Вы находитесь на странице: 1из 770

Dictionary of Information

Science and Technology

Volume I
A-J

Mehdi Khosrow-Pour
Information Resources Management Association, USA

I DEA GROU P REFEREN CE


Hershey London Melbourne Singapore
Acquisitions Editor: Kristin Klinger
Development Editor: Kristin Roth
Senior Managing Editor: Jennifer Neidig
Managing Editor: Sara Reed
Copy Editor: Maria Boyer
Typesetter: Diane Huskinson
Cover Design: Lisa Tosheff
Printed at: Yurchak Printing Inc.

Published in the United States of America by


Idea Group Reference (an imprint of Idea Group Inc.)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@idea-group.com
Web site: http://www.idea-group-ref.com

and in the United Kingdom by


Idea Group Reference (an imprint of Idea Group Inc.)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanonline.com

Copyright 2007 by Idea Group Inc. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identiication purposes only. Inclusion of the names of the products or companies
does not indicate a claim of ownership by IGI of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Dictionary of information science and technology / Mehdi Khosrow-Pour, editor.


p. cm.
Summary: This book is the premier comprehensive reference source for the latest terms, acronyms and deinitions related to all
aspects of information science and technology. It provides the most current information to researchers on every level--Provided by
publisher.
Includes bibliographical references and index.
ISBN 1-59904-385-8 (hardcover) -- ISBN 1-59904-386-6 (ebook)
1. Information science--Dictionaries. 2. Information technology--Dictionaries. I. Khosrowpour, Mehdi, 1951-
T58.5.D499 2006
020.03--dc22
2006030015

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this handbook is new, previously-unpublished material. The views expressed in this handbook are those of
the authors, but not necessarily of the publisher.
1

Contents

Volume I

A ...........................................................................................................................................................1
B .........................................................................................................................................................46
C .........................................................................................................................................................69
D .......................................................................................................................................................152
E .......................................................................................................................................................200
F .......................................................................................................................................................254
G.......................................................................................................................................................277
H.......................................................................................................................................................296
I ........................................................................................................................................................314
J ........................................................................................................................................................376

Volume II

K.......................................................................................................................................................379
L .......................................................................................................................................................400
M ......................................................................................................................................................423
N .......................................................................................................................................................467
O.......................................................................................................................................................481
P .......................................................................................................................................................507
Q.......................................................................................................................................................557
R .......................................................................................................................................................563
S .......................................................................................................................................................591
T .......................................................................................................................................................668
U .......................................................................................................................................................703
V .......................................................................................................................................................716
W ......................................................................................................................................................737
X .......................................................................................................................................................758
Y .......................................................................................................................................................760
Z .......................................................................................................................................................761
2
v

Preface

During the past few decades, considerable advancements of computer technologies, combined with innovations achieved
in telecommunication technologies, have served as fuel for the formation of a new discipline, known today as information
science and technology (IST). Since its inception, IST has grown to encompass many other speciic areas within the ield
itself, allowing the IST domain of studies to expand exponentially. Moreover, the primary focus of IST as a discipline
is broadening the science of information processing, management, and dissemination. This newly developed scientiic
paradigm is comprised of many resources and components, including: (1) type of information; (2) computer hardware
technologies; (3) computer software technologies; (4) telecommunication technologies; (5) technology applications; (6)
information processing systems structures; (7) systems personnel and management; (8) end users; and (9) management
skills and programs (Khosrow-Pour & Yaverbaum, 1990). In recent years, the IST revolution has globally impacted all
aspects of life at the individual, organizational, and societal level. In many ways, IST has been the principal driving
force behind the second industrial revolution, known as the digital revolution.
The expansion of IST as a science, like other scientiic ields, such as medicine, has created a new language illed
with terminologies, key words, and acronyms unique to IST and its speciic disciplines. Furthermore, the sheer volume
of ongoing discoveries of new technologies and applications, as well as transpiring research indings, continue to expand
the list of terminology associated with the ield of IST. Because of these incessant advancements, it is nearly impossible
to maintain an understanding of the jargon related to IST and its peripheral domains of study without comprehending
its emerging technological vernacular.
To provide the most comprehensive coverage of IST language, the idea of a new Dictionary of Information Science and
Technology was formed to provide the most in-depth and complete introduction to all terms, acronyms, and deinitions
related to some of most commonly studied areas of IST, such as accounting information systems; database management
and technologies; data warehousing and mining; decision support systems technologies; distance education technologies;
e-collaboration; electronic commerce technologies management; end user computing; enterprise resource planning,
expert systems; geographical information systems; global IT management; human computer interaction; human side of
IT; information resources management; information security management; information systems research; information
technology education; IT evaluation methods and management; IT management in libraries; IT management in health care;
IT in small business; IT personnel; professional IT association; intelligent information systems; knowledge management;
minorities in information technology; mobile computing and commerce; multimedia information management; objected
oriented technologies; open source technologies and systems; social responsibility in the information age; software
engineering; strategic IT management; telecommunications and networking technologies; uniied modeling languages
and uniied process; and virtual communities and IT.
Perhaps the most challenging task related to the compilation of a dictionary for such a young ield of science, is the
fact that there is no single or standard deinition in existence for each element of the vocabulary. Instead, individual
researchers have formed distinctive descriptions of the terminology, providing a much more meaningful and broader
understanding of each term. To achieve this goal, all attempts were made to supply the user of this dictionary with the
most inclusive deinition used to describe every term, and not just a singular deinition designated by the editor. An
exhibition of numerous language contributions from different researchers have been listed for each of the terms, allowing
vi

the user to be exposed to different angles of each deinition in hopes that the user will form a much broader understanding
of the vocabulary that is speciic to IST.
This dictionary is divided into two sections. The irst section lists all terms and acronyms in alphabetical order. Each
term may consist of multiple deinitions, numbered in sequential order, and ends with the source/reference from which the
deinition was derived. The second section includes the complete reference information, also organized in alphabetical
order and formatted to comply with American Psychological Association (APA) recommended style guidelines. Although
one might notice a wide range of deinitions for various terms, it is our opinion that it is much more helpful to provide an
expansive list of deinitions rather than limit the meaning to a singular description. Furthermore, to defuse any inaccuracy
in the deinitions obtained from different sources, it was decided to provide the most complete meaning as possible,
allowing for any confusion that may result from the descriptions to be dealt with in light of other explanations.
The two-volume Dictionary of Information Science and Technology is the premier comprehensive resource composed
of the latest terms and deinitions related to all aspects of the information science and technology ield. This complete and
timely reference collection of over 13,000 deinitions for more than 11,000 terms and acronyms will provide researchers,
practitioners, educators and students with the most accurate and current knowledge available of prevalent key words in
the ever-expanding world of IST. Terms and deinitions included in this important reference publication were contributed
by over 2,500 noted researchers from over 40 countries. The Dictionary of Information Science and Technology will
prove to be a valuable and essential reference publication for libraries and individuals worldwide.
To make sure that the Dictionary of Information Science and Technology and its coverage stays up-to-date, access to
the dictionarys online database, which provides complete search capabilities, will be offered to all libraries at a discount
of 50% off the subscription price upon purchase of the print copy. This database will be updated on a regular basis with
new terms, acronyms, and their deinitions, and will provide coverage of all new and emerging terminologies and their
deinitions as they materialize.
The comprehensive coverage of thousands of terms and acronyms provided in this two-volume resource will
contribute to a better understanding of the technical and managerial language available and its applications for the ield
of information science and technology. Furthermore, the deinitions included in this dictionary will be instrumental in
the body of knowledge expanding in this vast ield. The coverage of this two-volume dictionary provides strength to this
source of reference for both information science and technology researchers in obtaining a greater comprehension of the
language of IST. It is my sincere hope that this reference publication and its immeasurable amount of valuable information
will assist my research colleagues, all faculty, their students, and practitioners in enhancing their understanding of this
discipline. Perhaps this publication will even inspire additional breakthroughs in this gigantic ield and elevate it to a
much higher level within the world of scientiic discoveries.

Mehdi Khosrow-Pour, D.B.A.


Information Resources Management Association, USA

Reference

Khosrow-Pour, M., & Yaverbaum, G.J. (1990). Information technology resources utilization and management: Issues
and trends. Hershey, PA: Idea Group Publishing.
vii

Acknowledgments

Putting together a comprehensive publication of this magnitude requires tremendous involvement and assistance from
many individuals. The most important goal of editing this dictionary was to compile a comprehensive list of terms,
acronyms and their deinitions in the ield of information science and technology. This goal could not have been achieved
without the valuable contributions of more than 2,500 researchers in the ield of IST, and I am very thankful for their
contributions to this publication.
In terms of editorial assistance, I would like to convey my deep appreciation and gratitude to my editorial staff
at Idea Group Reference (IGR), including Ms. Michelle Potter, former acquisitions and development editor, for her
immeasurable assistance during the development process for this publication. I would also like to express my many
thanks to Ms. Kristin Roth, development editor, Ms. Lynley Lapp, former assistant development editor, Ms. Kristin
Klinger, acquisitions editor, Ms. Lauren Kenes, former editorial assistant, Ms. Sara Reed, managing editor, Ms. Jennifer
Neidig, senior managing editor, Ms. Diane Huskinson, assistant managing editor, Ms. Lisa Tosheff, graphic artist, and
Ms. Maria Boyer, copy editor for their involvement and assistance with this publication. My warmest thanks also go to
my wife, Beth Peiffer, for her support, wisdom, encouragement, understanding, patience, and love. My heart also goes
to my two young girls, Basha and Anar, for the joys that they have brought to my life. Finally, much gratitude goes to
all those who have taught me immeasurable amounts during the past three decades.

Mehdi Khosrow-Pour, D.B.A.


Information Resources Management Association, USA
viii

About the Editor

Mehdi Khosrow-Pour, DBA is currently the executive director of the Information Resources Management Association
(IRMA), USA, and senior academic editor for Idea Group Reference. Previously, he served on the faculty of the Pennsylvania
State University as an associate professor of information systems for 20 years. He has written or edited over 30 books
in information technology management, and he is also the editor of the Information Resources Management Journal,
Journal of Electronic Commerce in Organizations, Journal of Cases on Information Technology, and International
Journal of Cases on Electronic Commerce.
Aa d Ac a de m ic Adm inist rat ion 1

A
Aad: See Attitude Toward the Ad. of its employees. The greater the absorptive capacity of
an organization, the greater its ability to learn and adapt
AAR: See After-Action Review. to changing market forces. (Jones & Gupta, 2005) 2:
Relects the receiving employees ability to absorb the
Abduction knowledge sent by the giving employee. (Chen, Duan, et
1: Abduction is the process by which a new concept is al., 2006) 3: The ability of a irm to recognize the value
formed on the basis of an existing concept that is perceived of new, external information; assimilate it; and apply it
as having something in common with it. Therefore to commercial ends. (Priestley, 2006; Yaniv & Schwartz,
abduction focuses on associations. (Nobre, 2006a) 2: 2006; Lertwongsatien & Wongpinunwatana, 2005)
The explanatory process of inferring certain facts and/or
hypotheses that explain or discover some phenomenon or Abstract Dimension
observation. (Magnani & Bardone, 2006) Describes the soft issues of a relationship. (Leonard,
2005)
Abductive Mode
This mode permits programs to explore how did this Abstract Windows Toolkit (AWT)
happen? or provides for diagnostic programming features. Library of classes for writing window interfaces. (Lucas,
(Murthy & Krishnamurthy, 2005c) 2005)

Ability Grouping Abstraction Levels


The practice of forming learning groups of students of A model is an abstraction, and as such it may represent
similar abilities, for example, putting students who read an aspect of reality with some level of detail. Different
on a third-grade level with other students who read on a models can represent the same aspect, each with a different
third-grade level. (Trammell, 2005) abstraction level. The abstraction level is directly related
to the amount of detail represented in the model. (Tobar
Abort et al., 2006)
Cancels all modiications of a transaction. (Meixner,
2005) Academic Accountability
The emphasis from society, government, and academia that
ABS: See Australian Bureau of Statistics. education should lead to beneicial outcomes and learning
that can be measured. (Lindsay, Williams, et al., 2005)
Absolute Difference
A measure that represents the difference between an Academic Administration
association and a conditional association based on a given Administration procedures or formalities linked with
measure. The condition provides a plausible explanation. university education, such as registrations for semesters or
(Yao & Zhao, 2005) examinations, progress reviews and monitoring, eligibility
formalities, student history records or progress archiving,
Absorptive Capacity promotions to levels or years, academic timetables, and
1: An organizations ability to absorb new knowledge; so forth. (Fernando, 2005)
often based on the prior experience and knowledge base

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
2 Ac c e pt a ble U se Policy (AU P) Ac c e ss Point (AP)

Acceptable Use Policy (AUP) mechanism which grants, denies, or revokes permissions.
1: A policy created in an organization to outline the (Mundy & Otenko, 2005) 3: Software control of the use
A permitted and restricted uses of the companys networks of a computer. (N.C. Rowe, 2006c)
and computer systems. (Urbaczewski, 2005) 2: A written
policy document that deines what activities are appropriate Access Control List (ACL)
and inappropriate for a user of a particular resource. A A list of people or other entities permitted to access a
document indicating the understanding and acceptance of computer resource. (Mattord & Whitman, 2005)
an AUP is often required to be formally signed by a user
before he or she gains access to the resource. (Knight & Access History
Labruyere, 2005) Navigation path taken by a user as he/she surfs a Wireless
Application Protocol (WAP). (Quah & Seet, 2006)
Access
1: One of the three preconditions for citizen participation in Access Latency
e-democracy (accesscompetencemotivation). Access to The delay time when a data item or object is accessed.
communication involves existence of technical and logical (Tse, 2006)
access point, communications device, and permission to
access. (Keskinen & Kuosa, 2005) 2: Citizens have access Access Link
to the technology they need. Access is both physical (ICT Web page address used for navigation purposes. (Quah
is located at a physically appropriate place, such as in the & Seet, 2006)
home, community center, library, or school) and economic
(it is affordable). (Williamson, 2005) 3: Refers to the Access Method
ability to get into, and use, an online system. Access to 1: A data structure that enables fast access over the
the Internet through commercial online services requires records of a database ile. Careful tuning or selection of the
an account, an access telephone number, a password, and appropriate access method is very important in database
special software designed for that service. (Magagula, performance. (Tzouramanis, 2005) 2: In the database
2005) 4: The ability to ind or to exchange information domain, indexes are designed to access data that are stored
via online media. (St.Amant, 2005d) 5: The ability to in a speciic structure. The type of data and the type of
physically or electronically obtain data or information. the structure used determine the procedures followed by
(Buche & Vician, 2005) 6: The ability, the opportunity, the index to access these data, which is referred to as the
or the right to enter or use technology and all that it has access method. (Gaffar, 2005) 3: A technique of organizing
to offer in todays society. (Reilly, 2005) 7: The quality data that allows the eficient retrieval of data according
principle that is the fundamental motivation for online to a set of search criteria. R-trees and Quadtrees are two
learning, access means that people who are qualiied and well-known families of such techniques. (Vassilakopoulos
motivated can obtain affordable, quality education in the & Corral, 2005)
discipline of choice. (Moore, Bourne, et al., 2005)
Access Network: See Local Network.
Access Board Standards
Technical and functional performance criteria developed by Access Point (AP)
the Architectural and Transformation Barriers Compliance 1: A device that connects wireless communication
Board (the Access Board), a U.S. government agency, devices to create a wireless network. A wireless access
under Section 508. Only electronic and information point acts as the networks arbitrator, negotiating when
technology conforming to these standards is considered each nearby client device can transmit. Many access points
accessible. (Schmetzke, 2005) can be connected together to create a larger network that
allows roaming, where a person using the network can
Access Control infrastructure a network. In contrast, a network where
1: Methods used to determine if requests to use a system, the client devices manage themselves is called an ad-hoc
network, application, or resource should be granted or network. (Kao & Rerrer, 2006) 2: Equivalent to a cellular
denied. (Knight & Labruyere, 2005) 2: Restriction of base station, this Wi-Fi component provides Wi-Fi stations
access to some resource through the application of a with access to each other and to the Internet. (Efstathiou &

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac c e ss Point Devic e Ac c e ssible Te chnology 3

Polyzos, 2006) 3: Typically, infrastructure-based wireless operating. Designing for diversity not only increases
networks provide access to the wired backbone network the number of people able to access software or a Web
via an AP. The AP may act as a repeater, bridge, router, or site, but also increases their level of involvement with
A
even as a gateway to regenerate, forward, ilter, or translate it. (Singh, 2005b) 5: Problems encountered by Internet
messages. All communication between mobile devices has users with perceptual and cognitive challenges, physical
to take place via the AP. (Sarkar, 2005) conditions, or other factors such as geographical location;
sociocultural, political, and economic issues; language; and
Access Point Device so forth, which inluence their use of the Web. (Campbell,
The device that bridges wireless networking components 2005) 6: The ability to easily navigate and move about
and a wired network. It forwards trafic from the wired in the environment. Usually thought of in terms of the
side to the wireless side and from the wireless side to the architecture of buildings, but since the recent advent of
wired side, as needed. (Lawson-Body, 2005) the Web Accessibility Initiative (WAI), has been expanded
to include the architecture of the World Wide Web and
Access Rights Management all electronic and information technology. (Proctor,
The process of assigning digital rights to users which 2005) 7: The measure of whether a person can perform
can then be used in conjunction with an access control an interaction, access information, or do anything else.
system to obtain access to some resource. The management It does not measure how well he or she can do it, though.
infrastructure covers for example the allocation, renewal, (Polovina & Pearson, 2006) 8: The relative ease by which
and revocation of users rights. (Mundy & Otenko, the locations of activities, such as work, school, shopping,
2005) and health care, can be reached from a given location.
(Wang & Lou, 2005) 9: The sum of the space and time
Access Table between an individual and an activity. (Kenyon, 2005)
A table listing the transactions to be implemented with
an application. For each transaction, it shows the classes Accessibility Data Quality
from the Class Diagram it needs to visit, including the An aspect of data quality that refers to the ease with which
number and types of accesses (Read, Write) in order to one can get to data. (Borchers, 2005)
collect the data necessary for composing the inal result.
(Polese et al. 2005) Accessibility Legal Issues
Many governments around the globe issued laws
Accessibility and regulations demanding accessibility for public
1: A characteristic of information technology that allows organizations sites, usually starting from W3C WAI
it to be used by people with different abilities. In more technical recommendations. (Costagliola, Di Martino,
general terms, accessibility refers to the ability of people Ferrucci, & Gravino, 2006)
with disabilities to access public and private spaces.
(Keates et al., 2006) 2: An individuals perception that Accessibility Toolkit
he/she can contact or reach his/her leader when so desired. Refers to software tools and resources, provided by
(Connaughton, 2005) 3: Accessibility is achieved when operating system manufacturers, that help in the developing
individuals with disabilities can access and use information accessibility software (e.g., screen readers). (Lahiri &
technology in ways comparable to those available to people Basu, 2005)
without disabilities. A narrower, operational deinition
conceptualizes accessibility in terms of conformance to Accessible
certain accessibility criteria. (Schmetzke, 2005) 4: Just Describes a product, information, or environment that
as computers vary by operating system, processor speed, is fully usable by a person, with or without assistive
screen size, memory, and networking abilities, users vary technology. (Burgstahler, 2005b)
in ways both expected and unexpected. Some differences
more commonly thought of are language, gender, age, Accessible Technology
cultures, preferences, and interests. However, some of Products, devices, or equipment that can be used, with
the differences that need to be paid more attention to by or without assistive technology, by individuals with
the software and Web development community are skills, disabilities. (Keates et al., 2006)
ability levels, and constraints under which users may be

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
4 Ac c e ssible We b De sign Ac c re dit at ion M ills

Accessible Web Design Being called to account or held responsible for discharging
Also sometimes referred to as barrier-free Web design. higher education mission and goals, generally understood
A Web design that strives to accommodate the needs of people in terms of higher educations responsibility to ensure
with disabilities, including those using assistive technology, student learning at a reasonable cost. (Keinath, 2005) 4:
to access the Web environment. (Schmetzke, 2005) Responsibility of member behavior for their actions among
the community. Such notion is strictly related to identity
Accommodation management in a virtual community. (Bertino et al., 2006)
1: A mental process individuals use to create new schemata 5: Transparency of responsibility for performance, the
or to modify old schemata as the result of interaction with management of performance, and resulting implications
new environmental stimulus. Both of these actions result for the deployment of future resources. (Wright & Taylor,
in cognitive development. (Gillani, 2005a) 2: Modiication 2005)
or adjustment to a task or an environment that allows a
person with a disability an equal opportunity to complete Accountable Identiication
a task or to access an environment. Not all persons with A way to identify a person in an electronic interaction
disabilities, or kinds of disability, require accommodations. and to give legal status to electronic documents. Different
Environmental accommodations include, but are not technologies have been tried out, for example, chip cards
limited to, ramps, curb cuts, handicapped-accessible and digital signatures. (Jaeger, 2005)
bathrooms, accessible computer stations, touch screens,
and light switches. Education accommodations include, Accounting Performance Measures
but are not limited to, tape recorders, screen readers, Evaluation of the impact of information systems
oral tests, extra time to complete related course work, investments including typical accounting rations such as
materials printed in Braille, and note takers and interpreters return on assets and return on equity. (Dykman, 2005)
provided to students with disabilities. (Proctor, 2005;
Burgstahler, 2005a) 3: Provisions made in how a student Accreditation
accesses and/or demonstrates learning. The term focuses 1: An external quality-review process used by higher
on changes in the instruction, or how students are expected education to evaluate colleges, universities, and educational
to learn, along with changes in methods of assessment that programs or courses to ensure and improve quality. (Kung-
demonstrate or document what has been learned. The use Ming, 2005) 2: Endorsement of quality performance by an
of an accommodation does not change the educational outside agency. (C. Cavanaugh, 2005) 3: Recognition by
goals, standards, or objectives, the instructional level, or a certifying organization or agency that a college meets
the content, and provides the student with equal access certain acceptable standards in its education programs,
and equal opportunity to demonstrate his or her skills and services, and facilities. Regional accreditation applies to
knowledge. (T. Cavanaugh, 2005) a college as a whole and not to any particular program
or course of study. (Riffee & Sessums, 2005) 4: The
Accommodation Management Systems primary means by which colleges and universities and
Integrated software (desktop, network, or Web-based) other higher learning programs assure academic quality
to assist a variety of functions for accommodation to students and to the public. (Garten & Thompson, 2005)
establishments. This may include reservations, room 5: The process of certifying whether a program meets the
maintenance, banquet booking, inance, and customer standards and expectations of any association to which
relationship management. (Carson, 2005) it belongs. (Howell & Wilcken, 2005) 6: The seal of
approval granted by an accrediting agency to an academic
Accountability institution indicating that certain quality standards are
1: A responsibility to account for and/or explain actions met. (Kostopoulos, 2005)
undertaken; obligation of government, public services,
or funding agencies in compliance with agreed rules and Accreditation Mills
standards. (Park, 2006) 2: Accountability of parties means Associations that claim to extend academic accreditation,
holding to account, scrutinizing, and being required to give while they themselves do not have any oficials or otherwise
an account; especially in white-collar crime, accountability recognized capacity. (Kostopoulos, 2005)
is often associated with governance. (Mitrakas, 2006) 3:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac c re dit ing Age ncy Ac t ion Le a r ning 5

Accrediting Agency other concurrent transactions, and is durable after it has


An organization that grants seals of approval to academic been committed. (Frank, 2005b) 3: Conventional online
institutions for having met a certain level of quality transaction processing (OLTP) requires the following
A
standards. Normally authorized by a cognizant government properties called ACID properties: Atomicity (A): All
entity. (Kostopoulos, 2005) changes are totally done (committed) or totally undone
(rolled back); Consistency (C): The effect of a transaction
Accrediting Commissions preserves the invariant properties of the system; Isolation
In the United States there are both regional and professional (I): Intermediate results are not visible to other transactions.
accreditation systems that serve as the gatekeepers for Transactions have the effect of executing serially, although
quality in higher education. The six geographic regions they act concurrently; Durability (D): The effects of a
of the U.S. each have their own commissions (some have transaction are persistent; changes are not lost except under
two) that are made up of individuals from the member catastrophic failure. (Murthy & Krishnamurthy, 2005c)
institutions served by the region. These regional accrediting
commissions also serve a role in determining institutional ACL: See Access Control List.
eligibility to administer federal inancial aid for students.
(S.M. Johnstone, 2005) ACML
The XML encoding of the Agent Communication Language
Accrual deined by the Foundation for Intelligent Physical Agent
The concept that all revenues and costs that are accrued (FIPA). (De Meo, Quattrone, et al., 2005)
and matched within the same economic year. (Tahinakis
et al., 2006) Acoustic Metadata
Metadata obtained from an analysis of the audio signal.
Acculturation (Pachet, 2006)
The process by which a person adopts and assimilates
characteristics of another culture into ones own culture. Acquisition-of-Expertise Hypothesis
(Petter et al., 2005) States that people will perform better in dynamic tasks,
if they acquire the requisite expertise. (Qudrat-Ullah,
Accuracy 2006)
1: The agreement between the real measurement and
some objective standard taken as the ground truth. In a ACS: See American Community Survey.
given measurement experimentation, the high accuracy
could be achieved using correct sample design and Actants
measurement methods. An accurate measurement is also A general term used to refer to both human and non-
called an unbiased measurement. (Y.-J. Zhang, 2005c) human artifacts that can be acted on or move the action
2: The measure of how well a pattern can generalize. In onto some other. Actants are heterogeneous entities that
classiication it is usually deined as the percentage of form a network. (Wenn, 2006b)
examples that are correctly classiied. (Zhou, 2005)
Action
ACF: See Amplitude Change Function. 1: A sequence of goal-directed steps or operations.
(Daneshgar, 2005; Ale & Espil, 2005) 2: Part of a trigger
ACID Properties that is executed when the condition in the trigger is
1: Properties of transactions: atomicity, an operation is evaluated and found true. This is the most open-ended
either completely performed or not at all; consistency, an part of a trigger, because different database vendors have
operation transfers the database from one consistent state allowed different functionality in their implementations.
to another consistent state; isolation, intermediate states At a minimum, data manipulation operations (e.g., insert,
of a transaction are not visible to the outside; durability, delete, update) are allowed. (Badia, 2005b)
changes made to a database are persistent. (Meixner,
2005) 2: The properties imply that a transaction is atomic, Action Learning
transforms the database from one consistent state to another 1: A collaborative but challenging group process of cyclic
consistent state, is executed as if it were isolated from inquiry that facilitates insight in an individual group

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
6 Ac t ion or Ca pa c it y Le a r ning Ac t iona ble I nfor m at ion

member facing an important real-life problem such that and facilitate the articulation of self-deinitions for a
(s)he may take reasoned action to resolve her/his problem, wider audience. In each case, action research involves
A and the individual and other group members learn the identiication of a problem, an understanding of for
through the overall process. (Smith, 2006a) 2: A practical whom the research is being conducted, and a notion of some
and structured process focused on real organizational disadvantage that is to be addressed or solved through
problems and the development of a case study describing research. (Forte, 2005) 3: Research that is designed not
the problem, including team-based research within an simply to establish the facts about a situation, but which
online environment. Action learning includes a continuous is designed to facilitate the goals of the organization being
renewal process of reflective observation, abstract researched. (David, 2005) 4: Type of research approach
conceptualization, active experimentation, and concrete in which the researcher attempts to improve the research
experience. (Baskin et al., 2005) client, which can be an organization, while at the same
time generating relevant academic knowledge. (Kock,
Action or Capacity Learning 2005) 5: An action-oriented methodology or intervention
In verb form, gaining capacity for effective action; in noun process that is collaborative in nature. It aims to work with
form, capacity for effective action. (Lick & Kaufman, stakeholders. (Braun, 2005a)
2005)
Action Theory
Action Plan Perspective on action facilitation that makes a distinction
A portfolio of complementary activities which aim to have between acts, actions, and operations in performing a
an effective and the desired effect on the organization task. A basic principle of the theory is that the tools used
when implemented. (Shaw, Baker, et al., 2006) should provide suficient feedback to allow for adaptation
of task execution. (Verburg et al., 2005)
Action Research (AR)
1: A research approach operationalized by constant cycles Action-Mediating Web
of planning, acting, observing, and relecting, which Services and actions are enabled by the Web including
encourages the participation of local subjects as active learning actions. This complements the traditional idea of
agents in the research process, and which works hand the Semantic Web as knowledge representation structure.
in hand with people-centered research methodologies. (Liu & Koppelaar, 2005)
(Foth, 2005) 2: Action research, labeled as such, has its
origins in British social science research at the end of Action-Oriented Formal Speciication Language
World War II. There are many types and manifestations Time can be considered in the speciication. There are
of action research, each having in common the goal of several ways of doing this: considering time as linear
researchers engaged in social problem solving. In essence, or branching, synchronous, asynchronous, and so forth.
action research is a value-driven mode of research. (Dasso & Funes, 2005)
Types of action research that are particularly relevant
for Internet research and communication practice are Actionability
educational action research, technical action research, Actionability of a pattern indicates its usefulness.
and hermeneutic action research. Educational action Essentially, a pattern is actionable if a user can act on it
research consists of applied learning in a social context, to his or her advantage. Though it has a great practical
with a focus on solving community problems. Technical orientation, actionability is dificult to operationalize due
action research involves particular persons who, because to the inherent dificulty in mapping patterns to useful
of greater experience and qualiications (for example, actions. (Natarajan & Shekar, 2006)
in Web design and multimedia), may be regarded by
collaborators as technical experts. In this case, technical Actionable Information
knowledge is put to the service of solving a community Information that can be used as the basis for a decision, or
problem that hinges on communication and public visibility. for taking action, usually to change something. (Holstein
Hermeneutic action research involves mutual analysis and & Crnkovic, 2005)
collaborative documentary research conducted between
partners, designed to draw out greater self-understanding

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac t iona ble Rule Ac t ive Le a r ning Te chnique s 7

Actionable Rule Active Interface


A rule is actionable if the user can do an action to his/ An interface that monitors and tracks its interaction with
her advantage based on this rule. (Ras, Tzacheva, et al., the user. (Soh, 2006)
A
2005)
Active Learning
Actionscript 1: A key concept within the constructivist perspective
A full object-oriented scripting language developed by on learning that perceives learners as mentally active
Macromedia to work within the Flash environment that in seeking to make meaning. (Torrisi-Steele, 2005) 2:
allows developers to add more complex interactivity to their A learning philosophy derived from the theories of
movies. It is capable of handling the complex mathematical Piaget, Bruner, Vygotsky, and so forth, emphasizing that
formulations normally associated with more conventional improved learning occurs with learner-centered activities
programming languages. (Burrage & Pelton, 2005) requiring more mental processing on the part of the
learner. In active learning, lectures often are replaced
Activation-Emotion Space with a variety of learning resources that move students
A 2D representation of the emotion space, with the two from a passive, note-taking role to an active, learning
axes representing the magnitude and the hue of a speciic role. (Twigg, 2005) 3: As a group, earners read, write,
emotion. (Karpouzis et al., 2005) discuss, or are otherwise engaged in solving problems.
Students engage in such higher-order thinking tasks
Activation Function as analysis, synthesis, and evaluation. (Jennings et al.,
Transforms the net input of a neural network into an 2005) 4: Detecting and asking the user to label only the
output signal, which is transmitted to other neurons. most informative examples in the domain (rather than
(Yeo, 2005) randomly chosen examples). (Muslea, 2005) 5: A form
of learning that directly engages the student in his or her
Active Audience learning process. It can be contrasted with passive learning,
Uses and gratiications theory presumes media users are whereby the student is passively taking in information,
actively involved in selection and use of media, and are for example, from a lecture. (Sala, 2005b) 6: Learning by
not passive recipients. This implies the need to speciically playing or solving problems, instead of just memorizing.
target media offerings to perceived user needs. (Stafford, This way, students have ample opportunities to clarify,
2005) question, apply, and consolidate new knowledge. There are
a number of teaching strategies that can be employed to
Active Database actively engage students in the learning process, including
A database with the capability for reacting to stimula. group discussions, problem solving, case studies, role
(Ale & Espil, 2005) plays, journal writing, and structured learning groups.
Information and communication technology makes the use
Active Design of such strategies easy. (Pedreira et al., 2005) 7: Learning
Also called agent environment co-design. The main idea modules that support active learning select the best
is to split the work of building the intelligence into a examples for class labeling and training without depending
load belonging to the agents and a load belonging to the on a teachers decision or random sampling. (H.-J. Kim,
environment. (Liu & Koppelaar, 2005) 2005) 8: Learning where students perform tasks, that is,
post notes on a discussion board, to help in the learning
Active Disk process. (Benrud, 2005) 9: The three-pronged process of
A disk whose controller runs application code, which can selecting, organizing, and integrating information. The
process data on disk. (Thomasian, 2005a) basic idea is that when active learning is optimized, then
meaningful outcomes can be more effectively reached.
Active Integrity Constraint (M. Mitchell, 2005c)
A formula of the irst order predicate calculus of the form:
r = (X) [] where is a range restricted conjunction Active Learning Techniques
of literals, and is a disjunction of update atoms. (Flesca, Techniques where students do more than simply listen
Greco, & Zumpano, 2005b) to a lecture. Students are doing something, including

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
8 Ac t ive M e cha nism Ac t ivit y

discovering, processing, and applying information. Active Active Rule


learning derives from two basic assumptions: (1) learning This is represented by an ECA structure, meaning when an
A is by nature an active endeavor, and (2) different people event is produced, if the condition is veriied, execute an
learn in different ways. (Beck & Schornack, 2005) action. The event part represents a situation that triggers
the rule, the condition part represents the state of a system
Active Mechanism execution or of a database, and the action part denotes a
A system responsible for detecting events and reacting set of operations or a program. (Vargas-Solar, 2005)
automatically to such events according to predeined active
rules or ECA rules. Traditionally, active mechanisms are Active Server Page (ASP) Scripting
embedded within Active Database Management Systems A simple server-side scripting approach where script code
(ADBMSs). Unbundled active mechanisms have been (usually VBScript or Jscript) is mixed with HTML code
proposed for federated database systems and for component on a Web page. The script code is processed by a script
database systems. (Vargas-Solar, 2005) engine before the page is rendered by the server. This can
be used to create dynamic Web pages and to share data
Active Modality within or between Web sessions. This is a predecessor of
Modality voluntarily and consciously used by users to ASP.NET technology. (Westin, 2005)
issue a command to the computer; for example, a voice
command or a pen gesture. (Bourguet, 2006) Active Tag
An active tag is powered by its own battery, and it can
Active Participation transmit its ID and related information continuously.
Citizens are actively engaged in the policy-making process. (Owens et al., 2005)
The government acknowledges citizens as partners;
citizens participate proposing policy options and shaping ActiveX Control
the policy dialogue. (Kaufman, 2005) A Microsoft software module that enables another
program to add functionality by calling ready-made
Active/Passive Community Participants components that blend in and appear as normal parts of
Active participants regularly contribute to the community the program. (Friedman, 2005)
in a variety of ways (e.g., posting messages, acting as
moderators, responding to queries). Passive participants, Activities
by contrast, only read material within the community Single tasks or chains of tasks that form business processes
and rarely make a contribution (similar to lurkers). and allow a irm to differentiate itself in the marketplace.
(Waterson, 2006) (Hanebeck, 2005)

Active Processing Assumption Activities-Based Costing


Asserts that intentional and signiicant mental processing A costing method that assesses a given activity in terms of
of information must occur for enduring and meaningful component costs for all persons and resources involved in
learning to take place. (Boechler, 2006b) the activity; the alternative is parsing costs of an activity
by looking at aggregate cost data for only those key
Active Replica institutions or units directly responsible for that activity.
The replica that directly processes a given transaction, (Fisher, 2005)
generating the updates that later will be transmitted to
the other, passive replicas. The active status of a replica Activity
functionally depends on the given transaction. (Muoz- 1: A logically connected set of actions that are carried
Esco et al., 2005) out as a unit in some order. It is associated with a state
(called action state) in which the system remains while
Active RFID Tags the activity is performed. (Rittgen, 2005) 2: Sometimes
Tags containing their own power source (batteries). used as shorthand to refer to opportunities, services,
(Loebbecke, 2006) social networks, and other goods, as well as to people,
communities, and other locations. (Kenyon, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac t ivit y Dia gra m Ada pt a ble Pe rsona lizat ion Syst e ms 9

Activity Diagram that initiates an action by signaling an event. An actor is


A UML diagram showing operations and triggers between outside a system and can be either another system or a
operations; a diagram which shows system dynamics via human being. (Hvannberg et al., 2006)
A
cause and effect relationships. An activity diagram is a
state diagram in which most of the states are action states, Actor-Network Theory (ANT)
and most of the transitions are triggered by the completion An approach to research in which network associations and
of these action states. (D. Brandon, Jr., 2005a) interactions between actors (both human and non-human)
are the basis for investigation. (Tatnall, 2005a)
Activity Level
A measure of the number of participant-initiated actions Actual Level of Awareness
that take place during a time interval. (Kushnir, 2006) The awareness that a role actually possesses within the
ERP process. Actual awareness is represented by an integer
Activity List number ranging from zero to four, representing various
A prose description of a task or subtask divided into lines levels of awareness. Actual awareness is a property of
to represent separate task behaviors; it usually has only one an actor who performs one or more roles within the ERP
main agent and one action per line. (Diaper, 2006) process. (Daneshgar, 2005)

Activity Logging Actuary


Electronic recordkeeping of such system or network A statistician who practices the collection and interpretation
actions as applications accessed, commands executed, iles of numerical data; especially someone who uses statistics
accessed, and trafic generated from a system. (Knight & to calculate insurance premiums. (Kitchens, 2005)
Labruyere, 2005)
Ad Hoc
Activity Recorder A class of wireless networking architectures in which
Software that monitors important user activities within there is no ixed infrastructure or wireless access points.
the virtual environment and records this information In ad hoc networks, each mobile station acts as a router
into a database for later perusal. (Lepouras & Vassilakis, to communicate with other stations. Such a network can
2006) exist on a temporary basis to share some resources among
the mobile stations. (Sarkar, 2005)
Actor
1: A person or (computer) system that can perform an Ad Hoc Network
activity. The actor does not refer to a particular individual Peer-to-peer 802.11 network formed automatically when
but rather to a role (e.g., teacher). (Rittgen, 2005) 2: An several computers come together without an access point.
actor plays one or more roles in relation to a set of use Such computers can exchange data within the network, but
cases. An actor could correspond to a job title (e.g., cannot access the Internet. (Houser & Thornton, 2005)
purchasing agent, sales clerk) or can be non-human (e.g.,
another system or database). Each actor in a use case ADA: See Americans with Disabilities Act.
must be directly involved at some point and is not merely
a stakeholder (someone or something that is affected by AdaBoost: See Adaptive Boosting.
the success or failure of a particular transaction). (Dobing
& Parsons, 2005) 3: An entity that can make its presence Adaptability
individually felt by other actors. Actors can be human 1: One says this of a system that can perform adaptation
or non-human, non-human actors including such things based on conigurations set by the user before or during the
as computer programs, portals, companies, and other execution of the system. (Tobar et al., 2006) 2: The ease
entities that cannot be seen as individual people. An actor with which software satisies differing system constraints
can be seen as an association of heterogeneous elements and user needs. (Guan, 2006b)
that constitute a network. This is especially important
with non-human actors, as there are always some human Adaptable Personalization Systems
aspects within the network. (Tatnall, 2005a) 4: Someone Systems that can be customized by the user in an explicit
manner; that is, the user can change the content, layout,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
10 Ada pt a ble Syst e m s Ada pt ive Se r vic e s

appearance, and so forth to his or her needs. (Anke & Adaptive Collaboration Support in CSCL
Sundaram, 2006) Using models of different learners to form a matching
A group of learners for different kinds of collaboration.
Adaptable Systems (Devedi, 2006)
Systems that offer personalizationthat is, pre-deined
before the execution of the system and which may be Adaptive Feedback
modiied by users. (Gaudioso & Montero, 2006) Immediate feedback in the form of an explanation or
discussion that is tailored to the qualities of the students
Adaptation answer. (Owen & Aworuwa, 2005)
A system characteristic concerned with the capacity of
adjusting its behavior according to one or a combination of Adaptive Filter
targets: the user, the human computer interaction process, Linear system that modiies its parameters, minimizing
or the computational platform. (Tobar et al., 2006) some given criterion of the difference between its output
and a given reference signal. Widely used in echo and
Adaptation Engineering noise canceling, equalization of communication channels,
The process of constructing the automatic adjustment of antenna arrays, and so forth. (Perez-Meana & Nakano-
an application to the user; often in adaptation engineering, Miyatake, 2005)
models are created for the domain, the user, and the
adaptation. (Houben, Aroyo, & Dicheva, 2006) Adaptive Hypermedia System (AHS)
1: An adaptive concept-based system that is based
Adaptation Model on applying adaptation to a hypermedia application;
Representation of the way in which both the selection and characteristic is the (virtual) construction of a
presentation of content are adapted to the user. (Houben hyperdocument. (Houben et al., 2006) 2: A hypertext and
et al., 2006) hypermedia system that can adapt various visible aspects of
the system in order to relect users features. (Wu & Chen,
Adapter 2005) 3: Focuses on adaptive presentation and adaptive
Intermediate software that understands proprietary navigation support; uses knowledge about its users and
back-end application interfaces and provides easy access can incorporate domain knowledge to adapt various visible
interfaces for EAI technology integration. (Bussler, aspects of the system to the user. (Esmahi, 2005)
2005b)
Adaptive Interfaces
Adaptive Algorithm Interfaces that allow for some user customization and
Method used to modify the ilter coeficients, online, in personalization. (Zaphiris & Kurniawan, 2005)
order to minimize the power of an adaptive ilter output
error. (Perez-Meana & Nakano-Miyatake, 2005) Adaptive Learning
An algorithm that can learn a hidden concept from
Adaptive Boosting (AdaBoost) interactive feedback provided by a user or the underlying
An iterative bootstrap replication of the sample units of the environment. (Meng & Chen, 2005)
training sample such that at any iteration, misclassiied/
worse predicted cases have higher probability to be Adaptive Personalization System
included in the current bootstrap sample, and the inal A system that changes the presentation implicitly by using
decision rule is obtained by majority voting. (Siciliano & secondary data. This data can be obtained from a variety
Conversano, 2005) of sources, for example, from the users actions, from the
behavior of other users on that site, or based on the currently
Adaptive Cognition displayed content. (Anke & Sundaram, 2006)
A cognitive style that prefers to think sequentially and
work within current paradigms. (Kaluzniacky, 2006) Adaptive Services
In order to support personalized application, a system
provides special content, presentation, and interaction

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ada pt ive Synchronizat ion Fra m e w ork (ASF) Adding Va lue 11

adaptively to individual users according to their needs, Adaptive Web Site


abilities, and experiences. (Liu & Koppelaar, 2005) A Web site that semi-automatically improves its
organization and presentation by learning from user access
A
Adaptive Synchronization Framework (ASF) patterns. Web usage mining techniques are employed to
A framework that adopts a mechanism to re-compute the determine the adaptation of the site. (Y. Fu, 2005)
synchronization relations that are destroyed by unexpected
events (e.g., window resizing or font size change), so as Adaptive Web-Based Information System
to restore a presentation system to synchronization. (Liu An adaptive concept-based system that is based on the
& Chen, 2005) principle of using hypermedia to present output from
a structured repository or database, and that performs
Adaptive System the adaptation on the hypermedia presentation and the
1: A system adapting its behavior on the basis of the content retrieval; characteristic is the role of navigation.
environment it is operating in. (De Meo, Quattrone, et (Houben et al., 2006)
al., 2005) 2: A system that offers personalization that is
dynamically built and automatically performed based on Adaptivity
what these systems learn about the users. (Gaudioso & 1: Allows the content and the display of the content to be
Montero, 2006) altered according to the characteristics of any individual
user. Provides a dynamic adaptation of the content and
Adaptive Task-Based System appearance based on each individual user. (Shareef &
An adaptive concept-based system that is based on Kinshuk, 2005) 2: One says this of a system that can perform
organizing the conceptual structures and the adaptation on adaptation automatically. Generally, the system acquires
the basis of the tasks and goals of the user; characteristic and analyzes external data in order to make inferences and
is the explicit representation of tasks. (Houben et al., execute adaptation actions. (Tobar et al., 2006)
2006)
Added Social Value
Adaptive User Interfaces A positive social effect (main or subsidiary impact on
An interface that uses a user model to change its behavior social relations) resulting from goal-seeking activity of
or appearance to increase user satisfaction with time. social actors. (Pazyuk, 2005)
These interfaces are used extensively in assistive devices.
(Abhishek & Basu, 2006) Added Value
Traditional usage is as an indication that the particular
Adaptive Virtual Learning Environment packaging, delivery method, or combination of services
(AVLE) in a product brings extra benefits than one would
An e-learning environment that provides adaptive otherwise receive. Applied to educational technology, it
components to personalize learning instruction, to match communicates that the use of technology brings added
with each learners individual cognitive capability in order value to the teaching or learning processes when it makes
for knowledge construction to occur. In AVLEs, individual possible something that otherwise would be impossible
learners can be uniquely identiied, with content that is or less viable to do. (Dexter, 2005)
speciically presented for him or her, and learning progress
that can be individually monitored, tailored, and accessed. ADDIE: See Analysis, Design, Development,
(Xu & Wang, 2006) Implementation, and Evaluation Model.

Adaptive VR-Mall System Adding Value


An e-commerce site that offers an immersive or semi- This is giving something that was not anticipated, such as
immersive environment for e-shoppers to navigate in, selling a customer a product, and then giving additional
and tailors the content delivered taking into account the information about gaining maximum beneit from it, or
individual e-shopper preferences and interests. (Lepouras giving advice about safety issues relating to the product.
& Vassilakis, 2006) (Mitchell, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
12 Addre ssa ble U nit Adult Le a r ne r

Addressable Unit with the professor. These include e-registration, e-


A speciic unit within a particular digital asset such as a inancial aid, e-library, e-bookstore, e-advisors, e-student
A digital video movie. (Subramanian, 2005) organizations, and virtual communities. (Levy & Ramim,
2005a)
ADF: See Automatically Deined Function.
Administrative Tasks
Ad-Hoc Communication The tasks that support educational tasks (such as
A connection method for wireless LANs that requires enrollment, recording results, and so forth). (Darbyshire
no base station. Devices discover others within range to & Burgess, 2005)
form a network for those computers. They may search for
target nodes that are out of range by looding the network Admission Control
with broadcasts that are forwarded by each node. (Kao The algorithms used by the system to accept or refuse
& Rerrer, 2006) new radio links (e.g., new users) in the system. (Iossiides
et al., 2005)
Ad-Hoc Network
1: A local area network or other small network, especially Adoption
one with wireless or temporary plug-in connections, 1: Changes in employee attitudes, perceptions, and
in which some of the network devices (sometimes actions that lead them to try new practices, activities, or
mobile) are part of the network only for the duration of a innovations that are different from their normal routines
communication session or because some of the devices are or behaviors. (Jones & Gupta, 2005) 2: Result of an
in some close proximity, so a communication session can innovation decision process. Decision to use an innovation.
take place. (Maamar, 2005) 2: A special type of computer (Voeth & Liehr, 2005) 3: The decision to accept or invest
network where communication does not require any ixed in a technology. (Signoret, 2006b) 4: The decision to
computer network infrastructure (e.g., it does not need a implement an innovation. (Klobas & Renzi, 2005a) 5:
router); the nodes communicate directly with each other The stage of technology diffusion in which an individual
without access points. In host-multicast, mobile peering or organization decides to select a technology for use.
hosts a construct ad-hoc network. (Hossz, 2005b) 3: A (Green, Day, et al., 2005)
self-coniguring mobile network of routers (and hosts),
connected wirelessly, in which the nodes may move freely Adoption Factors
and randomly, resulting in a rapid and unpredictable change The major factors that encourage (or discourage) an
in the networks wireless topology. See also Mobile Ad organization to adopt an innovation. These include the
hoc Network (MANET). (Akhtar, 2005) following keywords. (Cragg & Mills, 2005)

ADISSA: See Architectural Design of Information Sys- ADSL: See Asymmetric Digital Subscriber Line;
tems Based on Structured Analysis. Asymmetric DSL; Asynchronous Digital Subscriber Line;
Digital Subscriber Line.
Adjacency Matrix
A matrix representing a graph with n vertex. It is an n-by-n Adult Education
array of Boolean values with the entry in row u and column This term is used to show awareness of the reality that
v deined to be 1 if there is an edge connecting vertex u many adults come to formal educational programs with
and v in the graph, and to be 0 otherwise. (Li, 2005) different orientations to study, motivations, and prior
experiences from younger learners. These differences
ADL/SCORM ADLNet: See Advanced Distributed need to be accommodated in the learning designs used.
Learning Network. (Ching et al., 2005)

Administrative and Institutional Support Adult Learner


All the beneits students enjoy when they are on campus, A student typically 25 years of age or older who is self-
but in a format that is available via the Internet or the Web, directed, motivated, and an active participant in his or her
beyond the access to e-learning courses and interactions learning process. (Ordonez, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Adva nc e Orga nize r Ae rophone s 13

Advance Organizer Advanced Mobile Phone System (AMPS)


1: A general statement at the beginning of the information Obsolete cellular phone standard. (Gilbert, 2005c)
or lesson to activate existing cognitive structure or to
A
provide the appropriate cognitive structure to learn the Advanced Research Projects Agency Network
details in the information or the lesson. (Ally, 2005c) (ARPAnet)
2: Any presentation of information that displays and 1: Network in which the Internet has roots; developed
represents the content and structure of a hypertext or text. by the Department of Defense. (Inoue & Bell, 2005) 2:
(Shapiro, 2006) The irst multi-site, packet-switched network, ARPAnet
was designed to support the Advanced Research Projects
Advanced Authentication Measures Agency (ARPA) for the transferring of iles and resource
Techniques beyond passwords that can be used to identify sharing. (Kontolemakis et al., 2005)
the end user to determine if they are who they say they
are. (Medlin et al., 2006) Adverse Effect
Any untoward medical occurrence that may be life
Advanced Distributed Learning Network threatening and requires in-patient hospitalization. (Kusiak
(ADL/SCORM ADLNet) & Shah, 2005)
An initiative sponsored by the U.S. federal government to
accelerate large-scale development of dynamic and cost- Advertising Fee
effective learning software and to stimulate an eficient A payment received from an advertiser for including an
market for these products in order to meet the education and advertisement on a Web site. (Shan et al., 2006b)
training needs of the military and the nations workforce
of the future. As part of this objective, ADL produces Advertising Waste
SCORM (Sharable Content Object Reference Model), a Advertising that reaches an audience that is outside of its
speciication for reusable learning content. Outside the target market or intended audience. (Owen, 2006a)
defense sector, SCORM is being adopted by a number of
training and education vendors as a useful standard for Advisory Agent
learning content. (Snchez-Segura et al., 2005) Intelligent agent that provides intelligent advice and
decision support autonomously. These agents decide what
Advanced Information Technology Structure information is needed, seek it out, and use it to make
The rules and resources offered by systems such as recommendations. (Gates & Nissen, 2005a)
computer-aided software engineering tools, enterprise
resource planning systems, and database management Advisory System
systems that support the intended purposes and utilization Front-end software system that guides customers according
of those systems. (LeRouge & Webb, 2005) to their proiles and preferences through a personalized
consulting process resulting in the generation of product
Advanced Internet Applications conigurations that better fulill customers needs. In
The set of more complex Internet technologies based around opposition to the commonly used product-oriented
design activities, back-end data management activities, and interfaces in conigurators, advisory systems are customer
remote access to Internet services. (Grifin, 2005) oriented and do not assume any specific technical
knowledge of the product. (Blecker, 2006b)
Advanced Methods of Software-Facilitated
Communication AEM: See Agent-Based E-Marketplace.
Communication that includes features such as interactive
chat rooms, whiteboards (live interactive chats), group Aerophones
teleconferences, customized course calendars, interactive The category of musical instruments, called wind
simulations, and virtual project labs. (Gold, 2005) instruments, producing sound by the vibration of air.
Woodwinds and brass (lip-vibrated) instruments belong
to this category, including single reed woodwinds (e.g.,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
14 Aesthetic Integrity Afinity Portal

clarinet), double reeds (oboe), lutes, and brass (trumpet). area concerned with computing that relates to, arises from,
(Wieczorkowska, 2005) or deliberately inluences emotion. Affective computing
A expands HCI by including emotional communication,
Aesthetic Integrity together with the appropriate means of handling affective
A principle that advocates that a design should be visually information. (Pantic, 2005a)
appealing and should follow common principles of visual
designconsistency, a clear identity, a clear visual Affective Learning
hierarchy, good alignment, contrast, and proportions. The attitude of the student toward the educational
(Singh, 2005b) experience. (Woods & Baker, 2005)

Aesthetics of Use Affective Learning Outcomes


The behavioral aspects of an artifact, system, or device Learning that is associated with feelings rather than
that precipitate an aesthetic experience based on temporal knowledge or skills, such as learning to accept an idea
as well as spatial elements. (Kettley, 2006a) or concept, or learning to appreciate a point of view.
(Aworuwa & Owen, 2005)
AF: See Assured Forwarding.
Affective Trust
Affect Interpersonal bonds among individuals and institutions,
An umbrella term used to refer to mood, emotion, and including perceptions of a persons motivation, intentions,
other processes, which address related phenomena. At ethics, and citizenship. (Sonnenwald, 2005)
times, the term affective reaction is more speciically
used to distinguish an individuals initial, spontaneous, Afiliate Marketing
undifferentiated, and largely physiologically driven When companies use third parties to provide services on
response to an event, person, or object from the more their behalf. The afiliates may deliver customer lists or
cognitively differentiated emotion. (Hassenzahl, customers to the main company in return for a commission
2006) payment or cross-selling opportunity. (Brindley, 2006)

Affective Afiliate Referral Fees


Domain of learning concerned with inward disposition, Payment to a Web site for steering customers to another
feeling, intent, intention, earnest, reality; contrasted afiliate site. The company is entitled to a referral fee or
with merely cognitive development and/or external is offered a commission for each purchase the customer
manifestation. (Rogers & Howell, 2005) makes at the afiliate site. (Shan et al., 2006b)

Affective Complexity Afinity Communities


How much communication is sensitive to attitudes or Communities that are based on profession, common
changes in disposition toward the communication partner interest, cause, demographic, or marketer-generated
or subject matter. (Willis, 2005) phenomenon. (Roy, A., 2005)

Affective Computing Afinity Network


1: A domain of computer science research combining Groups of people who are drawn together based on one or
ields such as Artiicial Intelligence and Human-Computer more shared personal attributes. Their activities are highly
Interaction in the endeavor to develop computers that can relationship oriented and typically include networking,
recognize, express, and have emotions. (Byl & Toleman, mentoring, and representing a collective voice in both
2005) 2: A recent theory that recognizes that emotions play organizational and external community affairs. (Archer,
an essential role in perception and learning by shaping the 2006)
mechanisms of rational thinking. In order to enhance the
process of interaction, we should design systems with the Afinity Portal
ability to recognize, to understand, and even to have and A special type of vertical portal that targets speciic
express emotions. (Karpouzis et al., 2005) 3: The research segments of the market and is designed to appeal to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Afforda nc e Age nt 15

peoples emotions, values, and belief systems. (Vrazalic 2005) 3: A computational entity capable of both perceiving
& Hyland, 2005) dynamic changes in the environment it is operating in and
autonomously performing user-delegated tasks, possibly by
A
Affordance communicating and cooperating with other similar entities.
1: Can be viewed as a property of an object that supports (De Meo, Quattrone, et al., 2005) 4: A computational entity
certain kinds of actions rather than others. (Magnani & which acts on behalf of other entities. (Karoui, 2005) 5: A
Bardone, 2006) 2: A features of an environment or artifact convenient metaphor for building software to interact with
that affords or permits certain behaviors. (Graham, the range and diversity of online resources is that of an
Allen, et al., 2005) 3: The actual or perceived properties agent. An agent is a program that performs some task on
of an object that determine how the object could be used. your behalf. You expect an agent to act even if all the details
(Yong, 2005) are not speciied or if the situation changes. You expect an
agent to communicate effectively with other agents. Using
AFIS: See Automated Fingerprint Identification agents adds a layer of abstraction that localizes decisions
System. about dealing with local peculiarities of format, knowledge
conventions, and so forth, and thus helps to understand
African Networking Renaissance and manage complexity. (Hamdi, 2005b) 6: A module that
Used to describe business organizations inding innovative is able to sense its environment, receive stimuli from the
ways of doing business by harnessing information and environment, make autonomous decisions, and actuate
communication technologies (ICTs), cultural strengths, the decisions, which in turn change the environment.
and inspiration to meet the challenges of its local needs (Soh, 2006) 7: A piece of software that autonomously
and global competition. (Averweg, 2006) performs a given task using information collected from its
environment to act in a suitable manner so as to complete
AFTA: See Australian Federation of Travel Agents. the task successfully. This software should be able to adapt
itself based on changes occurring in its environment, so
After-Action Review (AAR) that a change in circumstances will still yield the intended
The AAR process, developed mainly in the U.S. Army, is result. (Camarinha-Matos & Ferrada, 2006) 8: A program
a central building block of KM in the military, conducted designed to provide specialized and well-deined services.
immediately (or as soon as possible) after every mission, An agent can be staticexecuting on the computer where
training exercise, or project. It is a non-hierarchical it was installed, or mobileexecuting on computer nodes
knowledge event that allows debrieing, understanding, in a network. (Raisinghani, Klassen, & Schkade, 2005)
and realizing the value of tacit knowledge on the local 9: A software agent is a piece of autonomous or semi-
level. (Ariely, 2006b) autonomous, proactive and reactive computer software.
Many individual communicative software agents may
AFX: See Animation Framework eXtension. form a multi-agent system. (Guan, 2006f) 10: A software
agent is a programmable artifact capable of intelligent
Agenda Setting autonomous action toward an objective. (Nabuco et al.,
Recognition of a problem that may be solved through 2006) 11: A system that is capable of perceiving events
innovation. (Klobas & Renzi, 2005a) in its environment, or representing information about the
current state of affairs and of acting in its environment
Agent guided by perceptions and stored information (current
1: A complex system constituting elements that are deinition by AOIS, agent-oriented information system
individual performers, which can be described by their community). (Murthy & Krishnamurthy, 2005a) 12: A
interrelationships, knowledge/skill, performance and virtual representation of real or imaginary human beings
constraints factors. (Plekhanova, 2005a) 2: A component in software systems. (Arya, 2005) 13: An agent is an
of software and/or hardware that is capable of acting in encapsulated computer system that is situated in some
order to accomplish tasks on behalf of its user. Software environment and that is capable of lexible, autonomous
agents are agents in the form of programs (code) that action in that environment in order to meet its design
operate in computer environments. (Cardoso & Freire,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
16 Age nt a nd Aut onom ous Age nt Aggre gat e Func t ion

objectives. Agents normally exhibit autonomous, reactive, Agent-Based E-Marketplace


proactive, and social behaviors. (Kefalas et al., 2005) A distributed multi-agent system formed by stationary
A and mobile agents that provide e-commerce services to
Agent and Autonomous Agent end users within a business context. (Fortino, Garro, et
Software that carries out specialized tasks for a user. al., 2006)
Agents operate on behalf of their owners in the absence
of full or constant supervision. Autonomous agents have Agent-Based Simulation
a greater degree of decision-making control invested in Simulation of organizations as interacting autonomous
them by their owners. (Duchastel, 2006) entities with their own interests, goals, and discrete
processes. (Janssen, 2005)
Agent Attributes
An agent can be classiied using some of its characteristics Agent-Mediated E-Commerce (AMEC)
called attributes. An agent has three basic attributes: Concerned with providing agent-based solutions that
mobility, intelligence, and interaction. (Karoui, 2005) support different stages of the trading processes in
e-commerce, including needs identiication, product
Agent Framework brokering, merchant brokering, contract negotiation
A program or code library that provides a comprehensive and agreement, payment and delivery, and service and
set of capabilities that are used to develop and support evaluation. (Fortino, Garro, et al., 2006)
software agents. (Zwitserloot & Pantic, 2005)
Agglomeration Economies
Agent Ontology Refers to the spatial concentration of economic activities.
A description (like a formal speciication of a program) For example, a irm that is located in close proximity to
of the concepts and relationships that can exist for an other irms in the same industry can take advantage of
agent or a community of agents. (De Meo, Quattrone, et localization economies. These intra-industry beneits
al., 2005) include access to specialized know-how (i.e., knowledge
diffusion), the presence of buyer-supplier networks, and
Agent Orientation opportunities for eficient subcontracting. Employees
The next step in the evolution of computational modeling, with industry-speciic skills will be attracted to such
programming methodologies, and software engineering clusters, giving irms access to a larger specialized labor
paradigms. Aspects of agent orientation include both pool. Another case of agglomeration economies external
cooperative and competitive interactions, knowledge, to the irm relates to beneits that accrue from being
economic and logical rationality, and learning, all of which located in close proximity to irms in other industries
are useful for designing distributed computations in open that is, urbanization economies. These inter-industry
dynamic environments. (Ghenniwa & Huhns, 2005) beneits include easier access to complementary services
(publishing, advertising, banking), availability of a large
Agents Compatibility labor pool with multiple specialization, inter-industry
A capability of an agent to work with other agents without information transfers, and the availability of less costly
adaptation, adjustment, or modiication. (Plekhanova, general infrastructure. (Moodley, 2005)
2005a)
Aggregate Conceptual Direction
Agent-Based Approach to ASP Describes the trend in the data along which most of the
This approach to ASP is well equipped to address the variance occurs, taking the missing data into account. (H.
challenges of multi-market package to e-procurement. Wang & S. Wang, 2005)
Service agents within the ASP model are the systems
gateway to external sources of goods and services. Service Aggregate Function
agents are not only able to determine which requests it can A function that is used to aggregate a set of values to get
service, but also proactively read these requests and try to a single value. (Deshpande & Ramasamy, 2005)
ind an acceptable solution. (Guah & Currie, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Aggre gat e M at e ria lize d V ie w AI C Crit e rion 17

Aggregate Materialized View Agile Development Methodologies


A materialized view in which the results of a query An approach used in building non-critical computer
containing aggregations (like count, sum, average, etc.) systems. (Singh, 2005)
A
are stored. (Tininini, 2005b)
Aging and Dejuvenization of the Working
Aggregate Range Query Population
Selects a range of values in each dimension (dimensions The increasing proportion of older people coupled with
not speciied in the query are by default completely decreasing proportions of young people in the labor force.
selected) and computes an aggregate (e.g., SUM, MAX, (Scholarios et al., 2005)
or COUNT) over the measure values of all data cube cells
whose coordinates fall into the selected range. A typical Aging Effect
aggregate range query is: Compute the total sales of Software artifacts evolve over time due to the changes in
cameras in California for the irst half of January 1999. domain requirements, platform, and even language. After
(Riedewald et al., 2005) their release, software needs to be modiied regularly.
These modiications introduce errors to the software and
Aggregate Similarity Search reduce its overall quality over time, which is often called
The search operation in 3D structures that matches the the aging effect. (Gaffar, 2005)
structures point-to-point in their entirety. (X. Wang,
2005) Aging-Related Declines
Age-related differences in cognitive, motor, and perceptual
Aggregation abilities. (Zaphiris & Kurniawan, 2005)
1: A relationship in which a composite object (whole)
consists of other component objects (parts). (Taniar, Aglets
Pardede, & Rahayu, 2005) 2: Also commonly called a Platforms for mobile agents to operate on and on which to
summary, an aggregation is the calculation of a value perform transactions. (Quah, Leow, & Ong, 2006)
from a bag or (multi)set of entities. Typical aggregations
are sum, count, and average. (Perlich & Provost, 2005) A-GPS: See Assisted Global Positioning System.
3: Metaphorical boundaries that indicate a community
networks zones of inclusion and exclusion, and structures AHIMA: See American Health Information Management
of content, activity, and functionality within the site. Association.
(Gibbs et al., 2005)
AHS: See Adaptive Hypermedia Systems.
Aggregation Process
The process that allows one to obtain multi-dimensional AI: See Artiicial Intelligence.
aggregate data from disaggregate data. (Rafanelli,
2005) AIC: See Akaike Information Criterion and Schwartz
Bayesian Criterion.
Aggregation Queries
Common queries executed by decision support systems AIC Criterion
that aggregate and group large amounts of data, where The AIC criterion is deined by the following equation:
aggregation operators are typically SUM, COUNT, AVG,
and so forth. (Das, 2005)
AIC = 2 log L( ; x1 ,...,x n ) + 2q
Agile
Being agile means to be proicient at change, which allows where log L( ; x1 ,...,x n ) is the logarithm of the likelihood
an organization to do anything it wants, whenever it wants. function calculated in the maximum likelihood parameter
Since virtual enterprises do not own signiicant capital estimate and q is the number of parameters of the model.
resources of their own, it helps if they are agile, so they (Giudici, 2005)
can be formed and changed very rapidly. (Wong, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
18 AI CC Alignm e nt

AICC: See Aviation Industry CBT (Computer-Based AL Set


Training) Committee. The name given to an AL group. (Smith, 2006a)
A
AICC (Aviation Industry CBT [Computer-Based ALC: See Alternative Learning Center.
Training] Committee)
An international association that develops guidelines for Algebraic Function
the aviation industry in the development, delivery, and An aggregate function F is algebraic if F of an n-
evaluation of CBT and related training technologies. The dimensional cuboid can be computed by using a constant
objectives of the AICC are to: number of aggregates of the (n+1)-dimensional cuboid.
(Abdulghani, 2005a)
Assist airplane operators in development of
guidelines which promote the economic and Algebraic Speciication
effective implementation of computer-based training A technique whereby an object is speciied in terms of
(CBT). the relationships between the operations that act on that
Develop guidelines to enable interoperability. object. A speciication is presented in four parts: the
Provide an open forum for the discussion of CBT Introduction, where the sort of the entity being speciied
(and other) training technologies. is introduced and the name of any other speciications
that are required are set out; the Informal Description
(Snchez-Segura et al., 2005) of the sort and its operations; the Signature, where the
names of the operations on that object and the sorts of
Aides Memoires their parameters are deined; and the Axioms, where the
Aids to the memory or mental artifacts that indicate the relationships between the sort operations are deined.
sources of information rather than the information itself. (Felice & Riesco, 2005)
(Atkinson & Burstein 2006)
Algorithm
AIML: See Artiicial Intelligence Markup Language. A step-by-step procedure for solving a problem, in this
case that of determining completion and retention rates. No
AIP: See Application Infrastructure Provider. national, standardized algorithm exists yet for calculating
these rates. (Lindsay, Howell, et al., 2005)
Air Trafic Control (ATC)
Refers to both the activities and the systems involved in Algorithm Animation
the management of lights by air trafic controllers. The Visualization of a piece of software illustrating the main
air trafic controllers main task is to ensure light safety ideas or steps (i.e., its algorithmic behavior), but without
with an eficient, secure, and ordered air trafic low. a close relationship to the source code. (Pareja-Flores &
ATC systems are dedicated to the support of these tasks. Iturbide, 2005)
(Bastide et al., 2006)
Algorithmic Information Theory
AIT: See Analytical Information Technology. Absolute information theory based on Kolmogorov
complexity theory. (T. Y. Lin, 2005)
Akaike Information Criterion (AIC) and Schwartz
Bayesian Criterion (SBC) ALife: See Artiicial Life.
The two most commonly used model selection criteria.
They trade off itness of a model for the complexity of the Alignment
model. If the AIC (or SBC) of model A is smaller than that 1: A dynamic process that requires close, continual
of model B, it is said that model A is better than model assessment (because the goals keep on moving) and
B. (Cho, 2005) cooperation between achieving competitive advantage
and surviving. (Lubbe, 2005) 2: An orientation based on
Akruti a series of ongoing processes based on the will to achieve
A brand name of Indian language software. (Literal a common goal. Alignment is distinguished from the more
meaning of Akruti is igure.) (Shaligram, 2005) static concept of it, and is conceptualized as an outcome

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Alignm e nt M a p Am bie nt I nt e llige nc e 19

with determinant factors that affect the degree to which one Alt String
set of objectives are mutually consistent and supportive of An HTML tag for attaching text to a media object. (N.C.
the other. (Dery & Samson, 2005) 3: Explicit mapping of Rowe, 2005b)
A
characters of a sequence to characters of one or more other
sequence(s). (Tsunoda et al., 2005) 4: Means the alignment Alternative Assessment
of the strategic vision for information technology with the Activities developed by an instructor to assist the student in
organizations strategic vision, ensuring the strategic vision identifying the processes and products of learning beyond
for information technology supports the organizations the one right answer approach, and where the scoring
strategic vision. (Brabston, 2005) 5: The arrangement or rating criteria are distributed at the same time as the
or position of different separate elements (strategies) in assignment directions. (B.L. MacGregor, 2005)
relation to each other. (Johnston, 2005)
Alternative Document Model
Alignment Map A conceptual rule for grouping together Web pages into
A representation on a surface to clearly show the larger units, such as sites and domains, for more effective
arrangement or positioning of relative items on a straight data mining, particularly useful in Web-structure mining.
line or a group of parallel lines. (Alkhalifa, 2006) (Thelwall, 2005)

All Rules Search Alternative Hypothesis


An algorithm that inds all rules of a deined format that The hypothesis that an object is relevant. In general terms,
satisfy a deined set of constraints. (Richards & de la the alternative hypothesis refers to the set of events that
Iglesia, 2005) is the complement of the null hypothesis. (Mukherjee,
2005)
Alliance Management
Allows two different organizations to effectively work Alternative Learning Center (ALC)
together and combine resources, which is expected to bring A program that provides educational options to students
beneits to both organizations. (Mandal et al., 2005) who are at risk of experiencing failure or already have been
unsuccessful in a traditional school setting. (Dorniden,
Allied Model of IPFS 2005)
A model that describes the provision of integrated personal
inancial services through inter-organizational alliances. Alternative Stafing
(Gordon & Mulligan, 2005) Support systems for student learning that consist of
various kinds of instructional personnel, often replacing
Alliterate expensive personnel with relatively inexpensive personnel
A person who has the ability to read, yet chooses not to as appropriate. (Twigg, 2005)
use it. (Trammell, 2005)
Alternative Storage
ALM: See Application-Layer Multicast. An array of storage media that consists of two forms of
storage: near-line storage and/or second storage. (Yao,
ALM Routing Protocol Liu, et al., 2005)
The members of the hosts construct a delivery tree using
similar algorithms as the IP-multicast routing protocols ALT-Text
do. (Hossz, 2006) Stands for alternative text, primarily used to render graphics
when the image is not being displayed or cannot be viewed
ALN: See Asynchronous Learning Network. due to visual impairments or blindness. (Yu, 2005b)

