Introduction to Information Systems 5e by Rainer, Prince, Cegielski
Introduction to Information Systems 5e by Rainer, Prince, Cegielski is the 5th edition of the Introduction to Information Systems: Supporting and Transforming Business textbook authored by R. Kelly Rainer, Brad Prince, and Casey G. Cegielski with contributions by Alina M. Chircu, Bentley University, and Marco Marabelli, Bentley University, and published in 2014 by John Wiley & Sons, Inc.
- Application (or app). A computer program designed to support a specific task or business process.
- Business intelligence systems (BI systems). Provide computer-based support for complex, nonroutine decisions, primarily for middle managers and knowledge workers.
- Computer-based information system (CBIS). An information system that uses computer technology to perform some or all of its intended tasks.
- Dashboards. A special form of IS that support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
- Data items. An elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
- Database. A collection of related files or tables containing data.
- Electronic commerce systems (e-commerce systems). A type of interorganizational information system that enables organizations to conduct transactions, called business-to-business electronic commerce, and customers to conduct transactions with businesses, called business-to-consumer electronic commerce.
- Enterprise resource planning systems (ERP systems). Information systems that correct a lack of communication among the functional area ISs by tightly integrating the functional area ISs via a common database.
- Ergonomics. The science of adapting machines and work environments to people; focuses on creating an environment that is safe, well lit, and comfortable.
- Expert systems (ESs). Attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
- Functional area information systems (FAISs). ISs that support a particular functional area within the organization.
- Hardware. A device such as a processor, monitor, keyboard, or printer. Together, these devices accept, process, and display data and information.
- Information. Data that have been organized so that they have meaning and value to the recipient.
- Information system (IS). Collects, processes, stores, analyzes, and disseminates information for a specific purpose.
- Information technology (IT). Relates to any computer-based tool that people use to work with information and support the information and information-processing needs of an organization.
- Information technology components. Hardware, software, databases, and networks.
- Information technology infrastructure. IT components plus IT services.
- Information technology platform. Formed by the IT components of hardware, software, networks (wireline and wireless), and databases.
- Information technology services. IT personnel use IT components to perform these IT services: develop information systems, oversee security and risk, and manage data.
- Informed user. A person knowledgeable about information systems and information technology.
- Interorganizational information systems (IOSs). Information systems that connect two or more organizations.
- Knowledge. Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem or activity.
- Knowledge workers. Professional employees such as financial and marketing analysts, engineers, lawyers, and accountants, who are experts in a particular subject area and create information and knowledge, which they integrate into the business.
- Network. A connecting system (wireline or wireless) that permits different computers to share resources.
- Procedures. The set of instructions for combining hardware, software, database, and network components in order to process information and generate the desired output.
- Software. A program or collection of programs that enable the hardware to process data.
- Supply chain. The flow of materials, information, money, and services from suppliers of raw materials through factories and warehouses to the end customers.
- Transaction processing system (TPS). Supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
- Business environment. The combination of social, legal, economic, physical, and political factors in which businesses conduct their operations.
- Business–information technology alignment. The tight integration of the IT function with the strategy, mission, and goals of the organization.
- Business process. A collection of related activities that produce a product or a service of value to the organization, its business partners, and/or its customers.
- Business process improvement (BPI). A methodology for achieving incremental improvements in the effectiveness and efficiency of a process.
- Business process management (BPM). A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
- Business process reengineering (BPR). A radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a "clean sheet" (from scratch).
- Competitive advantage. An advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-average profits.
- Competitive forces model. A business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company's position.
- Cross-functional business process. A process in which no single functional area is responsible for its completion; multiple functional areas collaborate to perform the function.
- Digital divide. The gap between those who have access to information and communications technology and those who do not.
- Entry barrier. Product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete.
- Globalization. The integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology.
- Individual social responsibility. See organizational social responsibility.
- Make-to-order. The strategy of producing customized products and services.
- Mass customization. A production process in which items are produced in large quantities but are customized to fit the desires of each customer.
- Organizational social responsibility (also individual social responsibility). Efforts by organizations to solve various social problems.
- Primary activities. Those business activities related to the production and distribution of the firm's products and services, thus creating value.
- Six Sigma. A methodology for continuous BPI focused on reducing defects in process outputs by using statistical methods.
- Strategic information systems (SISs). Systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity.
- Support activities. Business activities that do not add value directly to a firm's product or service under consideration but support the primary activities that do add value.
- Value chain. A sequence of activities through which the organization's inputs, whatever they are, are transformed into more valuable outputs, whatever they are.
- Value chain model. Model that shows the primary activities that sequentially add value to the profit margin; also shows the support activities.
- Value system. Includes the producers, suppliers, distributors, and buyers, all with their value chains.
- Accountability. A tenet of ethics that refers to determining who is responsible for actions that were taken.
- Code of ethics. A collection of principles intended to guide decision making by members of an organization.
- Digital dossier. An electronic description of an individual and his or her habits.
- Electronic surveillance. Tracking people's activities with the aid of computers.
- Ethics. The principles of right and wrong that individuals use to make choices to guide their behaviors.
- Information privacy. The right to determine when, and to what extent, personal information can be gathered by and/or communicated to others.
- Liability. A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
- Opt-in model. A model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it.
- Opt-out model. A model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.
- Privacy. The right to be left alone and to be free of unreasonable personal intrusions.
- Privacy codes. See privacy policies.
- Privacy policies (also known as privacy codes). An organization's guidelines for protecting the privacy of customers, clients, and employees.
- Profiling. The process of forming a digital dossier.
- Responsibility. A tenet of ethics in which you accept the consequences of your decisions and actions.
- Access controls. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
- Adware. Alien software designed to help pop-up advertisements appear on your screen.
- Alien software. Clandestine software that is installed on your computer through duplicitous methods.
