Term
acceptable use policy (AUP) |
|
Definition
a policy that a user must agree to follow to be provided acces, view or perform when operating a system |
|
|
Term
|
Definition
refers to the varying levels that define what a user can access, view or perform when operating a system |
|
|
Term
|
Definition
unrestricted access to the entire system |
|
|
Term
|
Definition
software, while purporting to serve come useful function and often fulfilling that function, also allows intrnet advertiser to display advertisements without the consent of the computer user |
|
|
Term
|
Definition
simply tates that email users will not send uncolicited emails |
|
|
Term
|
Definition
scans and serches hard drives to prevent detect and remove known viruses, adware, spyware |
|
|
Term
application programming interface (API) |
|
Definition
a set of routines, protocols, and tools for building software applications |
|
|
Term
asynchronous communication |
|
Definition
communication syuch as email in which the message and the response do not occur at the same time |
|
|
Term
|
Definition
a method for confirming users' identities |
|
|
Term
|
Definition
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount allocated storage space |
|
|
Term
|
Definition
refers to the time frames when the system is operational |
|
|
Term
|
Definition
an exact copy of a system's information |
|
|
Term
|
Definition
the maximum amount of data that can pass from one point to another in a unit of time |
|
|
Term
|
Definition
the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice or handwriting |
|
|
Term
|
Definition
breaks into other people computer systems and may just look around or may steal and destroy information |
|
|
Term
|
Definition
an online journal that allows users to post their own comments, graphics, and video |
|
|
Term
|
Definition
wireless PAN techonology that transmits signals over short distances between cell phones, computers, and other devices |
|
|
Term
|
Definition
a high-speed internet connection that is always connected |
|
|
Term
business community planning (BCP) |
|
Definition
details how a company recovers and restores critical business operations and systems after a disaters or extended disruption |
|
|
Term
|
Definition
a plan that details how a company creates, delivers, and generates revenues |
|
|
Term
business to business (B2B) |
|
Definition
applies to business buying from and selling to each other over the internet |
|
|
Term
business to consumer (B2C) |
|
Definition
applies to any business that sells its products or services directly to consumers online |
|
|
Term
|
Definition
determines future enviornmental infrastructure requirments to ensure high-quality system performance |
|
|
Term
|
Definition
a trusted 3rd party, such as VeriSign, that validates user idenities by means of digitial certificates |
|
|
Term
|
Definition
exact pattern of a consumer's navigation through a site |
|
|
Term
|
Definition
a computer designed to request information from a server |
|
|
Term
|
Definition
refers to the use of resources and applications hosted remotely on the internet |
|
|
Term
|
Definition
a separate facility that does not have any computer equipment but is a place where employees can move after a disaster |
|
|
Term
|
Definition
collaborating and tapping into the core knowledge of all employees, partners, and customers |
|
|
Term
|
Definition
the assurance that messages and information remain available only to those authorized to view them |
|
|
Term
consumer to business (C2B) |
|
Definition
applies to any consumer who sells a product or service to a business on the internet |
|
|
Term
consumer to consumer (C2C) |
|
Definition
appilies to customers offering goods and services to each other on the internet |
|
|
Term
|
Definition
occurs when organizations use software that filters content, such as emails, to prevent accidental or malicious transmission of unauthorized information |
|
|
Term
|
Definition
the legal protection afforded and experssion of an idea, such as a song, book, video game |
|
|
Term
corporate social responsibility |
|
Definition
companies' acknowledged responsilibty to society |
|
|
Term
|
Definition
software that is manufactured to look like the real thing and sold as such |
|
|
Term
|
Definition
hacker with criminal intent |
|
|
Term
|
Definition
refers to the wisdom of the crowd |
|
|
Term
|
Definition
seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction |
|
|
Term
|
Definition
a facility used to house managment information systems and associated components, such as telecommunications and storage systems |
|
|
Term
|
Definition
a data file that identifies individuals or organizations online and is comparable to a digitial signature |
|
|
Term
disaster recovery cost curve |
|
Definition
charts (1) the cost to the company of the unavailabity of information and techonology (2) the cost to the company of recovering from a disaster over time |
|
|
Term
|
Definition
detailed process for recovering information or a system in the event of a catastrophic disaster |
|
|
Term
|
Definition
occurs when a business sells direct to the customer online and cuts out the intermediary |
|
|
Term
|
Definition
a new way of doing things that intitally does not meet the needs of existing customers |