Alpha-Helix Ambient Intelligence


A helical conformation of a polypeptide chain, once of the 1: Represents a vision of the future where people will be
most common secondary structures in proteins. (Tsunoda surrounded by electronic environments that are sensitive
et al., 2005) and responsive to people. (Hua et al., 2006) 2: The merging
of mobile communications and sensing technologies with

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
20 Am biguit y AM PS

the aim of enabling a pervasive and unobtrusive intelligence American Society for Training & Development
in the surrounding environment supporting the activities (ASTD)
A and interactions of the users. Technologies like face-based Beginning in 1944, a leading association of workplace
interfaces and affective computing are inherent ambient- learning and performance professionals, 70,000
intelligence technologies. (Pantic, 2005b) members from more than 100 countriesmulti-national
corporations, medium-sized and small businesses,
Ambiguity government, and academia. (Rhoten, 2006b)
Something dificult to interpret, dificult to understand,
unclear. A situational factor proposed to contribute to the American Standard Code for Information
occurrence of Limited-Perspective Bias. (Moore & Burke, Interchange (ASCII)
2005) 1: A code for information exchange between computers
made by different companies; a string of seven binary digits
Ambiguous Deinition of Distance Education represents each character; used in most microcomputers.
There are many differing deinitions for distance education, (Rhoten, 2006a) 2. A standard method of encoding upper
spanning from videotape exchange through simple and lower case text and other symbols with a 7-bit code.
video supported to completely asynchronous (different (Kieler & West, 2005) 3: Serves a code for representing
time/different place) environments. (Martz & Shepherd, English characters as numbers with each letter assigned
2005) a number from 0 to 127. (Pang, 2005a) 4: System used to
convert simple text to computer readable form. (McCarthy,
Ambulatory Measurement Device 2005a)
A data-gathering instrument that can be worn during
everyday experiences. The device gathers biophysical Americans with Disabilities Act (ADA)
data for later transmission or reading. (Molinari, Dupler, 1: U.S. public law enacted in 1990 ensuring rights for people
et al., 2005a) with disabilities. This legislation mandates reasonable
accommodation and effective communication. (Yu, 2005a)
AMEC: See Agent-Mediated E-Commerce. 2: Section 508 of the federal Rehabilitation Act requires that
all Web sites developed with federal dollars meet certain
America Online (AOL) accessibility requirements so that those with physical or
A U.S. online service provider based in Vienna, Virginia, mental impairments can access Web-based information.
AOL claims to be the largest and fastest growing provider of This is sometimes referred to as ADA compliance.
online services in the world, with the most active subscriber (Glick, 2005a) 3: U.S. civil rights legislation passed in
base. AOL offers its three million subscribers electronic 1990 that prohibits discrimination against people with
mail, interactive newspapers and magazines, conferencing, disabilities in the areas of employment, transportation,
software libraries, computing support, and online classes, telecommunications, and public accommodation.
among other services. (Kontolemakis et al., 2005) (Schmetzke, 2005)

American Community Survey (ACS) Amortize-Scans


An ongoing survey conducted by the U.S. Census Bureau Amortizing disk reads by computing as many group-bys
that collects detailed demographic and socioeconomic as possible, simultaneously in memory. (Tan, 2005a)
information on a sample of the population. (Garb & Wait,
2005a) Amplitude Change Function (ACF)
A polynomial relationship of the form H0(w)= P[H(w)]
American Health Information Management between the amplitude responses of the overall and the
Association (AHIMA) prototype ilters, H0(w) and H(w), respectively. (Jovanovic-
A professional association that represents more than Dolecek & Daz-Carmona, 2005)
50,000 specially educated health information management
professionals who work throughout the health care industry. AMPS: See Advanced Mobile Phone System.
(Zender, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ana log Anchore d Le a r ning I nst ruc t ions 21

Analog Analytic Method


Encoding a physical phenomenon by a direct, perceptually Method in which a system is evaluated based on its
continuous variation of a physical property such as interface design attributes (typically by a usability expert).
A
electromagnetic intensity (recording tape), mechanical (Danielson, 2006b)
displacement (vinyl disk), or opaqueness (photographic
ilm). (Kieler & West, 2005) Analytical Data
All data that are obtained from optimization, forecasting,
Analysis and decision support models. (Mathieu & Levary, 2005)
1: The stage of the intelligence cycle in which the strategic
signiicance of environmental data is determined. In Analytical Information Technology (AIT)
this stage, the intelligence is produced. During analysis, An information technology that facilitates tasks like
intelligence professionals may use different models and predictive modeling, data assimilation, planning, or
techniques to interpret and value environmental data decision making through automated data-driven methods,
(e.g., SWOT analysis, growth-share matrix, or scenario numerical solutions of physical or dynamical systems,
analysis). (Achterbergh, 2005a) 2: The word analysis can human-computer interaction, or a combination. AIT
have different meanings in different contexts. Within the includes DMT, DSS, BI, OLAP, GIS, and other supporting
natural computing domain, analysis corresponds to the tools and technologies. (Ganguly et al., 2005)
investigation of a given phenomenon in order to obtain some
information from it or to derive simpliied computational Analytical Query
systems (or theoretical models) that somewhat mimic A query on a data warehouse for identifying business
the behavior of the natural system being analyzed. (de intelligence. These queries often have complex expressions,
Castro, 2005) access many kinds of data, and involve statistical functions.
(Lu, 2005)
Analysis Filter Bank
Decomposes the input signal into a set of sub-band signals, Analyzing the Market
with each sub-band signal occupying a portion of the Identiication of possible markets based upon Market
original frequency band. (Jovanovic-Dolecek, 2005b) Stratiication data on educational materials that are
available. This is when entrepreneurial considerations are
Analysis Model put to the litmus test in terms of the chance for success or
A model developed to learn all aspects of a problem domain failure. (Robinson, 2005)
to determine the best way to solve a speciic set of user
needs. (Krogstie, 2005a) Anchor Domain
The area that provides (drives, catalyzes, or enables) the
Analysis, Design, Development, Implementation, change forces applied to the pivot domain. (Abou-Zeid,
and Evaluation (ADDIE) Model 2005a)
1: An Instructional System Design model on which
almost all other ISD models are based. (Aisami, 2005) Anchored Instruction
2: The ive phases of most instructional design models: Learning is anchored in a real-world context. Within
analyze, design, develop, implement, and evaluate. Some this context, learners engage in different activities to
models follow the phases in a linear fashion, while others solve a problem, such as math calculations or geographic
may approach the phases in a holistic or phenomenologic coordinates to travel across a continent or sale a ship.
manner. (Rogers, 2005a) (Jennings et al., 2005)

Analyst Anchored Learning Instructions


A user who collaborates with designers as a domain High learning eficiency with easier transferability of
expert analyzing constraints and trade-offs in existing mental models and the facilitation of strategic problem-
and envisioned work practices is called an analyst. solving skills in ill-structured domains emerge if
This is the second stage in the developmental theory of instructions are anchored on a particular problem or set
participatory-design relationships between users and of problems. (Kwok Lai-yin & Tan Yew-Gee, 2005)
designers. (Carroll, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
22 Anchoring Annot at ion

Anchoring Animation
An evaluator bias in analytic methods in which a system is 1: A graphical representation of a simulation process. The
A evaluated with respect to users too similar to the evaluator major popularity of animation is its ability to communicate
to be representative of the user population. (Danielson, the essence of the model to managers and other key project
2006a) personnel, greatly increasing the models credibility. It is
also used as a debugging and training tool. (Al-Hanbali
Andragogy & Sadoun, 2006) 2: A synthetic apparent motion created
1: The art and science of helping adults learn. (Whitield, through artiicial means. (Yong & Choo, 2005) 3: Technique
2005) 2: The study of adult education. The term andragogy of imparting motion and activity in graphic images of such
was coined by Malcolm Knowles, a leading researcher objects as products and cartoons to create a condition of
in the study of adult learners. (Ordonez, 2005) 3: This being alive, active, or spirited. (Gao, 2005b)
concept was irst developed by Knowles in the late 1960s
as a science of teaching adults; its key assumptions, Animation Framework eXtension (AFX)
based on the characteristics of adult learners, are: (1) Standard conducted by the Synthetic and Natural Hybrid
self-directedness and independence increases as a person Coding group within MPEG; its goal is to specify
matures; (2) adult experience constitutes a resource for compression schemes for 3D animation data and tools,
learning; (3) readiness to learn is related to needs, which such as body animation, image-based rendering, texture-
in turn are related to the different developmental tasks, mapping, and so forth. (Di Giacomo et al., 2005)
phases, and roles of adult life; (4) as a person matures,
his or her orientation to learn is more directed toward Animation Model
the immediacy of application and to one of problem A graphical representation of a problem situation that can
centeredness; and (5) in the adult, learning motivation is consist of a visualization of the time-ordered dynamics of
intrinsic. (Correia & Sarmento, 2005) objects, a static background, an overview of performance
indicators, and a user interface. (Janssen, 2005)
Anecdote
A naturally occurring story or the recounting of an ANN: See Artiicial Neural Network.
experience in conversation or when prompted. Anecdotes
are in effect a response to some form of stimulus and recount Annotation
real or imagined experience. (Snowden, 2006) 1: A technique for content adaptation. Special tags are
added to the HTML page to allow browsers to operate
Angle of Arrival (AOA) in a pre-deined function. (Goh & Kinshuk, 2005) 2:
1: A positioning technology in which the mobile network Also referred to as metadata; a document containing
sends directional antenna beams to locate a mobile device knowledge about another documenthence the meta
at the intersection of the directions of maximum signal preix. According to the speciication language used,
strength. (Giaglis, 2005) 2: A positioning technique that one distinguishes informal annotations (interpreted
determines a mobile users location by the angle of an by humans) and formal annotations (intended to be
incoming signal. AOA covers only the arc of a circle instead interpreted by machines). Concerning the content of these
of the whole cell. (Fraunholz et al., 2005) 3: The angle- annotations, knowledge can relate either to the contents of
of-arrival method measures the angle of a signal arriving an annotated document (e.g., by means of a collection of
at the antenna of a base station. The intersection of the concepts expressed in the document) or to a documents
projection of two calculated angles (from the antennas of overall properties (e.g., author, publication date, language
two base stations) on the two-dimensional space reveals used, etc). (Fortier & Kassel, 2006) 3: Descriptive text
the location of the mobile phone. (Ververidis & Polyzos, attached to multimedia objects. (Hurson & Yang, 2005) 4:
2006) Information about a multimedia object. This information
may directly describe the semantic content of an object
Animated Pedagogical Agents (e.g., this photo shows a cityscape) or describe its relations
Animated igures operating in a learning environment and to other external objects (e.g., this photo was made in the
aiming at supporting learners in their learning process, and year 1999). (Windhouwer & Kersten, 2005) 5: Comments,
capable of adapting their support to the learners paths. typographical corrections, hypotheses, or ratings given
(Clarebout et al., 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Annot at ion Ex t ra c t ion Algorit hm Ant hropom orphic 23

by a reader playing the role of an author, which makes a Anonymity


statement about the document or some part of it at a certain 1: A feature of an ARS that can protect the identity of
time. (Qayyum, 2005) a participant. (Banks, 2005) 2: Ability to conceal ones
A
identity. (N.C. Rowe, 2006c) 3: A distinct characteristic
Annotation Extraction Algorithm of peer-to-peer networks, derived from the peer-to-peer
An algorithm that automatically extracts a (set of) philosophy. The identity and usage records of a peer
annotations that describe the content of a media object. The are hidden from others to prevent piracy violation and
input of such an algorithm can consist of the media object censorship. (Kwok, Cheung, et al., 2006) 4: The lack of
itself combined with previously extracted annotations or the identity due to the eliminated social cues (e.g., visual
other additional information. (Windhouwer & Kersten, or verbal indication of a communication partners presence
2005) in the social interaction circumstance). Anonymity may
encourage people to be more open to sharing their feelings
Annotation Extraction Process and opinions, freeing them from social pressure to follow
The semi-automatic extraction of annotations aimed at norms of groups in which they are involved. (Kang et
describing the content of a digital media object. In this al., 2006) 5: The degree to which a software system or
process, annotation extraction algorithms are called in component allows for or supports anonymous transactions.
the correct order, so their out- and input dependencies are (Guan, 2005a)
met. (Windhouwer & Kersten, 2005)
Anonymity in GSS
Annotation Maintenance 1: The situation when participants names are not made
When the annotation extraction algorithms or the media public in a GSS environment. (Limayem, 2005) 2:
objects change, the already extracted annotations must be Communicators do not know owners of expressed ideas
revalidated. If a dependency description for the extraction in group interaction processes. (Chuang et al., 2005)
algorithms is available, an incremental extraction process
can be started where only the affected annotations are Analysis of Variance (ANOVA)
(re)produced. (Windhouwer & Kersten, 2005) A powerful statistical method for studying the relationship
between a response or criterion variable and a set of one
Annotation Pipeline or more predictor or independent variable(s). (Morantz,
A media object (and its growing collection of annotations) 2005)
is pushed or pulled through a sequence of annotation
extraction algorithms. (Windhouwer & Kersten, 2005) ANOVA: See Analysis of Variance.

Annotation Pool ANSI C++


Annotations of digital media are stored in a data pool. Complete set of standards provided by the American
Annotation extraction algorithms populate this pool when National Standards Institute in collaboration with ISO
their input is available. (Windhouwer & Kersten, 2005) standardization committee to deine an industrial standard
for the C++ programming language. (Gaffar, 2005)
Anomaly
1: An unwanted consequence of inadequate database ANT: See Actor Network Theory.
design. Data can be unintentionally lost or be more
dificult to add or modify than the designer intended. Antenna
(Schultz, 2005) 2: A value or observation that deviates The part of a transmitting or receiving device that radiates
from the rule or analogy. A potentially incorrect value. or receives electromagnetic radiation (electromagnetic
(Morantz, 2005) waves). (Statica & Deek, 2006)

Anomaly Detection Anthropomorphic


Analysis strategy that identiies intrusions as unusual An attribution of human characteristic or behavior to
behavior that differs from the normal behavior of the natural phenomena or inanimate objectsthat is, the
monitored system. (Lazarevic, 2005) embodiment of a graphic user interface agent can be

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
24 Ant hropom orphism API

anthropomorphic since the representation may take on Anycast


human attributes or qualities. Anthropomorphism is an Introduced in IPv6, associates an address with multiple
A attempt to design technologies to be user friendly. (Faiola, nodes. Packets sent to an anycast address are routed to the
2006) nearest node having that address, depending on the distance
of the routing path. Anycast can be used to provide high
Anthropomorphism availability (automatic failover) and load balancing for
To ascribe human characteristics to things not human. stateless services, for example, access to replicated data.
Some authors argue that, unlike a human being, an (Papagiannidis et al., 2005)
organization can have no memory. It has been argued
that the idea of organizational memory raises problems Anytime, Anywhere Work
of anthropomorphism. (Jasimuddin et al., 2006) Describes a situation where people can do tasks wherever
they want and without any consideration for timethat
Anthropopathy is, their work can be done anytime, anywhere. (Wiberg,
Attribution of human feelings to non-humans (animals, 2005)
objects, or virtual entities). (Analide et al., 2006)
AOA: See Angle of Arrival.
Antimonicity Constraint
The antimonicity constraint states that any supergraph AOL: See America Online.
of an infrequent graph must be infrequent itself (Fischer
& Meinl, 2005) AP: See Access Point.

Antimonotonic APA
A property of some pattern-inding problems stating that Association for Project Management. (D. Brandon,
patterns of size k can only exist if certain patterns with sizes 2005b)
smaller than k exist in the same dataset. This property is
used in level-wise algorithms, such as the a priori algorithm Apache: See Apache Software Foundation.
used for association rule mining or some algorithms for
inclusion dependency mining. (Koeller, 2005) Apache Software Foundation
1: Provides support for the Apache community of
Antinoise open source software projects. The Apache projects
Estimated replica of acoustic noise generated by an are characterized by a collaborative, consensus-based
active noise canceller system, which is used to cancel an development process, an open and pragmatic software
environmental noise. (Perez-Meana & Nakano-Miyatake, license, and a desire to create high-quality software that
2005) leads the way in its ield. Most famous projects among
them are: http (the well-known Web server), XML (an
Antivirus Software instrument for the development of Web pages based on
A class of programs that searches networks, hard drives, XMLExtended Markup Language), and Jakarta (Java
loppy disks, and other data access devices, such as CD- server). (Cartelli, 2005b) 2: An open source HTTP server
ROM/DVD-ROMs and zip drives, for any known or for operating systems, including UNIX and Windows NT.
potential viruses. The market for this kind of program has A project supported by the Apache Software Foundation.
expanded because of Internet growth and the increasing use (Goh & Kinshuk, 2005) 3: An open source Web server.
of the Internet by businesses concerned about protecting Web servers use http to enable a computer user to connect
their computer assets. (Luo & Warkentin, 2005) to the Internet. (Boateng & Boateng, 2006a)

Any Time, Any Place (ATAP) Learning APDIP: See Asia Paciic Development Information
A basic characteristic of Web-based education courses Program.
in that they are available to the student on a 24/7 basis.
(Marold, 2005) API: See Application Programming Interface.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
API CS Applic at ion Se r vic e Provide r (ASP) 25

APICS: See American Production and Inventory Application Domain


Control Society. That part of the assumed real world that is changed by a
work system to achieve the work systems goals. (Diaper,
A
APON: See APON or Broadband PON. 2006)

APON or Broadband PON (APON/BPON) Application Infrastructure Provider (AIP)


APON is defined by the ITU-T G.983 series of AtypeofASPthatusuallyoriginatesfromtelecommunication
recommendations. It features a passive optical network for operators that run their own networks and Internet data
iber-to-the-home service that uses ATM as its transmission centers. The AIP focuses on server hosting and network
protocol. BPON is an alternate name for this technology. infrastructure management for other ASPs and corporate
(Kelic, 2005) clients, and provides value-added services based on its
technology leadership, for example, online security and
Apparent Distance e-payment services. (D. Kim, 2005)
The perceived proximity of faculty and students in a
distance education environment. Close apparent distance Application Integration
is the term used to describe a relationship that is perceived The process of bringing data or a function from one
as positive, supporting, in regular communicationa application program together with that of another
relationship in which the student and faculty are well application program. (Karakostas, 2005)
known to each other and where communications low
easily. (Sales, 2005) Application Layer
Layer 7 of the OSI model. This layer determines the
Applet interface of the system with the user. (Ngoh & Shankar,
A computer program that is portable between operating 2005)
systems and requires only minimal memory to run,
often written in the Java programming language. (Fagan, Application Program Interface (API)
2005) 1: Part of the run-time environment described in SCORM.
It provides a standardized way for content to communicate
Application 1 with the learning management system. (Stavredes, 2005b)
1: An application is a program, script, or other collection 2: A set of programming tools that provide developers
of instructions that direct the operation of a processor. This with a simple, consistent mechanism for extending the
is a wide deinition of application. It does not distinguish functionality of an application and for accessing existing
Web-based software from stand-alone software. Nor does computing systems. (Yow & Moertiyoso, 2005) 3: A
this deinition distinguish system software from goal- description of the way one piece of software asks another
speciic software. (Maris, 2005) 2: Knowledge integration program to perform a service. A standard API for data
to create organizational capability through directives, mining enables different data-mining algorithms from
organizational routines, and self-contained task teams. various vendors to be easily plugged into application
(Lindsey, 2006) programs. (Zendulka, 2005a)

Application Aware vs. Application Transparent Application Service Provider (ASP)


In application-aware fault tolerance, the application 1: A company that hosts an application on its servers
programmer writes code for fault tolerance methods that so the client does not need to worry about the technical
perform speciic operations. In application-transparent fault issues. The client then accesses the content and software
tolerance, the fault tolerance middleware performs those via the Internet. (Kapp, 2005) 2: A service company
operations automatically, using standard operating system that can support and relieve a irm from the daunting
functions and the technique of library interpositioning. challenges of inding, hiring, inspiring, and training
(Zhao, Moser, et al., 2005) technical personnel to manage an application in-house.
An ASP provides software applications on a pay-per-use
or service basis via the Internet and leased lines. (Archer,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
26 Applic at ion Solut ion Provide rs Appre c iat ive Syst em s

2005) 3: A company that manages and hosts a software Application-Sharing Space


program on behalf of a client. (Baker & Schihl, 2005) 4: A groupware tool that produces multiple distributed remote
A A service company offering outsourcing solutions that views of a particular space. Any single-user application
supply, develop, and manage application-speciic software put under the control of the particular space can be viewed
and hardware so that customers internal information remotely and controlled by the group members that have
technology resources can be freed up. (Zhu, 2005) 5: The access to this space. Therefore, the application-sharing
provisioning to individuals and companies of software space transforms any single-user application put under
applications and ICT-related services, via the Internet or its control into a multi-user shared application. (Villemur
other data networks, that are to be paid on a rental/usage & Drira, 2006)
base. (Iacob et al., 2005) 6: A provider of application
services over the Internet or an intranet. (Feuerlicht & Application-Speciic Ontology
Vorisek, 2006) 7: A specialized operator that offers a An engineering object deining the model of knowledge in
bundle of customized software applications from a remote a speciic application case. (Cristani & Cuel, 2006)
position through the Internet, in exchange for a periodic
fee. (Morabito & Provera, 2005) 8: A third-party service Applicative-Oriented Formal Speciication
irm that deploys, manages, and remotely hosts software Language
applications through centrally located services in a rental Does not allow the use of variables. (Dasso & Funes,
or lease agreement. Such application deliveries are done 2005)
to multiple entities from data centers across a wide area
network (WAN) as a service rather than a product, priced Applied Behavior Analysis
according to a license fee and maintenance contract set by Experimental analysis of behavior in which the three-
the vendor. An ASP is considered by many to be the new term contingency, antecedent conditions, response, and
form of IT outsourcing, usually referred to as application consequent events are analyzed to explain behavior.
outsourcing. (Guah & Currie, 2005) 9: An HTML page (Lazarus, 2005a)
that includes one or more scripts that are processed on
a Microsoft Web server before the page is sent to the Applied Ethics
user. An ASP is somewhat similar to a server-side or a 1: The branch of ethics that emphasizes not theories of
common gateway interface (CGI) application in that all morality but ways of analyzing and resolving issues and
involve programs that run on the server, usually tailoring conlicts in daily life, the professions, and public affairs.
a page for the user. (Lee, Suh, et al., 2005) (Goodman, 2005) 2: The study of a morally controversial
practice, whereby the practice is described and analyzed,
Application Solution Providers and moral principles and judgments are applied, resulting
Third-par t y vendors who provide data center, in a set of recommendations. (Cook, 2005)
telecommunications, and application options for major
companies. (DeLorenzo, 2005) Appreciative Settings
A body of linked connotations of personal or collective
Application State interest, discrimination, and valuation which we bring to
Current snapshot of the application itself and all of the the exercise of judgment and which tacitly determine what
resources it addresses. (Trossen & Molenaar, 2005) we shall notice, how we shall discriminate situations of
concern from the general confusion of an ongoing event,
Application Synchronization and how we shall regard them. (Vat, 2005a)
A speciic type of wireless application whereby the data
on the wireless device is synchronized with that on the Appreciative Systems
main server. (K. J. MacGregor, 2005) Developed by Vickers in the 1960s, the concepts of
appreciative systems and of appreciative inquiry go beyond
Application-Layer Multicast (ALM) the paradigm of goal seeking to explain the processes of
This does not require any additional protocol in the network social activity, including decision making and action.
routers, since it uses the traditional unicast IP-transmission. Vickers criticized the reductionism of the perspective of
Its other names are host-multicast or end-host multicast. focusing exclusively on goals, which he thought would
(Hossz, 2006) be adequate to explain the behavior of rats in mazes.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Appropriat ion Ara bizat ion 27

In order to describe and to explain the processes that approximation and the upper approximation. (Voges,
characterize social systems, it is necessary to capture 2005)
the establishing and modifying of relationships through
A
time. Vickers also rejects the cybernetic paradigm where Apriori Algorithm
the course to be steered is available from outside the 1: An eficient association rule mining algorithm developed
system, whereas systems of human activity themselves by Agrawal in 1993. Apriori employs a breadth-irst
generate and regulate multiple and sometimes mutually search and uses a hash tree structure to count candidate
inconsistent courses. Vickers model is cyclical and starts item sets eficiently. The algorithm generates candidate
with previous experiences which have created certain item sets of length k from k1 length item sets. Then, the
tacit patterns, standards, values, or norms; these lead to a patterns that have an infrequent subpattern are pruned.
readiness to notice certain features which determine which Following that, the whole transaction database is scanned
facts are relevant; the facts noticed are evaluated against to determine frequent item sets among the candidates. For
the norms, leading both to regulatory action and to the determining frequent items in a fast manner, the algorithm
modiication of the norms so that future experiences may uses a hash tree to store candidate item sets. (Huang,
be evaluated differently. The organization of this process 2005) 2: A classic algorithm that popularized association
is the appreciative system which creates an individual rule mining. It pioneered a method to generate candidate
and a social appreciative world. The appreciative settings itemsets by using only frequent itemsets in the previous
condition new experience but are also modiied by the new pass. The idea rests on the fact that any subset of a frequent
experience. Since the state of an appreciative system is itemset must be frequent as well. This idea is also known
the function of its own history, this implies that they are as the downward closure property. (Woon et al., 2005)
learning systems, and for Vickers, learning is the most 3: A level-wise algorithm for inding association rules.
central and basic social process. Soft systems methodology Apriori uses the support of an itemset to prune the search
and complex systems thinking have extended the use and space of all itemsets. It then uses the conidence metric
notion of appreciative systems. (Nobre, 2006b) to ind association rules. (Imberman & Tansel, 2006) 4:
Association rule mining algorithm that uses the fact that
Appropriation the support of a non-empty subset of an item set cannot be
The idea that active exploration enables peoplewhile smaller than the support of the item set itself. (Denton &
creating their own textsto appropriate the knowledge Besemann, 2005) 5: The method of generating candidates
that will help them read other texts. (Pryor, 2005) before testing them during a scan over the database,
insuring that if a candidate may be frequent, then it will
Appropriation and Delivery Structure be generated. See also Generating-Pruning. (Masseglia
The rules and resources that determine the choices made by et al., 2005) 6: Analysis and description of the media
educators regarding strategies for integrating the learning content at the time of insertion in the database. The gained
model(s) and supporting technologies within a selected information is stored in a database and enables content-
instructional design. (LeRouge & Webb, 2005) based retrieval of the corresponding media object without
actually accessing the latter. (Geisler & Kao, 2005)
Approved
Term used to describe an educational institution or program APS-Based Virtual Enterprise
that has the explicit recognition of an accrediting agency. A net of distributed APSs with those same objectives of
(Kostopoulos, 2005) traditional virtual enterprises, but with higher lexibility
managing partners core competences domain. (Pires et
Approximate Searching al., 2006)
Searching that permits some differences between the
pattern speciication and its text occurrences. (Navarro, AR: See Action Research.
2005)
Arabization
Approximation Set The transformation of software applications into the
An alternative (and more technically correct) name Arabic language, in terms of usage as well as interface,
for a rough set, which is deined by two sets, the lower to be able to cater for a community that stands in 2003 at
around 300 million people. (Kamel, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
28 Arbit ra ge Are a of t he Se a rch Spa c e

Arbitrage curriculum content, networked relationships, various


The simultaneous purchase of an undervalued security and applications, and outcomes. (Baskin et al., 2005) 2:
A sale of an overvalued but equivalent security to obtain a The coniguration of the network of neurons into layers
riskless proit on the price differential. Taking advantage of of neurons is referred to as the neural architecture. To
a market eficiency in a riskless manner. (Roofe, 2005) specify, the architecture involves declaring the number
of input variables, hidden layers, hidden neurons, and
Arbitration output neurons. (Smith, 2005) 3: The fundamental
A private form of conlict resolution. The litigating organization of a system, embodied in its components,
parties may voluntarily submit a dispute to one or more their relationships to each other and the environment, and
independent, neutral experts (arbitrators) who decide the principles governing its design and evolution (ANSI/
upon the case similarly to a court, generally in a shorter IEEE Standard 1471-2000). (Stojanovic & Dahanayake,
period of time. Arbitrations are usually regulated by law. 2005) 4: The organization of components of a system
(Cevenini, 2005) that enables their interacting with one another to achieve
the objectives of the system. (Fulton, 2005) 5: Used to
Archetype describe the basic building blocks, functions, interfaces,
A naturally occurring constituent and output of a story and relationships of complex systems on an abstract level
tradition in which characters emerge from a body of of detail. It is also used as a blueprint or reference model
anecdotes and stories that over time become more extreme for implementing information systems, for example,
until each archetype represents one aspect of that society. enterprise architectures, information-system architectures,
In a true archetype, all members of a community would or software architectures. (Maier & Hdrich, 2006)
recognize some aspect of themselves in each archetype.
Archetypes are often associated with the work of Jung Architecture of Integrated Information Systems
and Campbell who, in different contexts, argue for the (ARIS)
existence of universal archetypes. This is not the only A modeling and design tool for business processes.
interpretation; many authors (including this one) argue (Sundaram & Portougal, 2005a)
from experience that archetypes across cultures may appear
similar, but are in fact very different. For example, the Architecture Viewpoint
trickster archetype of Norse legend is Loki, whose primary An abstraction of a set of concerns on a system derived by
purpose if any seems at times destructive, whereas in using a set of concepts and rules of structure (RM-ODP).
many Native American stories the trickster is the coyote, (Stojanovic & Dahanayake, 2005)
whose function is to teach and advance humans to greater
understanding. (Snowden, 2006) Area of Black Pixels
The total number of black pixels in the binary image.
Architectural Design of Information Systems based (Chakravarty et al., 2005a)
on Structured Analysis (ADISSA)
An analysis and design methodology. In the analysis stage Area of Interest
it utilizes hierarchical DFDs; in the design stage the DFDs An analysis method used in eye tracking. Researchers
are used to design the various components of the system. deine areas of interest over certain parts of a display
These include: (1) top-level descriptions of the transactions or interface under evaluation and analyze only the eye
which eventually become detailed descriptions of the movements that fall within such areas. (Poole & Ball,
applications programs; (2) the user interfaces (menus); 2006)
(3) the input and output screens and reports; and (4) the
database schema in the form of normalized relations, and Area of the Search Space
SQL commands for retrieving and updating the database. Set of speciic ranges or values of the input variables that
(Shoval & Kabeli, 2005) constitute a subset of the search space. (Rabual Dopico
et al., 2005)
Architecture
1: A tailored interactive communications and information
structure that leads to online transactions including

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Areal Interpolation Artiicial Intelligence (AI) 29

Areal Interpolation Articulation


A method of estimating counts or quantities for one 1: One of four knowledge transmission mechanisms
coniguration of geographic units (target zones) based on according to Nonaka. Articulation is about explicit or
A
known counts from a different coniguration of the same codiied knowledge being transferred to become explicit
geographic space (source zones). (Garb & Wait, 2005a) knowledge elsewhere by recombining two or more sets of
coded knowledge. (Brock & Zhou, 2006) 2: The process
ARIS: See Architecture of Integrated Information Sys- by which sounds are formed; the manner in which notes
tems. are struck, sustained, and released. Examples: staccato
(shortening and detaching of notes), legato (smooth),
Arity pizzicato (plucking strings), vibrato (varying the pitch
The number of roles in a fact type (unary = 1, binary = of a note up and down), muted (stringed instruments,
2, ternary = 3, etc.). In ORM, fact types may be of arity by sliding a block of rubber or similar material onto the
1 or more. In UML, fact types (associations) may be of bridge), brass (by inserting a conical device into the bell).
arity 2 or more. (Halpin, 2005) (Wieczorkowska, 2005)

ARL: See Association of Research Libraries. Artifact


1: Any object produced or consumed by an activity of
Around-the-Clock Development a business process. (De Lucia et al., 2006) 2: Evidence
A software development style in which software teams in a portfolio; a product that demonstrates an aspect of
that are geographically distributed make use of time zones performance or a professional work that has been selected
to develop software. (Lui & Chan, 2005) by the creator of a portfolio. (Wieseman, 2005a) 3: Actual
examples of lesson plans, philosophies, and correspondence
Around-the-Sun Development: See Around-the- that show evidence of teacher competency in standards.
Clock Development. (Shaw & Slick, 2005) 4: Any human-made object. It can
be physical (e.g., paper, application) or conceptual (e.g.,
ARPAnet: See Advanced Research Projects Agency norm, convention, habit). (Munkvold, 2006)
Network.
Artifact Sharing
Array A natural part of everyday work among community
An item of this information category consists of a members where documents, charts, and images are shared
nonempty set of (point,value) pairs where the points have for the purposes of planning, relection, discussion, and
n-D integer coordinates and together completely cover an solving problems. (Chua, 2006)
n-D interval, the so-called spatial domain of the array.
(Baumann, 2005) Artiicial Intelligence (AI)
1: A research discipline whose aim is to make computers
ARS: See Audience Response System. able to simulate human abilities, especially the ability to
learn. AI is separated as neural net theory, expert systems,
Artefact robotics, fuzzy control systems, game theory, and so
In the context of CoPs, indicates objects, articles, and forth. (R., 2005) 2: Refers to the capability of a machine,
things that have been created by the CoP to assist and more speciically a computer or computer program,
the members in their work and may have some of the to perform functions that are normally associated with
communitys knowledge embedded in them. Artefacts human intelligence, such as reasoning and optimization
do not have to be concretea process or procedure may through experience. AI is the branch of computer science
be an artefact. (Kimble & Hildreth, 2005) that attempts to approximate the results of human reasoning
by organizing and manipulating factual and heuristic
Articulated Object knowledge. (Hamdi, 2005b) 3: A ield of information
Structure composed of two or more rigid bodies technology that studies how to imbue computers with
interconnected by means of joints. The degrees of freedom human characteristics and thought. Expert systems, natural
associated with each joint deine the different structure language, and neural networks fall under the AI research
conigurations. (Sappa et al., 2005) area.(Athappilly & Rea, 2005) 4: A set of computer

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
30 Artiicial Intelligence Markup Language (AIML) ASAP System

systems that feature automated human-intelligent, rational patterns found in sample or historical data. (Kitchens,
behavior and employ knowledge representation and 2005) 3: Biologically inspired statistical tools modeled
A reasoning methods. (Heucke et al., 2005) 5: The branch after the structure of the human brain. Neural networks
of computer science concerned with making computers are composed of interconnected units or nodes (similar to
behave like humans. John McCarthy coined the term in neurons) with associated weights and activation values.
1956 while at the Massachusetts Institute of Technology. Training or learning rules are incorporated into the network
It refers to the science that provides computers with to accomplish forecasting or classiication tasks based on
the ability to solve problems not easily solved through the pattern of interconnection throughout the network.
algorithmic models. (Becerra-Fernandez & Sabherwal, (Fuller & Wilson, 2006) 4: Parallel distributed processor
2006) 6: The ield of science that studies how to make formed by single processing units that has a natural capacity
computers intelligent. It consists mainly of the ields of storing experimental knowledge and making it available
of machine learning (neuronal networks and decision for use. Artiicial neural networks are designed to model
trees) and expert systems. The principal problem is how complex problems such as time series forecasting, pattern
to represent knowledge. (Rodrguez-Tastets, 2005b) 7: recognition, and so forth. (Castro & Braga, 2006) 5: A
The study of the principles of intelligence (scientiic network of many simple processors (units or neurons)
objective), and the design and build of intelligent machines that imitates a biological neural network. The units are
like robots (engineering objective). (Gelepithis, 2005) 8: connected by unidirectional communication channels,
The use of computer systems, software, and models to which carry numeric data. Neural networks can be trained
imitate human thought and reasoning when completing to ind nonlinear relationships in data, and are used in
a task. (Ally, 2005b) applications such as robotics, speech recognition, signal
processing, or medical diagnosis. (Rabual Dopico et al.,
Artificial Intelligence Markup Language 2005) 6: A system composed of many simple processing
(AIML) elements operating in parallel whose function is determined
An XML speciication for programming chat agents like by network structure, connection strengths, and the
ALICE. The free ALICE AIML includes a knowledge base processing performed at computing elements or units.
of approximately 41,000 categories. (Sourin, 2006) (Zhou, 2005) 7: Approach based on the neural structure
of the brain with the capability to identify and learn
Artiicial Life (ALife) patterns from different situations as well as to predict
1: The synthetic or virtual approach to the study of life- new situations. (Hentea, 2005b) 8: A nonlinear predictive
like patterns (forms), behaviors, systems, and organisms, model that learns through training and resembles biological
independently of the matter used for synthesis. (de Castro, neural networks in structure. (Hamdi, 2005a) 9: Type of
2005) 2: The reproduction in digital models of certain machine learning paradigm that simulates the densely
aspects of organic life, particularly the ability of evolving interconnected, parallel structure of the mammalian brain.
adaptation through mutations that provide a better it to ANNs have been shown to be powerful tools for function
the environment. In information sciences, artiicial life approximation. (Wen, Hong, et al., 2005)
is not concerned with the physico-chemical recreation of
life. (Duchastel, 2006) Artiicially Intelligent Systems
Information systems that help users manage data and
Artiicial Neural Network (ANN) models by delivering virtual expertise and other forms of
1: A network of nodes modeled after a neuron or neural artiicial intelligence in support of these tasks. (Forgionne,
circuit. The neural network mimics the processing of the 2005)
human brain. (Garrity et al., 2005) 2: Commonly referred to
as neural network or neural net, a computer architecture AS: See Autonomous System.
implemented in either hardware or software, modeled
after biological neural networks. Nodes are connected in a ASAP System
manner suggestive of connections between the biological The abbreviation of a synchronous approach for photo
neurons they represent. The resulting network learns sharing across devices to facilitate photo viewing across
through directed trial and error. Most neural networks multiple devices, which can simultaneously present
have some sort of training algorithm to adjust the similar photos across multiple devices at the same time for
weights of connections between nodes on the basis of comparative viewing or searching. (Hua et al., 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
ASCI I Asse ssm e nt 31

ASCII: See American Standard Code for Information beneits so they dedicate their efforts to the project. (Sipior,
Interchange. 2005) 3: Expression in a relational database system that
allows stating a condition involving several attributes and
A
ASEAN several tables. Assertions are irst-class database entities,
Association of Southeast Asian Countries. (Sanzogni & such as tables. (Badia, 2005b)
Arthur-Gray, 2005)
Assertion Between Knowledge Patterns
ASF: See Adaptive Synchronization Framework. A particular interschema property. It indicates either
a subsumption or an equivalence between knowledge
Asia Paciic Development Information Program patterns. Roughly speaking, knowledge patterns can be
(APDIP) seen as views on involved information sources. (De Meo,
The regional ICT program of UNDP. (Hutchinson, Terracina, et al., 2005)
2005)
Assertion of Copyright
Asia-Paciic Telecommunity Retention of the protection right of copyright by an
A 32-member body established in 1979 through joint individual, and hence the ability to collect any royalties
initiatives of the United Nations Economic and Social that may be apportioned. (Fleming, 2005b)
Commission for Asia & the Paciic and the International
Telecommunication Union. Members of the APT include Assertional Reasoning
governments, telecom service providers, manufactures of A description logic knowledge base is made up of two parts,
communication equipment, and research and development a terminological part (the terminology or Tbox) and an
organizations. (Hassall, 2005) assertional part (the Abox), each part consisting of a set of
axioms. The AbBox contains extensional knowledge that
ASP: See Application Service Provider; Active Server is speciic to the individuals of the domain of discourse.
Page Scripting. There has been a great deal of work on the development
of reasoning algorithms for expressive DLs, but in most
ASP Aggregator cases these only consider Tbox reasoning. Reasoning
The ASP aggregator model is based on the premise that mechanisms for the Abox (i.e., instance checking) are
the rapid proliferation of irms offering ASP services called assertional reasoning. Assertional reasoning is
has created an overly complex market for medium-sized important for real Semantic Web applications. (Roldn-
enterprises to deal with when investigating application Garca et al., 2005)
outsourcing options. (Guah & Currie, 2005)
Assessment
Aspect 1: A process by which learning is measured, often through
Deines a set of related node properties, attributable to content-related assignments such as papers, projects, or
nodes with the same value for an aspect descriptor. For a tests. (Hawkins & Baker, 2005) 2: A process of assisting an
given node, aspects can be added and removed at runtime individual with a disability in the selection of appropriate
by manipulating the values for its aspect descriptors. assistive technology devices and/or conigurations of
(Lemahieu, 2005) standard information technology devices. (Trewin &
Keates, 2006) 3: Determining how much someone has
Aspect Descriptor learned or how well someone understands a particular
Attribute for which each possible value deines an aspect subject. (Bieber et al., 2005) 4: Process by which learning
of a node. (Lemahieu, 2005) gains or performance chance are measured and labelled
according to a consistent scoring criterion. (Collis &
Assertion Moonen, 2005a) 5: Systematic evaluation of student work
1: A statement (entity deinition, attribute value, constraint, and learning based on scoring criteria and leading to a mark
rule, function, and the like) assumed to be true and therefore or grade. (Collis & Moonen, 2005b) 6: The evaluation of
supporting the theory of the ontology. Example: Gravity the amount, value, quality, or importance of something.
is an attracting force in nature. (Buchholz, 2006) 2: (Kung-Ming, 2005) 7: The process of comparing the
Authoritatively convincing others of a projects potential actual measurements of the characteristics of interest with

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
32 Asse ssm e nt of Le a r ning Out c om e s Assoc iat ion Ana lysis

the speciications of those characteristics. (Leung, 2005) Assistive Technology


8: The process of gathering, describing, or quantifying 1: A set of solutions, both hardware and software, aimed
A information about performance. (Brace & Berge, 2006) at supporting people with disabilities in interacting with
digital content. (Costagliola, Di Martino, Ferrucci, &
Assessment of Learning Outcomes Gravino, 2006) 2: Examples of assistive technology
The process of examining the achievement of intended include wheelchairs, hand controls for automobiles,
learning outcomes by students. (Naidu, 2005a) prostheses, communication aids, hand splints, hearing
aids, and alternatives to computer keyboards (also
Assessment Tools called Technology-Related Assistance). (Burgstahler,
Methods used to obtain information about student learning 2005b) 3: Any item, piece of equipment, or system that
to guide a variety of educational strategies and decisions. is commonly used to increase, maintain, or improve
(Beck & Schornack, 2005) functional capabilities of individuals with disabilities.
Examples include screen readers, teletypewriters (TTYs),
Asset Creator and Braille keyboards. (Bursa, Justice, & Kessler, 2005)
Anyone who creates an asset, which could be in any 4: Products, devices, or equipment, whether acquired
digital format, and provides the asset and its associated commercially, modiied, or customized, that are used to
information to the asset manager. (Subramanian, 2005) maintain, increase, or improve the functional capabilities
of individuals with disabilities. (Keates et al., 2006) 5:
Asset Manager Specialized software or hardware, such as screen readers,
The asset manager converts the information associated magniication software, and a modiied keyboard, used by
with the asset into an XML metadata format, builds some people with disabilities to interact with the computer.
the appropriate data type deinitions, and passes the (Schmetzke, 2005) 6: Technologies designed to support
information and the asset to the metadata manager. disabled individuals in the conduct of their daily tasks.
(Subramanian, 2005) (Roldan, 2005)

Assignment Association
A repartition in which we allocate the available resources 1: A relationship between two statistical variables. Unlike
to achieve the different tasks. (Kacem, 2005) a correlation, an association does not yield a quantitative
result, but is contingent upon the ranking of the bivariate
Assisted Global Positioning System (A-GPS) data values only. (Mullany, 2005) 2: A technique in data
1. A variation of the global positioning system (GPS) in mining that attempts to identify similarities across a set
which the mobile network or a third-party service provider of records, such as purchases that occur together across a
assists the mobile handset in determining its geographical number of transactions. (Amaravadi, 2005) 3: The degree
position (either by directing it to look for speciic satellites to which participation in global communication confers
or by collecting data from the handset to perform location on participants some of the prestige associated with more
identiication calculations that the handset itself may glamorous lifestyles. (Pryor, 2005)
be unable to perform due to limited processing power).
(Giaglis, 2005) 2: A system that uses measurements from Association (Undirected Association Rule)
ixed GPS receivers scattered throughout the mobile A subtuple of a bag relation whose support is greater than
network in order to assist a mobile phone in locating the a given threshold. (T. Y. Lin, 2005)
available satellites and calculating its location. (Ververidis
& Polyzos, 2006) Association Analysis
Use of statistics criteria to measure the proximity of two
Assistive and Augmentative Communication distinct objects or texts using some of their properties
A multidisciplinary ield that seeks to design devices and or attributes. A method for identifying correlation
methods to alleviate the problems faced by physically or dependencies among elements or attributes, using
challenged people running programs they do not know statistical techniques. (Antonio do Prado et al., 2005)
and/or trust. (Abhishek & Basu, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Assoc iat ion of Re se a rch Libra rie s (ARL) Assoc iat o
i n Rule Disc ove r y 33

Association of Research Libraries (ARL) likely to satisfy the conditions of Y. (Chung & Mangamuri,
An organization that unites the 123 leading research 2005) 14: The implication of connections for variables
libraries in North America. (McCarthy, 2005b) that are explored in databases, having a form of AB,
A
where A and B are disjoint subsets of a dataset of binary
Association Rule attributes. (Wu & Lee, 2005) 15: An implication of the form
1: A kind of rule in the form X Ij, where X is a set of A B, where A and B are database itemsets. Association
some items and Ij is a single item not in X. (Wong & Fu, rules must satisfy the pre-set minimum support (minsup)
2005) 2: A pair of frequent itemsets (A, B), where the ratio and minimum conidence (minconf) constraints. (Daly
between the support of AB and A itemsets is greater than & Taniar, 2005a) 16: An implication rule between two
a predeined threshold, denoted minconf. (Dumitriu, 2005) itemsets with statistical measures of range (support) and
3: A relation between the occurrences of a set of items precision (conidence). (Pasquier, 2005) 17: An implication
with another set of items in a large data set. (Jha & Sural, rule that brings out hidden relationships among attributes
2005) 4: A rule in the form of if this, then that. It states on the basis of co-occurrence of attributes. In the market-
a statistical correlation between the occurrence of certain basket context, it informs about items that are likely to
attributes in a database. (Huang, 2005) 5: A rule of the be purchased together, thereby providing an insight into
form AB, meaning if the set of items A is present in a customer purchasing behavior. Formally, an association
transaction, the set of items B is likely to be present too. rule is an implication of the form A B, where A and B
A typical example constitutes associations between items can be single items or sets of items, with no commonality
purchased at a supermarket. (Denton & Besemann, 2005) between sets A and B, e.g., {Bread} {Butter}, {Bread,
6: A rule relating two itemsetsthe antecedent and the Jam} {Butter}, and so forth. An association rule is
consequent. The rule indicates that the presence of the characterized by two measures, support (a statement
antecedent implies that the consequent is more probable of generality) and conidence (a statement of predictive
in the data. Written as (Butler & Webb, 2005) 7: A rule ability). These rules are very general, having a simple
showing the association between two or more nominal interpretation with minimal restrictions on their structure.
attributes. Associations can be directed or undirected. For {Bread} {Butter} with support =20% and conidence =
instance, a rule of the form, If the customer buys French 60% means that 60% of the transactions that contain Bread
fries and hamburgers she or he buys ketchup, is a directed also contain Butter, and they are purchased together in 20%
association rule. The techniques for learning association of the transactions. (Natarajan & Shekar, 2006) 18: Let
rules are speciic, and many of them, such as the Apriori X1, .., Xp be a collection of random variables. In general, a
Algorithm, are based on the idea of inding frequent item pattern for such variables identiies a subset of all possible
sets in the data. (Hernandez-Orallo, 2005b) 8: A statement observations over them. A rule is a logical statement
A => B, which states that if A is true, then we can expect between two patterns, say a and b, written as ab. (Giudici
B to be true with a certain degree of conidence. A and & Cerchiello, 2005) 19: Predicts the occurrence of an event
B are sets of items, and the operator is interpreted as based on the occurrences of another event. (Yeo, 2005) 20:
implies. (Ale & Rossi, 2005) 9: An association between Uncovering interesting trends, patterns, and rules in large
two sets of items co-occurring frequently in groups of data. data sets with support s and conidence c. (Swierzowicz,
(Meo & Psaila, 2005) 10: An association has the form 2005) 21: Used to associate items in a database sharing
I1I2, where I1 and I2 are two itemsets. The support of an some relationship (e.g., co-purchase information). Often
association rule is the support of the itemset I1I2, and the takes the form if this, then that, such as, If the customer
conidence of a rule is the ratio of support of I1I2 and the buys a handheld videogame, then the customer is likely
support of I1. (Zhou & Wang, 2005) 11: An implication to purchase batteries. (Schafer, 2005)
rule XY that shows the conditions of co-occurrence of
disjoint itemsets (attribute value sets) X and Y in a given Association Rule Discovery
database. (Shen, 2005) 12: Given a set I = { i1, i2, i3, in} 1: A rule in the form of if this, then that which associates
of items, any subset of I is called an itemset. Let X and Y events in a database. Association rule discovery can be
be subsets of I such that XY = . An association rule is used to ind unordered correlations between items found
a probabilistic implication X Y. (Imberman & Tansel, in a set of database transactions, such as the association
2006) 13: Implication of the form X Y, meaning that between purchased items at a department (Hu, Yang, Lee,
database tuples satisfying the conditions of X are also

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
34 Assoc iat ion Rule M ining Asynchronous

et al., 2005) 2: Implication of the form X Y, where X Asymmetric DSL (ADSL)


and Y are sets of items; implies that if the condition X is A DSL technology that allows the use of a copper line to
A veriied, the prediction Y is valid. (Jourdan et al., 2005) send a large quantity of data from the network to the end
user (downstream data rates up to 8 Mbit/s), and a small
Association Rule Mining quantity of data from the end user to the network (upstream
1: The process of examining the data for if this then data rates up to 1 Mbit/s). It can be used for fast Internet
that rules is called association rule mining. (Ramasamy applications and video-on-demand. (Chochliouros,
& Deshpande, 2005) 2: The data-mining task of inding Spiliopoulou-Chochliourou, & Lalopoulos, 2005c)
all association rules existing in a database, having support
and conidence greater than a minimum support value and Asymmetric Threat
a minimum conidence value. (Ale & Rossi, 2005) 3: The An adversarial situation characterized by the inequality in
process of inding interesting association or correlation resources between the contenders, which usually results
relationships among a large set of data items. (Perrizo, in one of them resorting to covert and terrorist activities
Ding, Ding, et al., 2005) to continue the conlict. (Badia, 2006)

Assurance Asymmetry
Statement, indication, or presumption that inspires Used in IT to mean that parties are heterogeneous and
conidence while excluding doubt. Assurance is an aspect possess diverse knowledge bases. Asymmetry manifests
of trust. Given the fact that trust cannot be quantiied also in corporate culture and management. (Blomqvist,
precisely, assurance provides a basis for quantitatively or 2005)
qualitatively specifying the level of trust towards a system.
(Oermann & Dittmann, 2006) Asynchronous
1: A form of online discussion among students, workers,
Assured Forwarding (AF) or instructors. Participants post comments, opinions,
A per-hop behavior deined in DiffServ. AF provides relections, or questions to a type of online discussion
different levels of forwarding assurances depending on board. Participants can read and respond to others
available resources, the current number of lows in that postings. Participants can access or post at any time.
AF class, and the drop precedence associated with the IP (Iannarelli, 2005) 2: Communication between parties in
datagram. (DaSilva, 2005) which the interaction does not take place simultaneously.
(Danenberg & Chen, 2005) 3: Communication occurring
Ast: See Attitude Toward the Site. via a time delay, such as posts to an electronic bulletin
board. (Hawkins & Baker, 2005) 4: Communication that
ASTD: See American Societ y for Training & allows for the sharing of ideas over a period of time, such
Development. as through discussion boards, e-mail, or a newsroom. (Etter
& Byrnes, 2005) 5: Communications between the student
Asymmetric Communication and teacher which do not take place simultaneously. (T.
A process in which both communicating parties are at Cavanaugh, 2005) 6: Denotes a communication method
different levels of economic and social development. which participants use to interact in a time-delayed context,
(Targowski & Metwalli, 2005) that is, without everyone gathering at a particular time.
(Al-Saggaf & Weckert, 2005) 7: Occurring at different
Asymmetric Cryptography times. In the context of communications technologies,
A data encryption system that uses two separate but asynchronous technologies allow communicators to
related encryption keys. The private key is known only to interact with the conversation at different timesfor
its owner, while the public key is made available in a key example, e-mail or threaded discussions. (Newberry,
repository or as part of a digital certiicate. Asymmetric 2005) 8: Occurring at different times; typically used to
cryptography is the basis of digital signature systems. refer to technologies such as a discussion board or e-mail
(Richter & Roth, 2006) that may be utilized at the users convenience. (Ordonez,
2005) 9: Online, asynchronous refers to communication
Asymmetric Digital Subscriber Line (ADSL): See that occurs at different times. Common examples of
Digital Subscriber Line. asynchronous communications are e-mail, ListProc

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Asynchronous Colla borat ion Asynchronous Com put e r-Me diat e d Com m unic at ion 35

(listerserv), or the WebCT discussions tool. (Paoletti, often taking place in geographically dispersed locations
2005) 10: Out of synchronicity. Conversations with time and time zones. (Wong-MingJi, 2005) 10: Information
lags, as in e-mail. (Coakes, 2006b) 11: Refers to the ability sharing and interaction between individuals taking place at
A
of learners to complete required tasks at different times. different times, as in the sending of e-mails where messages
Discussion tools (i.e., bulletin boards) are examples of are sent and then read at a later time. (Ally, 2005d) 11:
asynchronous tools used in the Web-based environment. The sharing of messages with delayed feedback. (Han &
(Morphew, 2005) 12: The 24-hour classroom discussion Hill, 2006) 12: When participants decide when to retrieve
is always open; plenty of time for relection, analysis, and and respond to others in the online environment through
composition; encourages thinking, retrospective analysis; tools such as discussion boards and e-mail. (S.-K. Wang,
the whole transcript discussion is there for review; class 2005) 13: Communications that occur between two or
discussion is open ended, not limited to the end of a period. more people in which the method of communication of
(Nandavadekar, 2005) 13: Time-delayed interaction that one or more individuals does not occur at the same time
does not require participants to be online simultaneously; as the others involved (Day, 2005) 14: When messages
individuals send or post messages, and the recipients read are exchanged during different time intervals (Burke et
them at a later time. (Woods & Baker, 2005) al., 2005)

Asynchronous Collaboration Asynchronous Communication Channels


Collaborative interactions, for example, over the Internet Communication channels that support communication
that are not synchronized in real time such as e-mail that usually requires a period of time to pass between
exchanges, browser-based shared editing (wikis), and communicative transactions. These channels include
postings to newsgroups. (Carroll et al., 2005) e-mail, discussion boards, fax, and so forth. (Pauleen,
2005)
Asynchronous Communication
1: A delayed time communication, typically in text format, Asynchronous Communication Opportunity
between the learner and instructor or among learners. The provision of the choice between immediate interaction
(Gold, 2005) 2: An electronically transmitted exchange and asynchronous interaction in terms of the timing of
of ideas that allows participation to occur at discontinuous interaction engagement (e.g., response) without physical
points in time. (Baugher et al., 2005) 3: Communication constraints such as geographical distance and physical
between parties that does not require the parties to be time to deliver the information (e.g., such constraints in
available for communication all at the same time. (Lam conventional mailing system). (Kang et al., 2006)
et al., 2006) 4: Communication that does not occur in real
time. There can be a delay between sending information Asynchronous Communication Tool
and retrieving it. Responses to messages may be delayed, 1: Communication does not occur in real time.
with each message waiting until the recipient is ready to Communication can be received any time. E-mail is an
read and/or reply. Asynchronous communication utilizes example of an asynchronous tool, as an electronic mail
such tools as e-mail and discussion groups. (Erlich, message waits for the recipient to open it. (Schoenfeld &
2005) 5: Communication that does not occur in real Berge, 2005) 2: A tool that facilitates communication at
time (e.g., e-mail, letters, and telegrams). (Dell, 2005) 6: different times. The best example is postal mail (or snail
Communication that does not require both the sender and mail). The receiver can read the message at any time he/she
receiver to be present/logged in at the same time. Common wants. (Karoulis & Pombortsis, 2005b)
asynchronous forms of computer-mediated communication
are e-mail and newsgroups. (Roberts, Smith, & Pollock, Asynchronous Computer-Mediated
2006b) 7: Communication where the message is not sent Communication
and received simultaneously (e.g., e-mail, discussion A set of techniques allowing participants to contribute
forums, listservs). (Stodel et al., 2005) 8: Computer-based from different locations and, more importantly, at different
communication tool in which interaction between parties times. Tools available include e-mail, listservs, and
does not take place simultaneously. (Ketelhut et al., 2005) 9: discussion groups. (Salter, 2005a)
Information exchanges sent and received at different times,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
36 Asynchronous Coope rat ion Asynchronous Le a r ning

Asynchronous Cooperation mail, and video programming, and the implicit absence of
Members are not present in the same time within the immediate interaction with the teacher or other students.
A cooperation group (no co-presence). They communicate (C. Wright, 2005)
with asynchronous media (e.g., e-mail messages) on top
of extended and improved message systems. (Villemur Asynchronous Distance Learning
& Drira, 2006) The mode of distance learning where provider and recipient
are communicating off-linethat is, leaving messages for
Asynchronous Delivery Mode each other or viewing each others pre-recordings while
Material to be delivered is made available by the instructor geographically apart. (Kostopoulos, 2005)
through technology, and students are able to access the
material based upon their own schedules. (Hunter & Asynchronous Group Communication
Carr, 2005) Technology
Allows participants to send and respond to messages
Asynchronous Digital Subscriber Line (ADSL) without being online simultaneously. (Alavi et al., 2005)
A digital switched technology that provides very high data
transmission speeds over telephone system wires. The Asynchronous Instructional Dyad
speed of the transmission is asynchronous, meaning that Material placed on electronic media for access by students
the transmission speeds for uploading and downloading as needed; an example is a detailed instruction sheet that
data are different. For example, upstream transmissions supplements explanations given during regular class
may vary from 16 Kbps to 640 Kbps, and downstream sessions. (Lerch et al., 2005)
rates may vary from 1.5Mbps to 9Mbps. Within a given
implementation, the upstream and downstream speeds Asynchronous Interaction
remain constant. (Raisinghani & Ghanem, 2005) 1: Communication that takes place over a network at
different times. Examples of asynchronous interaction
Asynchronous Discussion include communication via group support systems, e-
1: Discussion that occurs irrespective of time and location. mail, and electronic bulletin boards. The opposite of
Asynchronous discussion allows readers (e.g., from asynchronous interaction is synchronous interaction,
different time zones and/or at different times) to create which occurs when participants interact over a network
and respond to learners who are typically not online simultaneously (i.e., in real time). (Klein, 2005) 2:
at the same time. (Bedard-Voorhees, 2005) 2: Online Interactions that do not take place simultaneously for the
discussions that occur independent of time and space. involved participants (e.g., email communication). (Taylor
Participants do not have to be online simultaneously, and et al., 2005)
can read and contribute to the conversation on their own
schedules. (Ingram, 2005) 3: The exchange of information Asynchronous Learning
that occurs over a period of time. This discussion method 1: A type of learning that is both time and location
allows for relection and considered opinions. (Ingram & independent; the learner can be located anywhere and
Hathorn, 2005b) contribute anytime. Also called delayed learning as
opposed to real-time learning. (Bonk et al., 2005) 2:
Asynchronous Discussion Forum Learners use a computer and communications technologies
This is at the heart of many computer-based courses. It is the to work with remote learning resources, without the
place where student-student and student-faculty interaction requirement to be online at the same time or in the same
occurs and learning takes place. The participants in the location. Participation in online discussion boards is an
discussion need not be present in the learning environment example of asynchronous learning. (Chapman, 2005a) 3:
at the same time, and they make contributions to selected Learning in which interaction between instructors and
threads as needed. (Shaw, 2005) students occurs intermittently with a time delay. Examples
are self-paced courses taken via the Internet or CD-ROM,
Asynchronous Distance Delivery Q&A mentoring, online discussion groups, and e-mail.
An anytime, anywhere experience where all participants (Torres-Coronas, 2005) 4: Learning that occurs at the place
work independently at times convenient to them and that and time of the students choosing, not the instructors.
includes methods such as online discussion boards, e-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Asynchronous Le a r ning N e t w ork (ALN ) At om a 37

(Novitzki, 2005) 5: Online courses that allow students Technology that does not require real-time, simultaneous
to participate at anytime from any location with Internet participation, and that does not support anytime, anyplace
access. (Lazarus, 2005b) communication. (Wild, 2005)
A
Asynchronous Learning Network (ALN) Asynchronous Transfer Mode (ATM)
1: Technology-enabled networks for communications and 1: A high-speed transmission protocol in which data blocks
learning communities. (Moore et al., 2005) 2: Anytime, are broken into cells that are transmitted individually
anywhere education using computer and communication and possibly via different routes in a manner similar to
technologies without the requirement for learners to packet-switching technology. (Raisinghani & Ghanem,
be online at the same time. (Rovai & Gallien, 2006) 2005) 2: A network technology based on transferring
3: Communication between people that does not occur data in cells or packets of a ixed size. The small, constant
simultaneously. (Brown, 2006) cell size allows ATM equipment to transmit video, audio,
and computer data over the same network, and assure
Asynchronous Learning Tool that no single type of data hogs the line. (Wong, 2006)
Software package designed to support education at any 3: A high-speed, low-delay, multiplexing and switching
location and at any time. (Novitzki, 2005) technology that allows voice, image, data, and video
to be transmitted simultaneously rather than through
Asynchronous Media trafic-speciic networks. (Hin & Subramaniam, 2005c)
Delayed delivery of media (e.g., video, e-mail). (Whateley 4: A transmission technique that transmits combined
et al., 2005) information in small, ixed-size packets called ATM cells.
(Louvros, Karaboulas, et al., 2005)
Asynchronous Mode
A non-real-time education where students and teachers Asynchrony
interact with each other, but not at same time, e.g., by A condition whereby events occur that are not coordinated
using a bulletin board or e-mail. (Lammintakanen & in time. In online education, asynchrony makes it possible
Rissanen, 2005a) to perform course tasks at the most convenient time, not
tied to a schedule. (Rollier & Niederman, 2005)
Asynchronous Online Distance Education
Courses that use software that contains course content ATAP: See Any Time, Any Place Learning.
and pedagogy that allow students to participate when and
where they want. (Novitzki, 2005) ATC: See Air Trafic Control.

Asynchronous Replication Ateleology


Lazy replicationthat is, all updates of a transaction (if In the context of IS development, refers to the development
any) are transmitted to passive replicas once the transaction of an IS which does not aim at the attainment of a speciic
is committed, but never ahead of commit time. (Muoz- set of goals only, expressed in the form of user requirements
Esco et al., 2005) as they have been articulated at a speciic point of time, but
rather refers to developing an IS that addresses a range of
Asynchronous System issues within a speciic problem domain and, at the same
Allows students to participate at a time and place convenient time, is lexible enough to accommodate changes and
to them. In an asynchronous system, interaction between extensions of the IS behavior while it is being operated.
the student and the faculty takes place intermittently (Stamoulis et al., 2005)
through e-mail, HTML (Hypertext Markup Language)
content, and/or news or discussion groups. The interaction ATM: See Asynchronous Transfer Mode; Automatic
does not require participation at the same time. (Sivakumar, Teller Machine System.
2006)
Atoma
Asynchronous Technology The most abstract level of representation of a real-world
1: Technology that creates a delay in communication, such entity, encompassing only the most basic data and
as e-mail or a discussion board. (Wei & Wang, 2006) 2:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
38 At om ic Broa dc a st At t it ude Tow a rd t he Sit e (Ast )

functionality for representing and manipulating the entity. with the attention-related constructs are what we presume
(Lepouras et al., 2006) to be detecting in dual-task studies. (Owen, 2006c)
A
Atomic Broadcast Attention Object
Requires that each correct process deliver all messages An information carrier that delivers the authors intention
in the same orderthat is, a reliable broadcast with total and catches part of the users attention as a whole. An
order. (Muoz-Esco et al., 2005) attention object often represents a semantic object, such
as a human face, a lower, a mobile car, a text sentence,
Atomic Transaction and so forth. (Hua et al., 2006)
A transaction whose updates are either all executed or
removed (the A in the ACID properties). The atomicity Attention-Based IT Infrastructure
property makes it easier to complete database recovery. An IT infrastructure that is able to sort through volumes
(Frank, 2005b) of data and produce the right information at the right
time for the right persons to consume. (Chen, Zhang, et
At-Risk Learners al., 2005b)
Typically individuals who struggle with the structure
and/or content of formal education. (Crichton, 2005) Attention-Deicit Principle
Recognizes that organizations have limited attention
Attachment capacity, and attention should be treated as a resource that
An extra ile, in any ile format, that is linked to a e-mail needs to be managed. (Yaniv & Schwartz, 2006)
message. The e-mail message itself must structurally
conform to messaging protocols. (Horiuchi, 2005b) Attentional Capacity
Cognitive capacity divided and allocated to perform
Attacks cognitive task. (Seta, 2006)
Any processing that circumvents the intended purpose of
the watermarking technique for a given application. An Attentive User Interfaces
attack potentially breaks the robustness of the watermark. AUIs are based on the idea that modeling the deployment of
(Sattar & Yu, 2006) user attention and task preferences is the key for minimizing
the disruptive effects of interruptions. By monitoring the
Attack Signature users physical proximity, body orientation, eye ixations,
Patterns observed in previously known attacks that are and the like, AUIs can determine what device, person,
used to distinguish malicious packets from normal trafic. or task the user is attending to. Knowing the focus of
(Syed, Nur, et al., 2005) attention makes it possible in some situations to avoid
interrupting the users in tasks that are more important
Attack vs. Intrusion or time-critical than the interrupting one. (Oulasvirta &
A subtle difference, intrusions are the attacks that succeed. Salovaara, 2006)
Therefore, the term attack represents both successful and
attempted intrusions. (Kayacik et al., 2005) Attenuation
Loss of signal strength and power as a signal passes through
Attention the optical iber medium. (Littman, 2006)
1: An internal cognitive process by which one actively
selects which part of the environmental information Attitude Toward the Ad (Aad)
surrounds them and focuses on that part or maintains A mediator of advertising response that inluences brand
interest while ignoring distractions. (Alkhalifa, 2006) attitude and purchase intentions. (Gao et al., 2006)
2: Mental processing that consumes our conscious
thinking. Through a variety of mechanisms, there is a Attitude Toward the Site (Ast)
limit to the amount of processing that can take place in our A Web users predisposition to respond either favorably or
consciousness. (Owen, 2006b) 3: Associated with a variety unfavorably to a Web site in a natural exposure situation.
of more speciic constructs such as mental effort, mental (Gao, 2005b)
focus, mental elaboration, and such. Processes associated

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
At t ribut e Audio Brow se r 39

Attribute learners or students engaged in some course of study.


