Index

Name Index Jn-Charles, Alexandra, 157, 158 Tijerina, Louis, 147 Jobs, Steve, 57, 103, 178, 288 Tubbs, Jerry, 548 Juran, Joseph, 490 A V Abdulmutallab, Umar Farouk, 242 K Vazquez, Raul, 411 Aleynikov, Sergey, 300 Kalach, Nina, 157 Anderson, John, 241 Kant, Immanuel, 130 W Kearns, Michael, 439 Weast, Jerry, 469 B Kelly, Chris, 390 Woo, Edward, 119 Benioff, Marc, 203, 204 Kennedy, Ted, 241 Berman, Craig, 411 Kilar, Jason, 118 Y Berson, Anthony M., 157 King, Stephen, 411 Yang, Jerry, 270 Bertarelli, Ignacio, 41 Bewkes, Jeff, 119 L Z Bezos, Jeff, 411 Lafley, A.G., 75 Zimmerman, Richard, 345, 346 Bratton, William, 482 Leavitt, 93 Zuckerberg, Mark, 390 Brin, Sergey, 270 Levy, Scott, 9

C M Organizations Index Casey, Jim, 22 McConnell, Mike, 330 Childs, Timothy, 9 McDonald, Robert, 75 A Columbus, Christopher, 8 McPherson, Barry, 305 A&E, 118 Merzenich, Michael, 152 ABC Inc., 118 D Mettler, Fred A., Jr., 159 Accenture, 62, 92, 181 Deming, W. Edwards, 490 Mintzberg, 88, 459 Acxiom, 121 DeWalt, David, 305 Monaghan, Tom, 52 Adobe, 180, 404 DiSisto, Rob, 205 Moore, Gordon, 170 Advanced Micro Design, 8 Mullin, Mike, 321 Aetna, 523 E Myrtle, Raymond, 470 Ellison, Larry, 41, 42 Agora Games, 321 AIC, 494 N Air France, 65 F Neeleman, David, 556 Airborne Express, 22 Fathi, David, 241 Nordstrom, David, 429 Fayol, Henri, 458 Ajax Boiler, 266 Filo, David, 270 O Alcatel-Lucent, 180, 400, 401 Alcoa, 339–340 Fine, Glenn A., 242 Obama, Barack, 469 Allot Communications, 319 Flax, Daniel, 321 Oliphant, Jack, 37 Alta Vista, 87 Fletcher, Clyde, 575 Ophir, Eyal, 152 , 12, 45, 94, 98, 102, 103, 106, 111, 135, Ford, Henry, 57 Orwell, George, 144 170, 183, 184, 204, 262, 301, 321, 374, 383, Friedman, Thomas, 8 Oxley, Michael, 306 384, 386, 388, 389, 401, 404, 410, 411 G P AMD, 176 Gates, Bill, 57 Page, Larry, 270 America Online (AOL), 118, 137, 382 Gates, Robert, 330 Peterson, Bud, 36–37 America West, 113 Gonzalez, Alberto, 301 Peterson, Val, 36–37 American Airlines, 111 Gosling, James, 188 Porter, Michael, 95, 115 American Express, 13, 100 American Library Association, 262 H R American National Insurance Co. (ANCO), 494 Hawiger, Marcel, 37 Reed, Alan, 178 AmerisourceBergen, 495 Heltsley, Laurie, 76 Ricci, Ron, 3 Android, Inc., 288 Hicks, Michael, 241 Ryan, Claude, 22 Ann Taylor, 109 Horan, Tim, 119 Apple, 7, 9, 13, 14, 57, 79, 87, 94, 97, 103–104, S 110, 111, 140, 168, 178, 185, 204, 287–289, I Sarbanes, Paul, 306 295, 388 Iqbal, Asif, 241 Schueller, Joe, 75 Applebee's, 478 Shahzad, Faisal, 242 Armani Exchange, 401 J Skaare, Jerry, 358, 359 Art Technology Group, 405 Jensen, Robert, 581 AstraTech, 181 Jeppsen, Bryan, 227 T AstraZeneca, 123 Jerome-Parks, Scott, 157, 158 Taleb, Nassim, 440 AT&T, 9, 79–80, 87, 110, 118, 180, 262, 276, 401

I 1 I 2 Index

Attensity, 227 Diebold, Inc., 495, 496 Grace Construction Project, 586 Author Solutions, 204 Digital Equipment Corp. (DEC), 87, 168, 289 Grace Davison, 586 Avis Rent A Car, 401 DirectTV, 256 Grokster, 141 Dish Network, 256 GUESS Jeans, 109 B Disney.com, 383 BAE Systems, 398 Dollar Rent-A-Car, 190–191 H Ball State University, 319 Domino's, 52–53 Hallmark Cards, 462 Bank of America, 100, 107, 400 Don's Lumber Company, 70 Hannaford Bros., 301 Banta, 207 Doylestown Hospital, 9 Harrah's Entertainment, 226 Barnes & Noble, 223 DST Systems, 547–548 Haworth Inc., 344 Barrick Gold, 423 Duane Reade, 453, 454 Heinz, 61 Bear Stearns, 123, 460 Duke Energy, 37 Henry's Hardware, 70 Bell Labs, 175 Dundas Data Visualization, 50 Hewlett-Packard (HP), 62, 87, 140, 170, 175, BestBuy, 45 DuPont, 430 178, 180, 186, 188, 468, 561–562 BigFix, 186 D.W. Morgan, 9 Highmark, 187 BJ's Wholesale Club, 306 Hilton Hotels, 98, 401 Black & Veatch, 471 E History Channel, 118 BMW Oracle Racing, 41–42 E*Trade, 12, 383, 388–389 Hitachi, 441 The Body Shop International plc, 226 Eastman Chemical Co., 90 Home Depot, 401 Boeing, 398 eBay, 11, 12, 102, 108, 109, 111, 301, 374, 383, HP Enterprise Services, 181 Border State Industries Inc. (BSE), 366–368 384, 388, 404 Hyatt, 401 BP p.l.c, 256 Electronic Data Systems (EDS), 192 Hyundai Heavy Industries (HHI), 245–246 British Airways, 557 Eli Lilly, 123 Bryant & Stratton College, 359 Eloqua, 512 I C EMC (Documentum), 423 i2, 345, 346, 441 i2Technologies, 344, 356 Cablevision, 247, 265 EMCorp., 179 IBM, 7, 60, 87, 109, 170, 171, 175, 176, 179, 180, California Pizza Kitchen, 471 Emerson Process Management, 234 183, 185, 188, 230, 267, 289, 421, 423, 463, Canadian Pacific Railway, 478 Enterprise Rent-A-Car, 266 468, 493, 523 Canadian Tire, 415, 416 Envoy Media Group, 184 IBM Global Services, 181 Cannondale, 335–336 Equifax, 232 IBM Software Group, 65 Capital One, 466 Esker, 367 ICANN (Internet Corporation for Assigned Catalina Marketing, 222–223 estMed Medical Supplies Corp., 282 Named and Numbers), 260 Caterpillar, 551 EuroChem, 65 Indian Harvest Spealtifoods, 321 CBS, 118 Expedia, 383 Infosys, 181 Center Point Energy, 37 Experian, 232 Insead, 60 CenterPoint Properties, 267 F Intel Corp., 8, 60, 87, 109, 176, 185, 188, 401, Champion Technologies, 311 Fairchild Semiconductor, 170 567 Check Point, 316 Famous Footwear, 221 Internal Revenue Service (IRS), 223 ChemConnect.com, 383 FBI, 240 Intrawest, 49 Chevron, 9 Federal Aviation Administration (FAA), 329 Intuit, 386 Choice Hotels, 227 Federal Trade Commission (FTC), 132–133 iTunes.com, 383 Christian Coalition, 262 FedEx, 6, 22, 44, 111, 277, 401, 466–467 iVillage, 108 Chrysler Corp., 90, 99, 466, 567 First Citizens Bank, 467 CIMB Group, 487, 488, 490 Flextronics, 90 J Cisco Systems, 3, 12, 22, 62, 76, 90, 180, 289, Flickr, 388 JCPenney, 14 316 Florida Power and Light, 37 JDA Software, 344 Citibank, 14, 111 Flushing Financial Corp., 266 JetBlue, 227, 556, 557 Citicorp, 568 Ford Motor Co., 57, 89, 490, 568 Johnson and Johnson, 9 City University of New York, 186 Foremost Composite Materials Co., 199 JPMorgan Chase, 107, 303, 400 Clarabridge, 227 Fortinent, 316 Juniper Networks, 180, 316 Clear Channel Radio, 63 4Food, 371, 372 CNN, 118 Fox Broadcasting, 118 K Coca-Cola Company, 339, 527–528 Fox Sports, 401 K2 Network, 323 Comcast Corp., 118, 247, 262 Frito Lay, 564 Kazaa, 141 Comdisco Disaster Recovery Services, 311 Frontera, 575–576 Kellwood Co., 347 , 118 FX, 118 Kennametal, 356 Compiere, 357, 358, 359 KFC, 568 CompuCredit, 101 G KLM, 557 Con-Way Transportation, 432, 434 Galleon Group, 123 Kmart, 356 Connectbeam, 76 Games.com, 383 Kodak, 90 Cornerstone Information Systems, 63 Gartner Group, 60, 231 Koret of California, 347 Countrywide Financial, 107 Gaylord Hotels, 227 Korn/Ferry International, 62 Cowen and Co., 321 General Electric, 12, 61, 87, 441 KT Corp., 245 Cross-Country Transport, 71 General Motors, 11, 12, 89, 181, 394, 466, 567 Crossbeam, 316 Getty Images, 383 L Layar, 429 D Global e-Sustainability Initiative and the Climate Group, 62 Lehman Brothers, 123, 460 Dartmouth College, 278 Global Hyatt Corp., 65 Leiner Health Products, 50 Dell Computer Corp., 12, 90, 99, 170, 176, 178, Google, 7, 11, 12, 37, 61, 80, 87, 94, 111, 121, Levi Strauss, 109 180, 188, 357, 386 122, 127, 137, 170, 177, 186, 188, 193, 226, Lexus, 429 Deutsche Bank, 311 262, 265, 287–289, 382, 387–388 LG, 110 Index I 3

Li & Fung, 109 Oxygen, 118 Sony, 64, 568 LifeSize, 62 Sophos, 145 Lilly Pulitzer, 401 P Southwest Airlines, 345, 557 Little Ceasar, 52 Pacific Gas & Electric, 37 SpectorSoft Corp., 266 Lockheed Martin, 9, 398 Papa John's, 52, 53, 429 Speed, 118 LoopFuse, 512 PayPal, 97, 98, 301 Sprint Nextel, 110, 401, 443 Louise's Trattoria, 222 PBS, 118 Starbucks, 386, 453 Lufthansa, 494 Pearson Prentice Hall, 579 SugarCRM, 358 PeopleSoft, 177, 191, 351 Sun Microsystems, 175, 176, 180, 188, 468 M Pepsico, 60, 61, 401 Sundance, 118 Macromedia, 180 Pfizer, 123 SunGard Availability Services, 311 Macy's, Inc., 113 PharMark, 471 Sybase, 179 Mandarin Oriental, 13–14 Ping, 98 Sylvester's Bike Shop, 235 Manugistics, 344 Pizza Hut, 52, 53 Symantec, 316 MapInfo, 467 Polycom, 62 Synaptics, 178 MasterCard, 311 Potomac Hospital (Virginia), 266 Matsushita, 441 The Presidents' Inn, 113 T Maxtor, 179 Priceline.com, 383, 384 T-Mobile, 110, 276 McAfee, 185, 304–305, 316 Prime Service, 361 T-Systems International GmbH, 192 McDonald's, 549–550, 568 Procter & Gamble (P&G), 75, 108, 109, 342, Taco Bell, 471 McKinsey and Company, 56 401, 441–442 Tacoda, 121 Mercedes-Benz , 361 Progressive Insurance, 473 TAL Apparel Ltd., 14 Merrill Lynch, 431 Pulse Evolution, 52 Tasty Baking Company, 339 Metcalfe, Robert, 173 Purisma, 207 Taxware Systems, Inc., 366 MetLife, 62 TBS, 118 Microsoft, 7, 9, 57, 64, 76, 87, 109, 121, 122, Q TCHO Chocolate, 9–10 140, 169, 170, 177, 178, 179, 180, 186, 188, Quantas Airways, 198 TD Bank, 142 203, 213, 217, 218, 219, 284, 287–289, 303, Quattro Wireless, 288 1020 Placecast, 400 321, 322, 339, 389, 404, 463, 472 Terremark Worldwide Inc., 31 R Microsoft Dynamics CRM, 351 Texas Instruments, 87 Raytheon, 398 Minerals Management Service, 123 Thomas Register, 229 Real Media, 180 Mitsubishi, 441 3M, 559–560 RedEnvelope.com, 383 Mitsubishi Heavy Industries, 436 Tibco, 493 Reebok, 109 Montgomery County (MD) Public School TicketDirect, 217 RehabCare, 204 System, 469–470 Time Warner, 118 Research in Motion, 295 Moore Wallace, 207 Time Warner Cable, 265 Ricoh, 441 Morpheus, 141 TJX Cos., 301 RightNow, 203, 358 Motorola, 110, 178, 273, 550–551 TNT, 118, 119 RIM, 110 MoveOn.org, 262 TOPCALL International GmbH, 366 Rip Curl, 62 Mozilla, 188, 303 Toshiba, 65 Rolls-Royce plc, 398 Mrs. Fields Cookies, 568 Tower Records, 87 Royal Dutch Shell PLC, 192 MSN, 118, 121 Toyota, 94 R.R. Donnelly, 207–208 MSNBC, 401 Transportation Security Administration (TSA), MyPoints, 389 S 241 Salesboom.com, 203 TransUnion, 232 N Salesforce.com, 87, 170, 181, 183, 193, 203–205, Trend Micro, 316 Napster, 141 321, 351, 357, 512 Troy Lee Designs, 427–428 National Counterterrorism Center (NCTC), 240 San Francisco Public Utilities Commission TV.com, 118 NBC Universal, 118, 119 (SFPUC), 445 Nestle USA, 203 U Sanyo, 441 New York Yankees, 3–4, 5, 16, 25 UBS Financial Services, 431 SAP AG, 60, 87, 170, 177, 191, 203, 339, 351, NewsCorp., 118, 137 United Airlines, 494 355, 357, 359, 366, 366–368, 463 Nike, 98, 340–342 United Parcel Service (UPS), 6, 14, 20, 21, SAS Analytics, 462 Nikko Securities, 441 22–24, 44, 582 SAS Inc., 453 Nikon, 358 Universal Digital Entertainment, 118 SAS Institute, 463, 466 Nissan, 401 University of Pittsburgh Medical Center Schemmer Associates, 266 Nokia, 295, 580 (UPMC), 198 Schneider Logistics Services, 347 Nortel, 180 UPS Supply Chain Solutions, 347 Schneider National, 490 Novell Netware, 169 US Airways, 113 ScrollMotion, Inc., 103 U.S. Federal Highway Administration, 421 Seagate, 179 O U.S. Pharma Corp., 443 Sealand Transportation, 564 O-So-Pure (OSP), 358 USA Network, 118 Sears, 12, 97 Office Depot, 361 USAData, 150 Sears Roebuck, 516 O'Hare Airport, 178–179 Utility Reform Network, 37 Servalite, 24 1E NightWatchman, 186 7–Eleven, 301 1-800-Flowers, 401, 453 V Siebel Systems, 351 Onion News Network, 118 Valero Energy, 361, 476 Siemens, 123 Open Text Corp., 423 Varian Medical Systems, 157, 158 Six Flags, 55 Oracle Corp., 87, 170, 177, 179, 180, 188, 191, Verdiem, 186 Skype Technologies, 62, 265 203, 339, 351, 355, 356, 357, 359, 423, 463, Verizon Corp., 14, 79–80, 87, 110, 180, 256 Snapple, 121 468, 493 Veterans Affairs (VA), 523 Snyders of Hanover, 31 Oracle PeopleSoft, 339 Viacom, 118, 119 I 4 Index

