Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo

A
A/B testing 8.4 Web Analytics
ACID (atomicity, consistency, isolation, and durability) 3.1 Data Types, Database Management Systems, and Tools for Managing Data
Act on the Protection of Personal Information (APPI) 6.3 Data Security and Privacy from a Global Perspective
advanced encryption standard (AES) 5.1 The Importance of Network Security
advertising model 2.3 Digital Business Models
affiliate model 2.3 Digital Business Models
American Society for Industrial Security (ASIS) 1.2 Frameworks of Knowledge and Industry Standards
application programming interface (API) 8.1 The Business Analytics Process
artificial intelligence (AI) 5.1 The Importance of Network Security
augmented reality (AR) 10.1 Defining Emerging Technologies
B
bounce rate 8.4 Web Analytics
business process improvement (BPI) 2.4 Business Process Management
business process management (BPM) 2.4 Business Process Management
business process reengineering (BPR) 2.4 Business Process Management
business requirements document (BRD) 4.2 Defining the Business Problem and User Requirements
C
call to action 8.4 Web Analytics
Certified Ethical Hacker (CEH) 5.4 Career Focus: Key Certifications
Certified Information Security Manager (CISM) 5.4 Career Focus: Key Certifications
Certified Information Systems Security Professional (CISSP) 5.4 Career Focus: Key Certifications, 5.4 Career Focus: Key Certifications
classless inter-domain routing (CIDR) 5.1 The Importance of Network Security
click-through rate (CTR) 8.4 Web Analytics
commercial off-the-shelf 7.4 Cloud-Based Industry Applications
competitive advantage 2.4 Business Process Management
Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) 12.2 Intellectual Property
Computer Fraud and Abuse Act (CFAA) 5.2 Security Technologies and Solutions
confidentiality, integrity, and availability (CIA) triad 5.1 The Importance of Network Security
conversion rate 8.4 Web Analytics
corporate social responsibility (CSR) 12.1 Ethics, Sustainability, and Use of Information Systems
crowdfunding model 2.3 Digital Business Models
customer relationship management (CRM) 7.4 Cloud-Based Industry Applications
customer relationship management (CRM) system 9.2 Setting Up and Managing Projects for Success
cybersecurity specialist 7.1 Fundamentals of Cloud Computing
D
data migration tool 7.3 Cloud Computing Technologies
data protection impact assessment (DPIA) 6.4 Managing Enterprise Risk and Compliance
decision support system (DSS) 1.1 Introduction to Information Systems
digital business model 2.3 Digital Business Models
digital product model 2.3 Digital Business Models
distributed denial-of-service (DDoS) 5.2 Security Technologies and Solutions
Domain Name System (DNS) 5.1 The Importance of Network Security
E
e-commerce model 2.3 Digital Business Models
enterprise modeling and integration (EMI) 10.1 Defining Emerging Technologies
executive information system (EIS) 1.1 Introduction to Information Systems
extract-transform-load (ETL) 8.4 Web Analytics
F
Federal Information Security Management Act (FISMA) 5.3 Information Security and Risk Management Strategies
Federal Information Security Modernization Act (FISMA) 1.2 Frameworks of Knowledge and Industry Standards
field of information systems (IS) 1.1 Introduction to Information Systems
Firewall as a Service (FWaaS) 7.3 Cloud Computing Technologies
G
global information system infrastructure 11.1 The Importance of Global Information Systems
Global Software Development (GSD) services 4.2 Defining the Business Problem and User Requirements
Gorry and Scott Morton framework 2.1 Practices and Frameworks for Data Management
H
Health Information Technology for Economical and Clinical Health (HITECH) Act 5.3 Information Security and Risk Management Strategies
home-grown application 7.4 Cloud-Based Industry Applications
Human Resources Information System (HRIS) 4.2 Defining the Business Problem and User Requirements
Hypertext Transfer Protocol (HTTP) 5.2 Security Technologies and Solutions
Hypertext Transfer Protocol Secure (HTTPS) 5.2 Security Technologies and Solutions
I
information economics 10.1 Defining Emerging Technologies
information security risk management (ISRM) 5.2 Security Technologies and Solutions
Information Technology Infrastructure Library (ITIL) 1.2 Frameworks of Knowledge and Industry Standards
