A
A/B testing
8.4 Web Analytics
access control model
3.1 Data Types, Database Management Systems, and Tools for Managing Data
accessibility
4.4 Designing for Mobile Devices and Other Design Considerations,
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
accountability
6.1 Key Concepts in Data Privacy and Data Security
ACID (atomicity, consistency, isolation, and durability)
3.1 Data Types, Database Management Systems, and Tools for Managing Data
ACM code of ethics
4.3 Technical Design Methodologies and Practical Applications
Act on the Protection of Personal Information (APPI)
6.3 Data Security and Privacy from a Global Perspective
action plan
6.4 Managing Enterprise Risk and Compliance
activity diagram
4.1 Systems Analysis and Design for Application Development
adaptive development approach
9.1 Foundations of Information Systems Project Management
advanced encryption standard (AES)
5.1 The Importance of Network Security
adversarial debiasing
12.3 Ethics of Artificial Intelligence Development and Machine Learning
advertising model
2.3 Digital Business Models
affiliate model
2.3 Digital Business Models
Agile Manifesto
4.1 Systems Analysis and Design for Application Development
Agile methodology
1.2 Frameworks of Knowledge and Industry Standards
Agile project management
9.1 Foundations of Information Systems Project Management
Agile project managers
4.1 Systems Analysis and Design for Application Development
Agile software development
4.1 Systems Analysis and Design for Application Development
AI facial recognition
8.3 Analytics to Improve Decision-Making
American Society for Industrial Security (ASIS)
1.2 Frameworks of Knowledge and Industry Standards
analytic data
2.1 Practices and Frameworks for Data Management
antivirus
5.2 Security Technologies and Solutions
application control
1.1 Introduction to Information Systems
application programming interface (API)
8.1 The Business Analytics Process
application software
1.1 Introduction to Information Systems
artificial intelligence (AI)
5.1 The Importance of Network Security
As-Is/To-Be process map
4.2 Defining the Business Problem and User Requirements
asymmetric encryption
5.1 The Importance of Network Security
audit
3.3 Mobile Database Development and Cloud Database Management Systems,
6.3 Data Security and Privacy from a Global Perspective,
6.4 Managing Enterprise Risk and Compliance,
6.4 Managing Enterprise Risk and Compliance
augmented reality (AR)
10.1 Defining Emerging Technologies
authentication
5.1 The Importance of Network Security
B
bare metal server
7.2 Cloud Computing Services, Pricing, and Deployment Models
biometric identification
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
blockchain
10.1 Defining Emerging Technologies
bounce rate
8.4 Web Analytics
brainstorming session
9.2 Setting Up and Managing Projects for Success
brute-force attack
5.2 Security Technologies and Solutions
buffer overflow
5.2 Security Technologies and Solutions
business analysis
1.3 Connections between Information Systems and Information Technology
business continuity
7.1 Fundamentals of Cloud Computing
business intelligence (BI)
8.2 Foundations of Business Intelligence and Analytics
business intelligence reporting
8.2 Foundations of Business Intelligence and Analytics
business problem
4.2 Defining the Business Problem and User Requirements
business process
2.4 Business Process Management
business process improvement (BPI)
2.4 Business Process Management
business process management (BPM)
2.4 Business Process Management
business process outsourcing (BPO)
10.3 Societal and Global Importance of Emerging Technologies in Information Systems
business process reengineering (BPR)
2.4 Business Process Management
business requirements document (BRD)
4.2 Defining the Business Problem and User Requirements
C
California Consumer Privacy Act (CCPA)
5.2 Security Technologies and Solutions,
6.1 Key Concepts in Data Privacy and Data Security
call to action
8.4 Web Analytics
capital expenditure
7.2 Cloud Computing Services, Pricing, and Deployment Models
career opportunities
9.3 Career Focus: Opportunities in Information Systems Project Management
causation
8.1 The Business Analytics Process
cause-and-effect analysis
9.2 Setting Up and Managing Projects for Success
certification body
6.3 Data Security and Privacy from a Global Perspective
Certified Ethical Hacker (CEH)
5.4 Career Focus: Key Certifications
Certified Information Security Manager (CISM)
5.4 Career Focus: Key Certifications
Certified Information Systems Security Professional (CISSP)
5.4 Career Focus: Key Certifications,
5.4 Career Focus: Key Certifications
change management process
9.2 Setting Up and Managing Projects for Success
classless inter-domain routing (CIDR)
5.1 The Importance of Network Security
click-through rate (CTR)
8.4 Web Analytics
client/server architecture
4.3 Technical Design Methodologies and Practical Applications
cloud computing
6.1 Key Concepts in Data Privacy and Data Security,
7.1 Fundamentals of Cloud Computing
cloud consumer
7.1 Fundamentals of Cloud Computing
cloud provider
7.1 Fundamentals of Cloud Computing