Virgin Entertainment Group, 265 aggregator software, 273 B Virgin Mobile, 277 agile development, 514–515 B2B e-commerce. See business-to-business Vistex Inc., 367 AI. See artificial intelligence (B2B) e-commerce VW Group Supply, 397 airline industry, terrorist watch-list database, B2C e-commerce. See business-to-consumer 240–241 (B2C) e-commerce W Ajax (software), 189 backward chaining, 432 Wachovia, 61 ALM. See application lifecycle management balanced scorecard method, 474 Waddell & Reed Financial, 439 Altair computer, 168 bandwidth, 257, 262 Wal-Mart, 12, 13, 14, 94, 96–97, 100, 109, 280, Alto computer, 168 banking services, m-commerce, 400 301, 348, 382, 410–411 Amazon Relational Database, 217 banner ads, 122 Walgreens, 453 Amazon Web Services, 217 Basecamp (software), 66 Wedbush Morgan Securities, 119 Amazon.com, 44, 98, 102, 121, 193, 321, 374, Bay Area Rapid Transit (BART), 163–164, 182 Wells Fargo, 273 388, 389, 410, 411 Beacon Program (), 390 Wendy's International, 227–228 ambient data, 307 behavioral models of management, 458 Western Digital, 179 America Online (AOL), 118, 137, 141–142 behavioral targeting, 121, 133, 136, 392–393 WestJet, 556–558 American Recovery and Reinvestment Act, 522 benchmarking, 105 Whirlpool Corp., 344, 426 America's Cup, 41–42 best practices, 105 Wi-Fi Alliance, 316 analog signals, 252 BI. See business intelligence Wipro Technologies, 181 analytical customer relationship management Bing (Microsoft), 270, 271, 284, 289, 382, 383 World Bank, 421 (CRM), 354–355, 364 biometric authentication, 313–314, 326 WR Grace, 586–587 Analyze for Voice of the Customer (VoC) bit, 209 WSJ.com, 383 (Attensity), 227 Black Swans (Taleb), 440 Ancestry.com, 388 BlackBerry, 5, 6, 9, 181, 193, 288, 295, 374, 399, X Android, 80, 177, 193, 194, 294, 295 400, 464 Xcel Energy Inc., 36–37 anti-virus software, problems with, 304–305 blade servers, 163, 176, 177, 186 Xerox, 168 antispyware software, 316 Blinkx.com, 271 antivirus software, 316, 326 Blogger.com, 153, 273 Y Apache HTTP Server (software), 269 blogging, 273 Yahoo!, 111, 121, 122, 134, 137, 193, 270, 382, Apache HTTP Web server, 188 blogosphere, 273 387, 401 Apache Open for Business (OFBiz), 357 blogroll, 272 Yahoo Merchant Solutions, 404 App Store, 103 blogs, 7, 272 Yankee Stadium, 3–4, 16 AppExchange (software), 204 affiliate marketing and, 389, 393 Apple I and II computers, 168 as collaborative tool, 75 Z applets, 188 malware and, 297 Zimbra, 512–513 application controls, 308 Bluefly, 405 Zip Realty, 429–430 Application Express (Oracle), 41 BlueNile.com, 382 application generator, 509 Bluetie (software), 66 application layer, 251 Bluetooth, 276–277, 285, 295 Subject Index application lifecycle management (ALM), book sales, 102 547–548 botnets, 299, 300 A application proxy filtering, 315 Boulder (Colorado), 36 A4 processor, 185 application server, 169 BPM. See business process management acceptable use policy (AUP), 310 application server software, 169, 229 bricks-and-clicks, 382 acceptance testing, 499 application software, 166 broadband connections, 247, 284, 374 access control, 310 application software packages, 166, 509, Brown Bag Software vs. Symantec Corp., 140 Access (Microsoft), 213, 218, 219 510–511, 519 browsers. See Web browsers accountability, 126, 129, 141–142 apps, 193–194 bugs (in software), 135, 143, 303, 326 accounting, business processes, 43, 44 aQuantive, 134 build-to-order, 347 Acrobat (Adobe), 180 AR. See augmented reality build-to-stock, 347 Acrobat Connect (Adobe), 62 ARM (processor), 185 bullwhip effect, 342–343 active RFID tags, 280 artificial intelligence (AI), 431, 445 bureaucracies Ad-Aware (software), 316 hybrid AI systems, 441 flattening of hierarchies, 91–92 Adaptive Server Enterprise (Sybase), 179 Ask.com, 382 organizational structure, 88 adhocracy, 88 associations (data analysis), 225 bus topology, 254, 255 administrative controls, 308 ATMs. See automatic teller machines business administrative overhead, 396 attributes, 210 business functions, 18–19 Adobe Acrobat, 180 auditing, 312 business processes, 19, 43–45 Adobe Acrobat Connect, 62 augmented reality (AR), 428–430, 445 collaboration and teamwork, 55–58, 72 Adobe Dreamweaver, 404 AUP. See acceptable use policy competitive forces, 94–96, 102, 115 Adobe InDesign, 404 authentication, 252–253, 312–313, 326 disruptive technologies, 103–104 advertising authorization policies, 310 information systems department, 68–69, banner display ads, 122 Authors.com, 204 73 mobile advertising, 400–401 automated high-speed decision making, 461 information value chain, 24–25 online advertising, 122, 375 automatic teller machines (ATMs), 14–15, 111, innovation, 57, 75, 76 wireless advertising, 400–401 142, 178 internationalization, 564, 584 advertising exchanges, 395 automation, 489, 490, 519 levels in a firm, 56 advertising networks, 392–395, 395 autonomic computing, 185 management hierarchy, 56 advertising revenue model, 387–388 avatars, 60 value chain, 102, 116 affiliate fee revenue model, 389, 393 Average Data Efficiency, 186 value web, 106, 107, 116 agency theory, 90, 91 Azure (Microsoft), 177, 217, 322 See also business analytics; business agent-based modeling, 441–442 information systems; business Index I 5

intelligence; business models; business cooptation, 574 certificate authority (CA), 318 processes; e-commerce; global business critical success factors (CSFs), 532, 534 CERTPOINT, 426 business analytics, 453, 461 linking systems projects to business plan, CGI script, 229 capabilities, 464–465 532 ChainLinq Mobile application, 9 constituencies for, 465–466 scoring models, 535–536 change defined, 462 See also project management; systems change management, 540–542 delivery platform, 464 development cooptation, 574 developments strategies, 468 business processes, 11, 19, 43–45, 72 in global businesses, 574 toolset, 453, 463, 473 automation, 489, 519 organizational resistance to, 93, 115, 493 user interface, 464 core systems, 571, 572 rapidity of, 144 business analytics software, 453, 463, 473 defined, 84, 85 social change, 144–145 Business ByDesign (SAP), 357 functional areas, 43–44 technologically motivated, 144–145 business continuity planning, 311–312 information technology to enhance, 44–45 See also organizational change business drivers, 562, 563 Internet technology and, 94 change agent, 541 business ecosystem, 109–111 paradigm shifts, 489, 490, 519 change management, 540–542 business firm, 84 rationalization, 489, 490, 519 chat, 263–264 business functions, 18–19 redesign, 489, 490, 491–493, 500, 519 CheckFree.com, 98 business information systems routines and, 84, 85 chief information officer (CIO), 68 decision-support systems (DSS), 48–49, See also business process management; chief knowledge officer (CKO), 69 475, 477, 479, 480 business process redesign chief privacy officer (CPO), 69 e-business, 55 Business Suite (SAP), 357 chief security officer (CSO), 68 e-commerce, 55 business-to-business (B2B) e-commerce, 374, child domain, 258 e-government, 55 381, 395–399, 407 Children's Online Privacy Protection Act enterprise applications, 51, 53–55 business-to-consumer (B2C) e-commerce, 381 (COPPA) of 1998!, 133 executive support systems (ESS), 50, 72, business value China, by, 329, 330 473–475, 480 co-creation of, 7 choice, in decision making, 457, 458 intranets and extranets, 54–55, 72 of information systems projects, ChoicePoint (software), 127–128 management information systems (MIS), 536–539 Christmas Day bomber, 242 17–18, 47–48, 72, 480 business value chain model, 102, 104, 116 Chrome operating system (Google), 136, 177, transaction processing systems (TPS), byte, 209–210 188, 303 45–47 churn rate, 355 business intelligence (BI) C CIO. See chief information officer about, 49–50 C2C e-commerce. See consumer-to-consumer circuit-switched networks, 250 business analytics, 453, 461 (C2C) e-commerce CIRRUS, 15 business performance management, 475 CA. See certificate authority Cisco Telepresence, 62, 76 capabilities, 464–465 Cabir (malware), 297 CKO. See chief knowledge officer constituencies for, 465–466, 471 cable Internet connections, 258, 284 class, 504, 505 data mining, 224–226, 237, 422, 431, 462 cable modems, 253 classical model of management, 458 data visualization, 467 cable television, 118 classification (data analysis), 225 decision making and, 480 CAD. See computer-aided design classified ads, 393 defined, 462 California, 37, 148 click fraud, 302 delivery platform, 464 call option, 538 client, 168 developments strategies, 468 cameras, autofocus device, 436 client operating system software, 177 environment, 463–464 campus-area networks. See CANs client/server computing, 167, 168–169, 250, geographic information systems (GIS), CANs (campus-area networks), 253 254 467–468, 482 capacity planning, 194 cloud-based software, 183, 193, 203-205 infrastructure, 463 capital budgeting, for systems development, cloud computing, 170, 200 predictive analytics, 226, 466–467 538 case study, 203–205 in public sector, 468 carbon footprint, 186 co-location agreements and, 404 vendors of, 463 careers. See jobs contractual arrangements, 194 Business Intelligence (Oracle), 359 carpal tunnel syndrome (CTS), 149 data storage in, 184 business intelligence infrastructure, 463 CASE. See computer-aided software databases, 215, 217 business models engineering defined, 183 about, 13 case-based reasoning (CBR), 434, 445 described, 6, 7, 167, 170, 375 e-commerce, 375, 382–384, 407 Categorical Imperative, 130 drawbacks, 184 information systems, 26 CBR. See case-based reasoning enterprise systems, 357, 358–359 online entertainment, 375 CDMA (Code Division Multiple Access), 276, growth of, 358 Business Objects (SAP), 359 284 hardware, 183–184 business performance, databases to improve, CDSS. See customer decision-support systems infrastructure investment and, 195 221–222, 237 CDW. See Compliance Data Warehouse for IT infrastructure, 183–184 business performance management (BPM), 475 cell phones, 5, 181, 188, 257, 401 private cloud, 183–184 business plan, linking systems projects to, 532 economic development and, 580–581 Salesforce.com, 183, 203 business process management (BPM), text messages, 60, 146, 147 security, 320, 321, 326 448, 491 usage statistics, 147 types of services, 183 business process redesign, 489, 490, 491–493, usage while driving, 147–148 cloud software as a service, 183 519 See alsoalso smartphones CLTV. See customer lifetime value case study, 495–496 cellular standards, 284 clustering (data analysis), 225 tools for, 493–494 cellular systems, 257, 276, 284 co-location agreement, 404 business process redesign, 489, 490, 491–493, centers of excellence, 574 coaxial cable, 255, 284 500, 519 centralized processing, 168 COBOL, 175 change management, 540–542 centralized systems, 568 Code Division Multiple Access. See CDMA I 6 Index codes of conduct, 131 Computer Fraud and Abuse Act of 1986!, 301 content and media industries, 102 CollabNet (software), 547–548 computer hardware. See hardware content management systems collaboration, 55–58, 72-73 computer literacy, 17 enterprise content management systems, building a collaborative culture, 58–59 computer networks, 247–248 421–422, 422–424, 445 business benefits of, 58–59, 75 See also networks and networking expertise location and management defined, 56-57 computer operations controls, 308 systems, 424 importance of, 55–57 computer software. See software knowledge network systems, 424, 445 self-managed teams, 92 Computer Software Copyright Act of 1980!, 140 content mining, 228 tools for, 59–68, 417 computer vision syndrome (CVS), 149 content providers, 383–384 collaboration tools computers continuous replenishment system, 97 described, 7, 8, 59–68, 75, 76, 445 about, 16 controls, 293 evaluating and selecting, 67–68 carpal tunnel syndrome (CTS), 149 conversion, systems development, 500 Google Apps/Google sites, 61 computer vision syndrome (CVS), 149 cookies, 121, 134–135, 155 Internet-based, 61–68 computing power, 126 cooptation, 574 knowledge management systems (KMS), as disruptive technology, 87, 103 COPPA. See Children's Online Privacy 424 equity and access, 146, 148 Protection Act (COPPA) of 1998! Lotus Notes, 59, 61, 65, 417, 577 ethical issues, 126, 155 COPs. See communities of practice Microsoft SharePoint, 7, 61, 64, 76, 424, for global business, 578 copyright, 139–140 463 health risks of, 149–150 copyrighted material, piracy of, 262 telepresence technology, 61, 62 high-availability computing, 319 core business processes, 11 time/space collaboration tool matrix, 67 history of, 166–169 core competencies, 107–108, 116 virtual meeting systems, 61-62 laptops, 276, 314 core systems, 571, 572 See also e-mail; instant messaging; social mainframes, 167, 168, 177 corporate databases, Web access to, 229, 237 networking; virtual worlds; wikis malware, 291–292, 296–297, 303, 320, 326 corporate network infrastructure, 249 collaborative culture, 58–59 microprocessors, 87, 171, 185, 200 cost, project management, 530 Collaborative Planning, Forecasting, and minicomputers, 167, 168 cost transparency, 377 Replenishment (CPFR), 344 netbooks, 6, 7, 181, 185, 188, 277 counterimplementation, 546 command and control firms, 59 power consumption, 185, 186 CPFR. See Collaborative Planning, Forecasting, Common Gateway Interface (CGI), 229 profiling by, 127 and Replenishment Commonwarrior (malware), 297 radiation from computer display screens, CPO. See chief privacy officer communication, 11 150 cracker, 298 declining costs of, 173–174, 200 repetitive stress injury (RSI), 149 Creative Commons, 153 text messaging, 60, 146, 147 subnotebooks, 7, 76, 181 Creative Commons Search, 153–154 trends in, 247 supercomputers, 182 credit bureaus, errors in data, 232–233 unified communications, 265, 267 tablet computers, 103, 181 credit card profiling, 100 See also e-mail technostress, 149–150 credit card reform, 101 communication satellites, 256, 284 touch interface, 177, 178 credit cards, data mining, 100 communications networks, 252 touchscreens, 177, 178 credit history, 232 signals, 252-253 types, 166–168 critical success factors (CSFs), 532, 534 See also networks and networking viruses and worms, 296, 326 CRM on Demand (Oracle), 359 communities of practice (COPs), 421 wireless Internet access, 277–279 CRM systems. See customer relationship community providers, 383, 384 See also computer crime; computer management (CRM) systems competition, information systems and, 79–80, networks; hardware; mobile devices; cross-functional business processes, 45 94–101 networks and networking; platforms; cross-selling, 352 competitive advantage software crowdsourcing, 57, 371, 392 as business objective, 14 computing Crystal Reports (software), 219 Internet impact on, 101 autonomic computing, 185 CSFs. See critical success factors competitive advantages strategic systems, 111 centralized computing, 168 CSO. See chief security officer competitive forces, 94–96, 104, 116 client/server computing, 167, 168–169, 250, CTS. See carpal tunnel syndrome business value chain model, 102, 104–105, 254 cultural particularism, 565 116 decentralized computing, 144, 168 culture, 20 Porter's competitive forces model, 95–96, enterprise computing, 144, 168, 169–170 collaborative culture, 58–59 102, 109, 115, 196–197 green computing (green IT), 184–185, 186–187, global culture, 563–564 strategies for dealing with, 96–99 200 organizational culture, 84–85 competitive forces model, 95–96, 102, 109, 115, grid computing, 163, 182, 200 customer buying patterns, 98 196–197 high-availability computing, 319 customer decision-support systems (CDSS), 479 competitors, 95 on-demand computing, 184 customer feedback, 6 Compiere Cloud Edition, 358 recovery-oriented computing, 319 customer intimacy, 13, 90 Compiere ERP Cloud Edition, 359 service-oriented computing, 515 customer lifetime value (CLTV), 355 complementary assets, 26–28, 33 See also cloud computing; computers; customer loyalty, 352 Compliance Data Warehouse (CDW), 223 hardware; information systems; customer loyalty management process map, component-based development, 515 information technology; platforms; 351 CompStat, 482–483 software customer preferences, 98 computer abuse, 145–146 Conficker (malware), 297 customer relationship management (CRM), computer-aided design (CAD), 427, 428, 431, conflict, 20 181, 203, 349–350 445 connectivity, international information customer relationship management (CRM) computer-aided software engineering (CASE), systems, 577–579 systems, 51, 53–54, 72, 98, 181, 350, 505–506 consolidated watch lists, 241 363–364 computer crime, 145, 300–301 Consumer Reports, 388 business value of, 355 See also cybercrime consumer-to-consumer (C2C) e-commerce, 381 employee relationship management computer forensics, 307, 326 contact point, 349 (ERM), 351 Index I 7

