agents, 486 informed users, 4–6 wireless networks and 420, 423 Information center managers, 8 jobs eliminated by, 22 accessing, 257–264 Joint ventures, 365 Information consumers, 154 legacy systems, 469 World Wide Web, 190–191 Jones, Monica, 51–52 Information ethics, 53 organizational impact of, 19–24 Internet2, 189 Jones, Terry, 28 Information extortion, 101 planning for and justifying, Internet backbone, 184 Junction tables, 161 Information literacy, 172 409–413 Internet banking, 222 Just-in-time (JIT) inventory, Information overload, 50 robots, 24–26 Internet blimps, 256 361–362

bindex.indd 543 28/08/19 11:58 AM 544 INDEX

K LEO constellations, 253 electronic commerce, 236 Mbrace, 141 Kaboodle, 297–298 Le Tote, 375 enterprise resource planning McAfee VirusScan, 118 KarOO, 192 Levashov, Pyotr, 112 in, 334 McDonald’s, 299 Kasparov, Garry, 478 LexisNexis, 78 ethics in, 88 McKinsey and Company, 64, 140, Kayak, 28 Liability, 73 information security, 123 280 Kelihos, 112 License plate readers (LPRs), informed users, 4–6 M-commerce. See Mobile Kernel, 387–388 80–81 networking, 202 commerce (m-commerce) Key indicator reports, 322 Licensing, software, 448–449 social computing and, 307 Measure phase, 44 Keyloggers, 109 Lidl, 19 supply chain management and, Mebvii, 115 Keylogging, 104 Lifetime value, 341 369 Medical imaging, 484 Keys Li-Fi. See Light Fidelity (Li-Fi) systems acquisition and, 429 Medium-Earth-orbit (MEO) foreign, 137, 159 Light Fidelity (Li-Fi), 260 wireless technology and, 273 satellites, 252, 253 primary, 137, 158 Line, 311 Managers Medium-range wireless networks, secondary, 137, 159 Line-of-sight transmission, 251 decision making, 377–380 258–260 Keystroke loggers, 109 LinkedIn, 9, 21, 303, 305–306 IS support for, 16 Memes, 35 Kibler, Kate, 344 Lionsgate, 460 IT in reducing numbers of, 22 Memorial Sloan Kettering, 27 Kik, 214 LivingSocial, 297 IT support for, 379 Memory, computer, 441–444 Kiosks, 6 Load window, 153 job of, 22 Memory cards, 444 Kiva, 50 Local area networks (LAN), process performance MEO. See Medium-Earth-orbit Kiva Systems, 365 177–178, 456 monitoring, 42–43 (MEO) satellites Kixeye, 213 embedded, 178 roles of, 377–378 Meraki, 375 KMS. See Knowledge Location-based commerce, Mandiant, 93 Mercedes-Benz, 141 management systems 267–268 Manfred, Robert, 70 Merge Healthcare, 484 (KMSs) Location intelligence, 359 Manufacturing, 15, 48 Merrill Lynch, 54 Knock, 17 Locus Robotics, 366 Manufacturing resource planning Messaging apps Knowledge, 12 Logic bombs, 104 (MRP II), 318 conversational commerce and, definition of, 130, 156–157 Logistics management, 317 Many-to-many relationships, 161 214–215 explicit, 157 Long tail, 220 MapReduce, 143 most popular, 280–281 tacit, 157 Lord & Taylor, 239–240 Market basket analysis, 384–385 Metacrawler, 192 Knowledge management (KM), Lore, Marc, 240–241 Market capitalization, 341 Metadata, 154 131–132, 156–158 Los Angeles Police Department, Marketing Metasearch engines, 192 cycle in, 158 393–394 customer relationship Met Office, 139 definition, 156 Low-code Development Platforms management and, 368 Mexico, earthquake relief, 281 Knowledge management systems (LCDPs), 428 customer relationship Microblogs, 284–285 (KMSs), 157–158 Low-Earth-orbit (LEO) satellites, management systems, 346 Microchipping, 319 Knowledge workers, 16, 18 252, 253 enterprise resource planning Microcomputers, 436 telecommuting, 196 Lowebots, 24–25 in, 334 Micropayments, 265–266 Kodak, 20 Lower CASE tools, 427 functional area information Microprocessors, 440 Kogan, Aleksandr, 85 Lowe’s, 25–26 systems, 317 Microsegmentation, 145 Kreditech, 287 Loyalty programs, 60, 347–348 omni-channel, 343, 344 Microsoft, 20, 142 Kroger, 61, 406 Lufthansa, 115 supply chain management and, ad blockers, 225 Lumify, 249 368 Azure, 464 L Luminet, 263 systems acquisition and, 429 Bing shopping, 221 Lab-on-a-chip, 249 Luvo, 214 Marketing and sales computer