cloud-based database
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.3 Mobile Database Development and Cloud Database Management Systems,
3.3 Mobile Database Development and Cloud Database Management Systems,
3.3 Mobile Database Development and Cloud Database Management Systems
commercial off-the-shelf
7.4 Cloud-Based Industry Applications
Communication as a Service (CaaS)
7.2 Cloud Computing Services, Pricing, and Deployment Models
community cloud
7.2 Cloud Computing Services, Pricing, and Deployment Models
competitive advantage
2.4 Business Process Management
compliance
6.4 Managing Enterprise Risk and Compliance
Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP)
12.2 Intellectual Property
Computer Fraud and Abuse Act (CFAA)
5.2 Security Technologies and Solutions
computer-aided design (CAD)
4.3 Technical Design Methodologies and Practical Applications
conceptual design
3.1 Data Types, Database Management Systems, and Tools for Managing Data
confidentiality, integrity, and availability (CIA) triad
5.1 The Importance of Network Security
context diagram
4.2 Defining the Business Problem and User Requirements
contingency plan
9.2 Setting Up and Managing Projects for Success
continuous monitoring
5.3 Information Security and Risk Management Strategies,
6.4 Managing Enterprise Risk and Compliance
Control Objectives for Information and Related Technologies (COBIT)
1.2 Frameworks of Knowledge and Industry Standards,
5.3 Information Security and Risk Management Strategies,
6.3 Data Security and Privacy from a Global Perspective
conversion rate
8.4 Web Analytics
copyright infringement
5.2 Security Technologies and Solutions
corporate social responsibility (CSR)
12.1 Ethics, Sustainability, and Use of Information Systems
Correlation
8.1 The Business Analytics Process
cost management
9.2 Setting Up and Managing Projects for Success
cost-benefit analysis
8.2 Foundations of Business Intelligence and Analytics
cross-functional enterprise
11.3 Culture in Information Systems and Global Information Systems Teams
cross-site scripting (XSS)
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
crowdfunding model
2.3 Digital Business Models
cryptographic key
5.1 The Importance of Network Security
cryptography
10.1 Defining Emerging Technologies
customer analytics
8.2 Foundations of Business Intelligence and Analytics
customer behavior data
3.1 Data Types, Database Management Systems, and Tools for Managing Data
customer relationship management (CRM)
7.4 Cloud-Based Industry Applications
customer relationship management (CRM) system
9.2 Setting Up and Managing Projects for Success
cyber espionage
6.1 Key Concepts in Data Privacy and Data Security
cybersecurity
1.4 The Global Importance of Information Systems,
5.1 The Importance of Network Security,
5.1 The Importance of Network Security,
5.1 The Importance of Network Security,
5.2 Security Technologies and Solutions,
10.2 The Evolving Frontiers of Information Systems,
12.1 Ethics, Sustainability, and Use of Information Systems
cybersecurity specialist
7.1 Fundamentals of Cloud Computing
D
data
1.1 Introduction to Information Systems,
1.1 Introduction to Information Systems,
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.1 Data Types, Database Management Systems, and Tools for Managing Data
data analysis
3.2 Practical Applications of Database Design and Management,
8.1 The Business Analytics Process,
8.3 Analytics to Improve Decision-Making
data analytics
8.1 The Business Analytics Process
data capture
1.1 Introduction to Information Systems
data collaboration
12.4 Ethics in Health Informatics
data collection
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.2 Practical Applications of Database Design and Management,
8.3 Analytics to Improve Decision-Making
data consistency
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.1 Data Types, Database Management Systems, and Tools for Managing Data
data definition
2.1 Practices and Frameworks for Data Management
data dictionary
4.3 Technical Design Methodologies and Practical Applications
data dissemination
1.1 Introduction to Information Systems
data flow diagram (DFD)
4.1 Systems Analysis and Design for Application Development
data governance
2.1 Practices and Frameworks for Data Management
data independence
3.1 Data Types, Database Management Systems, and Tools for Managing Data
data integrity
2.1 Practices and Frameworks for Data Management
data interoperability
11.1 The Importance of Global Information Systems
data life cycle
3.2 Practical Applications of Database Design and Management
data localization
6.3 Data Security and Privacy from a Global Perspective
data mapping tool
6.4 Managing Enterprise Risk and Compliance
data marketplace
8.1 The Business Analytics Process
data migration tool
7.3 Cloud Computing Technologies
data minimization
6.4 Managing Enterprise Risk and Compliance
data mining
8.1 The Business Analytics Process
data normalization
8.1 The Business Analytics Process
data packet
5.2 Security Technologies and Solutions
data privacy
6.1 Key Concepts in Data Privacy and Data Security,
6.1 Key Concepts in Data Privacy and Data Security,