intellectual property law 12.2 Intellectual Property
International Association of Privacy Professionals 12.3 Ethics of Artificial Intelligence Development and Machine Learning
International Electrotechnical Commission (IEC) 6.3 Data Security and Privacy from a Global Perspective
Internet of Things Security Foundation (IoTSF) 6.2 Vulnerabilities and Threats in Web Applications and IoT Technology
internet protocol (IP) address 5.1 The Importance of Network Security
Internet Protocol Security (IPsec) 5.1 The Importance of Network Security
Internet Protocol version 4 (IPv4) 5.1 The Importance of Network Security
Internet Protocol version 6 (IPv6) 5.1 The Importance of Network Security
intrusion detection and prevention system (IDPS) 5.2 Security Technologies and Solutions
M
man-in-the-middle (MitM) attack 5.1 The Importance of Network Security
management information system (MIS) 1.1 Introduction to Information Systems
marketplace model 2.3 Digital Business Models
media access control (MAC) address 5.1 The Importance of Network Security
mission-critical platform 7.4 Cloud-Based Industry Applications
N
National Institute of Standards and Technology (NIST) 6.3 Data Security and Privacy from a Global Perspective
network-attached storage (NAS) 7.1 Fundamentals of Cloud Computing
NIST Cloud Computing Reference Architecture 7.3 Cloud Computing Technologies
P
page tagging 8.4 Web Analytics
Personal Information Protection and Electronic Documents Act 6.1 Key Concepts in Data Privacy and Data Security
Personal Information Protection Law (PIPL) 6.3 Data Security and Privacy from a Global Perspective
PRINCE2 (Projects in Controlled Environments) 9.1 Foundations of Information Systems Project Management
privacy information management system (PIMS) 6.3 Data Security and Privacy from a Global Perspective
Project Management Body of Knowledge (PMBOK) 9.1 Foundations of Information Systems Project Management
Protection of Personal Information Act (POPIA) 6.3 Data Security and Privacy from a Global Perspective
R
recency, frequency, and monetary (RFM) 8.2 Foundations of Business Intelligence and Analytics
relational database management system (RDBMS) 3.1 Data Types, Database Management Systems, and Tools for Managing Data
requirements traceability matrix (RTM) 4.2 Defining the Business Problem and User Requirements
results interpretation 8.1 The Business Analytics Process
role-based access control (RBAC) 5.2 Security Technologies and Solutions
S
scatterplot 8.4 Web Analytics
search engine optimization (SEO) 8.4 Web Analytics
search engine optimization (SEO) services 9.2 Setting Up and Managing Projects for Success
Secure Sockets Layer (SSL) 5.1 The Importance of Network Security
Security as a Service (SECaaS) 7.3 Cloud Computing Technologies
security information and event management (SIEM) 5.2 Security Technologies and Solutions
sensor data collection 8.1 The Business Analytics Process
sharing economy model 2.3 Digital Business Models
Skills Framework for the Information Age (SFIA) 1.2 Frameworks of Knowledge and Industry Standards
SMART (specific, measurable, achievable, relevant, and time-bound) objectives 9.2 Setting Up and Managing Projects for Success
software development life cycle (SDLC) 4.1 Systems Analysis and Design for Application Development
software-defined network (SDN) 7.1 Fundamentals of Cloud Computing
split testing 8.4 Web Analytics
storage-area network (SAN) 7.3 Cloud Computing Technologies
strengths, weaknesses, opportunities, and threats (SWOT) analysis 5.3 Information Security and Risk Management Strategies
Structured Query Language (SQL) injection 5.2 Security Technologies and Solutions
subscription model 2.3 Digital Business Models
supply chain management (SCM) 7.4 Cloud-Based Industry Applications
sustainable consumption and production (SCP) 12.1 Ethics, Sustainability, and Use of Information Systems
sustainable supply chain management (SSCM) 12.1 Ethics, Sustainability, and Use of Information Systems
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution-NonCommercial-ShareAlike License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/foundations-information-systems/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/foundations-information-systems/pages/1-introduction
Citation information

© Feb 17, 2025 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.