- Anti-malware systems (antivirus software). Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
- Audit. An examination of information systems, their inputs, outputs, and processing.
- Authentication. A process that determines the identity of the person requiring access.
- Authorization. A process that determines which actions, rights, or privileges the person has, based on verified identity.
- Back door. Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
- Biometrics. The science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject's physiologic or behavioral characteristics.
- Blacklisting. A process in which a company identifies certain types of software that are not allowed to run in the company environment.
- Bot. A computer that has been compromised by, and under the control of, a hacker.
- Botnet. A network of computers that have been compromised by, and under control of a hacker, who is called the botmaster.
- Certificate authority. A third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
- Cold site. A backup location that provides only rudimentary services and facilities.
- Communications controls (also network controls). Controls that deal with the movement of data across networks.
- Controls. Defense mechanisms (also called countermeasures).
- Cookie. Small amounts of information that Web sites store on your computer, temporarily or more or less permanently.
- Copyright. A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.
- Cybercrime. Illegal activities executed on the Internet.
- Cyberterrorism. Can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
- Cyberwarfare. War in which a country's information systems could be paralyzed from a massive attack by destructive software.
- Demilitarized zone (DMZ). A separate organizational local area network that is located between an organization's internal network and an external network, usually the Internet.
- Denial-of-service attack. A cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.
- Digital certificate. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
- Distributed denial-of-service attack (DDoS attack). A denial-ofservice attack that sends a flood of data packets from many compromised computers simultaneously.
- Employee monitoring systems. Systems that monitor employees' computers, e-mail activities, and Internet surfing activities.
- Encryption. The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
- Exposure. The harm, loss, or damage that can result if a threat compromises an information resource.
- Firewall. A system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network.
- Hot sites. A fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicates your company's computing resources and provides near-real-time recovery of IT operations.
- Identity theft. Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.
- Information security. Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
- Intellectual property. The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.
- Least privilege. A principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.
- Logic bombs. Segments of computer code embedded within an organization's existing computer programs.
- Malware. Malicious software such as viruses and worms.
- Network controls. See communications controls.
- Password. A private combination of characters that only the user should know.
- Patent. A document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.
- Phishing attack. An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.
- Physical controls. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
- Piracy. Copying a software program (other than freeware, demo software, etc.) without making payment to the owner.
- Privacy. The right to be left alone and to be free of unreasonable personal intrusion.
- Privilege. A collection of related computer system operations that can be performed by users of the system.
- Public-key encryption (also called asymmetric encryption). A type of encryption that uses two different keys, a public key and a private key.
- Risk. The likelihood that a threat will occur.
- Risk acceptance. A strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
- Risk analysis. The process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
- Risk limitation. A strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
- Risk management. A process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels.
- Risk mitigation. A process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
- Risk transference. A process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.
- Secure socket layer (SSL, also known as transport layer security). An encryption standard used for secure transactions such as credit card purchases and online banking.
- Security. The degree of protection against criminal activity, danger, damage, and/or loss.
- Social engineering. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
- Spam. Unsolicited e-mail.
- Spamware. Alien software that uses your computer as a launch platform for spammers.
- Spyware. Alien software that can record your keystrokes and/or capture your passwords.
- Threat. Any danger to which an information resource may be exposed.
- Trade secret. Intellectual work, such as a business plan, that is a company secret and is not based on public information.
- Transport layer security (TLS). See secure socket layer.
- Trap doors. See back door.
- Trojan horse. A software program containing a hidden function that presents a security risk.
- Tunneling. A process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
- Virtual private network (VPN). A private network that uses a public network (usually the Internet) to securely connect users by using encryption.
- Viruses. Malicious software that can attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection.
- Vulnerability. The possibility that an information resource will be harmed by a threat.
- Warm site. A site that provides many of the same services and options of the hot site, but does not include the company's applications.
- Whitelisting. A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
- Worms. Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
- Zombie computer. See bot.
- Attribute. Each characteristic or quality describing a particular entity.
- Best practices. The most effective and efficient ways to do things.
- Big Data. Diverse, high-volume, high-velocity information assets that require new forms of processing to enable enhanced decision making, insight discovery, and process optimization.
- Bit. A binary digit -- that is, a 0 or a 1.
- Byte. A group of eight bits that represents a single character.
- Clickstream data. Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site.
- Data dictionary. Collection of definitions of data elements; data characteristics that use the data elements; and the individuals, business functions, applications, and reports that use this data element.
- Data file. A collection of logically related records (see table).
- Data governance. An approach to managing information across an entire organization.
- Data mart. A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department.
- Data model. Definition of the way data in a DBMS are conceptually structured.
- Data warehouse. A repository of historical data that are organized by subject to support decision makers in the organization.
- Database. A group of logically related files that stores data and the associations among them.
- Database management system (DBMS). The software program (or group of programs) that provides access to a database.
- Entity. A person, place, thing, or event about which information is maintained in a record.
- Entity classes. Groupings of entities of a given type.
- Entity-relationship diagram (ER diagram). Document that shows data entities and attributes and relationships among them.
- Entity-relationship modeling (ER modeling). The process of designing a database by organizing data entities to be used and identifying the relationships among them.
- Explicit knowledge. The more objective, rational, and technical types of knowledge.
- Field. A grouping of logically related characters into a word, a small group of words, or a complete number.
- File. A grouping of logically related records.
- Identifiers. Attributes that are unique to an entity instance.
- Instance. A particular entity within an entity class.
- Intellectual capital (or intellectual assets). Other terms for knowledge.
- Knowledge management (KM). A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner.
- Knowledge management systems (KMSs). Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management.
- Master data. A set of core data, such as customer, product, employee, vendor, geographic location, and so on, that spans an enterprise's information systems.
- Master data management. A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data.
- Multidimensional structure. Storage of data in more than two dimensions; a common representation is the data cube.
- Normalization. A method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.