1: A substantial feature of a whole that is perceived by an (Adkins & Nitsch, 2005)
observer with the potential to produce or cause a product or
A
effect. (Gelman et al., 2005) 2: A property of an object/class. Auction
The class Car, for example, can have an attribute Color, its A type of market in which sellers post an initial price for
value for the object MyCar: Car might be blue. (Rittgen, the item being offered and a deadline by which the item
2005) 3: Column of a dataset. (Gehrke, 2005) 4: Pieces of needs to be sold. Buyers make bids on the offered item. The
information contained in a GIS database that describe or auction mechanism determines the dynamics of the prices
detail a spatially referenced element. (Crossland, 2005) bid by the buyers, the winner-determination strategy, and
the bid-disclosure strategy. Common auction mechanisms
Attribute Dependency include the English auction, Dutch auction, and Vickrey
Introduces when it falls within a dimension caused by auction. (Dasgupta et al., 2006)
attribute hierarchies. (Tan, 2005a)
Auction-Based Market
Attribute Discretization A form of centralized facility or clearinghouse by which
The process of converting a (continuous) attribute value consumers and suppliers execute trades in an open and
range to a set of discrete intervals and representing all competitive bidding process. (Ghenniwa & Huhns,
the values in each interval with a single (interval) label. 2005)
(Shen & Horiguchi, 2005)
Audience Class
Attribute Fuzziication Group of target visitors of a Web site with the same
A process that converts numeric attribute values into requirements. (De Troyer, 2005)
membership values of fuzzy sets. (Shen & Horiguchi,
2005) Audience Response System (ARS)
An electronic system designed to support and enhance
Attribute Realism face-to-face group interaction by means of individual
An ontological position that the properties of entities exist handheld communication devices. (Banks, 2005)
in the world independent of their being perceived by the
modeler. (Artz, 2005c) Audience Track
Part of a Web site that provides information and services
Attribute-Tolerant Transactions speciically tailored to an audience class. (De Troyer,
These transactions can be permitted to be locally relaxed 2005)
in terms of certain constraints on attributes, but globally
consistent eventually. (Murthy & Krishnamurthy, Audience-Driven Web Design
2005c) The different audiences and their requirements are taken
as the starting point for the design of the Web site. The
Attributed Graph information and services in the Web site are organized
A graph whose vertices and edges have attributes typically around the different audience classes. (De Troyer, 2005)
deined by vectors and matrices, respectively. (Caelli,
2005) Audio Browser
Also referred to as talking browser. Software that
Attribution interprets the HTML code of Web pages and provides
Source code published under this license may be used speech output for text-based components, along with
freely, provided that the original author is attributed. information provided by the HTML markup tags. Typically,
(Fleming, 2005b) it also enables users to navigate the Web page through
alternative keystrokes. (Schmetzke, 2005)
Attrition
The falling off or stoppage of coursework and degree
progression that results in a decrease in the number of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
40 Audio File Aut he nt ic at ion

Audio File Audit


A computer file that contains audio instruction or The review and monitor of the performance of a system.
A explanation. It might also contain graphic images that (Sarkis & Sundarraj, 2005)
correlate with the audio. (Cooper, 2005)
Audit Analysis
Audio Memo The review of the Internal Audit data to determine what
A recorded audio message of speech. Speech is digitally material can be easily re-purposed, as well as the possible
recorded via a built-in or attached microphone and stored market potential for those materials. (Robinson, 2005)
as a digital audio ile on the storage media of the PDA.
(Garrett, 2006b) Auditing
A systematic process of objectively obtaining and
Audio Packet evaluating evidence of assertions about economic actions
Packet encoding an audio sample in digital form. Each audio and events to ascertain the correspondence between those
packet has a timestamp and a sequence number as additional assertions and established criteria, and to communicate
information. Timestamps are used to measure the end-to- the results to interested parties. (Garrity et al., 2005)
end delay (jitter) experienced during the communication,
and sequence numbers are used to detect packet losses. Auditory Icon
Typically, during an audio communication, audio packets Icons that use everyday sounds to represent application
are transmitted over the network, received in a playout objects or activities. (Lumsden, 2005)
buffer, decoded in sequential order, and inally, played out
by the audio device. (Roccetti & Ferretti, 2005) Augmented Reality
Intermixing a physical reality and a virtual reality.
Audio Sample (Terashima, 2005)
The amplitude of a waveform is measured (sampled) at
regular time intervals and converted into an integer value. AUP: See Acceptable Use Policy.
Each of these instantaneous measurements is an audio
sample. (Roccetti & Ferretti, 2005) Authentic Activities
Activities that relect the ways in which knowledge and
Audiographic Communication skills are used in real-world practice. These are usually
A multimedia approach with simultaneous resources for simpliied in a formal learning environment rather than
listening, viewing, and interacting with materials. (C. being identical to the activities a practitioner might perform.
Wright, 2005) (Bennett, 2005)

Audiographic Teleconferencing Authentic Learning


Voice communication supplemented with the transmission Learning that uses real-world problems and projects, and
of still images. (Lateh & Raman, 2005) that allows students to explore and discuss these problems
in ways that are relevant to them. (Bieber et al., 2005)
Audio-Lingual Method
The method of studying a foreign language that stresses Authentication
hearing the language spoken by native speakers, and then 1: A signaling procedure in cellular networks to identify the
imitating the patterns of pronunciation and grammar heard subscribers when access to certain services are demanded.
in the example. (Switala, 2005) (Louvros et al., 2006) 2: Determines a users identity, as
well as determining what a user is authorized to access.
Audioteleconferencing (Medlin et al., 2006) 3: Guarantees that an individual or
Voice-only communication via ordinary phone lines. organization involved in a transaction is who they say
Audio systems include telephone conference calls, as they are. (Lowry, Stephens, et al., 2005) 4: The process
well as more sophisticated systems that connect multiple by which a system can provably verify the identity of a
locations. (C. Wright, 2005) resource such as an individual, a system, an application, and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Aut he nt ic at ion Syst e m Aut horing Tool 41

so on. (Mundy & Otenko, 2005) 5: Method of assuring the as opposed to passive reception. This is the only way in
identities of entities engaged in electronic communication. which an individual can relate incoming information to
(Calzonetti & deChambeau, 2006) 6: A set of procedures the context of his or her own lifeworld, without which
A
employed to verify the identity of an entity. (Buche & meaning does not exist for that person. We often sense
Vician, 2005) 7: Technique by which a process veriies that the lack of authenticity in interaction without necessarily
its communication partner is who it is supposed to be and understanding our own misgivings. (Kettley, 2006b) 3:
is not an imposter. It makes sure that the parties engaging Undisputed credibility of being genuine, honest with
in business are who they claim to be. Integrity allows the oneself as well as others; an absence of hypocrisy or self-
system to verify whether modiications have occurred; it deception. (Park, 2006)
does not ensure that information was not altered. (Pierre,
2006b) 8: The action of verifying information such as Author
identity, ownership, or authorization. (Vatsa et al., 2005) 9: Much of the philosophy extended in analyses of technology
The process by which a contemporary biometric sample is stems from literary theory. Author has connotations
acquired from an individual and is used to compare against synonymous with artist and designer, and may be useful
a historically enrolled sample. If the samples match, the in future discussions regarding terminology across more
user is authenticated. Depending on the type of system, or less user-centered processes. (Kettley, 2006a)
the authentication may be prompted by some additional
informationa key to the identity of the user or the Author Cocitation Analysis
pseudonym against which the enrolled data was registered. The analysis of how authors are cited together. (Chen &
(Fleming, 2005a) 10: The process of determining whether Liu, 2005)
someone or something is who or what they declare to be.
In private or public computer networks, authentication is Authoring
commonly done through the use of logon passwords or The creation and organization of multimedia or hypermedia
digital certiicates. (Butcher-Powell, 2005) 11: The process content. (Lemahieu, 2005)
of ensuring that an individual is who he or she claims to be.
(Guan, 2006h) 12: Veriication that one is who they say they Authoring Language
are. (Lawson-Body et al., 2005) 13: Biometric identiiers A program designed for use by a non-computer expert
operate either in veriication (authentication) mode or in to create e-learning products. An authoring system does
a recognition (identiication) mode. A veriication system not require programming knowledge to operate. It allows
authenticates a persons identity by comparing the captured the placement of graphics, text, and other multimedia
biometric characteristic with the persons own biometric elements into an e-learning program. It functions like
original. In a recognition system, the system establishes word processing software. (Kapp, 2005)
a subjects identity by searching the entire template for a
match, without the subject initially claiming an identity. Authoring Program
(Scott et al., 2006) Software used to develop multimedia applications. (Berg,
2005e)
Authentication System
System used to verify the identity of an entity (user, Authoring Shell
application, host, system, device) that is attempting to Internet-based template that consists of various electronic
participate in a computing environment. (Knight & tools and functions with which a user can create a
Labruyere, 2005) customized Web environment. (Ketelhut et al., 2005)

Authenticity Authoring Tool


1: Divided in two sections: Data origin authenticity and 1: A software application or program used by trainers and
entity authenticity. Data origin authenticity is the proof instructional designers to create e-learning courseware.
of the datas origin, genuineness, originality, truth, and Types of authoring tools include instructionally focused
realness. Entity authenticity is the proof that a person or authoring tools, Web authoring and programming tools,
other agent has been correctly identiied, or that a message is template-focused authoring tools, knowledge capture
stored and received as transmitted. (Oermann & Dittmann, systems, and text and ile creation tools. (Snchez-Segura
2006) 2: The agentive participation in meaning making, et al., 2005) 2: A software program with standard user

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
42 Aut horit y Aut om at e d Por t Sc a n

interface elements, such as books or low charts. (Brown, Auto-Personalization


2006) Self-adaptive features of WAP applications. (Quah &
A Seet, 2006)
Authority
1: A Web site that provides the best source of information Autobiographical Memory
on a speciic topic. (Hu, Yang, Yeh, et al., 2005) 2: An The aspect of memory systems that allows the perception
established power to enforce moral or legal decisions. of the historic order in which experiential remembrances
Organizational authority is accountable for its actions. are stored in long-term memory. (Atkinson & Burstein
Authority is a right to demand and instruct subordinates. 2006)
Authority may also be delegated or be derived from
delegated control. The organization may mandate power to Autocorrelation
a role, position a group or individual in authority, or power Measures the correlation between observations of a time
may be assigned or sanctioned by consensus. (Zyngier, series and the same values at a ixed time offset interval.
2006) 3: Link analysis considers Web pages of high quality (Cho, 2005)
to be authorities for their topic. That means these pages
contain the best, most convincing, most comprehensive, Automated Approaches
and objective information for that topic. (Mandl, 2006) The industrialization of the teaching process using
4: The power, right, or control to give orders or to make technology. (Laws, Howell, & Lindsay, 2005)
decisions. (Park, 2006)
Automated Delivery
Authority Page A system whereby information or course content is
The page that contains the most deinitive, central, and delivered in a pre-programmed manner without the need
useful information in the context of query topics. (Lee- for any action on the part of the teacher. This could include
Post & Jin, 2005a) non-interactive methods, such as a course delivered via
cable TV, but could also include highly interactive methods,
Authorization such as automatic tutoring via a computer. (Aworuwa &
1: Granting of rights; includes granting of access based on Owen, 2005)
access rights or privileges, and implies the rights to perform
some operation and that those rights or privileges have been Automated Fingerprint Identiication System
granted to some process, entity, or human agent. (Karnouskos (AFIS)
& Vilmos, 2006) 2: One or many access rights assigned to an A system that provides computerized fingerprint
entity by a certiication authority (CA). Authorization does identiication of arrestees, applicants for licensing and
not make sure that messages received really do come from a employment, and crime scene ingerprints of potential
given counterpart. (Pierre, 2006b) 3: Privileges afforded to suspects. (Holland, 2005)
an entity to access equipment and/or information. (Buche &
Vician, 2005) 4: The process of determining if a requesting Automated Planning
party has suficient rights to access a resource. (Mundy & An area of artiicial intelligence concerned with solving the
Otenko, 2005) problem of inding a sequence of actions that transforms a
speciied initial state into a speciied goal state. (Babaian,
Authorization for Informationbase 2005)
Regulates access to informationbasethat is, what
chapters and entries are available to a particular person Automated Port Scan
or authority to initiate informationbase updating and to An intruder sending a request to a host name or a range
change informationbase structure. (Dragan, 2005) of IP addresses followed by a port number to see if any
services, including ile transfer protocol (FTP), TELNET,
Auto ID Technology and hypertext transfer protocol (HTTP), are listening on
A precursor to the RFID technology that led to the that port. Automated port scans typically are carried out
deinitions of RFID technology, including electronic by hackers trying to gain large amounts of information
product code. (Owens et al., 2005) about a particular network so that an attack can be planned.
(Butcher-Powell, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Aut om at e d T he ore m Prove r Aut onom ous Le a r ning 43

Automated Theorem Prover new content on the basis of the learners response to content
A software tool that (semi-)automatically performs presented by the machine. (Aworuwa & Owen, 2005)
mathematical proofs. Available theorem provers range
A
from fully interactive tools to provers that, given a proof, Automatic Tutoring Device
check if the proof is correct with no further interaction A device that uses programmed branching and adaptive
from the user. (Campos & Harrison, 2006) feedback. Learning results from cognitive reasoning.
(Owen & Aworuwa, 2005)
Automatic Classiication
The process by which a classiicatory system processes Automatically Deined Function (ADF)
information in order to classify data accurately; also the Parametric functions that are learned and assigned names
result of such process. (Wieczorkowska, 2005) for reuse as subroutines. ADFs are related to the concept
of macro-operators or macros in speedup learning. (Hsu,
Automatic Documentation 2005b)
Allows for a structured view of the application and
generates books of HTML documentation. Knowledge Automation
minings automatic documentation focuses on the The technique, method, or system of operating or
ability to save diagrams and reports in various formats. controlling a process by highly automatic means, as by
(Raisinghani, 2005) electronic devices, reducing human intervention to a
minimum. When applied to education, automation means
Automatic Facial Expression Analysis increasing teacher/student ratio, reducing teacher/student
A process of locating the face in an input image, extracting contact, and reducing qualiied staff with automated
facial features from the detected face region, and classifying teaching methods and tutorials. (Reilly, 2005)
these data into some facial-expression-interpretative
categories such as facial muscle action categories, emotion Automatism
(affect), attitude, and so forth. (Pantic, 2005b) An attention mechanism established through practice
whereby the performance of a task apparently no longer
Automatic Indexing interferes with the concurrent performance of other tasks.
A process that algorithmically examines information items (Owen, 2006b)
to build a data structure that can be quickly searched. (Hu,
Yang, Yeh, et al., 2005) Autonomous Agent
1: A system situated within an environment and a part
Automatic Teller Machine (ATM) System of an environment that senses that environment and acts
A system installed by a bank in different locations in on it, over time, in pursuit of its own agenda, so as to
order to enable customers to access their bank accounts affect what it senses in the future. (Raisinghani et al.,
and withdraw cash from them. (Al-Hanbali & Sadoun, 2005) 2: Software components capable of working for the
2006) performance of tasks to the beneit of its users. An agent is
anything that can be viewed as perceiving its environment
Automatic Thesaurus Construction through sensors and acting upon that environment through
The process of using a computer to automatically extract actuators. (Castro & Braga, 2006)
thesauri from texts. (Kulyukin & Nicholson, 2005)
Autonomous Information System
Automatic Transcription Information system existing as an independent entity.
The process of extracting the musical content from an (Ras & Dardzinska, 2005)
audio signal and representing it in standard music notation.
(Dixon, 2005) Autonomous Learning
The student is engaged in the learning environment
Automatic Tutoring independent of instructor guidance/supervision and
Programmed-machine methods that interact with the peer interaction/communication. S/he takes primary
learner in a way that mimics a human teacher by adjusting responsibility for her/his learning needs and goals, as well

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
44 Aut onom ous Produc t ion Syst e m Ave ra ge Pre c ision (P_Avg)

as for self-assessment of work completed. (McCracken, (Oermann & Dittmann, 2006) 2: Availability of data is the
2005) degree to which a system is operable and in a committable
A state at the start of an assignment. (Mitrakas, 2006) 3:
Autonomous Production System Prevention of unauthorized withholding of information
Part of a company directly exposed to the market which is or resources. (Tong & Wong, 2005a)
able to become part of a virtual enterprise when an adequate
business opportunity arises. (Pires et al., 2006) Availability of Data
The probability of having access to the data. Replication
Autonomous Robot will normally increase data availability. (Frank, 2005a)
A robot that is capable of existing independent of human
control. (Hall & Woods, 2006) Avatar
1: A computer-generated representation almost always
Autonomous Software Agent graphical in nature, and sometimes a three-dimensional
An agent with the ability to anticipate changes in the construct that represents the user/operator in the virtual
environment so that the agent will change its behavior world. (Ajiferuke & Markus, 2005) 2: A graphical
to improve the chance that it can continue performing its representation of a user or a character controlled by a user.
intended function. (Zwitserloot & Pantic, 2005) (Champion, 2006b) 3: A virtual representation generated
by computers. It can be, for example, a copy of a users
Autonomous (Sub)System body to try on virtual clothes. (Volino et al., 2005) 4: An
A system that decides about its own information input and image representing a user in a multi-user virtual reality
output requirements. (Szczerbicki, 2005) space. (Yong & Choo, 2005) 5: Personiication of a user
in a graphic virtual reality. An avatar can be an icon, an
Autonomous System (AS) image, or a character, and it interacts with other avatars in
1: A network where the main routers are in common the shared virtual reality. The term is drawn from the Hindu
administration. The Internet is composed of peering culture, where it refers to the incarnation of a deity. (Pace,
ASs. (Hosszu, 2005a) 2: A basic building element of 2005) 6: The computer-simulated graphic of the human
the Internet. Each AS is independent from the others. body in which speciic physical and mental attributes
(Hossz, 2006) are embodied. (Park & Lepawsky, 2006) 7: The word
comes from Indian culture and means reincarnation.
Autopoietic System On the Internet, the word is used to describe the object
A self-making or self-organizing system. (Murphy, representing the user in forms of two- or three-dimensional
2005a) photo, design, picture, or animation. (Pys & Lowyck,
2005) 8: Computer-generated personas that are adopted by
Autoregressive users to interface with other humans and agents involved
Uses historical data to predict future results. (Kushnir, in a social interaction, particularly in interacting in online
2006) virtual reality worlds. (Duchastel, 2006) 9: Synthetic
representation of a human body able to be animated.
Auxiliary View Avatars are often used in games for representing players
A view materialized in the DW exclusively for reducing the or in virtual environments when the presence of the user
view maintenance cost. (Theodoratos & Simitsis, 2005) must be visible. (Prteux & Preda, 2005)

AV Encoder Average Cost


An encoder used to encode the input audio/video signal The averaged cost of all of the learning experiences in an
to speciic digital format. (Liu & Chen, 2005) enterprise. (Norris, 2005)

Availability Average Precision (P_Avg)


1: Indicates the assurance that resources, like information, A well-known measure of retrieval performance, it is the
services, or equipment, are working adequately and average of the precision scores calculated every time a
available at a speciied time to authorized entities. An new relevant document is found, normalized by the total
available system has to be safe and secure from attacks.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
AV LE Ax iom at ic T he or y 45

number of relevant documents in the collection. (Fan & Axiomatic Semantics


Pathak, 2005) The meaning is given in terms of conditions, pre and post.
(Dasso & Funes, 2005)
A
AVLE: See Adaptive Virtual Learning Environment.
Axiomatic Theory
Awareness Consists of a language and a set of statements of the
1: A specialized knowledge about the objects that leads an language called axioms. The language allows one to
actor to an understanding of various aspects of the ERP express statements about a certain collection of objects,
collaborative process. It is deined and measured in terms and the axioms express properties that the objects of the
of the semantic concepts (task, role, process resource, language are assumed to possess. An axiomatic theory
and collaborative resource) used in the map. (Daneshgar, represents a collection of mathematical modelsnamely,
2005) 2: A stage in the knowledge management cycle in those models that have the same objects as the language
which a decision maker is made aware of the potential of the theory and that satisfy the axioms of the theory.
application of organizational memory to a current issue. (Farmer, 2006)
(Yaniv & Schwartz, 2006) 3: Conscious knowledge
about a communicative situation in a computer-supported
environment including all the persons involved. (Beuschel
et al., 2005)

Awareness Model
A model that represents various levels of awareness. Level-
0 awareness consists of the concepts that lead an actor
to knowledge about all the tasks that an actor performs
within the process. A roles level-3 awareness is its level-
2 awareness, plus awareness about all the interactions
(represented by the process resources used/shared) that
occur between any two roles within the process. And
inally, level-4 awareness is the highest level of awareness
that a role can have in any ERP process. It is deined as
the knowledge about how everything its together to form
the ERP process. (Daneshgar, 2005)

AWT: See Abstract Windows Toolkit.

Axiom
1: A rule or maxim accepted as a truth in the ontology.
Axioms provide the inferencing or logical power of the
ontology. Example: If and only if a wine is red, then it
is derived from a grape that is red. (Buchholz, 2006) 2:
A generally accepted proposition or principle sanctioned
by experience; a universally established principle or law
that is not necessarily true. (Polgar, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
46 BA Ba ck propa gat ion Algorit hm

B
BA: See Behavior Aggregate. data that was not used to optimize model parameters.
(Kushnir, 2006)
Ba
A physical, virtual, or mental context that enables effective Backbone Network
knowledge creation; based on the Japanese idea of place. Long-haul networks such as CA*net 4 and GANT 2,
(Medeni, 2006a) Long-Haul that interconnect network segments in WAN
conigurations to facilitate resource sharing and e-
Back Propagation collaborative information exchange. (Littman, 2006)
A training method used to calculate the weight in a neural
net from the data. (Kumar, 2005) Backpropagation
1: A learning algorithm for modifying a feed-forward
Back-Channel neural network which minimizes a continuous error
The standard use of e-mail, person to person, without function or objective function. Back-propagation is
routing through the communitys available channels. a gradient descent method of training in that it uses
(Patrick et al., 2006) gradient information to modify the network weights to
decrease the value of the error function on subsequent
Back-End Application System tests of the inputs. Other gradient-based methods from
A software system that manages business domain-speciic numerical analysis can be used to train networks more
data for businesses, e.g., enterprise resource planning eficiently. (Kitchens, 2005) 2: A neural network training
(ERP) systems. (Bussler, 2005a) algorithm for feed-forward networks where the errors
at the output layer are propagated back to the previous
Back-End Interoperability layer to update connection weights in learning. If the
Business-process-centric integration approach that previous layer is not the input layer, then the errors at this
interconnects different application systems in order to hidden layer are propagated back to the layer before. (An,
enable the execution of cross-organizational business 2005) 3: Method for computing the error gradient for a
processes. (Werth, 2005) feed-forward neural network. (Yeo, 2005) 4: The name
of the most common learning algorithm for MFNNs. It
Back-End Processing involves modifying the weights of the MFNN in such a
Dealing with the raw data, which is stored in either tables way that the error (difference between the MFNN output
(ROLAP) or arrays (MOLAP). (Tan, 2005b) and the training data desired output) is minimized over
time. The error at the hidden neurons is approximated by
Back-End System propagating the output error backwards, hence the name
The support components of a computer system. Typically backpropagation. (Smith, 2005)
refers to the database management system (DBMS), which
is the storehouse for the data. (Mockler et al., 2006) Backpropagation Algorithm
Learning algorithm of artiicial neural networks based
Back-Testing on minimizing the error obtained from the comparison
Testing a mathematical model for its performance over between the outputs that the network gives after the
past intervals. Back-testing often uses out-of-sample application of a set of network inputs and the outputs it

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ba ck propa gat ion, Fe e d-Forw a rd N e ura l N e t w ork Ba ndwidt h 47

should give (the desired outputs). (Rabual Dopico et Balanced Scorecard Collaborative
al., 2005) A strategic management system that measuresby means
of quantitative relations of different selected variablesthe
B
Backpropagation, Feed-Forward Neural behavior of the organization, taking into account the settled
Network aims established in different perspectives (e.g., increase,
A type of neural network popular for use in classiication internal processes, customers, inances). The analysis is
data mining. The neurons in a feed-forward network are based on the cause-effect relations between the variables
organized into an input layer and enable the network to and ratios that represent them. (Xodo & Nigro, 2005)
represent the knowledge present in the data. (Fuller &
Wilson, 2006) Balancing (Counteracting) Feedback
A systemic pattern that is responsible for stability, balance,
Backsourcing and control. It represents adjusting, correcting, and
Taking work that had been outsourced back in-house. counteracting processes that resist, slow down, or impede
(Beaumont, 2005) change and growth. (Maani, 2005)

Bag Relation Bandwidth


A relation that permits repetition of tuples. (T.Y. Lin, 1: A measure of how much information or data path times
2005) frequency. For example, the ISA bus has a data path of 16
bits (it can send 16 bits at a time) and typically operates
Bagging (Bootstrap Aggregating) at 8.33MHz, so it has a bandwidth of 133.28 megabits
A bootstrap replication of the sample units of the training per second. It is the speed of a connection between
sample, each having the same probability to be included computers. The range of frequencies (size of the pipe)
in the bootstrap sample to generate single prediction/ available for carrying information, and the total amount
classiication rules that being aggregated provides a inal of data or information that can be transmitted via a given
decision rule consisting in either the average (for regression communications channel (e.g., between a hard drive and
problems) or the modal class (for classiication problems) the host PC) in a given unit of time. (Magagula, 2005)
among the single estimates. (Siciliano & Conversano, 2: A measure of the data transmission capacity of a
2005) communications link. (Ruppel & Ruppel, 2005) 3: The
amount of data that can be transferred in a ixed amount of
Balanced Score Card (BSC) time using a speciied communications channel/pathway in
1: A management framework for translating strategy a computer network. The term is often used as a synonym
into tactics through identiication of metrics for aligning for data transfer rate. (Pease et al., 2005) 4: Colloquially,
processes with visions. Initiatives needed to meet the the amount of network capacity available for a connection.
objectives of the business are identiied. (Dykman, 2005) (Urbaczewski, 2005) 5: Deining the capacity of a
2: A strategic management system and performance communication channel, it refers to the amount of data
measurement. (Lee & Pai, 2005) 3: A tool for developing that can be transmitted in a ixed time over the channel;
measures, objectives, targets, and initiatives for it is commonly expressed in bits per second. (Hin &
inancial, customer, internal process, and learning Subramaniam, 2005a) 6: Determines the rate at which
and growth categories derived from the overall company information can be sent through a channel. (Singh, 2006a)
vision statement. (Clegg & Tan, 2006) 4: A selected 7: In networks, bandwidth is often used as a synonym for
collection of measures (both inancial and non-inancial) data transfer rate: the amount of data that can be carried
derived from an organizations strategies. Usually, balanced from one point to another in a given time period (usually
scorecard is considered to be the most prevalent form of a second). This kind of bandwidth is usually expressed in
performance measurement system. (Saha, 2005). 5: A bits (of data) per second (bps). (Olla, 2005a) 8: Maximum
valuation methodology, here applied to IT, that assigns data transfer capacity of a communication channel. (Arya,
metrics to non-inancial value contributions for the 2005) 9: Range of frequencies within a communication
organization, including customer service, innovation, and channel or capacity to carry data. (Lawson-Body et al.,
others. (Mendonca, 2005) 2005) 10: Refers to the range of frequencies available for a
speciic broadcast, for example, radio/television channels,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
48 Ba ndw idt h M a na ge m e nt Ba sic N avigat ion Suppor t

mobile phones, and so on. In computer networks, bandwidth Barriers to Knowledge Sharing
refers to the amount of data that can be transferred in a Characteristics of the knowledge-sharing environment that
B given period of time. (Papagiannidis et al., 2005) 11: Term may limit or preclude the knowledge-sharing transaction.
used to denote the capacity of a communication channel The evaluation of barriers to knowledge sharing should
for information: a narrow bandwidth implies slow or actually be measured in terms of knowledge workers
limited communication. It describes the carrying capacity perceptions of barriers to knowledge sharing since
of the users connection or the server connection. It is knowledge workers may not be able to elucidate the actual
commonly measured in bits or bytes per second. (Boersma barriers. (Lindsey, 2006)
& Kingma, 2006) 12: The amount of data per second that
can be delivered to your computer. A 56K modem has a Base Class
bandwidth of 56 kilobits/second. The term bandwidth is User-deined class; a collection of objects that have the same
also used in conjunction with data rate when discussing behavior and state deinition. (Alhajj & Polat, 2005b)
video. (Cosemans, 2005a)
Base Station Controller (BSC)
Bandwidth Management The intelligent element of the Base Station Subsystem.
Determines the information capacity of a network per unit It has complex functions in radio resource and trafic
of time. Wireless networks deliver lower bandwidth than management. (Hackbarth et al., 2005)
wired networks. The choice of appropriate bandwidth for
eficient and cost-effective transmission of voice, data, Base Station Transceiver (BST)
and pictures is called bandwidth management. (Murthy The irst element that contacts the mobile terminal in the
& Krishnamurthy, 2005d) connection, and the irst element of the ixed part of the
mobile network. (Hackbarth et al., 2005)
Bandwidth of Communication Channel
Actual speed of communication medium available at Baseband
the time of transmission. Limitations of bandwidth can In radio communications systems, the range of frequencies
substantially affect quality of interaction and eficiency starting at 0 Hz (DC) and extending up to an upper
of learning. (Rugelj, 2005) frequency as required to carry information in an electronic
form, such as a bitstream before it is modulated onto a
Banner carrier in transmission or after it is demodulated from
A typically rectangular advertisement placed on a Web a carrier in reception. In cable communications, such
site either above, below, or on the sides of the main content as those of a local area network (LAN), it is a method
and linked to the advertisers own Web site. In the early whereby signals are transmitted without prior frequency
days of the Internet, banners were advertisements with conversion. (Chochliouros et al., 2005b)
text and graphic images. Today, with technologies such
as Flash, banners have gotten much more complex Baseline Data
and can be advertisements with text, animated graphics, The data in a study captured before an intervention or
and sound. (Lalopoulos, Chochliouros, & Spiliopoulou- innovation is introduced in an experimental setting, in
Chochliourou, 2005b) order to describe the situation before the experimental
intervention or innovation is effected. (Fisher, 2005)
Bar Codes
Simple form of optical character recognition where Basic Methods of Computer-Mediated
information is encoded in printed bars of relative thickness Communication
and spacing. RFID combines this technology with radio Includes such tools as threaded discussions, gradebooks,
frequency. (Kotzab, 2005) class announcements, and lecture notes. (Gold, 2005)

Barriers to Human-Computer Interaction Basic Navigation Support


Anything that poses as a challenge to a human interacting Basic WCDSS navigation structures such as the categories
with technology. Examples include poor organization of of offerings that provide browsing aids for searching. (F.
a Web site and language conversion issues. (Carstens, Wang, 2006)
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ba sic Re side nt ia l Re gist e r N e t w ork Ba ye sia n N e t w ork 49

Basic Residential Register Network Bayesian Behavior Network


A network to conirm the being of a person or a subject. 1: In this network, the agents are organized into agencies,
Its use is common throughout Japan and jointly operated where each agency activates one or more component
B
by local authorities. (Kitagaki, 2005) behavior depending on the inference in the underlying
Bayesian behavior network. (Potgieter et al., 2005) 2: A
Basic Service Set (BSS) specialized Bayesian network used by Bayesian agents
A WLAN architecture consisting of dedicated station to collectively mine and model relationships between
computers and a dedicated wireless access point. (Pulkkis, emergent behaviors and the interactions that caused them
Grahn, & Karlsson, 2005) to emerge, in order to adapt the behavior of the system.
(Potgieter et al., 2005)
Basis for Association Rules
A set of association rules that is minimal with respect to Bayesian Hyperstructure
some criteria, and from which all association rules can be A Bayesian Behavior Network is a Bayesian hyperstructure
deduced with support and conidence. (Pasquier, 2005) that in turn constitutes the internal model of the complex
adaptive system. (Potgieter et al., 2005)
BAT: see Beam Analysis Tool.
Bayesian Information Criterion
Batch Learning An approximation to the Bayes factor which can be used to
Learning by using an algorithm that views the entire dataset estimate the Bayesian posterior probability of a speciied
at once, and can access any part of the dataset at any time model. (Burr, 2005b)
and as many times as desired. (Oza, 2005)
Bayesian Learning
Baud Learning algorithm based on Bayes rule. (Rippon &
The unit in which the information-carrying capacity or Mengersen, 2005)
signaling rate of a communication channel is measured.
One baud is one symbol (state transition or level transition) Bayesian Method
per second. (Vician & Buche, 2005) Means of quantifying uncertainty based on the probability
theory. The method deines a rule for reining a hypothesis
Baudot by factoring in additional evidence and background
A 5-bit standard encoding method for upper-case letters. information. It uses results of previous events to predict
(Kieler & West, 2005) results of future events. (Polgar, 2005a)

Bayes Factor Bayesian Network


Ratio between the probability of the observed data 1: A directed acyclic graph (DAG) that encodes the
under one hypothesis divided by its probability under an probabilistic dependencies between the variables within a
alternative hypothesis. (Ramoni & Sebastiani, 2005) domain and is consistent with a joint probability distribution
(JPD) for that domain. For example, a domain with variables
Bayes Rule {A,B,C,D}, in which the variables B and C depend on A
1: Mathematical equation relating prior and posterior and the variable D depends on C and D, would have the
probabilities. (Rippon & Mengersen, 2005) 2: Shows how following JPD: P(A,B,C,D) = p(A)p(B|A)p(C|A)p(D|C,D)
probabilities can be updated in the light of evidence. Derives and the following graph (Vargas, 2005):
from a simple reordering of terms in the product rule and
by subsequently applying the law of total probability. A
(Laura, 2005) C
B

Bayes Theorem D
Result in probability theory that states the conditional
probability of a variable A, given B, in terms of the 2: A directed acyclic graph where the nodes represent
conditional probability of variable B, given A, and the random variables and arcs represent the relationships
marginal probability of A alone. (Bashir et al., 2005) between them. Their strength is represented by means of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
50 Ba ye sia n N e ura l N e t w ork (BN N ) Be nchm a rk Toolk it

conditional probability distributions stored in the nodes. Belief


(de Campos, Fernndez-Luna, & Huete, 2005) 3: A A positive function that represents the conidence that
B graphical model that encodes the probability distribution a proposition lies in a focal element or any subset of it.
of a set of random variables by specifying a set of (Beynon, 2005a)
conditional independence assumptions, together with a
set of relationships among these variables and their related Belief Revision
joint probabilities. (Laura, 2005) 4: A graphical model The process of changing beliefs to relect the acquisition of
deining the dependencies between random variables. new information. A fundamental issue in belief revision is
(Caelli, 2005) how to decide information to retract in order to maintain
consistency, when the addition of a new belief to a theory
Bayesian Neural Network (BNN) would make it inconsistent. (Colucci et al., 2006)
A neural network where a Bayesian approach is used
to calculate the posterior distribution for the weights. Below-View
Rather than selecting the single most likely set of weights, Elements of experience that are not available to direct
model averaging is used to predict outputs. (Rippon & inspection without applying some semiotic tool such as
Mengersen, 2005) linguistic analysis. (Zappavigna-Lee & Patrick, 2005)

BBA: See Bone-Based Animation. Benchmark


1: A standard program that runs on different systems
BBS: See Bulletin Board System. to provide an accurate measure of their performance.
(Darmont, 2005) 2: A standard, usually from outside
BDHM: See Block Data Hiding Method. sources and usually representing the best or better-than-
average performance against which an activitys metric
Beam Analysis Tool (BAT) is compared. For example, world-class competitors have
A nonlinear-capable online software developed using 35 defects per unit within the irst six months; we have
the Macromedia Flash programming environment and 85. (Holstein & Crnkovic, 2005)
which focuses on beam delection problems using the
moment-area method. (Burrage & Pelton, 2005) Benchmark Audiovisual Affect Database
A readily accessible centralized repository for retrieval
Beat Tracking and exchange of audio and/or visual training and testing
The process of inding the times of musical beats in an material, and for maintaining various test results obtained
audio signal, including following tempo changes, similar for a reference audio/visual data set in the research on
to the way that people tap their feet in time to music. automatic human affect analysis. (Pantic, 2005a)
(Dixon, 2005)
Benchmark Toolkit
Behavior Aggregate (BA) A tool that has been proposed for fair comparisons of
A set of packets going in one direction of a link that exhibit different implementation alternatives, mostly of access
similar QoS characteristics. (Gutirrez & Ting, 2005) methods. Its main components are: a synthetic data
generator and/or some sets of real data, a query processor,
Behavioral Biometric and a set of access methods whose behavior has to be
A biometric characterized by a behavioral trait learned investigated. The output of a benchmark is a set of values
and acquired over time. (Vatsa et al., 2005) describing the performance of each access method for
a given data set and a set of queries that were executed
Behavioral/Value Information iteratively by the query processor. Often these values
Information that represents how large-scale, complex describe separately the input/output time and CPU time
systems, including social systems, interact under different needed for the index construction and for the computation
environmental conditions and in conjunction with different of the queries. (Tzouramanis, 2005)
stimuli. (McIntosh & Siau, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Be nchm a rk ing Bia se d M a rke t pla c e 51

Benchmarking recognized as best by other peer organizations.


1: To identify the best in class of business processes, (Pemberton & Stalker, 2006) 2: An explicit recognition
which might then be implemented or adapted for use by of the fact that optimization techniques and the goal of
B
other businesses. (Troutt & Long, 2005) 2: An improvement obtaining speciic objective function maximization or
process in which a company measures its performance minimization is inapplicable in the context. Best practice in
against that of best in class companies, determines how the end is determined by the stakeholders and the producers,
those companies achieved their performance levels, and and may involve many subjective criteria. (Nicholls,
uses the information to improve its own performance. 2006) 3: Industry-agreed best way of doing a process.
The subjects that can be benchmarked include strategies, (Brady, 2005) 4: Superior performance within a function
operations, processes, and procedures. (Archer, 2006) 3: independent of industry, leadership, management, or
Procedure to compare and improve manufacturing quality operational methods or approaches that lead to exceptional
and services based on the comparison of operations, performance; best practice is a relative term and usually
methods, procedures, and processes inside and outside indicates innovative or interesting business practices
the organization. (Xodo, 2005) that have been identiied as contributing to improved
performance at leading companies. Best practice exercises
Benchmarking E-Government routinely employ a variety of strategies to facilitate
The continuous process of measuring products, services, knowledge sharing and the creation of knowledge content
and practices against successful governments, and making in pursuit of enhanced customer service and ultimately
comparisons with them and then learning the lessons customer loyalty. (Archer, 2006) 5: Generic business
that those comparisons throw up. (Yigitcanlar & Baum, processes that are programmed into ERP software. They
2006a) are based on cumulative knowledge about widely accepted
practices that have been seen to work effectively across
Benchmarking/Best Practices organizations in generic industries. (Tarafdar, 2005) 6:
The continuous process of measuring products, services, Process procedures of recognized excellence, usually
and practices against others. Mostly used to identify obtained from companies experience and/or process
processes, services, and so forth generally considered to be optimization analysis. (Framinan, 2005)
superior in approach, and results in other methods internal
or external to the enterprise. (Ribire & Romn, 2006) Better-Faster-Cheaper
A shorthand label for processes that contribute value
Beneit Function through better quality, less costly products and services,
Theoretical algebraic functions depicting the user at a faster production pace. (Mendonca, 2005)
satisfaction for a multimedia service in correlation with
the allocated resources. (Koumaras et al., 2005) Betweenness Centrality
A measurement of centrality indicating how powerful
Beneits Management an actor is in terms of controlling information low in a
A managed and controlled process of checking, network. The idea here is that actors are central if they
implementing, and adjusting expected results and lie between other actors on the shortest paths connecting
continuously adjusting the path leading from investments these actors. (Assimakopoulos & Yan, 2006)
to expected business beneits. (Lin & Pervan, 2005)
BHR: See Byte Hit Rate.
Beneits Realization: See Beneits Management.
BI: See Bibliog ra phic In st r uction; Busine ss
Benevolence Intelligence.
1: An act intending or showing goodwill and kindness.
(Wong, 2005) 2: The belief that the other party cares about Biased Marketplace
the trustor. (Paravastu & Gefen, 2006) Electronic marketplace owned and operated by one or more
organizations primarily for the purpose of conducting
Best Practice electronic commerce with trading partners. (Turner,
1: A superior method or innovative practice that contributes 2006)
to the improved performance of an organization, usually

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
52 Bia se d Sa m pling Bina r y I m a ge

Biased Sampling Bilingual Learning Environments


A random sample of k tuples of a database, where the Learning contexts where two languages are needed.
B probability of a tuple belonging to the sample varies across Often this is because the course content is in English
tuples. (Das, 2005) but the learners are not luent in English; discussion and
exploration of meaning occurs in a language other than
Bibliographic Instruction (BI) English. Translation is needed before questions can be asked
Teaching and presenting information on library and of any International Instructor involved in the teaching.
information resources in a systematic way to library (Ching et al., 2005)
users/patrons. How to access, use, analyze, and critique
information are all parts of BI. (Buchanan, 2005) Bilingual Learning Facilitator
A tutor or local instructor whose irst language is the same
Bibliometrics as the learners, but who is reasonably luent in English
1: The study of the relationship among scientific as well and also familiar with the content domain. Such
publications. The most important application is the facilitators have a major role in bridging the gap between
calculation of impact factors for publications. During this the international instructors and the local learners. (Ching
process, a large number of references is considered to be et al., 2005)
an indicator for high scientiic quality. Other analyses
include the structure and the development of scientiic Bill of Materials (BOM)
communities. (Mandl, 2006) 2: The study of regularities A hierarchical product structure showing the sub-
in citations, authorship, subjects, and other extractable components and interdependencies of any given inished
facets from scientiic communication using quantitative good. Akin to a recipe, it is the underlying link between
and visualization techniques. This allows researchers to end product demand and material requirements. It also
understand patterns in the creation and documented use facilitates production costing, as each component in the
of scholarly publishing. (Nicholson & Stanton, 2005) hierarchy can be costed. (Carton & Adam, 2005)

Bibliomining Bill of Materials and Movements


1: Data mining applied to digital libraries to discover Includes in a traditional bill of materials the necessary
patterns in large collections. (Cunningham & Hu, 2005) movement of materials between virtual enterprise
2: The application of statistical and pattern-recognition members. (Pires et al., 2006)
tools to large amounts of data associated with library
systems in order to aid decision making or justify services. Billing
The term bibliomining comes from the combination of A signaling procedure in cellular networks to transfer
bibliometrics and data mining, which are the two main call-related data to the billing center for charging the
toolsets used for analysis. (Nicholson & Stanton, 2005) subscribers. (Louvros et al., 2006)

BIFS: see Binary Format for Scenes. Binarization


The process of deriving a binary representation for
Big-Bang Approach numerical and/or categorical attributes. (Boros et al.,
Implementing all modules of an ERP system in all locations 2005)
or plants of the company simultaneously. (de Souza &
Zwicker, 2005) Binary Coding
A basic coding in which a solution of some problems can be
Big-Bang ERP Implementation represented in a list of zeros and ones. (Kacem, 2005)
ERP implementation strategy consisting of implementing all
required modules and features at once. (Framinan, 2005) Binary Image
An image made up of black and white pixels with values
Big Deal of 0s or 1s. (Chen, Chen, & Cheng, 2005)
Online aggregation of journals offered by publishers. Big
Deal can oblige libraries to subscribe to marginal journals
to have access to must-have journals. (Rennard, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bina r y For m at for Sc e ne s (BI FS) Biom e t ric 53

Binary Format for Scenes (BIFS) 7: The processing of the huge amount of information
Based on VRML97, BIFS is extended with commands pertaining to biology. (Liberati, 2005)
that can update, delete, or replace objects in the scene.
B
For streaming scenarios, BIFS also offers an integrated Biological Model
binary compression scheme, media mixing, and audio A construct developed from the observation of biophysical
composition. (Di Giacomo et al., 2005) processes of living things. (Atkinson & Burstein, 2006)

Binary Large Object (BLOB) Biological Neural Network


A usually large (i.e., MB to GB) byte string stored in A network of neurons that function together to perform
the database; the DBMS does not have any knowledge some function in the body such as thought, decision making,
about the semantics of the byte string; hence, it cannot relex, sensation, reaction, interpretation, behavior, and
offer semantically adequate functionality and query so forth. (Kitchens, 2005)
optimization. (Baumann, 2005)
Biomedical
Binding Propagation Relating to biomedicine, the application of natural
Optimization technique based on the exploitation of sciencesespecially biology and physiologyto clinical
binding propagation techniques, which reduce the size of medicine. (Knight, Whittington, Ford, & Jenkins, 2005)
the data relevant to answer the query, and consequently
minimize both the complexity of computing a single Biometric
model and the number of models to be considered. (Greco 1: A measurable, physical characteristic or personal
& Zumpano, 2005b) behavioral trait used to recognize the identity or verify the
claimed identity of an enrollee. A biometric identiication
Biographical Analysis system identiies a human from a measurement of a physical
An interpretive research approach to understand how feature or repeatable action of the individual (for example,
individuals take part in social contexts and make sense hand geometry, retinal scan, iris scan, ingerprint patterns,
of them. The analysis of the interviews helps to reveal facial characteristics, DNA sequence characteristics,
the structures of personal and social processes of action. voice prints, and handwritten signature). (Lovell & Chen,
Usually, at the beginning of the interview, there is nothing 2005) 2: A physiological or behavioral characteristic
that would be recognized as relevant categories; these used to recognize the claimed identity of any user. The
should emerge from the analysis of data. (Correia & technique used for measuring the characteristic and
Sarmento, 2005) comparing it is known as biometrics. (Vatsa et al., 2005)
3: Some measurement of the biological characteristics of
Bioinformatics a human subject. A useful biometric is one that is easily
1: All aspects of information processing on biological data, acquired and digitized, and where historical samples can
in particular genomic data. The rise of bioinformatics is be readily compared with contemporary ones. (Fleming,
driven by the genomic projects. (L.M. Fu, 2005) 2: An 2005a) 4: The application of computational methods to
integration of mathematical, statistical, and computational biological features, especially with regard to the study
methods to organize and analyze biological data. (Chen of unique biological characteristics of humans. (Scott et
& Liu, 2005) 3: Data mining applied to medical digital al., 2006) 5: The automated technique of measuring a
libraries. (Cunningham & Hu, 2005) 4: Field of science physical characteristic or personal trait of an individual
in which biology, computer science, and information and comparing that characteristic to a comprehensive
technology merge into a single discipline. (Jourdan database for purposes of identiication. (Vatsa et al.,
et al., 2005) 5: The analysis of biological information 2005) 6: The science of automatically identifying people
using computers and statistical techniques; the science or verifying peoples identity based on unique human
of developing and utilizing computer databases and physiological or behavioral characteristics such as face,
algorithms to accelerate and enhance biological research ingerprint, iris retina, voice, and so forth. (Li, 2006)
(Ge & Liu, 2005) 6: The development and application of 7: The science of measuring, analyzing, and matching
computational and mathematical methods for organizing, human biological data such as ingerprints, irises, and
analyzing, and interpreting biological data. (Liu, 2005) voice/facial patterns. In information system security,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
54 Biom e t ric Aut he nt ic at ion Bit -Pa ra lle lism

these measures are increasingly being introduced for the integrity of sensitive data stored in information systems.
authentication purposes and will play a critical role in (Scott et al., 2006)
B the future of digital security. (Tassabehji, 2005a) 8: The
use of computational methods to evaluate the unique Biometric Sample
biological and behavioral traits of people. (Lowry et al., The unprocessed image or physical or behavioral
2005b) 9: The use of technological devices to identify characteristic captured to generate the biometric template.
people through scans of their faces, hands, ingers, (Vatsa et al., 2005)
eyes, or voice. (Szewczak, 2005) 10: Using one or more
physical characteristics of a person for identiication. Biometric Template
Fingerprints, retina scans, hand proiles, voice recognition, The mathematical representation of the biometric sample
face recognition, and many others may be used. (Strauss, which is inally used for matching. The size of a template
2005) 11: Usually refers to technologies for measuring varies from 9 bytes for hand geometry to 256 bytes for
and analyzing human physiological characteristics such iris recognition to thousands of bytes for face. (Vatsa et
as ingerprints, eye retinas and irises, voice patterns, al., 2005)
facial patterns, and hand measurements, especially for
authentication purposes. In a typical IT biometric system, Biophysical Variables
a person registers with the system when one or more of Objective physical data collected during experiments
his physiological characteristics are obtained, processed such as pulse, blood pressure, hormone levels,
by a numerical algorithm, and entered into a database. electroencephalograms, and electrocardiograms.
Ideally, when he logs in, all of his features match 100%; (Molinari, Anderberg, et al., 2005)
then when someone else tries to log in, she does not fully
match, so the system will not allow her to log in. (Wong, B-ISDN: See Broadband Integrated-Services Data
2006) 12: Generally, biometrics refers to the study of Network.
measurable biological characteristics. In computer security,
biometric technologies are deined as automated methods of Bit Depth
identifying or authenticating the identity of a living person The number of bits used for color resolution when viewing
based on his or her physiological (e.g., ingerprint, hand, ear, a movie. (Vitolo et al., 2005)
face, eyeiris/retina) or behavioral (e.g., signature, voice,
keystroke) characteristic. This method of identiication is Bit Rate
preferred over current methods involving passwords and 1: A data rate expressed in bits per second. In video
pin numbers, as the person to be identiied is required to encoding, the bit rate can be constant, which means that it
be physically present at the point of identiication, so the retains a speciic value for the whole encoding process, or
person or user is identiied, not the device, as in case of it can be variable, which means that it luctuates around a
PIN and password. (Mezgr, 2006b) speciic value according to the content of the video signal.
(Koumaras et al., 2005) 2: In a bit stream, the number of
Biometric Authentication bits occurring per unit time, usually expressed in bits per
The identiication of individuals using their physiological second. Usually, it measures the rate of transmission of
and behavioral characteristics. (Chakravarty et al., information. (Ragazzi, 2005)
2005a)
Bit Stream
Biometric Encryption The actual data stream, which is the transmission of
A technique whereby the biometric data is used as a characters at a ixed rate of speed. No stop and start
personal or private key to be used in some cryptographic elements are used, and there are no pauses between bits
process. (Fleming, 2005a) of data in the stream. (Knight & Angelides, 2005)

Biometric Identiier Bit-Parallelism


The use of biometric data to enable the reliable identiication A technique to store several values in a single computer
of an individual from the measurement of a physiological word so as to process them all at once. (Navarro, 2005)
property which provides the ability to control and protect

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bit -Slic e Signat ure File Ble nde d Le a r ning 55

Bit-Slice Signature File Blackboard Metaphor


A ile in which one bit per signature for all the signatures A metaphor used in query languages, its philosophy
is stored. For a set of signatures of length F, F bit-slice is to let users draw the sketch of their query. (Ferri &
B
iles will be generated. (Chen & Shi, 2005) Rafanelli, 2005)

Bitmap Index Black-Scholes Option Pricing Model


1: An index containing a series of bitmaps such that for A model that is used to calculate the value of an option
attribute A on relation R, each bitmap tells us if a given by taking into account the stock price, strike price and
record in R has a certain value for A. Bitmap indices are expiration date, the risk-free return, and the standard
often used in decision support environments, since used deviation of the stocks return. (Li, 2005b)
in conjunction with other bitmap or regular indices, they
can cut down on disk accesses for selections, thereby Blank Node
improving query response time. (Badia, 2005a) 2: Consists A node in the RDF graph that does not correspond to a
of a collection of bitmap vectors, each of which is created Web resource. Blank nodes are normally used to refer to
to represent each distinct value of the indexed column. A a set of resources or an entire statement. With respect to
bit i in a bitmap vector, representing value x, is set to 1, if querying, they can be used to represent a variable in an
the record i in the indexed table contains x. (Bellatreche RDF query. (Stuckenschmidt, 2005)
& Mohania, 2005)
blaxxun
Bi-Temporal Database A server-based platform for creating and deploying
This database supports both types of time that are interactive, Web-based, rich-media applications. (Sourin,
necessary for storing and querying time-varying data. It 2006)
aids signiicantly in knowledge discovery, because only
the bi-temporal database is able to fully support the time Blend
dimension on three levels: the DBMS level with transaction A judicious mixture of face-to-face and computer-mediated
time, the data level with valid time, and the user-level with interactions to facilitate collaboration. (Crdoba & Robson,
user-deined time. (Raisinghani & Klassen, 2005) 2006)

Bi-Temporal Query Blended Course


Refers to a query that involves both valid and transaction A course that utilizes a combination of different delivery
time points or intervals. (Rodrguez-Tastets, 2005b) modalities, combining face-to-face interaction with online
delivery as appropriate. (Shaw, 2006)
Black Boxing
A technique used for simpliication. Multiple actors can Blended Learning
be put into a black box so that it is not necessary to look at 1: Deined broadly, the integration of classroom face-
them in detail. The portal could be considered as a black box to-face learning with online or technology-supported
containing the ISP, portal software, data storage devices, learning, including a range of pedagogical approaches and
modems, telephone devices, and so on. Black-boxing is delivery systems. Strategic applications of blended learning
done for convenience, as it means that an entity can then have shown achievement of learning gains while tackling
be seen as just another actor, and it saves looking at the other problems faced by our universities, most notably
detail until necessary. The black box can later be reopened the pressures of increasing class sizes, and limitations in
to investigate its contents. (Tatnall, 2005a) funding, classroom space, and learning support. (Campbell,
2005) 2: E-learning used in conjunction with other teaching
Blackboard and learning methods. (Dixon et al., 2005) 3: Learning
An e-learning software platform that is utilized to deliver design that combines various activities such as face-to-face
and manage instructional activities online. (Aisami, meetings, Internet-based learning modules, and virtual
2005) learning communities. (Link & Wagner, 2006) 4: Learning
that results from using mixed methods of instructional

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
56 Ble nde d Le a r ning Environm e nt Bloom s Ta xonom y of Le a r ning

delivery (i.e., face to face and Internet.) (Chapman, 2005b). Blocklisting


See Mixed-Mode Learning. Set up as an approach for blocking unsolicited or junk e-
B mail. blocklists provide lists of URLs or Web addresses
Blended Learning Environment from which spammers operate. The blocklists therefore
A learning environment that combines face-to-face and provide a way of ameliorating or preventing spam from
computer-mediated instruction. (Graham et al., 2005) reaching the intended destination. (de Freitas & Levene,
2006a)
Blended Learning Model (BLM): See Blended
Model. Blog
1: A personal diary and a collaborative space. A breaking-
Blended Model news outlet, a collection of links, your own private
1: A learning model utilizing traditional lecture-/ thoughts. In simple terms, a blog is a Web site where you
classroom-style teaching with computer-aided models to write material on an ongoing basis. New entries show up
aid in independent learning based on a students learning- at the top, so your visitors can read what is new. Then they
styles assessment requirements. (Rhoten, 2006b) 2: An comment on it or link to it, or they e-mail you. (Robinson,
instructional model or instruction that combines two 2006) 2: A Web log that allows for a diary-style forum for
or more instructional models. (Askar et al., 2005) 3: A posting ones personal thoughts and experiences. (Cannoy
face-to-face instructor-delivered instruction in a brick- & Iyer, 2006) 3: An online diary in which a Netizen or
and-mortar location supplemented by a variety of online Cybercitizen records thoughts and opinions on a theme or
resources. (Aworuwa & Owen, 2005) topic of interest to its creator. (Goldsmith, 2006) 4: A type
of Web page that serves as a publicly accessible personal
BLOB: See Binary Large Object. journal, typically updated frequently. Blog software usually
has archives of old blogs and is searchable. (Paoletti,
Block Data Hiding Method (BDHM) 2005) 5: A form of Web-based communication that has
In BDHM, an image will be partitioned into blocks and increased in popularity in the last several years. Blogs
sub-blocks. Then based on the characteristic values of these facilitate easy publishing and sharing of ideas between
sub-blocks, the most suitable sub-block will be chosen for individuals. (Graham & Misanchuk, 2005) 6: Usually a
hiding. Data hidden in the block will not be visually easy personal journal on the Web, it could be of opinions, social
to detect and must not modify the original characteristic issues, or relections. People that blog are often identiied
value of the block. (Chen, Chen, & Cheng, 2005) as bloggers. (Boateng & Boateng, 2006b) 7: Typically, an
individuals journal entries presented in last-in-irst-out
Block Scheduling format. Some blogs also allow for user commentary in
A daily schedule for middle schools and high schools that response to these entries, creating a type of interactive
involves fewer class periods, but each one is longer than community. (Isaak, 2006) 8: Personal, online journals and
traditional 40- to 55-minute periods. Advocates claim that one of the fastest growing trends on the Internet. Blogs are
block scheduling allows for a wider variety of instructional now considered one of the tools to maintain knowledge
techniques, increased ability for teachers and students to communities. (Yamazaki, 2006)
focus on complex tasks, and makes for a calmer school
environment. (Glick, 2005b) Blogger
One who maintains a blogan online journal, diary, or
Blocking record. (Baim, 2006b)
1: A means of disallowing access to Internet content and
services by restricting access at the corporate gateway. Blooms Taxonomy of Learning
(Urbaczewski, 2005) 2: Allows an IM user to control A scale that represents an organization of learning
the ability of his or her online status. When you block levels (ive levels) that are characterized by the students
someone, that person will not be able to send messages immersion into the theory and application of principles
to you until you remove that person from your block list. of course content. (Marold, 2005)
(Hwang & Stewart, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Blue t oot h Boole a n Func t ion 57

Bluetooth BM_Virtual Enterprise Architecture Reference


1: A short-range radio technology aimed at simplifying Model (BM_VEARM)
communications among Internet devices, and between A virtual enterprise (VE) reference model conceived to
B
devices and the Internet. It also aims to simplify data enable the highest organizational/structural/reconiguration
synchronization between Internet devices and other and operational interenterprise dynamics of virtual
computers. (Lalopoulos et al., 2005a) 2: A short-range enterprise or agile/virtual enterprise, employing three main
wireless radio standard aimed at enabling communications mechanisms for VE dynamic creation, reconiguration, and
between digital devices. The technology supports data operation: Market of Resources, Broker, and Virtuality.
transfer at up to 2Mbps in the 2.45GHz band over a 10m Additionally, BM_VEARM implies the highest level of
range. It is used primarily for connecting PDAs, cell integration and (geographic) distribution of VE elements
phones, PCs, and peripherals over short distances. (Garrett, (partners in the VE network). (Cunha & Putnik, 2005)
2006a) 3: A speciication for personal radio networks,
named after the nickname of the Danish king Harald who BNN: See Bayesian Neural Network.
united Norway and Denmark in the 10th century. (Kaspar
& Hagenhoff, 2005) 4: A wireless technology developed Bobby
by Ericsson, Intel, Nokia, and Toshiba that speciies how A Web page accessibility validation service provided by
mobile phones, computers, and PDAs interconnect with the Center for Applied Special Technologies (CAST); uses
each other, with computers, and with ofice or home the W3Cs Web Content Accessibility Guidelines, and
phones. The technology enables data connections between evaluates Web pages for possible errors and ranks them
electronic devices in the 2.4 GHz range. Bluetooth can in order of priority. (Yu, 2005a)
replace cable or infrared connections for such devices.
(Bose et al., 2005) 5: A wireless networking protocol BOM: See Bill of Materials.
designed to replace cable network technology for devices
within 30 feet. Like IEEE 802.11b, Bluetooth also operates Bone-Based Animation (BBA)
in unlicensed 2.4GHz spectrum, but it only supports data 1: A part of MPEG-4 speciications dealing with the
rates up to 1 Mbp. (Akhtar, 2005) 6: Low-power radio deinition and the animation at very low bit rate of a generic
communication technology similar to cordless phones, articulated model based on a seamless representation of
used to connect up to eight peripherals with a computer the skin and a hierarchical structure of bones and muscles.
over distances of a few meters. Typically used in cordless (Prteux & Preda, 2005) 2: An AFX tool allowing for the
keyboards, or to connect laptops or PDAs with cell-phone compression of virtual human animation, including skin
modems. Competes with IR and 802.11. (Houser & deformations, and also for generic hierarchical animation.
Thornton, 2005) 7: Short-range wireless technology limited (Di Giacomo et al., 2005)
to less than 30 feet. (Lawson-Body et al., 2005) 8: A low-
power wireless-network standard that allows computers, Bookshelf
peripherals, and consumer electronic devices to talk to The combination of text, graphics, audio, and video with
each other at distances of up to 30 feet. (Galanxhi-Janaqi tools that allow the user to navigate, interact, create, and
& Nah, 2005) 9: A wireless telecommunications system communicate the content or his or her own ideas, but
that provides a way to connect and exchange information which lack the links to connect the information. (Bradley
between devices like personal digital assistants or mobile et al., 2005)
phones. (Flavin & Guinalu, 2006)
Boolean Function
BM_VEARM: See BM_Virtual Enterprise Architecture 1: A binary function that maps binary strings (with ixed
Reference Model. length) into a binary value. Every Boolean function can
be written as an expression containing only AND, OR,
BM_Virtual Enterprise and NOT operations. (Muselli, 2005) 2: A function from
A virtual enterprise in total or partial conformance with {0,1}n to {0,1}. A function from a subset of {0,1}n to {0,1}
the BM_Virtual Enterprise Architecture Reference Model is called a partially deined Boolean function (pdBf). A
(BM_VEARM). (Cunha & Putnik, 2005) pdBf is deined by a pair of datasets (T, F), where T (resp.,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
58 Boole a n Que r y Bounda r y Crossing

F) denotes a set of data vectors belonging to positive (resp., Border Meetings


negative) class. (Boros et al., 2005) Brings together some of the members of two or more
B communities of practice in order to foster an interchange
Boolean Query of practices and to trigger thinking processes into the
A query that uses Boolean operators (AND, OR, and NOT) community itself or in the border practices. (Falivene
to formulate a complex condition. A Boolean query example & Kaufman, 2006)
can be university OR college. (Wei & Li, 2005)
Bot
Boolean Reasoning Short for robot. Any type of autonomous software that
Based on construction for a given problem P of a operates as an agent for a user or program, or simulates a
corresponding Boolean function fP with the following human activity. (Sourin, 2006)
property: The solutions for the problem P can be decoded
from prime implicants of the Boolean function fP. (Pawlak Bottom-Up Approach
et al., 2005) 1: Proceeding from the bottom of a hierarchy or process
upwards. This approach involves the community at the start
Boosting of the project. (Gnaniah, Yeo, et al., 2005) 2: Development
1: Assigning and updating weights on data points approach founded upon the principle that communities
according to a particular formula in the process of reining are better placed to coordinate and integrate efforts at the
classiication models. (B. Zhang, 2005) 2: Creation of an local level. (Thompson, 2005)
ensemble of hypotheses to convert a weak learner to strong
one by modifying expected instance distribution. (Leni Bottom-Up Cube Computation
et al., 2005) 3: Generates multiple models or classiiers Cube construction that starts by computing from the
(for prediction or classiication), and to derive weights bottom of the cube lattice and then working up toward the
to combine the predictions from those models into a cells with a greater number of dimensions. (Abdulghani,
single prediction or predicted classiication. (Yeo, 2005) 2005a)
4: One of the most effective types of learners for text
categorization. A classiier built by boosting methods is Bounce Rate
actually a committee (or ensemble) of classiiers, and the A ratio of the number of Web page visitors who enter
classiication decision is made by combining the decisions and then back out (leave) without linking from anything
of all the members of the committee. The members are on the page (e.g., viewing other pages on the site) vs. the
generated sequentially by the learner, who attempts to total number of visitors (total pageviews), expressed as a
specialize each member by correctly classifying the percentage. (Owen, 2006a)
training documents the previously generated members
have misclassiied most often. (Sebastiani, 2005) Boundary
1: A social construction that deines knowledge and people
Bootstrap to be included (or to beneit) from a decision. (Crdoba,
1: A resampling scheme in which surrogate data is 2006a) 2: A systems concept whereby all systems are held
generated by resampling the original data or sampling to have a boundary, and often judgments at the boundary
from a model that was it to the original data. (Burr, 2005a) will yield insightful results. (Green & Hurley, 2006)
2: A European method for software process assessment
and improvement. It enhanced and reined the Capability Boundary Crossing
Maturity Model developed at the Software Engineering 1: The crossing of ones own professional, disciplinary, or
Institute for software process assessment, and adapted expertise boundaries (i.e., knowledge zones), and venturing
it to the European software industry. (Leung, 2005) 3: into others. This is required when people work in situations
Generating artiicial patterns from the given original that require multi-faceted input, where no one possesses all
patterns. (This does not mean that the artiicial set is larger the different types of knowledge necessary (e.g., a medical
in size than the original set; also, artiicial patterns need doctor working with a structural engineer on an artiicial
not be distinct from the original patterns.) (Viswanath et limb project). (Fong, 2006a) 2: Virtual teams are often
al., 2005) characterized by their boundary spanning attributes; that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bounda r y Ele m e nt M e t hod Bra nching 59

is, they usually cross time and distance, and often include shaped surfaces. Most animation programs use this method.
different national (ethnic), organizational, and functional (Cruz et al., 2005)
cultures. (Pauleen, 2005)
B
Bounded Rationality
Boundary Element Method A theory of individual decision making that contends
Numerical method to solve the differential equations with decisions are not made in a purely rational manner, due to
boundary/initial conditions over the surface of a domain. limited cognitive capabilities and incomplete information.
(Kanapady & Lazarevic, 2005) (Moore & Burke, 2005)

Boundary Encounters Box-Jenkins Approach


The ways in which different communities of practice may A very versatile linear approach that can model trend,
meet to exchange knowledge. (Wenn, 2006a) seasonal, and other behaviors by using moving averages,
autoregression, and difference equations. (G.P. Zhang,
Boundary Object 2005)
1: An element that enables community members to
participate together and communicate outside of the BPA: See Business-Process Analysis.
community. (Crdoba, 2006b) 2: As knowledge crosses
three forms of boundaries (syntactic, semantic, and BPEL4WS: See Business Process Execution Language
pragmatic), certain objects assist this knowledge low. for Web Services.
They can be repositories, standard forms, objects and
models, and maps of boundaries. They are both concrete B+-Tree
and abstract objects. (Paquette, 2006a) 3: Describes an A particular form of search tree in which the keys used to
actant that is able to bring a degree of commensurability to access data are stored in the leaves. Particularly eficient
the knowledge practices of different communities for some for key-access to data stored in slow memory devices (e.g.,
shared purpose. It takes knowledge from one community disks). (Tininini, 2005b)
and presents it to another in such a way that it makes sense
to that community. (Wenn, 2006a) BPON: See APON or Broadband PON; Broadband
Passive Optical Network.
Boundary Paradox
In the knowledge transfer process, the giving and receiving BPR: See Business Process Reengineering.
organizations borders must be open to lows of information
and knowledge from the networks and markets in which Braille Embosser
they operate, but at the same time, the organization must Analogous to a regular computer printer, this embosser
protect and nurture its own knowledge base and intellectual outputs Braille text on special Braille paper. It produces
capital. (Chen, Duan, et al., 2006) dots on the thick Braille paper by mechanically striking it
with a set of styluses. These dots follow the Braille code
Boundary Region and can be read by touch. (Lahiri & Basu, 2005)
Those objects that may or may not be in the approximation
set. It is the difference between the upper approximation Brain Drain
and the lower approximation. If the boundary region is The emigration of highly educated workers from developing
empty, the set is said to be crisp. If the boundary region countries to developed countries. (Negash, 2005)
is not empty, the set is rough. (Voges, 2005)
Branch
Boundary Representation (B-Rep) A single path down a decision tree, from root to a leaf node,
In boundary representation, complex geometrical forms denoting a single if-then rule. (Beynon, 2005b)
are described using their boundary surfaces. In this
process, the surface of an object is broken down into Branching
smaller polygons, mainly triangles. This therefore makes A subgraph of a directed graph in which there are no cycles
this type of modeling particularly suitable for irregularly and the indegree of each node is 1 or 0. (Chen, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
60 Bra nching Digit a l Sk ills Broa dba nd

Branching Digital Skills Brick-and-Mortar Organization


The ability of learners to form knowledge in a nonlinear An organization located or serving customers in a
B way as they work in hypermedia digital environments. physical facility, as opposed to a virtual organization.
(Eshet, 2005) (Zhao, 2005)

Brand Bricks and Mortar School


1: A name, term, sign, symbol, or designor a combination 1: Traditional schools where students attend a physical
of themintended to identify the goods and services of school building. (Russell, 2005b) 2: Conventional schools
one seller or a group of sellers, and to differentiate them used for face-to-face classes. (Russell, 2005a)
from those of competition. (Roberts & Schwaab, 2006) 2:
The promise that a Web site, company, product, or service Broadband
makes to its customers. (T.S. Chan, 2005) 1: Refers to a telecommunication service in which a wide
band of frequencies is available to transmit information.
Brand Equity When a wide band of frequencies is available to subscribers,
The value of a brand, measured in inancial terms. (Roberts information can be multiplexed and sent on many different
& Schwaab, 2006) frequencies or channels within the band concurrently. This
means more information can be transmitted in a given
Branding amount of time, just as more lanes on a highway allow more
Campusversities use branding (e.g., McGill sweaters, cars to travel on it at the same time. As a general rule, the
Concordia backpacks) as marketing tactics. A large part greater the bandwidth, the faster the service. (De Weaver,
of what most students hope for is to take on some of the 2005) 2: A class of communication channels capable of
prestigious institutional identity of their university. Any supporting a wide range of frequencies, typically from
community is partly a matter of symbolic identiication. audio up to video frequencies. A broadband channel can
(Boyd & Zhang, 2005) carry multiple signals by dividing the total capacity into
multiple, independent bandwidth channels, where each
Brand Presence channel operates only on a speciic range of frequencies.
The presence of a product offering that is distinguished The term has come to be used for any kind of Internet
from its competitors through the use of a symbol, design, connection with a download speed of more than 56K baud.
or characteristic, or a combination of these. (Brindley, (Vician & Buche, 2005) 3: A digital delivery system using
2006) iber optics to establish an interactive infrastructure that
carries large quantities of interactive information. (Weber
Breadth-First & Lim, 2005) 4: A network capable of delivering high
The method of growing the intermediate result by adding bandwidth. Broadband networks are used by Internet and
items both at the beginning and the end of the sequences. cable television providers. For cable, they range from 550
(Masseglia et al., 2005) MHz to 1GHz. A single TV regular broadcast channel
requires 6MHz, for example. In the Internet domain,
B-Rep: See Boundary Representation. bandwidth is measured in bits-per-second (BPS). (Pagani,
2005a) 5: A service or connection allowing a considerable
Brick and Mortar amount of information to be conveyed, such as video.
1: The direct physical (non-virtual) channel for conducting It is generally deined as a bandwidth of over 2 Mbit/s.
business or exchanging value, typically requiring a speciic (Chochliouros et al., 2005c) 6: A transmission facility
location. (Bahn, 2006) 2: Operations that take place in having a bandwidth suficient to carry multiple voice,
conventional off-line settings as opposed to those that video, or data channels simultaneously. (Singh, 2006b)
take place online. For example, offering items for sale at 7: A type of data transmission in which a single medium
a conventional store as opposed to selling them online. (such as iber optic wire) can carry several channels at
(Aigbedo, 2005) once. Cable TV, for example, uses broadband transmission.
(Braun, 2005c) 8: A new way of connecting to the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Broa dba nd Ac c e ss Broa dc a st Disk 61

Internet that will ensure rapid access, faster download technologies to vastly speed up rates of information transfer
times, and better overall performance such as high- between communication devices such as computers.
resolution, graphics, and CD-quality sound. Broadband (Hin & Subramaniam, 2005b) 3: A telecommunications
B
connections are sometimes also called fat pipes due to network that allows for rapid transmission of voluminous
the substantial amounts of data they can carry compared amounts of information. (Hin & Subramaniam, 2006) 4:
to more traditional narrowband connections, such as A network that operates at a wide band of frequencies.
a modem which delivers variable service quality with In these communications networks, the bandwidth can be
slow download speeds. A broadband connection can be divided and shared by multiple simultaneous signals (for
delivered in several different ways: cable, DSL, ixed voice or data or video). (Barolli & Koyama, 2005a)
wireless, and satellite. (Cosemans, 2005a) 9: High-speed
transmission services such as xDSLs and CATV lines Broadband Passive Optical Network (BPON)
which allow users to access the Internet at signiicantly Features point-to-multipoint architecture for provisioning
higher speeds than dial-up modems or narrowband. (Park access to high-speed broadband applications such as video-
& Lepawsky, 2006) 10: In data communications, generally on-demand over the irst-mile. (Littman, 2006)
refers to systems that provide user data rates of greater
than 2 Mbps and up to 100s of Mbps. (Ngoh & Shankar, Broadband Transmission
2005) 11: Internet connection with a download speed of A form of data transmission in which data are carried
more than 56k band. (Msiska, 2005) 12: Transmission on high-frequency carrier waves; the carrying capacity
facility having a bandwidth suficient to carry multiple medium is divided into a number of subchannels for data
voice, video, or data channels simultaneously, often greater such as video, low-speed data, high-speed data, and voice,
than 512 Mbit/sec. Each channel occupies (is modulated allowing the medium to satisfy several communication
to) a different frequency bandwidth on the transmission needs. (Hentea, 2005a)
medium and is demodulated to its original frequency at
the receiving end. (Negash, 2005) Broadband Wireless Access
A form of access using wireless technologies. (Hentea,
Broadband Access 2005a)
1: A form of Internet access that provides information and
communication services to end users with high-bandwidth Broadcast
capabilities. (Hentea, 2005a) 2: The process of using ADSL, A transmission to multiple unspeciied recipients. (Prata,
iber cable, or other technologies to transmit large amounts 2005)
of data at rapid rates. (Hin & Subramaniam, 2005a)
Broadcast Channel
Broadband Digital Services Unidirectional wireless channel to disseminate a set of
These allow very high data transmission rates, and are the database items periodically to multiple numbers of mobile
most popular and widely used kinds of digital services. users. (Waluyo et al., 2005)
These services include DSL, ADSL, and cable modem
services. (Pease et al., 2005) Broadcast Cycle
A complete broadcast ile. (Waluyo et al., 2005)
Broadband Integrated-Services Data Network
(B-ISDN) Broadcast Database
An ISDN that supports a wider range of voice and non- A mobile database whose contents are being broadcast,
voice applications. (Louvros et al., 2005b) fully or partially, to a population of mobile clients. (Leong,
2005a)
Broadband Network
1: A telecommunications network that can transmit Broadcast Disk
information well above the normal rate (56K) on Distributes data according to a predeined schedule so that
ordinary phone lines. (Hin & Subramaniam, 2005c) 2: A interested clients can pick up the data from the schedule.
telecommunications network that leverages on various (Fiege, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
62 Broa dc a st T V Se r vic e Bucke t

Broadcast TV Service server logs incomplete because some requests are served
A television service that provides a continuous low of by the cache. A related issue is the management of the
B information distributed from a central source to a large cache to improve its hit rate. (Y. Fu, 2005)
number of users. (Hulicki, 2005)
Browser Log
Broker A computer ile (program) running on the clients browser
1: A manager of a virtual enterprise. A broker acts as that lists all requests for individual iles and ads. (Dasgupta
an intermediary with the buyer of goods or services. A & Chandrashekaran, 2005)
broker may also manage and control the ICT and provide
educational services to small and medium enterprises, Browsewrap Agreement
SMEs, or micro-companies. (Richards et al., 2005) 2: Also Generally pertains to accessing information on a Web
called organization coniguration, structure, organization, page. A notice is placed on the Web site informing the user
or architecture manager, a broker is the main agent of that continued use of (browsing) the Web site constitutes
agility and virtuality in an agile/virtual enterprise (A/VE), acceptance of a license agreement (the terms of which are
acting either between two operations of the A/VE (off-line usually made available by the user selecting a link on the
reconigurability, providing agility only) or online with the Web site). (Sprague, 2005)
operation of the A/VE (online reconigurability, providing
virtuality and a higher level of agility). (Cunha & Putnik, BSC: See Balanced Score Card; Base Station
2005) 3: Generically, a certiied entity authorized to link Controller.
two different layers. (Pires et al., 2006)
BSP: See Business System Planning.
Brokerage
The activity of connecting two or more unconnected nodes BSS: See Basic Service Set.
in a network. (Dekker & Hendriks, 2006)
BST: See Base Station Transceiver.
Browse
To view formatted documents. For example, one looks at BS7799-2:2002
Web pages with a Web browser. Browse is often used Part 2 is an information security management system
in the same sense as surf. (Singh, 2005a) (ISMS) that adopts a systematic approach to managing
sensitive company information that encompasses people,
Browser processes, and IT systems. (Tassabehji, 2005b)
1: An application that interprets the computer language and
presents it in its inal Web page format. (Falk & Sockel, B2A: See Business-to-Administration.
2005) 2: A client software program used for searching and
viewing various kinds of resources such as information on B2B: See Business-to-Business.
a Web site or on an intranet. (Vaast, 2005) 3: A computer
software program that requests Web pages and other B2B E-Commerce: See Business-to-Business Electronic
associated applications over the Internet, and that can Commerce.
display these iles using the right format. (Dasgupta &
Chandrashekaran, 2005) 4: A software program running B2B Integration Technology: See Business-to-
on a client computer that allows a person to read hypertext. Business Integration Technology.
The browser permits viewing the contents of pages and
navigating from one page to another. Netscape Navigator, B2C: See Business-to-Consumer.
Microsoft Internet Explorer, and Lynx are common
browser examples. (Vician & Buche, 2005) B2E: See Business-to-Employee.