|
|
Term
|
Definition
converts IP address into domains, or identifying labels that use a variety of recognizable naming conventions |
|
|
Term
|
Definition
refers to a period of time when a system in unavailable |
|
|
Term
|
Definition
looking through people's trash, another way hackers obtain information |
|
|
Term
|
Definition
means that the MIS infrastructure can be automatically scaled up or down based on requirements |
|
|
Term
|
Definition
includes ecommerce along with all activies related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real time information |
|
|
Term
|
Definition
a plan that details how a company creates, delivers, and generates revenues on the internet |
|
|
Term
|
Definition
the buying and selling of goods and services over the internet |
|
|
Term
ediscovery (or electronic discovery) |
|
Definition
refers to the ability of a company to identify, search, gather, seize or export digitial information in responding to a litigation, audit, investigation, or information inquiry |
|
|
Term
|
Definition
involves the use of stratgies and techonlogies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen - consumer within all branches of the government |
|
|
Term
|
Definition
details the extent to which emails messages may be read by others |
|
|
Term
emergency notification service |
|
Definition
an infrastructure built for notifying people in the event of an emergency |
|
|
Term
employee monitoring policy |
|
Definition
states explicitly how, when, and where the company monitors its employees |
|
|
Term
|
Definition
scrambles information into an alternative form that requires a key or password to decrypt |
|
|
Term
|
Definition
a person grounded in techonology, fluent in business, and able to provide important bridge between MIS and the business |
|
|
Term
eshop (estore or etailer) |
|
Definition
an online version of a retail store where customers can shop at any hour |
|
|
Term
ethical computer use policy |
|
Definition
cotains general principles to guide computer user behavior |
|
|
Term
|
Definition
the principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
refers to discard, obolete, or broken electronic devices |
|
|
Term
|
Definition
consists of anything that can be documented, archived, and codified, often with the help of IT |
|
|
Term
|
Definition
an extension of an intranet that is only available to authorized outsiders, such as customers, partners, or suppliers |
|
|
Term
|
Definition
occurs when the primary machine recovers and resumes operations, taking over the secondary server |
|
|
Term
|
Definition
hardware and or software thta guard a private network by analyzing incoming and outgoing information for the correct markings |
|
|
Term
|
Definition
similar to taxonomy expect that crowdsourcing determines the tags or keyword-based on classification system |
|
|
Term
global positioning system (GPS) |
|
Definition
a satellite based navigation system providing extremely accurate position, times and speed information |
|
|
Term
|
Definition
experts in technology who use their knowledge to break into computers and computer networks, either for profit or movtivated by the challenge |
|
|
Term
|
Definition
have philosophical and political reasons for breaking into systems and will often deface the website as a protest |
|
|
Term
hypertext markup language (HTML) |
|
Definition
links documents allowing users to move from one to another simply by clicking on a hot spot or link |
|
|
Term
hypertext transport protocol (HTTP) |
|
Definition
the internet protocol web browsers use to request and display web pages using universal resource locaters |
|
|
Term
|
Definition
the forging of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
data converted into a meaningful and useful context |
|
|
Term
|
Definition
the act of conforming, acquiescing, or yielding information |
|
|
Term
|
Definition
govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution and processing of information itself (with or without the aid of computer techonolgies) |
|
|
Term
|
Definition
a method or system of government for information management or control |
|
|
Term
|
Definition
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively |
|
|
Term
information privacy policy |
|
Definition
contains general principles regarding information privacy |
|
|
Term
|
Definition
measures the number of people a firm can communicate with all over the world |
|
|
Term
|
Definition
refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video information |
|
|
Term
|
Definition
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
information security plan |
|
Definition
details how and organization will implement the information security policies |
|
|
Term
information security policies |
|
Definition
identify the rules required to maintain information security, such as requiring users to logoff before leaving for lunch or meetings, never sharing passwords with anyone and changing passwords every 30 days |
|
|
Term
information techonology monitoring |
|
Definition
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed |
|
|
Term
|
Definition
legitimate users who purposely or accidentally misuse their access to the enviornment and cause some kind of business affecting incident |