operational and analytical CRM, 354–355, See also database management systems decision support 364 (DBMS); databases balanced scorecard method, 474 partner relationship management (PRM), data scrubbing, 231 business analytics, 453, 461 351 data security customer decision-support systems sales force automation (SFA), 288, 351 encryption, 317–318, 326 (CDSS), 479 software for, 351–352, 512 public key encryption, 317–318 decision-support systems (DSS), 48–49, 72 customer service public key infrastructure, 326 executive support systems (ESS), 50, 72, business benefits of collaboration, 58 data security controls, 308 473–475, 480 CRM modules for, 351–352 data storage, 126, 179 group decision-support systems (GDSS), customers, 96 in cloud computing, 184 475, 477 customization data theft, 301 key performance indicators, 474 of software package, 510 data visualization, 467 management information systems (MIS), of Web pages, 376, 378 data warehouses, 222–223 17–18, 47–48, 72, 480 CVS. See computer vision syndrome data workers, 18 for operational and middle management, Cybercom, 330 database administration, 230 471–473 cybercrime, 145 Database Lite (Oracle), 213 pivot tables, 472, 473 data theft, 301 database management systems (DBMS), for senior management, 473–475, 477 global threats, 302 212–219, 229, 237 sensitivity analysis, 472 hackers, 295, 296, 298, 329 data manipulation language, 217 Web-based customer decision-support identity theft, 301–302 querying and reporting, 217–218 systems (CDSS), 479 malware, 291–292, 296, 296–297, 303, 320, database server, 229 decision-support systems (DSS), 48–49, 72, 475, 326 database servers, 254 477, 479, 480 recent prosecutions, 301 database software, 179 decisions See also computer crime databases, 209–212 semistructured decisions, 456, 471–473, cyberterrorism, 302 accessing through the Web, 226, 228, 237 479 cybervandalism, 298 business uses of, 221–230 structured decisions, 456, 479 cyberwarfare, 302, 329–331 in cloud computing, 215, 217 types, 455–457, 479 cycle time, 337 data cleansing, 231 unstructured decisions, 456, 479 cycling, 335 data quality, 230–231, 238 See also decision support; decision-support database management systems (DBMS), systems D 212–219, 229, 237 deep packet inspection (DPI), 319 DARPA (U.S. Department of Defense Advanced for decision making, 221–222, 237 "deep Web," 269 Research Projects Agency), 251 defined, 210, 212 Delicious (Web site), 425 dashboard. See digital dashboard designing, 219–221 Delivery Information Acquisition Device data entities and attributes, 210 (DIAD), 24 defined, 15, 217, 417 entity-relationship diagrams, 220, 221, 237 Dell IdeaStorm (software), 357 online analytical processing (OLAP), 224, to improve business performance, 222, demand-driven model, 347 237 237 demand-driven supply chains, 347–348 See also data resources; databases normalization, 220 demand planning, 344 data administration, 230, 238 object-oriented databases, 215 denial-of-service (DoS) attacks, 299 data analysis, ethical issues, 126–127, 127 relational database, 213–215, 237 Descartes' rule of change, 130, 155 Data Center Infrastructure Efficiency, 186 for sales trends, 31–32 design data cleansing, 231 the Web and, 226, 228–229 business process redesign, 489, 490, data communication networks, 247 See also database management systems 491–493, 500, 519 See also networks and networking DB2 (IBM), 179, 213, 218 in decision making, 457, 458 data definition, 217 DBMS. See database management systems systems design, 498–499 data dictionary, 217 DDoS attacks. See distributed denial-of-service DFD. See data flow diagram data-driven DSS, 469 (DDoS) attacks DIAD. See Delivery Information Acquisition data flow diagram (DFD), 502–503 Dealer Services (software), 466 Device data governance, 230 debugging, 143, 323 Digg (Web site), 425 Data Hub (Purisma), 207 decentralized computing, 144, 168 digital asset management systems, 424 data inconsistency, 211, 213, 237 decentralized systems, 568, 584 digital certificates, 318 data management and storage, 20, 166, 176, decision making, 453–483, 479 digital dashboard, 14, 37, 50 179–180, 207–208 as business objective, 14 digital databases, See also databases data manipulation language, 217, 237 business value of, 455, 479 digital divide, 148 data marts, 223 databases for sales trends, 31 digital fingerprinting, 118 data mining, 224–226, 237, 422, 431, 462 databases to improve, 221–222, 237 digital firm, 9 data quality, 142, 143, 230–231, 238 decentralization of, 2, 144 digital goods, 380, 381, 407 data quality audit, 231 flattening of hierarchies, 91 digital information, growth of, 6, 179–180 data redundancy, 211, 213, 237 fuzzy logic for, 436 digital markets, 378, 379, 407 data resources high velocity automated decision making, digital media business intelligence (BI), 49, 224 461 effects on thinking and information data marts, 223 information quality and, 460 retention, 151 data quality, 230–231, 238 management filters, 460 intellectual property rights, 141, 155 data warehouses, 222–223 managerial roles in, 458–459, 479 digital media players, 185 information policy, 230, 238 mobile digital platform and, 8 Digital Millennium Copyright Act (DMCA) of managing, 230–231 organizational inertia and politics, 460–461 1998!, 141 online analytical processing (OLAP), 224, process of, 457–458, 479 digital networks, 247, 250 237 types of decisions, 455–457, 479 See also networks and networking predictive analysis, 226 See also decision support; decisions digital records, retention of, 6, 15 digital signal, 252–253 I 8 Index digital subscriber line. See DSL types, 381 end users, 69, 541 direct cutover, business process redesign, 500 unique nature of, 374–378, 407 enterprise applications, 51, 53–55, 72, 355–356 direct goods, 398 universal standards, 376, 377, 378 enterprise computing, 144, 168, 169–170 direct marketing, 352 See also business-to-business e-commerce; enterprise content management systems, Directive on Data Protection (European business-to-consumer e-commerce; 421–422, 422–424, 445 Commission), 134 consumer-to-consumer e-commerce; m- Enterprise Linux (Oracle), 163 disaster recovery planning, 310–312 commerce Enterprise Miner (SAS), 466 disintermediation, 379, 380 e-commerce Web site enterprise networking, 180 display ads, 393 budgeting for, 405 Enterprise Process Center (EPC), 448–449 disruptive technologies, 87–88, 103–104 building, 401–405, 408 enterprise project management system, 528 distributed decision making, 8 planning, 401–402 enterprise resource planning (ERP) systems, distributed denial-of-service (DDoS) attacks, systems analysis for, 403 51, 53, 337 299, 329 e-government, 55 enterprise software, 177, 191, 338–339 divisionalized bureaucracy, 88 e-mail enterprise solutions, 356 DMCA. See Digital Millennium Copyright Act about, 5, 261, 263 enterprise suites, 356 (DMCA) of 1998! as collaboration tool, 60, 75 enterprise systems, 191, 337–339, 364 DNS (domain name system), 258–259, 284 employer surveillance of, 134, 264, about, 355 Do Not Track list, 121, 133 266–267 business value of, 339–340 Dollar General Corp., 31 marketing, 393 case study, 366–368 domain extensions, 258 security threats to, 294 challenges of, 355–356, 364 domain name system. See DNS spam, 145–146 cloud-based versions, 357, 358–359 domain network model, 254 e-OSCAR, 233 future trends, 356–357 domestic exporter strategy, 567, 584 e-readers See e-book readers service platforms and, 360–361, 364 Doostang, 384 e-SPS (software), 347 enterprise-wide knowledge management DoS attacks. See denial-of-service (DoS) attacks e-tailers, 382, 383 systems, 421, 422, 445 "dot-com" bubble, 374 E-ZPass system, 280 entertainment, 401 Doubleclick (software), 127, 134, 135, 136, 395 EC2. See Elastic Compute Cloud new business models for, 375 Downadup (malware), 297 economic development, cell phones and, entities, 210 downtime, 319 580–581 entity-relationship diagrams, 220, 221, 237 Downup (malware), 297 economics, 108 entrepreneurial structure, 88 DPI. See deep packet inspection Metcalfe's law, 173, 200 environmental scanning, 86 Dreamweaver (Adobe), 404 network economics, 173 environments, of organizations, 86–88 Droid, 178, 288, 374, 401 EDI. See electronic data interchange EPC. See Enterprise Process Center Drugstore.com, 382 efficient customer response system, 97 Epinions, 389 DSL (digital subscriber line), 257, 258, 284, 294 eHarmony, 388 EPM Solution (Microsoft Office EPM Solution), DSL modems, 253 Elastic Compute Cloud (EC2) (Amazon), 183, 527 DSS. See decision-support systems 204, 358 Epocrates Essentials, 9 due process, 129 electrical grid, cyberwarfare against, 329–330 ergonomics, 546 duplicated systems, 568 electricity infrastructure, 36–38 ERM. See employee relationship management dynamic pricing, 379 electronic business. See e-business ERP Cloud Edition (Compiere), 359 Dynamics suite (Microsoft), 357 electronic commerce. See e-commerce ERP systems. See enterprise resource planning electronic data interchange (EDI), 396, 582 (ERP) systems E electronic evidence, 307, 326 ESS. See executive support systems e-book readers, 103, 181, 375, 382, 411 electronic government. See e-government Ethernet, 173, 174, 175, 254 e-books, 103, 399 electronic health records, 9 ethical analysis, 129–130, 155 e-business, 55 electronic payment system, 97, 393 ethical and social issues, 121–159, 155 e-Business Suite (Oracle), 357 electronic records management (EMR), 9, examples of failed ethical judgment by e-business suites, 356 306–307, 522–524 manager, 123 e-commerce, 55, 373–412 electronic surveillance nonobvious relationship awareness building a Web site for, 401–405, 408 of employee Internet activity, 134, 264, (NORA), 128 business models, 375, 382–384, 407 266–267 privacy of personal information, 122 defined, 55 See also privacy profiling, 100, 127 digital goods, 380, 381, 407 electronic trading systems, 439–440 real-world dilemmas, 131 disintermediation, 379, 380 Elemica, 398 technology trends raising issues, 126–128 DoS attacks, 299 employee relationship management (ERM), Web tracking, 127, 134, 137, 155, 390, 393 dynamic pricing, 379 351 See also accountability; information rights; electronic payments systems for, 393 employees moral issues; property rights; quality of features, 374–378 electronic surveillance of employee life global reach, 376, 377 Internet activity, 134, 264, 266–267 ethical principles, 130, 155 growth of, 6, 373, 375, 395 employee records, 15 ethics history, 373 employee relationship management basic concepts, 129 information asymmetry reduction in, (ERM), 351 defined, 124, 129 378–379, 380 internal cybercrime threats, 302–303 electronic surveillance of employee information richness, 376, 377 employers, electronic surveillance of employee Internet activity, 134, 264, 266–267 marketing, 390, 392–395, 407 Internet activity by, 134, 264, 266–267 ethical analysis, 129–130 privacy and, 136 employment. See jobs ethical principles, 130, 408 revenue growth in, 373–374 EMR. See electronic records management professional codes of conduct, 131 revenue models, 387–389, 407 encryption, 317–318, 326 See also ethical and social issues social networking and, 375, 376, 378, 379, encryption key, 317 Europe, spamming in, 146 389 end-user development, 508–510, 519 European Commission Directive on Data social technology, 376, 378 end-user interface, 507, 530 Protection, 134 Index I 9