Browser Caching Bucket


A Web browser keeps a local copy of server pages in an An element obtained by partitioning the domain of an
area called a cache on clients computer. This is to avoid attribute X of a relation into non-overlapping intervals.
repeated requests to the server. However, this also makes Each bucket consists of a tuple <inf, sup, val>, where val

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bucke t -Ba se d H ist ogra m Busine ss Alignm e nt 63

is an aggregate information (i.e., sum, average, count, etc.) used for early local Internet service providers, since their
about tuples with that value of X belonging to the interval message board function was a key service. (Paoletti, 2005)
(inf, sup). (Buccafurri & Lax, 2005) 2: A computerized meeting and announcement system
B
that allows people to carry on discussions, upload and
Bucket-Based Histogram download iles, and make announcements without people
A type of histogram whose construction is driven by the being connected to the computer at the same time. In
search of a suitable partition of the attribute domain into the early 1990s, there were millions of BBSs around the
buckets. (Buccafurri & Lax, 2005) world, most very small, running on a single IBM clone
PC with one or two phone lines. Some are very large, and
Buddy List the line between a BBS and a system like CompuServe
Presence awareness technology that allows users to monitor gets crossed at some point, but it is not clearly drawn.
the online status of others. A buddy list window shows (Chim, 2006)
whether buddies are online or off-line. Users double-click
on a screen name of an active friend, and a message is Bullwhip Effect
automatically initiated. (Hwang & Stewart, 2005) 1: A situation in which ineffective network effects occur
because each successive node in the supply chain orders
Buffer Query more supplies than the previous one based on wrong
This spatial query involves two spatial datasets and a assumptions, a lack of communication, and lawed planning
distance threshold d. The answer is a set of pairs of spatial processes. (Hanebeck, 2005) 2: Demand ampliication
objects from the two input datasets that are within distance from its source across the supply chain. This is largely
d from each other. (Corral & Vassilakopoulos, 2005) caused by information asymmetry among the entities in
the supply chain. (Aigbedo, 2005)
Buffet Model of Course Redesign
This model moves instruction away from a ixed menu Burst
of activities and resources to a buffet of choices for In OBS networks, IP packets (datagrams) are assembled
learners, offering a large variety of offerings that can into a very large-sized data packet called a burst.
be customized to it the needs of the individual learner. (Rodrigues, Freire, Monteiro, & Lorenz, 2005)
(Twigg, 2005)
Burst Assembly
Building Block The process of aggregating and assembling packets
1: A basic element or part of something. (Askar & Kocak- into bursts at the ingress edge node of an OBS network.
Usluel, 2005) 2: Relects one of the many the critical success (Rodrigues et al. 2005)
factors of the information technology industry that include:
hardware, software, human resources humanware, Burst Detection
networking, and information. (Kamel, 2005a) The identiication of sharp changes in a time series of
values. Examples of bursts include the increasing use of
Bulkload certain words in association with given events. (Chen,
Adding a (large) set of data to a database rather than Toprani, et al., 2006)
individual tuples. (Schmidt et al., 2005)
Burst Header Packet: See Control Packet.
Bulletin Board
1: A discussion forum, similar to that of Usenet newsgroups, Burst Offset
in which questions and responses are connected in a The interval of time at the source node between the
thread, resembling a conversation. (Teigland & Wasko, processing of the irst bit of the setup message and the
2005) 2: An electronic message database where people can transmission of the irst bit of the data burst. (Rodrigues
log in and leave messages. (Coakes & Willis, 2005) et al., 2005)

Bulletin Board System (BBS) Business Alignment


1: An electronic message center where one can read and Actions to be undertaken by an organization, to answer
respond to comments made by other users. Also a term a market opportunity with the provision of the required

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
64 Busine ss a nd I T Exe c ut ive Busine ss I nt e llige nc e (B I )

product, with the required speciications, at the required Business Intelligence (BI)
time, with the lowest cost, and with the best possible 1: A popularized umbrella term introduced by Howard
B return. (Cunha & Putnik, 2005) Dresner of the Gartner Group in 1989 to describe a set
of concepts and methods to improve business decision
Business and IT Executive making by using fact-based support systems. The decision
A senior person at a business organization, such as the support purpose is to provide managers with information
chief information oficer (CIO), chief technology oficer or business intelligence. The term is sometimes used
(CTO), or chief executive oficer (CEO). (Henry, 2006) interchangeably with briefing books and executive
information systems. A business intelligence system is a
Business and Scientiic Applications data-driven DSS. (Power, 2005) 2: A broad set of tools
End-user modules that are capable of utilizing Analytical and technologies that facilitate management of business
Information Technology along with domain-speciic knowledge, performance, and strategy through automated
knowledge (e.g., business insights or constraints, process analytics or human-computer interaction. (Ganguly et al.,
physics, engineering know-how). Applications can be 2005) 3: Software and a set of tools that allow end users
custom built or pre-packaged and are often distinguished to view and analyze data and business knowledge through
from other information technologies by their cognizance automated analytics or human-computer interaction.
of the speciic domains for which they are designed. This (Khan et al., 2006) 4: Business information systems have
can entail the incorporation of domain-speciic insights transitioned from function-oriented to knowledge-oriented
or models, as well as pre-deined information and process systems. Business intelligence is a study of business rules
lows. (Ganguly et al., 2005) that are the best in practice. Intelligence is the execution
of knowledge. Business intelligence is related to the
Business Complexity knowledge acquisition, repository, sharing, and application
Degree of dificulty associated with supplier- and customer- in the activities of an organization. Business intelligence
facing processes. It incorporates diversity and volatility is becoming a necessity to most business organizations to
aspects. (Setzekorn et al., 2005) be carried out in their business procedures and functions.
Business intelligence has now emerged as a sharable
Business Ecosystem commodity embodied in commercial software and is
A system in which companies work cooperatively and no longer something that could only be possessed by a
competitively to support new products, satisfy customers, small bunch of experts. (Li, 2005a) 5: Deployment of
and create the next round of innovation in key market (usually artiicial intelligence-based) techniques such as
segments. (Lee et al., 2006) On-Line Analytical Processing and data mining to analyze
information in the operational data sources. (Trcek, 2005)
Business Engineering 6: Information that enables high-level business managers
The integral design of both organizational structures and and executives to make strategic and long-term business
information systems. (Janssen, 2005) decisions. (Athappilly & Rea, 2005) 7: The process of
gathering information in the ield of business. The goal is
Business Games to gain competitive advantage. The information gathered
Computer-based simulations designed to teach business- usually refers to customers (their needs, their decision-
related concepts. (Proserpio & Magni, 2005) making processes), the market (competitors, conditions
in the industry), and general factors that may affect the
Business Incubators market (the economy at large, technology, culture). (Badia,
Proper t y-based organizations with identif iable 2006) 8: The type of detailed information that business
administrative centers focused on the mission of business managers need for analyzing sales trends, customers
acceleration through knowledge agglomeration and purchasing habits, and other key performance metrics
resource sharing. The main role of the incubator is to assist in the company.(Zhu, 2005) 9: A term used in two ways:
entrepreneurs with business start-ups and development. (1) as a synonym for competitive intelligence, and (2) to
(Moodley, 2005) indicate a speciic set of ICT tools to support managerial
decision making. This set of tools often consists of a data

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Busine ss M ission Busine ss Proc e ss Exe c ut ion La ngua ge for We b Se r vic e s (BPEL4 WS) 65

warehouse and the tools to store, retrieve, and present Business Process
the information it contains (e.g., data-mining software). 1: A collection of interrelated work tasks initiated in
(Vriens, 2005a) response to an event that achieves a speciic result for the
B
customer of the process. (Sundaram & Portougal, 2005a)
Business Mission 2: A collection of business activities which take several
A basic role or function that a irm performs in a speciic inputs and creates one or more outputs. (Johnston, 2005)
environment. (Cepeda-Carrin, 2006) 3: A process at the business layer of an organization.
Since the 1990s, the focus of any business reengineering
Business Model project and one of the central inputs for IT design. It is
1: A speciic arrangement of organizational strategies, sometimes also used as a synonym for worklow. (Heucke
goals, processes, resources (technologies, inances, people, et al., 2005) 4: A series of related activities performed by
etc.), structures, products, and services that enable a staff in a business organization to achieve a speciic output
irm to successfully compete in the marketplace. Many (for example: loan processing). (Henry, 2006) 5: A set of
EC researchers have taken a narrower view, based on interrelated activities performed in an organization with
organizations involved (i.e., B2B, B2C, B2G, etc.) or speciic the goal of generating value in connection with a product
framework used (i.e., hierarchy, hub, or intermediary for or service. (Kock, 2006) 6: A set of one or more linked
e-markets). While there is not yet a consensus about what activities which collectively realize a business objective
makes up a business model, the trend is away from a or goal, normally within the context of an organizational
narrower view. (Craig, 2005) 2: Architecture for products, structure. (Cardoso, 2006) 7: A set of organized
services, and information lows, including descriptions of work-related tasks and resources to pursue a speciic
the various business actors and their roles, the potential organizational objective inluencing learning experiences
beneits, and the sources of revenue. (Shan et al., 2006b) by deining two speciic relationships: process-based roles
3: Means by which a new venture will attract and serve (between business process and people) and learning tasks
customers, in order to generate revenue and proit. (Craig, (between business process and information systems).
2006b) 4: The method of doing business by which a (Rentroia-Bonito & Jorge, 2005) 8: A term widely used
company can generate revenue to sustain itself. (Lee et al., in business to indicate anything from a single activity,
2006) 5: With regard to business models, we must verify such as printing a report, to a set of activities, such as an
which cooperation partner is responsible for which partial entire transaction cycle. Sometimes used as a synonym of
tasks. We can either assign services that have been provided transaction cycle. (Dunn & Grabski, 2005) 9: The sequence
by the public sector to the private sector (privatization), of activities, the people, and the technology involved in
or both cooperation partners can invest resources to carrying out some business or achieving some desired
accomplish these tasks (partnership). Outsourcing is an results in an organization. (Galatescu, 2005) 10: Business
example of privatization, while franchising is an example transactions that realize a business objective. (Johannesson,
of partnership. (Knust & Hagenhoff, 2005) 2005) 11: The interaction, coordination, communication,
and decision choices made by organizations in order to
Business Opportunity transform inputs (resources)personnel, equipment,
Perfect time interval to eficiently match a speciic market technology, information, energy, capital, and so forthinto
need to a core competence and available capacity. (Pires products or services of added value to the customer/citizen.
et al., 2006) (Joia, 2006) 12: The speciic processes into which each
primary activity of the value chain can be decomposed.
Business Performance (Scupola, 2005)
Relects an organizations overall results and is often
measured using a number of inancial measures; for Business Process Execution Language for Web
example, annual sales revenue, sales growth, annual proit, Services (BPEL4WS)
and proit growth. Rather than seek empirical data, some Provides a language for the formal speciication of business
studies ask managers for their perceptions, for example, processes; extends the Web services model and enables it
their perception of sales growth compared to competitors. to support business transactions. (Cardoso, 2006)
(Cragg & Todorova, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
66 Busine ss Proc e ss (of a V ir t ua l Ent e rprise ) Business Va lue

Business Process (of a Virtual Enterprise) is deined in terms of existing objects. (Halpin, 2005)
A set of linked activities that are distributed at member 2: Originally, a statement that deines or constrains the
B enterprises of the virtual enterprise and collectively realize evolution of data pertaining to an enterprises business.
its common business goal. (Protogeros, 2006) Business rules usually are implemented by integrity
constraints or triggers, or stored procedures. (Decker, 2005)
Business Process Outsourcing 3: Statement that deines or constrains business objects,
Service recipients hand over the responsibility for the their behavior, and relationships. Usually expressed in a
execution of complete business processes to service semiformal language, using a vocabulary of business terms
providers. Most of the business processes in business and verbs such as have to, should, and must. (Badia, 2005b)
process outsourcing are IT-related processes. (Beulen, 4: Statements that model the reaction to events that occur in
2005) the real world, having tangible side effects on the database
content. They respond to application needs. (Rivero, 2005)
Business Process Reengineering (BPR) 5: Precise statements that describe, constrain, and control
1: Any radical change in the way in which an organization the structure, operations, and strategy of a business. They
performs its business activities; BPR involves a may be thought of as small pieces of knowledge about a
fundamental re-think of the business processes followed business domain. (Cilia, 2005)
by a redesign of business activities to enhance all or most
of its critical measurescosts, quality of service, staff Business Rule Extraction
dynamics, and so forth. (Colmenares & Otieno, 2005) 2: Enables concise business rules to be extracted from
Analysis and redesign of worklow within and between within legacy programs and across entire legacy systems.
enterprises. (Sarmento, 2005) 3: The analysis and redesign (Raisinghani, 2005)
of processes within and between organizations. Usually
differentiated from process improvement, which is less Business Strategy
transformational. (Mendonca, 2005) 4: The fundamental 1: A description of the plans, actions, or steps an
rethinking and radical redesign of business processes to organization intends to take in order to strengthen
achieve signiicant improvements of the performances, and grow itself. (Johnston, 2005) 2: The main way the
such as cost, quality, service, and speed. (Aversano et organization chooses to compete; for example, via cost
al., 2005) 5: Related to the alignment between business leadership, differentiation, niche, and so forth. (Cragg &
processes and the ERP business model and related best Todorova, 2005)
practices. This process will allow the improvement of the
software functionality according to current and future Business System Planning (BSP)
organization needs. Managers must decide if they do IBMs developed methodology of investing in information
business process reengineering before, during, or after technology. An example of a system approach methodology
ERP implementation. (Esteves & Pastor, 2005) 6: Redesign of developing an information system. (Janczewski &
of business processes with the purpose of a dramatic Portougal, 2005)
improvement in business performances and productivity.
(Peterson & Kim, 2005) Business Term
Word or expression denoting a concept that has a particular
Business Q&A Exchange meaning in the context of an enterprise. (Badia, 2005b)
One of the most popular knowledge exchanges in knowledge
communities. The most reined software structure is called Business Value
Q&A community. (Yamazaki, 2006) The overall value that an investment brings to a corporation.
Examples of performance measures of the business value
Business Rule of electronic commerce can be: (1) proitabilitythat is,
1: A constraint or derivation rule that applies to the business whether electronic commerce contributes to an increase
domain. A static constraint restricts the possible states of in the proitability of the corporation; or (2) competitive
the business, and a dynamic constraint restricts the possible advantage that could be measured as an increase in
transitions between states. A derivation rule declares how market share, shareholder value, or customer satisfaction.
a fact may be derived from existing facts, or how an object (Scupola, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Busine ss-Cont inuit y Pla nning Busine ss-t o-Consum e r (B2 C) 67

Business-Continuity Planning business applications and services that allow small and mid-
The objective of business-continuity planning is to sized organizations and divisions of large enterprises to
counteract interruptions to business activities and critical connect employees, customers, and suppliers for improved
B
business processes from the effects of major failures or eficiency. (Passi et al., 2005)
disasters. (Tong & Wong, 2005a)
Business-to-Business Electronic Commerce
Business-Episode Concept (B2B E-Commerce)
The approach to classify and cluster public services by 1: A transaction that occurs between and among irms that
repeating speciic situations that often occur during the are related to the procurements of goods and/or services
life of a citizen resp. the different periods of an enterprise. through electronic medium. The typical medium of
Typical examples are marriage for a citizen and VAT transaction is the Internet and World Wide Web. (Aigbedo,
declaration for a company. (Werth, 2005) 2005) 2: The process for conducting transactions involving
the exchange of valued goods, information, or services for
Business-Process Analysis (BPA) monetary or non-monetary compensation between two or
A set of technologies that provide support for obtaining more business organizations. (Turner, 2006) 3: Focuses on
relevant properties of business-process models in order direct transactions between businesses and end consumers.
to reason about them, detect functional errors, or improve Consumers are able to purchase goods and services such
their performance. (Fisteus & Kloos, 2006) as books, computer products, or music, at any time that
is convenient to the consumer. (Peszynski, 2005) 4: Any
Business-to-Administration (B2A) business transaction conducted between two business
Data interchange between commercial organizations and entities. An example is where a manufacturer buys raw
government bodies using e-technologies such as EDI or material from a supplier over the Internet. (Gangopadhyay
an Internet Web site. A component of e-government. & Huang, 2005) 5: The sale of products or services, or
(Whiteley, 2006) an information exchange, among two or more businesses
through electronic technology, usually involving the
Business-to-Business (B2B) Internet, through a public or private exchange. (Mockler
1: Business made electronically (mainly by Internet) et al., 2006)
between companies by the selling or purchasing of goods
or services. Includes data interchange. (de Medeiros Business-to-Business Integration Technology
et al., 2006) 2: A business that provides some kind (B2B Integration Technology)
of services or sells some product to other businesses. A software system that provides business-to-business
(Youn & McLeod, 2006) 3: Interactions between two integration functionality by sending and receiving
businesses, such as transfers of information, purchases messages, and retrieving and storing them in back-end
and so forth, are said to follow a B2B format. (Baim, application systems. (Bussler, 2005a)
2006a) 4: Business-to-business trading involves the sale
of goods or services by one business to another business. Business-to-Business Model
(Braun, 2005c) 5: E-procurement systems improve the Provision of education content to another institution, which
eficiency of the procurement process by automating and then enters the teaching and learning agreements with the
decentralizing the procurement process. The traditional learner. (Robinson, 2005)
methods of sending Request for Quotes (RFQ) documents
and obtaining invoices are carried out over the Web Business-To-Business Transaction
through purchasing mechanisms such as auctions or other Electronic commercial transaction from business to
electronic marketplace functions, including catalogs. business. (Pierre, 2006a)
(Mller, 2005) 6: A business selling goods and/or services
online to another business. (Toland, 2006) 7: Commercial Business-to-Consumer (B2C)
transactions between commercial trading partners using 1: Retail selling via the Internet. (de Medeiros et al., 2006)
e-technologies such as EDI or an Internet e-shop. (Whiteley, 2: Interactions between a business and its customers are
2006) 8: Automated processes between trading partners. said to follow a B2C format. In common usage of the
(Shih & Fang, 2006) 9: Used to describe an e-business term B2C, the distinction between customers (purchasers
solution that caters to other businesses. It offers integrated of a product/service) and consumers (end users of a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
68 Busine ss-t o-Consum e r M ode l Byt e -Code

product/service) is not rigorously made. (Baim, 2006a) Buyer-Driven Value Chain


3: Involves the sale of goods or services by a business The customer states what he or she wants and sets out
B directly to individual customers. (Braun, 2005a) 4: A the terms and conditions that the supplier should meet.
form of e-commerce applications in which the seller is a (Jeffcoate, 2005)
business organization and the buyer is consumer. A typical
example is Amazon.com. (Hwang & Stewart, 2006) 5: A Buyers Reservation Price
business selling goods and/or services online to private The maximum unit price that the buyer is willing to pay
customers. (Toland, 2006) 6: An e-commerce business for an item. The buyers reservation price is typically
model that facilitates transactions between a company and drawn from a uniform or normal distribution. (Dasgupta
a consumer, as opposed to a transaction between companies et al., 2006)
(called B2B) or a transaction between consumers (C2C).
(OBuyonge & Chen, 2006) 7: Commercial transactions Buying Process
between commercial organizations and members of the In B2B settings, buying raw materials, maintenance,
public, typically using an Internet e-shop. (Whiteley, repairs, and operating supplies is a necessary business
2006) 8: In this method, products or services are sold activity involving multiple decision makers and formal
from a irm to a consumer. (Shih & Fang, 2006) 9: Any vendor selection and evaluation procedures. (Bridges et
business transaction conducted through the Internet al., 2006)
between a business and a consumer. An example includes
a commercial Web site that sells products to individual Buzz
customers. (Gangopadhyay & Huang, 2005) 1: A buzzword referring to word-of-mouth off-line or
on the Internet. (Goldsmith, 2006) 2: Word of mouth or
Business-to-Consumer Model social communicationconsumers talking to consumers,
Provision of educational content directly to the learner. spreading inluence and information. (Waterson, 2006)
(Robinson, 2005)
Byte Hit Rate (BHR)
Business-to-Consumer Transaction The ratio of bytes served by the cache over the total number
Electronic commercial transaction from business to of bytes requested by the clients. BHR can be signiicantly
consumer. (Pierre, 2006a) different from HR in a case where only a few large iles
are being served by the cache. (Danalis, 2005)
Business-to-Employee (B2E)
Intranets or knowledge management systems provide Byte-Code
the employee with an updated personalized portal to the This machine-independent code is translated into the
enterprise on his desktop. The perspectives of the intranet machine language of the computer on which it is running.
and knowledge management systems increase in the context (Lucas, 2005)
of the ERP II concept. (Mller, 2005)

Busy Hour
The hour at which a mobile telephone network handles the
maximum call trafic in a 24-hour period. It is that hour
during the day or night when the product of the average
number of incoming calls and average call duration is at
its maximum. (Mani et al., 2005)

Buy-and-Hold Strategy
An investment strategy for buying portfolios of stocks
or mutual funds with solid, long-term growth potential.
The underlying value and stability of the investments are
important, rather than the short- or medium-term volatility
of the market. (Hou, Sheng, et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
CA CAGR 69

C
CA: See Certificate (or Certification) Authority; Cache Replacement Policy
Conditional Access Service. The policy to choose a data item or object to be deleted
from the cache when a new data item or object is stored
CA AT: See Computerized Assisted Auditing to a full cache. (Tse, 2006)
Technique.
Cache Result
Cable Access The Result of a group-by is obtained from other group-by
A form of broadband access using a cable modem attached computation (in memory). (Tan, 2005a)
to a cable TV line to transfer data. (Hentea, 2005a)
Caching
Cache 1: A replication method where access to frequently used
1: A region of a computers memory which stores recently data is optimized. In remote caching, a primary copy of
or frequently accessed data so that the time of repeated the frequently used data is normally stored on a very fast
access to the same data can decrease. (Lin et al., 2005) 2: medium to optimize access to data. In local caching, an
Disk space used to store the documents loaded from the often inconsistent secondary copy of the frequently used
server for future use. (Kacimi et al., 2005) 3: A storage area data is stored in or close to the location of some users to
on the user computers hard disk where recently viewed optimize their access to the data. (Frank, 2005a) 2: The
Web pages are stored. (Dasgupta & Chandrashekaran, technique of copying data from a server machine (the
2005) 4: Memory that mirrors often-used parts of a slower central storage place) to a client machines local disk or
but larger memory. The term cache mainly refers to the memory; users then access the copy locally. Caching
function, not to the memory technology. Cache can be reduces network load because the data does not have to
standard random access memory that is used to speed up be fetched across the network more than once (unless the
disk access, but it also can be very specialized high-speed central copy changes). (Bose et al., 2005) 3: Using a buffer
memory that is used to speed up processor access to main within your own computers fast memory to hold recently
memory. (Meixner, 2005) accessed data. Designed to speed up access to the same
data later. (Cosemans, 2005b)
Cache Invalidation
The procedure of validating whether the cached data Caching Proxy
is consistent with the master copy at the server. (Xu, A caching proxy or proxy server or proxy is a server that
2006) acts as an intermediary between a client and a content
server. It intercepts the requests of the client and checks
Cache Memory whether it can serve the client from its own cache, and if
A technology developed to reduce ile download time and not, it forwards the requests to the content server. (Katsaros
maximize network performance. (Szewczak, 2005) & Manolopoulos, 2005a)

Cache Replacement CAD: See Computer-Aided Design.


The procedure of inding the victim data item(s) to be
dropped from the cache in order to allocate suficient cache CAFS: See Content-Addressable File Store.
space for an incoming data item. (Xu, 2006)
CAGR: See Cumulative Annual Growth Rate.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
70 CAI Ca pa bilit y M at urit y M ode l (CM M )

CAI: See Computer-Assisted Instruction. biometric sample in order to generate multiple variants to
represent the same person. (Li, 2006)
C Calculative Trust
Trust based on the weights of the costs and beneits of Candidate Generation
certain actions, and on a view of man as a rational actor. Creating new subgraphs out of smaller ones; then it checks
(Huotari & Iivonen, 2005) to see how often this new subgraph appears in the analyzed
graph database. (Fischer & Meinl, 2005)
Calculative-Based Trust
Trust based on the calculation that it is not in the best Candidate Key
interest of the trusted party to cheat or take advantage Minimum set of attributes that uniquely identify each
of the situation, regardless of his or her trustworthiness. tuple of a given relation. One candidate key is selected as
(Paravastu & Gefen, 2006) the primary key. (Alhajj & Polat, 2005a)

Calculus-Based Trust (CBT) CAP: See Carrierless Amplitude-Phase.


Trust that is grounded in both the fear of punishment and
the rewards for preserving the trusting relationship. (Wang Capability
& Gwebu, 2006) Any method, tool, or piece of knowledge that supports the
achievement of a goal. (Berztiss, 2006a)
Calibration
Correspondence between accuracy and confidence. Capability Differential
Calibration exists when there is correspondence. Resource and competence coniguration, that is to say,
(Goldsmith & Pillai, 2006) a coniguration to reach competitive advantage sources.
(Cepeda-Carrin, 2006)
CAL: See Computer-Aided Learning.
Capability Maturity Model (CMM)
CALL: See Computer-Assisted Language Learning; 1: A framework to achieve maturity in project activities
Computer-Aided Language Learning. in the software ield which presents ive maturity levels,
each corresponding to a set of structural requirements for
Call-Back Locking (CBL) key process areas. (Monteiro de Carvalho et al., 2005)
An avoidance-based protocol that supports inter- 2: A methodology used to evaluate an organizations
transactional page caching. Transactions executing under software development process. The model describes a
an avoidance-based scheme must obey the read-once ive-level evolutionary path of increasingly organized and
write-all (ROWA) replica management approach, which systematically more mature processes. (Hawk & Kaiser,
guarantees the correctness of data from the client cache by 2005) 3: A model used to assess the capability and the
enforcing that all existing copies of an updated object have maturity of a software process. The CMM levels range from
the same value when an updating transaction commits. 1 (initial, ad hoc) to 5 (optimizing, process improvement).
(Parker & Chen, 2005) (Gaffar & Seffah, 2005) 4: A model containing the
essential elements of effective processes for one or more
CALT: See Computer-Assisted Language Testing. disciplines. Also describes an evolutionary improvement
path from ad hoc, immature processes to disciplined,
CAM: See Computer-Aided Manufacturing. mature processes with improved quality and effectiveness.
(Gibson, 2005) 5: Developed at the Software Engineering
Camera Calibration Institute of Carnegie-Mellon University and also known
A process of setting digital imaging components to as CMM-SW, this model helps a software development
standardized settings that will produce accurate and organization to identify its strengths and weaknesses, and
predictable results in the output. (Ozer et al., 2005) provides a well-deined plan for improvement. (Berztiss,
2006a) 6: A ive-level framework laying out a generic
Cancelable Biometrics path to process improvement for software development
A technique that allows the user to choose non-invertible in organizations. (Brewer, 2005) 7: A suite of models
transformation functions to be operated on his/her original that update and upgrade the CMM. (Berztiss, 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ca pa bilit y Ta ble Ca rrie r 71

8: An integration of best practices from proven process and knowledge base that can then be leveraged for achieving
improvement models, including the SW-CMM, EIA731, other, more broad goals. (M. Mitchell, 2005b)
and the Integrated Product Management CMM. Included
C
are tools that help organizations improve their ability Capacity Miss
to develop and maintain quality products and services. This miss occurs because the cache cannot accommodate all
(Leung, 2005) requested objects. (Katsaros & Manolopoulos, 2005a)

Capability Table Capacity Provisioning Network (CPN)


A list that speciies data items or physical devices (for A network of cache servers owned, operated, and
example, printers) that users are authorized to access. coordinated through capacity trading by different Internet
(Mattord & Whitman, 2005) service providers. Unlike a Content Distribution Network
(CDN) with the purpose of replicating content from
Capability Transformation Model speciically contracted content providers, the CPNs goal
Traditional logistics, transport, and warehousing is to cache whatever content users access from around the
capabilities are based on the ability to provide physical world of content servers. Qualitatively, a CDN services
resources to assist the customer. These appear to be the supply side of content distribution; a CPN services the
transforming, with the inclusion of knowledge-based demand side. (Katsaros & Manolopoulos, 2005a)
skills and service additions. For example, an e-fulillment
provider may extend traditional supplier-pickup services CAPE: See Computer-Aided Production Engineering.
(which is a physical outcome) to an offer to manage
a complete supplier relationship (which is based on Caption
knowledge of contracts and supplier environment). Note 1: A short textual description used to summarize a picture,
that the mere inclusion of an information system (for table, or other non-text information. (Fagan, 2005) 2: Text
example, a track-and-trace system in a transport operation) describing a media object. (N.C. Rowe, 2005b)
does not imply a knowledge capability, but rather is a
means to improve a physical capability. Such a model can Cardinality Constraints
be used to assess each of a providers capabilities for the One constraint established in a relationship. It limits the
balance between physical and knowledge-based outcomes, number of entity occurrences that are associated in a
and arrive at an index representing the overall degree relationship. (Cuadra et al., 2005)
of knowledge-based outcomes offered by the company.
(Alexander & Burn, 2006) Career Management Account (CMA)
A federal Department of Labor initiative under the Clinton
Capacity Administration that was intended to provided a Web-based
The amount of stimuli that can be noticed and processed lock-box for career and education-related information.
in a given time period, or the number of concurrent issues (Wasko, 2005)
that can be processed by a decision maker. (Yaniv &
Schwartz, 2006) Career Trajectory
Describes the positions, roles, and experience that
Capacity Building individuals have accumulated, up to and including the
Building the skills, commitment, and conidence of position they currently hold. (Ali & Warne, 2005)
community members to develop networks to inluence
what happens around them in their environment, and give CareerOneStop
them the capability to contribute to shaping and planning The federal Department of Labors Web-based gateway to
their communitys future. (Sutcliffe, 2005) job listings, rsums, and career information nationwide.
(Langer, 2005)
Capacity Building Program
A strategy for training targeted individuals in an Carrier
organization, sector, or discipline to develop speciic skills A transmitted signal that can carry information, usually in
the form of modulation. (Chochliouros et al., 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
72 Ca rrie r Se nsing CASE Tool

Carrier Sensing Case Grammar


Determination that the medium is not being used by a A linguistic theory of the ways in which an action can be
C neighboring transmitter before accessing the channel. associated with other concepts. (N.C. Rowe, 2006d)
(Erbas, 2005)
Case History
Carrier-Neutral Collocation Facility Specialized historical research focusing on failure
A facility, especially in a city, built by a company to allow incidents. Case histories emphasize the background and
the interconnection of networks between competing service context that can help in untangling relationships and
providers and for the hosting of Web servers, storage causes. (Dalcher, 2005)
devices, and so forth. These are rapidly becoming the
obvious location for terminating customer-owned dark Case Mix Information System (CMIS)
iber. (Such facilities, also called carrier-neutral hotels, An information system, fed with data from an array of
feature diesel-power backup systems and the most stringent hospital subsystems, for the principal purpose of clinical
security systems. They are open to carriers, Web-hosting and inancial audit of patient cases. Further developments
irms and application service irms, Internet service to CMIS have seen other functionality added, such as
providers, and so forth. Most of them feature a meet-me contract planning, quality assurance, waiting lists, and
room where iber cables can be cross-connected to any clinical support. (Barnes, 2005)
service provider within the building. With a simple change
in the optical patch panel in the collocation facility, the Case Study
customer can quickly and easily change service providers 1: A detailed analysis of a person or group from a social,
on very short notice.) (Chochliouros et al., 2005a) psychological, or medical point of view. A careful study
of some social unit (a corporation or a division within a
Carrier-Sense Multiple Access (CSMA) corporation) that attempts to determine what factors led
A Media-Access Control (MAC) protocol in which a node to its success or failure. (Sarmento, 2005) 2: A scenario
veriies the absence of other trafic before transmitting on used to illustrate the application of a learning concept. May
a shared physical medium, such as an electrical bus or a be either factual or hypothetical. (Snchez-Segura et al.,
band of electromagnetic spectrum. Carrier sense describes 2005) 3: A systematic way of looking at what is happening,
the fact that a transmitter listens for a carrier wave before collecting data, analyzing information, and reporting
trying to send. That is, it tries to detect the presence of an the results. (M. Mitchell, 2005b) 4: An examination of a
encoded signal from another station before attempting to phenomenon in its natural setting using ixed boundaries
transmit. Multiple access describes the fact that multiple such as time. (Trauth, 2005b) 5: An instruction tool
nodes may concurrently send and receive on the medium. containing a detailed description of a real-world situation.
(Dhar, 2005) (Pendegraft, 2005) 6: Investigation of phenomena in a
naturalistic setting, conducted to enable in-depth analysis
Carrierless Amplitude-Phase (CAP) of that phenomena. (Dalcher, 2005) 7: Research conducted
A modulation technique in which the entire frequency range to assess a single instance of a phenomenon. (Schifter,
of a communications line is treated as a single channel 2005) 8: The intensive examination of a single instance
and data is transmitted optimally. (Hin & Subramaniam, of a phenomenon or where one or just a few cases are
2005a) intensively examined using a variety of data-gathering
techniques. (Thompson, 2005)
CART: See Classiication and Regression Tree.
Case Study Research
Cartography An in-depth investigation that attempts to capture lessons
The art, science, and engineering of mapmaking. (Sadoun, learned through studying the environment, procedures,
2006) results, achievements, and failures of a particular project
or set of circumstances. (McPherson, 2005)
CAS: See Course Applicability System.
CASE Tool
CASE: See Computer-Aided Software Engineering. A software tool that helps software designers and
developers specify, generate, and maintain some or all

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ca se -Ba se d Ex pe r t Syst e m Cat e gor y T he or y (CT ) 73

software components of an application. Most CASE tools a mathematical construct (like the roots of a tree) can go
provide functions to allow developers to draw database much wider and deeper than can be seen in the construct
schemas and to generate the corresponding DDL code. as such. The result is that in mathematical modeling, an apt
C
(Hainaut et al., 2005) formal counterpart F of a real-world phenomenon/artifact
W can give much more than initially expected from stating
Case-Based Expert System the correspondence F models W. The history of applying
An expert system that uses modeled representations of mathematics to science and engineering is full of examples
previous cases and decisions to make inferences about of when formalisms turned out to be surprisingly clever
new cases. (Svensson, 2005) in their modeling and predictive capabilities. (Gaffar &
Seffah, 2005)
Case-Based Learning (CBL)
Stemming from case-based reasoning, the process of Categorization
determining and storing cases of new problem-solution 1: The process of deducing, from the content of an artifact,
scenarios in a casebase. (Soh, 2006) the potentially multiple ways in which the artifact can be
classiied for the purpose of later retrieval from a database,
Case-Based Reasoning (CBR) library, collection, or physical storage system. (Heucke et
1: A reasoning process that derives a solution to the al., 2005) 2: A cognitive process based on similarity of
current problem based on adapting a known solution to mental schemes and concepts in which subjects establish
a previously encountered, similar problem to the current conditions that are both necessary and suficient (properties)
one. (Soh, 2006) 2: An Artiicial Intelligence approach to capture meaning and/or the hierarchy inclusion (as part
that solves new problems using the solutions of past cases. of a set) by family resemblances shared by their members.
(Lorenzi & Ricci, 2005) Every category has a prototypical internal structure,
depending on the context. (Amoretti, 2005)
Casebase
A collection of cases with each case containing a problem Category
description and its corresponding solution approach. 1: A collection of objects or entities that is a subset of
(Soh, 2006) the union of different entity types; entities offering a
similar role are grouped into a category. (Bagui, 2005)
Catalog 2: Special type of entity that represents the union of two
The collection of records used to describe and locate the or more different entity types. (Mani & Badia, 2005) 3:
items contained in a library. (Hnisch, 2005) A set of levels of observed actions or choices made by an
individual. (Medlin et al., 2006)
Categorical Attribute
An attribute that takes values from a discrete domain. Category Attribute
(Gehrke, 2005) The variable that describes the summary data of an
aggregate data structure. (Rafanelli, 2005)
Categorical Data
Fits into a small number of distinct categories of a discrete Category 5 Ethernet (Cat5)
nature, in contrast to continuous data; may be ordered The most common form of cable used for networking
(ordinal), for example, high, medium, or low temperatures, containing (four) twisted pairs of copper wire, supporting
or non-ordered (nominal), for example, gender or city. data transmission speeds of 100 Mbps. (D. Stern, 2005)
(Zhu, 2005)
Category Theory (CT)
Categorical Models Power A branch of modern algebra, providing a language and
As a rule, formal mathematical constructs appear within machinery for deining and manipulating mathematical
consistent systems of concepts rather than discretely. structures in an abstract and generic way. The method of
Such systems normally explicate some integral non-trivial CT is to present the universe of discourse as a collection of
intuition, partially embedded in each of the constructs objects (nodes) and morphisms (arrows) between them. The
that the system consists of. This way the intuition behind latter can be composed, and so the universe is presented

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
74 Cat 5 CDR

as a category: directed graph with composable arrows. For Causal Loop Diagram (CLD)
example, models of a given sort (meta-model) and mappings 1: A tool that captures the causal interrelationships among a
C between them form a category in a very natural way. If one set of variables. CLDs reveal systemic patterns underlying
wants to work with a heterogeneous universe of models complex relationships, and highlight hidden causes and
(that is, models of different meta-models), one should use unintended consequences. (Maani, 2005) 2: A diagram of
ibrations described in Math-II. The philosophy of CT is two or more variables connected by links, which usually
that everything one wants to say about objects, one must take the form of arrows. These diagrams depict three major
say in terms of arrows between objects. Correspondingly, components: feedback loops, cause-effect relationships,
an objects structure is a structure over its arrow interface. and delays. (Saha, 2005)
This way of deining structures and manipulations with
them is often called arrow thinking. (Diskin, 2005) CBIR: See Content-Based Image Retrieval.

Cat5: See Category 5 Ethernet. CBIS: See Computer-Based Information System.

Cathedral and Bazaar CBL: See Case-Based Learning; Call-Back Locking.


Paper by Eric Raymond (most recent version in 2001) that
contrasts the Cathedral software development approach CBR: See Case-Based Reasoning.
of a closed hierarchy (e.g., for proprietary software and
most open source software such as the earlier GNU Project) CBT: See Calculus-Based Trust; Computer-Based
with the Bazaar approach of loose collaboration with Training.
light centralized moderation (as was the used for the
Linux and Fetchmail open source projects). (Carillo & CCH: See Computerized Criminal History.
Okoli, 2006)
CCR: See Customer Conversion Rate.
Causal Ambiguity
1: Refers to uncertainty, by competitors, regarding the CCNA: See Cisco-Certiied Network Associate.
causes of eficiency and effectiveness of a company,
when it is unclear which resource combinations are ccTLD: See Country Code Top-Level Domain.
enabling speciic competitive capabilities that are earning
the company proits. (Potgieter et al., 2005) 2: The CDI: See Customer Data Integration.
knowability (the extent to which something can be
known) and knowness (the extent to which something CDM: See Common Data Model.
is known) of two sets of elements: the organizational
inputs, and the causal factors that are used in combination CDMA: See Code Division Multiple Access.
to generate outcomes. (Priestley, 2006)
CDMA-2000
Causal Chain Sometimes also known as IS-136 and IMT-CDMA
A sequence of instances of causal relations such that the multi-carrier (1X/3X), CDMA-2000 is an evolution
effect of each instance except the last one is the cause of of narrowband radio transmission technology known
the next one in sequence. (Kontos & Malagardi, 2006) as CDMA-ONE (also called CDMA or IS-95) to third
generation. 1X refers to the use of 1.25 Mhz channel while
Causal Link 3X refers to 5 Mhz channel. (Akhtar, 2005)
1: An arrow on a group map which represents a causal
relationship between the two issues represented by the CDN: See Content Distribution Network; Content
contributions it links. (Shaw, 2006) 2: An arrow that denotes Delivery Network.
the cause-effect relationships between two variables in a
system dynamics model. (Casado, 2005) CDPD: See Cellular Digital Packet Data.

CDR: See Charging Data Record.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
CD-ROM Ce llula r Te le phony 75

CD-ROM: See Compact Disc Read-Only Memory. mobile communication networks. The method relies on
the fact that mobile networks can identify the approximate
CD-ROM Program position of a mobile handset by knowing which cell site
C
Standard computer disk-operated software that runs on a the device is using at a given time. (Giaglis, 2005)
stand-alone computer or on multiple computers through
a ile server. (Switala, 2005) Cell Phone: See Mobile Phone.

CD-Web Hybrid System Cell-ID: See Cell Identiication.


A system combining CD-ROM and Internet technology
to deliver distance education to students. A system that Cellular Communication
looks into achieving the best of both worlds using the Wireless communication between mobile devices (e.g.,
speed of CD-ROMs and the currency of the Internet. This cell phones, PDAs, and PCs) and ixed base stations.
can also be seen as a two-layered model where the CD- The base stations serve relatively small areas of a few
ROM is one layer and the Internet is the other, with each square miles (called cells) and are interconnected by a
carrying out a different function of the system. (Shareef ixed telecommunication infrastructure that provides
& Kinshuk, 2005) connection with other telecommunication systems. As a
mobile device passes from one cell to another, one base
CE: See Computer Engineering. station hands off the communication with the device to
another without disrupting communication. (Melliar-
Cell Smith & Moser, 2005)
A point in the multi-dimensional data space. For a
d-dimensional data cube, it is deined by a d-tuple of Cellular Digital Packet Data (CDPD)
dimension values. A cell contains the values of the measure A wireless standard providing two-way data transmission
attributes of the data item that falls into that cell. If there at 19.2 kbps over existing cellular phone systems. (Akhtar,
is no such data item, then the cell is empty. (Riedewald 2005)
et al., 2005)
Cellular Network
Cell Global Identity (CGI) 1: A wireless communications network in which ixed
Each base station in a cellular network has a unique ID antennas are arranged in a hexagonal pattern, and mobile
that the mobile phone receives when entering the area of stations communicate through nearby ixed antennas.
the base station. Cell global identity uses this unique ID (Ngoh & Shankar, 2005) 2: A network consisting of several
in order to pinpoint the base stations area of coverage in cells served by a ixed, pre-established infrastructure to
which the mobile phone is located. (Ververidis & Polyzos, cover a geographic area, for example GSM, IS-95, UMTS.
2006) (Erbas, 2005)

Cell Global Identity with Timing Advance Cellular Telephony


(CGI-TA) A mobile telephone service employing a network of cell
A positioning method that uses the time needed for a sites distributed over a wide area. Each cell site contains
signal to travel from the mobile phone to the base station a radio transceiver and a base station controller that
to compute the distance between the phone and the mobile manages, sends, and receives trafic from the mobiles in
station. Along with the base stations ID, this method its geographical area to a cellular telephone switch. It also
provides a rough estimation of the position of the phone employs a tower and antennas, and provides a link to the
in the base stations area of coverage. (Ververidis & distant cellular switch called a mobile telecommunications
Polyzos, 2006) switching ofice (MTSO). The MTSO places calls from
land-based telephones to wireless customers, switches calls
Cell Identiication (Cell-ID) between cells as mobiles travel across cell boundaries,
The Cell-ID method is the basic technique to provide and authenticates wireless customers before they make
location services and applications in second-generation calls. (Latchem, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
76 Ce llula r Va lue -Adde d Se r vic e Cat e gorie s Ce nt ra l Rout e t o Pe rsua sion

Cellular Value-Added Service Categories Centralization


Can be categorized as message-based service, entertainment An index at group level, measuring how variable or
C service, inancial service, and information service. (Lee heterogeneous the actor centralities are. It records the
& Pai, 2005) extent to which a single actor has high centrality, and the
other, low centrality. (Assimakopoulos & Yan, 2006)
Censored
Censored cases are those in which the survival times are Centralized Model
unknown. (Chen, Oppenheim, et al., 2005) The concentration of decision making in a single point
in the organization in which a single decision applies.
Census II X-11 (Peterson, 2005)
A method that systematically decomposes a time series
into trend, cyclical, seasonal, and error components. It was Centralized Representation Repository
developed by the Bureau of the Census of the Department A single database in which all real-world entity
of Commerce and is widely used in deseasonalizing representation models are stored, and any information
economic data. (G.P. Zhang, 2005) system willing to access a model that retrieves it from
there. This approach keeps the models consistent, but
Center-Based Clustering shifts the maintenance issues to the client information
Similarity among the data points is deined through a set systems. (Lepouras et al., 2006)
of centers. The distance from each data point to a center
determined the data points association with that center. Centralized Static Virtual Enterprise
The clusters are represented by the centers. (B. Zhang, Refers to a dominant business domain (also called business
2005) integrator) that coordinates the business relationships
among network members. (Tahinakis et al., 2006)
Center of Gravity
The center of gravity of the image is calculated as per the Centralized Strategy
following equation: 1: A managerial approach through which support for
information technology use for all constituencies is
X = (y.Ph [y])/ Ph [y], provided by a single on-campus structure. (Poda &
m m

y =1 y =1
Brescia, 2005) 2: In contrast with decentralization, the
centralized structure is sometimes referred to as vertical,
and bureaucratic, mechanistic, rigid, or inlexible. (Wang,
Chen, et al., 2006)
Y = (x.Pv [x ])/ Pv [x ],
n n

x =1 x =1 Central Limit Theorem


When an ininite number of successive random samples is
where X and Y are the x and y coordinates of the center taken from a population, the distribution of sample means
of gravity of the image, and Ph and Pv are the horizontal calculated for each sample will become approximately
and vertical projections respectively. (Chakravarty et al., normally distributed with mean and standard deviation
2005a) /N (~N(,/N)). (Fernndez & Layos, 2005)

Centrality Central Route to Persuasion


1: An index used to indicate how critical an actor is in A term used in the elaboration likelihood model involving
a network. Degree is the most popular way to measure intense thought and analysis concerning a persuasive
centrality.; see also Betweenness Centrality; Closeness message. The central route to persuasion involves high
Centrality. (Assimakopoulos & Yan, 2006) 2: The extent degrees of message-related thinking or careful scrutiny
to which ties give an individual or subgroup a central about an argument and its merits in order to arrive at an
position in a network. (Dekker, & Hendriks, 2006) evaluation of the advocated message. When the central
route to persuasion is taken, attitudes are thought to be
more accessible, persistent, resistant to change, and better

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Certiication Change Agent 77

predictors of behavior than when the peripheral route is CG: See Computer Graphic.
taken. (Duthler, 2005)
CGI: See Cell Global Identity; Common Gateway
C
Certiication Interface.
1: A procedure by which a third party gives written
assurance that a product, process, or service conforms CGI Program: See Common Gateway Interface
to specified characteristics. Certification involves Program.
assessment. (Leung, 2005) 2: The conirmation that
external professional requirements have been met. (D.B. CGI-TA: See Cell Global Identity with Timing
Johnstone, 2005) Advance.

Certiicate (or Certiication) Authority (CA) CHAID: See Chi-Square Automatic Interaction
1: A trusted third party whose purpose is to sign certiicates Detection.
for network entities that it has authenticated using secure
means. Other network entities can check the signature to Chain Graphical Model
verify that a CA has authenticated the bearer of a certiicate. A graph that contains both undirected and directed links.
(Pulkkis et al., 2005b) 2: An authority that manages the Such models can show both symmetric and asymmetric
allocation of digital identity certiicates to users. The CA relationships; they give rise to graphical chain models.
exists as part of a PKI. The CA in conjunction with a (Giudici & Cerchiello, 2005)
Registration Authority (RA) initially checks to ensure the
identity of a user. Once identity has been conirmed, the Chain of Sustainability
CA issues digital identity certiicates that electronically An evolving, dynamic, and matched mix between company
assure the identity of a user based on the CAs digital resources (arranged in value-generating combinations)
signature. (Mundy & Otenko, 2005) 3: An entity (typically and the changing marketplace that gives the company a
a company) that issues digital certiicates to other entities competitive edge. (Potgieter et al., 2005)
(organizations or individuals) to allow them to prove their
identity to others. (Fortino, 2005) 4: An authority such Challenge and Response
as GlobalSign that issues, suspends, or revokes a digital A cryptographic technique used to identify a client to a
certiicate. (Mitrakas, 2005) 5: An authority trusted server. Server and client share a common secret key. The
by one or more users to create and assign public key server sends bit strings (challenges) to the client who
certiicates. (Trcek, 2005) 6: A trusted third party in a encrypts these strings and resends them to the server
network that issues, signs, and manages certiicates for (response). The server may then check the correctness by
network entities. Technically, a CA provides a set of digital applying the secret key and comparing the result to the
certiicate management services, including veriication. original bit string. (Stickel, 2005)
(Xu & Korba, 2005)
Challenged Project
Certiication Practice Statement A completed and approved project that is over budget,
A statement of the practices of a certiicate authority and late, and has fewer features and functions than originally
the conditions of issuance, suspension, revocation, and so speciied. (Dalcher, 2005)
forth of a certiicate. (Mitrakas, 2005)
Change Advocate
CFF: See Critical Failure Factor. A person or group who supports a change but does not
have the authority to sanction the change effort. (Lick &
C4ISR Kaufman, 2005)
Command, control, communications, computers,
intelligence, surveillance, and reconnaissancea military Change Agent
application framework that makes extensive use of GIS A person or group who is responsible for implementing
technologies. (Morris-Jones & Carter, 2005) the desired change. (Lick & Kaufman, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
78 Cha nge Cre at ion Cha nne l Ava ila bilit y

Change Creation Change Process


The process whereby an institution and its people invite, The process where an individual or group of individuals
C accept, and welcome change as a vital component in works over time and with continual adjustments in
deining and achieving future success; deine the future attitudes, skills, and resources to do something signiicant
they want to design and deliver; and develop and implement differently. In general for the process to be successful, it
a change plan that capably transitions its people, processes, must address a priority need, the essential features of the
and circumstances, and especially its culture, from the change must be deined and practical, and the plan for
existing paradigm to the new, desired one. (Lick & making the change must be based on a realistic assessment
Kaufman, 2005) of what is needed to accomplish it. (Johnson, 2005)

Change Culture Change Readiness


Recognizes the multi-dimensional nature of complex An organizational mindset that welcomes challenges to
change and actively works to create conditions where it established structures and processes and administrative
can thrive. These conditions include but are not limited orthodoxies. (Wright & Taylor, 2005)
to understanding the nature of complex change, providing
research-based support for making complex change, and Change Sponsor
allowing suficient time for complex change to occur. A A person or group who authorizes and legitimizes a change.
fundamental assumption of a change culture is that its (Lick & Kaufman, 2005)
members must think conditionally about their current
knowledge structures, behaviors, and values. Thinking Change Target
conditionally requires individuals consistently to seek new A person or group who must change as a result of the
information that prompts the emergence or enhancement change effort. (Lick & Kaufman, 2005)
of cognitive structures that enable rethinking of prior ideas
and actions. (Johnson, 2005) Change-Based CQs
The CQs that are ired when new data arrives at a source.
Change Management (Khan, 2005)
1: A formal process for planning for and managing change
in an organization. Involves navigation, expeditionary Changes to XML
development, leadership, enablement, and engagement. Given two XML document, the set of edit operations that
(Norris, 2005) 2: An organized application of knowledge, transform one document to another. (Zhao & Bhowmick,
tools, and resources that helps organizations to achieve 2005)
their business strategy. (Partow-Navid & Slusky, 2005) 3:
The process of assisting individuals and organizations in Channel
passing from an old way of doing things to a new way of 1: A chat room on Internet Relay Chat (IRC). The
doing things. (Hyrinen & Saranto, 2005) 4: Successfully /LIST command can be used to list all public channels,
implementing a new position, course, or direction for with the channel topic and number of occupants for each
individuals, processes, or products. (Hanson et al., 2005) channel. (Roberts et al., 2006a) 2: A course or pathway
5: The application of many different ideas from the through which information is transmitted or business is
engineering, business, and psychology ields that focus on transacted. (Bahn, 2006)
observable, measurable business elements. These elements,
which can be changed or improved, include business Channel Availability
strategy, processes, systems, organizational structures, A feature of any communication medium. A communication
and job roles. (Hanson, 2005) 6: The coordination and mediums channel can be contextual, audio, visual, or
action by management required to lead the change of any combination of the three. For example, telephone
organizational systems and structures in order to support is an audio-only communication medium, while
a new business activity or effort. (Ash & Burn, 2006) 7: videoconferencing is an audio-visual communication
The procedure that controls the evolution of public services medium. (Y.D. Wang, 2005)
to keep them consistent with their governing legislation,
user needs, technological developments, and so forth.
(Vassilakis & Lepouras, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cha nne l Ca pa c it y Cha r t e r School 79

Channel Capacity Chaos Theory


1: The maximum possible information rate through a 1: A theory that deals with complex and dynamic
channel subject to the constraints of that channel. (Statica arrangements of connections between elements forming
C
& Deek, 2006) 2: The potential to transmit a high variety a uniied whole, the behavior of which is simultaneously
of cues and languages. (Willis, 2005) both unpredictable (chaotic) and patterned (orderly).
(Smith, 2006b) 2: A theory that describes systems that
Channel Conlict are apparently disordered or uncertain, but which may
Situation in which an e-channel creates a conlict with have an underlying order. An underlying tenet is that
existing channels because of real or perceived damage a small change in the initial conditions can drastically
from inter-channel competition. (I. Lee, 2005) change the long-term behavior of a system. (Burrage &
Pelton, 2005)
Channel Expansion
A theory that posits that as communication participants Characteristic
acquire experience with the communication (channel, topic, Abstraction of a property of a set of objects. For example,
context, co-participants), they increase the richness of their Dan has blue-gray eyes means blue-gray eyes is the
message encoding and message decoding. Technology property of Dan associated with the characteristic eye
leads to increasingly rich communication as users increase color of people. The term property is misused in the
their ability to communicate effectively using the given ISO/IEC 11179 standard. There, it means the same thing
technology. In addition, when individual decision makers as characteristic. (Gillman, 2006)
have a shared knowledge base, they obtain richer results
with leaner media. The channel-expansion theory helps Characteristics of a Virtual Community
to support the notion that decision makers, especially A virtual community is characterized by its level of
remote decision makers, may use a knowledge network for cohesion, effectiveness, helpfulness of members, quality
solving equivocal tasks and for sharing tacit knowledge. of the relationships, language, and self-regulatory
(Croasdell & Wang, 2006) mechanisms. (A. Roy, 2005)

Channel Expansion Effect Characterizing Function


Communication over computer-mediated communication A mathematical description of a fuzzy number. (Viertl,
channels such as the Internet can increase in richness 2005)
and social presence over time, while keeping its nominal
channel capacity. This effect occurs as user experience Character Segmentation
with the medium, the topic, the communication partner, The technique that partitions images of lines or words into
and the communication context accumulates. (Brock & individual characters. (Chan, Ho, et al., 2005)
Zhou, 2006)
Character Set
Channel Flexibility The set of symbols used to represent a language (alphabet,
The convenience and availability of distribution channels numerals, special symbols). (D. Brandon, Jr., 2005b)
other than the Internet which contributes to increased proit
and customer retention. (Wang & Forgionne, 2006) Charging Data Record (CDR)
A speciic ile format that contains call-related data readable
Channel Symmetry from the billing center server. (Louvros et al., 2006)
A feature of any communication medium. A communication
medium affords symmetry if the recipient of a message Charter School
can respond with the same type of message. For example, 1: An independent public school created by teachers,
telephone and e-mail tools are symmetric (two-way) parents, and others with approval of the governing state
communication media, while television and Web sites to create an alternative choice for students seeking a
are asymmetric (one-way) communication media. (Y.D. program that matches their educational interests and/or
Wang, 2005) needs. (Dorniden, 2005) 2: A governance model where the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
80 Cha se Che ck

school exists independent from a larger school district, and Chat Room
is run primarily by teachers and parents. (Glick, 2005a) 1: A Web site, or part of a Web site, that allows individuals
C 3: A public school operated independently of the local to communicate in real time. (Whitty, 2005) 2: An area
school board, often with a curriculum and educational where synchronous, text-based, online conversation can
philosophy different from the other schools in the system. take place. Sometimes conversations can be conducted ad
(Schrum, 2005) hoc, or they can be scheduled for a speciic time and topic.
(Coakes, 2006b) 3: Interactive conversation involving
Chase several people (via typing on a computer terminal or PC)
A kind of a recursive strategy applied to a database V, usually centered on a single topic utilizing the Internet.
based on functional dependencies or rules extracted Occasionally members of the chat room break off to form
from V, by which a null value or an incomplete value a smaller, more intimate conversation, to the exclusion of
in V is replaced by a new, more complete value. (Ras & all others, thus invoking privacy privileges. (Friedman,
Dardzinska, 2005) 2005) 4: Many-to-many synchronous communication that
provides communities of users with a common interest
Chat of the opportunity to communicate in real time. Users
1: A technology that provides the capability of instant, register and log into a particular room, and chat by
textual conversation with another individual through a typing messages that are instantly visible in the communal
computer session. (Panton, 2005) 2: A computer-mediated message area (room). Synonym: Group Chat. (Erlich, 2005)
real-time written conversation. It has the characteristics 5: In online chat meetings, people come together, in real
of a casual conversation and is usually not stored. A chat time over long distances, by typing on their computers. All
can be Web based or software based. The irst means comments are recorded on screen so that participants can
that it can be accessed from any computer with a Web view what has been discussed. (Gillani, 2005b) 6: Online
connection, the latter that certain software needs to be spaces where virtual users can converse in real time about
installed on the computer. There are open chat forums issues of speciic interest. Users can engage in both public
that anyone can visit to chat, to ind new acquaintances and private chats with other users. (Boateng & Boateng,
or information. Just as often, people prefer to chat with 2006b) 7: A real-time online interactive discussion group.
friends, using chat tools that require authentication before (Hwang & Stewart, 2005)
allowed chatting. Examples of software chat tools are Irc
and Mirc. (Dunkels, 2005) 3: A real-time conferencing Chat Session
capability that uses text by typing on the keyboard, not A live discussion online with a variable number of
speaking. Generally between two or more users on a local participants in a Web-based class. Can be formal and led by
area network (LAN), on the Internet, or via a Bulletin Board the instructor, or can be leaderless informal conversations.
Service (BBS). (Burke et al., 2005) 4: A software system A chat session is synchronous. (Marold, 2005)
that enables real-time communication among users through
the exchange of textual messages.(Loh et al., 2005) 5: An Chat Tool
interactive communication between two or more people A Web-based tool that enables text-based synchronous
who can enter text by typing on the keyboard, and have communication among individuals in a learning
the entered text appear in real-time on the other users community. (Morphew, 2005)
monitor. Internet Relay Chat (IRC) is an early example.
(OHagan, 2005) 6: In combination with asynchronous Chatiquette
conferencing, chat allows people to gather and interact Standard rules of courtesy and correct behavior for online
with a small group at a very low cost. It is very effective chat. (Link & Wagner, 2006)
for small group meetings where decisions can be made
and details arranged. (Kardaras & Karakostas, 2006) 7: CHEA: See Council for Higher Education Agency.
One-to-one synchronous communication in which two
persons exchange messages in real time. (Erlich, 2005) Check
See Instant Messaging. Expression in a relational database system that allows
stating a condition involving an attribute in a table; used

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Che ck point ing (Full, I nc re m e nt a l) Circ ulat ion Data ba se 81

with CREATE DOMAIN or CREATE TABLE statements. Examples: guitar, violin, piano, harp, lyre, musical bow.
(Badia, 2005b) (Wieczorkowska, 2005)
C
Checkpointing (Full, Incremental) Choreography
In full checkpointing, all of the state of the process is The message exchange behavior that a business exposes
captured. In incremental checkpointing, only that part in order to participate in a business relationship based on
of the state that has changed since the last checkpoint in electronic message exchange. (Bussler, 2005a)
captured. (Zhao et al., 2005)
Choropleth Map
Chemoinformatics A color-coded map, also called a thematic map, in
Storage, analysis, and drawing inferences from chemical which geographic areas are portrayed in different hues or
information (obtained from chemical data) by using intensities according to their values on some quantities.
computational methods for drug discovery. (Lodhi, (Garb & Wait, 2005b)
2005)
Chromatic Dispersion
Chen Approach Spreading of light pulses as they transit an optical iber.
One way to calculate cardinality constraints. It limits the Results from variations in the density of the optic iber
participation of a combination of the other entity(ies) with medium and culminates in signal distortion. (Littman,
an entity in the relationship. (Cuadra et al., 2005) 2006)

Chief Information Oficer (CIO) CIF: See Common Interface Format; Corporate
The head of the IS department in an organization. Information Factory.
(Johnston, 2005)
CIM: See Common Information Model.
Chief Information Security Oficer
Employee of an organization who is the top authority in CIO: See Chief Information Oficer.
relation to information security issues. (Janczewski &
Portougal, 2005) Circuit Switched
A type of network in which a physical path is obtained
Chief Knowledge Oficer (CKO) for and dedicated to a single connection between two
A senior-level executive responsible for managing a irms endpoints in the network for the duration of the connection.
knowledge management initiative. (Herschel, 2005) Ordinary voice phone service is circuit switched. The
telephone company reserves a speciic physical path to
Chi-Square Automatic Interaction Detection the number you are calling for the duration of your call.
(CHAID) During that time, no one else can use the physical lines
A decision tree technique used for classiication of a data involved. (Olla, 2005a)
set. CHAID provides a set of rules that can be applied to
a new (unclassiied) data set to predict which records will Circuit Switching
have a given outcome. CHAID segments a data set by using 1: A type of communication in which a dedicated
chi square tests to create multi-way splits. (Yeo, 2005) channel (or circuit) is established for the duration of a
transmission. (Lee & Warkentin, 2006) 2: A circuit-
Choiceboard switched network establishes a permanent physical
An interactive, Web-based tool that lets customers design connection between communicating devices. For the
their own products and services by choosing from a menu time of the communication, this connection can be used
of options. (Roberts & Schwaab, 2006) exclusively by the communicating devices. (Kaspar &
Hagenhoff, 2005)
Chordophones
The category of musical instruments producing sound Circulation Database
by means of a vibrating string; stringed instruments. The information of material usages that are stored in a
database, including user identiier, material identiier,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
82 CI S Cit y a nd Re giona l Pla nning/Engine e ring

date the material is borrowed and returned, and so forth. and government, and conceptualizes citizens as the
(Wu & Lee, 2005) most important stakeholder of e-government initiatives.
C (Almazn & Gil-Garca, 2006)
CIS: See Computer Information System.
Citizen-Centric
Cisco-Certiied Network Associate (CCNA) A new approach to organization of government information
A data communications industry certiication. (Dixon and dissemination of government services that focuses
et al., 2005) on citizen needs and desires instead of traditional
bureaucratic functions. For example, a citizen-centric Web
Citation Indexing site may combine various services, provided by different
The indexing mechanism invented by Eugene Garield in departments or agencies, under a common heading based
which cited work, rather than subject terms, is used as part on life events. (Schelin, 2005)
of the indexing vocabulary. (Chen & Lobo, 2006)
Citizen-Led E-Democracy
Citizen Engagement Bottom-up, transformative process. Citizens create and
A two-way process through which a government or agency sustain ICT applications, including e-mail lists, discussion
can develop an understanding of citizens concerns and boards, chat, and Web sites, that accurately capture and
needs and respond to them, conversely enabling citizens relect the discourse of citizen. Such fora can be vertical
to develop an appreciation of how they can positively (subject) or horizontal (geographic). Such an entity must
contribute to and inluence the future of their community be able to inluence government actions either directly
and region. (Sutcliffe, 2005) (through shared involvement) or indirectly (through public,
media, or political inluence). Citizen-led e-democracy
Citizen Rights involves governments working with, rather than
Those rights that an individual has by virtue of being a delivering to citizens. (Williamson, 2005)
member of a government unit (country, state, province,
etc.). They vary from government unit to government Citizen-Oriented Model
unit. (Gilbert, 2005) A model in which citizens are considered to be decision
makers with equal opportunities to reach representative
Citizen Satisfaction decision makers. In this model, the citizens set the agenda,
Term coined to describe the overall approval rating of not the politicians, or this process is interactive and based
services received by citizens within their communities. on win-win strategies. However, there has to be a procedure
A 100% rating indicates total satisfaction with services to coordinate this process and avoid the continuous
received. Ratings may be taken per service or represent need for voter input. The citizens should be able to take
satisfaction with an entire government structure. (Baim, part in strategic decision making, while conventional
2005) decision makers take the role of executive decision makers.
(Keskinen & Kuosa, 2005)
Citizens Jury
A group of people selected for preparation of public Citizenship
opinion. The jury is typically selected using stratiied A complex part of collective identity, refers to the
sampling in order to match a proile of a given population. relationship between the individual and the community
The participants (usually a group of 12 to 20) spend two to and between the individuals within a community/state.
three days deliberating on a charge under the guidance (Kozeluh, 2005)
of an impartial moderator. Participants have opportunities
to question experts and to discuss the complexities of the City and Regional Planning/Engineering
issue, and are asked to work toward a consensus response. The ield that deals with the methods, designs, issues, and
(Keskinen & Kuosa, 2005) models used to have successful plans and designs for cities,
towns, and regions. (Al-Hanbali & Sadoun, 2006)
Citizen-Centered Approach to E-Government
A way to study e-government that emphasizes the social
and political nature of the relationships between citizens

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Civic Enga ge m e nt Cla ss-Condit iona l I nde pe nde nc e 83

Civic Engagement Class


Describes the level of citizens participation in all those 1: A blueprint or prototype that deines the variables and
activities that concern fostering democratic values and the methods common to all objects of a certain kind. 2: A
C
public virtues such as trustworthiness, freedom of speech, collection of objects sharing certain characteristics (such
and honesty. (Magnani et al., 2006) as producer, customer, product, company, etc.). Individual
objects are called instances of the class. The classes of an
Civil Infrastructure System ontology describe the important concepts of a particular
The physical infrastructure that enables basic services domain being modeled. (Antoniou et al., 2005) 3: A
such as transportation (railroads, roads, airports), water collection of objects that have the same behavior and state
supply, sewage disposal, electric power generation and deinition. (Alhajj & Polat, 2005a) 4: A program construct
supply, telecommunications services, and so forth. (Jeong representing a type of thing (abstract data type) which
et al., 2006) includes a deinition of both form (information or data)
and functionality (methods); the implementation of the
Civil Law design concept of object type. (D. Brandon, Jr., 2005a)
The legal tradition that has its origin in Roman law and was 5: A template for similar objects deining attributes and
subsequently developed in Continental Europe. It is highly operations. (Rittgen, 2005)
systematized and structured, and relies on declarations
of broad, general principles, often ignoring the details. Class Algebra
(Zeleznikow, 2006) This fuzzy Boolean algebra can be used either to state
necessary conditions (declarations) or suficient conditions
Civil Society (queries). Because of the decidability of the containment
1: Refers to the sphere of associative activity between the of one class algebra expression by another, any set of class
individual and the state. Analysts differ between those algebra expressions forms an IS-A hierarchy. (Buehrer,
who include the economy and those who do not. (Smith 2005)
& Smythe, 2005) 2: There are many deinitions of the
term civil society, none of which receives universal Class Diagram
acquiescence. There are many ways one could classify 1: A diagram that shows a set of classes and their
the different organizations of civil societyby sector, relationships (association, dependency, generalization/
focus, origins, scale, level of formality, values base, and specialization, realization); class diagrams address the
different theoretical perspectives. As with deinitions, static design view of a system. (Favre et al., 2005) 2:
there is no universally accepted schema, and the details Shows the classes of the system, their interrelationships,
of each typology should always be adapted to relect the and the collaboration between those classes. (Riesco et
needs of particular tasks. (Finquelievich, 2005) al., 2005)

Civil Society Organization Class Hierarchy


A civic organization, association, or network that occupies 1: A Directed Acyclic Graph (DAG) that describes the
the social space between the family and the state who subclass/superclass relationships among classes. Each
come together to advocate their common interests through node represents a class, the children of a node represent
collective action. Includes volunteer and charity groups, the direct subclasses of a class, and the parents of a node
parent/teacher associations, senior citizen groups, sports represent the direct superclasses of a class. (Alhajj & Polat,
clubs, arts and culture groups, faith-based groups, workers 2005b) 2: Classes are usually organized in a conceptual
clubs and trade unions, non-proit think-tanks, and issue- space along a generalization/specialization axis. A class
based activist groups. (Arkhypska et al., 2005) A is more general (superclass) than a class B when each
instance of B is also an instance of A. (Antoniou et al.,
CKO: See Chief Knowledge Oficer. 2005)

Clan Class-Conditional Independence


An organized gaming team that enters leagues and Property of a multivariate distribution with a categorical
tournaments. (Grifiths et al., 2006) class variable c and a set of other variables (e.g., x and y).