vision, 484 Labor costs, 48 Lynda.com, 305 Big Data in, 147 intelligent agents, 485–486 Lai, Matthew, 483 data/knowledge management Office 365, 466 Lake, Katrina, 374–375 M and, 165 Office 365 Teams, 197 LAN. See Local area networks (LAN) Machine-generated data, 139 definition of, 299 SharePoint Workspace, 183 Laptop computers, 436–437 Machine learning (ML), 481 electronic commerce, 236 Translator, 192, 193 Lattice Data, 406 Madoff, Bernie, 73 ethics in, 88 Microwave transmission systems, Law enforcement Magnetic disks, 443 fraudulent affiliate, 233 251–252 body cameras, 26, 90–91 Magnetic tape, 443 information security, 122–123 Middleware, 329 drones in, 25–26 Maher, Jason, 350, 351 IT functions in, 15 MiFi, 259 Internet of Things data and, Mainframe computers, 436, 456 networking, 202 Mila chatbot, 215 129–130 Main memory, 441, 442–443 social computing and, 299–303, Minecraft, 20 license plate readers, 80–81 Maintenance, 423 306–307 Minimum viable product (MVP) predictive policing, 393 Major League Baseball (MLB), wireless technology and, 273 development, 425 LCDPs. See Low-code 70–71 Marketing industry, 21 MinION, 250 Development Platforms Makalot Industrial Company, 242 Market pressures, 47–49 Mirai, 108–109 (LCDPs) Make-to-order, 57, 331, 357 Market research, 301–303 MIS. See Management information Leadership in Energy and Make-to-stock, 331 Marks & Spencer, 465 systems (MIS) Environmental Design Malware, 50, 103, 118 Mary Kay, 465–466 Missguided, 359 (LEED) certification, 50 Mamma, 192 Mashups, 289 MIT Technology Review, 4 Lead times, 409 Management Mass customization, 57 M&M candies, 57 Lean Six Sigma, 46 change, 324 Massive Internet of Things, 262 M.M. LaFleur, 375 Learning organizations, 131 by exception, 322 Massive open online courses Mobile advertising, 268 Leasing, 415 information resources, 9–10 (MOOCs), 201 Mobile banking, 222 Least privilege, 117 support for information security, MasterCard, 266 Mobile commerce (m-commerce), Lee Hsien Loong, 251 97 Master data, 133–134 264–269 Legacy systems, 469 wireless technology and, 273 Master data management, 133–134 advertising, 268 Legal issues, 73–74, 471 Management information systems Match, 390 applications, 265–269 Legal pressures, 50 (MIS) Material requirements planning definition of, 213, 246, 263 Legal profession, 21–22 changing role of, 9–10 (MRP), 318 financial services, 265–266 Lenddo, 287 customer relationship Materials management, 317 intrabusiness, 268 Lending Tree, 365 management and, 369 Materion, 350–351 location-based, 267–268 LEO. See Low-Earth-orbit (LEO) data/knowledge management Maui Jim, 296 telemetry applications, satellites and, 165 Mayo Clinic, 27 268–269

bindex.indd 544 28/08/19 11:58 AM INDEX 545

Mobile computing, 6, 264–269, Nest Labs, 271 OLTP. See Online transaction Packets, 181–182 456 Netflix, 20 processing (OLTP) Packet switching, 181–182, 183 case study, 275–277 Net present value (NPV), 413 Omni-channel marketing, 343, 344 Paid media, 299 definition of, 246, 264 Network access points (NAPs), 185 Onboarding, 304 Pain points, 382 mobile commerce and Network controls, 117–121 On-demand customer relationship Palantir, 393–394 (See Mobile commerce Network interface cards (NIC), 177 management systems, 349 Pandora, 20 (m-commerce)) Network managers, 8 On-demand reports, 322 Panera Bread, 69 at Wendy’s, 6 Networks, 171–208 1G, 261 Papa John’s, 303 wireless vs., 246 applications, 191–201 One Laptop per Child (OLPC), 53 Parcel, 240 Mobile customer relationship broadband, 174–176 One-to-many relationships, 161 Parcel delivery, 372 management systems, case studies, 171–173, 206–208 One-to-one relationships, 160–161 Partnerships, 365 349–350 communications media and OneWeb, 254 Passphrases, 117 Mobile payments, 54, 141 channels, 179–181 Onity, 101–102 Passwords, 115–116 Mobile portals, 268 computer, 176–179 Online advertising, 224–226 strong, 116–117 Mobile wallets (m-wallets), definition of, 12, 13 Online analytical processing Pastebin, 471 265–266 determining speed of wireless, (OLAP), 383, 384 Patents, 103 Mobility, 263 263 Online dating, 391–392, 399 Pater, Charles, 130 Models, 385 enterprise, 178–179 Online job market, 221 PatientsLikeMe, 50 Modems, 179, 185 fundamentals of, 179–184 Online securities trading, 221 Paychex, Inc., 408–409 Money, 8 global importance of, 173–174 Online service industries, 221–226 PayPal, 218 MongoDB, 143 Internet and World Wide Web, Online transaction processing PayPal Braintree, 214 Monitoring 184–191 (OLTP), 314 Payroll, 320 process performance, 42–43 local area, 177–178 On-premise computing, 456–457 Paytronix Systems, 145 Monitoring and surveillance neural, 482–483 OnStar Go, 28, 141 Peer-to-peer (P2P) processing, 183 agents, 486 neutrality, 189, 190, 206–208 Open Data 500, 144 Peloton, 366 Monsanto, 32 processing types, 182–184 Opendoor, 16, 17–18 Performance monitoring Monster, 305, 306 protocols, 181–182 Open Graph, 85 business process, 42 MOOC. See Massive open online trusted vs. untrusted, 96 Open-source customer Personal agents, 486 courses (MOOCs) wide area, 178 relationship management Personal application software, Mortgages, digital, 54–55 wireless, 257–264 systems, 350–351 451, 452 Morton’s Steakhouse, 351, 353 Networks backbone, 178 Open-source software, 417, Personal area networks, 257 Motion-control gaming consoles, Network servers, 178 449–450 Personalization, 374–375 451 Network Time Protocol, 143 Open systems, 449 Personalized assistants, 214 Motion picture industry, 21 Neural networks, 482–483 Operating costs, 340 Personalized pricing, 227–228 Motorola, 44, 247 Newsbots, 2 Operating system (OS), 450 Person-to-person (P2P) banking, Moya Messenger, 281 NewSQL, 143 Operational customer relationship 222 MSC Cruises, 57 New York Giants, 70 management systems, Peru Digital Payments, 266 Multichanneling, 226 New York Times, 1–3 345–349 Petabytes, 132 Multidimensional analysis, 383, Next Generation Mobile Networks analytical, 348 Petra Risk Management, 102 384 Alliance (NGMN), 261–262 customer-facing applications, Petya, 127 Multidimensional databases NFC. See Near-field 345–346 Phased conversion, 422 relational databases and, 152 communication (NFC) customer-touching applications, Philanthropy, 50–51 Multidimensional structure, 149 Nielsen, 285 346–348 Philip Morris International, 417 Multifactor authentication, 116 NikeID, 57, 346 Operational effectiveness Phishing, 103, 104 Munoz, Oscar, 279 Nimbus, 46 strategy, 63, 64 Photography industry, 20 MUrgency, 249 Nokia, 141 Operations, Big Data in, 147 Photo tagging, 79 Music industry, 20 No More Ransom initiative, 108 Operations managers, 8 Physicians Weight Loss Centers, MVTrac, 80 Nondisclosure agreements, 90 Optical storage devices, 443–444 295 Myanmar, 171–173 Normalization, 161–165 Opt-in model, 84 Pi-hole, 225 MYCIN, 480 North American Free Trade Opt-out model, 84 PillPack, 242 MyFitnessPal, 95 Agreement (NAFTA), 48 OptumRX, 386–387 Pilot conversion, 422 Norton AntiVirus, 118 Oracle, 20, 142, 154, 323, 324, Pinterest, 484 N NoSQL databases, 142–143, 144 465–466 Piracy, 103, 448 Nanosatellites, 254–256 Notebook computers, 436–437 Orbital Insight, 255 Pirate Bay, The, 189 NAP. See Network access points Notification assistants, 214 Order fulfillment process, Planet Labs, 254 (NAPs) Novatel, 259 226–227, 330–331 Plank, Kevin, 323 Napster, 20 NSA. See National Security Agency Order-to-cash process, 330 Planning Narrow AI, 478 (NSA) Organizational social business continuity, 121 NASCAR, 41 Ntechlab, 90 responsibility, 50–53 human resources, 320–321 Nasdaq, 299–300 ORION, 398 for IT applications, 410–413 National Basketball Association O Österlund, Jowan, 319 production and operations, (NBA), 34–36 OBIM. See Office of Biometric Ottawa Hospital, 107 317–318 National Consumer League Fraud Identity Management (OBIM) OurTime, 391 in