6.1 Key Concepts in Data Privacy and Data Security
data privacy regulations
6.1 Key Concepts in Data Privacy and Data Security
data processing
1.1 Introduction to Information Systems
data protection impact assessment (DPIA)
6.4 Managing Enterprise Risk and Compliance
data provenance
6.1 Key Concepts in Data Privacy and Data Security
data quality
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.2 Practical Applications of Database Design and Management
data security
6.1 Key Concepts in Data Privacy and Data Security,
6.3 Data Security and Privacy from a Global Perspective,
6.4 Managing Enterprise Risk and Compliance
data storage
1.1 Introduction to Information Systems,
3.2 Practical Applications of Database Design and Management
database
Introduction,
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.3 Mobile Database Development and Cloud Database Management Systems
database access tool
3.1 Data Types, Database Management Systems, and Tools for Managing Data
Database as a Service (DBaaS)
7.2 Cloud Computing Services, Pricing, and Deployment Models
database management system
3.2 Practical Applications of Database Design and Management
database management system (DBMS)
3.1 Data Types, Database Management Systems, and Tools for Managing Data
de-identification
12.4 Ethics in Health Informatics
decision support system (DSS)
1.1 Introduction to Information Systems
decision tree
8.2 Foundations of Business Intelligence and Analytics,
8.3 Analytics to Improve Decision-Making
decision tree analysis
5.3 Information Security and Risk Management Strategies
decision-making framework
2.1 Practices and Frameworks for Data Management
defense in depth
5.2 Security Technologies and Solutions
delivery model
7.2 Cloud Computing Services, Pricing, and Deployment Models
deployment model
7.2 Cloud Computing Services, Pricing, and Deployment Models
descriptive analytics
8.2 Foundations of Business Intelligence and Analytics
design diagram
4.2 Defining the Business Problem and User Requirements
design thinking
2.4 Business Process Management
diagnostic analytics
8.2 Foundations of Business Intelligence and Analytics
dictionary attack
5.2 Security Technologies and Solutions
digital business model
2.3 Digital Business Models
digital divide
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology,
12.1 Ethics, Sustainability, and Use of Information Systems
digital inclusivity
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
digital innovation
2.5 Digital Innovation Creation, Distribution, and Commercialization
digital media
1.1 Introduction to Information Systems
digital product model
2.3 Digital Business Models
digital signature
5.1 The Importance of Network Security
disaster recovery
7.1 Fundamentals of Cloud Computing
distributed denial-of-service (DDoS)
5.2 Security Technologies and Solutions
distributed denial-of-service (DDoS) attack
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
Domain Name System (DNS)
5.1 The Importance of Network Security
dynamic IP address
5.1 The Importance of Network Security
E
e-commerce model
2.3 Digital Business Models
elastic storage
7.1 Fundamentals of Cloud Computing
electronic health record
4.1 Systems Analysis and Design for Application Development
emerging technology
10.1 Defining Emerging Technologies
encryption
5.1 The Importance of Network Security
end user
7.1 Fundamentals of Cloud Computing
enterprise modeling and integration (EMI)
10.1 Defining Emerging Technologies
enterprise network architecture
4.3 Technical Design Methodologies and Practical Applications
enterprise resource planning (ERP) system
1.1 Introduction to Information Systems,
9.1 Foundations of Information Systems Project Management
enterprise security
6.1 Key Concepts in Data Privacy and Data Security
enterprise system
1.3 Connections between Information Systems and Information Technology
entity relationship diagram (ERD)
4.3 Technical Design Methodologies and Practical Applications
environment
1.1 Introduction to Information Systems
environmental
threat
5.1 The Importance of Network Security
escalation policy
9.2 Setting Up and Managing Projects for Success
ethical consumption
12.1 Ethics, Sustainability, and Use of Information Systems
ethical hacking
5.2 Security Technologies and Solutions
ethics
12.1 Ethics, Sustainability, and Use of Information Systems,
12.1 Ethics, Sustainability, and Use of Information Systems
European Union (EU)
8.1 The Business Analytics Process
executive information system (EIS)
1.1 Introduction to Information Systems
external threat
5.1 The Importance of Network Security
extract-transform-load (ETL)
8.4 Web Analytics
extreme programming (XP)
9.1 Foundations of Information Systems Project Management
F
fair use
12.2 Intellectual Property
Federal Information Security Management Act (FISMA)
5.3 Information Security and Risk Management Strategies
Federal Information Security Modernization Act (FISMA)
1.2 Frameworks of Knowledge and Industry Standards
federated learning
6.1 Key Concepts in Data Privacy and Data Security
field of information systems (IS)
1.1 Introduction to Information Systems
fileless malware
