{"id":42,"date":"2018-07-07T18:09:15","date_gmt":"2018-07-07T18:09:15","guid":{"rendered":"http:\/\/opentextbook.site\/informationsystems2018\/back-matter\/index\/"},"modified":"2019-07-26T17:37:50","modified_gmt":"2019-07-26T17:37:50","slug":"index","status":"publish","type":"back-matter","link":"https:\/\/opentextbook.site\/informationsystems2019\/back-matter\/index\/","title":{"rendered":"Index"},"content":{"raw":"Below are listed terms that can be found in this text. The terms are indexed by chapter and page. For example, \"12-254\" indicates that the term can be found in chapter 12 on page 254. Please also note that page numbers may vary based upon how you are reading this text!\r\n\r\nAcceptable User Policy, 12-254\r\nAccess control, 6-127\r\nAgile methodologies, 10-205\r\nAltair 8800, 1-20\r\nApple II, 1-20\r\nApplication software, 1-16, 3-57\r\nARPA Net, 1-225-104\r\nAssembly language, 10-210\r\nAuthentication, 6-125\r\nAutonomous devices, 13-289\r\nAvailability, 6-125\r\n\r\nBackups, 6-131\r\nBerners-Lee, Tim, 1-22\r\nBig Data, 4-91, 4-93\r\nBinary, 2-33, -34\r\nBinary prefixes, 2-36\r\nBiometrics, 6-126\r\nBit, 2-33\r\nBitcoin, 11-245\r\nBlockchain, 11-244\r\nBluetooth, 2-43, 5-114\r\nBrynjolfson, Eric, 7-146\r\nBuild v. buy, 10-218\r\nBus, 2-39\r\nBusiness Analytics, 4-98\r\nBusiness Intelligence, 4-98\r\nBusiness process, 8-163\r\nBusiness Process Management (BPM), 7-153, 8-168\r\nBusiness process re-engineering, 8-170\r\nByte, 2-33&lt;\/p&gt;\r\nCambridge Analytica, 12-251\r\nCareer paths, 9-189\r\nCarr, Nicholas, 1-12, 2-26, 7-147\r\nCASE tools, 10-215\r\nCastells, Manuel, 11-233\r\nCellphone abroad, 5-114\r\nCentral Processing Unit (CPU), 2-36, video 2-37, multi-core 2-45\r\nCertifications, 9-190\r\nChange management, 10-223\r\nChief Information Officer (CIO), 9-186\r\nClient-server, 1-21, 5-116\r\nCloud computing, 1-25, 3-68, 5-118\r\nCollaborative systems, 7-155, 13-283\r\nCode of ethics, 12-252\r\nCommoditization, 2-50\r\nCompetitive advantage, 1-13, 2-26, 7-147, 7-153, 7-158\r\nCompiled v. interpreted, 10-213\r\nComponents, 1-14\r\nComputer engineer, 9-183\r\nComputer operator, 9-185\r\nConfidentiality, 6-124\r\nCopyright, 12-256\r\nCreative Commons, 12-261\r\nCross platform development, 10-221\r\nCustomer Relationship Management (CRM), 3-65\r\n\r\nData dictionary, 4-93\r\nData-Information-Knowledge-Wisdom, 4-77\r\nData integrity, 4-86\r\nData mining, 4-96, sidebar, 4-97\r\nData privacy, 12-251\r\nData types, 4-83\r\nData warehouse, 4-93, benefits, 4-95\r\nDatabase, 4-78\r\nDatabase administrator, 9-185\r\nDatabase, enterprise, 4-91\r\nDatabase spreadsheet sidebar, 4-85\r\nDatabase Management System (DBMS), 4-90\r\nDatabase, Relational, 4-78\r\nDecimal numbering system, 2-34\r\nDecision Support Systems (DSS), 7-156\r\nDeveloper, 9-183\r\nDigital devices, 2-33\r\nDigital divide, 11-240\r\nDigital Millennium Copyright Act, 12-260\r\nDisintermediation, 1-23\r\nDomain name, 5-107\r\nDNS, 5-107\r\nDo Not Track, 12-273\r\nDot-comm bubble, 1-235, 5-109\r\nDouble Data Rate (DDR), 2-40\r\n\r\nEclipse IDE, 3-61\r\nElectronic Data Interchange (EDI), 7-154\r\nEmail, 5-110\r\nEncryption, 6-128\r\nEnd-user computing, 10-220\r\nEnterprise Resource Planning (ERP), 1-21, 3-64, 8-166\r\nEras, business computing, 1-25\r\nEthics, 12-250\r\nExtranet, 5-117\r\n\r\nFacebook, 