supply chain management, Center, 234 Object code, 103 Outputs, 37, 377 355 National Emergency Number Object-oriented development, hardware for, 439 Platform-as-a-service (PaaS), Association (NENA), 282 420, 427–428 Outsourcing, 10, 417 464–465 National Security Agency (NSA), Oceana, 255 Overbooking, 278 Platform for Privacy Preferences 461–462, 470 OfferPad, 17 Overstock, 215 (P3P), 84 National Weather Service, 389 Office of Biometric Identity Owned media, 299 Platforms, 13–14 Native advertising, 224, 300 Management (OBIM), 53 Oxford Nanopore Technologies, 250 Platooning, 366 Natural disasters, predicting, Offshoring, 195, 417 PLUS Real-Time Location System 390–391 OKCupid, 390 P (RTLS), 258 Natural language processing, 485 OLAP. See Online analytical P2P. See Peer-to-peer (P2P) Police. See Law enforcement Natural user interfaces (NUIs), 450 processing (OLAP) processing POM. See Production/operations Naver, 311 Olive Garden, 336–337 PAC2000A, 468 management (POM) Near-field communication (NFC), OLPC. See One Laptop per Child Pacemaker data, 129–130 Ponemon Institute, 95 258, 344 (OLPC) Packages, software, 451 Pop-up stores, 361

bindex.indd 545 28/08/19 11:58 AM 546 INDEX

Portals, 193–194 functional area information Real-time customer relationship S distribution, 365 systems, 317–318 management systems, 353 Sabotage, 101 mobile, 268 information security, 123 Recommendation engines, 352 Safety procurement, 365 networking, 202 Records, 136 IT impact on employee, 23 voice, 268 supply chain management and, Recruiting industry, 21 terrorist attacks, 53 Porter, Michael, 58–61, 62, 63 368 bots in, 214–215 Safeway, 61 Precision agriculture, 272 systems acquisition and, 429 information systems for, Sage, 323 Precision Hawk, 32 Production process, 331–332 318–319 SA Homes, 432–433 Predictive agents, 486 Productivity, 43, 377 social computing in, 304 Sales. See Marketing and sales Predictive analytics, 383, 388–396, Product life cycle management, Red Hat, 449 Salesforce, 20, 349, 416, 468 395 318 Reengineering the Corporation Salesforce automation (SFA), 346 descriptive analytics and, Profiling, 78 (Hammer & Champy), 43 Salesforce Einstein, 352 394–396 Programmers, 419 Registers, 442 Sales lead tracking systems, 346 example applications, 389–392 Programming, 422, 448 Relational databases, 136–137, Samba, 461 tools, 388–389 Programming managers, 8 151, 158–166 Sampling, 145 unintended consequences of, Project Loon, 186, 256 entity-relationship modeling, SamSam, 106, 127 393–394 Promotion analysis, 15 159–161 Sam’s Club, 240 PredPol, 90 Propagation delay, 253 multidimensional databases Samsung, 247 Prescriptive analytics, 383, Property issues, 76 and, 152 Samsung Pay, 265 396–399 , 449 normalization and joins, Santos, Hubert J., 245 Presence services, 195 PROSPECTOR, 480 161–165 SAP, 142, 199, 323, 324 Presentation tools, 383, 399–402 Protocols, network, 181–182 query languages, 159 SAP HANA, 323–324 Prewritten applications, 414–415 Prototyping, 420, 426–427 Relationships, 160 Sarbanes–Oxley Act, 53, 73, 133, Price2Spy, 228 rapid, 367 Remittances, 222 471 Price analysis, 15 Public clouds, 461 Remote attacks, 104 Satellite radio, 256 PriceWaterHouseCoopers, 87 Public exchanges, 229–230 Rendition Infosec, 127 Satellite transmission systems, Pricing, personalized, 227–228 Public-key encryption, 118–119 Rent the Runway, 21, 375 251, 252–256 Primary activities, 61–62 Public portals, 193 Repetitive strain injuries, 23 Saudi Arabia, 110 Primary keys, 137, 158 Pull model, 357 Reports, 321–322 SCADA, 110 Primary storage, 441, 442–443 Purchasing, 229 Repsol, 28 Schema-on-read architectures, Printing, three-dimensional, Purchasing cards, 218 Republic Wireless, 276 155 366–367 Purchasing profiles, 346 Reputation scores, 213 Schema-on-write architecture, Privacy, 78–87. See also Pureplay organizations, 212 Resources 155 Information security Push model, 357 definition of, 37 