European Union Data Protection Directive, 565 forward chaining, 432 Google Groups, 61 EveryBlock Chicago (Web site), 193 4 G networks, 276, 284 Google Insights, 226 evil twins, 301 Foursquare, 372, 400 Google Maps, 97, 189, 193 Excel PivotTable (Microsoft), 472 fourth-generation languages, 508–510 Google Product Search, 272 Exchange ActiveSync (Microsoft), 9 franchising, 567–568, 584 Google Search, 136 exchanges, 395, 397, 398–399 free/fremium revenue model, 386, 388 Google Sites, 7, 61, 417 executive support systems (ESS), 50, 72, Frontal A (malware), 297 Google Talk, 61, 184, 204, 264 473–475, 480 FTP (File Transfer Protocol), 261 Google Toolbar, 136 Exostar, 398 Fusion (Oracle), 357 Google Trends, 226 expert systems, 422, 432–434, 441, 445 fuzzy logic, 422, 434–436, 441, 445 Google Video, 61 expertise location and management systems, Google Wave, 63 424 G Gotopaper.com, 398 explicit knowledge, 417 games, 401 governance exports, globalization and, 8 Gantt chart, 543, 544 of data, 230 Expression Web (Microsoft), 180 Gap.com, 388 of information systems, 69, 194–195 extended star networks, 254 GDDS. See decision support, group decision- of Internet, 260, 284 extensible markup language. See XML support systems of transnational firms, 568 external integration tools, 545 Genealogy.com, 388 Government Multipurpose Smart Card extranets, about, 21, 55, 72 general controls, 308 (Malaysia), 487 genetic algorithms, 422, 438, 440–441, 445 Gowalla, 400 F geo-tagging, 400 GPS (global positioning systems), 400 Facebook, 6, 7, 60, 102, 118, 136, 146, 179, 204, GeoCities, 121 Gramm-Leach-Bliley Act of 1999!, 133, 306 262, 274, 291–292, 297, 371, 372, 373, 384, geographic information systems (GIS), graphics language, 509 389, 390–391, 400 467–468, 482 green computing (green IT), 184–185, 186–187, facial recognition technology, 314 geosynchronous satellites, 256 200 Fair Information Practices (FIP), 132 Gigabit Ethernet, 254 grid computing, 163, 182, 200 family, changed by technology, 144 GIS. See geographic information systems group decision-support systems (GDSS), 475, Fancast.com, 118 global business 477 Fast Ethernet, 254 business challenges, 565–566, 584 groupware, 65 fault-tolerant computer systems, 318 business drivers, 562, 564 GSM. See Global System for Mobile feasibility study, 497 computing platforms, 577 Communication Federal Information Security Management Act, connectivity, 577–579 330 domestic exporter, 567, 584 H feedback, 17 franchising, 567–568, 584 hackers, 295, 296, 298, 330 fiber-optic cable, 255–256, 284 global supply chains, 346–347 handheld mobile devices. See mobile devices fields, 210 global value chains, 576–577 hard disks, 179 file processing implementation, 573–574, 576, 584 hardware, 20, 165, 181–187, 308 traditional, 210–212, 237 internationalization, 564, 584 capacity planning, 193 See also databases managing, 570–576 cloud computing, 183–184 file servers, 254 multinational strategy, 567, 584 computer hardware platforms, 175–177, file sharing services, 141 organizing, 567–570 181 File Transfer Protocol. See FTP particularism, 565 green computing (green IT), 184–185, finance and accounting, business processes, 43, software localization, 579, 581–582 186–187, 200 44 state of the art, 566 grid computing, 163, 182, 200 financial analysis, information systems systems integration, 577 mobile digital platforms, 6, 7, 8, 10, 110, projects, 538–539 transborder data flow, 565 170, 181, 279 financial models, limitations of, 539 See also international information systems for networking and telecommunications, financial performance, business benefits of global business strategies, 567–568 180 collaboration, 58 global culture, 563–564 power-saving processors, 185, 200 financial services global markets, 564 scalability, 193 legislation regulating, 133 global positioning systems. See GPS servers, 163, 168, 180 m-commerce, 400 global reach, 376, 377 touchscreens, 177, 178 Financial Services Modernization Act of 1999!. Global System for Mobile Communication virtualization, 182, 184, 186, 200 See Gramm-Leach-Bliley Act of 1999! (GSM), 276, 284 See also computers financial systems, electronic trading systems, global systems, managing, 559–587 HauteLook, 453 439–440 global value chain, 576–577 Health Insurance Portability and fingerprint databases, 240, 314 global village, 563 Accountability Act of 1996!. See HIPAA fingerprint recognition technology, 314 globalization, 8, 11, 144 health records, HIPAA, 133, 306 FiOS Internet service, 118, 256 Gmail, 61, 136, 184, 204 hertz (unit), 257 FIP. See Fair Information Practices Golden Rule, 130 HFTs. See high-frequency traders Firefox (Mozilla), 188, 303 Google, 6, 7, 11, 37, 61, 76, 87, 102, 121, high-availability computing, 319 firewalls, 185, 314–315, 326 135–136, 137, 151, 153, 184, 204, 269, 270, high-frequency traders (HFTs), 439 Flash (Macromedia), 180 271, 287–289, 374, 382, 383, 401, 461 high velocity automated decision making, 461 Flash cookies, 121 Google Analytics, 136 HIPAA (Health Insurance Portability and "flash crash," 439, 461 Google Apps, 7, 61, 183, 184, 193, 204, 383 Accountability Act of 1996), 133, 306 Flickr, 121, 153, 272, 388 Google Buzz, 136 home delivery, 52 folksonomies, 425 Google Calendar, 61, 184, 204 HomeScan application, 429–430 Force.com, 183, 204 Google Checkout, 136 host country systems units, 569 foreign trade, globalization and, 8 Google Chrome, 136, 177, 188, 303 host name, 258 formal control tools, 543 Google Docs, 61, 184, 204 hotjobs.com, 32 formal planning tools, 543 Google Gmail, 61, 184 hotspots, 278 I 10 Index

HP Project and Portfolio Management Center business perspective, 24–26 denial-of-service (DoS) attacks, 299 software (HP PPM), 550 business value of, 536–539 disaster recovery planning, 310–312 HTC, 288 competition and, 79–80, 94–101 distributed denial-of-service (DDoS) HTC Desire, 178 complementary assets, 26–28, 33 attacks, 299, 329 HTML (Hypertext Markup Language), 189, 268 contemporary approaches to, 28–30 electronic evidence, 307 HTTP (Hypertext Transfer Protocol), 251, 269 decision making, 453–483 electronic records management, 9, hubs, 248 defined, 15 306–307, 522–524 .com, 118, 119, 388 economic impacts, 89–91 encryption, 317–318, 326 HuluPlus, 119 ethical and social issues, 121–159, 155 firewalls, 185, 314–315, 326 human resources, business processes, 43 ethical dilemmas created by, 131 global threats, 302 hybrid AI systems, 441 financial analysis, 538–539 hackers, 295, 296, 298, 330 HyperPlant (software), 430 functions of, 17 identity management and authentication, hypertext, 268–269 global strategy, 571–573 312–314 Hypertext Markup Language. See HTML globalization and, 8, 11 identity theft, 301–302 Hypertext Transfer Protocol. See HTTP IT governance, 69, 194–195 information systems controls, 308 knowledge management, 69, 415–448, internal threats from employees, 302–303 I 416–418 intrusion detection systems, 316, 326 i2 Demand Planner (software), 345 linking systems projects to business plan, legislation, 301–302 i2 Service Budget Optimizer (software), 345 532 MIS audit, 312, 326 i2 Service Parts Planner (software), 345 literacy, 17 outsourcing, 8, 11, 192, 201, 319 IAB (Internet Architecture Board), 259, 284 management structure for IS projects, public key encryption, 317–318 iAd (Quattro), 288 531–532, 553 public key infrastructure, 326 IBM 1401!, 168 managing global systems, 559–587 risk assessment, 309, 326, 539–540, 553 IBM 7090!, 168 moral issues, 125–126, 131–150 security policy, 310, 326 IBM Cloud, 183 offshoring, 8, 192, 511, 513, 514 smart card, 313, 326 IBM DB2, 179, 213, 218 organizational impact, 91–92 technologies and tools for protecting IBM Lotus Connections, 7, 65 organizations and, 12, 18, 81–89, 115 information resources, 312–320, 326 IBM Lotus Notes, 59, 61, 65, 417, 577 organizing information systems threats and vulnerability, 293–303, 323 IBM Lotus Sametime, 65 department, 69 tokens, 313, 326 IBM Smart Business Application Development planning, 95 unified threat management (UTM) & Test, 183 portfolio analysis, 534–535 systems, 316 ICANN (Internet Corporation for Assigned professional codes of conduct, 131 for wireless networks, 295–296, 316–317 Names and Numbers), 260 project management, 527–556 See also cybercrime; Internet security identity management systems, 310, 312–314 real options pricing models (ROPMs), threats identity theft, 301–302 538–539 information technology (IT) IEM. See Iowa Electronic Markets security of, 68–69, 291–326 aligning with business objectives, 111–112, Ike4e.B (malware), 297 sociotechnical systems, 29–30, 33 530–531, 553 ILOVEYOU (malware), 297 supply chain management, 51, 53, 72, autonomic computing, 185 IM. See instant messaging 340–344, 356, 363 behavioral impact, 93 iMac, 287 systems analysis, 68, 496–499 capital investment, 5, 553 implementation systems design, 498–499 defined, 15, 20 in decision making, 457, 458 systems development, 494, 496–506, 519 economic impacts, 89–91 in global business systems, 573–574, 576, technical approach, 28, 29 organizational change and, 489–490 584 technology and, 20–21, 23–24 organizational impact, 91–92 in project management, 540–541, 553 trends in, 6–8 organizations and, 81 implementation controls, 308 See also ethical and social issues; standards, 174–175 imports, globalization and, 8 information systems controls; information information technology (IT) infrastructure, 21, InDesign (Adobe), 404 systems security; information technology 22, 164, 165 indirect goods, 398 (IT); information technology (IT) capacity planning, 194 individual CSFs, 534 infrastructure; moral issues; systems cloud computing, 6, 7, 167, 170 inference engine, 432, 433 design; systems development competitive forces model, 95–96, 102, 109, Infor Global Solutions (Oracle), 339 information systems controls, 308 115, 196–197 information See also information systems security components, 165–167, 175–181, 200 defined, 13, 16, 33, 417 information systems department, 68–69, 73, computer hardware platforms, 175–177, quality dimensions of, 460 488, 489–524 181 See also information systems; information information systems literacy, 18 consulting and system integration technology information systems managers, 68 services, 181 information asymmetry, 378–379, 380 information systems plan, 532, 533 data management and storage, 20, 166, information density, 376, 377–378 information systems projects. See business 176, 179–180 information policy, 230, 238 process redesign; project management; declining communication costs and, information retention, trends in, 6–8, 15 systems design 173–174, 200 information richness, 376, 377 information systems security, 68–69, 291–326 defining, 165–166 information rights, 125 access control, 310 enterprise software applications, 176, 177, See also privacy; property rights antivirus and antispyware software, 316, 338–339 information systems (IS) 326 evolution of, 166–170, 200 about, 5–6, 16, 33 biometric authentication, 313–314, 326 global systems, 556–587 behavioral approach, 28, 29 business continuity planning, 311–312 hardware platforms, 181–187 behavioral impact, 93 business value of, 305–306, 326 Internet platforms, 176, 180 business models, 26 cloud computing, 320, 321 investment in, 5, 195–197, 201, 553 business objectives achieved through, computer forensics, 307 law of mass digital storage, 171–172, 200 12–18, 111–112, 530–531, 553 data security, 317–318, 326 legacy systems, 167, 181, 182, 191 Index I 11