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
84 Classiication Classiication Model

The probability of observing a combination of variable to one another, and different groups are as far as possible
values given the class label is equal to the product of the from one another, where distance is measured with respect
C probabilities of each variable value given the class: P(x,y|c) to speciic variables one is trying to predict. For example,
= P(x|c)*P(y|c). (Perlich & Provost, 2005) a typical classiication problem is to divide a database of
companies into groups that are as homogeneous as possible
Classiication with respect to a creditworthiness variable with values good
1: A method of categorizing or assigning class labels to and bad. Supervised classiication is when we know the
a pattern set under the supervision. (Oh et al., 2005) 2: class labels and the number of classes. (Hamdi, 2005a) 13:
A process of predicting the classes of unseen instances The process of predicting the classes of unseen instances
based on patterns learned from available instances with based on patterns learned from available instances with
predeined classes. (Liu & Yu, 2005) 3: A systematic predeined classes. (Yu & Liu, 2005) 14: The task of
arrangement of objects (texts) or groups according to (pre) inferring concepts from observations. It is a mapping
established criteria, or the process of allocating elements from a measurement space into the space of possible
in predeined classes. The classiication needs a predeined meanings, viewed as inite and discrete target points
taxonomy in contrast with the clustering technique that (class labels). It makes use of training data. (Domeniconi
works without previous knowledge. Sometimes it is also & Gunopulos, 2005)
associated with the process of identifying classes, that
is, discovering attributes that characterize one class and Classiication and Regression Tree (CART)
that distinguish this from others. (Antonio do Prado et A tool for data mining that uses decision trees. CART
al., 2005) 4: A technique dividing a dataset into mutually provides a set of rules that can be applied to a new dataset
exclusive groups. Unlike clustering, classiication relies on for predicting outcomes. CART segments data records by
predeined classes. (Chen, Tsai, et al., 2005) 5: A technique creating binary splits. (Wilson, et al., 2006a)
in data mining that attempts to group data according to
pre-speciied categories, such as loyal customers vs. Classiication Error
customers likely to switch. (Amaravadi, 2005) 6: Also 1: Error produced by incorrect classiications which
known as a recognition problem; the identiication of the consists of two types: correct negative (wrongly classify
class to which a given object belongs. (Mart, 2005) 7: an item belonging to one class into another class) and
Given a set of training examples in which each example false positive (wrongly classify an item from other classes
is labeled by a class, build a model, called a classiier, to into the current class). (Y.-J. Zhang, 2005b) 2: Number
predict the class label of new examples that follow the of elements that are classiied in the wrong class by a
same class distribution as training examples. A classiier classiication rule. In two class problems, the classiication
is accurate if the predicted class label is the same as the error is divided into the so-called false positive and false
actual class label. (Zhou & Wang, 2005) 8: The process negative. (Felici & Truemper, 2005)
of distributing things into classes or categories of the
same type by a learnt mapping function. (Fung & Ng, Classiication Level
2005) 9: Mapping a data item into one of several pre- A security level that represents both the conidentiality
deined categories. Stored data are used to locate data in degree of the information and its category. (Gabillon,
predetermined groups. For example, a retail store chain 2005)
could use customer purchase data to determine when
customers visit and what they typically buy. (Laura, Classiication Model
2005) 10: The central problem in (supervised) data mining. A pattern or set of patterns that allows a new instance
Given a training data set, classiication algorithms provide to be mapped to one or more classes. Classiication
predictions for new data based on predictive rules and other models (also known as classiiers) are learned from data
types of models. (Muruzbal, 2005) 11: The distribution in which a special attribute is selected as the class.
of things into classes or categories of the same type, or the For instance, a model that classiies customers between
prediction of the category of data by building a model based likely to sign a mortgage and customers unlikely to do
on some predictor variables. (Zhu, 2005) 12: The process so is a classiication model. Classiication models can
of dividing a dataset into mutually exclusive groups such be learned by many different techniques: decision trees,
that the members of each group are as close as possible neural networks, support vector machines, linear and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Classiication Rule Clear Direction 85

nonlinear discriminants, nearest neighbors, logistic competition and cooperation processes. Note that classiier
models, Bayesian, fuzzy, genetic techniques, and so forth. systems can also be understood as systems capable of
(Hernandez-Orallo, 2005b) performing classiication. Not all CSs qualify as classiier
C
systems in the broader sense, but a variety of CS algorithms
Classiication Rule concerned with classiication do. (Muruzbal, 2005)
The association that occurs in classiication data between
an antecedent containing a set of predicates expressing the Class Label
values of particular attributes or features and a consequent A label identifying the concept or class of an instance.
expressing a class label. Classiication rules represent (Maloof, 2005)
concise descriptions of the target class. (Richards & de
la Iglesia, 2005) Classroom Community
Sense of community in a classroom setting. (Rovai &
Classiication Rule Mining Gallien, 2006)
A technique/procedure aiming to discover a small set of
rules in the database to form an accurate classiier for Classroom Interaction
classiication. (Y.-J. Zhang, 2005b) The interaction that can only be achieved face to face in a
classroom. (W.B. Martz, Jr. & V.K. Reddy, 2005)
Classiication Tree
1: A decision tree that places categorical variables into CLC: See Conversation Learning Community.
classes. (Kumar, 2005) 2: A decision tree where the
dependent attribute is categorical. (Gehrke, 2005) 3: An CLD: See Causal Loop Diagram.
oriented tree structure obtained by a recursive partitioning
of a sample of cases on the basis of a sequential partitioning CLDS
of the predictor space such to obtain internally homogenous The facetiously named system development life cycle
groups and externally heterogeneous groups of cases with (SDLC) for analytical, DSS systems. CLDS is so named
respect to a categorical variable. (Siciliano & Conversano, because in fact it is the reverse of the classical SDLC.
2005) 4: Type of decision tree that is used to predict (Yao et al., 2005)
categorical variables, whereas regression trees are decision
trees used to predict continuous variables. (Hirji, 2005) Cleansing
To ilter the irrelevant entries in the Web log, such as
Classiier graphics iles. The HTTP protocol is stateless, which
1: A decision-supporting system that, given an unseen requires a separate connection for each ile that is requested
input object, yields a prediction (e.g., it classiies the from the Web server. Therefore, several log entries may
given object to a certain class). (Bruha, 2005) 2: An result from a request to view a single page, since the iles
algorithm that, given as input two or more classes (or for the graphics embedded in the page are automatically
labels), automatically decides to which class or classes downloaded from the Web server. Such iltering can be
a given document belongs, based on an analysis of the done by checking the sufixes of the URI name such as
contents of the document. A single-label classiier is one jpg and gif. (Yao & Xiao, 2005)
that picks one class for each document. When the classes
among which a single-label classiier must choose are just Clear Case
two, it is called a binary classiier. A multi-label classiier A case that experts agree can be solved in an acceptable
is one that may pick zero, one, or many classes for each manner by simply applying the existing legal rules to it.
document. (Sebastiani, 2005) (Svensson, 2005)

Classiier System Clear Direction


A rich class of evolutionary computation algorithms Goals that facilitate creativity are clear, negotiated,
building on the idea of evolving a population of predictive attainable, shared, and valued. (Torres-Coronas & Gasc-
(or behavioral) rules under the enforcement of certain Hernndez, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
86 Cle a ra nc e Leve l Clie nt -Originat e d ERP M a int e na nc e Re que st

Clearance Level on each page, and in what order the pages are viewed. It is
A security level that represents both the trust level of the frequently recorded in Web server logs. (Nasraoui, 2005)
C user and his or her need to know. (Gabillon, 2005) 6: A sequential series of Web page view requests from an
individual user. (Lee-Post & Jin, 2005b)
Clementine
Data-mining software developed by SPSS Corporation Clickstream Data
that is used to create predictive models to solve business Web usage data. A virtual trail that a user leaves behind
challenges. (Athappilly & Rea, 2005) while suring the Internet (e.g., every Web site and every
page of every Web site that the user visits; how long the user
CLF: See Common Log Format. was on a page or a site). (Dholakia, Bang, et al., 2005)

Click Fraud Clickstream Tracking


Clicking on an online advertisement link for the The use of software to monitor when people use the Internet
premeditated purpose of causing a PPC advertiser to pay and what sites they visit. (Szewczak, 2005)
for the click without the intent to take any other actions
(such as buy a product). (Owen, 2006a) Clickwrap Agreement
Applies to software acquired without any packaging (e.g.,
Click-and-Mortar when it is copied to a computer (downloaded) from a
1: A irm that operates both online and off-line, or a hybrid Web site or is pre-loaded on a computer). When the buyer
operation that requires a combination of online and off-line installs the software, a dialogue box is displayed containing
aspects to complete a transaction. For example, a company the license agreement. The user is instructed to select a
offers items for sale online and requires that the customers button to accept the terms of the license agreement and
pick up the items from a nearby store. (Aigbedo, 2005) 2: complete the installation. (Sprague, 2005)
An e-commerce company that has both online presence
and a physical store. (Wang, Ding, et al., 2006) Client
1: A computer, other device, or application that receives
Click-Through services from a server. (Maris, 2005) 2: A computer that
When a Web page visitor clicks on a link, such as an requests and receives data and services from servers on
advertisement, for more information. (Owen, 2006a) a computer network. Computer users work with clients to
access information on the Internet and World Wide Web.
Click-Through Rate (CTR) (Dasgupta & Chandrashekaran, 2005) 3: A computer that
A ratio of the number of Web page visitors who clicked on downloads iles or requests documents or services from
an ad link vs. the number of visitors who were exposed to a ile server. (Hantula, 2005) 4: Customers who pay for
the ad, expressed as a percentage. (Owen, 2006a) good and services. (Guan, 2006b)

Clickstream Client Organization


1: A sequence of mouse clicks. (Quah et al., 2006c) 2: In Public or private entity that uses international outsourcing
Web research, the sequence of Web pages visited by the workers to perform different tasks. (St.Amant, 2006b)
experimental subject. A clickstream data record can be as
simple as URL and sequence number, or a time stamp can Client-Centered Transaction Environment
be added. This latter approach allows for analysis of page A service portal with available services that cross agency
viewing time. (Westin, 2005) 3: The sequence of mouse boundaries organized by their relevance to a clients
clicks executed by an individual during an online Internet situation. For citizens, these may be organized by life
session. (Agresti, 2005) 4: The sequence of movement events such as marrying, employment, or health care.
as a person clicks on a Web site, then moves from page (Knepper & Chen, 2006)
to page within that site, and then moves to another site.
(Waterson, 2006) 5: Virtual trail left by a users computer Client-Originated ERP Maintenance Request
as the user surfs the Internet. The clickstream is a record Originated from within a client organization. Intended to
of every Web site visited by a user, how long they spend ix bugs, adapt internal and external changes to business

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Clie nt -Se r ve r M ode l Close d Loop 87

processes, make enhancements to the installed system Clinical Coding


to meet new user requirements, and provide helpdesk Categorizes diagnoses and procedures for patient episodes
supports. (Ng, 2005) according to a detailed clinical standard index. The most
C
common standard is the International Classiication of
Client-Server Model Diseases (ICD), particularly for inancial audit, but a UK
1: A model deining a basis for communication between two standard Read is very popular with medical staff. These
programs called respectively the client and the server. The are grouped to provide aggregate information for audit.
requesting program is a client and the service-providing (Barnes, 2005)
program is the server. (Karoui, 2005) 2: A communication
where one host has more functionality than the other. It Clip
differs from the P2P network. (Hossz, 2006) A set of segments having the same salient objects. (Kacimi
et al., 2005)
Client/Server Architecture
1: Computer network model separating computers Cloaking
providing services (servers) from computers using Another means of spamdexing in which sites provide a
these services (clients). (Framinan, 2005) 2: A network different page to the search engine spider than the one that
architecture in which each computer or process on the will be seen by human users. (Kasi & Jain, 2006)
network is either a client or a server. Servers are powerful
computers or processes dedicated to managing disk drives Clock Synchronization
(ile servers), printers (print servers), or network trafic Physical clocks in a network are synchronized to within
(network servers). Clients are PCs or workstations on certain precision and accuracy. The precision refers to the
which users run applications. Clients rely on servers for difference between readings of clocks, and the accuracy
resources, such as iles, devices, and even processing power. refers to the difference between the clock reading and the
(Dez-Higuera & Daz-Pernas, 2005) 3: The architecture universal standard time. (Yang et al., 2005b)
built on top of Remote Procedure Call (RPC) commonly
used in business applications. (Fiege, 2005) CLOD
A virtual collaborative learning paradigm enabling a
Client-Side/Server-Side Scripting self-tutored, interactive, and cooperative learning process
1: In a Web environment, this term relates to the fact that where a small group of remote students requests, watches,
scripted tasks can be handled by the browser software and controls the playback of an archived lecture by
(client side) or by the Web server software (server side). exchanging questions with each other. (Fortino, 2005)
A single Web page may contain both client-side and
server-side scripts. The script host is determined by the Closed Frequent Graph
RUNAT attribute of the SCRIPT tag. (Westin, 2005) 2: A frequent graph pattern G is closed if there exists no
Activities that occur on the users computer which may proper super-pattern of G with the same support in the
interact with the server. (Note that clients may now dataset. (Katsaros & Manolopoulos, 2005b)
include mobile devices, such as smart phones and PDAs.)
(Moore et al., 2006) Closed Itemset
An itemset that is a maximal set of items common to a set of
Clinical Audit objects. An itemset is closed if it is equal to the intersection
The assessment of professional clinical practices. General of all objects containing it. (Pasquier, 2005)
information routinely provided includes lengths of stay,
deaths, and re-admissions. More speciic information Closed Loop
such as drugs administered and operative procedures Transfer of value happens as with digital cash. For instance,
performed are available via the appropriate feeder systems. when the user receives the issue from the issue subject,
The data allow aspects of case mix, clinical management, and the digital money is allotted to the money payment
diagnostic accuracy, and patient outcomes to be compared. of the commodity or service, the seller will shut the
(Barnes, 2005) settlement to the issue subject for the transfer of value.
(Kurihara, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
88 Close d Se que nt ia l Pat t e r n Clust e r Ana lysis

Closed Sequential Pattern Closeness Centrality


A frequent sequential pattern that is not included in A measurement of centrality indicating how close an actor
C another frequent sequential pattern having exactly the is to all other actors in a network. The idea here is that
same support. (Masseglia et al., 2005) actors are central if they can quickly interact with all other
actors in a network. (Assimakopoulos & Yan, 2006)
Closed Shape
A shape is represented by the ordered set of points and Closure Operator
the ordered set of lines connecting points. The start point Let S be a set and c: (S)(S); c is a closure operator
and the end point are coincident in closed shapes. (Ferri on S if X, YS, c satisies the following properties:
& Grifoni, 2006) (1) extension, Xc(X); (2) mononicity, if XY, then
c(X)c(Y); (3) idempotency, c(c(X)) = c(X). Note: st and
Closed (or Proprietary) Software ts are closure operators, when s and t are the mappings
Software that is owned by an individual or a company in a Galois connection. (Dumitriu, 2005)
(usually the one that develops it) and is protected from
unauthorized use by patents, trademarks, or copyrights. Cluster
Such software is often sold or leased to other individuals 1: A group of content-similar multimedia objects.
or organizations, usually with strict restrictions regarding (Hurson & Yang, 2005) 2: A group of elements that have
its use, modiication, and further distribution. In many some characteristics or attributes in common. (Antonio
cases the source code is kept secret. (Curti, 2005) do Prado et al., 2005) 3: A group of linked enterprises
that share a common purpose of gaining competitive
Closed-Loop MRP advantage and economies of scale. (Braun, 2006) 4: A
The combination of MRP functionality with planning group of organizations that are linked together around a
and production execution modules, with the potential for particular industry. (Mason et al., 2006) 5: A set of entities
feedback from the execution cycle to the planning cycle. that are similar between themselves and dissimilar to
(Carton & Adam, 2005) entities from other clusters. (Ma & Li, 2005) 6: A group
of objects of a dataset that are similar with respect to
Closed-World Assumption speciic metrics (values of the attributes used to identify
1: A principle that claims that every atom not entailed by the similarity between the objects). (Santos et al., 2005)
the KDB is assumed to be false. This principle is sound 7: Parallel architecture that contains multiple standard
on KDBs with simple syntax as logic programs. (Alonso- computers connected via a high-performance network
Jimnez et al., 2005) 2: The assumption that any goal that that work together to solve the problem. (Geisler & Kao,
is not provable is false. For example, if the knowledge 2005) 8: Subset of data records; the goal of clustering
base cannot prove that there is a light from Taipei to is to partition a database into clusters of similar records
New York, then you can assume that there is no such such that records that share a number of properties are
light. This assumption is used by most knowledge bases. considered to be homogeneous. (Hirji, 2005)
For class algebra, which is decidable (i.e., membership
in a class expression is either true or false for a given Cluster Analysis
object), the closed-world assumption corresponds to the 1: A data analysis technique involving the grouping of
true-complement ~ operator. A pseudo-complement - objects into sub-groups or clusters so that objects in the
operator is used in proving that something has negative same cluster are more similar to one another than they are
evidence, but the pseudo-complemented predicates are to objects in other clusters. (Voges, 2005) 2: A multivariate
treated like positive literals in terms of Horn clauses. The statistical technique that assesses the similarities between
maximum proofs of positive and negative evidence produce individuals of a population. Clusters are groups or categories
a fuzzy interval for any class algebra expression. (Buehrer, formed so members within a cluster are less different than
2005) 3: An assumption made in classical planning that members from different clusters. (Lee, Peterson, et al.,
all facts that are not implied by the knowledge base are 2005) 3: Deining groups based on the degree to which an
false. Closed-world assumption rests on the assumption item belongs in a category. The degree may be determined
of completeness of knowledge. (Babaian, 2005) by indicating a percentage amount. (Lenard & Alam, 2005)
4: Dividing objects into groups using varying assumptions

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Clust e r Ce nt e r (Prot ot ype ) Clust e ring Dat a -M ining Ta sk 89

regarding the number of groups, and the deterministic 2005) 5: A process of mapping a data item into one of
and stochastic mechanisms that generate the observed several clusters, where clusters are natural groupings for
values. (Burr, 2005a) 5: Partitioning a given data set into data items based on similarity metrics or probability density
C
clusters where data assigned to the same cluster should models. (Oh et al., 2005) 6: A process to group, based on
be similar, whereas data from different clusters should be some deined criteria, two or more terms together to form
dissimilar. (Klawonn & Georgevia, 2005) 6: The process a large collection. In the context of image segmentation,
that includes the clustering method and the analysis of its clustering is to gather several pixels or groups of pixels
results in order to discover and understand the contents of with similar property to form a region. (Y.-J. Zhang, 2005c)
a set of elements, texts, or objects, and the relations among 7: A task that segments objects into groups according to
them. (Antonio do Prado et al., 2005) object similarity. (Chen & McLeod, 2006) 8: A technique in
data mining that attempts to identify the natural groupings
Cluster Center (Prototype) of data, such as income groups that customers belong to.
A cluster in objective function-based clustering is (Amaravadi, 2005) 9: An algorithm that takes a dataset and
represented by one or more prototypes that deine how the groups the objects such that objects within the same cluster
distance of a data object to the corresponding cluster is have a high similarity to each other, but are dissimilar to
computed. In the simplest case a single vector represents objects in other clusters.(Cunningham & Hu, 2005) 10:
the cluster, and the distance to the cluster is the Euclidean An unsupervised process of dividing data into meaningful
distance between cluster center and data object. (Klawonn groups such that each identiied cluster can explain the
& Georgevia, 2005) characteristics of underlying data distribution. Examples
include characterization of different customer groups based
Cluster Frequent Item on the customers purchasing patterns, categorization
A global frequent item is cluster frequent in a cluster Ci of documents on the World Wide Web, or grouping of
if the item is contained in some minimum fraction of spatial locations of the earth where neighbor points in
documents in Ci. (Fung et al., 2005) each region have similar short-term/long-term climate
patterns.(Chung et al., 2005) 11: Clustering algorithms
Cluster Sampling discover similarities and differences among groups of
The process in which a sample of clusters is selected and items. They divide a dataset so that patients with similar
observations/measurements are made on the clusters. content are in the same group, and groups are as different
(Lutu, 2005) as possible from each other. (Kusiak & Shah, 2005) 12: The
process of identifying groups in data. In the classiication,
Cluster Validation all groups are pre-deined in the classiication system and
Evaluating the clustering results, and judging the cluster products are arranged into the existing group structure.
structures. (Ma & Li, 2005) Contrary to this, the clustering process identiies groups
based on the product data. This means that the groups
Cluster-Support of Feature F in Cluster Ci change depending on the product data. (Abels & Hahn,
Percentage of objects in Ci possessing f. (Saquer, 2005) 2006) 13: Data-mining approach that partitions large sets
of data objects into homogeneous groups. (Garrity et al.,
Clustering 2005) 14: Data-mining task in which the system has to
1: A technique that uses features to ind the linking pages classify a set of objects without any information on the
of each other automatically. Usually, the Web pages with characteristics of the classes. (Jourdan et al., 2005)
near features will be clustered together. (Chen, Tsai, et
al., 2005) 2: Two or more interconnected computers that Clustering Algorithm
create a solution to provide higher availability, higher An algorithm that sorts data into groups of similar items,
scalability, or both. (Tong & Wong, 2005b) 3: A form of where the category boundaries are not known in advance.
unsupervised learning that divides a data set so that records (Dixon, 2005)
with similar content are in the same group and groups are
as different from each other as possible. (Lingras et al., Clustering Data-Mining Task
2005) 4: A process of grouping instances into clusters so The act of identifying items with similar characteristics,
that instances are similar to one another within a cluster and thus creating a hierarchy of classes from the existing
but dissimilar to instances in other clusters. (Liu & Yu, set of events. A data set is partitioned into segments of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
90 Clust e ring M ode l COAC

elements (homogeneous) that share a number of properties. Co-Clustering


(Nayak, 2005c) Performing simultaneous clustering of both points and
C their attributes by way of utilizing the canonical duality
Clustering Model contained in the point-by-attribute data representation.
A pattern or set of patterns that allows examples to be (Ma & Li, 2005)
separated into groups. All attributes are treated equally
and no attribute is selected as output. The goal is to ind Co-Construction
clusters such that elements in the same cluster are similar Unlike the process of a lone researcher documenting
between them but are different to elements of other clusters. a construction (whether this is a ritual, an identity, a
For instance, a model that groups employees according discourse, and so forth) that preexists the research project,
to several features is a clustering model. Clustering in this case, the researcher is engaged in the construction
models can be learned by many different techniques: k- along with those that in conventional research would
means, minimum spanning trees (dendrograms), neural have simply been called informants. Also called Co-
networks, Bayesian, fuzzy, genetic techniques, and so Production. (Forte, 2005)
forth. (Hernandez-Orallo, 2005b)
Co-Located Team
CLV: See Customer Lifetime Value. A traditional team that shares a common goal and works
toward that goal in a face-to-face, same-ofice environment.
CMA: See Career Management Account. (Long et al., 2005)

CMC: See Computer-Mediated Communication. Co-Located Work


Collaborative work carried out by several persons at the
CME: See Computer-Mediated Education. same geographical location. (Wiberg, 2005)

CMI: See Computer-Managed Instruction; Computer- Co-Location


Mediated Interaction. 1: When members of a community work in the same
physical space and time. (Raja et al., 2006) 2: Team
CMM: See Capability Maturity Model. members sharing the same physical location, which allows
for face-to-face interaction. (Wong-MingJi, 2005)
CMM I (CMM-I1; CMM-I2)
A model enhanced in two dimensions: scope dimension Co-Partnership Managers
and evaluation dimension. The CMM-Il incorporated both The course instructor on the university side and a senior
approaches: the traditional (called staged CMM) and the manager of the client organization, who jointly manage a
maturity proile (called continuous CMM). (Monteiro de course partnership project. (Kock, 2005)
Carvalho et al., 2005)
Co-Production: See Co-Construction.
CMM-KMKE
A capability maturity model, based on the CMM, for Co-Sourcing
knowledge management and knowledge engineering. Used instead of outsourcing to emphasize that the
(Berztiss, 2006a) outsourcing arrangement is based on cooperation (or
partnering) between the parties. Partnering is often
CMS: See Content Management System. used to signify a highly cooperative arrangement, but
Australian law only recognizes written contracts (not
CMT: See Computer-Mediated Technology. a spirit of cooperation) and de facto relationships.
(Beaumont, 2005)
CNC Machine
Tool machine with a computer numeric control; a standard COAC: See Comparative Online Analysis of Cultures.
in the mechanical engineering ield. (Rse, 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Coa ch Coevolut ion 91

Coach Code Growth/Code Bloat


A user who helps other users participate in design work by The proliferation of solution elements (e.g., nodes in a
coaching them. This is the fourth stage in the developmental tree-based GP representation) that do not contribute toward
C
theory of participatory-design relationships between users the objective function. (Hsu, 2005b)
and designers. (Carroll, 2005)
Code of Ethics
Coaching 1: A code of ethics can have a positive impact if it satisies
The action of a trainer or coach in monitoring the four criteria: (1) the code is distributed to every employee;
performance of individuals and providing feedback for (2) it is irmly supported by top management; (3) it refers
successful completion of a task. (Ally, 2005d) to speciic practices and ethical dilemmas likely to be
encountered by target employees; and (4) it is evenly
Coaction Field enforced with rewards for compliance and strict penalties
A place where inhabitants, real or virtual, work or play for non-compliance. (Grieves, 2006a) 2: A detailed set
together as if they were gathered at the same place. of principles, standards, and rules aimed at guiding the
(Terashima, 2005) behavior of groups, usually of professionals in business,
government, and the sciences. (Goodman, 2005)
Coalesce
1: In the context of phylogenetic trees, two lineages Codec
coalesce at the time that they most recently share a common 1: Short for compressor/decompressor. (Hutchinson,
ancestor (and hence, come together in the tree). (Burr, 2005) 2: A computer application that compresses and
2005b) 2: Combining tuples whose times are contiguous or decompresses the signal for transmission over the Internet.
overlapping into one tuple whose time reference includes (Dudding, 2005) 3: Compression and decompression
the time of constituent tuples. (Tansel, 2005) algorithms provided by either a software application or a
hardware device. (Vitolo et al., 2005)
COBIT: See Control Objectives for Information and
Related Technologies. Codiication
Putting knowledge into a form that makes it accessible to
Cocited others, for example, writing down a formula. (Mitchell,
Web pages that have the same parent page or have the 2005b)
same child pages are said to be cocited. (Chen, Tsai, et
al., 2005) Coding
A manner in which a solution of a given problem can be
Code Division Multiple Access (CDMA) represented. (Kacem, 2005)
1: One of several protocols used in 2G (second-generation)
and 3G (third-generation) wireless communications. It Coding Data
allows numerous signals to occupy a single transmission Analyzing data by assigning codes and categorizing
channel optimizing the use of available bandwidth. (Pease information based on speciied research constructs and
et al., 2005) 2: Also known as CDMA-ONE or IS-95, this is patterns. (Neale et al., 2005)
a spread spectrum communication technology that allows
many users to communicate simultaneously using the same CoE: See Community of Experts.
frequency spectrum. Communication between users is
differentiated by using a unique code for each user. This Coeficient of Determination
method allows more users to share the spectrum at the A statistical measure of how well predictive variables did
same time than alternative technologies. (Akhtar, 2005) indeed predict the variable of interest. (Benrud, 2005)
3: A digital wireless technology, and a spread spectrum
technology used in Uganda for wireless local loop. It Coevolution
supports data transmission effectively. (D. Stern, 2005) 4: Describes the mutual inf luences among actors in
A technology that allows mobile phone and satellite signals a collective, as well as their environment; mutual
from different users to share the available bandwidth by inluences can be desirable and undesirable, constructive
uniquely encoding each signal. (Dyson, 2005) or destructive. In the case of an organization, it can

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
92 Cognit ion Cognit ive Ga p

be envisaged as a set of multi-dimensional networks, (Cartelli, 2006b) 2: Students work in teams on projects or
themselves part of a larger set of networks to which they problems with close scaffolding of the instructor. Cognitive
C are linked. Nodes in the networks represent entities such as apprenticeships are representative of Vygotskian zones of
ofices, factories, teams, and individuals. They are linked proximal development in which student tasks are slightly
formally or informally to other nodes. Activities at any more dificult than students can manage independently,
node send messagesand by implication, knowledgeto requiring the aid of their peers and instructor to succeed.
other nodes in the form of feedback, or feed-forward, (Jennings et al., 2005)
thereby triggering activities in those nodes. The messages
may use the formal or the informal links in the network. Cognitive Complexity
They may be sent intentionally or accidentally. (Land, A function of the intensity of information exchanged and
Amjad, et al., 2006a) the multiplicity of views held. (Willis, 2005)

Cognition Cognitive Conlict


1: The mental processes of an individual, including Overt discrepancy among intervening parties about how
internal thoughts, perceptions, understanding, and a particular task or issue should be resolved and their
reasoning. Includes the way we organize, store, and process subsequent engagement in action to redress the situation.
information, as well as make sense of the environment. It (Fernndez, 2005)
can also include processes that involve knowledge and the
act of knowing, and may be interpreted in a social or cultural Cognitive Constructivism
sense to describe the development of knowledge. (Faiola, An approach to constructivism based on the work of the
2006) 2:The psychological result of perception, learning, Swiss psychologist Jean Piaget, particularly his theory
and reasoning. (Alkhalifa, 2005a) 3: The collection of cognitive development. According to Piaget, the
of mental processes and activities used in perceiving, knowledge of human beings is constructed through
remembering, thinking, and understanding, and the act of experience, but not from the information they are given.
using those processes. (Atkinson & Burstein, 2006) (Bodomo, 2005a)

Cognition-Based Trust Cognitive Dissonance


A rational view of trust associated with competence, The situation where a person simultaneously holds two
ability, responsibility, integrity, credibility, reliability, and contradictory models of the same subject matter (e.g., an
dependability. (Huotari & Iivonen, 2005) ICT system). (Maceield, 2006)

Cognitive Cognitive Engineering


Psychological phenomena relating to thinking processes A ield aiming at understanding the fundamental principles
as opposed to senses or movement. (N.C. Rowe, 2006b) behind human activities that are relevant in context of
designing a system that supports these activities. (Jaspers,
Cognitive/Affective Aspects 2006)
The aspects of mental processes or behavior directed toward
action or change and including impulse, desire, volition, Cognitive Flexibility Theory
and striving. (Raisinghani & Hohertz, 2005) 1: Refers to the lexible way learners assemble and retrieve
knowledge from their brains. This theory is best used in
Cognitive Appraisal Theory designing learning environments that support the use of
The categorization of emotions through the evaluation of interactive technology. (Sala, 2005b) 2: The ability to
stimuli. (Byl & Toleman, 2005) spontaneously restructure ones knowledge, in many ways,
in adaptive response to radically changing situational
Cognitive Apprenticeship demands. (Burrage & Pelton, 2005)
1: Originates from traditional apprenticeship, which has
the following well-known features: modeling, coaching, Cognitive Gap
scaffolding, and fading. When applied to educational The difference in cognitive problem-solving style between
and research situations, the new features of articulation, two people, especially two people who are obliged to interact
relection, and exploration must be added to the ones above. as members of a group or team. (Mullany, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cognit ive Gra phic a l Wa lk t hrough Cognit ive Pre se nce 93

Cognitive Graphical Walkthrough Cognitive Load Theory


A modiication of the initial Cognitive Walkthrough A theory asserting that the capacities and limitations of
interface evaluation method which materializes diagrams the human memory system must be taken into account
C
to enable the evaluators to assess the time variable as during the process of instructional design in order to
well as accelerating the evaluation procedure. (Karoulis produce optimal learning materials and environments.
et al., 2006) (Boechler, 2006b)

Cognitive Jogthrough Cognitive Map


A modiication of the initial Cognitive Walkthrough in 1: A collection of nodes linked by some edges (arcs). From
order to speed up the procedure. A video camera now a logical perspective, a node is a logical proposition, and
records the evaluation session. (Karoulis et al., 2006) a link is an implication. Thus, a cognitive map consists of
causal and temporal relations between cognitive concepts.
Cognitive Learning (von Wartburg, 2006) 2: A structure representation of
1: A consequence of the vision of the situation in light contributions, structured with links, to represent one
of a new aspect that enables the comprehension of logic persons knowledge of a topic. Often a map is built by
relations or the perception of relations between means oneself or by an interviewer during an interview. (Shaw,
and aims. (Xodo, 2005) 2: The degree of comprehension 2006) 3: A structured representation of decision depicted
and retention of knowledge by a student in an educational in graphical format (variations of cognitive maps are
experience. (Woods & Baker, 2005) cause maps, inluence diagrams, or belief nets). Basic
cognitive maps include nodes connected by arcs, where
Cognitive Learning Outcomes the nodes represent constructs (or states) and the arcs
Learning that is associated with knowledge of facts or represent relationships. Cognitive maps have been used to
processes. (Aworuwa & Owen, 2005) understand decision situations, to analyze complex cause-
effect representations, and to support communication.
Cognitive Learning Theory (Teeni, 2006) 4: Internal representation of the world and
1: The branch of cognitive science that is concerned with its spatial properties stored in memory (also called mental
cognition and includes parts of cognitive psychology, map). (Rambaldi, 2005)
linguistics, computer science, cognitive neuroscience,
and philosophy of mind. (Alkhalifa, 2006) 2: Provides Cognitive Modeling
a framework to understand learning, suggesting that Using algorithms to represent and simulate the cognitive
although learning is not directly observable, it occurs process, for example, to add intelligence to software
through active mental processes where knowledge is agents. (Arya, 2005)
progressively assimilated, making a change in behavior
possible. (Knight et al., 2005) Cognitive Node
Scalable access point for augmenting knowledge and
Cognitive Level facilitating communication in knowledge networks. Nodes
The level of cognitive functions in the order of increasing manage virtue maps and data relevant to knowledge
complexity of cognitive processing. (Alkhalifa, 2005b) workers. (Croasdell & Wang, 2006)

Cognitive Load Cognitive Overhead


1: Amount of mental resources necessary for information The amount of mental resources that need to be expended
processing. (Utsi & Lowyck, 2005) 2: The limited capacities to complete a given task. (Boechler, 2006a)
of the visual and auditory channels in working memory.
Since these channels can easily become overloaded, one Cognitive Presence
potential beneit of multimedia learning is being able to The extent to which discussion participants are able to
present complex information in a format that minimizes construct meaning through sustained communication.
potential overloads. (M. Mitchell, 2005c) 3: The degree (Swan, 2005)
of cognitive processes required to accomplish a speciic
task. (Alkhalifa, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
94 Cognit ive Proble m -Solving St yle Cognit ivism

Cognitive Problem-Solving Style Cognitive Task Model


The position an individual occupies between two extremes A model representing the cognitive behavior of people
C of cognitive problem-solving style personalitynamely, performing a certain task. (Jaspers, 2006)
the adaptor and the innovator. (Mullany, 2005)
Cognitive Theory
Cognitive Process Learning as a sense-making activity and teaching as an
1: The performance of some composite cognitive activity. attempt to foster appropriate cognitive processing in the
2: A set of connected series of cognitive activities intended learner. (Cirrincione, 2005)
to reach a goal. Cognitive activities can be considered as
a function of their embodied experience. (Plekhanova, Cognitive Tool
2005a) A tool that reduces the cognitive load required by a speciic
task. (Alkhalifa, 2005a)
Cognitive Reasoning
Learning through the process of thinking about an Cognitive Trait
issue; the student learns new ideas and relationships by An ability a human possesses for cognition. Working
relating an issue to previously learned material. (Owen memory is an example. (Lin & Kinshuk, 2005)
& Aworuwa, 2005)
Cognitive Trait Model
Cognitive Science A model representing one or more cognitive traits of
1: The ield of science concerned with cognition and learners. (Lin & Kinshuk, 2005)
including parts of cognitive psychology, linguistics,
computer science, cognitive neuroscience, and philosophy Cognitive Trust
of mind. (Alkhalifa, 2005a) 2: The multidisciplinary study Judgments regarding a persons competence and reliability.
of intelligent systems (natural, artiicial, and hybrid). The (Sonnenwald, 2005)
disciplines that currently comprise cognitive science are
(in alphabetical order) anthropology, artiicial intelligence, Cognitive Walkthrough
education, linguistics, neuroscience, philosophy, and 1: An expert-based interface evaluation method. Experts
psychology. (Gelepithis, 2005) perform a walkthrough of the interface according to
pre-speciied tasks, trying to pinpoint shortcomings
Cognitive Style and deiciencies in it. Their remarks are recorded by a
1: A persons preferred way of gathering, processing, recorder and are elaborated by the design team. (Karoulis
and evaluating information. (Kaluzniacky, 2006) 2: An et al., 2006) 2: A model-based technique for evaluation
individual exhibits characteristic ways of processing of interactive systems designs. It is particularly suited for
information and hence solving problems, known as his walk up and use interfaces such as electronic kiosks or
or her cognitive style. (Mullany, 2005) 3: Refers to ATMs. Its aim is to analyze how well the interface will
enduring patterns of an individuals cognitive functioning guide irst-time or infrequent users in performing tasks.
that remain stable across varied situations. (Crossland, Analysis is performed by asking three questions at each
2005) stage of the interaction: Will the correct action be made
suficiently evident to users? Will users connect the correct
Cognitive System actions description with what they are trying to achieve?
A complex system that learns and develops knowledge. Will users interpret the systems response to the chosen
It can be a human, a group, an organization, an agent, action correctly? (Campos & Harrison, 2006)
a computer, or some combination. It can provide
computational representations of human cognitive Cognitivism
processes to augment the cognitive capacities of human 1: A scientiic branch of social sciences; also known as being
agents. (Plekhanova, 2005a) part of cognitive science. Cognitivism focuses on cognition
and on cognitive processes by following a perspective that
Cognitive Task Analysis is centered on the individual, on the idea of the mind, and
The study of the way people perform tasks cognitively. on the neuro-physiology of brain processes. The Cartesian
(Jaspers, 2006) dualism and the radical distinction between individual and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cognos Colla borat ion 95

social processes, the rationalist and utilitarist perspectives CoLKEN


that interpret the human subject as an independent and Coopetitive Learning and Knowledge Exchange
autonomous entity, and the results-oriented and objectives- Networkthat is, a speciic setting for inter-organizational
C
centered approaches to human action may all come knowledge management initiatives focusing on issues
under the broad umbrella of cognitivism. Mainstream related to cooperation-competition-dilemmas and
management theory is largely inluenced by cognitivist intentional/unintentional knowledge transfer. (Loebbecke
approaches. Pos-cognitivism does not deny the positive & Angehrn, 2006)
contributions brought by cognitivist thinking, though it
highlights the need for further developments and for the CoLKEN Construct
exploration of alternative approaches. Communities of Structure of main CoLKEN components: at the base
practice theory may be understood as being part of the level are knowledge, knowledge agents, and knowledge
pos-cognitivism movement, which calls attention to the networks; at the CoLKEN focus level, we ind the balancing
social embeddedness and embodiedness of all knowledge- act between cooperation and competition, which should
creation processes. (Nobre, 2006c) 2: Concerned with what lead to value maximization on the top level. (Loebbecke
the learner is thinking in terms of processing information & Angehrn, 2006)
for storage and retrieval. (Ally, 2005b)
CoLKEN Taxonomy
Cognos Depicting groups of CoLKENs by differentiating the
Business intelligence software that enables organizations overall variety along at least two dimensions, for example,
to monitor performance and develop strategic business along the dimensions of ICMT usage and governance
solutions based on collected data. (Athappilly & Rea, focus. (Loebbecke & Angehrn, 2006)
2005)
Collaboration
Coherence Bandwidth 1: A close, functionally interdependent relationship,
The bandwidth over which the channel affects transmitted in which organizational units strive to create mutually
signals in the same way. (Iossiides et al., 2005) beneicial outcomes. Collaboration involves mutual trust,
the sharing of information and knowledge at multiple
Cohesion levels, and includes a process of sharing beneits and risks.
1: The extent to which nodes form a group such that all Effective collaboration cannot be mandated. (Peterson,
members have mutual strong ties. (Dekker & Hendriks, 2005) 2: A project between at least two partners. The
2006) 2: The strength of connection between the members partners show consideration for each other and do not try
of a community or network, and thus a community or to selishly fulill their own needs. Each partner enters
network can be densely knit or only loosely coupled; collaborations voluntarily. Because of the impossibility
cohesion is a result of intensity, frequency, and type of to clearly specify all activities and control collaborations
the members contacts. (Meller-Prothmann, 2006a) 3: exactly, trust plays a major role. (Hofer, 2006) 3: Group
The degree to which elements within a class are related effort characterized by members of a group working
to one another and work together to provide well-bounded together to complete all aspects of a project, and all members
behavior. (Polgar, 2005b) of the group are jointly accountable for the inished
product. (Ingram & Hathorn, 2005b) 4: Human behavior
Cohort that facilitates the sharing of meaning and completion of
A group of students who take the same courses together tasks with respect to a mutually shared goal; takes place
throughout their academic program. (Murray & in social or work settings. (Sonnenwald, 2005) 5: Human
Efendioglu, 2005) behavior, sharing of meaning, and completion of activities
with respect to a common goal and taking place in a
CoL: See Community of Learners. particular social or work setting. (Sonnenwald & Pierce,
2000) 6: A philosophy of interaction and personal lifestyle.
Collaborative Environment (Sala, 2005b) 7: Occurs when small groups of people work
An environment for work and experience that is capable together toward a common goal in ways that produce new
of supporting the construction of collective practices and products and knowledge that are unlikely to be developed by
knowledge. (Matta, 2005) individuals. Three essential elements of collaboration are

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
96 Colla borat ion Sc ript Colla borat ive Fore c a st ing a nd Re ple nishm e nt

interdependence, synthesis, and independence. (Ingram, Collaborative Culture


2005) 8: Sharing responsibility in tasks with common By their nature, virtual organizations foster camaraderie
C goal(s). (Han & Hill, 2006) 9: The mutual engagement between members even in the absence of face-to-face
of participants in a coordinated effort to solve a problem. communications. Since the built-in communications
(Cagiltay et al., 2005) 10: The process of communication tools are so easy to access and use, relationships form
among people with the goal of sharing information and between members who have not even met. A corporate
knowledge. (Loh et al., 2005) 11: To facilitate the process culture forms out of friendship that produces a highly
of shared creation involving two or more individuals collaborative nature, unlike traditional organizations
interacting to create shared understanding where none had where such extensive communicating is not required. (J.
existed or could have existed on its own. (Vat, 2005b) Lee, 2005)

Collaboration Script Collaborative Filter


A detailed and explicit contract between the instructor A form of Recommender System that uses implicit or
and the learners, often in a sequence of phases, each phase explicit recommendations of others to provide advice.
typically consisting of a set of instructions that prescribe the (Dron, 2005)
task, the group composition, the way the task is distributed
within and among the groups, the nature of interaction, Collaborative Filtering
and the timing. A well-known example of a collaborative 1: A method for making automatic predictions (iltering)
script is the Jigsaw. (Pys & Lowyck, 2005) about the interests of a user by collecting ratings and
interest information from many users (collaborating).
Collaboration Server (Nasraoui, 2005) 2: A recommendation technique that uses
Helps users work together via the Web, supporting tasks, k-nearest neighbor learning algorithm. Variations include
projects, communities, calendars, discussions, and user-based and item-based algorithms. (Sarwar et al., 2005)
document sharing with version control. (Wojtkowski, 3: A technique that is used for making recommendations
2006) by computing the similarities among users. (Chen & Liu,
2005) 4: A technique used to collect user opinions or
Collaboration Tools preferences for items of interest. A CF algorithm employs a
Technologies designed to allow users to share knowledge correlation method to predict and recommend items to new
with one another. The key features include shared or returning users based on the similarity of their interests
spaces, calendaring, worklow management services, with those of other users. (Dasgupta et al., 2006) 5: Aims
and synchronous and asynchronous communication. at exploiting preference behavior and qualities of other
(Chua, 2006) persons in speculating about the preferences of a particular
individual. (Parmar & Angelides, 2005) 6: An approach
Collaborative Browsing to provide recommendations based on the preferences of
Online navigation on the Internet by a group of similar users. (Chen & McLeod, 2006) 7: An approach
individuals that assembles in the same physical setting that collects user ratings on currently proposed products
and browses online using the same or adjacent interfaces to infer the similarity between users. (Lorenzi & Ricci,
in the attainment of task-oriented objectives. (Bagozzi & 2005) 8: Such methods combine personal preferences of
Dholakia, 2005) a user with preferences of like-minded people to guide
the user. (Seitz, 2005) 9: Selecting content based on the
Collaborative Commerce preferences of people with similar interests. (Schafer, 2005)
The processes, technologies, and supporting standards that 10: Unveiling general patterns through snifing through
allow continuous and automated exchange of information users past activities. (Quah et al., 2006c)
between trading partners and can be horizontal competitive
cooperation or coopetition, as well as vertical collaboration Collaborative Forecasting and Replenishment
along a supply chain. (Rowe et al., 2006) An inter-organizational system that enables retailers and
manufacturers to forecast demand and schedule production
Collaborative Community jointly by exchanging complex decision support models and
A group of people sharing common interests and acting manufacturer/retailer strategies so that the two supply chain
together toward common goals. (Nabuco et al., 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Colla borat ive I nt e rfa c e Colla borat ive Pla nning, Fore c a st ing, a nd Re ple nishm e nt (CPFR) 97

parties can reduce demand uncertainty and coordinate (Bonk et al., 2005) 10: Learning is integrated in the life
their decisions. (Abraham & Leon, 2006) of communities that share values, beliefs, languages, and
ways of doing things. What holds the learners together is
C
Collaborative Interface a common sense of purpose and a real need to know what
Interface in which the interaction between the user and the other knows. The essence is the underlying process
the system is guided by the principles of collaborative of shared creation, involving two or more individuals
behavior. (Babaian, 2005) interacting to create shared understanding where none
could have existed on its own. (Vat, 2005a) 11: Learning
Collaborative Learning situation in which a group of learners work together
1: A model of learning that involves groups of students on a task, where each learners input is critical to the
working together on a project or assignment. In this model, learning of the others in the group. (Collis & Moonen,
communication between students is crucial to a successful 2005a) 12: Learning that occurs through the exchange
outcome. (Shaw, 2005) 2: A more radical departure from of knowledge among learners. Collaborative learning is
cooperative learning. Involves learners working together a form of social learning. (Klobas & Renzi, 2005b) 13:
in small groups to develop their own answer through Learning that requires joint activity in which two or more
interaction and reaching consensus, not necessarily a learners negotiate meaning and process, and contribute
known answer. Monitoring the groups or correcting to the inal outcome. (Bennett, 2005) 14: Learning where
wrong impressions is not the role of the trainer, since there emphasis is placed on student-to-student interaction in the
is no authority on what the answer should be. (Blackmore et learning process, and the instructors role becomes that of a
al., 2006) 3: A philosophy of interaction where individuals facilitator (a guide-on-the-side). (McInnerney & Roberts,
are responsible for their actions, including learning, and 2005) 15: A form of learning that involves collaborative
respect the abilities and contributions of their peers. (Berg, learning processes. It is designed for coaches, helpers
2005f) 4: A style of teaching and learning in which students and faculty, and groups of learners to fulill the learning
work in teams toward a common goal. In some online objectives of groups and of each learner through sharing
courses, collaborative learning teams are used to encourage resources and interacting. (Kayama & Okamoto, 2005)
students to work cooperatively with each other. The idea is
that students learn from each other while participating in Collaborative Learning and Teaching
teams. (Du Mont, 2005) 5: An instruction method in which Includes a process of creating a teaching and learning
students work in groups toward a common academic goal. environment that focuses on the establishment of
(Moreira & da Silva, 2005) 6: An instructional approach in partnerships with which to approach learning tasks
which students of varying abilities work together in small and achieve common goals. Key characteristics of
groups to solve a problem, complete a project, or achieve collaborative learning and teaching include interactivity,
a common goal. It is a philosophy that involves a sharing interdependency, and shared learning goals. (McCracken,
of authority and responsibility among group members 2005)
who strive to build consensus and group ownership for
the learning. (Sala, 2005b) 7: A personal philosophy, not Collaborative Network
just a classroom technique. In all situations where people A network of services and the base infrastructure
come together in groups, it suggests a way of dealing supporting distributed cooperative environments. (Unal
with people that respects and highlights individual group et al., 2006)
members abilities and contributions. There is a sharing of
authority and acceptance of responsibility among group Collaborative Online Environment
members for the groups actions. The underlying premise Internet-based learning setting that facilitates collegial
of collaborative learning is based upon consensus building or collaborative relationships and attempts to maximize
through cooperation by group members, in contrast the eficiencies of virtual learning teams. (Bonk et al.,
to competition in which individuals beat other group 2005)
members. (Donnelly, 2005) 8: An approach that involves
learners (and sometimes teachers) working together and Collaborative Planning, Forecasting, and
learning from each other. (Agosti, 2005) 9: Engagement Replenishment (CPFR)
in learning wherein students utilize and build upon 1: A process where the entire extended supply chain,
their individual strengths and interests for greater good. including manufacturers, distributors, and retailers, is

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
98 Colla borat ive Re se a rch Colle c t ion M a na ge m e nt

using the same information through collaborative process premium brand name and Nestls manufacturing and
to improve sales and forecast accuracy, reduce inventory distribution know-how. (Angehrn & Gibbert, 2005)
C levels, and prevent stock outs due to promotions. (Khan
et al., 2006) 2: An industry-wide initiative that involves Collaborative Tool
collaboration between trading (supply chain) partners in 1: A tool or technique that facilitates distant collaboration
the retail industry in order to achieve lower costs, higher geographically at different locations. (Nandavadekar, 2005)
eficiency, and better customer satisfaction. (Saha, 2005) 2: An electronic tool that supports communication and
3: A global, open, and neutral business process standard collaborationpeople working together; essentially it takes
for value chain partners to coordinate the various activities the form of networked computer software. (Metaxiotis,
of purchasing, production planning, demand forecasting, 2006) 3: E-mail, an intranets, a threaded discussions, or an
and inventory replenishment, in order to reduce the online discussion room that allows learners to collaborate
variance between supply and demand, and to share the on projects. Such tools also allow moderated discussions
beneits of a more eficient and effective supply chain. to take place in an online environment. (Brown, 2006)
(Archer, 2005) 4: Traditional chat, whiteboard, messaging, presentation,
VoIP, or a conferencing system; a strong component of
Collaborative Research knowledge management in the military. (Maule, 2006)
A type of research developed by individuals who belong
to different academic or practical disciplines in which Collaborative Virtual Environment
there is a variety of purposes, methods, and outcomes. 1: An environment that actively supports human-
(Crdoba & Robson, 2006) human communication in addition to human-machine
communication and which uses a virtual environment
Collaborative Resources as the user interface. (Viktor & Paquet, 2005) 2: An
An object representing a resource used/shared/exchanged interactive space in cyberspace that allows communities
by a pair of collaborating roles in order to perform certain to work, as opposed to communicate only, by interacting
simple tasks in collaboration with one another. (Daneshgar, in deined virtual spaces, using speciically designed
2005) artifacts to mimic the physical environment in which they
traditionally work. (Huq, 2006)
Collaborative Technology (CT)
A technology that includes at a minimum a virtual Collaborative-Social-Filtering Recommender
workplace that provides a repository recording the process Systems
of the group, electronic information sharing (such as Technique based on the correlation between users interest.
through ile sharing, e-mail, electronic whiteboards, and This technique creates interest groups between users, based
electronic conference), meta-information on the entries on the selection of the same. (Gil & Garca, 2006)
in the repository (such as data, sequence, and author of
each contribution), and ease access and retrieval from the Collaboratory
repository. (Sun & Xiao, 2006) Provides groups with technologies and tools so that they
can access each other, databases, and remote tools to better
Collaborative Tele-Learning collaborate, coordinate activities, and enhance group
The use of technology for distributed communication, processes. (Alavi et al., 2005)
collaboration, and problem solving among participants
in a learning environment. (Wild, 2005) Collection Development
The portion of collection management activities that
Collaborative Thinking primarily deals with selection decisions. (Gregory,
A strategic mindset where adjacent and even overlapping 2005)
stages in the industry value chain are seen as potential
partners rather than competitors. For example, Starbucks Collection Management
and Nestl both produce coffee, but they nevertheless All the activities involved in information gathering,
partnered up for the creation and distribution of chilled communication, coordination, policy formulation,
coffee-based soft drinks, thereby leveraging Starbucks evaluation, and planning that result in decisions about

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Colle c t ion of I nfor m at ion Collusion At t a ck 99

the acquisition, retention, and provision of access to and such social inluence as compliance, group norms,
information sources in support of the needs of a speciic and social identity and such personal mental states as
library community. (Gregory, 2005) anticipated emotions, desires, and value perceptions (e.g.,
C
purposive value, self-discovery, maintenance or personal
Collection of Information connectivity, social enhancement, and entertainment
Comprises several (typically several thousand or several value). (Bagozzi & Dholakia, 2005)
million) documents. (Trujillo, 2005)
Collective Knowledge
Collection Stage 1: Knowledge produced and shared by a group of people.
Stage of the intelligence cycle in which sources regarding Virtual community is a source of collective knowledge
the required environmental data are located and accessed, with the contribution of its participants. (Wang, Wei, et
and the data are retrieved from them. (Vriens, 2005b) al., 2006) 2: The knowledge of the organization, including
the knowledge of its employees, and customer/supplier and
Collection Type industry knowledge that can be actioned to bring about
A composite value comprising elements of some data innovation. (Mitchell, 2005a)
types. SQL:1999 supports arrays, which are ordered and
unbounded sets of elements. Another collection type not Collective Responsibility
supported by the standard is a nested table. (Zendulka, The idea that a group is sanctioned with, and accepts
2005b) responsibility for, creating change in the organization.
Each member helps and supports other members to make
Collective Action progress on implementing actions. (Shaw et al., 2006)
1: The voluntary cooperation of a group of individuals
that typically involves the production of a public or Collectivism
semi-public good. (Teigland & Wasko, 2005) 2: An Concerned with group interest rather than individual
initiative, undertaken by groups of owners, industry interest (individualism). Collectivist societies support
groups, government groups, and so forth, who audit the structures where people are born and live in extended
collective system operation and exchange information families. The concept of collective strength includes
to detect patterns of distributed attacks. (Janczewski & sharing, nurturing, supporting, and empowering
Portougal, 2005) interdependent groups. (Peszynski, 2005)

Collective Awareness Collision


A common and shared vision of a whole teams context A usually destructive event resulting from the simultaneous
which allows members to coordinate implicitly their access to the same bandwidth resource by multiple users.
activities and behaviors through communication. (Daassi (Markhasin et al., 2005)
& Favier, 2006)
Collusion Attack
Collective Dependence 1: An act of removing watermarksa digital ingerprint
A set V of variables is collectively dependent if V cannot that identiies the buyer(s) from the marked media. It is
be split into non-empty subsets X and Y such that X and based on the idea that both the position and the content
Y are marginally independent, nor can V be partitioned of the ingerprint embedded in every watermarked legal
into non-empty subsets X, Y, and Z, such that X and Y are copy are different. If the attacker obtained plenty of legal
conditionally independent given Z. (Xiang, 2005) copies, he or she could get suficient knowledge about the
positions of the ingerprints by comparing all the copies.
Collective Human Knowledge Then he or she could arbitrarily modify the information
Shared human knowledge that has been linguistically on the positions so as to fool the ingerprint detector. (Si &
represented. (Gelepithis, 2005) Li, 2006) 2: By averaging together the carriers of hidden
information, the watermarks may be canceled out. (Lou
Collective Intentional Action et al., 2006)
Mutual or joint behaviors performed by a group of persons,
and explained by collective intentions (e.g., we-intentions)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
100 Color Fe at ure Com m on Cost

Color Feature Commercial Off-the-Shelf (COTS)


Analyzing the color distribution of pixels in an image. Software products that an organization acquires from a
C (Chan & Chang, 2005) third party with no access to the source code and for which
there are multiple customers using identical copies of the
Color Histogram component. (Chroust, 2006)
A method to represent the color feature of an image by
counting how many values of each color occur in the Commercial Off-the-Shelf Application
image and then forming a representing histogram. (Farag, 1: An approach to software development where, instead
2005a) of attempting to build an application from scratch, a
generic standardized package is purchased that contains
Combination all the main functionality. This package is then conigured
1: A knowledge transfer mode that involves new explicit and customized so as to meet the additional speciic
knowledge being derived from existing explicit knowledge. requirements. (M. Lang, 2005) 2: The use of software
(Wickramasinghe, 2005) 2: One of four knowledge components that are generic enough to be obtained and
transmission mechanisms according to Nonaka. It used in different applications; often well designed and well
is a tacit-to-explicit knowledge transfer taking place implemented to offer good performance. (Gaffar, 2005)
when individuals articulate their tacit knowledge base,
converting it into explicit knowledge that can be shared Commit
with others. (Brock & Zhou, 2006) Activates all modiications performed by a transaction,
makes them visible to the outside, and makes all
Combination of Forecasts modiications durable. (Meixner, 2005)
Combining two or more individual forecasts to form a
composite one. (C.K. Chan, 2005) Commitment
A state of mind that holds people and organizations in the
Combinatorial Optimization line of behavior. It encompasses psychological forces that
Branch of optimization in applied mathematics and bind an individual to an action. (Leonard, 2005)
computer science related to algorithm theory and
computational complexity theory. (Felici & Truemper, Commodity
2005) A generic and largely undifferentiated product that is
usually bought or sold by itself without bundled value-
Commerce added services or differentiated features. (Bahn, 2006)
The selling of products from the manufacturing,
distribution, and retail irms to customers. (Borders & Commodity-Based Market
Johnston, 2005) A form of a market in which various suppliers and
consumers participate to trade goods and services (i.e.,
Commercial Groupware Packages commodities) of the same type. The market price is publicly
Proprietary software that provides bundled software, agreed upon for each commodity, independent of any
including synchronous and asynchronous messaging, particular supplier. All consumers and suppliers decide
collaborative application development, information whether and how much to buy or sell at each agreed-upon
management through shared databases, data exchange, price. (Ghenniwa & Huhns, 2005)
Web functions, and other tools. (Ferris & Minielli,
2005) Common Carrier
A company licensed, usually by a national government,
Commercial Knowledge to provide telecommunications services to the public,
An important focus of practical knowledge transfer facilitating the transmission of voice and data messages.
in business. It is exempliied by the implementation (Guah & Currie, 2005)
knowledgesets of rules, tools, guidelines, and ways to
effectively employ themthat is conveyed by a consultant Common Cost
who is aiding a client in implementing or customizing a The cost of joint production of a set of services. (Hackbarth
complex information system. (King, 2006b) et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com m on Dat a M ode l (CDM ) Com m on Vulne ra bilit ie s a nd Ex posure s (CV E) 101

Common Data Model (CDM) Common Information Model (CIM)


The data to be shared across the scope of an integrated A deinition of the information to be shared across the
computing system in terms that are neutral with respect to scope of an integrated system. A CIM may span multiple
C
the applications and technologies that make up that system. domains, as long as the elements of each of the domains
A CDM provides a vocabulary for talking meaningfully can be mapped uniquely to an element of the CIM. (Fulton,
about the data that represent the information deined in 2005)
the low, transformation, and contents of data packages
that are delivered from one application or technology to Common Interface Format (CIF)
another. (Fulton, 2005) A typical video or image resolution value with dimensions
352x288 pixels. (Koumaras et al., 2005)
Common Gateway Interface (CGI)
1: A standard protocol for users to interact with applications Common Knowledge
on Web servers. (Goh & Kinshuk, 2005) 2: A standard An organizations cumulative experiences in comprehending
protocol used on the World Wide Web which allows Web a category of knowledge and activities, and the organizing
pages and distributed applications to communicate with a principles that support communication and coordination.
Web server and request some services on the server side. (Becerra-Fernandez & Sabherwal, 2006)
(Gaffar & Seffah, 2005)
Common Law
Common Gateway Interface Program The legal tradition that evolved in England from the 11th
(CGI Program) century onwards. Its principles appear for the most part
1: A small program that handles input and output from a in reported judgments, usually of the higher courts, in
Web server. Often used for handling forms input or database relation to speciic fact situations arising in disputes that
queries, it also can be used to generate dynamic Web courts have adjudicated. (Zeleznikow, 2006)
content. Other options include JSP (Java server pages) and
ASP (active server pages), and scripting languages allowing Common Log Format (CLF)
the insertion of server-executable scripts in HTML pages A W3C standard format for records in a server log. The
and PHP, a scripting language used to create dynamic Web main items in the CLF are IP address of the user, the date
pages. (Nasraoui, 2005) 2: Any program designed to accept and time of the request, the URL of the page, the protocol,
and return data that conforms to the CGI speciication. the return code of the server, and the size of the page if
CGI programs are the most common way for Web servers the request is successful. (Y. Fu, 2005)
to interact dynamically with users. The program could be
written in any programming language including C, Perl, Common Object-Request Broker Architecture
Java, or Visual Basic. (Valenti, 2005) (CORBA)
1: An open-standards-based distributed computing
Common Ground solution. (Kasi & Young, 2006) 2: A method to make
1: A form of self-awareness in the interaction between heterogeneous systems interoperable by dealing with
two people; the sum of their mutual, common, or joint languages. It moves the language into the background
knowledge, beliefs, and suppositions. (Ahmad & Al-Sayed, through an interface deinition language. Developers
2006) 2: Shared knowledge and experience common to need to understand language bindings to use CORBA.
both sender and receiver. This common ground enables More suitable for intra-enterprise environments. (Zhang,
the references and context of the message to be deciphered 2006) 3: An object-oriented architecture that provides a
successfully and meaning to be communicated. (Thomas standard mechanism for deining the interfaces between
& Roda, 2006b) components, as well as tools to facilitate the implementation
of interfaces using the developers choice of languages,
Common Identity thus providing for language and platform independence.
A common ground/understanding to which many people/ (Murthy & Krishnamurthy, 2005c)
groups can subscribe; requires a shift from seeing oneself
as separate to seeing oneself as connected to and part of Common Vulnerabilities and Exposures (CVE)
an organizational unit. (Ali & Warne, 2005) A list of standardized names for vulnerabilities and other
information security exposures. CVE aims to standardize

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
102 Com m onse nse K now le dge Com m unic at ion Te chnology

the names for all publicly known vulnerabilities and constructively conlict is managed. (Ali & Warne, 2005)
security exposures. (Cardoso & Freire, 2005) 2: Or atmosphere, can be deined as a set of conditions
C that transform cultural behavior and information into
Commonsense Knowledge desired (or undesired) states of a given entity (person,
The knowledge expected of every individual in a society. group, organization, region, nation, globe) through the
It includes acquaintance with the physical world and the communication process. (Targowski & Metwalli, 2005)
laws governing it, social behaviors, and procedures for
everyday tasks, such as simple business transactions. It Communication Environment
lies on the commonsense-expert knowledge dimension. In one sense, technology operates in a physical environment,
(Ein-Dor, 2006) but for computer-mediated communication, technology is
the environment, that is, that through which communication
Communicating X-Machine occurs. (Whitworth, 2006b)
A set of stream X-machine components that are able to
communicate with each other by exchanging messages. Communication Infrastructure
(Kefalas et al., 2005) Glue that links geographically dispersed users of
a learning environment together and gives them the
Communication impression of being in the shared workspace of the virtual
1: The exchange of information between two or more classroom. (Rugelj, 2005)
people with the intent that the senders message be
understood and considered by the receiver. (Teeni, 2006) Communication Media
2: H1 communicates with H2 on a topic T if and only if: The methods or tools in which information can be
H1 understands T (symbol: U(H1 T)), H2 understands exchanged and communication can be facilitated.
T (symbol: U(H2 T)), U(H1 T) is presentable to and Examples include telephones, televisions, e-mail, Web
understood by H2, and U(H2 T) is presentable to and sites, videoconferencing, and instant messaging, to name
understood by H1. (Gelepithis, 2005) 3: Human interaction a few. (Y.D. Wang, 2005)
to present, share, and build information and knowledge.
(Han & Hill, 2006) 4: The exchange of thoughts, messages, Communication Norms
or information by speech, signals, writing, or behavior. In the context of virtual teams, communication norms
Communication generally includes a sender, a receiver, are typical routines and expectations for communicating
a message, and a medium used to carry the message. within a virtual team using the communication media
(Croasdell & Wang, 2006) that the team has available to them (e.g., electronic
communication such as e-mail or instant messaging,
Communication Apprehension telephone, etc.). (Staples et al., 2005)
Apprehension associated with real or anticipated
communication with others. Traditional students with Communication Preference
high communication apprehension tend to quietly sit The selection of your own way in the art and technique
in a large lecture room, having minimal interpersonal of using words effectively to impart information or ideas.
contact with the instructor or other students. (Adkins & (Janvier & Ghaoui, 2006)
Nitsch, 2005)
Communication Strategies
Communication Channel The means by which communication goals can be fulilled.
The medium used to convey the message. The channel (Willis, 2005)
could involve seeing, hearing, smelling, feeling, or tasting.
Various media (e.g., e-mail, Web sites, telephone) may be Communication Technology
more or less appropriate for various messages. (Jacobson, The branch of technology concerned with the representation,
2006) transfer, interpretation, and processing of data among
persons, places, and machines. (Melkonyan, 2005)
Communication Climate
1: Extent to which there is an open and free exchange of
information, transparency of decision making, and how

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com m unic at ions Ce nt e r Com m unit y K now le dge Building 103

Communications Center Community Building


A commercial venture that is reselling telephone services All activities related to building and maintaining online
from a few number of telephone lines. (Frempong & communities. (Kindmller et al., 2005)
C
Braimah, 2005)
Community Building and Unpaid Work
Communications Gap Recognition that communities do not just happen. They are
Relates to that part of the knowledge gap that can be built and evolve, usually through the work of volunteers
attributed to miscommunication between the parties who are not paid, monetarily, for their work. (Crichton,
involved (i.e., IT designers understand technology but 2005)
not the realities of governance; oficials and politicians
understand the realities of governance but not the Community Capacity Building
technology). (Velibeyoglu, 2005) Investment in people, institutions, and practices that will,
together, enable communities to achieve their goals. (Pease
Communications-Related Antecedent Factors et al., 2005)
Source credibility and communications competence (in
terms of both encoding and decoding capabilities) are Community College
communications-related antecedent factors for effective A higher education institution supported by the
knowledge transfer. (King, 2006b) government, emphasizing preparing students for transfer
to four-year colleges and on providing skill education in
Community speciic vocations. (Berg, 2005b)
1: Social network whose members are characterized
by a common interest, similar behavior, and a sense of Community Development
moral responsibility. (Flavin & Guinalu, 2006) 2: A 1: Activities that consider social and economic beneits,
destination within the portal used to deliver applications including self-determination. (Geiselhart & Jamieson,
and group workspaces. For example, portal users can 2005) 2: Concerned with the relationship between
create communities to bring a team of people together social and economic development, building a capacity
to collaborate on a project or to deliver an employee for local cooperation, self-help, and the use of expertise
services application to the entire company. Communities and methods drawn from outside the local community.
are assembled using portlets, and can be created from (Walker, 2006)
templates that control the communitys functionality and
appearance. (Wojtkowski, 2006) Community Informatics
1: A multidisciplinary ield for the investigation of the social
Community Access Center and cultural factors shaping the development and diffusion
A publicly funded computer center (also called Telecenter of new ICT and its effects upon community development,
or Community Technology Center) providing community regeneration, and sustainability. (Thompson, 2005) 2: The
members with access to computer training and computer process of using ICT, and ICT-related facilities, such as
technology, including computers, printers, scanners, and a telecenter, in social development programs to help the
the Internet. (Dyson, 2005) community develop economically, socially, and culturally.
(Gnaniah, Songan, et al., 2005) 3: The use of ICT and
Community Broker associated facilities in conjunction with the development
The leader of a community who provides the overall and delivery of programs to aid community development
guidance and management to establish and/or maintain economically, culturally, and socially. (Pease et al., 2005)
a community. He/she supports community activities, 4: The use of information and computer technologies in
promotes the community within the organizations, and acts communities in order to impact communities socially and
as the contact person for both community members and economically. (Shea & Davis, 2005)
people interested in (joining) the community. (Zboralski
& Gemnden, 2006) Community Knowledge Building
Knowledge that derives from members interaction in a
community. (Lambropoulos, 2006b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
104 Com m unit y M e m or y Com m unit y of I nt e re st