|
|
Term
|
Definition
intangilble creative work that is embodied in physical form and includes copyrights, trademarks, and patents |
|
|
Term
|
Definition
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat vistors to the advertisement |
|
|
Term
|
Definition
agents, software, or businesses that provide a trading infrastructure to bring buyers and seller together |
|
|
Term
|
Definition
a massive network that connects computers all over the world and allows them to communicate with one another |
|
|
Term
internet cable connections |
|
Definition
provides internet access using a cable television company's infrasture and a special cable modem |
|
|
Term
internet service provider (ISP) |
|
Definition
a company that provides access to the internet for a montly fee |
|
|
Term
|
Definition
contains general principles to guide the proper use of the internet |
|
|
Term
|
Definition
a restricted network that relies on internet techonlogies to provide an internet-like enviornment within the compayn for information sharing, communications, collaboration, web publishing, and the support of the business process |
|
|
Term
intrusion detection software (IDS) |
|
Definition
features a full-time montioring tools that search for patterns in network traffic to identify intruders |
|
|
Term
|
Definition
involves capturing, classifying, evaluating, retriving, and sharing information assets in a way that provides context for effective decisions and actions |
|
|
Term
knowledge management system (KMS) |
|
Definition
supports the capuring, organization, and siemination of knowledge (know-how) throughout an organization |
|
|
Term
|
Definition
connects a group of computers in proximity such as in an office building, school, or home |
|
|
Term
location based services (LBS) |
|
Definition
applications that use location information to provide a service |
|
|
Term
|
Definition
referring to the tail of a typical sales curve |
|
|
Term
|
Definition
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning |
|
|
Term
|
Definition
WYSIWYGs of What You See Is What You Get |
|
|
Term
|
Definition
the ability of an organzation to tailor its products or services to the customers' specifications |
|
|
Term
|
Definition
the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group o subscribers who can read the posts as ims or text messages |
|
|
Term
mobile business (mbusiness or mcommerce) |
|
Definition
the ability to purchase goods and services through a wireless internet-enabled device |
|
|
Term
|
Definition
a device that enables a computer to transmit and receive data |
|
|
Term
network access points(NAPs) |
|
Definition
traffic exchange points in the routing hierarchy of the internet that connects NSPs |
|
|
Term
|
Definition
the efficient coexistance of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures |
|
|
Term
|
Definition
describes how products in a network increases in value to users as the number of users inscreases |
|
|
Term
|
Definition
a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions |
|
|
Term
|
Definition
refers to any software whose source code is made available for free for any thrid party to review and modify |
|
|
Term
|
Definition
consists of non propriertary hardware and software based on publicly known standards that allows thrid parties to create add-on products to plug into or interoperate with the system |
|
|
Term
|
Definition
occurs when a new radical form of business enters the market that reshapes the way companies and organization behave |
|
|
Term
|
Definition
a computer network that relies on the computing power and bandwith of the participants in the network rather than a centralized server |
|
|
Term
|
Definition
occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individials or groups based on profile information, demographics, or prior transactions |
|
|
Term
|
Definition
reroutes requests for legitimate websites to false websites |
|
|
Term
|
Definition
a technique to gain personal information for the purpose of identity theft, usually by means of fraudlent emails that look as though they came from legitimate sources |
|
|
Term
|
Definition
the unauthorized use, duplication, distribution, or sale of copyrighted software |
|
|
Term
|
Definition
converts audio broadcast to a digital music player |
|
|
Term
|
Definition
the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent |
|
|
Term
|
Definition
a standard that specifies the format of data as well as the rules to be followed during transmission |
|
|
Term
public key encryption (PKE) |
|
Definition
uses two keys: a public key that everyone can have and a private key for only the receipent |
|
|
Term
real simple syndication (RSS) |
|
Definition
a web format used to publish frequently updated works, such as blogs, news headlines, audio and video in a standardized format |
|
|
Term
|
Definition
steps are added to the value chain as new players find ways to add value to the business process |
|
|
Term
|
Definition
where buyers post feedback on sellers |
|
|
Term
|
Definition
a space station that orbits the earth receiving and transmitting signals from earth based stations over a wide area |
|
|
Term
script kiddies or script bunnies |
|
Definition