5.2 Security Technologies and Solutions
financial analysis
8.2 Foundations of Business Intelligence and Analytics
financial industry
9.3 Career Focus: Opportunities in Information Systems Project Management
Firewall as a Service (FWaaS)
7.3 Cloud Computing Technologies
five-whys technique
9.2 Setting Up and Managing Projects for Success
freemium model
2.3 Digital Business Models
functional area information system (FAIS)
2.2 Strategies to Improve the Value of Information Technology Within Organizations
functional dependency
3.1 Data Types, Database Management Systems, and Tools for Managing Data
functional requirement
4.2 Defining the Business Problem and User Requirements
G
gap analysis
6.4 Managing Enterprise Risk and Compliance,
6.4 Managing Enterprise Risk and Compliance
GDPR
5.2 Security Technologies and Solutions,
6.4 Managing Enterprise Risk and Compliance,
8.2 Foundations of Business Intelligence and Analytics
GDPR compliance checklist
6.4 Managing Enterprise Risk and Compliance
general control
1.1 Introduction to Information Systems
General Data Protection Regulation (GDPR)
5.2 Security Technologies and Solutions,
6.1 Key Concepts in Data Privacy and Data Security,
8.1 The Business Analytics Process
geographic context
11.1 The Importance of Global Information Systems
Global AI Law and Policy Tracker
12.3 Ethics of Artificial Intelligence Development and Machine Learning
global enterprise strategy
11.2 Global Information Systems Business Models, Logistics, and Risk Management
global frameworks
6.3 Data Security and Privacy from a Global Perspective
global information system
11.1 The Importance of Global Information Systems
global information system infrastructure
11.1 The Importance of Global Information Systems
global information system team
11.3 Culture in Information Systems and Global Information Systems Teams
global innovation
1.4 The Global Importance of Information Systems
global logistics information system (GLIS)
11.2 Global Information Systems Business Models, Logistics, and Risk Management
global regulations
6.3 Data Security and Privacy from a Global Perspective
Global Software Development (GSD) services
4.2 Defining the Business Problem and User Requirements
global supply chain management (GSCM)
11.2 Global Information Systems Business Models, Logistics, and Risk Management
globalization
1.4 The Global Importance of Information Systems
Gorry and Scott Morton framework
2.1 Practices and Frameworks for Data Management
H
hardware
1.1 Introduction to Information Systems,
1.1 Introduction to Information Systems,
1.1 Introduction to Information Systems,
11.1 The Importance of Global Information Systems
health care
9.3 Career Focus: Opportunities in Information Systems Project Management,
12.1 Ethics, Sustainability, and Use of Information Systems
Health Information Technology for Economical and Clinical Health (HITECH) Act
5.3 Information Security and Risk Management Strategies
HIPAA
5.1 The Importance of Network Security,
5.3 Information Security and Risk Management Strategies
home-grown application
7.4 Cloud-Based Industry Applications
homomorphic encryption
6.1 Key Concepts in Data Privacy and Data Security
hot site storage
7.1 Fundamentals of Cloud Computing
Human Resources Information System (HRIS)
4.2 Defining the Business Problem and User Requirements
human-computer interaction (HCI)
12.1 Ethics, Sustainability, and Use of Information Systems
human-in-the-loop system
12.3 Ethics of Artificial Intelligence Development and Machine Learning
Hypertext Transfer Protocol (HTTP)
5.2 Security Technologies and Solutions
Hypertext Transfer Protocol Secure (HTTPS)
5.2 Security Technologies and Solutions
I
identity theft
6.1 Key Concepts in Data Privacy and Data Security
implementation phase
6.4 Managing Enterprise Risk and Compliance
incident response
5.3 Information Security and Risk Management Strategies
incremental development approach
9.1 Foundations of Information Systems Project Management
industrial control systems
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
Industrial Internet Consortium (IIC)
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
Industrial Internet of Things
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
industry standard
1.2 Frameworks of Knowledge and Industry Standards
information
1.1 Introduction to Information Systems
information economics
10.1 Defining Emerging Technologies
information security
5.1 The Importance of Network Security,
5.4 Career Focus: Key Certifications,
12.1 Ethics, Sustainability, and Use of Information Systems
information security management system (ISMS)
5.3 Information Security and Risk Management Strategies,
6.3 Data Security and Privacy from a Global Perspective
information security risk management (ISRM)
5.2 Security Technologies and Solutions
information system
1.1 Introduction to Information Systems
Information Systems Audit and Control Association (ISACA)
1.2 Frameworks of Knowledge and Industry Standards,
5.3 Information Security and Risk Management Strategies
information systems frontiers
10.2 The Evolving Frontiers of Information Systems
information technology (IT)