management issues, 194–197 particularism, 565 about, 323 Metcalfe's law, 173, 200 software localization, 579, 581–582 botnets, 299, 300 mobile platforms, 6, 7, 9, 170 state of the art, 566 bugs, 121, 135, 137, 303, 326 Moore's law, 170–171, 200 systems integration, 577 click fraud, 302 networking/telecommunications transborder data flow, 565 computer crime, 300–301 platforms, 176, 180 international information systems architecture, cookies, 134–135, 155 operating system platforms, 176, 177 562 cyberterrorism and cyberwarfare, 302, rent vs. buy decision, 195 internationalization, 564, 584 329–331 scalability, 194 See also global business; international denial-of-service (DoS) attacks, 299 "service platform" perspective, 166 information systems distributed denial-of-service (DDoS) total cost of ownership (TCO), 195–196, Internet, 21, 257–275, 284 attacks, 299, 329 201, 538 about, 257, 260 evil twins, 301 Web services, 189–190, 200–201 challenges to privacy, 134–137, 155 global threats, 302 See also hardware; information cognitive effects of, 151 hackers, 295, 296, 298, 330 technology; software connection speed, 248 identity theft, 301–302 information value chain, 24–25 connectivity for global business, 577–579 malware, 291–292, 296–297, 303, 320, 326 informational role, of managers in decision customization, 376, 378 pharming, 301 making, 459, 479 databases and, 226, 228 phishing, 301 informed consent, 134 described, 21 sniffing, 299, 313, 326 infrastructure. See information technology (IT) domain name system (DNS), 258–259, 284 spoofing, 299 infrastructure future of, 260–261 spyware, 135, 298 inheritance, 504, 505 global reach, 376, 377 SQL injection attacks, 298, 301 innovation, 57, 75, 76 global supply chain and, 346–347 Trojan horses, 291, 296, 298 InnovationNet (software), 76 governance of, 260, 284 viruses and worms, 296–297, 326 input, 16 growth of, 260, 262 See also cybercrime; information systems input controls, 308 information density, 376, 377–378 controls; information systems security instant messaging, 264, 294 information richness, 376, 377 Internet service providers (ISPs), 110, 141, 206, instant messaging (IM), as collaboration tool, intellectual property rights and, 140–141 257 60 interactivity, 376, 377 Internet services, 261, 263–264, 284 intangible benefits, 537 for marketing, 392–393 See also chat; e-mail; FTP; instant intellectual property, 138–139, 383 metered pricing of, 262 messaging; Internet; Internet access; intellectual property rights, 138–141, 155 music industry and, 118 Internet security threats; TelNet; unified intelligence, in decision making, 457, 458 network neutrality, 262–263 communications; Web intelligent agent shopping bots, 271–272 organizations and, 93–94 Internet2, 261 intelligent agents, 422, 441–442, 445 personalization, 376, 378, 390, 392, 393, interorganizational information systems, 53 intelligent techniques, 422, 431–442, 445 394, 395 interpersonal roles, of managers in decision agent-based modeling, 441–442 privacy and, 131–138 making, 459, 479 artificial intelligence, 431, 441, 445 social change caused by Internet use, 144 intranets case-based reasoning, 434, 445 social technology, 378 about, 21, 54–55, 72 data mining, 224–226, 237, 422, 431 television and, 118–119 for knowledge management, 415, 416 expert systems, 422, 432–434, 441, 445 threats and vulnerabilities, 294–295, 323 intrusion detection systems, 316, 326 fuzzy logic, 422, 434–436, 441, 445 ubiquity of, 374–376 inventory management, 345 genetic algorithms, 422, 438, 440–441, 445 unique nature of, 374–378, 407 inventory optimization systems, 345 hybrid AI systems, 441 universal standards, 376, 377, 378 inventory replenishment system, 96–97 intelligent agents, 422, 441–442, 445 usage, 5–6 investment workstations, 431 knowledge discovery, 431 VoIP, 264–265, 284, 294 Iowa Electronic Markets (IEM), 392 machine learning, 439, 440–441 VPNs, 267–268, 284, 316, 577 IP address (Internet protocol address), 258, neural networks, 422, 436–438, 441, 445 Web tracking, 127, 134, 137, 390, 392, 393, 260, 294 neurofuzzy system, 441 394 IP datagrams, 251 "interaction" jobs, 56 wireless access, 277–279 IP phone systems, 265 interactivity, 376, 377, 379 See also Internet security threats iPad, 6, 7, 10, 98, 102, 103, 118, 177, 181, 185, internal database, Web access to, 229, 237 Internet access 194, 277, 288, 371, 383 internal integration tools, 543 equity and access, 146–148 iPhone, 3, 5, 6, 7, 9, 10, 13, 79, 80, 98, 103, 110, internal supply chain, 341 for global business, 577–579 118, 177, 178, 181, 185, 193, 194, 262, 276, international information systems, 556–587 statistics, 174 277, 287, 288, 289, 297, 374, 383, 399, 400, business challenges, 565–566, 584 wireless access, 277–279 401, 464 business drivers, 562, 563 Internet advertising, 6 iPod, 13, 94, 95, 97, 98, 287, 383 case study, 559–560 Internet architecture, 259 iPod Touch, 177, 288 computing platforms, 577 Internet Architecture Board. See IAB IPv6 (Internet Protocol version 6), 261 connectivity, 577–579 Internet-based collaboration environments, IS. See information systems developing an international IS 61–68 ISPs. See Internet service providers architecture, 562–563 Internet Corporation for Assigned Names and IT. See information technology domestic exporter strategy, 567, 584 Numbers. See ICANN iterative process, 507 franchising, 567–568, 584 Internet Explorer (Microsoft), 188, 303 iTunes, 7, 45, 87, 94, 98, 102, 103, 383, 388, 399 global value chains, 576–577 Internet layer, 251 iVillage, 109, 383 globalization, 564 Internet music services, as disruptive growth of, 561–562 technology, 87 J implementation, 573–574, 576, 584 Internet Protocol, 251 JAD. See joint application design managing, 570–576 Internet protocol address. See IP address Java (software), 180, 188–189, 200 multinational strategy, 567, 584 Internet Protocol version 6. See IPv6 Java Virtual Machine, 188 organizing, 567–570 Internet security threats, 134–137, 295–296 JIT strategy. See just-in-time strategy I 12 Index jobs L management offshoring, 8, 192, 511, 513, 514 LANs (local-area networks), 173, 174, 175, 180, of global systems, 570–576 outsourcing, 8, 11, 192, 201, 319 249, 253–254, 278, 285, 295 knowledge management and, 42–421 reengineering job loss, 146 laptop computers legitimacy, 574 join operation, 215, 216 Internet access, 276 levels of, 56 join table, 216 security devices for, 314 platform and infrastructure, 194–196 joint application design (JAD), 514, 519 Latitude XT tablet, 178 management challenges, 562, 584 Joint Strike Fighter project, 329 law of diminishing returns, 108 management costs, flattening of hierarchies, 91 JotSpot (software), 61 law of mass digital storage, 171–172, 200 management filters, 460 just-in-time (JIT) strategy, 9, 342 Law of One Price, 581 management hierarchy, 56, 91 leadership, low-cost leadership, 96–97, 99 management information systems (MIS), K learning management systems (LMS), 425–426 47–48, 72 Kaboodle, 389 legacy systems, 167, 181, 182, 191 about, 29, 480 key corporate assets, 11 legal liability, inadequate security and control, defined, 17–18 key fields, 214 306–307 See also information systems key performance indicators (KPIs), 474 legislation management issues, information technology keyloggers, 298 anti-spam legislation, 145, 146 infrastructure, 194–197 keystone firms, 109 copyright of software, 139–140 management models, 458 keywords, 270 cyberwarfare, 330 managerial complementary assets, 27 Kinaxis RapidResponse, 335, 336 identity theft, 301–302 managers Kindle (Amazon), 103, 181, 382, 411 intellectual property rights, 141, 155 business analytics, 463 KMS. See knowledge management systems privacy laws, 122, 132–133 decision making and, 458–459, 479 knowledge, 417 texting while driving, 147–148 job of, 18–19 acquisition, 420 legitimacy, 574 managing application of, 420–421 leisure, changed by technology, 144–145 global systems, 559–587 dimensions of, 418 liability, 129, 142–143, 157–159 projects. See project management dissemination of, 420 Line-haul (software), 432 MANs (metropolitan-area networks), 253, 254, global knowledge base, 564 LinkedIn, 274, 384, 389 284 storage of, 420 Linux (operating system), 176, 177, 180, 188, manufacturing and production, business tacit knowledge, 417, 432 200, 248, 323 processes, 43 knowledge acquisition, 420 literacy, 17 MapInfo (software), 467 knowledge application, 420–421 Live Communications Server (Microsoft), 76 Mariposa botnet, 299 knowledge base, 432, 564 Live Meeting (Microsoft), 76 market creators, 383, 384 knowledge-based organization, 88 LiveJournal.com, 273 market entry costs, 377 knowledge discovery, 431 LLBean.com, 388 market niche, 98–99 knowledge dissemination, 420 LMS. See learning management systems marketing knowledge management, 445 local-area networks. See LANs affiliate and blog marketing, 393 about, 69, 416–418 location-based services, 400 behavioral targeting, 121, 132, 136, case study, 415 logical view, 212 392–393 communities of practice (COPs), 421 long tail marketing, 392 business processes, 43 defined, 419 Long-Term Evolution. See LTE classified ads, 393 knowledge acquisition, 420 "look and feel" copyright infringement CRM systems, 352–353 knowledge application, 420–421 lawsuits, 140 display ads, 393 knowledge dissemination, 420 Loopt, 400 e-commerce, 390, 392–395, 407 knowledge storage, 420 Lotus Connections (IBM), 7, 65, 424 e-mail, 393 knowledge management systems (KMS) Lotus Notes (IBM), 59, 61, 65, 417 long tail marketing, 392 about, 51, 54, 72, 421–422, 445 Lotus Notes Domino (IBM), 415, 416 micromarketing, 564 collaboration tools, 424 Lotus Sametime (IBM), 65, 264 online viral marketing, 389–390 enterprise content management systems, low-cost leadership, 96–97, 99 rich media, 393 421–422, 422–425, 445 LTE (Long-Term Evolution), 276 search engine marketing, 122, 270, 393 enterprise-wide knowledge management social networking for, 371 systems, 421, 422, 445 M sponsorships, 393 intelligent techniques, 422, 431–442, 445 m-commerce (mobile e-commerce), 374, 375, video, 393 knowledge network systems, 424, 445 382, 399–401, 408 marketspace, 375 knowledge work systems (KWS), 421, 427, machine bureaucracy, 88 mashups, 193, 201, 272 428, 445 machine learning, 439, 440–441 mass customization, 98 learning management systems, 425–426 Macromedia Flash, 180 master data management (MDM), 207, 208 social bookmarking, 424–425, 445 magnetic ink character recognition. See MICR Match.com, 388 knowledge management value chain, 419–421 mail servers, 254 MDM. See master data management knowledge network systems, 424, 445 mainframes, 167, 168, 177 media knowledge storage, 420 Malaysia, Government Multipurpose Smart new business models for, 375 knowledge work systems (KWS), 421, 427, 428, Card, 482 transformation of industry, 102 445 malware medical records, HIPAA, 133, 306 augmented reality, 428–430, 445 about, 296–297, 303 MEDITECH electronic medical records system, investment workstations, 431 blogs and, 297 9 knowledge workstations, 427 on mobile devices, 296–297, 320 MeilleursAgents.com, 429 virtual reality systems, 428, 429, 431, 445 on social networking sites, 291–292, 297 Melissa (malware), 297 knowledge workers, 18, 426 Trojan horses, 291, 296, 298 membership functions, 435 knowledge workstations, 427 worms, 296, 326 menu costs, 379 Koobface (worm), 291 managed security service providers (MSSPs), Metastorm BPM software, 495 KPIs. See key performance indicators 319–320 Metcalfe's law, 173, 200 Index I 13