- NoSQL databases. Databases that can manipulate structured as well as unstructured data and inconsistent or missing data; are useful when working with Big Data.
- Online transaction processing (OLTP). Processing of business transactions online as soon as they occur.
- Primary key. The identifier field or attribute that uniquely identifies a record.
- Query by example (QBE). Database language that enables the user to fill out a grid (form) to construct a sample or description of the data wanted.
- Record. A grouping of logically related fields; describes an entity.
- Relational database model. Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
- Secondary key. An identifier field or attribute that has some identifying information but typically does not identify the file with complete accuracy.
- Structured query language (SQL). Popular relational database language that enables users to perform complicated searches with relatively simple instructions.
- Table. A grouping of logically related records (see data file).
- Tacit knowledge. The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.
- Affinity portal. A Web site that offers a single point of entry to an entire community of affiliated interests.
- Analog signals. Continuous waves that transmit information by altering the amplitude and frequency of the waves.
- Backbone networks. High-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect.
- Bandwidth. The transmission capacity of a network, stated in bits per second.
- Broadband. The transmission capacity of a communications medium faster than 4 Mbps downstream and 1 Mbps upstream.
- Broadcast media (also called wireless media). Communications channels that use electromagnetic media (the "airwaves") to transmit data.
- Browsers. Software applications through which users primarily access the Web.
- Cable media (also called wireline media). Communications channels that use physical wires or cables to transmit data and information.
- Chat room. A virtual meeting place where groups of regulars come to "gab" electronically.
- Client/server computing. Form of distributed processing in which some machines (servers) perform computing functions for end-user PCs (clients).
- Clients. Computers, such as users' personal computers, that use any of the services provided by servers.
- Coaxial cable. Insulated copper wire; used to carry high-speed data traffic and television signals.
- Collaboration. Mutual efforts by two or more individuals who perform activities in order to accomplish certain tasks.
- Commercial portal (public portal). A Web site that offers fairly routine content for diverse audiences; offers customization only at the user interface.
- Communications channel. Pathway for communicating data from one location to another.
- Computer network. A system that connects computers and other devices via communications media so that data and information can be transmitted among them.
- Corporate portal. A Web site that provides a single point of access to critical business information located inside and outside of an organization.
- Crowdsourcing. A process in which an organization outsources a task to an undefined, generally large group of people in the form of an open call.
- Digital signals. A discrete pulse, either on or off, that conveys information in a binary form.
- Digital subscriber line (DSL). A high-speed, digital datatransmission technology using existing analog telephone lines.
- Distance learning (DL). Learning situations in which teachers and students do not meet face-to-face.
- Distributed processing. Network architecture that divides processing work between two or more computers, linked together in a network.
- Domain name system (DNS). The system administered by the Internet Corporation for Assigned Names (ICANN) that assigns names to each site on the Internet.
- Domain names. The name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left.
- E-learning. Learning supported by the Web; can be done inside traditional classrooms or in virtual classrooms.
- Enterprise network. An organization's network composed of interconnected multiple LANs and WANs.
- Ethernet. A common local area network protocol.
- Extranet. A network that connects parts of the intranets of different organizations.
- Fiber-optic cable. A communications medium consisting of thousands of very thin filaments of glass fibers, surrounded by cladding, that transmit information via light pulses generated by lasers.
- File server (also called network server). A computer that contains various software and data files for a local area network and contains the network operating system.
- Hypertext Transport Protocol (HTTP). The communications standard used to transfer pages across the WWW portion of the Internet; defines how messages are formulated and transmitted.
- Industrywide portal. A Web-based gateway to information and knowledge for an entire industry.
- Internet (The Net). A massive global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents, including Antarctica, and features in the daily routine of almost 2 billion people. Participating computer systems include smartphones, PCs, LANs, databases, and mainframes.
- Internet backbone. The primary network connections and telecommunications lines that link the computers and organizational nodes of the Internet.
- Internet Protocol (IP). A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.
- Internet Protocol address (IP address). An assigned address that uniquely identifies a computer on the Internet.
- Internet service provider (ISP). A company that provides Internet connections for a fee.
- Internet telephony (Voice-over Internet Protocol or VoIP). The use of the Internet as the transmission medium for telephone calls.
- Internet2. A new, faster telecommunications network that deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation, and virtual laboratories.
- Intranet. A private network that uses Internet software and TCP/IP protocols.
- Local area network (LAN). A network that connects communications devices in a limited geographical region, such as a building, so that every user device on the network can communicate with every other device.
- Metasearch engine. A computer program that searches several engines at once and integrates the findings of the various search engines to answer queries posted by users.
- Modem. Device that converts signals from analog to digital and vice versa.
- Network access points (NAPs). Computers that act as exchange points for Internet traffic and determine how traffic is routed.
- Network server. See file server.
- Packet switching. The transmission technology that divides blocks of text into packets.
- Peer-to-peer processing (P2P processing). A type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server.
- Portal. A Web-based personalized gateway to information and knowledge that provides information from disparate information systems and the Internet, using advanced search and indexing techniques.
- Protocol. The set of rules and procedures governing transmission across a network.
- Router. A communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.
- Search engine. A computer program that searches for specific information by key words and reports the results.
- Servers. Computers that provide access to various network services, such as printing, data, and communications.
- Synchronous optical network (SONET). An interface standard for transporting digital signals over fiber-optic lines; allows the integration of transmissions from multiple vendors.
- Telecommuting. A work arrangement whereby employees work at home, at the customer's premises, in special workplaces, or while traveling, usually using a computer linked to their place of employment.
- Teleconferencing. The use of electronic communication that allows two or more people at different locations to have a simultaneous conference.
- Transmission Control Protocol/Internet Protocol (TCP/IP). A file transfer protocol that can send large files of information across sometimes unreliable networks with assurance that the data will arrive uncorrupted.