Community Memory Community of Circumstance


Communities are made up of individuals, each of whom A community driven by position, circumstance, or life
C possesses unique memories. Community memory is experiences. Such communities are distinguished from
the preservation, persistence, and sharing of individual communities of practice in that they tend to be personally
memories and knowledge among a community through focused and are often built around life stages, such as
communicative means such as tradition, custom, language, teenagehood, university, marriage, or parenthood. (Kimble
writing, stories and myth, and various artifacts. (Leath, & Hildreth, 2005)
2005)
Community of Creation
Community Mining 1: A community of practice where members mainly focus
A Web graph mining algorithm to discover communities on the sharing and generation of new knowledge for the
from the Web graph in order to provide a higher logical purposes of creating new ideas, practices, and artifacts (or
view and more precise insight of the nature of the Web. products). They can be legitimized through involvement
(Wen, 2005b) in a company-sponsored product development effort,
or they may be informal through various practitioners
Community Model with similar experience and knowledge meeting where
A model in which all the partners in an interaction are new innovations arise from this interaction. (Paquette,
able to communicate with one other on an equal basis. 2006a) 2: The community that forms when companies
(Shan et al., 2006b) organize their customers into groups holding similar
expert knowledge and encouraging interaction in order to
Community Moderators generate new knowledge. These groups are characterized
Day-to-day leaders in virtual communities who control by working together over a long period of time, sharing a
discussions in individual forums, point the community common interest, and wanting to create and share valuable
members in the right direction, and ensure that the social knowledge. Unlike traditional communities of practice,
climate of the forum promotes participation and exchange these groups span organizational boundaries and develop
among its members. (Ruhi, 2006) value for multiple organizations. (Paquette, 2006b)

Community Network (Traditional) Community of Experts (CoE)


A sociological concept that describes the rich Web of A collection of people who possess very high knowledge
communications and relationships in a community. (Gibbs (expertise) in a particular ield. They are subject-matter
et al., 2005) experts and provide intellectual leadership within an
organization. A CoE can exist across company divisions
Community Networking (Technology) and across organizational boundaries. (Sivakumar,
Computer-based ICT intended to support community 2006)
relationships. (Gibbs et al., 2005)
Community of Implementation
Community Normative State A group whose purpose is to pool individual knowledge
Set of information about the community structure, (including contacts and ways of getting things done) to
regulating not only resource management but also policy stimulate collective enthusiasm in order to take more
enforcement. More precisely, the normative state contains informed purposeful action, for which the members are
community directions as well as policies regulating access responsible. (Shaw et al., 2006)
to community resources. Additionally, it includes all those
kinds of information that help the members to actively Community of Interest
participate in community life. Such information concerns 1: A group of people who share a common interest.
aspects such as the management of the community, Members exchange ideas and thoughts about the given
sanctioning mechanisms, and violation punishments. interest, but may know little about each other outside of
(Bertino et al., 2006) this area. Participation in a community of interest can be
compelling and entertaining, but is not focused on learning

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com m unit y of Le a r ne rs (CoL) Com m unit y of Pra c t ic e (CoP) 105

in the same way as a community of practice. (Kimble with strategic imperatives, helping each other to solve
& Hildreth, 2005) 2: An online group that grows from problems, share and beneit from each others expertise,
common interest in a subject. They develop norms based and are committed to jointly developing better practice.
C
on shared values and meanings. (Lambropoulos, 2006b) (Ng & Pemberton, 2006) 7: A relatively tightly knit,
emergent social collective, in which individuals working
Community of Learners (CoL) on similar problems self-organize to help each other and
1: A community of students, teachers, tutors, and experts share perspectives about their work practice, generally
marked by the presence of the following elements: (1) in face-to-face settings. (Wasko & Teigland, 2006a) 8:
multiple ZPDs (the ones of the subjects in the CoLs); (2) An informal collective group of individuals bound by
legitimated peripheral participation (the respect of the a common practice base engaged in knowledge-sharing
differences and peculiarities existing among the various activities to add value to work. (Huq, et al., 2006) 9: An
subjects in the community); (3) distributed expertise; informal community of people bound by a common task
and (4) reciprocal teaching, peer tutoring, and various or purpose (e.g., similar work activities). A CoP nurtures
scaffoldings. In this community previous knowledge is a critical skill set in an organization. It can exist across
analyzed, veriied, and discussed, and new knowledge company divisions and sometimes across organizational
and theories are built. (Cartelli, 2006a) 2: A community boundaries. (Sivakumar, 2006) 10: A group of people
whose learning is fundamentally a social phenomenon. who share a set of concerns and sustain their collective
Namely, a CoL focuses on engagement in social practice actions through their participation and generation of new
as the fundamental process by which we learn and so knowledge. (Crdoba & Robson, 2006) 11: AHIMAs
become who we are. (Vat, 2005a) online networking and collaborating tool, created for
the use of its members and launched in 2001. (Zender,
Community of Peers 2006) 12: The concept of a CoP was irst introduced by
A grouping of peers having something in common or Lave and Wenger in 1991 in relation to situated learning.
considered grouped for a speciic purpose, (e.g., having Lave and Wenger saw the acquisition of knowledge as a
particular types of privacy policies as discussed above). social process in which people participated in communal
(Yee & Korba, 2006) learning at different levels depending on their authority
in a groupthat is, newcomers learn from old-timers by
Community of Practice (CoP) being allowed to participate in tasks relating to the practice
1: A community of individuals having the following of the community. Since 1991, the concept of CoPs has
elements in common: (1) a joint enterprise, as understood been extended and applied to areas such as knowledge
and continually renegotiated by its members; (2) a mutual management and virtual working. (Kimble & Li, 2006)
engagement binding members together into a social 13: A group of people who come together around common
entity; and (3) a shared repertoire of communal resources interests and expertise. They create, share, and apply
(routines, sensibilities, artifacts, vocabulary, etc.) that knowledge within and across the boundaries of teams,
members developed over time. (Cartelli, 2006b) 2: A business units, and even entire organizationsproviding
group of people in an organization who are (somehow) a concrete path toward creating a true knowledge
held together by common interest in their work topic, organization. (Vat, 2006b) 14: Although this term is
purpose, and activities. (Disterer, 2005) 3: A community common when referring to informal groups or networks
of professional individuals who have the shared sense of of people who share similar interests and objectives, CoPs
purpose in a work situation (e.g., professionals at different have been seen as an alternative to teamwork where a
institutions collaborating on best practice, or individuals variety of problems may be better considered through
that perform the same function in different parts of an knowledge shared by loose coalitions of people who
organization). (Fleming, 2005c) 4: A group of individuals develop their own tacit knowledge and methods for doing
that may be co-located or distributed, are motivated by a things. This is more common among certain professions
common set of interests, and are willing to develop and such as lawyers, barristers, GPs, academics, and so forth
share tacit and explicit knowledge. (Coakes & Clarke, whose conduct is regulated by professional associations
2006a) 5: A group of people who have work practices in and who share a similarity of attitudes and conventions.
common. (Elshaw, 2006a) 6: A group of self-governing (Grieves, 2006b) 15: Collaborative means to build and share
people with shared interests whose practice is aligned knowledge and expertise, increase social capital and the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
106 Com m unit y of Pra c t ic e M e m be rship Com pa c t Disc Re ad-Only M e m or y (CD-ROM )

economic value of relationships within the military, and Community Service Obligation
lower the cost of training. (Maule, 2006) 16: A community An obligation undertaken by particular levels of
C formed by people who engage in a process of collective government to ensure the provision of certain services.
learning in a shared domain of human endeavor. For a (Cameron, 2005)
community of practice to function, it needs to generate and
appropriate a shared repertoire of ideas, commitments, and Community Space
memories. It also needs to develop various resources such A spacereal, virtual, or a combination of bothwhere
as tools, documents, routines, vocabulary, and symbols a sense of community is created. (Walker, 2006)
that in some way carry the accumulated knowledge of the
community. (Boersma & Kingma, 2006) Community Telecenter
A public place that provides low-cost community access to
Community of Practice Membership ICTs such as computers, printers, telephones, faxes, e-mail,
In a community of practice, new members are included and the Internet. In many cases telecenters also have library
in tasks concerned with the practices of the group and resources, as well as audio, video, and documentation
they acquire knowledge from more expert members. production facilities. They may also provide training in the
Participation in a community of practice therefore involves use of ICTs, distance learning, and telemedicine, and also
movement from the periphery towards full participation usually support the production of information resources
in the group. (Ranguelov & Rodrguez, 2006) relevant to the needs of local users. They are sometimes
referred to as multipurpose community telecenters.
Community of Purpose (Mwesige, 2005)
A community that forms around people who are to
achieve a similar objective. Such a community only Community-Based Information Technology
serves a functional purpose. Members of the community The provision of training and information technology
can assist each other by sharing experiences, suggesting services to local communities to meet their communications
strategies, and exchanging information on the process in needs. (Pease et al., 2005)
hand. (Kimble & Hildreth, 2005)
Community-Building Activity
Community Place An online or off-line activity that promotes relational
Place inherent to the existence of a community, but not and social connection among participants. (Woods &
equivalent to it, with the following attributes: interactivity, Baker, 2005)
sustainable membership, diversity of communicators,
and a shared technology for group CMC. (Porto Bellini Community-Oriented Policing
& Vargas, 2006) Contemporary policing approach that builds relationships
between police oficers and the citizens of a community
Community Portal on an ongoing basis. Crime prevention is stressed as
1: A portal designed and developed to provide access a partnership approach before an actual emergency
to community resources and serve community needs situation(s) develops. (Baim, 2005)
and interests. (Vrazalic & Hyland, 2005) 2: A Web
site tailored for the needs of a community. (Boateng & Compact and Generalized Abstraction of the
Boateng, 2006b) 3: An online initiative often developed Training Set
through participative processes which aims to achieve A compact representation built by using the training set
better coordination of relevant Web-based information and from which not only the original patterns, but also some
provide communication services for community members. new synthetic patterns can be derived. (Viswanath et al.,
(Thompson, 2005) 4: Often set up by community groups or 2005)
based around special group interests, a community portal
attempts to foster the concept of a virtual community where Compact Disc Read-Only Memory (CD-ROM)
all users share a common location or interest, and provide 1: A type of optical disk capable of storing large amounts
many different services. (Tatnall et al., 2006) of data, up to 1 GB, although the most common size is
650 Mbytes. (Sala, 2005b) 2: Optical data storage medium

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com pa rat ive Online Ana lysis of Cult ure s (COAC) Com pe t it ion 107

using the same physical format as audio compact discs, Compensating Transaction
readable by a computer with a CD-ROM drive. (Kabene, A transaction that is executed to undo the effect of another
Takhar, et al., 2005) 3: A computer storage device offering a committed transaction. Unlike ordinary transaction
C
relatively high capacity. The full name denotes the fact that rollback or abort, both original and compensating
CD-ROMs are read-only devices; data cannot be written transactions are visible in the committed projection of
to a CD-ROM by a conventional player. (Duan, 2005) the execution history. (Leong, 2005a)

Comparative Online Analysis of Cultures Compensatory Strategy


(COAC) An educational approach that focuses on providing
A process in which individuals compare online media structures that support and enhance learners weaknesses
designed for two different cultural audiences in order to rather than exploiting their strengths. (Boechler, 2006a)
determine how cultures differ in their design expectations.
(St.Amant, 2005e) Competence
1: A description of the membership of a community of
Comparative Shopping Environment practice according to the degree of learning about practice
Offers three features: customer reviews of a product, in the community. (Crdoba, 2006b) 2: One of the three
competitive prices of the product, and ratings of the preconditions for citizen participation in e-democracy
merchant who sells the product. These features help (access-competence-motivation). Communications
customers select an appropriate product within a reasonable competence means that a person has the ability to use
price range, and choose merchants they can trust and feel channels of communication, opportunity, access, and skills
comfortable shopping with. (M. Wang, 2006) to use the devices involved and to formulate messages.
(Keskinen & Kuosa, 2005)
Comparison-Shopping Agent
A Web-based service that can collect product and service Competence Set
information, especially price-related information, from The nodes in a Bayesian Behavior Network are grouped
multiple online vendors, aggregate them, and then provide into competence sets, where each competence set has an
value-added service to online shoppers to assist with their associated set of actions that must be performed by the
online shopping. (Wan, 2006) Bayesian agencies depending on the states of the nodes
in the competence set. (Potgieter et al., 2005)
Compatibility
1: The degree to which an innovation is seen to be Competency
compatible with existing values, beliefs, experiences, 1: The recent focus on competency that comes from
and needs of adopters. (Green et al., 2005) 2: Describes employers stands in contrast to previous ways of
the degree to which the new product is consistent with acknowledging learning, such as seat-based time or
the adopters existing values and product knowledge, diplomas. To an increasing degree, graduates are being
past experiences, and current needs. (Owens et al., judged by what they can do, not by what they know.
2005) 3: Designs that match our expectations in terms of (Lindsay et al., 2005b) 2: A combination of education
characteristics, function, and operation. (Noyes, 2006) 4: and skills that qualify a professional for a certain task or
The ability to transmit data from one source to another ield. (Kostopoulos, 2005) 3: A statement that deines the
without losses or modiications to the data or additional qualiication required to perform an activity or to complete
programming requirements. (Becker, 2006) 5: Views a task. Faculty competencies for online distance education
V1 and V2 are compatible if functions f1 and f2 exist such identify the qualiications needed to be successful in a job.
that for all x, f1(x1) = f2(x2) = f(x), where f is the true target (Sales, 2005) 4: Demonstrated command of the knowledge,
function. (Scheffer, 2005) skills, and abilities required for effective performance in
a particular degree area. (D.B. Johnstone, 2005)
Compatibility of Innovation
The degree of consistency of an innovation with the needs, Competition
expected values, and norms of potential adopters and their When two individuals or species are in competition with
social systems. (Askarany, 2005) each other, they are each striving for the same thing. In

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
108 Com pe t it ive Adva nt a ge Com ple m e nt a rit y

biological systems, this is typically for food, space, or would deine similar variables as the required returns and
some other physical need, but in IT, it can be any matter beneits. A company is said to have a sustained competitive
C relating to IS curriculum. When the thing the competitors advantage when it is implementing a value-creating
are striving for is not in adequate supply for both of them, strategy, which generates returns and beneits at a level
the result is that both are hampered or adversely affected not enjoyed by current competitors and when these other
in some manner. (Tatnall & Davey, 2005) companies are unable to reach an equilibrium level
with the company enjoying the advantage. In this sense,
Competitive Advantage the deinition of sustained competitive advantage adopted
1: A condition that enables companies to operate in a more here does not imply that it will last forever, and does not
eficient or higher quality manner than the companies it depend upon the period of time during which a company
competes with, which results in inancial beneits. (Braun, enjoys a competitive advantage (rather, the equilibrium
2006) 2: A positive, relative position held by a irm as level is critical in this deinition). (Potgieter et al., 2005)
compared with competitors within a market or industry.
There are two types of competitive advantage: cost Competitive Intelligence
leadership and differentiation. (Cepeda-Carrin, 2006) 3: 1: In IT literature, two deinitions are used: a product
Deines a places or regions attribute(s) with the potential deinition and a process deinition. In the product deinition,
to place it in a leading position in any ield (generally used competitive intelligence is deined as information about
with regard to commercial or economic activity), such as the environment, relevant for strategic purposes. The
a natural or environmental icon that may give a region a process deinition highlights producing and processing this
competitive advantage in terms of tourism, or a mineral environmental information. Process deinitions often refer
deposit in terms of mining. A region or place needs to to the intelligence cycle. (Achterbergh, 2005a) 2: The set
identify and capitalize on distinctive assets and capacities of interrelated measures that aim at systematically feeding
to realize its competitive advantage. (Sutcliffe, 2005) 4: the organizational decision process with information about
Employing organizational resources in an advantageous the organizational environment in order to make it possible
manner that cannot be imitated readily by competitors. for people to learn about it, to anticipate its evolution, and
(Nissen, 2005) 5: The ability to gain a disproportionately to make better decisions in consequence. (de Carvalho &
larger share of a market because of cost leadership, or Ferreira, 2006)
product or service differentiation. (McManus & Carr,
2005) 6: The head start a business has owing to its access Competitive Neutrality
to new or unique information and knowledge about the A principle that states that government agencies and
market in which it is operating. (Kroeze, 2005) 7: Usually businesses should not enjoy any competitive advantage
refers to characteristics that permit a irm to compete over privately operated competitors in the delivery of
effectively with other irms due to low cost or superior services by virtue of being government owned. Competitive
technology, perhaps internationally. (Lubbe, 2005) 8: A neutrality is achieved through transparent accounting and
company is said to have a competitive advantage when, cost-relexive charges for services. (Cameron, 2005)
based on its strategic architecture and complementary
resource combinations (CRCs), it is able to implement a Complementarity
strategy that generates returns and beneits in excess of 1: A product or service that provides more value as
those of its current competitorswho simultaneously part of a group than individually. For example, hybrid
are implementing strategies, similar or otherwise e-retailers can leverage complementarities by providing
because of the perceived value in the marketplace. The off-line services to online shoppers. (I. Lee, 2005) 2:
deinition therefore also depends on what the company, Several activities are mutually complementary if doing
its management, and its stakeholders deine as what the more of any one activity increases (or at least does not
required returns and beneits should be (because even decrease) the marginal proitability of each other activity
though many would list it as inancial, clearly this does in the group. Complementarities among activities imply
not apply to all companies, i.e., an advantage could be mutual relationships and dependence among various
something other than inancial). One could reasonably activities whose exploration can lead to higher proitability.
expect, though, that companies within similar industries (Scupola, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com ple m e nt a r y Core Com pe t e nc ie s/Pooling of Re sourc e s Com plex Syst e m 109

Complementary Core Competencies/Pooling of the time availability decreases, and the degree of judgment
Resources required increases. Decision making is ex-post, complex,
The ease with which two members of a virtual organization and may require multiple steps. Initial monitoring uses a
C
can communicate allows them to pool their resources, even priori thresholds broader than in a simple environment
with members not directly involved in a speciic project. that is, more granular and produces exceptions that
Separate entities can quickly be called upon to provide identify a Suspected Non-Compliant Event (SNCE).
secondary service or consult on a project via virtual Evidence for decision making uses the results of the initial
channels. (J. Lee, 2005) monitoring as well as important information related to the
event, characterized by a need for judgmental expertise.
Complementary Resource Combination (CRC) (Goldschmidt, 2005)
Not a factor input, but a complex combination of inter-
related conigurations, or a network of assets, people, Complexity
and processes that companies use to transform inputs to 1: Degree to which an innovation is seen by the potential
outputs. Many of these conigurations are a blend of hard adopter as being relatively dificult to use and understand.
tangible resources and soft intangible resources which (Green et al., 2005) 2: The degree to which the structure,
simply cannot be recreated by another company. Finely behavior, and application of an organization is dificult
honed CRCs can be a source of competitive advantage. to understand and validate due to its physical size, the
(Potgieter et al., 2005) intertwined relationships between its components, and
the signiicant number of interactions required by its
Complementary Similarity Measurement collaborating components to provide organizational
An index developed experientially to recognize a poorly capabilities. (Ng & Pemberton, 2006) 3: The degree to which
printed character by measuring the resemblance of the a system or component has a design or implementation
correct pattern of the character expressed in a vector. that is dificult to understand and verify. The irst and
Referred to by some as a diversion index to identify the still classic measure of complexity is that introduced by
one-to-many relationship in the concurrence patterns Kolmogorov which is the shortest computer program
of words in a large corpus or labels in a large database. capable of generating a given string. (Polgar, 2005b)
(Ito, 2005)
Complexity of Innovation
Complete Evaluation The degree to which an innovation seems dificult to
To re-evaluate a CQ on the whole base data (i.e., the new understand and use. (Askarany, 2005)
result) and then ind the symmetric difference with the
previous result set. (Khan, 2005) Complex Situation
The current world state that the user needs to understand.
Complete Test The understanding in a complex situation extends beyond
Veriies that an update operation leads a consistent database procedural information and requires understanding
state to either a consistent or inconsistent database state. the dynamic interrelationships of large amounts of
(Ibrahim, 2005) information. (Albers, 2006)

Completion Rate Complex System


The most common measure for success in an online 1: A collection of interrelated elements organized to
or distance learning course, frequently associated with accomplish a speciic function or a set of functions.
program persistence and retention rates. No standardized Complexity can be considered in terms of a number of
algorithm currently exists for calculating completion rates; elements and/or complexity of relationships. (Plekhanova,
they are best used in comparing one cohort of the same 2005a) 2: From a mathematical perspective, a system
course with another. (Howell & Wilcken, 2005) described by differential or difference equations;
from an informational perspective, a system for which
Complex Environment information is the main resource and functioning in an
In such an environment, complexity increases as the information-rich environment. (Szczerbicki, 2005) 3:
granularity increases, the frequency of changes increases, A new ield of science studying how parts of a complex

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
110 Com plia nc e Com posit iona l De sign a nd Re use

system give rise to the collective behaviors of the system. CORBA components, EJB, and COM+/.NET. (Stojanovic
Complexity (information-theoretical and computational) & Dahanayake, 2005)
C and emergence of collective behavior are the two main
characteristics of such complex systems. Social systems Component Model
formed (in part) out of people, the brain formed out of A model specifying the standards and conventions
neurons, molecules formed out of atoms, and the weather imposed on developers of components. Includes admissible
formed out of air lows are all examples of complex ways of describing the functionality and other attributes
systems. The ield of complex systems cuts across all of a component, admissible communication between
traditional disciplines of science, as well as engineering, components (protocols), and so forth. (Chroust, 2006)
management, and medicine. (Shahabi & Banaei-Kashani,
2005) 4: Borrowed from Complexity Theory, a system Component-Based Development
that is neither rigidly ordered nor highly disordered. A software development approach where all aspects
System complexity is deined as the number and variety and phases of the development lifecycle are based on
of identiiable regularities in the structure and behavior components. (Stojanovic & Dahanayake, 2005)
of the group, given a description of that group at a ixed
level of detail. (Farooq et al., 2006) Component-Based Solution
A set of smaller software components that link seamlessly
Compliance to a wider framework through the adoption of standards.
Social inluence process whereby a person conforms to the (Salter, 2005b)
expectations of others based upon the motivation of a need
for approval. Also known as subjective norm. (Bagozzi Component-Based Web Engineering
& Dholakia, 2005) The application of systematic, disciplined, and quantiiable
component-based and reuse-oriented approaches to the
Compliance Veriication understanding, construction, operation, and evolution
Ensuring the necessary and suficient evidence supports of Web-based applications and systems. (Gaedke et al.,
the assertion of non-compliance. (Goldschmidt, 2005) 2005)

Component Composite Data


1: A term used to describe an information system and its Data containing an ordered string of ields describing
composition for the purposes of this work. Speciically, the several attributes (parameters, properties, etc.) of an object.
components in this work are: system quality, information (Kulikowski, 2005)
quality, and service quality. (Wilkin, 2005) 2: An
encapsulated, autonomous, service-based software unit Composite Model
that delivers useful services through the well-speciied Model for collaboration between institutions where each
interface to its environment. (Stojanovic & Dahanayake, institution is responsible for particular parts of certain
2005) 3: Small pre-deined program snippets within courses or study programs; a cooperative method. (Haugen
Flash that allow reuse of elements. Examples are & Ask, 2005)
buttons, pull-down menus, text boxes, and text areas.
(Barone, 2005) Composition
1: A new class in an objected programming language that
Component Interface is composed of other classes. (D. Brandon, 2005a) 2: A
The behavior of a component along with constraints at speciic form of an aggregation. It is a relationship in which
a subset of components interactions, data types used a composite object consists of non-shareable objects, and
in exposing the behavior, coniguration, and quality the latter are existence-dependent to the former. (Taniar
parameters of the behavior. (Stojanovic & Dahanayake, et al., 2005)
2005)
Compositional Design and Reuse
Component Middleware The design or composition of components from a collection
A commercially available component technology and its of generic building-block components. (Gaedke et al.,
associated connectivity capabilities; includes, for example, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com pre he nsibilit y Com put e r Anim at ion 111

Comprehensibility but predicates or assertions they must verify are given.


The understandability of a pattern to human beings; the (Calvo et al., 2005)
ability of a data-mining algorithm to produce patterns
C
understandable to human beings. (Zhou, 2005) Computationally Hard Problems
A mathematical problem is considered computationally
Comprehension-Modeling Tool hard if a slight increase in problem size dramatically
A math representation tool that enables users to: (1) increases the time for solving the problem. Typically,
generate multiple representations of mathematical run-time is an exponential function of problem size for
concepts and processes, (2) dynamically link the different computationally hard problems. Many cryptographic
representations, (3) communicate the mathematical ideas applications are based on computationally hard problems
they have constructed, and (4) make movie-like sequences like the Discrete Logarithm problem, the Discrete Square
of animation slides that enable others to replay the process Root problem, and the problem of factoring large integers.
used to generate the solution. (Nason & Woodruff, (Stickel, 2005)
2005a)
Computed Radiography (CR)
Comprehensive (Complete) Contracts A method of capturing and converting radiographic images
A contract specifying every possible contingency and into a digital form. The medium for capturing the X-ray
paying attention to all different issues. (Khalfan et al., radiation passing through the patient and generated by a
2005) standard X-ray system is a phosphor plate that is placed in
a standard-size cassette, replacing the regular radiographic
Compression ilm. The X-ray exposure forms a latent image on a
The act of reducing ile size so an image can download more phosphor plate that is then scanned (read or developed)
quickly on the Web. (Szabados & Sonwalkar, 2005) using a laser-beam CR reader. The CR unit displays the
resultant digital image on a computer-monitor screen. By
Compulsory Miss the end of the short process, the phosphor plate is erased
Also called a cold-start miss, this occurs during the irst and ready for another X-ray image exposure. (Tong &
access of a Web object. (Katsaros & Manolopoulos, Wong, 2005b)
2005a)
Computed Tomography (CT)
Computational Cardiology A specialized radiology procedure that helps doctors see
Using mathematic and computer models to simulate the inside the body. CT uses X-rays and computers to create
heart motion and its properties as a whole. (Liu et al., an image. The images show up as a cross-sectional image.
2005) (Tong & Wong, 2005b)

Computational Emergence Computer


Assuming that computational interactions can generate A mechanical system composed of software and hardware
different features or behaviors, this is one of the approaches designed to process data in support of various computing
in the ield of artiicial life. (Deb, 2005) programs and applications. (Khosrow-Pour, 1990)

Computational Experimentation Computer Algebra System


The use of validated, theory-driven computer models 1: A software system that performs symbolic computations.
with experimental methods to assess systematic behaviors (Farmer, 2006) 2: A system using generic mathematical
associated with alternate organizational designs. (Nissen tools that allow users to perform complex calculations
& Levitt, 2006) and algebraic manipulations of equations. (Burrage &
Pelton, 2005)
Computational Problem
A relation between input and output data, where input Computer Animation
data are known (and correspond to all possible different Motion created by using a computer through a technique
problem instances), and output data are to be identiied, in which the illusion of movement is created by displaying

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
112 Com put e r Anx ie t y Com put e r Re se r vat ion Syst e m

on a screen or recording on a device a series of individual Computer Conidence


states of a dynamic scene. (Yong & Choo, 2005) A term referring to when the user is conident that he or she
C would be able to master a required skill to solve a particular
Computer Anxiety problem using a computer, for example, learning how to
1: A diffuse, unpleasant, and vague sense of discomfort and use a speciic facility of an application program or learning
apprehension when confronted by computer technology or a programming language. (Blignaut et al., 2005)
people who talk about computers. (Blignaut et al., 2005) 2:
The degree to which an individual is nervous in his or her Computer Engineering (CE)
interaction with computers; the uneasiness some people The engineering of computer hardware. (Scime, 2005a)
feel when they have to use a microcomputer. Anxiety
results from a danger or a danger threat. As a feeling, it Computer Game
has a clearly unpleasant character. (de Souza Dias, 2005) An interactive game played on a computer. (Ip & Jacobs,
3: The tendency of a particular individual to experience 2006)
a level of uneasiness over his or her impending use of a
computer, which is disproportionate to the actual threat Computer Graphics (CG)
presented by the computer. (Kase & Ritter, 2005) Field of science and technology concerned with methods
and techniques for converting data to or from visual
Computer Attitude presentation using computers. (Andrs del Valle, 2005)
A complex mental state that affects a humans choice of
action or behavior toward computers and computer-related Computer Hardware
tasks. (Blignaut et al., 2005) Refers to computer equipment such as a CPU, disk drive,
modem, printer, and so forth. (Magagula, 2005)
Computer Comfort
The term used to describe when the user does not experience Computer Information System (CIS)
any suffering, anxiety, pain, and so forth when using a An information system with an emphasis on information
computer. (Blignaut et al., 2005) as an enterprise resource, and the design, development,
implementation, and maintenance of an information
Computer Communication system. (Scime, 2005a)
A term often mistakenly used in relation to online
education. Typically, the object of communication is Computer Interface
another person, not a computer, and the term computer- The way in which a person experiences the computer,
mediated communication would be more accurate. (Salter, its application programs, hardware components, output
2005c) devices, and functionality. (Barolli & Koyama, 2005b)

Computer Conference Computer Liking


Communication between students, and between students The use of a computer to solve problems; considered
and faculty, to share ideas and to comment on others ideas. enjoyable, stimulating, and even addictive. (Blignaut et
The information is seen as a threaded discourse so that al., 2005)
individuals can track which comment belongs to which
topic. (Ally, 2005d) Computer Literacy
1: The ability conidently and competently to make good
Computer Conferencing or optimum use of the facilities that computers provide.
1: An effective electronic means of connecting learners who (Vaast, 2005) 2: The acquisition of basic knowledge and
may or may not be separated by distance in a shared learning ability to operate or use a computer. (Magagula, 2005)
space using computers. (Wild, 2005) 2: Exchanging
information and ideas in a multi-user environment through Computer Reservation System
computers (e.g., e-mail). (Nandavadekar, 2005) A computer system that manages the distribution of
the tourist products to transportation, lodging, and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com put e r Sc ie nc e (CS) Com put e r-Aide d Soft w a re Engin e e ring (CASE) 113

entertainment companies. (Mendes-Filho & Ramos, Computer Whiteboard


2005) A whiteboard that supports graphical synchronous inputs
from a group. (Morphew, 2005)
C
Computer Science (CS)
1: A traditional IT curriculum whose focus is technical Computer-Aided Design (CAD)
and theoretical rather than applied, with emphasis on 1: An interactive computer graphics system used for
software creation. (Beise et al., 2005) 2: Hardware and engineering design. (Mathieu & Levary, 2005) 2: Software
software theory and design. (Scime, 2005a) used in art, architecture, engineering, and manufacturing
to assist in precision drawing. (Ferri & Grifoni, 2006)
Computer Self-Eficacy 3: The use of computer programs and systems to design
1: A judgment of ones capability to use a computer. It detailed two- or three-dimensional models of physical
incorporates judgments of an individual on his or her objects, such as mechanical parts, buildings, and molecules.
skills to perform tasks using a microcomputer. (de Souza (Cruz et al., 2005)
Dias, 2005) 2: Computer self-conidence or perceptions
of ability. Beliefs about ones ability to perform a speciic Computer-Aided Instruction Interface
behavior or task on a computer. (Kase & Ritter, 2005) A point of communication between a human and a computer
that is utilized with a system that is programmed to teach
Computer Simulation learners using a computer program. (Alkhalifa, 2005b)
1: A simulation built using a computer language.
(Pendegraft, 2005) 2: The process of using authentic data Computer-Aided Language Learning (CALL)
in a computer program to simulate a real phenomenon. The use of computers in learning a language. (Zaphiris
(Morphew, 2005) et al., 2005)

Computer Support Committee (CSC) Computer-Aided Learning (CAL)


A committee formed around ICT Seva Kendra to work Where the software teaches, trains, and also examines the
on speciic community issues and consisting of village students if required. (Whateley et al., 2005)
volunteers. (Shaligram, 2005)
Computer-Aided Manufacturing (CAM)
Computer Theorem Proving System The use of computers to improve both the effectiveness
A software system that is used to discover, develop, or and eficiency of manufacturing activities. (Mathieu &
verify formal deductions. (Farmer, 2006) Levary, 2005)

Computer Vision (CV) Computer-Aided Production Engineering


1: A branch of artiicial intelligence and image processing (CAPE)
concerned with computer processing of images from Using tools for creation that model the factory, production
the real world. Computer vision typically requires a line, or work cell layout to simulate production processes
combination of low-level image processing to enhance the and generate eficient operations plans. CAPE systems
image quality (e.g., remove noise, increase contrast), and are appointed to help manufacturers fully computerize
higher-level pattern recognition and image understanding the industrial process and achieve a seamless transition
to recognize features present in the image. (Andrs del from design to production. Advanced CAPE tools are able
Valle, 2005) 2: Using computers to analyze images and to create an integrated, computerized environment for
video streams and to extract meaningful information from planning, designing, simulating, and optimizing a complete
them in a way similar to the human vision system. It is factory at all levels of detail. (Modrk & Marcn, 2006)
related to artiicial intelligence and image processing, and
is concerned with computer processing of images from Computer-Aided Software Engineering (CASE)
the real world to recognize features present in the image. 1: This acronym refers to a set of tools dedicated to support
(Lovell & Chen, 2005) various phases in the development process of software
systems. Usually, they support modeling activities and the
reinement of models toward implementation. (Bastide et

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
114 Com put e r-Assist e d I nst ruc t ion (CAI ) Com put e r-M e diate d Com m unic at ion (CM C)

al., 2006) 2: Software tools that provide computer-assisted Computer-Based Learning


support for some portion of the software or systems Use of a computer to deliver instructions to students using
C development process, especially on large and complex a variety of instructional strategies to meet individual
projects involving many software components and people. students needs. (Ally, 2005a)
(Lee, Suh, et al., 2005) 3: A tool to aid in the analysis and
design of software systems. (Favre et al., 2005) Computer-Based Learning Resources
Instructional software and other computer, Internet, and
Computer-Assisted Instruction (CAI) Web-based learning resources encompassing activities
1: A teaching process in which the learning environment is such as tutorials, exercises, and low-stakes quizzes that
enhanced with the use of a computer. (Danenberg & Chen, provide frequent practice, feedback, and reinforcement of
2005) 2: An extension of the branching model of teaching course concepts. Often synonymous with general Internet
machines in which a learner accesses computer-based resources, including simulations, animations, games, and
lesson material (courseware) developed and programmed other resources supporting learning. (Twigg, 2005)
by teams of instructional designers and computer
programmers. (Reisman, 2006) 3: During the 1950s, CAI Computer-Based Training (CBT)
was irst used in education, and training with early work 1: Curriculum delivered primarily through the use of
was done by IBM. The mediation of instruction entered the computer, often linked with Internet technologies.
the computer age in the 1960s when Patrick Suppes and (Rhoten, 2006b) 2: Training delivered to employees or
Richard Atkinson conducted their initial investigations into students on a computer, providing training on something
CAI in mathematics and reading. CAI grew rapidly in the like word processing or on a programming language such
1960s, when federal funding for research and development as Java. (Neville & Powell, 2005) 3: Training material is
in education and industrial laboratories was implemented. delivered using hard support (CD ROM, ilms, and so on)
(I. Chen, 2005) 4: The use of computers in educational or on site. (Cirrincione, 2005) 4: Training and education
settingsthat is, tutorials, simulations, exercises. It usually delivered or enhanced using a computer-based system.
refers either to stand-alone computer learning activities or (Duan, 2005) 5: Training materials and programs usually
to activities that reinforce educational material introduced delivered on a CD-ROM or via an organizations local
and taught by teachers. (Magoulas, 2006) area network. (Ng, 2006) 6: A recent approach involving
the use of microcomputer, optical disks such as compact
Computer-Assisted Language Learning (CALL) disks, and/or the Internet to address an organizations
The teaching practices and research related to the use training needs. (Pang, 2005b)
of computers in the language classroom. (Liu & Chen,
2005) Computer-Managed Instruction (CMI)
1: A form of computer-assisted instruction in which a
Computer-Assisted Language Testing (CALT) computer serves the role of an instructional supervisor
An integrated procedure in which language performance is and media guide for learners, directing them to different
elicited and assessed with the help of a computer. (Laghos curricular materials and/or media based on their
& Zaphiris, 2005b) performance in computer-administered pre- and post-
tests. (Reisman, 2006) 2: Teaching and tracking process
Computer-Based Assessment in which the learning environment is enhanced with the
Addresses the use of computers for the entire process of use of a computer. (Danenberg & Chen, 2005)
assessment including production, delivery, grading, and
provision of feedback. (Valenti, 2005) Computer-Mediated Communication (CMC)
1: The process of using computers to enhance
Computer-Based Information System (CBIS) communication between students, instructors, experts,
An information system that uses computer technology and learning resources. Can include hypermedia, e-mail,
to perform input, processing, and output activities. A conferencing, bulletin boards, listservs, the Internet or
CBIS consists of people, procedures, data, hardware, and World Wide Web, and audio/videoconferencing. (Janes,
software. (Nightingale, 2005) 2005) 2: A combination of telecommunication technologies

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com put e r-M e diat e d Com m unic at ion Syst e m Com put e r-Suppor t e d Asynchronous Disc ourse M e dium 115

and computer networks that enables users to transmit, individuals that occurs via computer networks. Computer-
receive, and store information via synchronous and mediated communication may be text, audio, graphics,
asynchronous communication tools. (Erlich, 2005) 3: or video based, and may occur synchronously (in real
C
A communication system that involves or is assisted by time) or asynchronously (delayed). (Roberts et al., 2005)
computers. Computer-mediated communication includes 16: Communication that is facilitated using information
group support systems, e-mail, videoconferencing, chat technologies such as e-mail, videoconferencing, and
rooms, and instant messaging. (Klein, 2005) 4: CMC was teleconferencing. (Panteli, 2005)
made widely popular by the Internet, which allows people
to communicate in a variety of modes such as e-mail or Computer-Mediated Communication System
chat. CMC in turn is affecting translation practice as more Includes a wide range of telecommunication equipment
and more people communicate in a CMC mode across such as phones, intranets, Internets, e-mail, group support
languages and require language support. (OHagan, 2005) systems, automated worklow, electronic voting, audio/
5: Communication between humans using the computer video/data/desktop videoconferencing systems, bulletin
as a medium. (Link & Wagner, 2006) 6: Communication boards, electronic whiteboards, wireless technologies, and
that is facilitated by computer applications, for example, so forth to connect, support, and facilitate work processes
e-mail, bulletin boards, and newsgroups. (Kung-Ming among team members. (Wong-MingJi, 2005)
& Khoon-Seng 2005) 7: Communication that takes
place through, or is facilitated by, computers. Examples Computer-Mediated Education (CME)
include both asynchronous tools such as bulletin boards, Teaching using developed and still-evolving powerful and
e-mail, and threaded discussion, and synchronous tools sophisticated hypermedia computer tools. (Danenberg &
such as chat and videoconferencing. (Swan, 2005) 8: Chen, 2005)
Human communication that takes place through or is
facilitated by information technology, including networked Computer-Mediated Information Technology
telecommunications systems and computers. (Ridings, An effective means of storing and retrieving knowledge.
2006a) 9: Interactions in which all involved parties use IT tools such as Lotus Notes and intranets are designed
computers as the primary or the only means of exchanging to provide a means for retaining and accessing electronic
information. (St.Amant, 2006a) 10: All media that are archives. (Jasimuddin et al., 2006)
involved in the dynamic transfer and storage of data (analog
and digital) across established networks. The technology Computer-Mediated Interaction (CMI)
includes the World Wide Web, e-mail, telephones, iber Interaction mediated by electronic means, whether between
optics, and satellites. (Zakaria & Yusof, 2005) 11: Using people or computer agents. (Whitworth, 2006b)
technology-based tools such as e-mail, chat programs,
or conferencing tools to communicate at a distance. Computer-Mediated Technology (CMT)
(Schoenfeld & Berge, 2005) 12: The use of information The combination of technologies (e.g., hypermedia,
technology to support the interaction between people, handheld technologies, information networks, the
directed to the resolution of a problem or activity in a Internet, and other multimedia devices) that are utilized
task context. (Fleming, 2005c) 13: CMC, like e-mail, is for computer-mediated communication. (Kwok Lai-yin
one-to-one, asynchronous communication mediated by & Tan Yew-Gee, 2005)
electronic means. List e-mail seems to be many-to-many
communication, but the transmission system simply Computer-Supported Asynchronous Discourse
duplicates one-to-one transmissions. In true one-to-many Medium
transmissions, like a bulletin board, one communication An electronic medium for discussion where participants
operation is transmitted to many people (e.g., posting do not have to be communicating at the same time, as they
a message). (Whitworth, 2006b) 14: Communication do in an oral discussion. Participants make contributions
between instructor and student or between students which to a community knowledge base accessible to everyone.
discusses some aspect of course content, assignment, The knowledge is represented by notes that are preserved
or student progress in an online course, utilizing the in a database and are continually available for search,
online computing environment for the communication. retrieval, comment, reference, and revision. (Woodruff
(Gold, 2005) 15: Communication between two or more & Nirula, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
116 CSCW Com put e rize d Assist e d Audit ing Te chnique (CAAT )

Computer-Supported Collaborative/Cooperative occurring as the result of group interaction, or put more


Work (CSCW) tersely, individual learning as a result of group purpose.
C 1: A research area that focuses on investigations and (Sala, 2005b) 9: Usually based on special tools (e.g., a
development of technologies that can be used for knowledge forum) that can create electronic or virtual
collaborative work in distributed settings. (Blanger, environments, improving collaborative learning by means
2005) 2: Use of computer-based technology, including of computer networks. Main ideas they are based on include:
an Audience Response System (ARS), to support group (1) intentional learning (based on motivation to learn),
processes. (Banks, 2005) 3: Branch of computer science (2) involvement in a process of expertise development,
dedicated to the study of groupware technologies. (de and (3) looking at the group as a community building
Carvalho & Ferreira, 2006) 4: A discipline of computer new knowledge. (Cartelli, 2006a) 10: The ield of study
science dedicated to the use of computer tools to allow investigating the role of technology in the theory and
groups of participants to work together in the resolution of practice of collaborative learning. (Woodruff & Nirula,
a problem domain. (Mohamedally et al., 2005) 5: Provides 2005) 11: A research area that uses software and hardware
tools for supporting people working together, for example, to provide an environment for collaborative learning.
video and audio conferences, group calendar, e-mail, and (Moreira & da Silva, 2005)
text chat. Differs from worklow applications in having
more lexibility and less coordination. (Pinheiro, 2005) 6: Computer-Supported Cooperative Work
Software tools and technology, as well as organizational (CSCW)
structures, that support groups of people (typically from 1: A computer-assisted coordinated activity, such as
different sites) working together on a common project. communication and problem solving, carried out by a group
(Kindmller et al., 2005) of collaborating individuals. Key issues of CSCW are group
awareness, multi-user interfaces, concurrency control,
Computer-Supported Collaborative Learning communication and coordination within the group, shared
(CSCL) information space, and the support of a heterogeneous
1: Collaborative learning that occurs via the medium of open environment which integrates existing single-user
computer-based communication networks such as the applications. (Karacapilidis, 2005) 2: A combination of
Internet. (Klobas & Renzi, 2005b) 2: Learning facilitated an understanding of group process with the enabling
through collaboration with fellow students (and tutors), technologies that support group work. CSCW systems focus
supported by ICT networks. (Haugen & Ask, 2005) 3: on technologies and processes that support groups that work
Occurs when students learn primarily by communicating together in a cooperative, coordinated, and collaborative
amongst themselves via the Internet, and where student- manner. CSCW systems are often categorized in terms of
to-student interaction plays a primary role in the learning time and location, whether work is carried out at the same
process. (McInnerney & Roberts, 2005) 4: A broad term time (synchronously) or at different times (asynchronously),
combining both pedagogical and technological aspects. In and whether work is done in the same place (face-to-face)
CSCL, collaborative learning is supported by the use of or in different places (distributed). (Dara-Abrams, 2006)
different technological tools, from basic e-mail systems 3: Research area that studies the design, evaluation, and
to more complex three-dimensional virtual learning deployment of computing technologies to support group
environments. The term relies on various socially oriented and organizational activity. (Farooq et al., 2006)
theories of learning and has been applied from the primary
school level to a higher education context within various Computer-Supported Learning
domains. (Pys & Lowyck, 2005) 5: Collaborative Learning processes that take place in an environment that
learning mediated by computers. (Nason & Woodruff, includes computer-based tools and/or electronically stored
2005a) 6: The process in which multiple learners work resources. (Nash et al., 2005b)
together on tasks using computer tools that leads to learning
of a subject matter by the learners. (Soh & Jiang, 2006) 7: Computerized Assisted Auditing Technique
Combining communications and computer technologies to (CAAT)
support various activities involving groups in collaborative A software application used to improve the eficiency of
problem-solving situations. (Donnelly, 2005) 8: The an audit. (Garrity et al., 2005)
acquisition by individuals of knowledge, skills, or attitudes

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com put e rize d Crim ina l H ist or y (CCH ) Conc e pt Cont ra c t ion 117

Computerized Criminal History (CCH) & Diday, 2005) 4: In the Galois connection of the (T, I,
A system containing offenders and their individual arrests, D) context, a concept is a pair (X, Y), XT, YI, that
inal disposition of those arrests, and custodial information satisies s(X)=Y and t(Y)=X. X is called the extent and
C
for those arrests. (Holland, 2005) Y the intent of the concept (X,Y). (Dumitriu, 2005) 5: An
abstract or generic idea, opinion, or thought generalized
Computerized Language Labs from particular instances by the selection of meaningful
Foreign language instructional programs operated via terms. The concept may be identiied by the use of text-
computer disks, distributed to multiple computers by a mining techniques, which are used to explore and examine
ile server, and accessed by an entire class of students. the contents of talks, texts, documents, books, messages,
(Switala, 2005) and so forth. Concepts belong to the extra-linguistic
knowledge about the world, representing real things in
Computerized School Information System formal ways. (Antonio do Prado et al., 2005) 6: A mental
A speciic information system for educational management, construct, unit of thought, or unit of knowledge created by
for example, an enrollment system or an assessment and a unique combination of characteristics. (Gillman, 2006)
reporting system. (Mackey, 2005) 7: Simultaneously a result and an agent; concepts are
formed within the discourse, however they lack meaning
Computing Inspired by Nature if isolated from it. It is the concepts that bring density and
Embodies all approachesmainly problem-solving relief to a discourses content. A concept is an accumulation
techniquesdeveloped using ideas from or inspired by of meaning, and this meaning is produced within a
natural phenomena and/or their corresponding theoretical discourse, through a metaphorization process, constitutive
models. It is also sometimes referred to as computing of all natural language, and thus inherent to philosophy
with biological metaphors. Instead of trying to create itself. The density and thickness of a text depends on the
accurate (theoretical) models, it usually results in high-level combination and hierarchization of concepts. Philosophy
abstractions of natural phenomena. (de Castro, 2005) is not a sophistication or a puriication of concepts; it is
discourse and text, where concepts have a key role and can
Computing with Symbols be searched for, never at the beginning but rather through
The interpretations of the symbols are not participating the interpretation process itself. (Nobre, 2006b) 8: A sort
in the formal data processing or computing. (T.Y. Lin, of scheme produced by repeated experiences. Concepts
2005) are essentially each little idea that we have in our heads
about anything. This includes not only everything, but
Computing with Words every attribute of everything. (Amoretti, 2005)
One form of formal data processing or computing in
which the interpretations of the symbols do participate. Concept Abduction
L.A. Zadeh uses this term in a much deeper way. (T.Y. Non-standard reasoning service provided by digital
Lin, 2005) libraries. Abduction is a form of non-monotonic reasoning,
modeling commonsense reasoning, usually aimed at
Concept inding an explanation for some given symptoms or
1: A mental structure derived from acquired information manifestations. Concept abduction captures the reasoning
which, when applied to a problem, clariies to the point of mechanismnamely, making hypothesesinvolved
solving the problem. (Andrade, Ares, Garca, Rodrguez, when some constraints required by a resource request R
& Silva, 2006) 2: A pair (A, B) of a set A of objects and a are not speciied in a offered resource Othat obviously
set B of features such that B is the maximal set of features in later stages of the request/offer interaction might turn
possessed by all the objects in A, and A is the maximal out to be fulilled or not. (Colucci et al., 2006)
set of objects that possess every feature in B. (Saquer,
2005) 3: Each category value of a categorical variable or Concept Contraction
a logical association of variables. For example, a concept Non-standard reasoning service provided by digital
can be simply a town or a type of unemployment, or in a libraries. Contraction is the irst step in belief revision.
more complex way, a socio-professional category (SPC) Concept contraction captures the possibility to relax some
associated with an age category A, and a region R. (Murthy of the constraints of a requested resource R when they

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
118 Conc e pt Drift Conc e pt ua l M a ps

are in conlict with those of an offered resource Othat Conceptual Clustering


is, when OR is an unsatisiable concept. (Colucci et al., A type of learning by observations and a way of
C 2006) summarizing data in an understandable manner. (Oh et
al., 2005)
Concept Drift
A phenomenon in which the class labels of instances Conceptual Construction with Incomplete Data
change over time. (Maloof, 2005) A knowledge development process that reveals the patterns
of the missing data as well as the potential impacts of
Concept Hierarchy these missing data on the mining results based only on
1: A directed graph in which the root node represents the the complete data. (H. Wang & S. Wang, 2005)
set of all input instances and the terminal nodes represent
individual instances. (Oh et al., 2005) 2: The organization Conceptual Data Modeling of Engineering
of a set of database attribute domains into different levels Information
of abstraction according to a general-to-speciic ordering. Using conceptual data models to implement the data
(Shen, 2005) modeling of engineering information. The conceptual data
models for engineering data modeling include some special
Concept Map conceptual data models for industry such as EXPRESS/
1: A graphic outline that shows the main concepts in the STEP and IDEF1X, and some traditional conceptual data
information and the relationship between the concepts. models such as ER/EER and UML. (Ma, 2005a)
(Ally, 2005c) 2: A tool that assists learners in the
understanding of the relationships of the main idea and Conceptual Design of Fuzzy Databases
its attributes; also used in brainstorming and planning. The conversion of fuzzy conceptual data models to fuzzy
(Judd, 2005) 3: A visual representation of knowledge database models. The focus is on developing the rules of
of a domain consisting of nodes representing concepts, mapping fuzzy conceptual data models to fuzzy database
objects, events, or actions interconnected by directional models. (Ma, 2005b)
links that deine the semantic relationships between and
among nodes. (Alpert, 2006) Conceptual Diagrams
Schematic depictions of abstract ideas with the help of
Concept-Based Image Retrieval standardized shapes such as arrows, circles, pyramids,
A term used to describe the classical approach to matrices, and so forth. (Eppler & Burkhard, 2006)
information management that focuses on the use of
classiication schemes and their indexing terms to retrieve Conceptual Framework
images. (Venters et al., 2005) Structuring a portfolio around a speciic idea, theme, or
strategy. (Shaw & Slick, 2005)
Concept-Based Search
Search over a corpus of documents or databases can Conceptual Graph
proceed using a search that matches concepts rather Graph representation described by a precise semantics
than matching words. The value of concept-based search based on irst-order logic. (Holder & Cook, 2005)
increases with the technical complexity of the domain of
search. (Kapetanios, 2005) Conceptual Maps
Semiotic representation (linguistic and visual) of the
Concept-Based System concepts (nodes) and their relationships (links); represent
An information system that uses conceptual structures the organization process of the knowledge When people
to organize and present the information content; typical do a conceptual map, they usually privilege the level
systems are data intensive, retrieve content dynamically where the prototype is. They prefer to categorize at an
from a repository, and use hypermedia to present the intermediate level; this basic level is the irst level learned,
output. (Houben et al., 2006) the most common level named, and the most general
level where visual shape and attributes are maintained.
(Amoretti, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Conc e pt ua l M ode l Conc e pt ua lizat ion 119

Conceptual Model and their principal characteristic is easy and intuitive use.
1: A model concerned with the real-world view and (Cuadra et al., 2005)
understanding of the data. It suppresses non-critical
C
details in order to emphasize business rules and user Conceptual Modeling: See Conceptual Model.
objects. (Pardede et al., 2005) 2: Abstraction of the real
world/domain, and a mechanism for understanding and Conceptual Modeling Language
representing organizations and the information systems A language used to represent conceptual models. (Andrade
that support them. The most important types of models are: et al., 2006a)
Object ModelDescribes objects by data and operations
on the data. The objects identity encapsulates its state Conceptual Schema
(attributes and relationships with other objects) and its 1: A completely or partially time-independent description
behavior (allowed operations on/with that object). Process of a portion of the (real or postulated) world in the sense that
ModelDescribes (sub)processes by the activities they a conceptual schema contains the deinition of all concepts
involve, the activity order, decision points, and pre-/post- and all relationships between concepts allowed to be used
conditions for the activity execution. Functional Model in the description of that portion of the world. (Marjomaa,
Describes the information low and transformation, as well 2005) 2: A structured technology-independent description
as the constraints and functional dependencies among the of the information about an application domain such as a
activities in a process. Organizational ModelDescribes company or a library. By extension, it is also an abstract
the worklow (activities for the creation and movement of representation of the existing or project database that is
the documents) within an organization, the peoples roles, made up of the data of this domain. (Hainaut et al., 2005)
and the communication among people for performing 3: Speciication of the structure of a business domain using
the activities. (Galatescu, 2005) 3: An abstraction of the language and terms easily understood by a non-technical
problem as well as a possible model of a possible conceptual domain expert. A conceptual schema typically declares
solution to the problem. (Andrade et al., 2006a) 4: Semi- the fact types and business rules that are relevant to the
formal framework (usually a language and a diagram business domain. (Halpin, 2005)
notation) used to capture information about the structure
and organization of things, properties, and relations in a Conceptual Schema of a Database
fragment of the real world, called the domain, usually one A semi-formal, high-level description of the database,
of interest to a (software) system. The model represents independent of its implementation. (De Antonellis et al.,
the semantics of the domain to the system. (Mani & 2005)
Badia, 2005) 5: The abstraction of relevant aspects of a
targetusually physicalsystem into a representation Conceptual/Functional Equivalence
system consisting of symbols, logic, and mathematical Refers to whether a given construct has similar meaning
constructs. (Vitolo & Coulston, 2005) 6: A formal or semi- across cultures. (Karahanna, Evaristo, & Srite, 2005)
formal description of the actual world elements (objects,
persons, organizations) to be included in the future software Conceptualism
artifact. (Doorn, 2005) 7: An action describing a domain An ontological position that entity classes exist only in
with the help of some artiicial or formalized language. the mind of the modeler. (Artz, 2005c)
(Fettke, 2005) 8: High-level modeling; modeling at a high
level of abstraction. (Barca et al., 2005) 9: Process of Conceptualization
forming and collecting conceptual knowledge about the 1: A model of reality, a generalized abstraction of
Universe of Discourse, and documenting the results in particular items. Example: A radio exists physically, but
the form of a Conceptual Schema. (Marjomaa, 2005) 10: when conceptualized it exists symbolically as some form
Starting point for database design that consists of producing of knowledge representation: a word, picture, diagram,
a conceptual model. (Mani & Badia, 2005) 11: The use graph, or formula. (Buchholz, 2006) 2: The process of
of concepts and their relationships to deal with and solve constructing conceptual structuresthat is, structures of
a problem. (Andrade et al., 2006a) 12: Tools to achieve a concepts and their relationships that represent a subject
good design of information systems. These tools are used domain. (Houben et al., 2006)
to express information system requirements speciication,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
120 Conc e r n of Com m e rc ia lizat ion Condit iona l I nde pe nde nc e

Concern of Commercialization and their frequencies. Their condensed representations can


A negative factor that the implantation and use of distance be several orders of magnitude smaller than the collection
C education may create. (B. Martz & V. Reddy, 2005) of the frequent itemsets. (Boulicaut, 2005)

Concise Narrated Animation Condition


A type of multimedia presentation that uses synchronized 1: A predicate that evaluates a situation with respect to
audio narration along with visual material, which is concise circumstances. (Ale & Espil, 2005) 2: Part of a trigger
and uses a meaningful structure (such as a cause-and-effect that is evaluated when the event in the trigger takes place.
chain). (M. Mitchell, 2005c) It is usually a predicate in SQL that evaluates to true or
false. (Badia, 2005b)
Concordancer
A text-manipulation tool originally used by lexicographers Condition Number
but nowadays popularly promoted among foreign-language Ratio between the largest and smallest condition number of
teachers and learners. Such a program displays character a matrix, often employed to assess the degree of collinearity
strings before and after a key word or phrase based on the between variables associated to the columns of the matrix.
computer text corpus the program is fed. (Liou, 2005) (Galvo et al., 2005)

Concurrency Control Conditional


1: A control method that secures that a transaction is The formal algebraic term for a rule that need not be strict,
executed as if it were executed in isolation (the I in the but also can be based on plausibility, probability, and so
ACID properties) from other concurrent transactions. forth. (Kern-Isberner, 2005)
(Frank, 2005b) 2: The task of the concurrency control is to
coordinate the concurrent execution of several transactions Conditional Access (CA) Service
so that the chosen consistency properties (e.g., ACID Television services that allow only authorized users
properties) are not violated. (Meixner, 2005) to select, receive, decrypt, and watch a particular
programming package. (Hulicki, 2005)
Concurrency Control Protocol
A protocol executed to ensure that the proper correctness Conditional Distribution
criterion, usually serializability, is upheld for a set of Probability distribution of a parameter, given the values of
concurrently executing transactions by controlling whether other parameters and/or the data. (Rippon & Mengersen,
a certain operation can be performed, delayed, or rejected, 2005)
and whether the transaction can be committed or has to
be aborted. (Leong, 2005b) Conditional Independence
1: A generalization of plain statistical independence that
Concurrent Engineering allows one to take a context into account. Conditional
An integrated team approach (e.g., by design, production, independence is often associated with causal effects.
and marketing departments) to produce and sell either (Kern-Isberner, 2005) 2: Consider two random variables
a service or tangible good. (Jeffery & Bratton-Jeffery, X and Y. It will be said that X and Y are independent
2005) conditionally on a third random variable (or random
vector) Z, if the joint probability distribution of X and Y,
Concurrent Models with an Object-Oriented conditionally on Z, can be decomposed in the product of
Approach two factors, the conditional density of X given Z and the
Each object can potentially execute activities or procedures conditional density of Y given Z. In formal terms, X and
in parallel with all others. (Gur u, 2005) Y are independent, conditionally on Z (in symbols: XY|Z)
f(x, y|Z = z) = f(x|Z = z) f(y|Z = z) (Giudici & Cerchiello, 2005)
Condensed Representation 3: Let X, Y, and Z be three sets of random variables; then X
An alternative representation of the data that preserve and Y are said to be conditionally independent given Z, if
crucial information for being able to answer some kind of and only if p(x|z,y)=p(x|z) for all possible values x, y, and z of
queries. The most studied example concerns frequent sets X, Y, and Z. (Ramoni & Sebastiani, 2005) 4: Two sets X

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Conditional Probability Conidential Information 121

and Y of variables are conditionally independent given a antecedent of the rule X that also support the consequent
third set Z, if knowledge on Z (what value Z takes) makes of the rule Y in the set of data cases D. (Swierzowicz,
knowledge on Y irrelevant to guessing the value of X. 2005) 2: An asymmetric index that shows the percentage of
C
(Xiang, 2005) records for which A occurred within the group of records
and for which the other two, X and Y, actually occurred
Conditional Probability under the association rule of X, Y A. (Ito, 2005) 3:
Probability of some event A, assuming event B, written Given an association rule X Y, the conidence of a rule
mathematically as P(A|B). (Bashir et al., 2005) is the number of transactions that satisfy X Y divided
by the number of transactions that satisfy X. (Imberman
Conditional Structure & Tansel, 2006) 4: The conidence of a rule is the support
An algebraic expression that makes the effects of of the item set consisting of all items in the rule (A B)
conditionals on possible worlds transparent and divided by the support of the antecedent. (Denton &
computable. (Kern-Isberner, 2005) Besemann, 2005) 5: The conidence of a rule X Ij,
where X is a set of items and Ij is a single item not in X,
Conditioning is the fraction of the transactions containing all items
Revision process of a belief by a fact accepted as true. in set X that also contain item Ij. (Wong, & Fu, 2005) 6:
(Smets, 2005) The proportion of records that belong to the target class
from those that satisfy the antecedent of the rule. This is
Condominium Fiber also often called the accuracy of the rule. An alternative
A unit of dark iber installed by a particular contractor deinition is the proportion of records for which the rule
(originating either from the private or the public sector) on makes the correct prediction of the target class. (Richards
behalf of a consortium of customers, with the customers to & de la Iglesia, 2005) 7: The rule A=>B has conidence c,
be owners of the individual iber strands. Each customer- if c% of transactions that contain A also contain B. (Daly
owner lights the ibers using his or her own technology, & Taniar, 2005a)
thereby deploying a private network to wherever the iber
reaches, that is, to any possible terminating location or Conidence in Vendor
endpoint. (Chochliouros et al., 2005a) Trust or faith in a vendor, especially trust or faith in the
vendors guarantees of a safe shopping environment.
Conduit Metaphor (Shan et al., 2006a)
A metaphor about communication which suggests that
an addressers ideas are objects contained in packages, Conidence of a Rule
known as words, that are directly sent to the addressee. Percentage of the rows that contain the antecedent that
(Zappavigna-Lee & Patrick, 2005) also contain the consequent of the rule. The conidence
of a rule gives us an idea of the strength of the inluence
CONE that the antecedent has on the presence of the consequent
A new lifecycle in which development process occurs in of the rule. (Ale & Rossi, 2005)
iteration cycles, each one having many activities grouped
together in phases. (Furtado, 2005) Conidence of Rule XY
The fraction of the database containing X that also contains
Conferencing System Y, which is the ratio of the support of XY to the support
A system speciically designed to facilitate synchronous of X. (Shen, 2005)
virtual meetings by phone or computer. Teleconferencing
utilizes computer-controlled audiovisual transmission. Conidential Information
Computer conferencing uses computer-enabled Sensitive organizational information that should be
conferencing to work together in real time using free disclosed only to authorized users. Usually stored in the
proprietary software. (Ferris & Minielli, 2005) database or data warehouse, this information needs to
kept secure from hackers and snoopers. (Wilson et al.,
Conidence 2006b)
1: A parameter used in the association-rules method for
determining the percent of data cases that support the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
122 Conidentiality Connectionist Expert System

Conidentiality Confusion Matrix


1: A status accorded to information based on a decision, Contains information about actual and predicted
C agreement, obligation, or duty. This status requires that the classiications done by a classiication system. (Yeo,
recipient of personal information must control disclosure. 2005)
(Mullen, 2005) 2: Assures that the exchange of messages
between parties over wireless access networks or global Congestion Control
networks is not being monitored by non-authorized The algorithms used to detect and solve system-overload
parties. (Pierre, 2006b) 3: Ensures that information situations. (Iossiides et al., 2005)
is accessible only to those authorized to have access;
typically ensured through encryption. (Mitrakas, 2006) Conjoint Analysis
4: Guarantees that shared information between parties is Decompositional method of preference measurement.
only seen by authorized people. (Lowry, Stephens, et al., On the basis of holistic preference statements, the part
2005) 5: Nonoccurrence of the unauthorized disclosure worth of object characteristics are derived. (Voeth &
of information. The term conidentiality indicates aspects Liehr, 2005)
of secrecy and privacy. (Oermann & Dittmann, 2006)
6: Prevention of unauthorized disclosure of information. Conjunctive Combination
(Tong & Wong, 2005a) 7: The claim, right, or desire The combination of the beliefs induced by several sources
that personal information about individuals should into an aggregated belief. (Smets, 2005)
be kept secret or not disclosed without permission or
informed consent. (Goodman, 2005) 8: The protection Connected Models with an Object-Oriented
of information from exposure to others. (Buche & Approach
Vician, 2005) Each object can send messages to others through links.
(Gur u, 2005)
Coniguration System
A software system in which the product components Connectedness
and the constraints existing between them are stored. A The feeling of being linked to or joined with an individual
coniguration system allows consistent and completely or group of individuals; this feeling is associated with the
structured product variants that can be produced by the building of a relationship. (Gangeness, 2005)
manufacturing system. (Blecker & Abdelkai, 2006)
Connected Organization
Conlict An organization that serves the common good, serves
Refers to the conlicts between the addict and those around constituents, creates a culture of service, collaborates,
them (interpersonal conlict), conlicts with other activities and engages in healthy internal communication. (Baer
(job, social life, hobbies, and interests), or from within & Duin, 2005)
the individual themselves (intrapsychic conlict) that are
concerned with the particular activity. (Grifiths, 2005) Connection Theme
The central purpose of social communication consisting
Conluence of links of closeness, understanding, or access. (Molinari,
A rewrite system is conluent if, no matter in which order 2005)
rules are applied, they lead to the same result. (Fischer,
2005) Connectionist Expert System
An expert system that uses an artiicial neural network to
Conforming Learner develop its knowledge base and make inferences. A classical
A complying learner who prefers to more passively accept expert system is deined with IF-THEN rules, explicitly.
knowledge, store it, and reproduce it to conform; follows In a connectionist expert system, training examples are
simple steps to complete assigned tasks; and pleases others. used by employing the generalization capability of a neural
(Raisinghani & Hohertz, 2005) network, in which the network is coded in the rules of an
expert system. The neural network model depends on the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Conne c t ions in Pla nning Consor t ia 123

processing elements that are connected through weighted in the belief that the indings of those sciences offer a
connections. The knowledge in these systems is represented more robust foundation for the proper investigation of all
by these weights. The topology of the connections are phenomena. (Atkinson & Burstein 2006)
C
explicit representations of the rules. (R., 2005)
Consistency
Connections in Planning 1: On Web sites, refers to keeping similar Web pages
Refers to the degree of contact between HR and IT similar in their look and feel. Examples of ways to
executives in their respective planning processes. (Dery achieve consistency include using the same or similar
& Samson, 2005) colors, font, and layout throughout the site. (Chalmers,
2006) 2: Similar to compatibility and sometimes used
Connectivity interchangeably; designs that match our expectations
1: The ability to access various media via the necessary in terms of characteristics, function, and operation, and
equipment and channels. (Reilly, 2005) 2: The ability to are applied in a constant manner within the design itself.
link to the Internet via a computer. (Braun, 2005a) 3: The (Noyes, 2006)
interconnections that employees and users have through
the use of the Internet or other knowledge management Consistency of Warehouse Data and Web
tools. (Borders & Johnston, 2005) Documents
In order to introduce consistency among documents and
Connectivity Phenomena data, the data warehouse library (DWL) must enjoy data
A term drawn from computational linguistics. In the warehouse features. Hence, documents are never removed
presence of several logically linked elementary events, from the DWL; all documents are properly described with
it denotes the existence of a global information content metadata and linked to data warehouse objects. There are
that goes beyond the simple addition of the information four levels of consistency between the DWL and DW that
conveyed by the single events. The connectivity enable the eDW system to build retrieval queries: subject
phenomena are linked with the presence of logico- consistency, temporal consistency, semantic consistency,
semantic relationships like causality, goal, indirect speech, and personalization. These four levels together provide
coordination, and subordination, as in a sequence like: constraints for sub-setting the DWL and producing relatively
Company X has sold its subsidiary Y to Z because the small ranked lists of relevant documents associated with
proits of Y have fallen dangerously these last years due data warehouse reports. (Wecel et al., 2005)
to a lack of investments. These phenomena cannot be
managed by the usual ontological tools; in NKRL, they are Consistent Answer
dealt with using second-order tools based on reiication. 1: A set of tuples, derived from the database, satisfying
(Zarri, 2006c) all integrity constraints. (Flesca, Greco, et al., 2005) 2:
Data satisfying both the query and all integrity constraints
Consensus Building deined on the given database. (Flesca, Furfaro, et al.,
Also known as collaborative problem solving or 2005)
collaboration, it includes techniques such as brainstorming,
focus groups, techniques for managing meetings, Consistent Database
negotiation techniques, Delphi, and NGT, and is used as A database satisfying a set of integrity constraints. (Flesca,
a resolution process mainly to settle complex disputes or Furfaro, et al., 2005)
issues. (Janes, 2005)
Consolidation
Consequent Work models developed from individual observations are
A logical conclusion to an event. For example, in the combined to identify both commonalities and uniquenesses.
relationship When it is hot, Mary buys an ice cream, The third step in contextual design. (Notess, 2005)
buys an ice cream is the consequent. (Beynon, 2005b)
Consortia
Consilience An organization formed from several businesses or
The reconciliation of all knowledge with the historical and enterprises joining together as a group for a shared purpose.
scientiic observations of biology, chemistry, and physics (Kung-Ming, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
124 Consor t ia -Type Dist a nc e Te a ching Ve nt ure Const ruc ti onism

Consortia-Type Distance Teaching Venture to push the constraints, or at least part of them, deeply
A collaborating venture between several universities or into the data-mining algorithms. (Boulicaut, 2005) 2:
C between universities and other partners joining forces to Data mining obtained by means of evaluation of queries
offer distance teaching programs together. (Guri-Rosenblit, in a query language allowing predicates. (Meo & Psaila,
2005a) 2005)

Consortial Agreement Construct


Allows students to access library resources at a library 1: A not directly observable hypothetical concept whose
that is closer to their home, but one that is not afiliated existence must be inferred by actions, behavior, or
with the college or university that they are attending. observable characteristics. (Real et al., 2006) 2: Constructs
(Raisinghani & Hohertz, 2005) represent the research participants interpretations of the
elements. Further understanding of these interpretations
Consortium may be gained by eliciting contrasts resulting in bi-polar
A group of companies within a particular industry labels. Using the same example, research participants
establishing an exchange connecting each of them and may come up with bi-polar constructs such as high user
their suppliers. (Mockler et al., 2006) involvementlow user involvement to differentiate the
elements (i.e., IS projects). The labels represent the critical
Consortium Exchange success factors of IS projects. (Tan & Hunter, 2005)
A group formed by companies in the same industry,
bringing their supply chains together for the purpose Construct Bias
of facilitating transactions among themselves over the Occurs when a construct measured is not equivalent across
Internet. (Aigbedo, 2005) cultures both at a conceptual level and at an operational
level. (Karahanna et al., 2005)
Constrained Movement
Movement (of a moving object) that is conined according Constructed Data Type
to a set of spatial restrictions. (Vassilakopoulos & Corral, The data type that is formed by a number of predeined
2005) data types. This data type is also provided by the software
products. Examples are LIST and ARRAY. (Pardede et
Constrained OLS Method al., 2005)
A method to estimate the optimal weights for combination
of forecasts by minimizing the sum of squared errors as in Construction Project Lifecycle
a regression framework, and the weights are constrained Analogous to comparing construction projects to real
to sum to one. (C.K. Chan, 2005) life. Thus projects may be assumed to evolve through the
life phases of conception, development, implementation,
Constraint and phase-out. Post-delivery involves the facilities
1: As basic knowledge units, the constraints in engineering operation/maintenance phase through to asset disposal.
design are referred to the documents-related engineering (Barima, 2006a)
design decision, which encompasses source, motivation,
rationale, consequences, and a log of the various Constructionism
changes and updates they have undergone. (Ma, 2006) 1: A pedagogy based on learners designing and creating
2: Extensions to the semantics of a UML element. These some of their own learning materials and representations.
allow the inclusion of rules that indicate permitted ranges (Collis & Moonen, 2005b) 2: A set of theories that deines
or conditions on an element. (Gur u, 2005) 3: A way to the human beings as active constructors of their own
restrict certain kinds of user interaction that can take place learning and development. This learning and development
at a given moment. (Yong, 2005) of knowledge happens more effectively when individuals
are involved in the construction of something external,
Constraint-Based Data Mining something that can be shared, or both. (Ramos & Carvalho,
1: The active use of constraints that specify the 2005) 3: Asserts that (social) actors socially construct
interestingness of patterns. Technically, it needs strategies reality. (Carlsson, 2005) 4: An educational theory arguing

