Term
| acceptable use policy (AUP) |
|
Definition
| a policy that a user must agree to follow to be provided acces, view or perform when operating a system |
|
|
Term
|
Definition
| refers to the varying levels that define what a user can access, view or perform when operating a system |
|
|
Term
|
Definition
| unrestricted access to the entire system |
|
|
Term
|
Definition
| software, while purporting to serve come useful function and often fulfilling that function, also allows intrnet advertiser to display advertisements without the consent of the computer user |
|
|
Term
|
Definition
| simply tates that email users will not send uncolicited emails |
|
|
Term
|
Definition
| scans and serches hard drives to prevent detect and remove known viruses, adware, spyware |
|
|
Term
| application programming interface (API) |
|
Definition
| a set of routines, protocols, and tools for building software applications |
|
|
Term
| asynchronous communication |
|
Definition
| communication syuch as email in which the message and the response do not occur at the same time |
|
|
Term
|
Definition
| a method for confirming users' identities |
|
|
Term
|
Definition
| the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount allocated storage space |
|
|
Term
|
Definition
| refers to the time frames when the system is operational |
|
|
Term
|
Definition
| an exact copy of a system's information |
|
|
Term
|
Definition
| the maximum amount of data that can pass from one point to another in a unit of time |
|
|
Term
|
Definition
| the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice or handwriting |
|
|
Term
|
Definition
| breaks into other people computer systems and may just look around or may steal and destroy information |
|
|
Term
|
Definition
| an online journal that allows users to post their own comments, graphics, and video |
|
|
Term
|
Definition
| wireless PAN techonology that transmits signals over short distances between cell phones, computers, and other devices |
|
|
Term
|
Definition
| a high-speed internet connection that is always connected |
|
|
Term
| business community planning (BCP) |
|
Definition
| details how a company recovers and restores critical business operations and systems after a disaters or extended disruption |
|
|
Term
|
Definition
| a plan that details how a company creates, delivers, and generates revenues |
|
|
Term
| business to business (B2B) |
|
Definition
| applies to business buying from and selling to each other over the internet |
|
|
Term
| business to consumer (B2C) |
|
Definition
| applies to any business that sells its products or services directly to consumers online |
|
|
Term
|
Definition
| determines future enviornmental infrastructure requirments to ensure high-quality system performance |
|
|
Term
|
Definition
| a trusted 3rd party, such as VeriSign, that validates user idenities by means of digitial certificates |
|
|
Term
|
Definition
| exact pattern of a consumer's navigation through a site |
|
|
Term
|
Definition
| a computer designed to request information from a server |
|
|
Term
|
Definition
| refers to the use of resources and applications hosted remotely on the internet |
|
|
Term
|
Definition
| a separate facility that does not have any computer equipment but is a place where employees can move after a disaster |
|
|
Term
|
Definition
| collaborating and tapping into the core knowledge of all employees, partners, and customers |
|
|
Term
|
Definition
| the assurance that messages and information remain available only to those authorized to view them |
|
|
Term
| consumer to business (C2B) |
|
Definition
| applies to any consumer who sells a product or service to a business on the internet |
|
|
Term
| consumer to consumer (C2C) |
|
Definition
| appilies to customers offering goods and services to each other on the internet |
|
|
Term
|
Definition
| occurs when organizations use software that filters content, such as emails, to prevent accidental or malicious transmission of unauthorized information |
|
|
Term
|
Definition
| the legal protection afforded and experssion of an idea, such as a song, book, video game |
|
|
Term
| corporate social responsibility |
|
Definition
| companies' acknowledged responsilibty to society |
|
|
Term
|
Definition
| software that is manufactured to look like the real thing and sold as such |
|
|
Term
|
Definition
| hacker with criminal intent |
|
|
Term
|
Definition
| refers to the wisdom of the crowd |
|
|
Term
|
Definition
| seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction |
|
|
Term
|
Definition
| a facility used to house managment information systems and associated components, such as telecommunications and storage systems |
|
|
Term
|
Definition
| a data file that identifies individuals or organizations online and is comparable to a digitial signature |
|
|
Term
| disaster recovery cost curve |
|
Definition
| charts (1) the cost to the company of the unavailabity of information and techonology (2) the cost to the company of recovering from a disaster over time |
|
|
Term
|
Definition
| detailed process for recovering information or a system in the event of a catastrophic disaster |
|
|
Term
|
Definition
| occurs when a business sells direct to the customer online and cuts out the intermediary |
|
|
Term
|
Definition