- Twisted-pair wire. A communications medium consisting of strands of copper wire twisted together in pairs.
- Unified communications. Common hardware and software platform that simplifies and integrates all forms of communications -- voice, e-mail, instant messaging, location, and videoconferencing -- across an organization.
- Uniform resource locator (URL). The set of letters that identifies the address of a specific resource on the Web.
- Videoconference. A virtual meeting in which participants in one location can see and hear participants at other locations and can share data and graphics by electronic means.
- Virtual collaboration. The use of digital technologies that enable organizations or individuals to collaboratively plan, design, develop, manage, and research products, services, and innovative information systems and electronic commerce applications.
- Virtual group (team). A work group whose members are in different locations and who meet electronically.
- Virtual universities. Online universities in which students take classes via the Internet at home or an off-site location.
- Voice-over Internet Protocol (VOIP). See Internet telephony.
- Web site. Collectively, all of the Web pages of a particular company or individual.
- Wide area network (WAN). A network, generally provided by common carriers, that covers a wide geographic area.
- Wireless media. See broadcast media.
- Wireline media. See cable media.
- Work group. Two or more individuals who act together to perform some task, on either a permanent or temporary basis.
- Workflow. The movement of information as it flows through the sequence of steps that make up an organization's work procedures.
- World Wide Web (The Web, WWW, or W3). A system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture; it uses the transport functions of the Internet.
- Auction. A competitive process in which either a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers, and prices are determined dynamically by competitive bidding.
- Banner. Electronic billboards, which typically contain a short text or graphical message to promote a product or a vendor.
- Brick-and-mortar organizations. Organizations in which the product, the process, and the delivery agent are all physical.
- Business model. The method by which a company generates revenue to sustain itself.
- Business-to-business electronic commerce (B2B). Electronic commerce in which both the sellers and the buyers are business organizations.
- Business-to-consumer electronic commerce (B2C). Electronic commerce in which the sellers are organizations and the buyers are individuals; also known as e-tailing.
- Business-to-employee electronic commerce (B2E). An organization using electronic commerce internally to provide information and services to its employees.
- Buy-side marketplace. B2B model in which organizations buy needed products or services from other organizations electronically, often through a reverse auction.
- Channel conflict. The alienation of existing distributors when a company decides to sell to customers directly online.
- Clicks-and-mortar organizations. Organizations that do business in both the physical and digital dimensions.
- Consumer-to-consumer electronic commerce (C2C). Electronic commerce in which both the buyer and the seller are individuals (not businesses).
- Cyberbanking. Various banking activities conducted electronically from home, a business, or on the road instead of at a physical bank location; also known as electronic banking.
- Cybersquatting. Registering domain names in the hope of selling them later at a higher price.
- Disintermediation. Elimination of intermediaries in electronic commerce.
- E-government. The use of electronic commerce to deliver information and public services to citizens, business partners, and suppliers of government entities, and those working in the public sector.
- Electronic business (e-business). A broader definition of electronic commerce, including buying and selling of goods and services, and servicing customers, collaborating with business partners, conducting e-learning, and conducting electronic transactions within an organization.
- Electronic commerce (EC or e-commerce). The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet.
- Electronic mall. A collection of individual shops under one Internet address; also known as a cybermall or an e-mall.
- Electronic marketplace. A virtual market space on the Web where many buyers and many sellers conduct electronic business activities.
- Electronic payment mechanisms. Computer-based systems that allow customers to pay for goods and services electronically, rather than writing a check or using cash.
- Electronic retailing (e-tailing). The direct sale of products and services through storefronts or electronic malls, usually designed around an electronic catalog format and/or auctions.
- Electronic storefront. The Web site of a single company, with its own Internet address, at which orders can be placed.
- E-procurement. Purchasing by using electronic support.
- E-wallets. Software components in which a user stores secured personal and credit card information for one-click reuse.
- Exchanges. See public exchanges.
- Forward auctions. Auctions that sellers use as a selling channel to many potential buyers; the highest bidder wins the items.
- Group purchasing. The aggregation of purchasing orders from many buyers so that a volume discount can be obtained.
- Mobile commerce (m-commerce). Electronic commerce conducted in a wireless environment.
- Multichanneling. A process in which a company integrates its online and offline channels.
- Permission marketing. Method of marketing that asks consumers to give their permission to voluntarily accept online advertising and e-mail.
- Person-to-person payments. A form of electronic cash that enables the transfer of funds between two individuals, or between an individual and a business, without the use of a credit card.
- Pop-under ad. An advertisement that is automatically launched by some trigger and appears underneath the active window.
- Pop-up ad. An advertisement that is automatically launched by some trigger and appears in front of the active window.
- Public exchanges (or exchanges). Electronic marketplaces in which there are many sellers and many buyers, and entry is open to all; frequently owned and operated by a third party.
- Reverse auctions. Auctions in which one buyer, usually an organization, seeks to buy a product or a service, and suppliers submit bids; the lowest bidder wins.
- Sell-side marketplace. B2B model in which organizations sell to other organizations from their own private e-marketplace and/or from a third-party site.
- Smart cards. Cards that contains a microprocessor (chip) that enables the card to store a considerable amount of information (including stored funds) and to conduct processing.
- Spamming. Indiscriminate distribution of e-mail without the receiver's permission.
- Stored-value money cards. A form of electronic cash on which a fixed amount of prepaid money is stored; the amount is reduced each time the card is used.
- Viral marketing. Online word-of-mouth marketing.
- Virtual banks. Banking institutions dedicated solely to Internet transactions.
- Virtual organizations (or pure play organizations). Organizations in which the product, the process, and the delivery agent are all digital.
- Bluetooth. Chip technology that enables short-range connection (data and voice) between wireless devices.
- Cellular telephones (cell phones). Phones that provide twoway radio communications over a cellular network of base stations with seamless handoffs.