1.3 Connections between Information Systems and Information Technology,
Introduction
Information Technology Competency Model
1.3 Connections between Information Systems and Information Technology
Information Technology Infrastructure Library (ITIL)
1.2 Frameworks of Knowledge and Industry Standards
infrastructure
7.1 Fundamentals of Cloud Computing
Infrastructure as a Service (IaaS)
7.2 Cloud Computing Services, Pricing, and Deployment Models
integration test
3.2 Practical Applications of Database Design and Management
intellectual property (IP)
5.1 The Importance of Network Security,
5.2 Security Technologies and Solutions
intellectual property law
12.2 Intellectual Property
interface design
4.1 Systems Analysis and Design for Application Development
internal threat
5.1 The Importance of Network Security
International Association of Privacy Professionals
12.3 Ethics of Artificial Intelligence Development and Machine Learning
International Electrotechnical Commission (IEC)
6.3 Data Security and Privacy from a Global Perspective
International Organization for Standardization (ISO)
6.1 Key Concepts in Data Privacy and Data Security,
6.3 Data Security and Privacy from a Global Perspective
Internet of Things (IoT)
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
Internet of Things Security Foundation (IoTSF)
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
internet protocol (IP) address
5.1 The Importance of Network Security
Internet Protocol Security (IPsec)
5.1 The Importance of Network Security
Internet Protocol version 4 (IPv4)
5.1 The Importance of Network Security
Internet Protocol version 6 (IPv6)
5.1 The Importance of Network Security
interoperability
12.4 Ethics in Health Informatics
interoperability standard
11.1 The Importance of Global Information Systems
intrusion detection and prevention system (IDPS)
5.2 Security Technologies and Solutions
intrusion detection system (IDS)
5.3 Information Security and Risk Management Strategies
intrusion prevention system (IPS)
5.3 Information Security and Risk Management Strategies
inventory management
8.2 Foundations of Business Intelligence and Analytics
ISO/IEC 27001
1.2 Frameworks of Knowledge and Industry Standards,
5.3 Information Security and Risk Management Strategies,
6.3 Data Security and Privacy from a Global Perspective
ISO/IEC 27701
6.3 Data Security and Privacy from a Global Perspective
J
JavaScript events
8.4 Web Analytics
job displacement
12.1 Ethics, Sustainability, and Use of Information Systems
K
k-means
8.4 Web Analytics
key performance indicators (KPIs)
8.2 Foundations of Business Intelligence and Analytics
keylogger
5.2 Security Technologies and Solutions
L
least privilege principle
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
line of business data
3.1 Data Types, Database Management Systems, and Tools for Managing Data
linear regression
8.2 Foundations of Business Intelligence and Analytics
log file analysis
8.4 Web Analytics
M
machine learning
10.2 The Evolving Frontiers of Information Systems
man-in-the-middle (MitM) attack
5.1 The Importance of Network Security
management information system (MIS)
1.1 Introduction to Information Systems
manufacturing industry
9.3 Career Focus: Opportunities in Information Systems Project Management
marketplace model
2.3 Digital Business Models
master data
2.1 Practices and Frameworks for Data Management
McKinsey 7-S Framework
1.2 Frameworks of Knowledge and Industry Standards
media access control (MAC) address
5.1 The Importance of Network Security
metric
8.4 Web Analytics
migration strategy
7.3 Cloud Computing Technologies
minority oversampling
12.3 Ethics of Artificial Intelligence Development and Machine Learning
mission-critical platform
7.4 Cloud-Based Industry Applications
mobile app development
3.3 Mobile Database Development and Cloud Database Management Systems
mobile computing
10.2 The Evolving Frontiers of Information Systems
multi factor authentication (MFA)
5.1 The Importance of Network Security,
5.2 Security Technologies and Solutions
multistakeholder collaboration
12.3 Ethics of Artificial Intelligence Development and Machine Learning
N
National Institute of Standards and Technology (NIST)
6.3 Data Security and Privacy from a Global Perspective
natural language processing
10.2 The Evolving Frontiers of Information Systems
needs assessment
11.1 The Importance of Global Information Systems
network architecture
4.3 Technical Design Methodologies and Practical Applications
network engineer
7.1 Fundamentals of Cloud Computing
network protocol
4.3 Technical Design Methodologies and Practical Applications
network-attached storage (NAS)
7.1 Fundamentals of Cloud Computing
neural network
8.3 Analytics to Improve Decision-Making
NIST Cloud Computing Reference Architecture
7.3 Cloud Computing Technologies
NIST framework
5.2 Security Technologies and Solutions
nonfunctional requirement
4.2 Defining the Business Problem and User Requirements
normalization
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
3.1 Data Types, Database Management Systems, and Tools for Managing Data
NoSQL database (Not Only SQL)