metropolitan-area networks. See MANs described, 170 network interface card (NIC), 248 micromarketing, 564 RFID, 279–281, 285 network interface layer, 252 micropayment systems, 388 mobile e-commerce. See m-commerce network neutrality, 262–263 microprocessors, 87, 171, 185, 200 Mobile Maps, 136 network operating system (NOS), 248 Microsoft Access, 213, 218, 219 mobile WiMax, 276 network service providers, 259 Microsoft Azure, 177, 217, 322 MobiTV, 401 network topologies, 254–255 Microsoft DOS, 175 modeling, object-oriented modeling, 504 networked systems, 568 Microsoft Dynamics suite, 357 modems, 252–253 networking services, 180 Microsoft Excel PivotTable, 472 Monster.com, 32 networking technology, 20, 250–252 Microsoft Exchange ActiveSync, 9 Moore's law, 170–171, 200 networks and networking Microsoft Expression Web, 180 moral issues, 125–126, 131–150 about, 284 Microsoft Expressions, 404 See also accountability; information rights; advertising networks, 392–395, 395 Microsoft Internet Explorer, 188, 303 moral issues; property rights; quality of CANs (campus-area networks), 253 Microsoft Live Communications Server, 76 life controlling network traffic, 319 Microsoft Live Meeting, 76 Motorola Droid, 288 defined, 20–21, 248 Microsoft .NET family, 180, 190 Movable Type (software), 273 extended star networks, 254 Microsoft Office, 76, 188, 441 movies scripts, indexing by search engines, 271 firewalls, 315–316, 326 Microsoft Office Enterprise Project Mozilla Firefox, 188, 303 global business, 577–579 Management (EPM) Solution, 527 MP3 music files, intellectual property rights, hardware, 180 Microsoft Office Live Meeting, 62 141 LANs (local-area networks), 173, 174, 180, Microsoft Office Project 2010!, 549 MP3.com, 87 185, 249, 253–254, 278, 285, 295 Microsoft Office Project Portfolio Server 2007!, MSN, 382 in large companies, 249–250 527 MSSPs. See managed security service providers MANs (metropolitan-area networks), 253, Microsoft Office Project Professional 2007!, 527 multi-tiered client/server architecture, 169 254, 284 Microsoft Office Project Professional 2010!, 549 multicore processor, 185, 200 P2P networks, 254, 295 Microsoft Office Project Server 2007!, 527 multidimensional data analysis, 224, 225 PANs (personal-area networks), 276, 285 Microsoft Office Project Server 2010!, 549 multinational firms, 568 physical transmission media, 255–257, 284 Microsoft Office SharePoint Portal Server, 415 See also global business; international private industrial networks, 397, 407 Microsoft Office SharePoint Server, 76, 415, 416 information systems topologies, 254–255 Microsoft Office Web Apps, 193–194 multinational strategy, international transmission, 256–257 Microsoft Outlook, 76, 297 information systems, 567, 584 transmission speed, 257 Microsoft Server, 527 multiple input multiple output. See MIMO trends in, 247 Microsoft SharePoint, 7, 61, 64, 76, 424, 463 multitouch interface. See touch interface VPNs (virtual private networks), 267–268, Microsoft SharePoint Designer, 180 music industry, 13, 118 284, 316, 577 Microsoft SQL Server, 179, 213, 218 My Location, 136 WANs (wide-area networks), 180, 253, 254, Microsoft SQLAzure Database, 217 MyDoom (malware), 297, 300 284 Microsoft Virtual Server, 182 MyKad, 482 wireless networks, 276, 295, 316–317 Microsoft Windows OS, 168, 169, 174 MyPoints, 389 WSNs (wireless sensor networks), 281, 285 Microsoft Windows Server, 177, 180, 182, 248, MySimon, 272 See also information systems security; 254 MySpace, 7, 60, 137, 146, 229–230, 274, 291, Internet security threats Microsoft Windows Vista Service Pack 2!, 303 297, 298–299, 383, 384, 389 neural networks, 422, 436–438, 441, 445 Microsoft Xboxlive.com, 388 MySQL (software), 213, 217 neurofuzzy system, 441 microwave systems, 256, 284 New York Stock Exchange, 439, 461 middle management, 18 N news reader software, 273 about, 59 N-tiered client/server architecture, 169 newsgroups, 154, 264 business information systems for, 46–48, NAI. See Network Advertising Initiative newspapers 72 nanotechnology, 171 iPad and, 103 decision support for, 471–473 nanotubes, 172 new business models for, 375 MiFi (Virgin Mobile), 277 NAT. See Network Address Translation readership, 6 MIMO (multiple input multiple output), 279 National Cyber Security Center (NCSC), 273 Next Generation Internet (NGI), 261 minicomputers, 167, 168 national Do Not Track list, 121, 133 Nexus One, 178 Mint.com, 386 National Information Infrastructure Protection NGI. See Next Generation Internet Mintzberg's role of classifications, 459 Act of 1996!, 301–302 NIC. See network interface card MIPS (millions of instructions per second), 171 National Security Agency (NSA), 330 niche firms, 109–110 Mirrorforce, 322 net marketplaces, 397, 398, 407 No Child Left Behind Act, 470 MIS. See management information systems net neutrality, 262–263 "no-fly" list, 240 MIS audit, 312, 326 Net Promoter (Satmetrix), 227 "no free lunch" rule, 130, 155 mobile advertising, 400 netbooks, 6, 7, 181, 185, 188, 277 nonobvious relationship awareness (NORA), mobile computing, 170 Netflix, 392 128 mobile devices Netscape.com, 373 nonprocedural languages, 508–509 about, 6, 375, 464 NetSuite, 203, 321 normalization, 220 e-book readers, 103, 181, 375, 382, 411 NetWeaver Business Intelligence (SAP), 368 NOS. See network operating system economic development and, 580–581 NetWeaver Master Data Management (SAP), Novell Open Enterprise Server, 248 malware for, 296–297, 320 368 NSA. See National Security Agency netbooks, 6, 7, 181, 185, 188, 277 NetWeaver Portal (SAP), 361 securing, 320 Network Address Translation (NAT), 315 O mobile digital platforms Network Advertising Initiative (NAI), 122, 133, object, 504 about, 6, 7, 110, 181, 279 137 object-oriented database management systems apps, 429 network-based strategies, 108–109, 116 (OODBMS), 215 case study, 10 network economics, 108, 173 object-oriented databases, 215 decision making and, 8 network infrastructure, 249 object-oriented development, 503–505 I 14 Index object-oriented modeling, 504 rationalization, 489, 490, 519 personalization, 376, 378, 392, 393, 394, 395 object-relational DBMS system, 215 resistance to, 493 PERT charts, 543, 545 Office Live Meeting (Microsoft), 62 organizational CSFs, 534 pharming, 301 Office (Microsoft), 76 organizational culture, 84–85 phased approach, business process redesign, Office SharePoint Server (Microsoft), 76, 415, organizational environments, 86–88 500–501 416 organizational impact analysis, 546–547 phishing, 301 Office Web Apps (Microsoft), 193–194 organizational intelligence, case-based phones. See cell phones; iPhone; telephone offshore outsourcing, 8, 11, 192, 511, 513, 514 reasoning, 434, 445 networks; telephone systems OLAP. See online analytical processing organizational learning, 419 PhotoBucket, 121, 383 on-demand computing, 184 organizational politics, 84, 93 physical view, 212 one-click shopping, 98 organizational structure, 88 pilot study, business process redesign, 500 OneHub (software), 66 organizations piracy, 262–263 OneView (software), 512 behavioral view of, 82–83 pirated software, 141 online advertising, 122, 375 described, 28–83 pivot tables, 472, 473 online analytical processing (OLAP), 224, 237, disruptive technologies, 87–88 pizza chains, 52 354 features of, 84–89 Pizza Tracker (software), 52 online banner ads, 122 flattening, 91–92 PKI. See public key infrastructure online bill payment, 98 information systems and, 12, 18, 81–89, planning online chat, 263–264 115 business continuity planning, 311–312 online collaboration tools, 61–68 Internet and, 93–94 capacity planning, 194 online conferencing, 5, 7, 60 microeconomic definition of, 82 demand planning, 344 online entertainment, business models, 375 organizational culture, 84–85 disaster recovery planning, 310–312 online ordering systems, 52 organizational environments, 86–88 e-commerce Web site, 401–402 Online Privacy Alliance, 137 organizational politics, 84, 93 EPR systems, 51, 53, 337 online transaction processing, 319 organizational structure, 88 information systems, 95 online video, 271 postindustrial organizations, 92 supply chain planning systems, 342, 344 online viral marketing, 389–390 resistance to change, 93, 115, 493 Platform for Privacy Preferences. See P3P OnQ system, 98 strategic transitions, 112 platforms, 21, 166 OODBMS. See object-oriented database technical definition of, 83 computer hardware platforms, 175–177, management systems technological change and, 83 181 ooVoo (software), 62 technology and, 93 enterprise systems, 360–361, 364 Open for Business (OFBiz) (Apache), 357 Outlook (Microsoft), 76, 297 international information systems, 577 Open Office (Oracle), 188 output, 16 management and, 194–196 Open Photo, 153 output controls, 308–309 P3P, 137–138, 139 open source software, 187–188, 200, 357 outsourcing, 8, 11, 192, 201, 319, 511, 513, 519 service platforms, 360–361, 364 Open Text LiveLink Enterprise Content Overstock.com, 356 wireless platforms, 248 Management, 423 See also information technology (IT) Openbravo (software), 357 P infrastructure; mobile digital platforms OpenOffice (Sun Microsystems), 188 P2P networks. See peer-to-peer networks podcasting, 383 Opera (browser), 303 P3P (Platform for Privacy Preferences), Point-to-Point Tunneling Protocol. See PPTP operating systems, 176, 177 137–138, 139 policies and procedures, 194 operational customer relationship packet filtering, 315 portals, 50, 382, 445 management (CRM), 354, 364 packet switching, 250 Porter's competitive forces model, 95–96, 102, operational excellence, as business objective, packets, 250, 258 109, 115, 196–197 12–13 PageRank algorithm, 87, 270 portfolio analysis, information systems, operational management, 18, 46 Pandora, 388 534–535 opt-in policy, 137 PANs (personal-area networks), 276, 285 Post Sales Order Management System (OMS), opt-out policy, 136, 137 paradigm shift, 489, 490, 519 22 option, 538 parallel strategy, business process redesign, postimplementation audit, 501 Oracle Application Express, 41 500 postindustrial organizations, 92 Oracle Business Intelligence, 359 particularism, 565 power consumption, 185, 186 Oracle CRM on Demand, 359 partner relationship management (PRM), 351 power grids, 36–38 Oracle Database, 41, 213 passive RFID tags, 280 power management software, 186 Oracle Database Lite, 213 passwords, 313 power-saving processors, 185, 200 Oracle e-Business Suite, 357 patch management, 303 Power Usage3 Effectiveness, 186 Oracle Enterprise Linux, 163 patches (for software), 303, 304 PowerMeter (Google), 37 Oracle Enterprise Manager, 217 patents, 140 PPTP (Point-to-Point Tunneling Protocol), 268 Oracle Fusion Middleware, 217, 357 payment systems prediction markets, 392 Oracle Infor Global Solutions, 339 electronic payments systems, 393 predictive analytics, 226, 466–467 Oracle Open Office, 188 micropayment systems, 388 predictive modeling, 462 Oracle PeopleSoft Enterprise, 163 online bill payment, 98 price discrimination, 377 order fulfillment process, 44, 52 PayPal, 97 price transparency, 377 order-to-cash process, 360 payroll processing, transaction processing pricing profile, 453 organizational and management capital, 27, systems (TPS) for, 46 primary activities, business value chain model, 419 PDP-11, 168 101 organizational assets, 27 peer-to-peer networks (P2P networks), 254, 295 primary key, 214 organizational change, IT-enabled, 489–490 Pegasystems BPM workflow software, 494 privacy, 155 automation, 489, 519 PeopleSoft Enterprise (Oracle), 163 behavioral targeting, 121, 133, 136, business process redesign, 489, 490, personal-area networks. See PANs 392–393 491–493, 500, 519 personal computers (PCs). See computers chief privacy officer (CPO), 69 paradigm shifts, 489, 490, 519 personal information, privacy of, 127, 155, 390 defined, 131 Index I 15