Schneider Electric, 300 case studies, 90–91 management of, 9–10 Schneiderman, Eric, 174 cloud computing, 470 Q Responsibility, 73 Scitable, 199 codes and policies, 83–84 QBE. See Query-by-example (QBE) Return on investment (ROI), 413 SCM. See Supply chain definition of, 78 Qualcomm, 109 Returns, 356 management (SCM) systems electronic surveillance, 78–81 Quality, 43 Reverse auctions, 217 Scope creep, 422 at Facebook, 84–86 Quality control, 317 REX Real Estate Exchange, 481 Scraping, 228 information, 78 Quality of life, 24 RFID. See Radio-frequency Scratch Wireless, 276 international aspects of, 86–87 Quarule, 55 identification (RFID); Radio Screen grabbers, 109 Internet bulletin boards, Query-by-example (QBE), 148 frequency identification Screen scrapers, 109 newsgroups, and social Query languages, 159 (RFID) chips Scripts, 97 networking sites, 83 Quick response (QR) codes, 270 Rights approach, 72 Scrum approach, 424–425 issues in, 75 Quizlet, 76–77 Risk, 112 SDL Trados, 192 personal information in Risk acceptance, 112 Seagate, 105 databases, 81–83 R Risk analysis, 112 Search engines, 192 virtual private networks, Rackspace, 461, 471 Risk limitation, 112 SEC. See Securities and Exchange 119–120 RAD. See Rapid application Risk management, 112 Commission (SEC) Privacy Badger, 225 development (RAD) Risk mitigation, 112 Secondary keys, 137, 159 Privacy codes, 83–84 Radio, 1 Risk transference, 112 Secondary storage, 443–444 Privacy policies, 83–84 cellular, 260–262 Rivalry among existing firms, 60–61 Secure socket layer (SSL), 120–121 Privacy Rights Clearinghouse, 75 Radio-frequency identification RobbinHood, 127–128 Securities and Exchange Private clouds, 461–462 (RFID), 270 Robinhood, 222 Commission (SEC), 74 Privilege, 117 Radio frequency identification Robo-advisors, 222 Zenefits and, 210 Problem structure, 380 (RFID) chips, 61, 169, 270 Robotics, 485 Security, 96, 134. See also Procedures, 13 Radio frequency (RF) jamming, mobile, 258 Information security Process controls, 45 257 in supply chain management, cloud computing, 466, 470–471 Process data, 41–42 Radio transmission, 251, 256 365–366 shadow IT, 425–426 Process level, 42 Rakuten, 240 Robots, 24–26, 71 wireless technologies, 256–257 Process modeling, 45 RAM. See Random access memory Rocksbox, 375 Sell-from-stock, 330 Procter & Gamble (P&G), 199, 362 (RAM) Rogue access points, 256 Sell-side marketplaces, 228–229 Procurement portals, 365 Random access memory (RAM), Rohingya people, 172 Sensitivity analysis, 385 Procurement process, 37, 442–443 ROM. See Read-only memory Sensor data, 139 229, 330 Random sampling, 145 (ROM) from connected vehicles, Product analysis, 15 Ransomware, 104, 106–108, 127 ROSS, 21 140–141 Product development, 146 Ransomware-as-a-service, 107 Routers, 178 wireless, Internet of Things, Production/operations Rapid application development Routine reports, 322 269–270 management (POM), 15 (RAD), 420, 423–424 Rovio, 20 Sensors, 269–270 customer relationship Ratings, reviews, and Royal Bank of Scotland, 214 Sensor Tower, 267 management and, 368 recommendations, 294–296 Royal Caribbean Cruises, 56 Sentiment analysis, 390 data/knowledge management Read-only memory (ROM), 443 RSS. See Really Simple Server farms, 458–459 and, 165 Real estate industry, 17–18 Syndication (RSS) Servers, 183 electronic commerce, 236 Really Simple Syndication (RSS), Russia, 190, 253, 356 Server virtualization, 459, 466 enterprise resource planning 283 Rutter, Brad, 27 Service industries, online, in, 334 Real time, 16 Ryder Systems, 361 221–226

bindex.indd 546 28/08/19 11:58 AM INDEX 547