find hacking code on the internet and click and point their way into systems to cause damage or spread viruses |
|
|
Term
secure hypertext transfer protocol (SHTTP or HTTPS) |
|
Definition
a combination of HTTP and SSL to provide encryption and secure identification of an intranet server |
|
|
Term
secure sockets layer (SSL) |
|
Definition
a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remains private |
|
|
Term
|
Definition
a component of Web 3.0 that describes things in a way that computer can understand |
|
|
Term
|
Definition
a computer dedicated to providing information in response to requests |
|
|
Term
|
Definition
a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited pro |
|
|
Term
|
Definition
delivers electricity using two way digital techonology |
|
|
Term
|
Definition
offer more advanced computing ability and conectivity then basic cell phones |
|
|
Term
|
Definition
hackers use their social skills to trick people into revealing aaccess credentials or other valuable information |
|
|
Term
|
Definition
refers to website that rely on user participation and user contributed content |
|
|
Term
|
Definition
outlines the corpoarte guidlines or pinciples governing employee online communications |
|
|
Term
|
Definition
the practice of expanding your business and or social contacts by constructing a person network |
|
|
Term
social networking analysis (SNA) |
|
Definition
maps group contacts identifying who knows eahc other and who works together |
|
|
Term
|
Definition
the set of instructions the hardware executes to carry out specific tasks |
|
|
Term
software as a service (SaaS) |
|
Definition
delivers applications over the cloud using a pay per use revenue model |
|
|
Term
|
Definition
contains instructions written by a programmer specifying the actions to be performed by computer software |
|
|
Term
|
Definition
|
|
Term
|
Definition
a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission |
|
|
Term
|
Definition
an electronic document thta confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company |
|
|
Term
|
Definition
a method of sending audio and video files over the internet in such a way that the user can view the file while it is being transmitted |
|
|
Term
|
Definition
refers to the safe disposal of MIS assets at the end of their life cycle |
|
|
Term
sustainable MIS infrastructure |
|
Definition
identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption |
|
|
Term
|
Definition
describes the production, management, use, and disposal of techonology in a way that minimizes damage to the enviornment |
|
|
Term
|
Definition
produces an improved product customers are eager to buy, such as faster car or larger hard driver |
|
|
Term
|
Definition
the knowledge contained in people's heads |
|
|
Term
|
Definition
specific keywords or phrases incorporated into website content for means of classification or taxonomy |
|
|
Term
|
Definition
the scientific classication of organisms into groups based on similarities of the structure or orgin |
|
|
Term
|
Definition
small electronic devices that change user passwords automatically |
|
|
Term
transmission control protocol/internet protocol (TCP/IP) |
|
Definition
provides the techinical foundation for the public internet as wel as for large number of private networks |
|
|
Term
|
Definition
when a system is not operating or cannot be used |
|
|
Term
universal resource locator (URL) |
|
Definition
the address of a file or resource on the web such as www.apple.com |
|
|
Term
|
Definition
the degree to which a system is easy to learn and efficient and satisfying to use |
|
|
Term
|
Definition
offers a pay per use revenue model similar to a metered service such as gas or electricity |
|
|
Term
virtual private network (VPN) |
|
Definition
companies can establish direct private network links among themselves or create private, secure internet access, in effect a "private tunnel" within the internet |
|
|
Term
|
Definition
creates multiple virtual machines on a single computing device |
|
|
Term
|
Definition
software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
uses IP techonology to transmit telephone cals |
|
|
Term
|
Definition
a separate facility with computer equipment that requires installation and configuration |
|
|
Term
|
Definition
refers to the world wide web during its first few years of operations between 1991 and 2003 |
|
|
Term
|
Definition
the net generation of internet use, a more mature distinctive communications platform charachterized by new qualities such as collaboration, sharing and free |
|
|
Term
|
Definition
allow users access to the WWW |
|
|
Term
|
Definition
work at the request of the system owners to find system vulnerablities and plug holes |
|
|
Term
|
Definition
spans a large geogrpahic area such as a state, province, country |
|
|
Term
|
Definition
collaborative Web page that allows users to add, remove, or change content, which can be easily organized and reorganized as required |
|
|
Term
|
Definition
means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves |
|
|
Term
|
Definition
world wide web, provides access to internet information through documents including text, graphics, audio and video files that use a special formatting language called HTML |
|
|