hardware
the physical tools and equipment used to collect, input, store, organize, and process data and to distribute information
software
programs that provide instructions to a computer so that is can perform a desired task
system software
software that performs the critical functions necessary to operate the computer at the most basic level
applications software
software that helps a user perform a desired task
internet
the world's largest computer network; essentially a network of computer networks all operating under a common set of rules that allow them to communicate with each other
broadband internet connection
an internet connection that is capable of transmitting large amounts of information very quickly
internet2 [12]
a new high-tech internet with access limited to a consortium of member organizations (and other organizations these members sponsor). 12 utilizes technologies that give it a speed and capacity far exceeding the current internet
intranet
a private network that has the look and feel of the internet and is navigated using a web browser, but which limits access to a single firm's employees (or a single organization's members)
extranet
an intranet that allows limited access to a selected group of stakeholders, such as suppliers or customers
cloud computing
the use internet-based storage capacity, processing power, and computer applications to supplement or replace internally owned information technology resources
data
raw, unprocessed facts and figures
information
data that have been processed in a way that makes them meaningful to their user
database
a file consisting of related data organized according to a logical system and stored on a hard drive or other computer-accessible media
decision support system (DSS)
a system that gives managers access to large amounts of data and the processing power to convert these data into high-quality information, thus improving the decision-making process
business intelligence system
a sophisticated form of decision support system that helps decision makers discover information that was previously hidden
data warehouse
a large, organization-wide database that stores data in a centralized location
data mining
the use of sophisticated statistical and mathematical techniques to analyze data and discover hidden patterns and relationships among data, thus creating valuable information
expert system [ES]
a decision support system that helps managers make better decisions in an area where they lack expertise
e-commerce
the marketing, buying, selling, and servicing of products over a network (usually the internet)
business-to-consumer [B2C] e-commerce
e-commerce in which businesses and final consumers interact
business-to-business [B2B] e-commerce
e-commerce in markets where businesses buy from and sell to other businesses
Web 2.0
websites that incorporate interactive and collaborative features in order to create a richer, more interesting, and more useful experience for their users
viral marketing
an internet marketing strategy that tries to involve customers and others not employed by the seller in activities that help promote the product
cybermediary
an internet-based firm that specializes in the secure electronic transfer of funds
electronic bill presentment and payment
a method of bill payment that makes it easy for the customer to make a payment, often by simply clicking on a payment option contained in an email
e-marketplace
a specialized internet site where buyers and sellers engaged in business to business e-commerce can communicate and conduct business
radio frequency identification [RFID]
a technology that stores information on small microchips that can transmit the information when they are within range of a special reader
malware
a general term for malicious software, such as spyware, computer viruses, and worms
spyware
software that is installed on a computer without the user's knowledge or permission for the purpose of tracking the user's behavior
computer virus
computer software that can be spread from one computer to another without the knowledge or permission of the computer users by attaching itself to emails or other files
worm
malicious computer software that, unlike viruses, can spread on its own without being attached to other files