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Const ruc t ive Solid Ge om e t r y (CSG) Consult a ncy 125

that the student constructs his/her own knowledge on certain behaviors on how to interact with it. (Karoulis &
the domain, rather than acquiring certain behaviors Pombortsis, 2005a)
on how to interact with it. (Athanasis & Andreas, 2005)
C
5: Knowledge is constructed by the learner through Constructive Solid Geometry (CSG)
experiential learning and interactions with the environment One of the most popular ways to describe a three-
and the learners personal workspace. (Ally, 2005b) 6: A dimensional model. In CSG, a model is compiled from
form of learning in which students construct their own primitives and Boolean operators linking them. Data
unique understanding of a subject through a process that are stored in the tree structure, where the leaves are the
includes social interaction, so that the learner can explain primitives, and the nodes are the operations: intersection
understandings, receive feedback from teachers and other (AND), union (OR), and complement (NOT). (Cruz et
students, clarify meanings, and reach a group consensus. al., 2005)
(Grasso & Leng, 2005) 7: A learning theory based on the
premise that students construct their own learning based Constructivist
on their own experiences. (Burrage & Pelton, 2005) Relating to a learning environment where the learner
8: A learning theory that knowledge is constructed by interacts with objects and events, thereby gaining an
the learner through experience-based activities. (Judd, understanding of the features held of such objects or
2005) 9: A learning theory that posits people construct events. (Blicker, 2005)
knowledge by modifying their existing concepts in light of
new evidence and experience. Development of knowledge Constructivist Learning
is unique for each learner and is colored by the learners 1: A learning philosophy that contends that learning occurs
background and experiences. (Stodel et al., 2005) 10: A in incremental steps, leveraging on the previous knowledge
theory of learning and knowing that holds that learning of the learner about the topic. (Hin & Subramaniam, 2005b)
is an active process of knowledge construction in which 2: A model for learning based on the widely held notion
learners build on prior knowledge and experience to that individuals construct their own knowledge of, and
shape meaning and construct new knowledge. (Bieber et meaning for, the world around them. (Pritchard, 2005b)
al., 2005) 11: A theory of learning based on the idea that
knowledge is constructed as learners attempt to make Constructivist Methodology
sense of their experiences. It is assumed that learners are A teaching method based on the works of Jean Piaget and
not empty vessels waiting to be illed, but rather active Lev Vygotsky by which the instructor helps the student
organisms seeking meaning: regardless of what is being construct meaning rather than simply lecturing. This
learned, learners form, elaborate, and test candidate mental method is learner centered and learner driven. (Trammell,
structures until a satisfactory one emerges. (Vat, 2005a) 2005)
12: A theory of learning that asserts that learning results
from learners actively interacting with their learning Constructivist Perspective
environment rather than passively receiving information. A perspective on learning that places emphasis on learners
(Pelton & Pelton, 2005) 13: A very prominent learning as building their own internal and individual representation
theory that postulates that learning is a process essentially of knowledge. (Torrisi-Steele, 2005)
involving activity and involvement through which learners
construct their own knowledge and skills. This naturally Constructivist Theory
seems to imply that overhearers cannot learn from a A theoretical framework developed by Jerome Bruner
learning dialogue. The theory of vicarious learning does where learning is an active process in which learners
not reject constructivism, but suggests that activity and construct new ideas or concepts based upon their current
involvement can arise cognitively through phenomena or past knowledge. The learner selects and transforms
of empathy, and hence that vicarious participation in information, constructs hypotheses, and makes decisions,
dialogue can also foster constructive processes. (J.R. relying on a cognitive structure to do so. (Sala, 2005b)
Lee, 2005) 14: An educational approach that takes the
view that knowledge must be constructed within the Consultancy
cognitive structure of each individual. (Banks, 2005) 15: The process of helping organizations to better understand
An educational theory arguing that students construct complex processes through their knowledge and
their own knowledge on the domain, rather than acquiring experience, and provide solutions to achieve the objectives.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
126 Consum e r Cont e nt

Consultants may help organizations in the whole ERP Consumer-to-Consumer (C2C)


lifecycle. The usage of external consultants will depend Interactions between customers/consumers of a businesss
C on the internal know-how that the organization has at the product/service are said to follow a C2C format. In
moment. (Esteves & Pastor, 2005) common usage of the term C2C, the distinction between
customers (purchasers of a product/service) and consumers
Consumer (end users of a product/service) is not rigorously made.
1: A person who buys goods/services and uses them (Baim, 2006a)
personally instead of selling them. (Shan et al., 2006a) 2:
Of an e-service is a user of the service, possibly by paying Consumption Mode
a fee. (Yee & Korba, 2006) 3: The consumer in the health Determines which event instances are considered for
care system is the patient. (Rada, 2006) iring rules. The two most common modes are recent and
chronicle. (Cilia, 2005)
Consumer Context
The setting in which certain consumer behavior occurs. Contact
It can be classiied conceptually into need context and The ability to exchange information directly with another
supply context, and physically into internal context, individual. (St.Amant, 2005d)
proximate context, and distal context. (Sun & Poole,
2005) Contact Point
Used to describe a reference from one medium to another.
Consumer Credit (Uden, 2005)
A loan to an individual to purchase goods and services
for personal, family, or household use. (de Carvalho et Container Model
al., 2005) Knowledge lows directly from the teacher to the learner,
independently of the learners environment. (Frank et
Consumer Experience al., 2005)
Such as increased customization, convenience in
purchasing, responsiveness in product delivery, and so Containment Query
on. (Shih & Fang, 2006) A query based on the containment and proximity
relationships among elements, attributes, and their
Consumer Religio-Centrism contents. (Chen, 2005b)
Individuals who are so strongly committed to their speciic
religious group (Christian, Muslim, etc.) that their buying Content
preferences consist of purchases from companies owned or 1: An amount of well-presented subject information
operated by individuals with their same religious beliefs. in text, graphics, or multimedia formats (portals, Web
(Carstens, 2005) sites, e-mailings, news lines, etc.) built around a speciic
structure, based on established information standards,
Consumer-to-Administration (C2A) and targeted to a speciic online audience. (Arkhypska
Data interchange between citizens and government bodies, et al., 2005) 2: Corporate knowledge stored in any form
typically using an Internet Web site; a component of e- (paper, data, reports, correspondence, e-mail, multimedia,
government. (Whiteley, 2006) etc.). (Sarmento, 2005) 3: High-quality online content
is considered to be comprehensive, authentic/industry-
Consumer-to-Business driven, and researched. (MacDonald et al., 2005) 4:
An e-commerce system that deals with the carrying out of Online material or services that are relevant, useful, and
commercial transactions with businesses or with individual timely for the community and that are made available in
customers by using the Internet as an electronic medium. appropriate and affordable ways. (Williamson, 2005) 5:
Requires an extensive infrastructure of which the main The information, such as thoughts, ideas, and so forth,
features are a catalogue, online ordering facilities, and that someone wishes to communicate. Importantly,
status checking facilities. See Business-to-Consumer content is what is to be communicated but not how it is
(B2C). (Mller, 2005) to be communicated. (Polovina & Pearson, 2006) 6: The

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont e nt Aggre gat ion Cont e nt M a na ge m e nt 127

various genres of information available on the Internet. training content for specialists only may be an assembly.
For instance, local content is information that is speciic to (Honkaranta & Tyrvinen, 2005)
a community, neighborhood, or area, such as businesses,
C
housing, neighborhood services, and recreation activities. Content Compression
Community content is information about the neighborhood A term that describes approaches in which parts of a
that promotes community development and facilitates continuous media ile are removed in order to speed up
community building. Examples include a listing of places replay and data browsing or to automatically generate
where GED courses are offered, or a newsletter. Culturally summaries or abstracts of the ile. In relation to speech
relevant content is information that is signiicant to people signals, content-compression techniques often shorten
with different cultural backgrounds. (Kvasny & Payton, the signals by removing parts that have been identiied
2005) as less relevant or unimportant based on pause detection
and analysis of the emphasis used by the speakers. (Hrst
Content Aggregation & Lauer, 2006)
A set of existing content units collected together for a
speciic use purpose. An aggregation may contain several Content Distribution Network (CDN)
versions of the same unit of content, and its creation may 1: The general term encompassing any technology for
require human involvement. (Honkaranta & Tyrvinen, wide-area distribution of content. (Fiege, 2005) 2: A
2005) network of cache servers owned by the same Internet
service provider that delivers content to users on behalf
Content Aggregation Model of content providers. CDN servers are typically shared,
Speciies how to combine learning content labeled as a delivering content belonging to multiple Web sites, though
Sharable Content Object (SCO) in a standardized way for all servers may not be used for all sites. (Katsaros &
reusability and interoperability. Includes a metadata for Manolopoulos, 2005a)
describing content, XML binding to deine how to code
metadata tags using XML so they are machine readable, Content Gratiication
and an Instructional Management System (IMS) content Enjoyment of message speciics. Content can mean
speciication that deines how to package a collection information, and often does, though it also includes
of SCOs and deines the design of the learning event. entertainment in the form of medium-carried programming.
(Stavredes, 2005b) (Stafford, 2005)

Content Aggregator Content Knowledge Resource


A business that transforms individuated content into A knowledge resource that exists independently of an
speciic and customer-tailored forms. (Rlke et al., organization to which it belongs. (Holsapple & Joshi,
2005) 2006)

Content Analysis Content Management


1: Identifying categories of statements and counting the 1: Implementation of a managed repository for digital
number of items in the text that appear in the categories. assets such as documents, fragments of documents,
(Ingram & Hathorn, 2005a) 2: Objective, systematic, and images, and multimedia that are published to intranet
quantitative analysis of communication content. The unit and Internet WWW sites. (Asprey & Middleton, 2005)
of measure can be the single words, sentences, or themes. 2: Management of Web pages as assisted by software;
In order to raise the reliability, two or more coders should Web page bureaucracy. (N.C. Rowe, 2005a) 3: Tools,
apply. (Pace, 2005) methods, and processes to develop, implement, and
evaluate the management of content intended mainly for
Content Assembly human comprehension. Content has a lifecycle, and its
A collection of existing or new units of content which management involves associated metadata. (Honkaranta
may be manipulated to produce content for a publication & Tyrvinen, 2005)
or for a speciic target audience. May be produced (semi-
)automatically or involve manual processing. A portion of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
128 Cont e nt M a na ge m e nt Syst e m (CM S) Cont e nt -Ba se d Re t ri eva l

Content Management System (CMS) Content Server


1: Software used to manage the content of a Web site. Allows publication and management of Web content for
C Typically a CMS consists of two elementsthe content portals and Web applications, with forms-based publishing,
management application and the content delivery templates, and worklow. (Wojtkowski, 2006)
application. Typical CMS features include Web-based
publishing, format management, revision control, indexing, Content Unit
and search and retrieval. (Chapman, 2005a) 2: Software that The object with which the management metadata is
enables one to add and/or manipulate content on a Web site. associated. May be a document, a ile, a component,
(Du Mont, 2005) 3: A system used to collect, manage, and or a section of a document, among others. (Honkaranta
publish the content of a Web site, storing the content either & Tyrvinen, 2005)
as components or as whole documents, while maintaining
the links between components. (Arkhypska et al., 2005) Content-Addressable File Store (CAFS)
4: Provides tools for organizing, delivering, and sharing Specialized hardware from ICL (UKs International
documents and images. Usually used in conjunction with Computers Limited) used as a filter for database
CSCW systems or worklow systems. (Pinheiro, 2005) applications. (Thomasian, 2005a)
See also Document Management System.
Content-Based Access
Content Originator A technique that enables searching multimedia databases
A business that creates the highly speciic types of content based on the content of the medium itself and not based
that is enhanced, combined, packaged, transmitted, and on a keyword description. (Farag, 2005a)
sold to customers. (Rlke et al., 2005)
Content-Based Filtering
Content Repurposing 1: A technique that involves a direct comparison between
Reorganizing or modifying the content of a graphical the content or attributes of a users proile and the
display to it effectively on a different device than its document to make recommendations. (Chen & Liu, 2005)
original target. (N.C. Rowe, 2005a) 2: An approach to provide recommendations based on
the individuals preference. (Chen & McLeod, 2006) 3:
Content Scalability Approach where the user expresses needs and preferences
The removal or alteration of certain subsets of the total on a set of attributes, and the system retrieves the items
coded bit stream to satisfy the usage environment, while that match the description. (Lorenzi & Ricci, 2005) 4:
providing a useful representation of the original content. Organizes information based on properties of the object
(Knight & Angelides, 2005) of preference and/or the carrier of information. (Parmar
& Angelides, 2005)
Content Scrambling System (CSS)
A well-known technological protection measure for the Content-Based Retrieval
access control and copy prevention of DVDs. It is based 1: An application that directly makes use of the contents
on encryption but was broken by the Norwegian teenager of media rather than annotation inputted by the human to
Jon Johansen (and two other individuals) in 1999. The locate desired data in large databases. (Wei & Li, 2005) 2:
decryption program, DeCSS, allows for the copying and An important retrieval method for multimedia data which
playback of digital content on noncompliant machines. uses the low-level features (automatically) extracted from
(Wang, Cheng, Cheng, & Huang, 2006) the data as the indexes to match with queries. Content-based
image retrieval is a good example. The speciic low-level
Content Seeding features used depend on the data type: color, shape, and
Adding identiiers and metadata to content units or their texture features are common features for images, while
parts to enable computerized assemblies and aggregations kinetic energy and motion vectors are used to describe video
on the content. (Honkaranta & Tyrvinen, 2005) data. Correspondingly, a query also can be represented
in terms of features so that it can be matched against the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont e nt -Ba se d-Filt e ring Re c om m e nde r Syst e m Cont ex t Que r y 129

data. (Li, Yang, & Zhuang, 2005) 3: Method for automatic Context
multimedia content features extraction. (Hentea, 2005c) 1: An individual construct that emerges as an individual
4: Retrieval based on image content. This includes encounters a situation, including others and artifacts, as it
C
retrieval based on image color, texture, shape and position is the individuals interpretation of a situation that results
of salient objects, dominant edges of image items, and in context. (Shariq & Vendel, 2006) 2: Describes the
regions. (Chang, 2005) 5: The search for suitable objects working environment and atmosphere including policies,
in a database based on the content; often used to retrieve work hours, work climate, and work goals. (Schoenfeld &
multimedia data. (Bretschneider & Kao, 2005) Berge, 2005) 3: Everythingsocial, cultural, political, and
historical factorsthat surrounds a particular event. These
Content-Based-Filtering Recommender System are the forces of inluence at play when the event actually
Technique based on the correlation between item contents occurs. Greater knowledge of the context of a thing leads to
by statistical studies about different characteristics. Such a deeper understanding of and a more balanced perspective
techniques compute user-purchase histories in order to on its nature. (Kasi & Jain, 2006) 4: A mathematical
identify association rules between items. (Gil & Garca, model or group of mathematical models within which
2006) a piece of mathematical knowledge is understood.
(Farmer, 2006) 5: The information that characterizes
Content-Based Image Retrieval (CBIR) the interaction between humans, applications, and the
1: A process framework for eficiently retrieving images surrounding environment. Context can be decomposed
from a collection by similarity. The retrieval relies into three categories: (1) computing context (e.g., network
on extracting the appropriate characteristic quantities connectivity, communication cost); (2) user context (e.g.,
describing the desired contents of images. In addition, user proile, location, nearby people); and (3) physical
suitable querying, matching, indexing, and searching context (e.g., lighting, noise levels). (Maamar, 2005) 6:
techniques are required. (Y.J. Zhang, 2005a) 2: The A triple (G, M, I) where G is a set of objects, M is a set
technique of image retrieval based on the features of features, and I is a binary relation between G and M
automatically extracted from the images themselves. (Y.- such that gIm, if and only if object g possesses the feature
K. Chan et al., 2005) 3: A general term used to describe m. (Saquer, 2005) 7: A triple (T, I, D) where T and I are
the semiautomatic or automatic extraction, indexing, sets and DTI. The elements of T are called objects,
and retrieval of images by their visual attributes and and the elements of I are called attributes. For any tT
characteristics. (Venters et al., 2005) 4: In this kind of and iI, note tDi when t is related to i, that is, (t, i)D.
retrieval, symmetry between input image and images of (Dumitriu, 2005) 8: All information about the current
database are established based on contents of the images users situation. (Abramowicz, Bana kiewicz, Wieloch,
under consideration. (Deb, 2005) 5: Retrieval of images & ebrowski, 2006)
similar to a given image based only on features present
in the image and not any external information. (Sural, Context Lens
Vadivel, & Majumdar, 2005) 6: Search for suitable image in A visual classiication scheme for a set of documents that
a database by comparing extracted features related to color, can be dynamically updated. The classiication scheme is
shape, layout, and other speciic image characteristics. arranged in a tree hierarchy to facilitate browsing. (Corral,
(Kao & Tendresse, 2005) LaBrie, & St. Louis, 2006)

Content-Centric Networks Context Query


A network where various functionalities such as naming, Represents the short-term user information needs. It is
addressing, routing, storage, and so forth are designed created each time a business user launches a data warehouse
based on the content. This is in contrast with classical report. The context query consists of three parts: subject
networks that are node-centric. (Shahabi & Banaei- constraints, time constraints, and semantic constraints.
Kashani, 2005) Subject constraints deine the warehouse objects that are
part of the report. Time constraints are represented by
Content-Driven Service the actual time range grasped by the most current state of
A television service to be provided depending on the the report. Semantic constraints are represented as a set
content. (Hulicki, 2005) of CSL-based weighted keywords. The context query is

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
130 Cont ex t -Aw a re Com put ing Cont ex t ua l M e t a dat a

executed on the data warehouse library, and personalized Context-Speciic Aspects


results are immediately returned to the user. (Wecel et Covers the most important factors that shaped and become
C al., 2005) characteristics of organizational dynamics such as culture,
business strategies, organization of work, management
Context-Aware Computing practices, current technology, workforce competency level,
A system that has information about the circumstances and working processes, among others. (Rentroia-Bonito,
under which it is operating and can react/make assumptions Jorge, & Ghaoui, 2006)
accordingly. A Vehicular Telematics System (VTS) has a
lot of information about its context, such as localization, Contextual Data Quality
user behaviors, vehicle operative state, and so forth. A concept that data does not exist in a vacuum, but is driven
(Costagliola, Di Martino, & Ferrucci, 2006a) by the circumstance in which data is used. Contextual
dimensions include relevancy, timeliness, and appropriate
Context-Aware Technology amount of data. (Borchers, 2005)
Technology that enables the collection, delivery, and
utilization of user context information. As key enablers Contextual Design
of a system-initiated wireless emergency service, context- A human-centered methodology for designing information
aware technologies mainly include sensor-device and systems from a rich understanding of customer work
sensor-network technologies. (Sun, 2005) practice. (Notess, 2005)

Context-Awareness Contextual Information


Makes applications aware of the dynamic changes in the Refers to several possible aspects of the core message: the
execution environment. The execution context includes situation in which the message was produced, the situation
but is not limited to mobile user location, mobile device in which it is anticipated to be received, an explanation about
characteristics, network condition, and user activity. (Kunz a statement, an explanation of how to go about executing
& Gaddah, 2005) a request for action, or the underlying assumptions about
an argument. (Teeni, 2006)
Context-Dependent Learning
The learning both of knowledge and of the way one behaves Contextual Inquiry
in speciic scenarios in a realistic life context (preferably 1: A ield research method for observing real work practice
one that relates directly to past and future experiences of in its natural environment and then co-interpreting the
the learner). It allows the learning of terrain, procedures data with the person observed. The irst step in contextual
and processes, events, and almost anything else by doing design. (Notess, 2005) 2: Interviewing users in the context
rather than a priori. (Ariely, 2006b) of their activities while they work and learn. (Neale et
al., 2005) 3: This interface design method employs an
Context-Mechanism-Outcome Pattern ethnographic approach such as observing user activities
Realist evaluation researchers orient their thinking in a realistic context. (Chan & Fang, 2005)
to context-mechanism-outcome (CMO) pat ter n
conigurations. A CMO coniguration is a proposition Contextual Knowledge
stating what it is about an IS initiative that works, for whom, Knowledge of the contexts in which organizational tasks
and in what circumstances. A reined CMO coniguration is are performed. Depending on the task, this knowledge
the inding of IS evaluation research. (Carlsson, 2005) may be entirely internal to the organization or it may
require acquaintance with many extra-organizational
Context-Sensitive HCI contextsfor example, markets, legal contexts, and
Human-computer interaction in which the computers legislative contexts. (Ein-Dor, 2006)
context with respect to nearby humans (i.e., who the
current user is, where the user is, what the users current Contextual Metadata
task is, and how the user feels) is automatically sensed, Information describing the context where the object of the
interpreted, and used to enable the computer to act or contextual metadata is created. The contextual metadata
respond appropriately. (Pantic, 2005a) can cover, for example, information about the producers

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont ex t ua lism Cont inuous Syst e m 131

and production processes of documents. (Lyytikinen et education. A tool to support professional development
al., 2005) in changing work life based on the principle of life-long
learning. (Lammintakanen & Rissanen, 2005b)
C
Contextualism
Integrates process, content, and context to study Continuous Animation
organizational decision making. (Chou et al., 2005) Animated objects deployed on a Web site to catch a
visitors attention to an advertising message or to attempt
Contextualizing Logic to entertain visitors. (Gao et al., 2006)
Method to formally represent knowledge associated with
a particular circumstance on which it has the intended Continuous Auditing
meaning. (Alonso-Jimnez et al., 2005) Type of auditing that produces audit results simultaneously,
or a short period of time after, the occurrence of relevant
Contingency Theoretic Software Development events. (Garrity et al., 2005)
(CTSD)
A new model for MAS design using tenets from CT and Continuous Data
Information Processing Theory (IPT). The CTSD design Data that can assume all values on the number line within
approach is focused on design for maintainability, a crucial their value range. The values are obtained by measuring.
requirement for complex, dynamic systems. (Durrett et An example is temperature. (Yang & Webb, 2005)
al., 2005)
Continuous Quality Improvement (CQI)
Contingency Theory (CT) A process that measures progress towards goals, using
1: A research branch of organizational theory that suggests metrics and feedback from stakeholders for continuous
that an organizations structure relects its adaptation improvement. (Moore et al., 2005)
to the environment in which it operates. Hierarchical
organizations operate best in stable, simple environments, Continuous Query (CQ)
while lat, team-based organizations are better adapted to 1: A query that is re-evaluated continuously. For example,
dynamic, complex task environments. (Durrett et al., 2005) the query give me the most updated temperature will
2: A meta-theory which argues that irm performance is return different readings depending on the current moment.
deined by the environment-strategy-structure relationship, Some continuous queries are also location dependent. For
where the organizations strategy is contingent on the instance, the query show me the nearest gas station
external environment and the organization structure is will continually execute a location-dependent query.
contingent on the irms strategy. (Baker & Coltman, 2005) An advanced query processing technique is needed
3: States that desired organizational outcomessuch in conjunction with moving object databases. (Leong,
as performanceare the consequence of it or match 2005a) 2: The answer to a continuous query is produced
between two or more factors (e.g., strategy, culture, over time, relecting the stream data seen so far. Answers
structure, tasks, environment, and leadership style). The may be stored and updated as new data arrives or may be
best way to organize depends upon the characteristics and produced as data streams themselves. (Chatziantoniou &
the interplay between these factors. (Herschel, 2005) Doukidis, 2005)

Continuation Pattern Continuous Query Language (CQL)


A pattern in technical analysis that suggests, on the balance An expressive SQL-based declarative language developed
of probabilities, that price trend will continue in its current by Stanford Universitys STREAM project for registering
direction. (Vanstone & Tan, 2005) continuous queries against data streams. (Van Dyke et
al., 2006)
Continuing Education
1: Any form of learning provided for adults to supplement Continuous System
previous education or knowledge. (Ryan, 2005) 2: The A system whose state variables show its behavior change
process of learning that continues beyond the formal years continuously with respect to time. Hence, the behavior of
of education and/or outside the formal curriculum. (Hin the system is seen as changing continuously over time. Such
& Subramaniam, 2005b) 3: Education after professional

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
132 Cont inuous Va lue Assum pt ion (CVA) Cont rol Pa cke t

systems are usually modeled using differential equations. Contribution-Oriented Pedagogy


(Vitolo & Coulston, 2005) 1: An approach to learning in which students regularly
C contribute material they have found, created, or adapted to
Continuous Value Assumption (CVA) a common Web environment, where the contributions are
A technique that allows the estimation of values inside assessed as part of the course requirements and where the
a bucket by linear interpolation. (Buccafurri & Lax, contributions are further made use of by other students in
2005) further learning activities. (Collis & Moonen, 2005b) 2:
Learning scenario in which learners ind or create products
Continuous-Time Signal and make these available as learning resources to others.
Deined along a continuum of time t and thus represented (Collis & Moonen, 2005a)
by continuous independent variables, for example xc(t).
Continuous-time signals are often referred to as analog Control Flow Graph
signals. (Jovanovic-Dolecek, 2005b) An abstract data structure used in compilers. It is an abstract
representation of a procedure or program, maintained
Contour Map internally by a compiler. Each node in the graph represents
A line connecting points of equal elevation on topographic a basic block. Directed edges are used to represent jumps
surface. The contour map depicts continuous distribution in the control low. (Tan & Zhao, 2005a)
of the phenomena on earth surface. (Ali et al., 2005)
Control Group
Contract 1: A group of individuals who look like those in the
A consistent and fault-tolerant execution of a program from treatment group but are not contacted. (Lo, 2005) 2: The
one consistent state to another consistent state achieving the group in an experimental study that does not receive
required precondition and ensuring that the post condition experimental treatment, but is similar to the group receiving
is met. (Murthy & Krishnamurthy, 2005b) the treatment in all relevant respects. (Fisher, 2005)

Contract Right Control Measure


The right that an individual has by reason of a valid A response taken by e-marketplace irms to manage,
contract that imposes duties on the other contracting party reduce, mitigate, and eliminate a risk. (Ratnasingam,
or parties. Enforceable under legal systems, but not the 2005)
same as a citizen right. (Gilbert, 2005)
Control Objectives for Information and Related
Contract Theory Technology(ies) (COBIT)
A theory dealing with aspects of negotiation and contracting 1: Designed as an IT governance aid for understanding
between two or more parties. (Heucke et al., 2005) and managing the risks and beneits associated with
information and related technology. It is intended that
Contrast Set COBIT provide clear policy and good practice for IT
Similar to an Emerging Pattern, it is also an itemset whose governance throughout the organization. (Tassabehji,
support differs across groups. The main difference is the 2005b) 2: An IT governance framework speciied by the
methods application as an exploratory technique rather IT Governance Institute. The COBIT model describes the
than as a classiication one. (Butler & Webb, 2005) control objectives for 34 IT processes, as well as the
management guidelines, implementation guidelines, and
Contribution outcome measures for the processes. (Saha, 2006a)
A piece of knowledge about an issue. Represents a
participants view, idea, perspective, thought, or opinion. Control Packet
A contribution should be about 4-10 words in length, to A control packet is sent in a separated channel and contains
ensure it is understandable when read, but not too wordy. routing and scheduling information to be processed at the
(Shaw, 2006) electronic level before the arrival of the corresponding data
burst. Also called Burst Header Packet or Setup Message.
(Rodrigues et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont rol Room Conve rsat iona l Syst e m 133

Control Room (Blomqvist, 2005) 2: The occurrence taking place with


A special location in a plant where operators can monitor computing and telecommunications that emphasizes
a process in great detail without having to physically be the preeminence of computer-based information and
C
looking at it. This is particularly useful in dangerous telecommunications networks. (Ochoa-Morales, 2005) 3:
environments. (Adam & Pomerol, 2005) The process of coming together or the state of having come
together toward a common point. (M. Mitchell, 2005a) 4:
Controlled Indexing Uniting the functions of heterogeneous technologies with
Objects may be indexed using controlled vocabularies, different features to form a homogeneous service bundle.
hierarchies, or classiications. (Gaedke et al., 2005) (Blecker, 2006a)

Controlled MA Convergence Factor


A class of coordinated centralized or distributed collision- Measures the rate at which cross-platform populations
free multiple-access protocols. (Markhasin et al., 2005) increase as penetration of platforms increases. The
convergence factor is derived from the penetrations of
Controlled Vocabulary the three platforms multiplied by each other. (Pagani,
1: A limited menu of words from which metadata like 2005b)
captions must be constructed. (N.C. Rowe, 2005b) 2: A
set of standard terms that restricts synonyms to allow for Convergence Index
maximum results when used with automated searching. An index representing the critical digital mass of
(Leath, 2005) consumers; it estimates the number of consumers likely
to be present across all three platforms by the simple
Controlling expedient of taking the population of each territory and
Monitoring performance, comparing results to goals, multiplying it by the triple-platform penetration factor.
and taking corrective action. Controlling is a process (Pagani, 2005b)
of gathering and interpreting performance feedback as
a basis for constructive action and change. (Cragg & Converging/Diverging Gross Margin Analysis
Suraweera, 2005) A slope analysis tool used to plot actual sales and gross
margin data for several periods in order to discern trends
Controls and likely outcomes. Measures operational eficiency or
Countermeasures for vulnerabilities. (Tong & Wong, ineficiency. (Nugent, 2005)
2005a)
Converging Thinking Technique
Convenience One of several tools used during the convergent phases of
The quality of being suitable to ones comfort, purposes, Creative Problem Solving (CPS) to improve the evaluation
or needs of shopping. (Shan et al., 2006a) and selection of the most relevant ideas, thoughts, or
data. Pluses, potentials, and concerns; highlighting; and
Converged Network the evaluation matrix are some of the most common
A network that carries diverse types of trafic, such as converging thinking techniques. (Torres-Coronas &
real-time voice and video, Web browsing, trafic generated Gasc-Hernndez, 2005)
in grid computing, networked virtual environments, and
so forth. (DaSilva, 2005) Conversation Learning Community (CLC)
A kind of interactive and constructivist learning
Convergence environment in which the instructor(s), learners, course
1: In the ICT industry, convergence at the irm level means materials, and links to remote experts and resources
that irms cooperate to combine their different knowledge interact with each other. (Bodomo, 2005b)
bases. Also industries, such as communications and media
industries can be said to converge if focal actors leverage Conversational System
knowledge from two previously separated industries. A system that can communicate with users through a
conversational paradigm. (Lorenzi & Ricci, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
134 COO Ce ll/Origin Coope t it ion

COO Cell/Origin group dividing the work so that each member of the group
A positioning technique that determines a mobile users completes a portion of the project. (Ingram & Hathorn,
C location by identifying a cell in which the persons mobile 2005b) 4: Acting together, in a coordinated way at work
device is registered. Also known as Cell Global Identity or in social relationships, in the pursuit of shared goals,
(CGI). (Fraunholz et al., 2005) the enjoyment of the joint activity, or simply furthering
the relationship. (Sala, 2005b) 5: Occurs when one species
Cookie works with another in order to achieve an outcome
1: A message generated and sent by a Web server to a beneicial to one or both. Proto-cooperation is the situation
Web browser after a page has been requested from the in which both beneit by the cooperation, but can survive
server. The browser stores this cookie in a text ile, and without it. Mutualism occurs when each beneits and
this cookie then is sent back to the server each time a cannot otherwise survive. Commensalism occurs when
Web page is requested from the server. (Nasraoui, 2005) two species habitually live together, one species being
2: A small amount of information that the Web site server beneited by this arrangement and the other unharmed
requests the users browser to save on the users machine. by it. (Tatnall & Davey, 2005)
(Sockel & Chen, 2005) 3: A general mechanism that
server-side connections (such as CGI scripts) can use to Cooperative Agent
both store and retrieve information on the client side of the Usually each agent participating in an agent system does
connection. The addition of a simple, persistent, client-side not solve the whole problem by itself, but only a small
state signiicantly extends the capabilities of Web-based subproblem for which it has the required competence.
client/server applications. (Chim, 2006) 4: Information, By means of cooperation with other agents, the whole
usually including a username, Internet address, and the problem is inished. While cooperating, an agent has to
current date and time, placed on the hard drive of a person bid for solving some aspect of the problem or negotiates
using the World Wide Web by a Web site that one has with other agents for the distribution of tasks. (Barolli &
visited. This information can be used to identify visitors Koyama, 2005b)
who have registered or viewed the site, but also to report
the visitors unrelated Web activity, or worse, personal Cooperative Information System
information stored by the user. (Friedman, 2005) 5: A A set of geographically distributed information systems
short string of text that is sent from a Web server to a that cooperate on the basis of shared objectives and goals.
Web browser when the browser accesses a Web page. The (Marchetti, Mecella, Scannapieco, & Virgillito, 2005)
information stored in a cookie includes the cookie name,
the unique identiication number, the expiration date, and Cooperative Learning
the domain. (Mullen, 2005) 6: A string of text that a Web 1: A structure of interaction designed to facilitate the
browser sends to you while you are visiting a Web page. accomplishment of a speciic end product or goal through
It is saved on your hard drive, and it saves information people working together in groups. (Berg, 2005f) 2: A
about you or your computer. The next time you visit this learning situation in which students work together in small
Web site, the information saved in this cookie is sent back groups and receive rewards or recognition based on their
to the Web browser to identify you. (T. Stern, 2005) 7: groups performance. (Sala, 2005b) 3: Learning where
A text ile created by a Web server and stored on a users students are required to work in small groups, usually
hard disk that contains data about a Web site that has been under the direct guidance of the instructor, who may set
visited. (Szewczak, 2005) speciic tasks and objectives for each session. (McInnerney
& Roberts, 2005)
Cooperation
1: A group of people working on a common global task. Cooperative Marketing
(Villemur & Drira, 2006) 2: Cooperative groups work The act of working together to conduct activities associated
together on group projects in ways that do not necessarily with buying and selling products or services. (Hornby,
result in high-quality interaction, and new products and 2005)
knowledge. A typical cooperative strategy is to divide
up the work among the members and stitch the various Coopetition
contributions together at the end of the project. (Ingram, 1: A situation where organizations, usually SMEs, are
2005) 3: Group effort characterized by individuals in a cooperating with each other and at the same time they are

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Coope t ive N e t w ork Copyle ft 135

also competing against each other. (Mason et al., 2006) 2: between human agents and the overall organization
Simultaneous existence and relevance of cooperation and of work. Organizations should understand the nature
competition. (Loebbecke & Angehrn, 2006) of coordination, establish what kinds of structures of
C
organizations already exist, and discover the appropriate
Coopetive Network coordination processes. (Nichols & Chen, 2006)
A structured network of N organizations that are in
simultaneous competition and cooperation (e.g., the Coordination Within a Supply Chain
VISA network). This network type is characterized by a Occurs when the decisions made at different stages of
decentralized structure, high competition, and a common the chain maximize the total supply chains proitability.
scope of operations among members. (Priestley, 2006) When a party makes a decision that maximizes its own
local proitability, a lack of coordination can occur in the
Coordinate System supply chain, as that decision may not be in the best interest
A reference system used to gauge horizontal and vertical of the entire chain. (Abraham & Leon, 2006)
distances on a planimetric map. It is usually deined by a
map projection, a spheroid of reference, a datum, one or CoP: See Community of Practice.
more standard parallels, a central meridian, and possible
shifts in the x- and y-directions to locate x, y positions Copper Line
of point, line, and area features (e.g., in ARC/INFO GIS The main transmission medium used in telephony networks
system, a system with units and characteristics deined by to connect a telephone or other apparatus to the local
a map projection). A common coordinate system is used exchange. Copper lines have relatively narrow bandwidth
to spatially register geographic data for the same area. and limited ability to carry broadband services unless
(Al-Hanbali & Sadoun, 2006) combined with an enabling technology such as ADSL.
(Chochliouros et al., 2005c)
Coordination
1: Enabling and controlling the cooperation among members Copresence
of a group of human or software-distributed agents. It 1: Copresence can only take place with a system where you
can be considered as software glue for groupware tools, have the sense of being in another place or environment
including architectural and behavioral issues. Coordination other than the one you are physically in, and being there
includes several synchronization and management with another person. (Champion, 2006a) 2: The coming
services. (Villemur & Drira, 2006) 2: The act of working together of people (face-to face), people with objects (face-
together harmoniously. It consists of the protocols, tasks, to-object), or people with places (face-to-place) in time
and decision-making mechanisms designed to achieve and space. (Jain & Lyons, 2005)
concrete actions between interdependent units. (Daassi &
Favier, 2006) 3: The activity and effort associated with the Copyleft
information processing tasks of an organization. (Nissen 1: A non-exclusive, publicly accorded legal license backed
& Levitt, 2006) by copyright law that permits derivative works from
the copyright holders licensed works, on the condition
Coordination of Commitments that licensees relicense their works to the public under
The actions by humans leading to the completion of a similarly liberal copyleft. (Okoli & Carillo, 2006) 2:
work. Coordination is described in terms of contracts A term coined by Richard Stallman, leader of the free
and promises consisting of recurring loops of requesting, software movement and creator of the General Public
making, and fulilling commitments. (Janssen, 2005) License, or GPL. The key tenet of the GPL, which copyleft
describes, is that software licensed under it can be freely
Coordination of Tasks copied, distributed, and modiied. Hence, this software is
The management of dependencies between tasks. (Janssen, copyleft, or the opposite of copyright. It insures that there
2005) are no protections or restrictions when copyright insures
the opposite. (St.Amant & Still, 2005) 3: Provision in the
Coordination Theory GNU General Public License that forces any derived work
Assumes that the introduction and use of information based on software covered by the GPL to be covered by
technology will modify both the structure of the interaction the GPL; that is, the author of a derived work must make

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
136 Copyright Corporat e M e m orie s a nd N a rrat ive Doc um ent s

all source code available and comply with the terms of Core Group
the GPL. (Fleming, 2005b) The repository of knowledge, inluence, and power in an
C organization. (Partow-Navid & Slusky, 2005)
Copyright
1: A legal term describing rights given to creators for their Core Knowledge
literary and artistic works. See World Intellectual Property A highly structured, fact-based curriculum based on the
Organization at www.wipo.int/about-ip/en/copyright.html. work of E.D. Hirsch. (Glick, 2005b)
(Lowry, Grover, et al., 2005) 2: The bundle of rights that
control the copying and use of original works ixed in Corporate Communications
tangible form. The details of the exact rights granted, their The use by organizations of technology infrastructure
duration, and their ownership all vary between different and software solutions that empower them to create and
jurisdictions, but in its simplest form, copyright allows deliver communication messages, both internally among
creators of original works control over whether or not their employees and externally (outside the organization), to
work is copied (either directly or through a derived work) support their business needs and goals; operationally less
and under what circumstances, including whether or not it is costly. (Nandavadekar, 2005)
published or made available to the public. In most countries
copyright comes into existence automatically when a work Corporate E-Image
is ixed in some tangible form and is not conditional on An overall impression held of an e-vendor by its customers
any notice or formal process. The rights that are granted at a particular point in time. This, in turn, is the net result
under copyright can be separated, licensed, sold, or waived of consumers experiences with an organization, both
entirely at the discretion of the owner (except moral rights online and off-line, and from the processing of information
in some countries). (Marshall, 2005) 3: Protected right on the attributes that constitute functional indicators of
in many jurisdictions that controls ownership over any image. (Yeo & Chiam, 2006)
material of a creative nature originated by an individual
or organization. (Fleming, 2005b) 4: The exclusive right Corporate Information Factory (CIF)
given to the creator of an intellectual work of text, audio, A logical architecture with the purpose of delivering
video, or software to restrict and control how their work business intelligence and business management capabilities
and its derivatives are distributed or exploited for inancial driven by data provided from business operations. (Yao
or other beneit. (Okoli & Carillo, 2006) et al., 2005)

Copyright Protection Corporate I.Q.


A mechanism to ensure that no additional replication An enterprises capability of connectivity (internal link and
takes place if the entity/work is sold or licensed with a link with its partners), sharing (data and information shared
ixed number of copies. (Sattar & Yu, 2006) among its personnel and its partners), and structuring
(ability to extract knowledge from information and raw
CORBA: See Common Object-Request Broker data). (Joia, 2005)
Architecture.
Corporate Knowledge
Core The knowledge owned by an organizationits databases,
The main domain (focus) of a particular community pf technology, beliefs, culture, structure, processes, and
practice. It is the common interest that is the driving procedures. The organization has access to, but does not
force behind the formation of a Community of Practice. own, the knowledge of employees, and through research
(Ray, 2006) acquires knowledge of the external environment. (Mitchell,
2005a)
Core Competency
Organizational capabilities or strengthswhat an Corporate Memories and Narrative Documents
organization does best. (Petska & Berge, 2005) Knowledge is one of the most important assets of an
enterprise, on the condition that it could be controlled,
shared, and reused in an effective way. The core of any
commercial/industrial organization can then be conceived

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Corporat e Pe rfor m a nc e M a na ge m e nt (CPM ) Cosine M e asure 137

under the form of a general and shared corporate Correction Symbol


memory, that is, of an online, computer-based storehouse A symbol used to indicate a speciic grammatical error.
of expertise, experience, and documentation about all (Wu & Chen, 2005)
C
the strategic aspects of the organization. Given that this
corporate knowledge is mainly represented under the Corrective Feedback
form of narrative documents, the possibility of having at Visual, auditory, or tactile indications that the student stated
ones disposal tools for an effective management of these the incorrect response. This type of feedback supplies
documents becomes an essential condition for the concrete the correct response, reteaches skills, and retests student
setup and for the intelligent exploitation of non-trivial learning. It also includes some type of encouragement,
corporate memories. (Zarri, 2006c) such as Try again! (Lazarus, 2005a)

Corporate Performance Management (CPM) Correlation


Enterprise Performance Management (EPM) is sometimes 1: Amount of relationship between two variables, how they
used as an umbrella term that describes the methodologies, change relative to each other, range: -1 to +1. (Morantz,
metrics, processes, and systems used to monitor and 2005) 2: Describes the strength or degree of linear
manage an enterprises business performance. CPM relationship. That is, correlation lets us specify to what
provides management with an overall perspective on the extent the two variables behave alike or vary together.
business. (Mller, 2005) Correlation analysis is used to assess the simultaneous
variability of a collection of variables. For instance, suppose
Corporate Portal/Corportal one wants to study the simultaneous changes with age of
An online corporate Web site based on the model of an height and weight for a population. Correlation analysis
enterprise information portal. An enterprise information describes how the change in height can inluence the change
portal acts as a single gateway to a companys information in weight. (Katsaros & Manolopoulos, 2005b)
and knowledge base for employees, and sometimes its
customers and business partners as well. (Ruhi, 2006) Correlation Coeficient
A statistical method of measuring the strength of a linear
Corporate Semantic Web or Organizational relationship between two variables. (Benrud, 2005)
Semantic Web
Semantic Web at the scale of a limited organization (e.g., Correspondence Course
a company, an institution, a community). It is composed 1: A course in which instruction and assessment are
of resources, ontologies, and ontology-based semantic conducted through the postal mail. (Lazarus, 2005b) 2:
annotations. (Dieng-Kuntz, 2006) Am education course typically offered via postal service.
(Schifter, 2005)
Corporate University
A university-style campus set up by a company to provide Correspondence Education
tailored learning, training, and development activities for its 1: Delivery of class lessons by mail. (Witta, 2005) 2:
staff. Corporate universities typically offer qualiications The form of distance education that is paper based;
at various levels. (Gordon & Lin, 2005) communication between teacher and students is by
correspondence, not face-to-face. (Rogers & Howell,
Corporeal Mobility 2005)
Bodily movement between places such as by car, rail, or
foot. (Jain & Lyons, 2005) Corrupted Party
A party that participates in a protocol while under the
Corpus control of the adversary. (Lindell, 2005)
Any systematic collection of speech or writing in a
language or variety of a language. A corpus is often large Cosine Measure
and diverse, and can be classiied according to contexts or The vector angle between two documents that is used as
styles tagged and indexed for speciic features. (Ahmad a measure of similarity. (Chang, 2005)
& Al-Sayed, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
138 Cost Ce nt e r Course Deve lopm e nt

Cost Center South Paciic Applied Geoscience Commission (SOPAC),


Administrative unit of an institution identiied in terms the Paciic Island Development Program (PIDP), the South
C of its responsibility for a given set of costs (rather than Paciic Tourism Organization (SPTO), the University of the
identiied in terms of its functions per se). Cost center South Paciic (USP), the Fiji School of Medicine (FSchM),
costing looks at aggregate charges to individual units the South Paciic Board for Educational Assessment
rather than costs for particular activities which, per ABC (SPBEA), and the Forum Secretariat which acts as CROPs
costing, may be distributed across numerous cost centers. permanent chair. (Hassall, 2005)
(Fisher, 2005)
Country Code Top-Level Domain (ccTLD)
Cost Effectiveness The TLD associated to a country and corresponding to its
The quality principle that assures the institutional mission ISO3166 code. Differently from gTLD, these domains are
is conveyed online, affordably for the institution and for exclusive of countries. (Maggioni & Uberti, 2005)
learners. (Moore et al., 2005)
Coupling
Cost-Beneit Study 1: A measure of strength of association established
A kind of policy study that aims to identify the ratio of by the communication link between two objects.
costs to beneits for a given activity or set of activities, (Polgar, 2005b) 2: Used to measure the extent to which
and so indicate whether the beneits merit the costs. interdependencies exist between software modules: the
(Fisher, 2005) higher the interdependencies, the higher the coupling. It
implies that if you want to reuse one component, you will
Cost-Effectiveness Study also have to import all the ones with which it is coupled.
A kind of policy study that aims to identify the ratio of (Wan et al., 2006)
costs to effectiveness for a given set of alternative activities
or interventions, and to indicate whether that ratio is more Coupling Mode
favorable for one alternative or another. (Fisher, 2005) The mode specifying the transactional relationship
between a rules triggering event, the evaluation of its
Cost-Sensitive Classiication condition, and the execution of its action. (Cilia, 2005)
The error of a misclassiication depends on the type of the
misclassiication. For example, the error of misclassifying Course Applicability System (CAS)
Class 1 as Class 2 may not be the same as the error of A Web-based planning tool for academic programs and
misclassifying Class 1 as Class 3. (Zhou & Wang, 2005) transfer. Developed and licensed by Miami University of
Ohio. (Langer, 2005)
COTS: See Commercial Off-the-Shelf.
Course Content
Council for Higher Education Agency (CHEA) The main themes covered in a course. (Martz & Reddy,
A private, nonproit national organization. It is the largest 2005)
institutional higher education membership organization
in the United States with approximately 3,000 colleges Course Design
and universities. (Rhoten, 2006b) Decisions regarding objectives and the most effective
methods of ensuring that students accomplish the
Council of Regional Organizations in the Paciic objectives. (C. Cavanaugh, 2005)
(CROP)
An organization comprising 10 regional inter-governmental Course Design and Development
agencies established to promote harmonization and Comprises all activities concerned with the planning,
collaboration between member programs, and to avoid preparation, and production of students study materials.
duplication of effort and resources. Member agencies (Naidu, 2005b)
are the Paciic Community (formerly the South Paciic
Commission), the Forum Fisheries Agency (FFA), the Course Development
South Paciic Regional Environment Program (SPREP), the The actual production of the software version of a course
for online delivery and the supporting instructional

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Course Deve lopm e nt Tools Course -M at e ria l St ruc t ure 139

materials. Faculty involved in the development of online of the functions associated with offering and managing
courses are often required to have technology-speciic an online course, so students and faculty members have
knowledge and skillsdigitizing, converting ile formats, only one program to use. (Johnstone, S.M., 2005) 6: An
C
operation of speciic software programs, and programming. integrated course environment (e.g., WebCT, Blackboard)
(Sales, 2005) that includes components such as e-mail, discussion
group, chat, grade book for delivery, and management of
Course Development Tools instruction. (Hazari, 2006) 7: An integrated learning tool
Software with high executive performance, good lexibility, or package that facilitates the tracking and monitoring of
easy utility, runtime softness, and so forth, suitable for student online learning in a technology setting. (Bonk
the implementations of online Web courses. (Y.J. Zhang, et al., 2005)
2005b)
Course Map
Course Management Graphical image that provides a pictorial representation
Includes the ability to share materials and modules across of the course syllabus to allow for easy conversion from
course containers, the ability to edit comments and to face-to-face to online delivery. (Etter & Byrnes, 2005)
track changes on learners documents, and the ability to
monitor and access learners e-learning performance. In Course Partnership
short, course management offers instructors the ability Course-based industry-university partnerships, where
to electronically maintain and manage class rosters, a course is designed so that the concepts and theory
distribute course materials, administer online exams, and discussed in class are applied in team course projects
communicate with learners. (Xu & Wang, 2006) geared at solving immediate problems at the company
partner. (Kock, 2005)
Course Management Software
Instructional technology software packages created for Course Web Environment
educational use, primarily as course support or as a vehicle A course management system or similar system offering
for online courses. Groupware features include messaging integrated facilities for organization, contribution,
tools, conferencing tools, and information management collaboration, and communication for those associated
and data resources. (Ferris & Minielli, 2005) with a particular course. (Collis & Moonen, 2005b)

Course Management System (CMS) Course-Level Attrition vs. Program-Level


1: A server-based program that provides an easy-to-use Attrition
tool for online course development, course delivery, Attrition should be understood on two different levels
and course management. Well-known providers such as attrition on a course level and attrition on an entire degree
WebCT and Blackboard offer these bundled, off-the-shelf program level. Course-level attrition includes no-shows,
online learning environment systems. (Cooper, 2005) 2: cancelled-outs, and course-withdrawals. Program-level
Computer software system that provides a course shell attrition includes non-starters, failed-outs, transferred-
with a number of integrated tools, which may include outs, skip-outs, stop-outs, and drop-outs. Most drop-out
chat software, a threaded discussion board, online grade research studies reported in the literature deal with attrition
books, online testing, and other classroom functions. on a course level. (Chyung, 2005)
(Gregory, 2005) 3: A software program that functions
as an online classroom and can be used to deliver online Course-Material Structure
instruction. Popular course management systems include As the course materials can be stored in XML (extensible
Blackboard, Moodle, and WebCT. (Baker & Schihl, 2005) markup language) format, which offers a tree-like or
4: A software-based system for managing the development hierarchical structure, the prevailing relationships inside
and delivery of online courses and programs, and managing the course materials are of parent-to-child, which facilitates
student progress over the Internet. (Gold, 2005) 5: Also easier addition or removal of the course-material nodes
known as learning management software or system, or documents. Through techniques like Synchronized
this has proliferated in the last few years. There are both Media Integration Language (SMIL), multimedia data
proprietary and open source CMSs now available to can not only be played on the Internet, but can also run
colleges and universities. Their goal is to integrate many in a synchronized manner. (Leung & Li, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
140 Course -Wit hdra w a l Cre at ion

Course-Withdrawal CPM: See Corporate Performance Management.


The act of a student who withdraws from a course after
C the oficial drop-out deadline. (Chyung, 2005) CPN: See Capacity Provisioning Network.

Courseware CPS: See Creative Problem Solving.


Any type of instructional or educational course delivered
via a software program or over the Internet. (Snchez- CQ: See Continuous Query.
Segura et al., 2005)
CQI: See Continuous Quality Improvement.
Courseware Technology
The set of tools and packages that facilitate student CQL: See Continuous Query Language.
learning either as individuals or as members of groups.
(Bonk et al., 2005) CR: See Computed Radiography.

Covariance Matrix Crackers


The square n x n of which the entries are the pairwise Coined in the 1980s by hackers wanting to distinguish
correlations of the variables of a random vector of length themselves from someone who intentionally breaches
n; the (i,j)th entry is the correlation between the ith and computer security for proit, malice, or because the
the jth variables. (Zelasco et al., 2005) challenge is there. Some breaking-and-entering has been
done ostensibly to point out weaknesses in a security
Cover Story system. (Tassabehji, 2005a)
A lie that is used to hide the existence of high classiied
data. (Gabillon, 2005) Craft/Alchemy
The intuitive and holistic grasp of a body of knowledge
Cover Work or skill relating to complex processes, often without the
The host media in which a message is to be inserted or basis of rational explanation. (Nicholls, 2006)
embedded. (K. Chen, 2005)
Crawler/Spider
Cover-Medium 1: A program that automatically scans various Web sites
A medium that does not contain any message. (Lou et and collects Web documents from them. It follows the links
al., 2006) on a site to ind other relevant pages and is usually used
to feed pages to search engines. (Hu, Yang, Lee, et al.,
Covering Constraint 2005) 2: Program that downloads and stores Web pages.
A constraint that states that the entity types that compose A crawler starts off with the Uniform Resource Locator
a category, taken together, contain all the elements of the (URL) for an initial page, extracts any URLs in it, and
category. (Mani & Badia, 2005) adds them to a queue to scan recursively. (Fernndez &
Layos, 2005)
Covert Channel
1: An unintended communications path that can be used CRC: See Cyclic Redundancy Check, Complementary
to transfer information in a manner that violates the Resource Combination.
security policy. (Gabillon, 2005) 2: A channel that is
not meant to route information, but nevertheless does. Creation
(Haraty, 2005b) 1: An interaction between individuals that includes the
exchange of tacit and explicit knowledge. (Lindsey, 2006) 2:
CPE: See Customer Premise Equipment. The ability and opportunity for communities to create and
publish their own online content that actively relects their
CPFR: See Collaborative Planning, Forecasting, and own position and that is inherently counter-hegemonic.
Replenishment. (Williamson, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cre at ive Abra sion CRI SP-DM 141

Creative Abrasion and temporarily store candidate assets until a inal decision
The meeting of minds on common ground to explore and can be made. (Subramanian, 2005)
negotiate different opinions and, as a result, generate new
C
ideas. (Chua, 2006) Creativity
1: The ability to generate or recognize ideas, alternatives,
Creative Idea Generation or possibilities that may be useful in solving problems,
The production and development of original and useful communicating with others, and entertaining ourselves and
ideas. Creative idea generation is a key activity in problem- others. (Sala, 2005b) 2: The production of something new
solving groups. (Klein, 2005) or original that is useful; the act of creating recombining
ideas or seeing new relationships among them. Creativity
Creative Learning is usually deined in terms of either a process or a product
A type of learning that improves the ability to be creative and at times has also been deined in terms of a kind of
and to develop original, diverse, or elaborate ideas. (Sala, personality or environmental press. These are four Ps of
2005b) creativity: process, product, person, and press. (Torres-
Coronas & Gasc-Hernndez, 2005) 3: In the context of
Creative Observation discovery, creativity is the ability to generate or recognize
A phenomenon that pertains to Field Creation. This form ideas and alternatives that might be useful in solving
of observation involves conventional notions of participant problems. There are several aspects of creativity, including
observation, with one important difference: that which is creative product or value, creative person/people, creative
being observed has, in fact, been created by the observer, environment, creative symbols, and creative process.
either alone or in conjunction with collaborators. See Co- (Aurum, 2005)
Construction. (Forte, 2005)
Creativity-Enhancing System
Creative Performance An information system designed to offer creative tools to
High level of capability in an idea or solution, applied to help users formulate problems and perform other creative
solve a problem in an imaginative way, resulting in effective tasks in decision making. (Forgionne, 2005)
action. Environmental factors such as autonomy and
freedom, challenge, clear direction, diversity/lexibility/ Credibility
tension, support for creativity, trust, and participative safety 1: A characteristic of information sources that inluences
directly affect the creative performance within work teams. message persuasiveness, attitudes toward the information
(Torres-Coronas & Gasc-Hernndez, 2005) source, and behaviors relevant to message content,
consisting of two primary attributes: expertise and
Creative Problem Solving (CPS) trustworthiness. (Danielson, 2006c) 2: The quality of
A systematic process model to solve problems and to being believable or trustworthy. (Wong, 2005)
harness creativity. Its six steps include objective-inding,
data-inding, problem-inding, idea-inding, solution- Credit
inding, and acceptance-inding. Each step has a divergent Delivery of a value in exchange of a promise that this
and convergent phase. During the divergent phase, a free value will be paid back in the future. (de Carvalho et al.,
low of ideas is elicited. Convergent phases involve the 2005)
evaluation and selection of the ideas with the greatest
potential or relevancy. The defer-judgment rule separates Credit Scoring
idea generation from idea evaluation. (Torres-Coronas & A numerical method of determining an applicants loan
Gasc-Hernndez, 2005) suitability based on various credit factors, such as types
of established credit, credit ratings, residential and
Creative Worklow occupational stability, and ability to pay back loan. (de
Workf low that is more discovery-oriented, hence Carvalho et al., 2005)
more volatile and browse intensive. This worklow is
characterized by the need to do many interactive searches CRISP-DM: See Cross-Industry Standard Process for
Data Mining.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
142 Crit e ria Crit ic a l Re a lism

Criteria Critical Mass


Each goal within the alternative assessment that ties into 1: A point at which a suficient number of individuals have
C the instructional objectives of the lesson, unit, or course. adopted an interactive communication technology to cause
(B.L. MacGregor, 2005) a rapid acceleration in its diffusion. (Chen & Lou, 2005)
2: A subset of the collective that makes the majority of the
Criterion contributions to the production and maintenance of the
The expressed characteristics of an interactive system. public good. (Wasko & Teigland, 2006b) 3: A generative
The criterion must be valuable, and it denies or supports metaphor derived from the natural sciences (in particular
options. (Lacaze et al., 2006) nuclear physics) that describes a situation in which a chain
reaction is self-sustaining. This metaphor acts as an aide,
Criterion Path rather than a proximal cause, to assist the identiication
1: A representation of an ideal path to go through a of contributing factors in humanities-based case studies.
speciic learning environment. It speciies for each possible (Gibbs et al., 2005) 4: The minimal number of adopters of
step in the program what the most ideal subsequent steps an interactive innovation for the ongoing rate of adoption
are. (Clarebout et al., 2005b) 2: A representation of an to be self-sustaining. (Gibbs et al., 2005)
ideal path to go through a speciic learning environment.
It speciies for each possible step in the program the most Critical Pedagogy
ideal subsequent steps. (Clarebout et al., 2005a) Focuses on political and economic issues of schooling
such as the representation of texts and construction of
Critical Business Process subjective states of mind in the student; when applied
An operation, or group of operations, within an organization to media education, it begins with an assessment of
that is key to its effectiveness. (Drake, 2006) contemporary culture and the function of media within
it. (Berg, 2005a)
Critical Digital-Mass Index
Measures the extent to which digital platforms (digital TV, Critical Realism
PC, Internet access, and mobile phones) are present in a 1: Asserts that the study of the social world should be
given territory. It is created for a territory by adding together concerned with the identiication of the structures and
the digital TV penetration, mobile phone penetration, and mechanisms through which events and discourses are
PC Internet penetration. (Pagani, 2005b) generated. (Carlsson, 2005) 2: One branch of social
science that developed in the 1970s and which poses
Critical Failure Factor (CFF) fertile intellectual challenges to current understanding of
The limited number of areas which, without careful communities, organizations, and other social structures.
monitoring of these areas, may lead to a failure of a system. It argues that without the concept of a social structure,
(Peterson & Kim, 2005) we cannot make sense of persons as any predicate which
applies to individuals, apart from a direct physical
Critical Incident description, and presupposes a social structure behind it.
1: An observed or experienced episode in which things Though we need the notion of a social structure, the only
go surprisingly well or badly. (Carroll et al., 2005) 2: way to acknowledge it is through the social practices that
Signiicant positive or negative incidents that can be used it incarnates and reiies, which in turn are embedded in the
to evaluate behavioral data and system performance. actions of its members. A social structure is not visible or
(Neale et al., 2005) witnessable, only its social practices are. Though implicit
and invisible, structures are enabling or constraining, as
Critical Knowledge Area they open up or else severely restrict the actions of its
A speciic body of knowledge, or key resource-capability, members. However, structures are not simply a medium
that is unique to a irm and resides at the core of the for social practices, as these practices also change and
business mission and value proposition to its customers. inluence the structures themselves. This implies that
(Cepeda-Carrin, 2006) structures are both a medium and a product of its practices.
Social structures are reproduced and transformed by

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Critical Relection Cross-Border Linkage 143

the practices of its members. Thus individuals have an Critical Success Factor (CSF)
agency capacity to interfere back, and thus promote 1: One of several factors that indicate the few key areas of
social changenot isolated individuals, however, but activity in which favorable results are absolutely necessary
C
units and collectivities of individuals. Individuals are for the manager to succeed. (Colmenares & Otieno, 2005)
persons, and their acts are situated in a world constituted 2: A methodology for managing projects and irms that
by past and present human activity, thus a humanized concentrates on the areas where things must go right if the
natural and social world. Because social structures are endeavor is to lourish. (Adam & Pomerol, 2005) 3: One
incarnate in the practices of its members, this means that of a limited number of areas in which results, if they are
they do not exist independently of the conceptions of the satisfactory, will ensure successful competitive performance
persons whose activities constitute, and thus reproduce or for the organization. (Peterson & Kim, 2005)
transform them. It is because persons have beliefs, interests,
goals, and practical and tacit knowledge, not necessarily Critical Theory
cognitively available, acquired in their early stages as The branch of social theory, grounded on Kant and pursued
members of a society, that they do what they do and thus by the Frankfurt School. The best known contemporary
sustain, or transform, the structures to which they belong. critical theorist is Jurgen Habermas (1929- ). (Clarke,
Critical realism thus proposes a transformational model 2006)
of social activity. It states that reality exists independently
of our knowledge about it, and it takes science as a social Critical Thinking
practice, and scientiic knowledge as a social product. 1: Encompasses the belief that the function of the researcher
Communities of practice theory implicitly incorporates a is to provide warnings about the fallibility of current
critical realism perspective. (Nobre, 2006a) 3: The careful orthodoxies by pointing to the power and politics implicit
or critical application of the scientiic approach to the social in the process of knowledge creation and utilization.
sciences. (Dobson, 2005) (Land, Nolas, et al., 2006) 2: In academic contexts, this
phrase usually refers to complex intellectual reasoning
Critical Relection that questions assumptions, and seeks to assess evidence
Questioning of moral, ethical, and equity issues that and examine claims made by others. More simply, it can
relate directly or indirectly to institutional and broader also refer to logical thinking based on facts and evidence.
social and political contexts of schooling, and relection (Kukulska-Hulme, 2005)
oriented toward development of emancipatory strategies
to resolve inequities identiied; stems from a belief system Critical Value Activity
that education can serve as an agent for social change, One of several value activities that an organization must
and teachers are professionals constantly engaged in the execute satisfactorily to ensure successful performance.
evaluation and resolution of a large number of competing (Jeffcoate, 2005)
variables using poorly understood processes (not a set
of speciic, identiiable technical skills). (Wieseman, CRM: See Customer Relationship Management.
2005b)
CROP: See Council of Regional Organizations in the
Critical Research Paciic.
Critique of the status quo through the exposure of what
are believed to be deep-seated, structural contradictions Cross and Edge Points
within social systems. (Trauth, 2005b) A cross point is an image pixel in the thinned image having
at least three eight-neighbors, while an edge point has just
Critical Stance one eight-neighbor in the thinned image. (Chakravarty et
Any approach to an accepted system that intentionally al., 2005a)
highlights issues of power structures supported by it, often
emancipatory in nature and always political. (Kettley, Cross-Border Linkage
2006b) An active connection, relation, or association between two
or more institutions separated by a geographic distance
or boundary. (Poda & Brescia, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
144 Cross-Classiication of Maps Cryptographic Data-Mining Techniques

Cross-Classiication of Maps Cross-Industry Standard Process for Data Mining


A method that overlays two thematic maps of binary (CRISP-DM)
C attributes to come up with an output theme containing 1: An industry and tool-neutral data-mining process model
attributes of both the themes. (Ali et al., 2005) developed by members from diverse industry sectors
and research institutes. (Nemati & Barko, 2005) 2: An
Cross-Correlation initiative for standardizing the knowledge-discovery and
The sum of the chip-by-chip products of two different data-mining process. (Swierzowicz, 2005)
sequences (codes). A measure of the similarity and
interference between the sequences (or their delayed Cross-Media Adaptation
replicas). Orthogonal codes have zero cross-correlation Conversion of one multimedia format into another one,
when synchronized. (Iossiides et al., 2005) for example, video to image or image to text. (Knight &
Angelides, 2005)
Cross-Cultural
A situation where individuals from different cultures Cross-Site Scripting (XSS)
interact with or exchange information with one another; An application to trick users into thinking they are dealing
interchangeable with the term intercultural. (St.Amant, with a normal Internet situation, but the real purpose is to
2005c) gather data from them. (Friedman, 2005)

Cross-Cultural Environment Cross-Validation


The coexistence of more than one cultural inluence Resampling method in which elements of the modeling set
in different segments of a society, or the simultaneous itself are alternately removed and reinserted for validation
adoption of different cultural practices at work, social purposes. (Galvo et al., 2005)
events, and family life. (Law, 2005)
Crossover
Cross-Cultural IT Management In genetic algorithms, it is the process of combining
Managing the IT function and its personnel in a globally features of a chromosome with other chromosome(s).
distributed setting. (Trauth, 2005a) (Guan, 2005e)

Cross-Culture Communication Crossover with Non-Internet Media


A process of communicating among different cultures. Target audiences needs could be met by combining the
(Targowski & Metwalli, 2005) interactive tools available online with some of the targeted
off-line information delivery vectors, such as telephone
Cross-Disciplinary conferencing, videoconferencing, direct mail, and other
The merging of disciplines in an effort to discover emergent media. (Kardaras & Karakostas, 2006)
and interconnected processes, models, and frameworks.
Similar terms are multidisciplinary, interdisciplinary, and Crossposting
transdisciplinary, each with slightly different connotations. Posting the same message on multiple threads of discussion,
(Schaffer & Schmidt, 2006) without taking into account the relevance of the message
or every discussion thread. (Gur u, 2006a)
Cross-Disciplinary Knowledge
The degree to which team members from different Crosstalk
disciplines learn and share knowledge as a result of Interference present in a signal propagating through a
working together on a project. Ideally, team members communication produced by other signals present at an
evolve from a discipline-centric view of working to a adjacent channel. (Perez-Meana & Nakano-Miyatake, 2005)
cross-disciplinary view, in which team members use
models and terminology from other disciplines. (Schaffer Cryptographic Data-Mining Techniques
& Schmidt, 2006) Methods that encrypt individual data before running data-
mining algorithms so that the inal result is also available
in an encrypted form. (Jha & Sural, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cr ypt ogra phy Cult ura l Cognit ion T he or y 145

Cryptography Cube
1: A study of making a message secure through encryption. 1: A collection of data aggregated at all possible levels
Secret key and public key are the two major camps of over the dimensions. (Deshpande & Ramasamy, 2005)
C
cryptographic algorithms. In secret key cryptography, 2: A data structure of aggregated values summarized for
one key is used for both encryption and decryption; in a combination of preselected categorical variables (e.g.,
public key cryptography, two keys (public and private) number of items sold and their total cost for each time
are used. (K. Chen, 2005) 2: Protecting information by period, region, and product). This structure is required
transforming it into an unreadable format using a number for high-speed analysis of the summaries done in online
of different mathematical algorithms or techniques. analytical processing (OLAP). Also called a Multi-
(Tassabehji, 2005a) 3: The art of protecting information Dimensional Database (MDDB). (Nigro & Gonzlez
by encrypting it into an unreadable format, called cipher Csaro, 2005b) 3: A group of data cells arranged by the
text. Only those who possess a secret key can decipher dimensions of the data. Assigning a value to each dimension
(or decrypt) the message into plain text. (Guan, 2005a) 4: of a cube, the measure is obtained by a mapping from this
The conversion of data into secret codes for transmission assignment. (Pourabbas, 2005b) 4: A multi-dimensional
over a public network to prevent unauthorized use. (Wang, representation of data that can be viewed from different
Cheng, & Cheng, 2006) perspectives. (Bellatreche & Mohania, 2005)

CS: See Computer Science. Cube Cell


Represents an association of a measure m with a member
CSC: See Computer Support Committee. of every dimension. (Abdulghani, 2005a)

CSCL: See Computer-Supported Collaborative Cubegrade


Learning. A 5-tuple (source, target, measures, value, delta-value)
where source and target are cells; measures is the set of
CSCW: See Computer-Supported Collaborative/ measures that are evaluated both in the source as well as
Cooperative Work; Computer-Supported Cooperative in the target; value is a function, value: measuresR,
Work. that evaluates measure mmeasures in the source; and
delta-value is a function, delta-value: measuresR, that
CSF: See Critical Success Factor. computes the ratio of the value of mmeasures in the
target versus the source (Abdulghani, 2005b)
CSG: See Constructive Solid Geometry.
Cuboid
CSLC: See Customer Services Life Cycle. A group-by of a subset of dimensions, obtained by
aggregating all tuples on these dimensions. (Abdulghani,
CSMA: See Carrier-Sense Multiple Access. 2005a)

CSS: See Content Scrambling System. Cue


A clue to a psychological phenomenon, often nonverbal.
CT: See Category Theory; Computed Tomography; (N.C. Rowe, 2006b)
Contingency Theory; Collaborative Technology.
Cultural Algorithm
CTR: See Click-Through Rate. Another kind of evolutionary algorithm that adds a belief
space to the usual population space from the genetic
CTSD: See Contingency T heoretic Soft ware algorithms in order to improve the search. It is inspired from
Development. human societies and cultural evolution. (Lazar, 2005)

C2A: See Consumer-to-Administration. Cultural Cognition Theory


A theory that frames the concept that culture profoundly
C2C: See Consumer-to-Consumer. influences the contents of thought through shared