- Global Positioning System (GPS). A wireless system that uses satellites to enable users to determine their position anywhere on earth.
- Hotspot. A small geographical perimeter within which a wireless access point provides service to a number of users.
- Infrared. A type of wireless transmission that uses red light not commonly visible to human eyes.
- Location-based commerce (l-commerce). Mobile commerce transactions targeted to individuals in specific locations, at specific times.
- Mesh networks. Networks composed of multiple Wi-Fiaccess points that create a wide area network that can be quite large.
- Microwave transmission. A wireless system that uses microwaves for high-volume, long-distance, point-to-point communication.
- Mobile commerce (or m-commerce). Electronic commerce transactions that are conducted with a mobile device.
- Mobile computing. A real-time connection between a mobile device and other computing environments, such as the Internet or an intranet.
- Mobile portal. A portal that aggregates and provides content and services for mobile users.
- Mobile wallet (m-wallet). A technology that allows users to make purchases with a single click from their mobile devices.
- Near-field communications (NFC). The smallest of the shortrange wireless networks that is designed to be embedded in mobile devices such as cell phones and credit cards.
- Personal area network. A computer network used for communication among computer devices close to one person.
- Pervasive computing (or ubiquitous computing). A computer environment where virtually every object has processing power with wireless or wired connections to a global network.
- Propagation delay. Any delay in communications from signal transmission time through a physical medium.
- Radio-frequency identification technology (RFID technology). A wireless technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.
- Radio transmission. Uses radio-wave frequencies to send data directly between transmitters and receivers.
- Satellite radio (or digital radio). A wireless system that offers uninterrupted, near CD-quality music that is beamed to your radio from satellites.
- Satellite transmission. A wireless transmission system that uses satellites for broadcast communications.
- Telemetry. The wireless transmission and receipt of data gathered from remote sensors.
- Ubiquitous computing. See pervasive computing.
- Ultra-wideband (UWB). A high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps that can be used for applications such as streaming multimedia from, say, a personal computer to a television.
- Voice portal. A Web site with an audio interface.
- Wireless. Telecommunications in which electromagnetic waves carry the signal between communicating devices.
- Wireless 911. 911 emergency calls made with wireless devices.
- Wireless access point. An antenna connecting a mobile device to a wired local area network.
- Wireless Fidelity (Wi-Fi). A set of standards for wireless local area networks based on the IEEE 802.11 standard.
- Wireless local area network (WLAN). A computer network in a limited geographical area that uses wireless transmission for communication.
- Wireless sensor networks (WSNs). Networks of inter-connected, battery-powered, wireless sensors placed in the physical environment.
- AJAX. A Web development technique that allows portions of Web pages to reload with fresh data rather than requiring the entire Web page to reload.
- Blog (weblog). A personal Web site, open to the public, in which the site creator expresses his or her feelings or opinions with a series of chronological entries.
- Blogosphere. The term for the millions of blogs on the Web.
- Collaborative consumption. Peer-to-peer sharing or renting.
- Mashup. Web site that takes different content from a number of other Web sites and mixes them together to create a new kind of content.
- Microblogging. A form of blogging that allows users to write short messages (or capture an image or embedded video) and publish them.
- Really Simple Syndication. A technology that allows users to receive the information they want, when they want it, without having to surf thousands of Web sites.
- Social advertising. Advertising formats that make use of the social context of the user viewing the ad.
- Social capital. The number of connections a person has within and between social networks.
- Social commerce. The delivery of electronic commerce activities and transactions through social computing.
- Social computing. A type of information technology that combines social behavior and information systems to create value.
- Social graph. A map of all relevant links or connections for one member of a social network.
- Social intelligence. The monitoring, collection, and analysis of socially generated data and the resultant strategic decisions.
- Social marketplaces. These act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.
- Social network. A social structure composed of individuals, groups, or organizations linked by values, visions, ideas, financial exchange, friendship, kinship, conflict, or trade.
- Social networking. Activities performed using social software tools (e.g., blogging) or social networking features (e.g., media sharing).
- Social shopping. A method of electronic commerce that takes all of the key aspects of social networks -- friends, groups, voting, comments, discussions, reviews, etc. -- and focuses them on shopping.
- Tag. A keyword or term that describes a piece of information.
- Tweet. Messages and updates posted by users on Twitter.
- Twitter. A free microblogging service that allows its users to send messages and read other users' messages and updates.
- Web 2.0. A loose collection of information technologies and applications, plus the Web sites that use them.
- Web 2.0 media. Any Web site that provides user-generated media content and promotes tagging, rating, commenting, and other interactions among users and their media contributions.
- Weblog. See blog.
- Wiki. A Web site on which anyone can post material and make changes to other material.
- Ad-hoc reports (on-demand reports). Nonroutine reports that often contain special information that is not included in routine reports.
- Batch processing. Transaction processing system (TPS) that processes data in batches at fixed periodic intervals.
- Comparative reports. Reports that compare performances of different business units or times.
- Computer-integrated manufacturing (CIM). An information system that integrates various automated factory systems; also called digital manufacturing.
- Cross-departmental process. A business process that originates in one department and ends in another department, and/or originates and ends in the same department while involving other departments.
- Drill-down reports. Reports that show a greater level of detail than is included in routine reports.
- Enterprise application integration system (EAI system). A system that integrates existing systems by providing layers of software that connect applications together.
- Enterprise resource planning systems (ERP systems). Information systems that take a business process view of the overall organization to integrate the planning, management, and use of all of an organization's resources, employing a common software platform and database.
- ERP II systems. Interorganizational ERP systems that provide Web-enabled links among key business systems (such as inventory and production) of a company and its customers, suppliers, distributors, and others.
- Exception reports. Reports that include only information that exceeds certain threshold standards.
