An Executive's Guide to Information Technology: Principles, Business Models, and Terminology

  • 10h 41m
  • Robert Plant, Stephen Murrell
  • Cambridge University Press
  • 2007

Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more than a dictionary - it is a concise review of the most important aspects of information technology from a business perspective: the major advantages, disadvantages and business value propositions of each term are discussed, as well as sources for further reading, and cross-referencing with other terms where applicable. The essential elements of each concept are covered in a succinct manner so the reader can quickly obtain the required knowledge without wading through exhaustive descriptions. With over 200 terms, this is a valuable reference for non- and semi-technical managers, executives and graduate students in business and technology management.

  • Provides a clear definition for each term, as well as an unbiased appraisal of its business value proposition
  • Includes a set of UK and US legislative requirements under which organizations must operate
  • Sources of further reading are provided so that the topics can be taken further if desired

About the Authors

Robert Plant obtained his Ph.D. in Computer Science at the University of Liverpool in 1987. He is currently an associate professor for the School of Business Administration at the University of Miami, and specializes in teaching MIS Strategy both there and at other universities and companies. His research interests focus on the role of information systems in strategic management.

Stephen Murrell obtained his D.Phil. in Computation in 1986 from the Oxford University’s Programming Research Group. He is currently a lecturer in Computer Engineering at the University of Miami, where he specializes in teaching programming, algorithms, and operating systems. His primary area of research is in programming languages.

In this Book

  • A: ACM (Association for Computing Machinery)—Audio
  • B: Backup—Business Process Re-engineering
  • C: C, C++, C#—Cracking
  • D: Database—Dynamic Web Pages
  • E: e-Commerce/e-business—European Union Directive on Privacy and Electronic Commerce 2002
  • F: Fiber optics—Fuzzy logic
  • G: Global positioning system—Groupware
  • H: Hacker—Hypertext, HTML
  • I: ICANN (Internet Corporation for Assigned Names and Numbers)—ISP (Internet service provider)
  • J: Java—Joint application design (JAD)
  • K: Knowledge-based systems—Knowledge management
  • L: LAN/WAN/subnet/internet/intranet—Logic programming
  • M: Machine learning—Multicast
  • N: Natural language processing (NLP)—Normalization
  • O: Object-oriented—Outsourcing
  • P: Packet switching and circuit switching—Public key-private key
  • Q: Quantum computing—Quantum computing
  • R: RAID (redundant array of independent disks)—RSS (Really simple syndication)
  • S: Sarbanes-Oxley Act of 2002 (SOX)—Structured design methodologies
  • T: T-Carrier—Trojan horse
  • U: UML (Unified Modeling Language)—URL (Uniform resource locator)
  • V: Value added network (VAN)—Voice over IP (VoIP)
  • W: W3C (the World Wide Web Consortium)—WYSIWYG
  • X: X.12—XML
  • Y: Y2K problem—Y2K problem
  • Z: Zip—Zip
SHOW MORE
FREE ACCESS