See also
project risk
risk assessment, information systems security,
309, 326, 539–540, 553
Risk Aversion Principle, 130, 155
root domain, 258
ROPMs.
See
real options pricing models
routers, 248
routines, 84, 85
RSI.
See
repetitive stress injury
RSS, 273
Russia, cyberwarfare by, 330
S
S-HTTP (Secure Hypertext Transfer Protocol),
317
S3.
See
Simple Storage Service
SaaS.
See
software as a service
SABRE reservation system, 111, 556
SabreSonic CSS, 556
Safari (browser), 303
safe harbor, 134
safety stock, 342
sailboats, 41–42, 43
Sajus BPM monitoring software, 494
sales and marketing, 43, 44
See also
marketing
sales force automation (SFA), 288, 351
sales revenue model, 388
Salesboom.com, 203
Salesforce.com, 87, 322, 357
SANs (storage area networks), 180
SAP Business ByDesign, 357
SAP Business Information Warehouse, 587
SAP Business Objects, 359
SAP Business Process Testing, 587
SAP Business Suite, 357
SAP Business Suite Applications, 559–560
SAP ERP Human Capital Management system,
467
SAP General Ledger, 586–587
SAP General Ledger Data Migration, 587
SAP Global Trade Services, 575
SAP NetWeaver Business Intelligence, 368
SAP NetWeaver Master Data Management, 368
SAP NetWeaver Portal, 361, 587
Sarbanes-Oxley Act of 2002!, 15, 306–307
SAS Enterprise Miner, 466
Sasser.ftp (malware), 297
Satmetrix Net Promoter, 227
scalability, 194
SCM systems.
See
supply chain management
(SCM) systems
scope of work, project management, 530
scoring models, business process redesign,
535–536
Scrum (software), 547
search engine marketing, 122, 270, 393
search engine optimization (SEO), 270
search engines, 269–271, 393
Second Life, 60
Secure Hypertext Transfer Protocol.
See
S-
HTTP
Secure Sockets Layer.
See
SSL
Index
I 15
Securities and Exchange Commission (SEC),
440
security
cloud computing, 320, 321, 326
defined, 293
legal liability, 306–307
of telephone systems, 294
outsourcing, 319
security breaches, 203
security policy, 310, 326
Wi-Fi, 279, 323
of Wi-Fi networks, 295–296, 316–317, 326
of wireless networks, 295–296, 316–317
See also
cybercrime; data security;
information systems security; Internet
security threats
security breaches, 203
security policy, 310, 326
select
operation, 215, 216
self-managed teams, 92
semantic Web, 274–275
semistructured decisions, 456, 471–473, 479
senior management, 18, 56, 59
decision support for, 473–475, 477
sensitivity analysis, 472
SEO.
See
Search engine optimization
sequences (data analysis), 225
server computer, 248
server software, 248
servers, 163, 168, 180
blade servers, 163, 176, 177, 186
proxy servers, 315
service level agreement (SLA), 193, 320
service-oriented architecture (SOA), 190
service-oriented computing, 515
service platforms, 360–361, 364
service providers, 383, 384
service set identifiers.
Do'stlaringiz bilan baham: |