- Functional area information systems (FAISs). Systems that provide information to managers (usually midlevel) in the functional areas, in order to support managerial tasks of planning, organizing, and controlling operations.
- Key-indicator reports. Reports that summarize the performance of critical activities.
- Online transaction processing (OLTP). Transaction processing system (TPS) that processes data after transactions occur, frequently in real time.
- Order fulfillment process. A cross-functional business process that originates when the company receives a customer order, and it concludes when it receives a payment from the customer.
- Procurement process. A cross-functional business process that originates when a company needs to acquire goods or services from external sources, and it concludes when the company receives and pays for them.
- Production process. A cross-functional business process in which a company produces physical goods.
- Routine reports. Reports produced at scheduled intervals.
- Transaction. Any business event that generates data worth capturing and storing in a database.
- Transaction processing system (TPS). Information system that supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
- Analytical CRM system. CRM system that analyzes customer behavior and perceptions in order to provide actionable business intelligence.
- Bullwhip effect. Erratic shifts in orders up and down the supply chain.
- Bundling. A form of cross selling where an enterprise sells a group of products or services together at a lower price than the combined individual price of the products.
- Campaign management applications. CRM applications that help organizations plan marketing campaigns that send the right messages to the right people through the right channels.
- Collaborative CRM system. A CRM system where communications between the organization and its customers are integrated across all aspects of marketing, sales, and customer support processes.
- Cross selling. The practice of marketing additional related products to customers based on a previous purchase.
- Customer-facing CRM applications. Areas where customers directly interact with the organization, including customer service and support, sales force automation, marketing, and campaign management.
- Customer interaction center (CIC). A CRM operation where organizational representatives use multiple communication channels to interact with customers in functions such as inbound teleservice and outbound telesales.
- Customer relationship management (CRM). A customerfocused and customer-driven organizational strategy that concentrates on addressing customers' requirements for products and services, and then providing high-quality, responsive service.
- Customer-touching CRM applications (also called electronic CRM or e-CRM). Applications and technologies with which customers interact and typically help themselves.
- Customer touch point. Any interaction between a customer and an organization.
- Distribution portals. Corporate portals that automate the business processes involved in selling or distributing products from a single supplier to multiple buyers.
- Electronic CRM (e-CRM). See customer-touching CRM applications.
- Electronic data interchange (EDI). A communication standard that enables the electronic transfer of routine documents between business partners.
- Extranets. Networks that link business partners over the Internet by providing them access to certain areas of each other's corporate intranets.
- Front-office processes. Those processes that directly interact with customers; that is, sales, marketing, and service.
- Interorganizational information system (IOS). An information system that supports information flow among two or more organizations.
- Inventory velocity. The speed at which a company can deliver products and services after receiving the materials required to make them.
- Just-in-time inventory system (JIT inventory system). A system in which a supplier delivers the precise number of parts to be assembled into a finished product at precisely the right time.
- Loyalty program. Programs that offer rewards to customers to influence future behavior.
- Mobile CRM system. An interactive CRM system where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers.
- On-demand CRM system. A CRM system that is hosted by an external vendor in the vendor's data center.
- Open-source CRM system. CRM software whose source code is available to developers and users.
- Perational CRM system. The component of CRM that supports the front-office business processes that directly interact with customers (i.e., sales, marketing, and service).
- Procurement portals. Corporate portals that automate the business processes involved in purchasing or procuring products between a single buyer and multiple suppliers.
- Pull model. A business model in which the production process begins with a customer order and companies make only what customers want, a process closely aligned with mass customization.
- Push model. A business model in which the production process begins with a forecast, which predicts the products that customers will want as well as the quantity of each product. The company then produces the amount of products in the forecast, typically by using mass production, and sells, or "pushes," those products to consumers.
- Sales force automation (SFA). The component of an operational CRM system that automatically records all the aspects in a sales transaction process.
- Supply chain. The coordinated movement of resources from organizations through conversion to the end consumer.
- Supply chain management (SCM). An activity in which the leadership of an organization provides extensive oversight for the partnerships and processes that compose the supply chain and leverages these relationships to provide an operational advantage.
- Supply chain visibility. The ability of all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers' production processes.
- Up selling. A sales strategy where the organizational representative provides to customers the opportunity to purchase higher-value related products or services in place of, or along with the consumer's initial product or service selection.
- Vendor-managed inventory (VMI). An inventory strategy where the supplier monitors a vendor's inventory for a product or group of products and replenishes products when needed.
- Vertical integration. Strategy of integrating the upstream part of the supply chain with the internal part, typically by purchasing upstream suppliers, in order to ensure timely availability of supplies.
- Business intelligence (BI). A broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions.
- Corporate performance management (CPM). The area of business intelligence involved with monitoring and managing an organization's performance, according to key performance indicators (KPIs) such as revenue, return on investment (ROI), overhead, and operational costs.
- Dashboard. A BI application that provides rapid access to timely information and direct access to management reports.
- Data mining. The process of searching for valuable business information in a large database, data warehouse, or data mart.
- Decision. A choice that individuals and groups make among two or more alternatives.
- Decision support systems (DSSs). Business intelligence systems that combine models and data in an attempt to solve semistructured and some unstructured problems with extensive user involvement.
- Geographic information system (GIS). A computer-based system for capturing, integrating, manipulating, and displaying data using digitized maps.
- Management. A process by which organizational goals are achieved through the use of resources.
- Model (in decision making). A simplified representation, or abstraction, of reality.
- Multidimensional data analysis. See online analytical processing (OLAP).
- Online analytical processing (OLAP or multidimensional data analysis). A set of capabilities for "slicing and dicing" data using dimensions and measures associated with the data.
- Productivity. The ratio between the inputs to a process and the outputs from that process.
- Reality mining. Allows analysts to extract information from the usage patterns of mobile phones and other wireless devices.
- Agile development. A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery.