11-251, 13-280\r\nFair use, 12-258\r\nFamily Educational Rights and Privacy Act, 12-271\r\nFernandes, Benjamin, 11-245\r\nFindable, 13-286\r\nFirewalls, 6-132\r\nFirst sale doctrine, 12-257\r\nFord, Henry, 12-250\r\nFriedman, Thomas, 11-234\r\n\r\nGantt chart, 9-188\r\nGeneral Data Protection Regulation, 12-272\r\nGlobal firm, 11-236\r\nGlobalization, 11-232\r\nGhemawat, Pankaj, 11-236\r\n\r\nHammer, Michael, 8-170\r\nHard disk, 2-41\r\nHardware, 1-15, 2-32\r\nHealth Insurance Portability and Accountability Act, 12-271\r\nHuang\u2019s Law, 2-38\r\n\r\nImplementation Methodologies, 10-222\r\nInformation security triad, 6-124\r\nInformation systems, 1-14\r\nInformation systems employment, 9-180\r\nIntegrity, 6-124\r\nIntellectual property, 12-255\r\nInternet speed, 11-239\r\nInternet usage statistics, 11-233\r\nIntrusion Detection System (IDS), 6-133\r\nIBM-PC, 1-20\r\nIntegrated circuits, 2-45\r\nInternet, 1-22, internet and www, 5-111, high speed, 5-111\r\nInternet of Things (IoT), 2-49, 13-286, install, 13-287\r\nIP address, 5-106\r\nIntegrated Development Environment (IDE), 10-214\r\nInternet user worldwide, 5-108\r\nIntranet, 5-116\r\nIsabel, 7-157\r\nISO certification, 8-174\r\nIT doesn\u2019t matter, 7-147\r\n\r\nKey-Value database, 4-89\r\nKim, Paul, 11-243\r\nKnowledge Management (KM), 4-98\r\n\r\nLaptop, 1-12\r\nLean methodologies, 10-207\r\nLinux, 3-56\r\nLocal Area Network (LAN), 1-21\r\n\r\nMachine code, 10-209\r\nMainframe, 1-18\r\nManufacturing Resource Planning (MRP), 1-19\r\nMetadata, 4-92\r\nMetcaffe\u2019s Law, 5-119\r\nMicrosoft Excel, 3-57\r\nMobile applications, 3-67, building, 10-221, cross platform, 10-221\r\nMobile phone users worldwide, 13-280\r\nMobile networking, 5-113\r\nMobile security, 6-136\r\nMobile technology trends, 13-282\r\nMotherboard, 2-39\r\nMoore\u2019s Law, 2-37\r\n\r\nNanobot, 13-289\r\nNetwork Interface Card (NIC), 2-44\r\nNielsen, Jakob, 11-241\r\nNon-obvious relationship awareness, 12-269\r\nNormalization, 4-82\r\nNoSQL, 4-89\r\n\r\nOffice application suites, 3-60\r\nOpen source software, 3-71\r\nOpenoffice, 3-72\r\nOperating systems, 1-15, 3-55\r\nOutsourcing, 9-193\r\nOwnership of software, 3-63\r\n\r\nPacket, 5-106\r\nPassword security, 6-130\r\nPatent, 12-263\r\nPatent troll, 12-265\r\nPC, 1-12\r\nPersonal information security, 6-138\r\nPersonally identifiable information, 12-268\r\nPhysical security, 6-134\r\nPowerpoint, 3-62\r\nPortable computer, 2-47\r\nPorter\u2019s five forces, 7-150\r\nPost PC world, 1-24\r\nPrimary key, 4-80\r\nPrintable, 13-284\r\nPrivacy, data, 4-97, 12-267\r\nProcedural v. object-oriented, 10-213\r\nProductivity paradox, 7-146\r\nProductivity software, 3-58\r\nProject manager, 9-188\r\nProgramming language spectrum, 10-212\r\nProtocol, 5-108\r\nPublic key encryption, 6-129\r\n\r\nQuality triangle, 10-208\r\n\r\nRandom Access Memory (RAM), 2-40\r\nRapid Application Development (RAD), 10-203\r\nRetail Link, Walmart, 1-27\r\nRouter, 5-106\r\nRSA SecurID token, 6-126\r\n\r\nSecurity policies, 6-135\r\nSharepoint, 5-118\r\nSmartphone, 1-12, 2-47\r\nSoftware, 1-15\r\nSolid State Drive (SSD), 2-41\r\nStop Think Connect, 6-139\r\nStructured Query Language (SQL) 4-86\r\nStudent Clubs database, 4-81\r\nSupply Chain Management, 1-27, 3-66\r\nSupport analyst, 9-185\r\nSwitch, 5-106\r\nSystems analyst, 9-181\r\nSystems