Service-oriented architecture, Social engineering, 100 Standardized pricing, 227 agile, 424–425 472–474 Social graphs, 285 Stanford University, 390 DevOps, 426 Sesame Credit, 79 Social intelligence, 302 Starbucks, 63, 242, 265 end-user, 425–426 SETI@home, 183 Social interface, 451 Starchup, 416–417 joint application design, 423 Shadow IT, 425–426 Social marketplaces, 298 Starry, 259 rapid application, 423–424 Shafer, Andrew, 409 Social media. See also Social Starship Technologies, 69 tools, 426–428 SHAKEN/STIR, 248 computing; specific apps Starwood, 300 Systems development life cycle Shazam, 20 disaster relief and, 281–282 State of Information Survey, 131 (SDLC), 418–423 Shinsei Bank, 450 Social media managers, 8 Stephens, Paul, 75 advantages and disadvantages Ship-to-store, 241 Social networking, 285 Stitch Fix, 374–376 of, 420 Shoes.com, 240 Social networking sites, 285–288 Stored-value money cards, 218 implementation, 422 Shopping bots, 486 Big Data, 139 Stormhoek Vineyards, 300 operation and maintenance, 423 Shopping communities and clubs, data privacy, 84–86 Strategic information systems programming and testing, 422 297–298 NBA and, 34–35 (SISs), 58 systems analysis, 421 ShopSocially, 296 privacy in, 83 Strategic systems, 54–56 systems design, 421–422 Short-form content, 141 Social networks, 285 Strategy systems investigation, 421 Short messaging services (SMS), Social responsibility, 50–53 competitive, 58 Systems investigation, 421 250 Social shopping, 293–298 for competitive advantage, Systems programmers, 8 Short-range wireless networks, Software, 447–454 63–64 Systems software, 450–451 257–258 alien, 109–110 customer relationship Systems stakeholders, 419 Shoulder surfing, 100 application, 451–452 management, 341–342 Systran, 192 Showrooming, 226, 344 attacks, 103–109 Stripe, 214, 219 Shutterfly, 20 copyright issues, 235 Strong AI, 477–478 T Signature recognition, 115 deep learning, 479 Structured data, 137 Tables, 136, 161 Siklu, 52 defects, 448 Structured query language (SQL), Tablet computers, 437 Silver, Nate, 389 definition of, 12, 13, 447 159 Tacit knowledge, 157 Simon, Herbert, 378 industry disruption by, 19–22 Stumpf, John, 74 TacoBot, 214 Simpa Networks, 389 issues around, 448–450 St. Vincent’s Charity Hospital, 52 Tags, 283 Simple object access protocol licensing, 448–449 Substitute products/services, 60 Tailgating, 100 (SOAP), 474 open-source, 417, 449–450 SugarCRM, 350–351 Taleo, 465–466 SimplyHired, 305, 306 open systems, 449 Supercomputers, 436 Target, 393 Singapore, 251 overview, 447–448 SuperTower, 256 Taxes, e-commerce and, 234–235 SIS. See Strategic information piracy, 103 Supervisory control and data Tay bot, 215 systems (SISs) systems, 450–451 acquisition (SCADA) attacks, TCP/IP, 181–182 Site analysis, 15 Software Alliance, 14 110 Teams, virtual, 196–197 Six Sigma, 44, 46 Software-as-a-service (SaaS), 20, Super Wi-Fi, 260 Technical specialists, 419 Skype, 195 210, 415–417, 465–466 Supplemental Nutrition Technology Skype Translator, 192 ERP, 328–329 Assistance Program (SNAP), artificial intelligence, 480–483 Slack, 197 Software-defined infrastructure 474 business analytics, 382 Smart cards, 218 (SDI), 54 Suppliers, bargaining power of, 60 business pressures, 49–50 Smart homes, 271 Software-defined networks (SND), Supply chain, 16 digital divide, 51–53 Smart ID cards, 115 178 Supply chain management (SCM), information overload, 50 Smartphones, 247–251, 482 Software Engineering Institute 16, 271, 355–367 innovation and obsolescence, 49 dematerialization and, 247 (SEI), 448 blockchain, 223 input, 438 electronic surveillance with, Software industry, 20 case studies, 371–373 output, 439 78–79 Software suites, 451 components of, 355–356 supply chain management, health care and, 249–251 Solid-state drives (SSDs), 443 definition of, 355 362–367 SmidgION, 250 Sony, 119, 120 electronic data interchange in, virtual reality, 439 SMS. See Short messaging SOS Online Backup, 107 362–364 wireless, 246–257 services (SMS) SoundCloud, 20 emerging technologies for, Telecommunications Snapcash, 310 Source code, 103 362–367 case study on, 171–173 Snapchat, 105, 309–311 Source data automation, 314 ERP for, 333–334 Internet, 195 Snapfish, 20 Sourcing, 355–356 extranets, 