3.1 Data Types, Database Management Systems, and Tools for Managing Data
NoSQL database management system
3.1 Data Types, Database Management Systems, and Tools for Managing Data
O
object-oriented database management system (OODBMS)
3.1 Data Types, Database Management Systems, and Tools for Managing Data
on-premise environment
7.1 Fundamentals of Cloud Computing
open-source
12.2 Intellectual Property
open-source software
7.5 Scientific, Industrial, and Social Implications of Cloud Computing
operating system (OS)
1.1 Introduction to Information Systems
operational data
2.1 Practices and Frameworks for Data Management
operational decision
8.3 Analytics to Improve Decision-Making
operational technology
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
organizational culture
11.3 Culture in Information Systems and Global Information Systems Teams
OWASP Secure Coding Practices
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
P
packet sniffer
5.2 Security Technologies and Solutions
page tagging
8.4 Web Analytics
patent law
12.2 Intellectual Property
patient agency
12.4 Ethics in Health Informatics
patient privacy
12.4 Ethics in Health Informatics
Payment Card Industry Data Security Standard (PCI DSS)
5.2 Security Technologies and Solutions,
6.3 Data Security and Privacy from a Global Perspective
peer-to-peer (P2P) architecture
4.3 Technical Design Methodologies and Practical Applications
Personal Information Protection and Electronic Documents Act
6.1 Key Concepts in Data Privacy and Data Security
Personal Information Protection Law (PIPL)
6.3 Data Security and Privacy from a Global Perspective
phishing
5.1 The Importance of Network Security,
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
physical security
6.1 Key Concepts in Data Privacy and Data Security
Platform as a Service (PaaS)
7.2 Cloud Computing Services, Pricing, and Deployment Models
point-of-sale (POS) system
1.1 Introduction to Information Systems,
4.1 Systems Analysis and Design for Application Development
portfolio management
9.1 Foundations of Information Systems Project Management
predictive analysis
11.1 The Importance of Global Information Systems
predictive analytics
8.2 Foundations of Business Intelligence and Analytics
predictive analytics market
10.3 Societal and Global Importance of Emerging Technologies in Information Systems
predictive development approach
9.1 Foundations of Information Systems Project Management
prescriptive analytics
8.2 Foundations of Business Intelligence and Analytics
pretexting
5.2 Security Technologies and Solutions
PRINCE2 (Projects in Controlled Environments)
9.1 Foundations of Information Systems Project Management
privacy
3.3 Mobile Database Development and Cloud Database Management Systems,
12.1 Ethics, Sustainability, and Use of Information Systems
Privacy by Design
6.1 Key Concepts in Data Privacy and Data Security,
6.1 Key Concepts in Data Privacy and Data Security
privacy engineering
6.1 Key Concepts in Data Privacy and Data Security,
6.1 Key Concepts in Data Privacy and Data Security
privacy information management system (PIMS)
6.3 Data Security and Privacy from a Global Perspective
problem definition
8.3 Analytics to Improve Decision-Making
procedure
1.1 Introduction to Information Systems
process design
4.1 Systems Analysis and Design for Application Development
processing
1.1 Introduction to Information Systems
program management
9.1 Foundations of Information Systems Project Management
project charter
9.2 Setting Up and Managing Projects for Success
project closure
9.2 Setting Up and Managing Projects for Success
project development
9.1 Foundations of Information Systems Project Management
project execution
9.2 Setting Up and Managing Projects for Success
project initiation
9.2 Setting Up and Managing Projects for Success
project life cycle (PLC)
9.1 Foundations of Information Systems Project Management
project management
9.1 Foundations of Information Systems Project Management,
9.3 Career Focus: Opportunities in Information Systems Project Management
Project Management Body of Knowledge (PMBOK)
9.1 Foundations of Information Systems Project Management
Project Management Institute (PMI)
9.1 Foundations of Information Systems Project Management
project management office (PMO)
9.1 Foundations of Information Systems Project Management
project manager (PM)
9.1 Foundations of Information Systems Project Management
Protection of Personal Information Act (POPIA)
6.3 Data Security and Privacy from a Global Perspective
protocol analyzer
5.2 Security Technologies and Solutions
Q
qualitative assessment
5.3 Information Security and Risk Management Strategies
qualitative data
1.1 Introduction to Information Systems
quantitative data
1.1 Introduction to Information Systems
quantitative risk assessment
5.3 Information Security and Risk Management Strategies
quantum computing
10.1 Defining Emerging Technologies
R
ransomware
5.1 The Importance of Network Security
recency, frequency, and monetary (RFM)
8.2 Foundations of Business Intelligence and Analytics
reference data
2.1 Practices and Frameworks for Data Management