electronic surveillance of employee proxy servers, 315 RFID (radio frequency identification), 279–281, Internet activity, 134, 264, 266–267 public cloud, 183 285 European legislation, 134 Public Company Accounting Reform and RFP. See Request for Proposal Facebook, 390–391 Investor Protection Act of 2002!. See rich media, marketing, 393 Internet and, 131–138 Sarbanes-Oxley Act of 2002! Rigel (software), 366 nonobvious relationship awareness public key encryption, 317–318 ring topology, 254, 255 (NORA), 128 public key infrastructure (PKI), 326 risk of personal information, 127, 390 pull-based model, 347, 348 project management, 531, 539 U.S. legislation, 122, 132–133 Pulse (Domino's), 52 See also project risk Web tracking, 127, 134, 137, 390, 393 Purisma Data Hub, 207 risk assessment, information systems security, Privacy Act of 1974!, 132 push-based model, 347, 348 309, 326, 539–540, 553 private cloud, 183–184 Risk Aversion Principle, 130, 155 private exchange, 397 Q root domain, 258 private industrial networks, 397, 407 quality ROPMs. See real options pricing models PRM. See partner relationship management business benefits of collaboration, 58 routers, 248 problem solving. See decision-making; decision data quality, 230–231, 238 routines, 84, 85 support project management, 530 RSI. See repetitive stress injury process specifications, 503 quality of life, 126, 144–145 RSS, 273 processing, 16 query language, 509 Russia, cyberwarfare by, 330 processing controls, 308 QuickBooks, 386 procurement, 396 S product differentiation, 96, 97–98 R S-HTTP (Secure Hypertext Transfer Protocol), production workers, 18 racial equity, computer usage and Internet 317 productivity, 58 access, 148 S3. See Simple Storage Service professional bureaucracy, 88 RAD. See rapid application development SaaS. See software as a service professional codes of conduct, 131 radiation, from computer display screens, 150 SABRE reservation system, 111, 556 profiling radiation therapy, liability and regulation, SabreSonic CSS, 556 about, 100, 127 157–159 Safari (browser), 303 nonobvious relationship awareness radio frequency identification. See RFID safe harbor, 134 (NORA), 128 rapid application development (RAD), 514–515, safety stock, 342 program-data dependence, 211 519 sailboats, 41–42, 43 programmers, 68 RapidResponse (Kinaxis), 335, 336 Sajus BPM monitoring software, 494 programming, systems development, 499 rationalization of procedures, 489, 490, 519 sales and marketing, 43, 44 Progress Savvion BusinessManager PBM reading See also marketing software, 496 e-book readers, 103, 181, 375, 382, 411 sales force automation (SFA), 288, 351 Project Gate methodology, 528 new business models for, 375 sales revenue model, 388 project management, 527–556 real options pricing models (ROPMs), 538–539 Salesboom.com, 203 change management, 540–542 records, 210, 214 Salesforce.com, 87, 322, 357 critical success factors (CSFs), 532, 534 records management SANs (storage area networks), 180 defined, 530 computer forensics, 307, 326 SAP Business ByDesign, 357 end users and, 541 electronic, 306–307 SAP Business Information Warehouse, 587 Gantt charts, 543, 544 electronic evidence, 307 SAP Business Objects, 359 implementation, 540–541, 553 electronic records management, 9, SAP Business Process Testing, 587 importance of, 529–531 306–307, 522–524 SAP Business Suite, 357 increasing user involvement, 545 employee records, 326 SAP Business Suite Applications, 559–560 IS costs and benefits, 537–538 health records and HIPAA, 133, 306 SAP ERP Human Capital Management system, management structure for IS projects, retention of digital records, 6, 15 467 531–532, 553 security, 326 SAP General Ledger, 586–587 managing risk, 539–549 trends in, 6, 15 SAP General Ledger Data Migration, 587 objectives of, 111–112, 530–531, 553 recovery-oriented computing, 319 SAP Global Trade Services, 575 overcoming user resistance, 545 reengineering job loss, 146 SAP NetWeaver Business Intelligence, 368 PERT charts, 543, 545 referential integrity, 220 SAP NetWeaver Master Data Management, 368 portfolio analysis, 534–535 "refreezing," 93 SAP NetWeaver Portal, 361, 587 runaway projects, 529–530 regional systems units, 569 Sarbanes-Oxley Act of 2002!, 15, 306–307 scope of work, 530 regulation, radiation-related accidents, 157–159 SAS Enterprise Miner, 466 software tools, 527–528, 548–549 relational database Sasser.ftp (malware), 297 system failure, 529–530 described, 213, 237 Satmetrix Net Promoter, 227 project management software, 527–528, entity-relationship diagram, 237 scalability, 194 548–549 normalization, 220 SCM systems. See supply chain management project operation, 215, 216 organizing data in, 214–215, 237 (SCM) systems project risk referential integrity, 220 scope of work, project management, 530 controlling risk factors, 542–545 tables, 214–215, 216, 237 scoring models, business process redesign, dimensions of, 539–540, 553 remote work, 8 535–536 implementation and, 540–541, 553 repetitive stress injury (RSI), 149 Scrum (software), 547 project size, project risk and, 540, 553 report generator, 509 search engine marketing, 122, 270, 393 project structure, project risk and, 540, 553 Request for Proposal (RFP), 510 search engine optimization (SEO), 270 Promoted Trends, 386 requirements analysis, 497–498, 499, 573–574 search engines, 269–271, 393 property rights, 126, 138–141 responsibility, 129 Second Life, 60 protocol, 251 revenue models Secure Hypertext Transfer Protocol. See S- prototype, 506 e-commerce, 387–389, 407 HTTP prototyping, 507–508, 519 Facebook, 390 Secure Sockets Layer. See SSL I 16 Index

Securities and Exchange Commission (SEC), social change, technology and, 144–145 for supply chain management, 344 440 social class equity, computer usage and testing, 322 security Internet access, 146, 148 as trade secret, 139 cloud computing, 320, 321, 326 social engineering, 302, 313 virtualization software, 182, 184, 186, 200 defined, 293 social networking virus and firewall software, 185 legal liability, 306–307 about, 6, 7, 274, 371, 375 vulnerability to threats from, 303–304, 323 of telephone systems, 294 business models, 384 walkthrough, 322 outsourcing, 319 as collaboration tool, 60 Web services, 189–191, 200–201 security breaches, 203 community-building tools, 384 Web software, 180 security policy, 310, 326 e-commerce and, 375, 376, 378, 379, 389 See also collaboration tools Wi-Fi, 279, 323 malware and, 291, 297 Software and Information Industry Association of Wi-Fi networks, 295–296, 316–317, 326 for marketing, 371 (SIIA), 141 of wireless networks, 295–296, 316–317 for mobile devices, 400–401 software as a service (SaaS), 7, 87, 142, 193, See also cybercrime; data security; See also Facebook; LinkedIn; MySpace; 194, 195, 203, 205, 357 information systems security; Internet Twitter software controls, 308 security threats social relationships, computer threats to, software integration, 181 security breaches, 203 144–145 software localization, 579, 581–582 security policy, 310, 326 social shopping, 389 software metrics, 322, 326 select operation, 215, 216 Socialtext (software), 66 software packages, 191 self-managed teams, 92 sociotechnical design, 548 solar power, 36 semantic Web, 274–275 sociotechnical systems, 29–30, 33 space shifting, 12 semistructured decisions, 456, 471–473, 479 software, 16, 20, 165, 200 spam, 145–146 senior management, 18, 56, 59 Ajax (software), 189 spam filtering software, 146 decision support for, 473–475, 477 antivirus and antispyware software, 316, sponsorships, marketing, 393 sensitivity analysis, 472 326 spoofing, 299 SEO. See Search engine optimization application server software, 229 Sportsvite, 384 sequences (data analysis), 225 application software, 166 Spybot S&D (software), 316 server computer, 248 application software packages, 509, spyware, 135, 298 server software, 248 510–511, 519 Spyware Doctor (software), 316 servers, 163, 168, 180 apps, 193–194 SQL (software), 217–218 blade servers, 163, 176, 177, 186 bugs, 135, 143, 303, 326 SQL injection attacks, 298, 301 proxy servers, 315 business analytics software, 453, 463, 473 SQL Server (Microsoft), 179, 213, 218 service level agreement (SLA), 193, 320 for business process management, SQLAzure Database (Microsoft), 217 service-oriented architecture (SOA), 190 493–494 SSIDs (service set identifiers), 295–296, 316 service-oriented computing, 515 capacity planning, 194 SSL (Secure Sockets Layer), 317 service platforms, 360–361, 364 client operating system software, 177 standard operating procedures, 84 service providers, 383, 384 cloud-based software, 183, 193, 203–205 Staples.com, 382 service set identifiers. See SSIDs cloud software as a service, 183 Star Alliance, 494 service workers, 18 coordinating software releases, 574 star topology, 254, 255 SFA. See sales force automation copyright protection of, 139–140 stateful inspection, 315 SharePoint (Microsoft), 7, 61, 64, 76, 424, 463 for customer relationship management "stickiness," 387 SharePoint Designer (Microsoft), 180 (CRM) systems, 351–352, 512 storage area networks. See SANs SharePoint Enterprise Search, 415 database software, 179 Storefinder (application), 400 ShopItToMe, 453 debugging, 143, 323 Storm (malware), 297 shopping bots, 271–272 enterprise software, 177, 191, 338–339 strategic information systems, 116 signals, digital vs. analog, 252–253 external sources for, 191 strategic systems, 111, 115 SIIA. See Software and Information Industry financial investment in, 195 strategic systems analysis, 112 Association in global business, 574 strategic transitions, 112 Simon framework, 461 liability and, 142, 143 streaming, 383–384 Simple Object Access Protocol. See SOAP localization, 579, 581–582 structure chart, 503, 504 Simple Storage Service (S3) (Amazon), 183, 204 malware, 296 structure mining, 228 SimpleDB (Amazon), 217 mashups, 193, 201, 272 structured decisions, 456, 479 six sigma, 490, 519 metrics, 322, 326 structured knowledge, 422–423 Skype, 62, 245, 265 for networking and telecommunications, structured methodologies, 502–503 SLA. See service level agreement 180 Structured Query Language. See SQL Slifter, 399 on-demand model, 203 "stub quotes," 439 Smart Business Application Development & open source software, 187–188, 200, 357 Stylehive, 389 Test (IBM), 183 outsourcing, 192 subnotebooks, 7, 181 smart card, 313, 326 patches, 303, 304 subscription revenue model, 388 smart grid, 36–38 patent protection, 140 substitute products and services, 96, 101 SmartGridCity Project (Boulder, CO), 36 pirated, 141 Sun Java, 180 smartphones, 9, 79, 111, 177, 178, 181, 185, 188, power management software, 186 Sun Microsystems OpenOffice, 188 194, 247, 275, 277, 294, 374, 382, 400, 401 project management tools, 527–528, Sun Solaris, 323 See also Android; BlackBerry; Droid; 548–549 supercomputers, 182 iPhone quality of, 143, 320, 322–323 SuperDAT Remediation Tool (McAfee), 304 sniffing, 299, 313, 326 scalability, 194 supplier intimacy, 14, 99 SOA. See service-oriented architecture securing quality, 320, 322–323 suppliers, 96 SOAP (Simple Object Access Protocol), 190 server software, 248 supply chain, 340 Sobig.F (malware), 297 service level agreement (SLA), 320 demand-driven supply chains, 347–348 social assets, 27, 28 site-building packages, 404 execution systems, 344 social bookmarking, 424–425, 445 spam filtering software, 146 global supply chains, 346–347 Index I 17

planning systems, 342, 344 Web services, 189–191, 200–201, 515 total cost of ownership (TCO), 195–196, 201, supply chain execution systems, 344 See also business process redesign; project 538 supply chain management (SCM) systems, 51, management total quality management (TQM), 490, 519 53, 72, 335–336, 340–344, 356, 363 systems life cycle, 506–507, 519 touch interface, 177 bullwhip effect, 342–343 touch point, 350 business value of, 348 T touchpads, 178 demand planning, 344 T1 lines, 258 TouchSmart computer (HP), 178 just-in-time (JIT) strategy, 9, 342 T3 lines, 258 Toxic Substances Control Act of 1976!, 15 software for, 344 tablet computers, 103, 181 TPS. See transaction processing systems supply chain planning systems, 342, 344 tacit knowledge, 417, 432 TQM. See total quality management support activities, 104 tangible benefits, 537 trackbacks, 273 surface Web, 269 task force-networked organizations, 92 "tradable service" jobs, 8 surveillance. See privacy task force organization, 88 trade secrets, 139 Surveyor (software) (Verdiem), 186 taxonomy, 423 transaction brokers, 383, 384 survival, as business objective, 14–15 TCO. See total cost of ownership transaction cost theory, 89–90 switches, 248 TCP (Transmission Control Protocol), 251, 258 transaction costs, 376 switching costs, 99, 356 TCP/IP (Transmission Control transaction fee revenue model, 388–389 Sybase Adaptive Server Enterprise, 179 Protocol/Internet Protocol), 169–170, 174, transaction processing systems (TPS), 45–47, symmetric key encryption, 317 175, 180, 251, 258 72, 471 synergies, 107, 116 teams, 56, 59 transborder data flow, 565 system errors, 142, 143 teamwork. See collaboration; collaboration tools transistors system quality, 126, 142, 143 technology as disruptive technology, 87 system testing, 499 ethical issues arising from, 122, 126–128, nanotechnology, 171 systems analysis, 68, 496–499, 501 155 Transmission Control Protocol. See TCP feasibility study, 497 information systems and, 20–21, 23–24 Transmission Control Protocol/Internet requirements analysis, 497, 499, 573–574 intellectual property rights, 141, 155 Protocol. See TCP/IP systems analysts, 68 organization and, 93 transmission speed, 257 systems design, 498–499, 501, 546, 548 quality of life issues and, 143–144 transnational firms, 568, 584 cooptation, 574 reengineering job loss from use of, 146 See also global business; international structured methodologies, 502–503 social change and, 144 information systems systems development, 496–506, 519 See also information technology transnational systems units, 569 about, 494, 496 technology services, 166 transport layer, 251 agile development, 514–515 technology standards, 174 travel industry, terrorist watch-list database, application software packages, 166, 509, technostress, 149–150 240–241 510–511, 519 telecommunications industry, competition in, Traveler Redress Inquiry Program (TRIP), 241 capital budgeting for, 538 79–80 Travelocity, 102 component-based development, 515 telecommunications technology, 20, 166 TRIP. See Traveler Redress Inquiry Program computer-aided software engineering telephone networks, 247 Trojan horses, 291, 296, 298 (CASE), 505–506 telephone systems, 252 TRUSTe, 137 conversion, 500, 501 IP phone systems, 265 tuples, 214 core activities, 497–501 liability and, 142 TV.com, 118 critical success factors (CSFs), 532, 534 security, 294 "tweets," 385 defined, 494 telepresence, 61, 62, 76 twisted wire, 255, 284 documentation, 501 television, cognitive effects of, 151 Twitter, 204, 291, 297, 372, 383, 384, 385–386, end-user development, 508–510, 519 television industry, Internet and, 118–119 400 feasibility study, 497 telework, 7, 8 two-tiered client/server architecture, 169 fourth-generation languages, 508–510 TelNet, 261 Typepad.com, 216 IS costs and benefits, 537–538 terrorist watch-list database, 240–241 joint application design (JAD), 514, 519 test plan, 500 U linking systems projects to business plan, testing U-verse (AT&T), 118 532 of software, 322 ubiquity, of e-commerce, 374–376 maintenance, 501 systems development, 499 UDDI (Universal Description, Discovery, and object-oriented development, 503–505 text messaging, 60, 146, 147 Integration), 190 outsourcing, 511, 513, 519 text mining, 226–228, 237 Ultra Mobile Broadband (UMB), 276 portfolio analysis, 534–535 textbooks, 102, 103 "unfreezing," 93 production, 501 "thick client" model, 52 unified communications, 265, 267 programming, 499, 501 Third World countries, 564 unified threat management (UTM) systems, prototyping, 507–508, 519 ThisNext, 389 316 rapid application development (RAD), ThomasNet.com, 229 uniform resource locator. See URL 514–515, 519 3 G networks, 276, 284 unit testing, 499, 587 real options pricing models (ROPMs), tiered service, 262 538–539 time, project management, 530 cyberwarfare against, 329–331 requirements analysis, 497–498, 499, time shifting, 11–12 globalization and employment, 8, 11 573–574 time/space collaboration tool matrix, 67 Universal Description, Discovery, and scoring models, 535–536 Times Square bomber, 242 Integration. See UDDI service-oriented computing, 515 token, 326 Unix (operating system), 174, 175, 176, 177, structured methodologies, 502–503 Token Ring networking software, 254 180, 188, 323 systems analysis, 68, 496–499 tokens, 313 unstructured decisions, 456, 479 systems design, 498–499 top-level domain, 258 URL (uniform resource locator), 269 systems life cycle, 506–507, 519 topology, 254, 255 U.S. CAN-SPAM Act of 2003, 146 testing, 499, 501 I 18 Index