364–365 Telecommuting, 196 Snow, 311 Southwest Airlines, 353 information technology support Teleconferencing, 199–200 Snowden, Edward, 189 SpaceBEEs, 255–256 for, 362–367 Telegram, 190 Social advertising, 300 SpaceKnow, 255 overview, 340 Telematics, 145 Social apps, 300 SpaceX, 254 problems in, 359–361 Telemetry, 268–269 Social BPM, 45 Spam, 109–110 push vs. pull models of, 357–359 Telepresence, 199–200 Social capital, 285 Spam calls, 248 solutions to problems in, Telepresence robots, 365–366 Social commerce, 281 Spamming, 224 361–362 Television, 1 Social computing, 5, 278–311 Spamware, 109–110 Supply chain management (SCM) Telkom Kenya, 256 case studies, 278–279, 309–311 Spear phishing, 104, 106 systems, 13, 18 TellusLabs, 387–388 customer relationship Spectrum, 51, 52, 174, 185 Support activities, 61, 62 Telstra, 19 management, 303 Speech recognition, 485 Surfing the Web, 191 Temetra, 143 definition of, 279–280 Speech-recognition software, 451 Surf-wax, 192 Tencent, 79 disaster relief and, 281–282 Speed tests, 263 Surveillance, electronic, 78–81 Ternary relationships, 160 fundamentals of in business, Spire, 255 Swarming, 183 Terrorism, 53 289–293 Splinternet, 189–190 Swarm Technologies, 255–256 cyber, 95, 111 in human resources, 304–306 Splunk Enterprise, 339 Sweeting, Nick, 93 Tesco, 338–339, 390 marketing, 299–303 Spotify, 20 Switching costs, 60 Tesla, 21, 26 overview, 279–281 Spring, 248 Symantec, 131 Texas Christian University, 77 shopping, 293–298 Sprinklr, 299–300 Syngenta, 32 Theft, equipment or information, Web 2.0, 282–289 Spyware, 109 Systems analysis, 421 101, 103 Social Credit Score (SCS), 79 SQL. See Structured query Systems analysts, 8, 419 Thin clients, 183, 436–437 Social customer relationship language (SQL) Systems design, 421–422 ThisNext, 296 management, 351–353 Square, 21 Systems development, 10, Threats, 96 Social data, 139 SSL. See Secure socket layer (SSL) 423–428 3G, 261

bindex.indd 547 28/08/19 11:58 AM 548 INDEX

3M, 381, 464 UnityPoint Health, 250–251 Voluum, 233 definition of, 246 Three-dimensional printing, Universal description, discovery, VPN. See Virtual private networks Internet of Things, 269–272 366–367 and integration (UDDI), 474 (VPNs) mobile computing and, Three Square Markets, 319 Universal Product Codes (UPCs), VR. See Virtual reality (VR) 264–269 Throughput, 263 270 Vtiger, 350 networks and Internet access, Thumb drives, 444 Universal Serial Bus (USB), 444 Vulnerability, 96 257–264 Ticketmaster, 215 Universities, virtual, 201 spread of, 246 Timberland, 344 Unstructured data, 137 W technologies, 246–257 Time Warner Cable, 186, 187 Untrusted networks, 96 Walmart, 61, 132, 223 Wireless Fidelity (Wi-Fi), 258–260 Tinder, 392 Untrusted sources, 142 Amazon vs., 239–243 Wireless local area networks TLS. See Transport layer security Updating, 423 drones, 366 (WLANS), 258–260 (TLS) Upper CASE tools, 427 inventory information sharing, Wireless media, 179–180 T-Mobile, 248 UPS, 147 362 Wireless sensors, 269–270 Tokens, 115 Upselling, 346 WAN. See Wide area networks Wireless technologies, 246–257 TOMS Shoes, 302, 361 URL filtering, 81 (WAN) advantages and disadvantages Tour de France, 169–170 URLs, 190–191 WannaCry, 126–127 of, 251 Toutiao, 481 Ursa Space Systems, 255 War driving, 257 case studies, 244–245 TPS. See Transaction processing USAA, 28 Warehousing, 360–361 security, 256–257 systems (TPS) USA PATRIOT Act, 53 Warm sites, 121 short-range wireless networks, Tracking cookies, 110 USB. See Universal Serial Bus (USB) WatBlazer, 28 257–258 Trade secrets, 103 U.S. Census Bureau, 486 Waymo, 26 transmission media, 251–256 Transactional data, 133 U.S. Department of Agriculture Waze, 141 wide-area wireless networks, Transaction data, 41–42 (USDA), 474 Weak AI, 478, 479 260–263 Transaction processing systems User agents, 486 Wearable computers, 437 wireless devices, 247–251 (TPS), 16, 18, 313–314 User-driven analysis, 377 Web 