- Application portfolio. The set of recommended applications resulting from the planning and justification process in application development.
- Application service provider (ASP). An agent or vendor who assembles the software needed by enterprises and packages them with outsourced development, operations, maintenance, and other services.
- Component-based development. A software development methodology that uses standard components to build applications.
- Computer-aided software engineering (CASE). Development approach that uses specialized tools to automate many of the tasks in the SDLC; upper CASE tools automate the early stages of the SDLC and lower CASE tools automate the later stages.
- Direct conversion. Implementation process in which the old system is cut off and the new system is turned on at a certain point in time.
- End-user development. Approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department.
- Feasibility study. Investigation that gauges the probability of success of a proposed project and provides a rough assessment of the project's feasibility.
- Implementation. The process of converting from an old computer system to a new one.
- Integrated CASE tools (ICASE tools). CASE tools that provide links between upper CASE and lower CASE tools.
- IS operational plan. Consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.
- IT steering committee. A committee, comprised of a group of managers and staff representing various organizational units, set up to establish IT priorities and to ensure that the MIS function is meeting the needs of the enterprise.
- IT strategic plan. A set of long-range goals that describe the IT infrastructure and major IT initiatives needed to achieve the goals of the organization.
- Joint application design (JAD). A group-based tool for collecting user requirements and creating system designs.
- Lower CASE tools. Tools used to automate later stages in the SDLC (programming, testing, operation, and maintenance)
- Object-oriented development. A systems development methodology that begins with aspects of the real world that must be modeled to perform a task.
- Utsourcing. Use of outside contractors or external organizations to acquire IT services.
- Phased conversion. Implementation process that introduces components of the new system in stages, until the entire new system is operational.
- Pilot conversion. Implementation process that introduces the new system in one part of the organization on a trial basis; when the new system is working properly, it is introduced in other parts of the organization.
- Programmers. IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements.
- Programming. The translation of a system's design specifications into computer code.
- Prototype. A small-scale working model of an entire system or a model that contains only the components of the new system that are of most interest to the users.
- Prototyping. An approach that defines an initial list of user requirements, builds a prototype system, and then improves the system in several iterations based on users' feedback.
- Rapid application development (RAD). A development method that uses special tools and an iterative approach to rapidly produce a high-quality system.
- Request for proposal (RFP). Document that is sent to potential vendors inviting them to submit a proposal describing their software package and how it would meet the company's needs.
- Scope creep. Adding functions to an information system after the project has begun.
- Service-level agreements (SLAs). Formal agreements regarding the division of work between a company and its vendors.
- Software-as-a-service (SaaS). A method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the Internet.
- Systems analysis. The examination of the business problem that the organization plans to solve with an information system.
- Systems analysts. IS professionals who specialize in analyzing and designing information systems.
- Systems design. Describes how the new system will resolve the business problem.
- Systems development life cycle (SDLC). Traditional structured framework, used for large IT projects, that consists of sequential processes by which information systems are developed.
- Systems investigation. The initial stage in the traditional SDLC that addresses the business problem (or business opportunity) by means of the feasibility study.
- Systems stakeholders. All people who are affected by changes in information systems.
- Technical specialists. Experts on a certain type of technology, such as databases or telecommunications.
- Upper CASE tools. Tools that are used to automate the early stages of the SDLC (systems investigation, analysis, and design).
- Arithmetic-logic unit (ALU). Portion of the CPU that performs the mathematic calculations and makes logical comparisons.
- Augmented reality. A live, direct or indirect, view of a physical, real-world environment whose elements are enhanced by computer-generated sensory input such as sound, video, graphics, or GPS data.
- Binary form. The form in which data and instructions can be read by the CPU -- only 0s and 1s.
- Bit. Short for binary digit (0s and 1s), the only data that a CPU can process.
- Byte. An 8-bit string of data, needed to represent any one alphanumeric character or simple mathematical operation.
- Cache memory. A type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory (RAM).
- Central processing unit (CPU). Hardware that performs the actual computation or "number crunching" inside any computer.
- Control unit. Portion of the CPU that controls the flow of information.
- Fat clients. Desktop computer systems that offer full functionality.
- Fl ash memory devices. Nonvolatile electronic storage devices that are compact, are portable, require little power, and contain no moving parts.
- Gesture recognition. An input method that interprets human gestures, in an attempt for computers to begin to understand human body language.
- Laptop computers (notebook computers). Small, easily transportable, lightweight microcomputers.
- Magnetic disks (or hard drives or fixed disk drives). A form of secondary storage on a magnetized disk divided into tracks and sectors that provide addresses for various pieces of data.
- Magnetic tape. A secondary storage medium on a large open reel or in a smaller cartridge or cassette.
- Mainframes. Relatively large computers used in large enterprises for extensive computing applications that are accessed by thousands of users.
- Microcomputers. The smallest and least expensive category of general-purpose computers; also called micros, personal computers, or PCs.
- Microprocessor. The CPU, made up of millions of transistors embedded in a circuit on a silicon wafer or chip.
- Minicomputers. Relatively small, inexpensive, and compact midrange computers that perform the same functions as mainframe computers, but to a more limited extent.
- Moore's law. Prediction by Gordon Moore, an Intel cofounder, that microprocessor complexity would double approximately every 2 years.
- Multimedia technology. Computer-based integration of text, sound, still images, animation, and digitized full-motion video.
- Netbook. A very small, lightweight, low-cost, energy-efficient, portable computer, typically optimized for Internet-based services such as Web browsing and e-mailing.
- Notebook computer. See computer.
- Optical storage devices. A form of secondary storage in which a laser reads the surface of a reflective plastic platter.
- Primary storage (also called main memory). High-speed storage located directly on the motherboard that stores data to be processed by the CPU, instructions telling the CPU how to process the data, and operating systems programs.