| a new way of doing things that intitally does not meet the needs of existing customers |
|
|
Term
|
Definition
| converts IP address into domains, or identifying labels that use a variety of recognizable naming conventions |
|
|
Term
|
Definition
| refers to a period of time when a system in unavailable |
|
|
Term
|
Definition
| looking through people's trash, another way hackers obtain information |
|
|
Term
|
Definition
| means that the MIS infrastructure can be automatically scaled up or down based on requirements |
|
|
Term
|
Definition
| includes ecommerce along with all activies related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real time information |
|
|
Term
|
Definition
| a plan that details how a company creates, delivers, and generates revenues on the internet |
|
|
Term
|
Definition
| the buying and selling of goods and services over the internet |
|
|
Term
| ediscovery (or electronic discovery) |
|
Definition
| refers to the ability of a company to identify, search, gather, seize or export digitial information in responding to a litigation, audit, investigation, or information inquiry |
|
|
Term
|
Definition
| involves the use of stratgies and techonlogies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen - consumer within all branches of the government |
|
|
Term
|
Definition
| details the extent to which emails messages may be read by others |
|
|
Term
| emergency notification service |
|
Definition
| an infrastructure built for notifying people in the event of an emergency |
|
|
Term
| employee monitoring policy |
|
Definition
| states explicitly how, when, and where the company monitors its employees |
|
|
Term
|
Definition
| scrambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
|
Definition
| a person grounded in techonology, fluent in business, and able to provide important bridge between MIS and the business |
|
|
Term
| eshop (estore or etailer) |
|
Definition
| an online version of a retail store where customers can shop at any hour |
|
|
Term
| ethical computer use policy |
|
Definition
| cotains general principles to guide computer user behavior |
|
|
Term
|
Definition
| the principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
| refers to discard, obolete, or broken electronic devices |
|
|
Term
|
Definition
| consists of anything that can be documented, archived, and codified, often with the help of IT |
|
|
Term
|
Definition
| an extension of an intranet that is only available to authorized outsiders, such as customers, partners, or suppliers |
|
|
Term
|
Definition
| occurs when the primary machine recovers and resumes operations, taking over the secondary server |
|
|
Term
|
Definition
| hardware and or software thta guard a private network by analyzing incoming and outgoing information for the correct markings |
|
|
Term
|
Definition
| similar to taxonomy expect that crowdsourcing determines the tags or keyword-based on classification system |
|
|
Term
| global positioning system (GPS) |
|
Definition
| a satellite based navigation system providing extremely accurate position, times and speed information |
|
|
Term
|
Definition
| experts in technology who use their knowledge to break into computers and computer networks, either for profit or movtivated by the challenge |
|
|
Term
|
Definition
| have philosophical and political reasons for breaking into systems and will often deface the website as a protest |
|
|
Term
| hypertext markup language (HTML) |
|
Definition
| links documents allowing users to move from one to another simply by clicking on a hot spot or link |
|
|
Term
| hypertext transport protocol (HTTP) |
|
Definition
| the internet protocol web browsers use to request and display web pages using universal resource locaters |
|
|
Term
|
Definition
| the forging of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
| data converted into a meaningful and useful context |
|
|
Term
|
Definition
| the act of conforming, acquiescing, or yielding information |
|
|
Term
|
Definition
| govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution and processing of information itself (with or without the aid of computer techonolgies) |
|
|
Term
|
Definition
| a method or system of government for information management or control |
|
|
Term
|
Definition
| examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively |
|
|
Term
| information privacy policy |
|
Definition
| contains general principles regarding information privacy |
|
|
Term
|
Definition
| measures the number of people a firm can communicate with all over the world |
|
|
Term
|
Definition
| refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video information |
|
|
Term
|
Definition
| a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
| information security plan |
|
Definition
| details how and organization will implement the information security policies |
|
|
Term
| information security policies |
|
Definition
| identify the rules required to maintain information security, such as requiring users to logoff before leaving for lunch or meetings, never sharing passwords with anyone and changing passwords every 30 days |
|
|
Term
| information techonology monitoring |
|
Definition
| tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed |
|
|
Term
|
Definition
| legitimate users who purposely or accidentally misuse their access to the enviornment and cause some kind of business affecting incident |