referential constraint
3.1 Data Types, Database Management Systems, and Tools for Managing Data
regression
8.3 Analytics to Improve Decision-Making
regulatory compliance
6.1 Key Concepts in Data Privacy and Data Security
regulatory framework
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
relational database
3.1 Data Types, Database Management Systems, and Tools for Managing Data
relational database management system (RDBMS)
3.1 Data Types, Database Management Systems, and Tools for Managing Data
remote auditing
6.3 Data Security and Privacy from a Global Perspective
request for proposal
7.2 Cloud Computing Services, Pricing, and Deployment Models
request for quote
7.2 Cloud Computing Services, Pricing, and Deployment Models
requirements analysis
3.1 Data Types, Database Management Systems, and Tools for Managing Data
requirements traceability matrix (RTM)
4.2 Defining the Business Problem and User Requirements
resource planning
9.2 Setting Up and Managing Projects for Success
resource utilization
11.1 The Importance of Global Information Systems
response and recovery
5.3 Information Security and Risk Management Strategies
responsive design
4.4 Designing for Mobile Devices and Other Design Considerations
results interpretation
8.1 The Business Analytics Process
retrospective meeting
4.1 Systems Analysis and Design for Application Development
return on investment (ROI)
7.2 Cloud Computing Services, Pricing, and Deployment Models,
9.1 Foundations of Information Systems Project Management
risk appetite
5.2 Security Technologies and Solutions
risk assessment
5.3 Information Security and Risk Management Strategies,
6.4 Managing Enterprise Risk and Compliance
risk assessment phase
5.3 Information Security and Risk Management Strategies
risk management
6.1 Key Concepts in Data Privacy and Data Security,
6.4 Managing Enterprise Risk and Compliance,
9.2 Setting Up and Managing Projects for Success
risk management plan (RMP)
5.3 Information Security and Risk Management Strategies
risk register
9.2 Setting Up and Managing Projects for Success
risk response strategies
9.2 Setting Up and Managing Projects for Success
risk tolerance
5.2 Security Technologies and Solutions
risk-based authentication
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
Robert Anthony framework
2.1 Practices and Frameworks for Data Management
robotics
10.1 Defining Emerging Technologies
role-based access control (RBAC)
5.2 Security Technologies and Solutions
RSA encryption
5.1 The Importance of Network Security
S
scalability
7.1 Fundamentals of Cloud Computing
scatterplot
8.4 Web Analytics
scope creep
9.2 Setting Up and Managing Projects for Success
search engine optimization (SEO)
8.4 Web Analytics
search engine optimization (SEO) services
9.2 Setting Up and Managing Projects for Success
secure device onboarding
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
Secure Sockets Layer (SSL)
5.1 The Importance of Network Security
Security as a Service (SECaaS)
7.3 Cloud Computing Technologies
security information and event management (SIEM)
5.2 Security Technologies and Solutions
Security+
5.4 Career Focus: Key Certifications
self checkout (SCO)
10.3 Societal and Global Importance of Emerging Technologies in Information Systems
semistructured data
3.1 Data Types, Database Management Systems, and Tools for Managing Data
sensor data collection
8.1 The Business Analytics Process
sequence diagram
4.1 Systems Analysis and Design for Application Development
service-level agreement (SLA)
7.2 Cloud Computing Services, Pricing, and Deployment Models
sharing economy model
2.3 Digital Business Models
Skills Framework for the Information Age (SFIA)
1.2 Frameworks of Knowledge and Industry Standards
SMART (specific, measurable, achievable, relevant, and time-bound) objectives
9.2 Setting Up and Managing Projects for Success
social engineering
5.1 The Importance of Network Security
social media
1.1 Introduction to Information Systems,
12.1 Ethics, Sustainability, and Use of Information Systems
social responsibility
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
software
1.1 Introduction to Information Systems,
1.1 Introduction to Information Systems,
1.1 Introduction to Information Systems,
11.1 The Importance of Global Information Systems
Software as a Service (SaaS
6.1 Key Concepts in Data Privacy and Data Security
Software as a Service (SaaS)
7.2 Cloud Computing Services, Pricing, and Deployment Models
software development life cycle (SDLC)
4.1 Systems Analysis and Design for Application Development
software-defined network (SDN)
7.1 Fundamentals of Cloud Computing
spatial analysis
11.1 The Importance of Global Information Systems
split testing
8.4 Web Analytics
sprint
1.2 Frameworks of Knowledge and Industry Standards,
4.1 Systems Analysis and Design for Application Development,
9.1 Foundations of Information Systems Project Management
SQL injection
3.1 Data Types, Database Management Systems, and Tools for Managing Data,
6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
stakeholder
4.1 Systems Analysis and Design for Application Development,
9.1 Foundations of Information Systems Project Management