Development Life Cycle (SDLC), 10-200\r\n\r\nTableau, 3-62\r\nTablet, 2-48, decline, 13-282\r\nTCP\/IP, 5-105\r\nTed talk fibre optic, 1-23\r\nTime-sharing, 1-19\r\nTrademark, 12-265\r\n\r\nUniversal Serial Bus (USB), 2-42\r\nUnmanned Aerial Vehicle, 13-290\r\nUsability, 6-138\r\nUsers, adoption types, 9-194\r\n\r\nValue chain, 7-148\r\nVirtual Machine (VM), 3-70\r\nVirtual Private Network (VPN), 6-133\r\nVirtualization, 3-70\r\nVoice Over IP (VOIP), 5-115\r\n\r\nWalmart, 1-26, 4-91\r\nWearable, 13-282\r\nWeb 2.0, 1-23, 5-109\r\nWeb services, 10-219\r\nWebsite, build, 10-216\r\nWi-fi, 5-112\r\nWindows operating system, 1-20\r\nWord size, 2-34\r\nWorld 3.0, 11-236\r\nWorld is flat, 11-234\r\nWorld Wide Web (WWW), 1-22","rendered":"<p>Below are listed terms that can be found in this text. The terms are indexed by chapter and page. For example, &#8220;12-254&#8221; indicates that the term can be found in chapter 12 on page 254. Please also note that page numbers may vary based upon how you are reading this text!<\/p>\n<p>Acceptable User Policy, 12-254<br \/>\nAccess control, 6-127<br \/>\nAgile methodologies, 10-205<br \/>\nAltair 8800, 1-20<br \/>\nApple II, 1-20<br \/>\nApplication software, 1-16, 3-57<br \/>\nARPA Net, 1-225-104<br \/>\nAssembly language, 10-210<br \/>\nAuthentication, 6-125<br \/>\nAutonomous devices, 13-289<br \/>\nAvailability, 6-125<\/p>\n<p>Backups, 6-131<br \/>\nBerners-Lee, Tim, 1-22<br \/>\nBig Data, 4-91, 4-93<br \/>\nBinary, 2-33, -34<br \/>\nBinary prefixes, 2-36<br \/>\nBiometrics, 6-126<br \/>\nBit, 2-33<br \/>\nBitcoin, 11-245<br \/>\nBlockchain, 11-244<br \/>\nBluetooth, 2-43, 5-114<br \/>\nBrynjolfson, Eric, 7-146<br \/>\nBuild v. buy, 10-218<br \/>\nBus, 2-39<br \/>\nBusiness Analytics, 4-98<br \/>\nBusiness Intelligence, 4-98<br \/>\nBusiness process, 8-163<br \/>\nBusiness Process Management (BPM), 7-153, 8-168<br \/>\nBusiness process re-engineering, 8-170<br \/>\nByte, 2-33&lt;\/p&gt;<br \/>\nCambridge Analytica, 12-251<br \/>\nCareer paths, 9-189<br \/>\nCarr, Nicholas, 1-12, 2-26, 7-147<br \/>\nCASE tools, 10-215<br \/>\nCastells, Manuel, 11-233<br \/>\nCellphone abroad, 5-114<br \/>\nCentral Processing Unit (CPU), 2-36, video 2-37, multi-core 2-45<br \/>\nCertifications, 9-190<br \/>\nChange management, 10-223<br \/>\nChief Information Officer (CIO), 9-186<br \/>\nClient-server, 1-21, 5-116<br \/>\nCloud computing, 1-25, 3-68, 5-118<br \/>\nCollaborative systems, 7-155, 13-283<br \/>\nCode of ethics, 12-252<br \/>\nCommoditization, 2-50<br \/>\nCompetitive advantage, 1-13, 2-26, 7-147, 7-153, 7-158<br \/>\nCompiled v. interpreted, 10-213<br \/>\nComponents, 1-14<br \/>\nComputer engineer, 9-183<br \/>\nComputer operator, 9-185<br \/>\nConfidentiality, 6-124<br \/>\nCopyright, 12-256<br \/>\nCreative Commons, 12-261<br \/>\nCross platform development, 10-221<br \/>\nCustomer Relationship Management (CRM), 3-65<\/p>\n<p>Data dictionary, 4-93<br \/>\nData-Information-Knowledge-Wisdom, 4-77<br \/>\nData integrity, 4-86<br \/>\nData mining, 4-96, sidebar, 4-97<br \/>\nData privacy, 12-251<br \/>\nData types, 4-83<br \/>\nData warehouse, 4-93, benefits, 4-95<br \/>\nDatabase, 4-78<br \/>\nDatabase administrator, 9-185<br \/>\nDatabase, enterprise, 4-91<br \/>\nDatabase spreadsheet sidebar, 4-85<br \/>\nDatabase Management System (DBMS), 4-90<br \/>\nDatabase, Relational, 4-78<br \/>\nDecimal numbering system, 2-34<br \/>\nDecision Support Systems (DSS), 7-156<br \/>\nDeveloper, 9-183<br \/>\nDigital devices, 2-33<br \/>\nDigital divide, 11-240<br \/>\nDigital Millennium Copyright Act, 12-260<br \/>\nDisintermediation, 1-23<br \/>\nDomain name, 5-107<br \/>\nDNS, 5-107<br \/>\nDo Not Track, 12-273<br \/>\nDot-comm bubble, 1-235, 5-109<br \/>\nDouble Data Rate (DDR), 2-40<\/p>\n<p>Eclipse IDE, 3-61<br \/>\nElectronic Data Interchange (EDI), 7-154<br \/>\nEmail, 5-110<br \/>\nEncryption, 6-128<br \/>\nEnd-user computing, 10-220<br \/>\nEnterprise Resource Planning (ERP), 1-21, 3-64, 8-166<br \/>\nEras, business computing, 1-25<br \/>\nEthics, 12-250<br \/>\nExtranet, 5-117<\/p>\n<p>Facebook, 11-251, 13-280<br \/>\nFair use, 12-258<br \/>\nFamily Educational Rights and Privacy Act, 12-271<br \/>\nFernandes, Benjamin, 11-245<br \/>\nFindable, 13-286<br \/>\nFirewalls, 6-132<br \/>\nFirst sale doctrine, 12-257<br \/>\nFord, Henry, 12-250<br \/>\nFriedman, Thomas, 11-234<\/p>\n<p>Gantt chart, 9-188<br \/>\nGeneral Data Protection Regulation, 12-272<br \/>\nGlobal firm, 11-236<br \/>\nGlobalization, 11-232<br \/>\nGhemawat, Pankaj, 11-236<\/p>\n<p>Hammer, Michael, 8-170<br \/>\nHard disk, 2-41<br \/>\nHardware, 1-15, 2-32<br \/>\nHealth Insurance Portability and Accountability Act, 12-271<br \/>\nHuang\u2019s Law, 2-38<\/p>\n<p>Implementation Methodologies, 10-222<br \/>\nInformation security triad, 6-124<br \/>\nInformation systems, 1-14<br \/>\nInformation systems employment, 9-180<br \/>\nIntegrity, 6-124<br \/>\nIntellectual property, 12-255<br \/>\nInternet speed, 11-239<br \/>\nInternet usage statistics, 11-233<br \/>\nIntrusion Detection System (IDS), 6-133<br \/>\nIBM-PC, 1-20<br \/>\nIntegrated circuits, 2-45<br \/>\nInternet, 1-22, internet and www, 5-111, high speed, 5-111<br \/>\nInternet of Things (IoT), 2-49, 13-286, install, 13-287<br \/>\nIP address, 5-106<br \/>\nIntegrated Development Environment (IDE), 10-214<br \/>\nInternet user worldwide, 5-108<br \/>\nIntranet, 5-116<br \/>\nIsabel, 7-157<br \/>\nISO certification, 8-174<br \/>\nIT doesn\u2019t matter, 7-147<\/p>\n<p>Key-Value database, 4-89<br \/>\nKim, Paul, 11-243<br \/>\nKnowledge Management (KM), 4-98<\/p>\n<p>Laptop, 1-12<br \/>\nLean methodologies, 10-207<br \/>\nLinux, 3-56<br \/>\nLocal Area Network (LAN), 1-21<\/p>\n<p>Machine code, 10-209<br \/>\nMainframe, 1-18<br \/>\nManufacturing Resource Planning (MRP), 1-19<br \/>\nMetadata, 4-92<br \/>\nMetcaffe\u2019s Law, 5-119<br \/>\nMicrosoft Excel, 3-57<br \/>\nMobile applications, 3-67, building, 10-221, cross platform, 10-221<br \/>\nMobile phone users worldwide, 13-280<br \/>\nMobile networking, 5-113<br \/>\nMobile security, 6-136<br \/>\nMobile technology trends, 13-282<br \/>\nMotherboard, 2-39<br \/>\nMoore\u2019s Law, 2-37<\/p>\n<p>Nanobot, 13-289<br \/>\nNetwork Interface Card (NIC), 2-44<br \/>\nNielsen, Jakob, 11-241<br \/>\nNon-obvious relationship awareness, 12-269<br \/>\nNormalization, 4-82<br \/>\nNoSQL, 4-89<\/p>\n<p>Office application suites, 3-60<br \/>\nOpen source software, 3-71<br \/>\nOpenoffice, 3-72<br \/>\nOperating systems, 1-15, 3-55<br \/>\nOutsourcing, 9-193<br \/>\nOwnership of software, 3-63<\/p>\n<p>Packet, 5-106<br \/>\nPassword security, 6-130<br \/>\nPatent, 12-263<br \/>\nPatent troll, 12-265<br \/>\nPC, 1-12<br \/>\nPersonal information security, 6-138<br \/>\nPersonally identifiable information, 12-268<br \/>\nPhysical security, 6-134<br \/>\nPowerpoint, 3-62<br \/>\nPortable computer, 2-47<br \/>\nPorter\u2019s five forces, 7-150<br \/>\nPost PC world, 1-24<br \/>\nPrimary key, 4-80<br \/>\nPrintable, 13-284<br \/>\nPrivacy, data, 4-97, 12-267<br \/>\nProcedural v. object-oriented, 10-213<br \/>\nProductivity paradox, 7-146<br \/>\nProductivity software, 3-58<br \/>\nProject manager, 9-188<br \/>\nProgramming language spectrum, 10-212<br \/>\nProtocol, 5-108<br \/>\nPublic key encryption, 6-129<\/p>\n<p>Quality triangle, 10-208<\/p>\n<p>Random Access Memory (RAM), 2-40<br \/>\nRapid Application Development (RAD), 10-203<br \/>\nRetail Link, Walmart, 1-27<br \/>\nRouter, 5-106<br \/>\nRSA SecurID token, 6-126<\/p>\n<p>Security policies, 6-135<br \/>\nSharepoint, 5-118<br \/>\nSmartphone, 1-12, 2-47<br \/>\nSoftware, 1-15<br \/>\nSolid State Drive (SSD), 2-41<br \/>\nStop Think Connect, 6-139<br \/>\nStructured Query Language (SQL) 4-86<br \/>\nStudent Clubs database, 4-81<br \/>\nSupply Chain Management, 1-27, 3-66<br \/>\nSupport analyst, 9-185<br \/>\nSwitch, 5-106<br \/>\nSystems analyst, 9-181<br \/>\nSystems Development Life Cycle (SDLC), 10-200<\/p>\n<p>Tableau, 3-62<br \/>\nTablet, 2-48, decline, 13-282<br \/>\nTCP\/IP, 5-105<br \/>\nTed talk fibre optic, 1-23<br \/>\nTime-sharing, 1-19<br \/>\nTrademark, 12-265<\/p>\n<p>Universal Serial Bus (USB), 2-42<br \/>\nUnmanned Aerial Vehicle, 13-290<br \/>\nUsability, 6-138<br \/>\nUsers, adoption types, 9-194<\/p>\n<p>Value chain, 7-148<br \/>\nVirtual Machine (VM), 3-70<br \/>\nVirtual Private Network (VPN), 6-133<br \/>\nVirtualization, 3-70<br \/>\nVoice Over IP (VOIP), 5-115<\/p>\n<p>Walmart, 1-26, 4-91<br \/>\nWearable, 13-282<br \/>\nWeb 2.0, 1-23, 5-109<br \/>\nWeb services, 10-219<br \/>\nWebsite, build, 10-216<br \/>\nWi-fi, 5-112<br \/>\nWindows operating system, 1-20<br \/>\nWord size, 2-34<br \/>\nWorld 3.0, 11-236<br \/>\nWorld is flat, 11-234<br \/>\nWorld Wide Web (WWW), 1-22<\/p>\n","protected":false},"author":1,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"back-matter-type":[],"contributor":[],"license":[],"class_list":["post-42","back-matter","type-back-matter","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/back-matter\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/back-matter"}],"about":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/types\/back-matter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":4,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/back-matter\/42\/revisions"}],"predecessor-version":[{"id":925,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/back-matter\/42\/revisions\/925"}],"metadata":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/back-matter\/42\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/media?parent=42"}],"wp:term":[{"taxonomy":"back-matter-type","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/pressbooks\/v2\/back-matter-type?post=42"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/contributor?post=42"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems2019\/wp-json\/wp\/v2\/license?post=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}