|
|
Term
|
Definition
| intangilble creative work that is embodied in physical form and includes copyrights, trademarks, and patents |
|
|
Term
|
Definition
| measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat vistors to the advertisement |
|
|
Term
|
Definition
| agents, software, or businesses that provide a trading infrastructure to bring buyers and seller together |
|
|
Term
|
Definition
| a massive network that connects computers all over the world and allows them to communicate with one another |
|
|
Term
| internet cable connections |
|
Definition
| provides internet access using a cable television company's infrasture and a special cable modem |
|
|
Term
| internet service provider (ISP) |
|
Definition
| a company that provides access to the internet for a montly fee |
|
|
Term
|
Definition
| contains general principles to guide the proper use of the internet |
|
|
Term
|
Definition
| a restricted network that relies on internet techonlogies to provide an internet-like enviornment within the compayn for information sharing, communications, collaboration, web publishing, and the support of the business process |
|
|
Term
| intrusion detection software (IDS) |
|
Definition
| features a full-time montioring tools that search for patterns in network traffic to identify intruders |
|
|
Term
|
Definition
| involves capturing, classifying, evaluating, retriving, and sharing information assets in a way that provides context for effective decisions and actions |
|
|
Term
| knowledge management system (KMS) |
|
Definition
| supports the capuring, organization, and siemination of knowledge (know-how) throughout an organization |
|
|
Term
|
Definition
| connects a group of computers in proximity such as in an office building, school, or home |
|
|
Term
| location based services (LBS) |
|
Definition
| applications that use location information to provide a service |
|
|
Term
|
Definition
| referring to the tail of a typical sales curve |
|
|
Term
|
Definition
| sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning |
|
|
Term
|
Definition
| WYSIWYGs of What You See Is What You Get |
|
|
Term
|
Definition
| the ability of an organzation to tailor its products or services to the customers' specifications |
|
|
Term
|
Definition
| the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group o subscribers who can read the posts as ims or text messages |
|
|
Term
| mobile business (mbusiness or mcommerce) |
|
Definition
| the ability to purchase goods and services through a wireless internet-enabled device |
|
|
Term
|
Definition
| a device that enables a computer to transmit and receive data |
|
|
Term
| network access points(NAPs) |
|
Definition
| traffic exchange points in the routing hierarchy of the internet that connects NSPs |
|
|
Term
|
Definition
| the efficient coexistance of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures |
|
|
Term
|
Definition
| describes how products in a network increases in value to users as the number of users inscreases |
|
|
Term
|
Definition
| a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions |
|
|
Term
|
Definition
| refers to any software whose source code is made available for free for any thrid party to review and modify |
|
|
Term
|
Definition
| consists of non propriertary hardware and software based on publicly known standards that allows thrid parties to create add-on products to plug into or interoperate with the system |
|
|
Term
|
Definition
| occurs when a new radical form of business enters the market that reshapes the way companies and organization behave |
|
|
Term
|
Definition
| a computer network that relies on the computing power and bandwith of the participants in the network rather than a centralized server |
|
|
Term
|
Definition
| occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individials or groups based on profile information, demographics, or prior transactions |
|
|
Term
|
Definition
| reroutes requests for legitimate websites to false websites |
|
|
Term
|
Definition
| a technique to gain personal information for the purpose of identity theft, usually by means of fraudlent emails that look as though they came from legitimate sources |
|
|
Term
|
Definition
| the unauthorized use, duplication, distribution, or sale of copyrighted software |
|
|
Term
|
Definition
| converts audio broadcast to a digital music player |
|
|
Term
|
Definition
| the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent |
|
|
Term
|
Definition
| a standard that specifies the format of data as well as the rules to be followed during transmission |
|
|
Term
| public key encryption (PKE) |
|
Definition
| uses two keys: a public key that everyone can have and a private key for only the receipent |
|
|
Term
| real simple syndication (RSS) |
|
Definition
| a web format used to publish frequently updated works, such as blogs, news headlines, audio and video in a standardized format |
|
|
Term
|
Definition
| steps are added to the value chain as new players find ways to add value to the business process |
|
|
Term
|
Definition
| where buyers post feedback on sellers |
|
|
Term
|
Definition
| a space station that orbits the earth receiving and transmitting signals from earth based stations over a wide area |
|
|
Term
| script kiddies or script bunnies |