2.0, 282–289 Wireless tethering, 276 Transactions, 313, 315–316 Users, informed, 4–6 blogs, 283–284 Wireline media, 179–180 Transborder data flows, 86 U.S. Geological Survey, 390 definition of, 283 WLANs. See Wireless local area Transmission Control Protocol/ U.S. News & World Report, 8 enterprise social networks, 288 networks (WLANS) Internet Protocol (TCP/IP), Utilitarian approach, 72 mashups, 289 Workflow, 196 181–182 Utility computing, 458 microblogs, 284–285 Workforce Transmission media, 251–256 Really Simple Syndication, 283 changing nature of, 49 Transportation, Internet of Things V social networking websites, globalization and, 48 in, 272 Valin Corporation, 231 285–288 telecommuting, 196 Transport layer security (TLS), Value-added tax (VAT), 235 tagging, 283 Workgroups, 196 120–121 Value chain model, 61–63 wikis, 285 World Bank, 192, 255 TransUnion, 93 Value chains, 61 Web-based call centers, 194–195 World Trade Organization, 47 Travelocity, 28 Value systems, 63 Web crawlers, 192 Worldwide Interoperability for Travel services, 28, 221, 223 Vandalism, 101 Web designers, 8 Microwave Access (WiMAX), Trend Micro Maximum Security, Vartanyan, Mark, 112 Weblogs, 283–284 263 118 Vault, 306 Webmasters, 8, 190 World Wide Web (WWW), 190–191. Trespass, 101 Vendor-managed inventory (VMI), WebMD, 27 See also Internet TripAdvisor, 190 362 Web services, 472–474 2.0, 282–289 Trojan horses, 104 VentureBeat, 224 Web services description discovery applications, 191–194 TrueTime, 144 Veriato, 121 language (WSDL), 474 portals, 193–194 Trump, Donald, 85 Verified Fan, 215 Websites, 190 Worms, 104 Trust API, 116 Verisign, 119, 120, 219 WeCanCodeIt, 52 WWW. See World Wide Web (WWW) TRUSTe, 233 Verizon, 174, 185, 247, 248 WeChat, 214, 266, 280 Trusted networks, 96 Vertical clouds, 462 Weibo, 285 TSB Bank, 19 Vertical exchanges, 230 Wells Fargo, 73–74, 116 X Tunneling, 120 XebiaLabs, 409 Vertical integration, 361 Wendy’s, 6 Xfinity, 185 Turing, Alan, 477 Viber, 281 Weve, 141 Turing test, 477 XML. See Extensible markup Videoconferences, 199–200 Whaling attacks, 104–106 language (XML) Turnaround time, 358 Videogame industry, 20 What-if analysis, 385–386 Twilio, 465 Video industry, 20 WhatsApp, 214, 280, 311 Twisted-pair wire, 180 Vigilant Solutions, 80 Whitelisting, 118 Y Twitter, 139, 215, 284–285, 302 Viral marketing, 300 Whole Foods Market, 241 Yachting, 7 2G, 261 Virtual close, 316 Wide area networks (WAN), 178 Yahoo! News, 3, 192 Virtual collaboration, 196–197 Wide-area wireless networks, Yankee Group, 118 U Virtual groups, 196–197 260–263 Year 2000 (Y2K) reprogramming Uber, 25, 213, 360, 393 Virtualization, 459, 466 Wi-Fi. See Wireless Fidelity (Wi-Fi) project, 412 UberEATS, 69 Virtual machines, 428 Wi-Fi Direct, 259 Yelp, 296 Ubiquity, 263 Virtual organizations, 212 Wikelski, Martin, 390–391 Yelp effect, 294 UC. See Unified communications Virtual private networks (VPNs), Wikipedia, 285 Ying, Jun, 93 (UC) 119–120, 364 Wikis, 285 YouTube, 139 Ultra-wideband, 258 Virtual reality (VR), 35–36, 439 WiMAX, 263 YunOS, 141 Unary relationships, 160 Virtual universities, 201 Wimbledon tournament, 28 Under Armour, 95, 323–324 Viruses, 104 Windows, 24 Unified communications (UC), 195 Visa, 266 Windward, 6–7 Z Uniform resource locators (URLs), VNSF Railway, 366 Wineries, California, 25 Zappos, 240 190–191 Voice communication, 195 Wirathu, Ashin, 172 Zara, 357–359 United Airlines, 278–279 Voice-over-Internet Protocol Wireless 911, 253 Zenefits, 209–210 United Parcel Service (UPS), 147, (VoIP), 195 Wireless access points, 258 Ziosk, 337 366, 371, 397–399 Voice portals, 268 Wireless broadband (WiMAX), 263 Zippin, 242 United States–Mexico–Canada Voice recognition, 115, 451 Wireless computing Zoosk, 391 Agreement (USMCA), 47–48 VoIP, 195 case studies, 244–245, 275–277 Zynga, 20

bindex.indd 548 28/08/19 11:58 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM FM.indd 8 8/29/19 11:31 AM