U.S. Department of Defense Advanced search engines, 269–271 wireless handheld devices, 245 Research Projects Agency. See DARPA semantic Web, 274–275 wireless Internet access, 277–279, 284 U.S. stock market, 439, 461 social technology, 376, 378 wireless modems, 253 usage mining, 228 surface Web, 269 wireless networks user-designer communications gap, 541–542 trends in, 274–275 about, 276 user interface, 507, 530 ubiquity of, 374–376 security challenges to, 295–296, 316–317 user requirements, 573 unique nature of, 374–378, 407 security measures for, 316–317 Utah, texting while driving legislation, 147, 148 universal standards, 376, 377 wireless platforms, 248 Utilitarian Principle, 130, 155 Web 2.0!, 7, 272–273, 297, 357 wireless sensor networks. See WSNs UTM systems. See unified threat management Web 3.0!, 274, 275 wireless technology, 9, 37, 245, 275–281 (UTM) systems See also Internet wireless transmission media, 256–257, 284 Web 2.0!, 7, 272–273, 297, 357 wisdom, 417 V Web 3.0!, 274, 275 "wisdom of crowds," 57, 391–392 value chain, 102, 116 Web-based collaboration environments, 61–68 WMS. See Warehouse Management System global value chain, 576–577 Web beacons, 121, 135, 137 word processing software, as disruptive value chain model, 102, 104–105, 116 Web browsers, 188 technology, 87 value web, 106, 107, 116 Web bugs, 121, 135, 137, 303, 326 work VAX computers, 168 Web conferencing, 7, 12, 61 changed by technology, 144 VDTs. See video display terminals Web mashups, 193, 272, 291 changing nature of, 56 Venuing (app), 3 Web mining, 226, 228, 237 See also jobs Verdiem Surveyor (software), 186 Web servers, 169, 254, 269 work crossovers, 448 video, marketing, 393 Web services, 189–191, 200–201, 515 workgroup collaboration, 61 video display terminals (VDTs), 150 Web services description language. See WSDL workgroup network model, 254 video games, cognitive effects of, 151 Web sites WorkZone (software), 66 video ID filtering, 118 budgeting for, 405 World Intellectual Property Organization videoconferencing, 7, 12, 61, 62, 62–63 building an e-commerce site, 401–405, 408 Treaty, 141 viral marketing, 389–390 building in-house vs. outsourcing, 403–405 World Wide Web, 21, 87, 175, 261 virtual company (virtual organization), 109 defined, 268 See also Web virtual meeting systems, 7, 12, 61–62 hosting, 404–405 World Wide Web Consortium (W3C), 189, 260, virtual private networks. See VPNs personalization, 376, 378, 390, 392, 393, 284 Virtual Reality Modeling Language. See VRML 394, 395 Worldwide Interoperability for Microwave virtual reality systems, 428, 429, 431, 445 visitor tracking, 127, 134, 137, 390, 392, Access. See WiMax Virtual Server (Microsoft), 182 393, 394 worms (malware), 296, 326 virtual worlds, as collaboration tool, 61 Web structure mining, 228 WPA2 (Wi-Fi Protected Access 2), 316 virtualization, 182, 184, 186, 200 Web tracking, 121, 127, 134, 137, 390, 393 WSDL (Web services description language), 190 virus protection, 185 WebEx (software), 62 WSNs (wireless sensor networks), 281, 285 Virus Scan (software), 304 WebFocus (software), 466 viruses (malware), 296, 326 WEP (wired equivalent privacy), 296, 316 X visitor tracking (of Web sites), 127, 134, 137, Wi-Fi networks, 249, 253, 277 Xanga.com, 273 390, 392, 393, 394 case study, 245 Xbox 360!, 411 VistA (software), 523 hotspots, 278 Xboxlive.com, 388 VMware (software), 182, 186 security challenges to, 295–296, 326 Xdrive.com, 383 voice networks, 247 security measures for, 316–317 XML (extensible markup language), 189–190 VoIP (Voice over IP), 264–265, 284, 294, 295 standards, 277, 285, 316 VPNs (virtual private networks), 267–268, 284, Wi-Fi Protected Access 2!. See WPA2 Y 316, 577 Wi-Fi standards, 277, 285 Yahoo!, 118, 121, 134, 137, 270, 278, 287–289, VRML (Virtual Reality Modeling Language), 802.11b standard, 277 382, 383, 401 430 802.11g standard, 277 Yahoo! Messenger, 264 802.11i specification, 316 YouTube, 102, 118, 119, 136, 262, 271, 272, 389 W 802.11n standard, 277, 279 W3C. See World Wide Web Consortium wide-area networks. See WANs Z walkthrough, 322 wiki software, 273 ZCS. See Zimbra Collaboration Suite Wall Street Journal, 388 Wikipedia, 60, 151 ZeuS (trojan horse), 291, 298 WANs (wide-area networks), 180, 253, 254, 284 wikis Zillow.com, 141 war driving, 295–296 about, 7, 273 Zimbra Collaboration Suite (ZCS), 512 Warehouse Management System (WMS), 344 as collaboration tool, 60, 445 Zoho Notebook Project, 66 Web, 268–275 malware and, 297 about, 268 Wikitude, 400 customization, 376, 378 WiMax, 279, 285 "deep Web," 269 Windows Live Messenger, 264 employer surveillance of, 134, 264, Windows Server (Microsoft), 177, 180, 182, 248, 266–267 254, 323 global reach, 376, 377 Windows Vista (Microsoft), 323 information density, 376, 377–378 Windows Vista Service Pack 2 (Microsoft), 303 information richness, 376, 377 Windows Vista Ultimate (Microsoft), 323 interactivity, 376, 377 Wintel standard, 168, 174, 175 personalization, 376, 378, 390, 392, 393, wired equivalent privacy. See WEP 394, 395 wireless advertising, 400–401 REVIEWERS AND CONSULTANTS

CONSULTANTS SWITZERLAND Andrew C. Boynton, International Institute for Management Development Walter Brenner, University of St. Gallen Robert MacGregor, University of Wollongong Donald A. Marchand, International Institute for Alan Underwood, Queensland University of Management Development Technology CANADA ENGLAND Wynne W. Chin, University of Calgary G.R. Hidderley, University of Central England, Len Fertuck, University of Toronto Birmingham Robert C. Goldstein, University of British Columbia Christopher Kimble, University of York Rebecca Grant, University of Victoria Kevin Leonard, Wilfrid Laurier University Jonathan Liebenau, London School of Anne B. Pidduck, University of Waterloo Economics and Political Science Kecheng Liu, Staffordshire University GERMANY SCOTLAND Lutz M. Kolbe, University of Göttingen William N. Dyer, Falkirk College of Technology Detlef Schoder, University of Cologne UNITED STATES OF AMERICA GREECE Tom Abraham, Kean University Anastasios V. Katos, University of Macedonia Evans Adams, Fort Lewis College Kamal Nayan Agarwal, Howard University HONG KONG Roy Alvarez, Cornell University Enoch Tse, Hong Kong Baptist University Chandra S. Amaravadi, Western Illinois University Beverly Amer, Northern University INDIA John Anderson, Northeastern State University Sanjiv D. Vaidya, Indian Institute of Arben Asllani, Faytetteville State University Management, Calcutta David Bahn, Metropolitan State University of Minnesota Rahul C. Basole, Georgia Institute of Technology ISRAEL Jon W. Beard, University of Richmond Phillip Ein-Dor, Tel-Aviv University Patrick Becka, Indiana University Southeast Peretz Shoval, Ben Gurion University Michel Benaroch, Syracuse University Cynthia Bennett, University of Arkansas at Pine Bluff MEXICO David Bradbard, Winthrop University Noe Urzua Bustamante, Universidad Nancy Brome, Southern NH University Tecnológica de México Kimberly Cass, University of Redlands Jason Chen, Gonzaga University NETHERLANDS P. C. Chu, Ohio State University, Columbus E.O. de Brock, University of Groningen Kungwen Chu, Purdue University, Calumet Theo Thiadens, University of Twente Richard Clemens, West Virginia Wesleyan College Charles Van Der Mast, Delft University of Technology Lynn Collen, St. Cloud State University Daniel Connolly, University of Denver PUERTO RICO, Jakov Crnkovic, SUNY Albany Albert Cruz, National University Commonwealth of the United States John Dalphin, SUNY Potsdam Brunilda Marrero, University of Puerto Rico Marica Deeb, Waynesburg College William DeLone, American University SOUTH AFRICA Vasant Dhar, New York University Daniel Botha, University of Stellenbosch Cindy Drexel, Western State College of Colorado Warren W. Fisher, Stephen F. Austin State University SWEDEN William B. Fredenberger, Valdosta State University Mats Daniels, Uppsala University Bob Fulkerth, Golden Gate University Mark A. Fuller, Baylor University Sheizaf Rafaeli, University of Michigan Minnie Ghent, Florida Atlantic University Sasan Rahmatian, California State University, Fresno Amita Goyal, Virginia Commonwealth University Mary Reed, Jamestown College Bobby Granville, Florida A&M University Brian Reithel, University of Mississippi Jeet Gupta, Ball State University Eliot Rich, University at Albany, SUNY Vijay Gurbaxani, University of California, Irvine Leasa Richards-Mealy, Columbia College Rassule Hadidi, University of Illinois, Springfield James Riha, Northern Illinois University Jeff Harper, Indiana State University Stephanie Robbins, University of North Carolina, William L. Harrison, Oregon State University Charlotte Joe Harrison, Union University Marcel Robelis, University of North Dakota Albert M. Hayashi, Loyola Marymount University Juan Robertson, Central Washington University Anthony Hendrickson, Iowa State University Ian Robinson, University of San Francisco Michelle Hepner, University of Central Oklahoma Alan Roper, Golden Gate University Rick Hicks, Florida Atlantic University Paula Ruby, Arkansas State University Marianne Hill, Furman University Naveed Saleem, University of Houston, Clear Lake Bart Hodge, Virginia Commonwealth University Joko W. Saputro, University of Wisconsin, Madison Jack Hogue, University of North Carolina, Charlotte David Scanlan, California State University, Sacramento Rui Huang, Binghamton University, SUNY Werner Schenk, University of Rochester George Jacobson, California State University, Los Angeles Kala Chand Seal, Loyola Marymount University Carolyn Jacobson, Marymount University Richard S. Segall, Arkansas State University Murray Jennex, University of Phoenix Sherri Shade, Kennesaw State University Rob Kauffman, University of Minnesota Ivan J. Singer, University of Hartford Timothy Kayworth, Baylor University Rod Sink, Northern Illinois University Robert W. Key, University of Phoenix Jill Y. Smith, University of Denver Stephen Klein, Ramapo College Guy Smith, Embry-Riddle Aeronautical University Virginia Kleist, West Virginia State University Kathy Stevens, Merrimack College Cenk Kocas, Michigan State University Troy Strader, Drake University Brian Kovar, Kansas State University Dennis Strouble, Bowling Green State University Al Lederer, University of Kentucky Michael JD Sutton, Kent State University Robert Lee, Chapman University E. Burton Swanson, University of California, Los Roger Letts, Fairleigh Dickinson University Angeles Stanley Lewis, The University of Southern Mississippi Gladys Swindler, Fort Hays State University Teresita Leyell, Washburn University Bernadette Szajna, Texas Christian University Susan K. Lippert, George Washington University John Tarjan, California State University, Bakersfield Bruce Lo, University of Wisconsin-Eau Claire Pam Taylor, University of Tennessee at Chattanooga Carl Longnecker, Loyola University David Teneyuca, Schreiner University Treise Lynn, Wingate University Claire Theriault-Perkins, University of Maine at Augusta Jane Mackay, Texas Christian University Jennifer Thomas, Pace University Efrem G. Mallach, University of Massachusetts, Lowell Kranti Toraskar, Penn State University Gary Margot, Ashland University Goran Trajkovski, Towson University Kipp Martin, University of Chicago Duane Truex, Georgia State University Richard O. Mason, Southern Methodist University Douglas Turner, State University of West Georgia Khris McAlister, University of Alabama, Birmingham B.S. Vijayaraman, University of Akron Ronald E. McGaughey, Arkansas Tech University Patrick J. Walsh, State University of New York, Roger McHaney, Kansas State University Binghamton Patricia McQuaid, California Polytechnic State Institute Diane Walz, University of Texas, San Antonio Charles Menifield, University of Memphis Peter Weill, Massachusetts Institute of Technology Lisa Miller, University of Central Oklahoma Frederick Wheeler, University of Maryland, University Cindi Nadelman, New England College College Peter J. Natale, Regent University Lanny Wilke, Montana State University-Northern Denise Nitterhouse, DePaul University Karen L. Williams, University of Texas at San Antonio Alan Graham Peace, West Virginia University Jennifer Williams, University of Southern Indiana Leah R. Pietron, University of Nebraska Paul Witman, California Lutheran University Jack Powell, University of South Dakota Erma Wood, University of Arkansas, Little Rock Leonard Presby, William Patterson University Kathie Wright, Purdue University