stakeholder analysis
9.1 Foundations of Information Systems Project Management
statement of work
9.2 Setting Up and Managing Projects for Success
static IP address
5.1 The Importance of Network Security
storage-area network (SAN)
7.3 Cloud Computing Technologies
strategic decision
8.3 Analytics to Improve Decision-Making
strengths, weaknesses, opportunities, and threats (SWOT) analysis
5.3 Information Security and Risk Management Strategies
Structured Query Language (SQL)
3.1 Data Types, Database Management Systems, and Tools for Managing Data
Structured Query Language (SQL) injection
5.2 Security Technologies and Solutions
subnet mask
5.1 The Importance of Network Security
subscription model
2.3 Digital Business Models
supply chain analysis
8.2 Foundations of Business Intelligence and Analytics
supply chain management (SCM)
7.4 Cloud-Based Industry Applications
sustainability
12.1 Ethics, Sustainability, and Use of Information Systems,
12.1 Ethics, Sustainability, and Use of Information Systems
sustainable consumption and production (SCP)
12.1 Ethics, Sustainability, and Use of Information Systems
Sustainable Development Goals (SDGs)
12.1 Ethics, Sustainability, and Use of Information Systems
Sustainable IS
12.1 Ethics, Sustainability, and Use of Information Systems
sustainable supply chain management (SSCM)
12.1 Ethics, Sustainability, and Use of Information Systems
SWOT analysis
9.2 Setting Up and Managing Projects for Success
symmetric encryption
5.1 The Importance of Network Security
system administrator
7.1 Fundamentals of Cloud Computing
system design process
4.3 Technical Design Methodologies and Practical Applications
system documentation
4.1 Systems Analysis and Design for Application Development
system requirements
3.2 Practical Applications of Database Design and Management
systems analysis
4.1 Systems Analysis and Design for Application Development
systems analyst
4.1 Systems Analysis and Design for Application Development
systems design
4.1 Systems Analysis and Design for Application Development
systems design task list
4.3 Technical Design Methodologies and Practical Applications
systems thinking
12.1 Ethics, Sustainability, and Use of Information Systems
T
tactical decision
8.3 Analytics to Improve Decision-Making
tailgating
5.2 Security Technologies and Solutions
technology addiction
12.1 Ethics, Sustainability, and Use of Information Systems
Testing as a Service (TaaS)
7.2 Cloud Computing Services, Pricing, and Deployment Models
The International Institute for Business Analysis (IIBA)
4.1 Systems Analysis and Design for Application Development
The Open Group Architecture Framework (TOGAF)
1.2 Frameworks of Knowledge and Industry Standards
third-party access
6.1 Key Concepts in Data Privacy and Data Security
time-series data
8.2 Foundations of Business Intelligence and Analytics
total cost of ownership
7.2 Cloud Computing Services, Pricing, and Deployment Models
trade dress
12.2 Intellectual Property
trade secret law
12.2 Intellectual Property
trademark law
12.2 Intellectual Property
transaction processing system (TPS)
1.1 Introduction to Information Systems
Transmission Control Protocol/Internet Protocol (TCP/IP)
1.1 Introduction to Information Systems
Transport Layer Security (TLS)
5.1 The Importance of Network Security
U
U.S. Advanced Research Projects Agency Network (ARPANET)
1.1 Introduction to Information Systems
unstructured data
3.1 Data Types, Database Management Systems, and Tools for Managing Data
use case diagram
4.2 Defining the Business Problem and User Requirements
user acceptance testing
3.2 Practical Applications of Database Design and Management
user experience (UE or UX)
4.4 Designing for Mobile Devices and Other Design Considerations
user interface (UI)
4.4 Designing for Mobile Devices and Other Design Considerations
user requirements
3.2 Practical Applications of Database Design and Management,
4.2 Defining the Business Problem and User Requirements
user-centered design (UCD)
4.4 Designing for Mobile Devices and Other Design Considerations
utilitarianism
12.1 Ethics, Sustainability, and Use of Information Systems
V
values-based engineering (VbE)
4.1 Systems Analysis and Design for Application Development
vendor diversity
5.2 Security Technologies and Solutions
virtual private network (VPN)
5.1 The Importance of Network Security
virtual reality (VR)
10.1 Defining Emerging Technologies
virtualization
7.1 Fundamentals of Cloud Computing
virtualization technology
7.1 Fundamentals of Cloud Computing
visualization
8.2 Foundations of Business Intelligence and Analytics
W
web analytics
8.4 Web Analytics
web content accessibility guidelines (WCAG)
4.4 Designing for Mobile Devices and Other Design Considerations
web scraping
8.1 The Business Analytics Process
work breakdown structure (WBS)
9.2 Setting Up and Managing Projects for Success
World Intellectual Property Organization (WIPO)
12.2 Intellectual Property
World Wide Web
1.1 Introduction to Information Systems
Z
Zachman Framework
1.2 Frameworks of Knowledge and Industry Standards
zero trust
5.2 Security Technologies and Solutions