|
Definition
| find hacking code on the internet and click and point their way into systems to cause damage or spread viruses |
|
|
Term
| secure hypertext transfer protocol (SHTTP or HTTPS) |
|
Definition
| a combination of HTTP and SSL to provide encryption and secure identification of an intranet server |
|
|
Term
| secure sockets layer (SSL) |
|
Definition
| a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remains private |
|
|
Term
|
Definition
| a component of Web 3.0 that describes things in a way that computer can understand |
|
|
Term
|
Definition
| a computer dedicated to providing information in response to requests |
|
|
Term
|
Definition
| a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited pro |
|
|
Term
|
Definition
| delivers electricity using two way digital techonology |
|
|
Term
|
Definition
| offer more advanced computing ability and conectivity then basic cell phones |
|
|
Term
|
Definition
| hackers use their social skills to trick people into revealing aaccess credentials or other valuable information |
|
|
Term
|
Definition
| refers to website that rely on user participation and user contributed content |
|
|
Term
|
Definition
| outlines the corpoarte guidlines or pinciples governing employee online communications |
|
|
Term
|
Definition
| the practice of expanding your business and or social contacts by constructing a person network |
|
|
Term
| social networking analysis (SNA) |
|
Definition
| maps group contacts identifying who knows eahc other and who works together |
|
|
Term
|
Definition
| the set of instructions the hardware executes to carry out specific tasks |
|
|
Term
| software as a service (SaaS) |
|
Definition
| delivers applications over the cloud using a pay per use revenue model |
|
|
Term
|
Definition
| contains instructions written by a programmer specifying the actions to be performed by computer software |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission |
|
|
Term
|
Definition
| an electronic document thta confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company |
|
|
Term
|
Definition
| a method of sending audio and video files over the internet in such a way that the user can view the file while it is being transmitted |
|
|
Term
|
Definition
| refers to the safe disposal of MIS assets at the end of their life cycle |
|
|
Term
| sustainable MIS infrastructure |
|
Definition
| identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption |
|
|
Term
|
Definition
| describes the production, management, use, and disposal of techonology in a way that minimizes damage to the enviornment |
|
|
Term
|
Definition
| produces an improved product customers are eager to buy, such as faster car or larger hard driver |
|
|
Term
|
Definition
| the knowledge contained in people's heads |
|
|
Term
|
Definition
| specific keywords or phrases incorporated into website content for means of classification or taxonomy |
|
|
Term
|
Definition
| the scientific classication of organisms into groups based on similarities of the structure or orgin |
|
|
Term
|
Definition
| small electronic devices that change user passwords automatically |
|
|
Term
| transmission control protocol/internet protocol (TCP/IP) |
|
Definition
| provides the techinical foundation for the public internet as wel as for large number of private networks |
|
|
Term
|
Definition
| when a system is not operating or cannot be used |
|
|
Term
| universal resource locator (URL) |
|
Definition
| the address of a file or resource on the web such as www.apple.com |
|
|
Term
|
Definition
| the degree to which a system is easy to learn and efficient and satisfying to use |
|
|
Term
|
Definition
| offers a pay per use revenue model similar to a metered service such as gas or electricity |
|
|
Term
| virtual private network (VPN) |
|
Definition
| companies can establish direct private network links among themselves or create private, secure internet access, in effect a "private tunnel" within the internet |
|
|
Term
|
Definition
| creates multiple virtual machines on a single computing device |
|
|
Term
|
Definition
| software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
| uses IP techonology to transmit telephone cals |
|
|
Term
|
Definition
| a separate facility with computer equipment that requires installation and configuration |
|
|
Term
|
Definition
| refers to the world wide web during its first few years of operations between 1991 and 2003 |
|
|
Term
|
Definition
| the net generation of internet use, a more mature distinctive communications platform charachterized by new qualities such as collaboration, sharing and free |
|
|
Term
|
Definition
| allow users access to the WWW |
|
|
Term
|
Definition
| work at the request of the system owners to find system vulnerablities and plug holes |
|
|
Term
|
Definition
| spans a large geogrpahic area such as a state, province, country |
|
|
Term
|
Definition
| collaborative Web page that allows users to add, remove, or change content, which can be easily organized and reorganized as required |
|
|
Term
|
Definition
| means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves |
|
|
Term
|
Definition
| world wide web, provides access to internet information through documents including text, graphics, audio and video files that use a special formatting language called HTML |
|
|