- Random access memory (RAM). The part of primary storage that holds a software program and small amounts of data when they are brought from secondary storage.
- Read-only memory (ROM). Type of primary storage where certain critical instructions are safeguarded; the storage is nonvolatile and retains the instructions when the power to the computer is turned off.
- Registers. High-speed storage areas in the CPU that store very small amounts of data and instructions for short periods.
- Secondary storage. Technology that can store very large amounts of data for extended periods.
- Sequential access. Data access in which the computer system must run through data in sequence to locate a particular piece.
- Server. Smaller midrange computers that support networks, enabling users to share files, software, and other network devices.
- Solid state drives (SSDs). Data storage devices that serve the same purpose as a hard drive and store data in memory chips.
- Supercomputer. Computers with the most processing power available; used primarily in scientific and military work for computationally demanding tasks on very large data sets.
- Tablet computer (or tablet). A complete computer contained entirely in a flat touch screen that uses a stylus, digital pen, or fingertip as an input device instead of a keyboard or mouse.
- Thin-client systems. Desktop computer systems that do not offer the full functionality of a PC.
- Thumb drive. Storage device that fits into the USB port of a personal computer and is used for portable storage.
- Wearable computer. A miniature computer worn by a person allowing the user to multitask.
- Application software. The class of computer instructions that directs a computer system to perform specific processing activities and provide functionality for users.
- Computer programs. The sequences of instructions for the computer, which comprise software.
- Documentation. Written description of the functions of a software program.
- Graphical user interface (GUI). System software that allows users to have direct control of the hardware by manipulating visible objects (such as icons) and actions, which replace command syntax.
- Open-source software. Software made available in source-code form at no cost to developers.
- Open systems. Computing products that work together by using the same operating system with compatible software on all the computers that interact in an organization.
- Operating system (OS). The main system control program, which supervises the overall operations of the computer, allocates CPU time and main memory to programs, and provides an interface between the user and the hardware.
- Package. Common term for an integrated group of computer programs developed by a vendor and available for purchase in prepackaged form.
- Personal application software. General-purpose, off-the-shelf application programs that support general types of processing, rather than being linked to any specific business function.
- Programming. The process of writing or coding programs.
- Proprietary software. Software that has been developed by a company and has restrictions on its use, copying, and modification.
- Social interface. A user interface that guides the user through computer applications by using cartoonlike characters, graphics, animation, and voice commands.
- Software. A set of computer programs that enable the hardware to process data.
- Software suite. See package.
- Speech-recognition software. Software that recognizes and interprets human speech, either one word at a time (discrete speech) or in a stream (continuous speech).
- Systems software. The class of computer instructions that serve primarily as an intermediary between computer hardware and application programs; provides important self-regulatory functions for computer systems.
- Cloud computing. A technology in which tasks are performed by computers physically removed from the user and accessed over a network, in particular the Internet.
- Extensible markup language (XML). A computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data.
- Grid computing. A technology that applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.
- Hybrid clouds. Clouds composed of public and private clouds that remain unique entities but are bound together, offering the benefits of multiple deployment models.
- HTML5. A page-description language that makes it possible to embed images, audio, and video directly into a document without add-ons. Also makes it easier for Web pages to function across different display devices, including mobile devices as well as desktops. Supports the storage of data offline.
- Hypertext markup language (HTML). A page-description language for specifying how text, graphics, video, and sound are placed on a Web page document.
- Infrastructure-as-a-service model (IaaS model). Cloud computing providers offer remotely accessible servers, networks, and storage capacity.
- Platform-as-a-service model (PaaS model). Customers rent servers, operating systems, storage, a database, software development technologies such as Java and .NET, and network capacity over the Internet.
- Private clouds (also known as internal clouds or corporate clouds). IT infrastructures that are accessible only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all the business units within a single organization.
- Public clouds. Shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations).
- Server farms. Massive data centers, which may contain hundreds of thousands of networked computer servers.
- Server virtualization. A technology that uses software-based partitions to create multiple virtual servers (called virtual machines) on a single physical server.
- Service-oriented architecture. An IT architecture that makes it possible to construct business applications using Web services.
- Software-as-a-service delivery model (SaaS delivery model). Cloud computing vendors provide software that is specific to their customers' requirements.
- Utility computing. A technology whereby a service provider makes computing resources and infrastructure management available to a customer as needed.
- Web services. Applications delivered over the Internet that IT developers can select and combine through almost any device, from personal computers to mobile phones.
- Algorithm. A problem-solving method expressed as a finite sequence of steps.
- Artificial intelligence (AI). A subfield of computer science that is concerned with studying the thought processes of humans and re-creating the effects of those processes via machines, such as computers.
- Buyer agent (or shopping bot). An intelligent agent on a Web site that helps customers find products and services that they need.
- Expert systems (ESs). Computer systems that attempt to mimic human experts by applying expertise in a specific domain.
- Fuzzy logic. A branch of mathematics that deals with uncertainties by simulating the processes of human reasoning.
- Genetic algorithm. An approach that mimics the evolutionary, "survival-of-the-fittest" process to generate increasingly better solutions to a problem.
- Information agent. A type of intelligent agent that searches for information and displays it to users.
- Intelligent agent. A software program that assists you, or acts on your behalf, in performing repetitive, computer-related tasks.
- Intelligent systems. A term that describes the various commercial applications of artificial intelligence.
- Monitoring-and-surveillance agents (or predictive agents). Intelligent agents that constantly observe and report on some item of interest.
- Neural network. A system of programs and data structures that simulates the underlying concepts of the human brain.
- Personal agents. See user agents.
- Predictive agents. See monitoring-and-surveillance agents.
- Shopping bot. See buyer agent.
- Turing test. A test in which a man and a computer both pretend to be women (or men), and the human interviewer has to decide which is the real human.
- User agents (or personal agents). Intelligent agents that take action on your behalf.