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
146 Cult ura l Func t ion of a Te le c e nt e r Curre nt Cost

knowledge structures and ultimately impacts the design (Cagiltay et al., 2005) 8: Integrated system of spiritual,
and development of interactive systems, whether software material, intellectual, and emotional features of society
C or Web sites. (Faiola, 2006) or a social group that encompasses, among other things,
art and literature, lifestyles, ways of living together, value
Cultural Function of a Telecenter systems, traditions and beliefs, and artifacts. (M. Mitchell,
Set of processes that a telecenter as an open social system 2005a) 9: Multiple deinitions exist, including essentialist
carries out to strengthen grassroot values and identity. ICT models that focus on shared patterns of learned values,
should facilitate multi-culturalism instead of pursuing the beliefs, and behaviors, and social constructivist views
standardization of society. (Santos, 2005) that emphasize culture as a shared system of problem
solving or of making collective meaning. The key to the
Cultural Metadata understanding of online cultureswhere communication
Metadata obtained from the analysis of corpora of textual is as yet dominated by textmay be deinitions of culture
information, usually from the Internet or other public that emphasize the intimate and reciprocal relationship
sources (radio programs, encyclopedias, etc.). (Pachet, between culture and language. (Macfadyen, 2006b) 10: The
2006) collective programming of the mind, which distinguishes
the members of one group or category of people from
Cultural Readiness another. (Limayem, 2005) 11: The ideals, values, symbols,
The preparedness of an organizations culture of its people and behaviors of human societies that create a distinctive
and processes (past and present) to facilitate or inhibit identiication. (Sharma & Mishra, 2005)
change. (Ash & Burn, 2006)
Culture Gap
Culturally Appropriate Content A gap of misunderstanding in the sense of two different
Information, documents, and programs delivered to users organizational cultures that coexist in most organizations.
via the Internet, broadcasting, or CD-ROM which express The two cultures under discussion in the IT context are
and respect the users culture and interests. (Dyson, the culture of the IT profession and the culture of the rest
2005) of the organization. (Leonard, 2005)

Culture Culture-Oriented Design


1: A set of multi-layered characteristics, beliefs, and values Speciic kind of user-oriented design that focuses on the
shared by a group of people that are consistently held user as a central element of development and also takes
over time. (Petter et al., 2005) 2: A societal manifestation into account the cultural diversity of different target user
inluenced by traditions, religion, history, acceptable groups. (Rse, 2006b)
behavior, and many other factors. (Mandal et al., 2005)
3: A value-guided, continuous process of developing Cumulative Annual Growth Rate (CAGR)
patterned human behavior within and across cultures The percent of growth from one annual period to the next.
and civilizations. (Targowski & Metwalli, 2005) 4: (Nugent, 2005)
Common meaning and values of a group. Members of
such a group share and use the accorded signs and roles Cumulative Proportion Surviving
as a basis for communication, behavior, and technology The cumulative proportion of cases surviving up to the
usage. Mostly, a country is used as a compromise to refer respective interval. Because the probabilities of survival
or deine rules and values, and is used often as a synonym are assumed to be independent across the intervals, this
for users culture. (Rse, 2006b) 5: Covers the pattern of probability is computed by multiplying out the probabilities
basic assumptions accepted and used about behaviors, of survival across all previous intervals. The resulting
norms, and values within an organization. (Disterer, function is also called the survivorship or survival function.
2005) 6: Expresses shared beliefs and ritualized habits Chen, Oppenheim, et al., 2005)
of social agents toward each other and their environment
via artifacts and language. (Champion, 2006b) 7: The Current Cost
background set of assumptions and values that structure The cost of the network investment over time, considering
our existence and orient us through the events of our lives. issues like amortization. (Hackbarth et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Curre nt Doc um e nt Ve rsion Cust om e r K now le dge M a na ge m e nt 147

Current Document Version Customer


The most recent version of a temporal document. Note Refers to the entity that procures goods and services.
that a deleted document has no current version. (Nrvg, (Barima, 2006a)
C
2005)
Customer Attraction
Current Eficiency The ability to attract customers at the Web site. (Forgionne
The percentage of the electrical current (drawn into the & Ingsriswang, 2005)
reduction cell) that is utilized in the conversion of raw
materials (essentially alumina and aluminum luoride) into Customer/Client Touchpoints Value Chain
the end product, aluminum. The remaining percentage is A value chain that an organization establishes to meet its
lost due to complex reactions in the production process and clients/customers in order to provide services or obtain
the physical nature of reduction cells. (Nicholls, 2006) feedback and allow them to share their experiences.
(Chuang, 2006)
Curriculum
1: A comprehensive overview of what students should Customer Confusion
learn, how they will learn it, what role the instructor is The difficulties and uncertainties encountered by
playing, and the framework in which learning and teaching customers when they have to make an optimal choice out
will take place. (Partow-Navid & Slusky, 2005) 2: The a product assortment with large product variety. (Blecker
content, structure, and format of an educational course & Abdelkai, 2006)
or program. (Kung-Ming, 2005)
Customer Conversion Rate (CCR)
Curse of Dimensionality The percentage of Web site visitors who engage in an
1: Phenomenon that refers to the fact that, in high- ultimate target action such as making a purchase. (Owen,
dimensional spaces, data become extremely sparse and 2006a)
are far apart from each other. As a result, the sample size
required to perform an accurate prediction in problems Customer Data Integration (CDI)
with high dimensionality is usually beyond feasibility. The people, processes, and technologies required to create
(Domeniconi & Gunopulos, 2005) 2: The problems and maintain a unique, complete, and accurate customer
associated with information overload, when the number proile and make it available to all operational systems.
of dimensions is too high to visualize. (Viktor & Paquet, (Van Dyke et al., 2006)
2005) 3: The sharp dependency on the space dimension
experimented by any search algorithm on vector or metric Customer Experience
spaces. (Chvez & Navarro, 2005) 4: This expression is The target customers overall outcome, which includes both
due to Bellman; in statistics, it relates to the fact that the results and image factors, after using a product or visiting
convergence of any estimator to the true value of a smooth a retail store or a Web site. (Roberts & Schwaab, 2006)
function deined on a space of high dimension is very
slow. It has been used in various scenarios to refer to the Customer Knowledge
fact that the complexity of learning grows signiicantly Knowledge derived through relationships from consumers,
with the dimensions. (Ma & Li, 2005) 5: The original suppliers, partners, joint ventures and alliances, and
term refers to the exponential growth of hyper-volume as competitors. It is knowledge located externally to the
a function of dimensionality. In information retrieval, it irm and is not owned by the organization. It can be
refers to the phenomenon that the performance of an index composed of a combination of consumer knowledge,
structure for nearest-neighbor search and e-range search supply chain knowledge, joint venture speciic knowledge,
deteriorates rapidly due to the growth of hyper-volume. and so forth. This knowledge is created within a two-way
(X. Wang, 2005) low of knowledge which creates value for both parties.
(Paquette, 2006b)
Curse of Dimensionality Effect
When the number of samples needed to estimate a function Customer Knowledge Management
(or model) grows exponentially with the dimensionality The collective processes that a irm employs to manage
of the data. (Viswanath et al., 2005) the identiication, acquisition, and internal utilization of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
148 Cust om e r Life t im e Va lue (CLV ) Cust om e r Re t e nt ion

customer knowledge. It is within these processes that an 3: Methodologies, softwares, and capabilities that help an
organization and its customers work together to combine enterprise manage customer relationships in an organized
C existing knowledge to create new knowledge. It differs way. (Morabito & Provera, 2005) 4: Refers to retaining
from managing internal knowledge as it must facilitate and using information about customers in databases to
the low of knowledge across an external boundary. develop customer loyalty and increase sales. (Bridges et
(Paquette, 2006b) al., 2006) 5: Systems with technological tools related to
the implementation of relationship marketing strategies.
Customer Lifetime Value (CLV) (Flavin & Guinalu, 2006) 6: The methodologies,
Consists of taking into account the total financial software, and Internet capabilities that help a company
contribution (i.e., revenues minus costs) of a customer manage customer relationships in an eficient and organized
over his or her entire life of a business relationship with manner. (Nemati & Barko, 2005) 7: The technology,
the company. (Gur u, 2005) services, and processes that connect an organization with its
customers in the most reliable, eficient, and cost-effective
Customer Loyalty manner while striving to create long-term, proitable
1: Because there is no existing ownership to service relationships. (Van Dyke et al., 2006) 8: The process of
products, suppliers have to make a special effort to get attracting, retaining, and capitalizing on customers. CRM
long-standing customers. (Seitz, 2005) 2: The ability deines the space where the company interacts with the
to develop and maintain long-term relationships with customers. At the heart of CRM lies the objective to deliver
customers by creating superior customer value and a consistently differentiated and personalized customer
satisfaction. (Forgionne & Ingsriswang, 2005) experience, regardless of the interaction channel. (Pagani,
2005b) 9: A term describing how a company interacts with
Customer Loyalty Plan its customers, gathers information about them (needs,
A strategy for improving inancial performance through preferences, past transactions), and shares these data
activities that increase stickiness. (Forgionne & within marketing, sales, and service functions. (Burke et
Ingsriswang, 2005) al., 2005) 10: Management, understanding, and control of
data on the customers of a company for the purposes of
Customer Management Software enhancing business and minimizing the customers churn.
Software application that allows a company to interact with (Meo & Psaila, 2005) 11: An approach that manages in
multiple customer segments and to send them personalized an integrated manner all business processes that directly
offers. (Gur u, 2006b) involve customers, in an effort to build long-term and
sustainable relationships with customers. A CRM system
Customer Premise Equipment (CPE) is a central repository of customer information that records
End-user equipment. (Nugent, 2005) information from all contact points with customers, and
generates customer proiles available to everyone who
Customer Proiling wishes to know the customer. (Tarafdar, 2005) 12: An
1: Selecting customers you want to ind, going after them, approach that recognizes that customers are the core of
and keeping them. (Borders & Johnston, 2005) 2: Usage of the business and that a companys success depends on
the Web site to get information about the speciic interests effectively managing its relationship with them. CRM
and characteristics of a customer. (Seitz, 2005) is about locating and attracting customers, and thereby
building long-term and sustainable relationships with
Customer Relationship Management (CRM) them. (Y.D. Wang, 2005) 13: An enterprise-wide strategy
1: A core business strategy that promotes interactions, and enabling organizations to optimize customer satisfaction,
creates and delivers value to targeted customers to improve revenue, and proits, while increasing shareholder value
customer satisfaction and customer retention at a proit. through better understanding of customers needs.
It is grounded in high-quality customer data and enabled (Rahman, 2005e)
by information technology. (Dholakia et al., 2005a) 2:
Application system that allows a company to manage its Customer Retention
relationship with a customer, including sales, marketing, The ability to retain customers and their allegiance to the
customer service, and support. (Feuerlicht & Vorisek, 2006) Web site. (Forgionne & Ingsriswang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cust om e r Sat isfa c t ion Cut -Point 149

Customer Satisfaction Customerization


1: Based on the consumption, a consumer would be satisied The personalization of a Web site. (Samuel & Samson,
if perceptions match expectations or if conirmations 2006)
C
are reached. (Hsu & Kulviwat, 2006) 2: Measure or
determination that a product/service meets a customers Customization
expectations, considering requirements of both quality 1: Fundamental characteristic of a Web site regarding
and service. (Markellou et al., 2006) personalization of information or tailoring special
requirements from a speciic user. (Almazn & Gil-Garca,
Customer Services Life Cycle (CSLC) 2006) 2: Customizable applications are those applications
1: A framework that describes the stages (requirements, that can adapt themselves to the context in which they
acquisition, ownership, and retirement) that a customer execute; applications (in particular, Web applications)
goes through when purchasing and using a product can be adapted to the user proile, the location, the
or service. (Porter, 2006) 2: Serving customers based network connection, and so forth. Building applications
on a process of four stages: requirements, acquisition, that can adapt themselves to the current context involve
ownership, and retirement. Many companies are using the many different software and information representation
approach to harness the Internet to serve the customers. problems. In the context of Web applications, we can
(Chen, Zhang, et al., 2005a) adapt the application behavior to the user proile, we can
change the hypermedia topology for different users tasks,
Customer-Based/Customized Products or we can adapt the user interface for different appliances.
A virtual organization provides the unique opportunity to (Rossi & Schwabe, 2005) 3: The adjustment of products
provide their customers with highly specialized products as or services to individual needs. Basic characteristics
per their speciic needs. This can be accomplished through are implemented in the product or service and may be
outsourcing work to a separate organization or through controlled by parameters. (Seitz, 2005)
the use of a virtually connected interorganizational node
located closer to the customer. Either way, it becomes Customized Protocol
simple to add a function based on the customers request A speciic set of treatment parameters and their values
and seamlessly integrate that function into the existing that are unique for each individual. Customized protocols
framework. (J. Lee, 2005) are derived from discovered knowledge patterns. (Kusiak
& Shah, 2005)
Customer-Centric Approach
Organizational strategy that aims to explore and understand Customization and Mass Customization
customers needs and motivations, and to restructure all Customization is consumer-centric strategy that produces
organizational processes to provide superior value to goods and services to meet an individuals needs and
consumers. (Gur u, 2006b) preferences. Customization in general induces higher
costs than mass production does. Mass customization
Customer-Centric Value Chain means customized production with the cost of mass
The seller tailors its products to meet fast-changing production. Virtual community fosters mass customization
consumer needs. (Jeffcoate, 2005) in that it helps identify needs and preferences of a group
of consumers through interactive discussion without
Customer-Supplier Perspective increasing cost. (Wang, Wei, et al., 2006)
Refers to the linked interrelation between the requirements
(needs, wants, etc.) of the customer to the provision of these Cutoff Frequencies
by the supplier to their mutual beneit. (Barima, 2006a) The frequencies that determine the pass-band (the
frequencies that are passed without attenuation) and the
Customer-to-Customer (C2C) stop-band (the frequencies that are highly attenuated).
In this method, participants bid for products and services (Jovanovic-Dolecek, 2005c)
over the Internet, such as in an online auction. See
Consumer-to-Consumer. (Shih & Fang, 2006) Cut-Point
A value that divides an attribute into intervals. A cut-point
has to be included in the range of the continuous attribute

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
150 CV Cybe rspa c e

to discretize. A discretization process can produce none or Cyberculture


several cut-points. Also called a split-point. (Muhlenbach As a social space in which human beings interact and
C & Rakotomalala, 2005) communicate, cyberspace can be assumed to possess
an evolving culture or set of cultures (cybercultures)
CV: See Computer Vision. that may encompass beliefs, practices, attitudes, modes
of thought, behaviors, and values. (Macfadyen & Doff,
CVA: See Continuous Value Assumption. 2006)

CVE: See Common Vulnerabilities and Exposures. Cyberlanguage


The collection of communicative practices employed by
CWA: See Closed-World Assumption. communicators in cyberspace, and guided by norms of
cyberculture(s). (Macfadyen & Doff, 2006)
Cyber Elite
A section of the population who has the disposable Cyberloaing
income, knowledge, and language for exploiting the many Any voluntary act of employees using their organizations
possibilities presented by ICTs. (Mwesige, 2005) Internet access during ofice hours to surf non-work-related
Web sites for non-work purposes and to access non-work-
Cyber Ethics related e-mail. (Mahatanankoon, 2005)
A branch of ethics that focuses on behaviors that are
speciically related to information technology. (Artz, Cybermediary
2005a) An online company specializing in electronic transactions
and digital intermediation. (Scarso et al., 2006)
Cyber Gambling
Gambling that takes place using an interactive technology Cybersex
such as the Internet or digital television. (Brindley, 1: The act of computer-mediated sex either in an online
2006) or virtual environment. Examples include two consenting
adults engaging in an e-mail or real-time chat sex session.
Cyber Security The advantages to this are that two people who are at
Techniques used to protect the computer and networks opposite ends of the globe can maintain a relationship.
from threats. (Thuraisingham, 2005) (Grifiths, 2005) 2: Two or more individuals using the
Internet as a medium to engage in discourses about sexual
Cyber-Identity Theft fantasies. (Whitty, 2005)
The online or electronic acquisition of personal information
with the purpose of utilizing such information for deceitful Cyberslacking
activity either on the Internet or off-line. (Close et al., The process of using the Internet to waste time during a
2006) workday, similar to how an employee might spend time
in a colleagues ofice or on the telephone. (Urbaczewski,
Cyber-Societies 2005)
The set of natural, artiicial, and virtual agents connected
and interacting with each others through natural and Cyberspace
artificial infrastructures within virtual institutions. 1: The term used to describe the range of information
(Falcone & Castelfranchi, 2005) resources available through computer networks. (Stodel
et al., 2005) 2: The boundaryless virtual world accessed
Cybercaf through computer networks, whether ones access device
A caf that makes available a number of personal computers is ixed or mobile. (Galloway, 2006) 3: The default or
that are connected to the Internet for the use of the general mandatory space in which the members of a virtual
public. (Ajiferuke & Olatokun, 2005) community interact. (Signoret, 2006) 4: While the
Internet refers more explicitly to the technological
infrastructure of networked computers that make

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cybe rw orld Cyclom at ic Com plex it y 151

worldwide digital communications possible, cyberspace


is understood as the virtual places in which human beings
can communicate with each other and that are made possible
C
by Internet technologies. (Macfadyen, 2006b)

Cyberworld
An information world created in cyberspace either
intentionally or spontaneously, with or without visual
design. Cyberworlds are closely related to the real world
and have a serious impact on it. (Sourin, 2006)

Cyborg
Literally, a hybrid of cybernetics and organism. Generally
it refers to humans as modiied by technoscientiic implants
and drugs. (Srinivasan, 2006)

Cycle
The time period required for each student to enter and
complete all courses required for an academic degree; for
example, MBA. (Murray & Efendioglu, 2005)

Cyclic Graph
A directed graph that contains at least one cycle. (Y.
Chen, 2005a)

Cyclic Redundancy Check (CRC)


Block codes used for error detection. (Iossiides et al.,
2005)

Cyclical Process
An event or operation within a project that can occur and
lead project teams back to areas that resemble the starting
point of the project. (Nash et al., 2005b)

Cyclomatic Complexity
A broad measure of soundness and conidence for a
program. This measure was introduced by Thomas McCabe
in 1976. (Polgar, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
152 DAC Dat a

D
DAC: See Discretionary Access Control. Spatial data represent tangible features (entities). Moreover,
spatial data are usually an attribute (descriptor) of the spatial
DAG: See Directed Acyclic Graph. feature. (Al-Hanbali & Sadoun, 2006) 2: A set of discrete
and objective facts concerning events. (Joia, 2005) 3:
DAI: See Digital Access Index; Distributed Artiicial Binary (digital) representations of atomic facts, especially
Intelligence. from inancial transactions. Data may also be text, graphics,
bit-mapped images, sound, or analog or digital live-video
DAISY: See Digital Accessible Information System. segments. Structured data are the raw material for analysis
using a data-driven DSS. The data are supplied by data
DAM: See Digital Asset Management. producers and are used by information consumers to create
information. (Power, 2005) 4: Combination of facts and
DAML: See DARPA Agent Markup Language. meanings that are processed into information. (Yoon et al.,
2005) 5: Data are carriers of knowledge and information.
Dark Fiber They consist mostly of signs and are the raw material
Optical iber for infrastructure (cabling and repeaters) to be further processed. Data represent observations or
that is currently in place but is not being used. Optical facts out of context that are not directly meaningful. Both
iber conveys information in the form of light pulses, so information and knowledge are communicated through
dark means no light pulses are being sent. (Chochliouros data. (Haghirian, 2006) 6: Highly explicit knowledge
et al., 2005a) derived from the data in databases and data warehouses
used for strategic decision making after summarizing,
DARM: See Distributed Association Rule Mining. analyzing, mining, and so forth. (Kulkarni & Freeze,
2006) 7: Something given or admitted as a fact on which
DARPA Agent Markup Language (DAML) an inference may be based. Simple observations of the
An extension of XML and the Resource Description world, which are often quantiied, and easily structured,
Framework (RDF) providing constructs with which to captured on machines, and transferred. The number of
create ontologies and to mark up information so that it is baby boomers born in a given year is data. (Mockler &
machine readable and understandable. (Jain & Ramesh, Dologite, 2005) 8: The generic term for signs, symbols,
2006) and pictures. Data can be saved, processed, printed, and
so on. They are not bound to individuals. (Hofer, 2006)
DARS: See Degree Audit Reporting System. 9: The raw material that feeds the process of information
generation. (Hoxmeier, 2005) 10: The set of samples, facts,
Dashboard or cases in a data repository. As an example of a sample,
Specific display of information that presents key consider the ield values of a particular credit application
information about a process or device. A dashboard may in a bank database. (de Carvalho et al., 2005) 11: Often
or may not be computerized. (Adam & Pomerol, 2005) deined as the raw facts and information data. Knowledge
is about the application of data and information for a given
Data task so that the given task can be effectively performed.
1: A collection of attributes (numeric, alphanumeric, (R. Zhang, 2005)
igures, pictures) about entities (things, events, activities).

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Ac c ount a bilit y Dat a Consist e ncy 153

Data Accountability this proile is then auctioned off to the highest bidder(s).
The ability to trace back all the actions and changes made (St.Amant, 2006b)
to information. (Wang, Cheng, & Cheng, 2006)
D
Data Availability
Data Accuracy The ability to ensure the readiness of the information when
An aspect of numerical () data quality: a standard needed. (Wang, Cheng, & Cheng, 2006)
statistical error between a real parameter value and the
corresponding value given by the data. Data accuracy is Data Center
inversely proportional to this error. (Kulikowski, 2005) A centralized repository for the storage and management
of information, organized for a particular area or body of
Data Actuality knowledge. (Ashrai et al., 2005)
An aspect of () data quality consisting in its steadiness
despite the natural process of data obsolescence increasing Data Checking
in time. (Kulikowski, 2005) Activity through which the correctness conditions of the
data are veriied. It also includes the speciication of the
Data Aggregation type of the error or condition not met, and the qualiication
The process in which information is gathered and expressed of the data and its division into the error-free and erroneous
in a summary form. In case the aggregation operator data. Data checking may be aimed at detecting error-
is decomposable, partial aggregation schemes may be free data or at detecting erroneous data. (Conversano &
employed in which intermediate results are produced that Siciliano, 2005)
contain suficient information to compute the inal results.
If the aggregation operator is non-decomposable, then Data Cleaning (Cleansing)
partial aggregation schemes can still be useful to provide 1: The act of detecting and removing errors and
approximate summaries. (Roussos & Zoumboulakis, inconsistencies in data to improve its quality. (Tzanis et al.,
2005) 2005) 2: The methodology of identifying duplicates in a
single ile or across a set of iles by using a name, address,
Data Allocation and other information. (Winkler, 2005) 3: The elimination
The process of determining what data to store at which of anomalies or outright mistakes in data that will otherwise
servers in a distributed system. (Chin, 2005) impede with its intended usage. These include the discovery
and elimination of duplicates, homonyms, fake entries
Data and Model Assembly such as 999-99-9999 in a social security ield, correcting
A set of query functions that assemble the data and data names and addresses, and so on. (Malik, 2006)
visualization instruments for data mining. (S. Wang &
H. Wang, 2005) Data Cloud
Collection of data points in space. (Cottingham, 2005)
Data Architecture
The underlying set of rules and descriptions of relationships Data Completeness
that govern how the major kinds of data support the Containing by a composite data all components necessary
business processes deined in the business architecture. to full description of the states of a considered object or
(Yoon et al., 2005) process. (Kulikowski, 2005)

Data Assimilation Data Conidentiality


Statistical and other automated methods for parameter The ability to ensure the data is inaccessible to unauthorized
estimation, followed by prediction and tracking. (Ganguly users. (Wang, Cheng, & Cheng, 2006)
et al., 2005)
Data Consistency
Data Auctioning When the application state stored in the database remains
Process in which an individual uses data provided by consistent after a transaction commits. (Zhao et al.,
multiple sources to create a proile of particular individuals; 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
154 Dat a Cont e nt Dat a Excha nge

Data Content Data Deinition


The attributes (states, properties, etc.) of a real or of an An elaborate statement of the representation of each piece
D assumed abstract world to which the given data record is of data, its source, storage method, and intended usage.
referred. (Kulikowski, 2005) (Law, 2005)

Data Conversion Data Deinition Language (DDL)


A process involving moving existing data from legacy A language used by a database management system which
systems, performing an integrity check, and then allows users to deine the database, specifying data types,
transporting them to an ERP system that has been structures, and constraints on the data. (Ramasamy &
implemented. There are diverse tools available to reduce Deshpande, 2005)
the effort of the conversion process. In some instances,
there is the need to introduce manually the data into the Data Dependency
system. Due to this effort, the conversion process must One of the various ways that data attributes are related, for
be planned at the beginning of the ERP project in order example, functional dependency, inclusion dependency,
to avoid delays. (Esteves & Pastor, 2005) and so forth. (Tan & Zhao, 2005b)

Data Credibility Data Dictionary


An aspect of () data quality: a level of certitude that the A part of a database that holds deinitions of data
() data content corresponds to a real object or has been elements, such as tables, columns, and views. (Sethi &
obtained using a proper acquisition method. (Kulikowski, Sethi, 2006b)
2005)
Data Dissemination/Broadcasting
Data Cube Periodical broadcast of database information to mobile
1: A collection of aggregate values classiied according to clients through one or more wireless channels. (Waluyo
several properties of interest (dimensions). Combinations et al., 2005)
of dimension values are used to identify the single
aggregate values in the cube. (Tininini, 2005c) 2: A Data Driven
data cube is a type of multi-dimensional matrix that lets If the data drive the analysis without any prior expectations,
users explore and analyze a collection of data from many the mining process is referred to as a data-driven approach.
different perspectives, usually considering three factors (Amaravadi, 2005)
(dimensions) at a time. (Sethi & Sethi, 2006b) 3: A data
set is conceptually modeled as being embedded in a multi- Data Editing
dimensional hyper-rectangle, or data cube for short. The The activity aimed at detecting and correcting errors
data cube is deined by its dimensions, and stores the values (logical inconsistencies) in data. (Conversano & Siciliano,
of measure attributes in its cells. (Riedewald et al., 2005) 2005)
4: A preselection of aggregated data at several levels of
detail according to several dimensions in a data mart. A Data Encryption
data cube establishes the resolution and basic projection The process of scrambling the data for transmission
where selections can be made. The data cube aggregation to ensure that it is not intercepted along the way. (Wang,
detail can be modiied through OLAP operators such as Cheng, & Cheng, 2006)
drill and roll, and their dimensions can be modiied by
slice & dice and pivot. (Hernandez-Orallo, 2005a) Data Envelopment Analysis (DEA)
A data-oriented mathematical programming approach that
Data Cube Operator allows multiple performance measures in a single model.
Computes group-by, corresponding to all possible (Chen, Motiwalla, et al., 2005)
combinations of attributes in the cube-by clause. (Tan,
2005a) Data Exchange
The situation that the local source schemas, as well as the
global schema, are given beforehand; the data integration

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Ex t ra c t ion Dat a I nt e rcha nge 155

problem then exists in establishing a suitable mapping Data Imputation


between the given global schema and the given set of local 1: Substitution of estimated values for missing or
schemas. (Balsters, 2005) inconsistent data items (ields). The substituted values
D
are intended to create a data record that does not fail
Data Extraction edits. (Conversano & Siciliano, 2005) 2: The process of
1: A process in which data is transferred from operational estimating missing data of an observation based on the
databases to a data warehouse. (Kontio, 2005) 2: The valid values of other variables. (Brown & Kros, 2005)
process of creation of uniform representations of data in
a database federation. (Balsters, 2005) Data Integration
1: A process providing a uniform integrated access to
Data Flow Diagram (DFD) multiple heterogeneous information sources. (Flesca,
1: Used to model a system as a network of processes that Furfaro, et al., 2005) 2: A process of unifying data
transform and exchange data as a technique to provide a that share some common semantics but originate from
semantic bridge between users and system developers. unrelated sources. (Buccella et al., 2005) 3: The problem
The main components of DFDs are data process, actors, of combining data from multiple heterogeneous data
data low, and data stores. (Tauber & Schwartz, 2006) sources and providing a uniied view of these sources
2: A diagram used in functional analysis that speciies to the user. Such uniied view is structured according to
the functions of the system, the inputs/outputs from/to a global schema. Issues addressed by a data integration
external (user) entities, and the data being retrieved from system include specifying the mapping between the
or updating data stores. There are well-deined rules for global schema and the sources, and processing queries
specifying correct DFDs as well as for creating hierarchies expressed on the global schema. (Aldana Montes et al.,
of interrelated DFDs. (Shoval & Kabeli, 2005) 3: A 2005) 4: Unifying data models and databases so that all
graphical model describing data in a system and how departments of an enterprise use the same data entities,
the process transforms such data. A tool for modeling with the same values. (Kurbel, 2005)
information low and producing a functional analysis.
(Ferri & Grifoni, 2006) Data Integration System
A system that presents data distributed over heterogeneous
Data Fragmentation data sources according to a uniied view. A data integration
The technique used to split up the global database into system allows processing of queries over such a uniied
logical units. These logical units are called fragment view by gathering results from the various data sources.
relations, or simply fragments. (Ibrahim, 2005) (Marchetti et al., 2005)

Data Fusion Data Integrity


1: Combining evidence for a conclusion from multiple 1: Guarantees that data in transmissions is not created,
sources of information. (N.C. Rowe, 2006b) 2: The fully intercepted, modified, or deleted illicitly. (Lowry,
automated method of merging diverse data into a single, Stephens, et al., 2005) 2: Preventing forgeries, corruption,
coherent representation of the tactical, operational, or impairment, or modiication of resources like information,
strategic situation. (Ozer, Lv, & Wolf, 2005) services, or equipment. Data integrity is the quality or
condition of being whole and unaltered, and it refers to the
Data Hiding consistency, accuracy, and correctness of data. (Oermann
Important data being embedded into a host image. (Chen, & Dittmann, 2006) 3: The ability to prevent information
Chen, & Cheng, 2005) from being modiied by unauthorized users. (Wang, Cheng,
& Cheng, 2006)
Data Hijacking
Process in which an individual charged with a data Data Interchange
processing activity demands more money for the task in The process of sending and receiving data in such a way
exchange for not publicizing the data with which he or that the information content or meaning assigned to the data
she is working. (St.Amant, 2006b) is not altered during the transmission. (Vardaki, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
156 Dat a I rre dunda ncy Dat a M ining (DM )

Data Irredundancy Data Manipulation Service


The lack of data volume that by data recoding could be One of several computational services responsible by
D removed without information loss. (Kulikowski, 2005) some functional facility that could exist in a hypermedia
system. (Tobar et al., 2006)
Data Item
Database record or tuples. (Waluyo et al., 2005) Data Mart
1: A data warehouse focused on a particular subject or
Data Latency department. Data warehouses may consist of several
An experienced time delay when a system or an agent data marts. (Barca et al., 2005) 2: A data warehouse
sends data to a receiver. (Chen & McLeod, 2006) designed for a particular line of business, such as sales,
marketing, or inance. (Serrano et al., 2005) 3: A data
Data Laundering warehouse that is limited in scope and facility, but for a
Process in which international outsourcing is used to restricted domain. (Yao et al., 2005) 4: A logical subset
circumvent different national privacy laws when compiling of the complete data warehouse. We often view the data
personal data on individuals. (St.Amant, 2006b) mart as the restriction of the data warehouse to a single
business process or to a group of related business processes
Data Legibility targeted towards a particular business group. (Simitsis et
An aspect of () data quality: a level of data content al., 2005) 5: A small database with data derived from a
ability to be interpreted correctly due to the known and data warehouse. (Chen, Zhang, et al., 2005a) 6: A database
well-deined attributes, units, abbreviations, codes, formal containing data extracted and often summarized from one
terms, and so forth used in the data records expression. or more operational systems or from a data warehouse,
(Kulikowski, 2005) and optimized to support the business analysis needs of a
particular unit. (Raisinghani & Nugent, 2005) 7: Part of
Data Management a data warehouse which gathers the information about a
The use of techniques to organize, structure, and speciic domain. Each data mart is usually viewed at the
manage data, including database management and data conceptual model as a multi-dimensional star or snowlake
administration. (Thuraisingham, 2005) schema. Although each data mart is specialized on part
of the organization information, some dimensions can be
Data Management for Mobile Computing redundantly replicated in several data marts. For instance,
Numerous database management issues exist in mobile time is usually a dimension shared by all data marts.
computing environments, such as resource management (Hernandez-Orallo, 2005a) 8: A scaled-down version of
and system support, representation/dissemination/ an enterprise-wide data warehouse that is created for the
management of information, location management, as well purpose of supporting the analytical requirements of a
as others. Various new techniques for cache management, speciic business segment or department. (Hirji, 2005)
data replication, data broadcasting, transaction processing,
failure recovery, as well as database security, have been Data MCAR: See Data Missing Completely At
developed. Applications of these techniques have been Random.
found in distributed mobile database systems, mobile
information systems, advanced mobile computing Data Mining (DM)
applications, and on the Internet. Yet, many other related 1: Extraction of meaningful information from masses of
issues need to be addressed. (Parker & Chen, 2005) data (e.g., data warehouse) usually employing algorithms
to correlate among many variables faster than humanly
Data Manipulation Language (DML) possible. (Ribire & Romn, 2006) 2: Using powerful
A language used by a database management system that data collection methods to analyze a companys database
allows users to manipulate data (querying, inserting, and or data stores and select information that supports a
updating of data). (Ramasamy & Deshpande, 2005) speciic objective. (Lenard & Alam, 2005) 3: A class of
database applications or data processing that discovers
hidden patterns and correlations in a group of data or large

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a M issing Com ple t e ly At Ra ndom (Dat a M CAR) Data Pe r t urbat ion 157

databases which can be used to predict future behavior. (Li manipulations with instances, and models, queries,
et al., 2006) 4: A component of the business intelligence and constraints. A typical example of a well-developed
decision-support process in which patterns of information data model is the relational model. The ER data model,
D
in data are discovered through the use of a smart program though less formal, is another example. (Diskin & Kadish,
that automatically searches the database, inds signiicant 2005) 2: Deines which information is to be stored in a
patterns and correlations through the use of statistical database and how it is organized. (Bounif, 2005) 3: Part
algorithms, and infers rules from them. (Raisinghani & of the run-time environment described in SCORM. The
Nugent, 2005) 5: A database research area that aims at data model speciication is needed to standardize what
automated discovery of non-trivial, previously unknown, is communicated to the learning management system
and interesting regularities, trends, and patterns in large about the learner (i.e., score on quizzes, name, ID, time
data sets. (Manolopoulos et al., 2005) 6: A discovering in content). (Stavredes, 2005b)
process aimed at the identiication of patterns hidden in
the analyzed dataset. (Santos et al., 2005) 7: A form of Data Modeling
information extraction activity whose goal is to discover 1: Implementing data management in engineering
hidden facts contained in databases; the process of using information systems with information technology and,
various techniques (i.e., a combination of machine learning, in particular, database technology. The complex data
statistical analysis, modeling techniques, and database semantics and semantic relationships are described in data
technology) to discover implicit relationships between data modeling. (Ma, 2005a) 2: The process of producing a model
items and the construction of predictive models based on of a collection of data which encapsulates its semantics
them. (Rahman, 2005e) 8: A process by which information and hopefully its structure. (Delve, 2005)
is extracted from a database or multiple databases using
computer programs to match and merge data, and create Data Multi-Dimensionality
more information. (T. Stern, 2005) 9: A process by which The set of dimensions of a table or a data cube. (Rafanelli,
previously unknown patterns, rules, and relationships are 2005)
discovered from data. (Sadeghian et al., 2006) 10: A process
of seeking interesting and valuable information from a large Data Node
database using a combination of methods. (Kumar, 2005) An entity containing virtue attributes used to describe and
11: A research ield that investigates the extraction of useful aggregate knowledge in a knowledge network. (Croasdell
knowledge from large datasets. Clustering and Association & Wang, 2006)
Rule Mining are two examples of data-mining techniques.
(Kontaki et al., 2005) 12: A set of tools, techniques, and Data Operability
methods used to ind new, hidden, or unexpected patterns An aspect of () data quality: a level of data record
from a large collection of data typically stored in a data ability to be used directly, without additional processing
warehouse. (Bala et al., 2005) (restructuring, conversion, etc.). (Kulikowski, 2005)

Data Missing Completely At Random Data Partitioning


(Data MCAR) A storage technique through which each data item is
When the observed values of a variable are truly a random assigned to exactly one node. Data operations accessing
sample of all values of that variable (i.e., the response different data partitions can be executed in parallel.
exhibits independence from any variables). (Brown & However, if one operation needs to access more than
Kros, 2005) one data partition, the execution is more complicated.
(Pinheiro, 2005)
Data Missing At Random
When given the variables X and Y, the probability of Data Perturbation
response depends on X but not on Y. (Brown & Kros, 1: Involves modifying conidential attributes using random
2005) statistical noise. The objective of data perturbation is
to prevent disclosure of conidential attributes while
Data Model maximizing access to both confidential and non-
1: A speciication language where we can model and conidential attributes within a database. (Wilson et al.,
talk about models of a given class and their instances,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
158 Dat a Pla nning Dat a Re leva nc e

2006b) 2: Modifying the data so that original conidential et al., 2005) 2: A multi-faceted concept in information
data values cannot be recovered. (Saygin, 2005) systems research that focuses on the itness for use of
D data by consumers. Data quality can be viewed in four
Data Planning categories: intrinsic (accuracy, objectivity, believability,
The projection of expected future needs for data, with and reputation), contextual (relevancy, timeliness, and
speciications on data sources, data collection and storage, appropriate amount of data), representational (format of
data processing and presentation, data distribution, and the data), and accessibility (ease of access). (Borchers,
data security. (Law, 2005) 2005) 3: A set of data properties (features, parameters, etc.)
describing their ability to satisfy the users expectations
Data Precision or requirements concerning data using for information
An aspect of numerical () data quality: the maximum acquiring in a given area of interest, learning, decision
error between a real parameter and its value given by making, and so forth. (Kulikowski, 2005) 4: Data have
the data, caused by the data values discretization. good quality if they are it for use. Data quality is measured
Data precision is inversely proportional to this error. in terms of many dimensions or characteristics, including
(Kulikowski, 2005) accuracy, completeness, consistency, and currency of
electronic data. (Marchetti et al., 2005) 5: Ensuring that
Data Preprocessing data supplied is it for use by its consumer. Elements of data
1: The application of several methods preceding the mining quality can extend to include the quality of the context in
phase, done for improving the overall data-mining results. which that data is produced, the quality of the information
Usually, it consists of: (1) data cleaninga method for architecture in which that data resides, the factual accuracy
ixing missing values, outliers, and possible inconsistent of the data item stored, and the level of completeness
data; (2) data integrationthe union of (possibly and lack of ambiguity. (Schwartz & Schreiber, 2005) 6:
heterogeneous) data coming from different sources into a Interchangeably used with information integrity, it can
unique data store; and (3) data reductionthe application refer to an organizational data-quality program as well
of any technique working on data representation capable of as quality of a data element. When applied to the latter, a
saving storage space without compromising the possibility data elements quality is measured against the dimensions
of inquiring them. (Buccafurri & Lax, 2005) 2: The of information integrity (accuracy, completeness,
data-mining phase that converts the usage, content, and validity, uniqueness, precision, timeliness, accessibility,
structure information contained in various data sources consistency, clarity, and suficiency). (Malik, 2006) 7:
into data abstractions necessary for pattern discovery. Most large databases have redundant and inconsistent
(Lee-Post & Jin, 2005b) data, missing data ields, and/or values, as well as data
ields that are not logically related and that are stored in
Data Privacy the same data relations. (Owrang O., 2006)
Current United States laws provide protection to student
data, including performance data. Online distance Data Reconciliation
education environments need to address privacy issues The process of resolving data inconsistencies in database
through design of courses and security features built into federations (such as constraint conlicts). (Balsters,
recordkeeping systems. (Sales, 2005) 2005)

Data Processing Data Reduction


The operation performed on data in order to derive new A process of removing irrelevant information from data
information according to a given set of rules. (Vardaki, by reducing the number of features, instances, or values
2005) of the data. (Liu & Yu, 2005)

Data Quality Data Relevance


1: A dimension or measurement of data in reference An aspect of () data quality: a level of consistency
to its accuracy, completeness, consistency, timeliness, between the () data content and the area of interest of
uniqueness, and validity. Data are considered to be of the user. (Kulikowski, 2005)
high quality if they have all of the above attributes. (Yoon

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Re plic at ion Dat a St ruc t ure 159

Data Replication sequential pattern mining process is a (usually large) set


A storage technique through which some nodes have copies of data sequences. (Masseglia et al., 2005)
of the same data. Replication of data is a common method
D
to improve read performance, but is rather problematic if Data Set
data are often updated. (Pinheiro, 2005) A set of instances of target concepts. (Maloof, 2005)

Data Repository Data Source


A complex catalog of a set of sources organizing both An external provider of information; the information is
their description and all associated information at various accessible either in a passive or active way. (Abramowicz
abstraction levels. (De Meo & Ursino, 2005) et al., 2006)

Data Resource Management Data Staging Area (DSA)


The analysis, classiication, and maintenance of an An auxiliary area of volatile data employed for the purpose
organizations data and data relationships. (Yoon et al., of data transformation, reconciliation, and cleaning before
2005) the inal loading of the data warehouse. (Simitsis et al.,
2005)
Data Retrieval
Denotes the standardized database methods of matching Data Stream
a set of records, given a particular query (e.g., use of 1: A continuous low of data. The most common use of a
the SQL SELECT command on a database). (Peter & data stream is the transmission of digital data from one
Greenidge, 2005a) place to another. (Sayal, 2005) 2: A data set distributed
over time. (Maloof, 2005) 3: Data items that arrive
Data Schema online from multiple sources in a continuous, rapid, time-
Collection of data types and relationships described varying, possibly unpredictable fashion. (Chatziantoniou
according to a particular type language. (Marchetti et & Doukidis, 2005) 4: Opposite to the stationary view
al., 2005) of a database, a data stream focuses on the continuous
processing of newly arriving data (i.e., joining and
Data Schema Instance comparing of streams). (Fiege, 2005)
Collection of data values that are valid (i.e., conform) with
respect to a data schema. (Marchetti et al., 2005) Data Stream Applications
The class of large receiver set, low-bandwidth, real-time
Data Segment data applications. (Hossz, 2006)
A set of data items. (Waluyo et al., 2005)
Data Stream Management System (DSMS)
Data Semantics 1: A management system for eficient storage and querying
A relection of the real world that captures the relationship of data streams. DSMS can be considered the Database
between data in a database, its use in applications, and its Management System (DBMS) for data streams. The main
corresponding objects in the real world. Data semantics difference between DSMS and DBMS is that DSMS has
requires some form of agreement between the different to handle a higher volume of data that is continuously
agents (human and computer) that interact with and use the lowing in, and the characteristics of data content may
data. The ield of data semantics deals with understanding change over time. (Sayal, 2005) 2: A data management
and developing methodologies to ind and determine data system providing capabilities to query and process data
semantics, represent those semantics, and enable ways streams and store a bounded part of it. (Chatziantoniou
to use the representations of the semantics. (Schwartz & & Doukidis, 2005)
Schreiber, 2005)
Data Structure
Data Sequence Formal description of a () composite data indicating the
The sequence of itemsets representing the behavior of a order, contents, lengths, and lists of attribute values of its
client over a speciic period. The database involved in a ields. (Kulikowski, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
160 Dat a Ta g Dat a Wa re house Libra r y (DWL)

Data Tag business systems collect. (Mendes-Filho & Ramos, 2005)


A quality indicator attached to a ield, record, or table in 3: A database that is subject-oriented, integrated, time-
D a database to make decision makers aware of the level of variant, and non-volatile. (Chen, Zhang, et al., 2005a) 4:
data quality. (Chengalur-Smith et al., 2005) A database, frequently very large, that can access all of
a companys information. It contains data about how the
Data Tampering warehouse is organized, where the information can be
The threats of data being altered in unauthorized ways, found, and any connections between existing data. (Bose,
either accidentally or intentionally. (Butcher-Powell, 2005) 5: A form of data storage geared towards business
2005) intelligence. It integrates data from various parts of the
company. The data in a data warehouse is read-only and
Data Transformation/Translation tends to include historical as well as current data so that
Transformation of data stored in one format (meta-model) users can perform trend analysis. (Raisinghani & Nugent,
to another format. (Diskin & Kadish, 2005) 2005) 6: A place where managed data are situated after
they pass through the operational systems and outside
Data Type the operational systems. (Jeong, Abraham, & Abraham,
The characteristic of a data element or a ield that speciies 2006) 7: A platform consisting of a repository of selected
what type of data it can hold. SQL classiies three main information drawn from remote databases or other
data types: predeined data type, constructed data type, information sources which forms the infrastructural basis
and user-deined type. (Pardede et al., 2005) for supporting business decision making. (Hirji, 2005) 8:
A repository of information coming mainly from online
Data Validation transactional processing systems that provides data for
An activity aimed at verifying whether the value of a analytical processing and decision support. (Barca et al.,
data item comes from the given (inite or ininite) set of 2005) 9: A repository of nonvolatile temporal data used in
acceptable values. (Conversano & Siciliano, 2005) the analysis and tracking of key business processes. (Artz,
2005d) 10: A subject-oriented, integrated, time-variant,
Data Visualization non-volatile collection of data used to support the strategic
1: Presentation of data in human understandable graphics, decision-making process for the enterprise. It is the central
images, or animation. (S. Wang & H. Wang, 2005) 2: point of data integration for business intelligence and the
The method or end result of transforming numeric and source of data for data marts, delivering a common view
textual information into a graphic format. Visualizations of enterprise data. (Simitsis & Theodoratos, 2005) 11: A
are used to explore large quantities of data holistically system for storing, retrieving, and managing large amounts
in order to understand trends or principles. (Kusiak & of data using some sophisticated techniques of cleaning,
Shah, 2005) 3: The visualization of the data set through iltering, hashing, and compression. (Pourabbas, 2005a)
the use of techniques such as scatter plots, 3D cubes, link 12: An instantiated view of integrated information sources
graphs, and surface charts. (Viktor & Paquet, 2005) 4: to build mediators. In a spatial data warehouse, data can
The transformation and analysis to aid in formation of a be combined from many heterogeneous sources to obtain
mental picture of symbolic data. Such a picture is simple, decision support tools. These sources have to be adjusted
persistent, and complete. (Daassi et al., 2006) because they contain data in different representations.
Therefore, the construction of a data warehouse requires
Data Warehouse many operations such as integration, cleaning, and
1: A database that is speciically elaborated to allow consolidation. (Faz, 2005)
different analysis on data. Analysis exists generally
to make aggregation operations (count, sum, average, Data Warehouse Library (DWL)
etc.). A data warehouse is different from a transactional A repository of documents acquired from Web sources or
database since it accumulates data along time and other located within the organizational intranet. Apart from the
dimensions. Data of a warehouse are loaded and updated contents, the repository stores additional metadata about
at regular intervals from the transactional databases of the the documents, mainly temporal and semantic indices.
company. (Schneider, 2005) 2: A central repository for all Basically, DWL is an extensive Digital Library (DL) and
or signiicant parts of the data that an enterprises various enjoys all capabilities of a typical information retrieval

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Wa re housing Dat a -M ining Te chnology (DM T ) 161

system. However, there are three distinctive features that Data-Mining Data Table
make a DWL something more than a typical DL: temporal The lat ile constructed from the relational database
indexing, CSL-based indices, and direct links to warehouse that is the actual table used by the data-mining software.
D
business metadata. All these features provide novel (Breault, 2005)
possibilities of sub-setting the collection of documents to
be searched and establishing links among documents and Data-Mining Group (DMG)
data. (Wecel, Abramowicz, & Kalczynski, 2005) 1: The process of searching and analyzing data in order
to ind latent but potentially valuable information, and to
Data Warehousing identify patterns and establish relationships from a huge
1: A compilation of data designed for decision support by database. (Dholakia, Bang, et al., 2005) 2: A consortium of
executives, managers, analysts, and other key stakeholders data-mining vendors for developing data-mining standards.
in an organization. A data warehouse contains a consistent They have developed a Predictive Model Markup Language
picture of business conditions at a single point in time. (PMML). (Zendulka, 2005a)
(Pang, 2005a) 2: A form of data storage geared towards
business intelligence. It integrates data from various parts Data-Mining Guidelines
of the company. The data in a data warehouse are read- A set of standards by which medical data mining, in
only and tend to include historical as well as current data particular, might be conducted. This is a framework that
so that users can perform trend analysis. (Raisinghani, adopts a forward-looking responsibility in the evaluation
Klassen, et al., 2005) 3: Refers to the process of extraction of methods and explanation of conclusions, especially in
of data from different information sources (e.g., databases, the context of heuristic methods (with outcomes that may
iles) and their integration in a single data warehouse. be ill-deined). This extends not only to the methods of the
(Pourabbas, 2005b) 4: The gathering and cleaning of data data-mining procedure, the security and privacy aspects of
from disparate sources into a single database, optimized data, but also to where and how the results of data mining
for exploration and reporting. The data warehouse holds are utilized, requiring that an ethical reference be made to
a cleaned version of the data from operational systems, the inal purpose of the mining. (George, 2005a)
and data mining requires the type of cleaned data that
lives in a data warehouse. (Nicholson & Stanton, 2005) Data-Mining Model
5: The gathering and cleaning of data from disparate A high-level global description of a given set of data which
sources into a single database, which is optimized for is the result of a data-mining technique over the set of data.
exploration and reporting. The data warehouse holds a It can be descriptive or predictive. (Zendulka, 2005a)
cleaned version of the data from operational systems, and
data mining requires the type of cleaned data that live in Data-Mining Technology (DMT)
a data warehouse. (Nicholson & Stanton, 2005) 1: Broadly deined, includes all types of data-dictated
analytical tools and technologies that can detect generic
Data-Driven Decision Making and interesting patterns, scale (or can be made to scale)
The practice of purposefully collecting, analyzing, and to large data volumes, and help in automated knowledge
interpreting data according to accepted criteria, and discovery or prediction tasks. These include determining
using the outcomes to select and justify decisions. (Law, associations and correlations, clustering, classifying, and
2005) regressing, as well as developing predictive or forecasting
models. The speciic tools used can range from traditional
Data-Driven Design or emerging statistics and signal or image processing, to
A data warehouse design that begins with existing historical machine learning, artiicial intelligence, and knowledge
data and attempts to derive useful information regarding discovery from large databases, as well as econometrics,
trends in the organization. (Artz, 2005b) management science, and tools for modeling and predicting
the evolutions of nonlinear dynamical and stochastic
Data-Driven Web Design systems. (Ganguly, Gupta, Khan, 2005) 2: Statistical,
The data available in the organization are taken as the artiicial intelligence, machine learning, or even database-
starting point for the design of the Web site. (De Troyer, query-based approaches that are capable of extracting
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
162 Dat a -M ining Tool Dat a ba se M a na ge m e nt Syst e m (DBM S)

meaningful insights or knowledge from large volumes Database Federation


of information. (Khan et al., 2006) Provides for tight coupling of a collection of heterogeneous
D legacy databases into a global integrated system. The main
Data-Mining Tool problem is achieving and maintaining consistency and a
A software application that extract predictive information uniform representation of the data on the global level of
from large databases, which can then be analyzed to the federation. (Balsters, 2005)
enhance corporate data resources and generate predictions
regarding business trends and customer behavior. (Gur u, Database Gap
2006b) Processing demand for database applications is twofold
in 9-12 months, but it takes 18 months for the processor
Database speed to increase that much according to Moores Law.
1: A collection of facts, igures, and objects that is structured (Thomasian, 2005a)
so that it can easily be accessed, organized, managed,
and updated. (Pang, 2005a) 2: A collection of related Database Index
information. The information held in the database is stored An auxiliary physical database structure that is used to
in an organized way so that speciic items can be selected speed up the retrieval of data objects from the database
and retrieved quickly. (Duan & Xu, 2005) 3: A database in response to certain search conditions. Typically,
(instance) is a set of inite relations over a ixed database indexes are based on ordered iles or tree data structures.
schema. Each relation consists of a set of ground facts, (Manolopoulos et al., 2005)
that is, variable free facts. (Greco & Zumpano, 2005b)
4: A self-describing collection of data that represents a Database Item
model of an information domain. (Hoxmeier, 2005) 5: An item/entity occurring in the database. (Daly & Taniar,
An organized collection of data and information stored 2005b)
in a computer medium that can be easily accessed and
manipulated. (Hornby, 2005) Database Maintenance
The task of updating a database and enforcing constraints.
Database Administrator (DBA) (Schmidt et al., 2005)
1: A person responsible for successfully maintaining a
database system. (Chin, 2005) 2: An IT professional who Database Management System (DBMS)
ensures the database is accessible when it is called upon, 1: A collection of interrelated data that is called a database,
performs maintenance activities, and enforces security and a variety of software tools for accessing those data.
policies. (Slazinski, 2005) The three leading commercial DBMSs are: Oracle 9i,
IBM DB2, and Microsoft SQL Server. (Pallis et al.,
Database Benchmark 2005) 2: A set of programs used to deine, administer,
A benchmark specifically aimed at evaluating the and process the database and its applications. (Yao et
performance of DBMSs or DBMS components. (Darmont, al., 2005) 3: A software program (or group of programs)
2005) that manages and provides access to a database. (Chen,
Holt, et al., 2005) 4: Collection of software components
Database Clustering to store data, access the data, deine data elements, store
The process of grouping similar databases together. (Zhang data element deinitions, build data storage structures,
& Zhang, 2005) query the data, backup and secure the data, and provide
reports of the data. (Vitolo et al., 2005) 5: Software used
Database Computer to manage a database. It can be differentiated based on
A specialized computer for database applications which the data model such as Relational DBMS, Object-Oriented
usually works in conjunction with a host computer. DBMS, Object-Relational DBMS, and so forth. (Pardede
(Thomasian, 2005a) et al., 2005) 6: A system that stores, organizes, retrieves,
and manipulates databases. (Sadoun, 2006) 7: A software
Database Consistency system for organizing the information in a database in a
Means that the data contained in the database is both way that permits data input, veriication, storage, retrieval,
accurate and valid. (Ibrahim, 2005) and a combination of these. (Bozanis, 2006) 8: A collection

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a ba se M a rke t ing Dat ave illa nc e 163

of programs that enables users to create and maintain a Database Schema Reengineering
database. (Doorn, 2005) The process of analyzing a subject database schema to
recover its components and their relationships. It guides
D
Database Marketing the reconstitution of such a system into an enhanced one,
A branch of marketing that applies database technology with a higher level of abstraction and semantically closer
and analytics to understand customer behavior and improve to the Universe of Discourse. (Rivero, 2005)
effectiveness in marketing campaigns. (Lo, 2005)
Database Snapshot
Database Model A consistent collection of values of data items in a database
Conceptual data models and logical database models. that correspond to what a read-only transaction would
(Ma, 2005a) collect. The snapshot can be used as a checkpoint for
recovering a database upon. (Leong, 2005b)
Database Modeling
The irst step of database design, where the database Database Status
designers deine the data objects and their relationships to The structure and content of a database at a given time
other data objects. Data modeling involves a progression stamp. It comprises the database object classes, their
from conceptual model to logical model to physical schema. relationships, and their object instances. (Sindoni,
(Pardede et al., 2005) 2005a)

Database Paradigm Database Synchronization


The rational and theoretical framework or archetype used When a database is being synchronized, no new update
to formulate and support a database. (Doorn, 2005) transactions are allowed, and all open update transactions
are inished. After that, all updated blocks are written to
Database Quality disk. (Bose et al. 2005)
Includes dimensions of data, process, model, information,
and behavioral characteristics. (Hoxmeier, 2005) Database Trigger
A procedure that gets invoked by the database management
Database Repair system whenever a speciic column gets updated or
Minimal set of insert and delete operations which makes whenever a row gets deleted or inserted. (Millet, 2005)
the database consistent. (Flesca, Furfaro, et al., 2005)
Datalog
Database Reverse Engineering A class of deductive databases that may contain various
1: The process of analyzing an existing database to identify types of negation and disjunction. (Grant & Minker,
its components and their interrelationships, and to create 2006)
representations of another data model. (Alhajj & Polat,
2005a) 2: The process through which the logical and DataMIME
conceptual schemas of a legacy database or of a set of iles A prototype system designed and implemented on top of
are recovered or rebuilt from various information sources vertical database technology and a multi-layered software
such as DDL code, data dictionary contents, database framework by the DataSURG group at North Dakota State
contents, or the source code of application programs that University, USA. (Perrizo, Ding, Serazi, et al., 2005)
use the database. (Hainaut et al., 2005)
Dataveillance
Database Schema 1: Monitoring people by digital representations in
1: A set of names and conditions that describe the structure electronic databases created and managed by information
of a database. For example, in a relational database, the technologies. (Dholakia, Zwick, et al., 2005) 2: Surveillance
schema includes elements such as table names, ield names, by tracking shadows of data that are left behind as people
ield data types, primary key constraints, or foreign key undertake their electronic transactions. (Swierzowicz,
constraints. (Koeller, 2005) 2: The physical model or 2005) 3: Surveillance of data using automated data analysis
blueprint for a database. (Sethi & Sethi, 2006b) to identify variances. These typically depend on data that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
164 DBA De c ision Cont e nt

identify source agents and their relationships, and is used Deadlock


to draw a compliance analysts attention to a particular A situation in which a transaction in a set of transactions
D event or group of events that indicate possible anomalies. is blocked while waiting for another transaction in the set,
(Goldschmidt, 2005) and therefore none will become unblocked (unless there
is external intervention). (Haraty, 2005a)
DBA: See Database Administrator.
Decentralization
DB-MAIN Represents the move away from a tightly grouped core
An experimental CASE tool in development at the of administrators and personnel that facilitate distance
University of Namur since 1993. It supports most database education, to a system that is more integrated into the
engineering processes, among them: information analysis, different units of an institution. (Lindsay, Williams, et
database design, reverse engineering, federated database al., 2005)
design, and database migration. Its generic structure model
and method engineering environment allow users to build Decentralized Decision Making
their own methodologies. (Hainaut et al., 2005) In supply chains, it involves decisions where each entity
(member of the supply chain) has control over decisions at
DBMS: See Database Management System. their stage. However, the decisions not only have a local
impact, but also impact the whole supply chain. (Abraham
DC: See Distributed Constructionism. & Leon, 2006)

DCOM: See Distributed Component Object Model. Decentralized Model


The dispersion of decision making in which different
DCV: See Document Cut-Off Value. independent decisions are made simultaneously. (Peterson,
2005)
DDI
Digital Divide Index. (Tarnanas & Kikis, 2005) Decentralized Peer-to-Peer Network
In this network, there is no central directory server. Peers
DDIR: See Duplicate Document Image Retrieval. communicate with each other without any assistance or
coordination of a third party (i.e., the server). A famous
DDL: See Data Deinition Language. example is Gnutella. (Kwok, et al., 2006)

DDLM: See Demand-Driven Learning Model. Decentralized Strategy


The structure of the information technology organization
DDT: See Distributed Desktop Training. encompassing supporting units that are located at the
school or college level. (Poda & Brescia, 2005)
DE: See Distance Education.
Decimation
DEA: See Data Envelopment Analysis. The process of decreasing the sampling rate. It consists
of iltering and downsampling. (Jovanovic-Dolecek,
Dead Capital 2005b)
Assets owned by a nation or state that remain unrecognized
and unaccounted for, thereby preventing their productive Decimation Filter
deployment. (De, 2005) The ilter used in decimation to avoid aliasing caused by
downsampling. (Jovanovic-Dolecek, 2005b)
Deadlink
Text or a graphic that can be clicked on and then should Decision Content
lead to other information. When accessed, either an 1: Content refers to the particular decision under study; it
error message is returned or the link leads to an under- explores the basic nature and scope of decisions. (Chou,
construction page. (Falk & Sockel, 2005) Dyson, & Powell, 2005) 2: The context includes the outer

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De c ision Ex plore r De c ision Suppor t Syst e m (DSS) 165

context, which refers to the national economic, political, Decision Support System (DSS)
and social context for an organization, and the inner 1: An interactive arrangement of computerized tools
context that is the ongoing strategy, structure, culture, tailored to retrieve and display data regarding business
D
management, and political process of the organization. problems and queries. (Peter & Greenidge, 2005a) 2: An
Context helps to shape the process of decision making. interactive computer-based system which helps decision
(Chou et al., 2005) makers utilize data and models to solve semi-structured
or unstructured problems. (Duan & Xu, 2005) 3: An
Decision Explorer interactive. computer-based system composed of a user-
Software often used in Journey Making events that supports dialogue system, a model processor, and a data management
the representation and analysis of maps. The Decision system, which helps decision makers utilize data and
Explorer maps are projected onto a public screen for all quantitative models to solve semi-structured problems.
participants to read and use to illustrate their opinion (Forgionne et al., 2005) 4: A computer-based system
during the workshop. (Shaw, 2006) designed to assist in managing activities and information
in organizations. (Mathieu & Levary, 2005) 5: A computer
Decision Rule system that enables managers to solve a given problem in
1: An automatically generated standard that indicates the their own personalized way. (Pomerol & Adam, 2005) 6:
relationship between multimedia features and content A system designed, built, and used to support the decision-
information. (Hurson & Yang, 2005) 2: In (U,A,d) is making process. Its components are the data management
any expression of the form {a=va : aA and vaVa} system, the model management system, the knowledge
d=v where d is the decision attribute and v is a decision engine, the user interface, and the user or users. (Xodo
value. This decision rule is true in (U,A,d) if for any & Nigro, 2005) 7: A computer-based information system
object satisfying its left-hand side, it also satisies the whose purpose is the support of (not replacement) decision-
right-hand side; otherwise, the decision rule is true to a making activities. (Chen, Holt, et al., 2005) 8: One of a
degree measured by some coeficients such as conidence. speciic class of computerized information systems that
(Pawlak et al., 2005) 3: Speciication of the relationship support decision-making activities. DSSs are interactive,
between a collection of observations (conditions) and an computer-based systems and subsystems intended to help
outcome (a decision). (Grzymala-Busse & Ziarko, 2005) decision makers use communications technologies, data,
4: The result of an induction procedure providing the inal documents, knowledge, and models to identify and solve
assignment of a response class/value to a new object so problems and make decisions. Five more speciic DSS types
that only the predictor measurements are known. Such a include communications-driven DSS, data-driven DSS,
rule can be drawn in the form of a decision tree. (Siciliano document-driven DSS, knowledge-driven DSS, and model-
& Conversano, 2005) driven DSS. (Power, 2005) 9: Broadly deined, includes
technologies that facilitate decision making. Such systems
Decision Set can embed DMT and utilize these through automated
Ordered or unordered set of decision rules; a common batch processes and/or user-driven simulations or what-if
knowledge representation tool (utilized in the most expert scenario planning. The tools for decision support include
systems). (Bruha, 2005) analytical or automated approaches like data assimilation
and operations research, as well as tools that help the
Decision Support human experts or decision makers manage by objectives
1: Evolutionary step in the 1990s with characteristics to or by exception, like OLAP or GIS. (Ganguly et al., 2005)
review retrospective, dynamic data. OLAP is an example 10: In a broad sense, can be deined as a system/tools that
of an enabling technology in this area. (DeLorenzo, 2005) affect the way people make decisions. In IT, could be
2: The tools, techniques, and information resources that deined as a system that increases the intelligence density
can provide support to the decision maker in improving of data. (Sundaram & Portougal, 2005b) 11: A speciic
the eficiency and effectiveness of his/her decisions. Many class of computerized information system that supports
of these decision support tools may employ ICTs and be business and organizational decision-making activities.
part of the management information system itself. (Ritchie DSS is an interactive, software-based system that compiles
& Brindley, 2005) useful information from raw data, documents, personal

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
166 De c ision Syst e m De cla rat ive M ode

knowledge, and/or business models to identify and solve models. (Gehrke, 2005) 6: A method of inding rules or
problems and make decisions. (Raisinghani et al., 2005) rule induction which divides the data into subgroups that
D 12: An information system that interactively supports the are as similar as possible with regard to a target variable.
users ability to evaluate decision alternatives and develop (Nigro & Gonzlez Csaro, 2005c) 7: Each decision-tree
a recommended decision. (Forgionne, 2005) 13: Typically, algorithm creates rules based on decision trees or sets of
a business application that analyzes large amounts of data if-then statements to maximize interpretability. (Kusiak
in warehouses, often for the purpose of strategic decision & Shah, 2005) 8: A tree-shaped structure that represents
making. (Das, 2005) 14: A system and tools that affect the sets of decisions. Different types of decisions trees, such
way people make decisions. (Anke & Sundaram, 2006) as a Classiication and Regression Tree (CART), allow
15: Software designed to facilitate decision making, experts to create validated decision models that can then
particularly group decision making. (Roibs, 2006b) be applied to new datasets. (Athappilly & Rea, 2005)

Decision System Decision-Making Process


Is a tuple (U,A,d), where (U,A) is an information system 1: The process and act of making decisions. (Goldsmith
with the set A of condition attributes and the decision & Pillai, 2006) 2: The process whereby managers make
(attribute) d: UVd, where dA. Informally, d is an decisions, including the stages described by Herbert
attribute whose value is given by an external source Simon: intelligence, design, choice, and review. (Pomerol
(oracle, expert) in contradiction to conditional attributes in & Adam, 2005) 3: The process of developing a general
A whose values are determined by the user of the system. problem understanding, formulating the problem explicitly,
(Pawlak et al., 2005) evaluating alternatives systematically, and implementing
the choice. (Forgionne, 2005) 4: The actions, reactions, and
Decision Technology System interactions of the various interested parties as they seek
An information system that is designed to support all to make a commitment to allocate corporate resources.
phases of the decision-making process in a complete and Process incorporates both the formulation and evaluation
integrated manner. See also Management Support System processes. (Chou et al., 2005)
(MSS). (Forgionne, 2005)
Decision-Making Support System (DMSS)
Decision Tree An information system designed to support some, several,
1: A low-chart-like tree structure, where each internal or all phases of the decision-making process. (Forgionne
node denotes a test on an attribute, each branch represents et al., 2005)
an outcome of the test, and each leaf represents a class or
class distribution. (Zhou, 2005) 2: A model consisting of Declarative Constraint
nodes that contain tests on a single attribute and branches A schema object in the database that deines whether a state
representing the different outcomes of the test. A prediction of the database is consistent or not. (Ale & Espil, 2005)
is generated for a new example by performing the test
described at the root node and then proceeding along Declarative Knowledge
the branch that corresponds to the outcome of the test. 1: Knowledge that is based on facts, is static, and is
If the branch ends in a prediction, then that prediction concerned with the properties of objects, persons, and
is returned. If the branch ends in a node, then the test events and their relationships. (Raisinghani, 2005)
at that node is performed and the appropriate branch 2: Knowledge of basic facts, generally referred to in
selected. This continues until a prediction is found and computerized systems as data. Examples are the number
returned. (Oza, 2005) 3: A tree-like way of representing of items in a storage bin, the balance of the account of a
a collection of hierarchical rules that lead to a class or customer, or the date of birth of a person. It is one pole of
value. (Beynon, 2005b) 4: A tree-shaped structure that the factual-procedural dimension. (Ein-Dor, 2006)
represents a set of decisions. These decisions generate
rules for the classiication of a dataset. (Hamdi, 2005a) 5: Declarative Mode
Tree-structured data-mining model used for prediction, Declaration oriented languagessuch as Prologusing
where internal nodes are labeled with predicates declarative statements such as: x is greater than y. (Murthy
(decisions), and leaf nodes are labeled with data-mining & Krishnamurthy, 2005c)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De cla rat ive (N onproc e dura l) Que r y La ngua ge De fe nse M e cha nism s 167

Declarative (Nonprocedural) Query Language Deep Discussion


A general term for a query language, as opposed to an Discourse that involves critical analysis and debate. (Lam
imperative query language. Imperative (or procedural) et al., 2006)
D
languages specify explicit sequences of steps to follow
to produce a result, while declarative (non-procedural) Deep Learning
languages describe relationships between variables in 1: Learning that goes beyond the bare minimum. Deep
terms of functions or inference rules, and the language learners come to understand rather than simply know the
executor (interpreter or compiler) applies some ixed subject matter and are able to make valid generalizations
algorithm to these relations to produce a result. (Ferri & based upon it. (Pritchard, 2005a) 2: An approach to learning
Rafanelli, 2005) that is contrasted with surface learning. Someone who
adopts a deep learning approach may ind the subject
Declarative vs. Procedural of study intrinsically motivating or very engaging.
Integrity constraints are declarative statements expressed (Kukulska-Hulme, 2005)
in languages such as predicate logic, datalog, or SQL.
Since their evaluation can be very costly, the potentially Deep Web Mining
troublesome hand-coding of procedural triggers and stored Automatically discovering the structures of Web databases
procedures is recommended by most database manuals. hidden in the deep Web and matching semantically related
The main thrust of this chapter is about reducing the cost attributes between them. (Wen, 2005b)
of using declarative integrity constraints and avoiding
hand-coded implementation. (Decker, 2005) Deepest Inner Self
A psychological reality on a level deeper than (below)
DecNotes intellect, emotions, and body, where rejuvenating
An early bulletin board system providing threaded psychological energy that is always only positive is found.
discussions. Developed inside Digital Equipment (Kaluzniacky, 2006)
Corporation and eventually transformed into a product.
(Isaak, 2006) Defense in Depth
The multiple levels of security controls and safeguards that
Decoder: See Set-Top Box. an intruder faces. (Mattord & Whitman, 2005)

Deduction Defense Mechanisms


Deductive knowledge is formal rationalism, mathematical Freud used this term in 1894 to classify the set of
knowledge, and logical reasoning. (Nobre, 2006a) manifestations through which the ego protects itself
from internal as well as external aggressions. As
Deductive Data Mining different branches of psychoanalysis developed, there
A data-mining methodology that requires one to list has been a signiicant distinction between approaches
explicitly the input data and background knowledge. that interpreted psychoanalysis as the effort to reinforce
Roughly it treats data mining as deductive science the ego and the conscious through its adaptation to
(axiomatic method). (T.Y. Lin, 2005) the external environment (e.g., ego psychology and
self-psychology), and strong critics of this approach,
Deductive Database considered to be hygienic and social orthopedic by
An extension of relational database that allows relations to Lacan, who develops a return to Freud approach, and
be implicitly deined by rules. (Grant & Minker, 2006) thus a focus and preponderance of the unconscious and
of the id. Lacan investigated the conditions of possibility
Deductive Veriication of psychoanalysis and studied Heideggers ontology and
Technique that, based on models of systems deined as questioning process, and Saussures and Levy-Strauss
sets of axioms and rules, veriies them by mathematically works on symbolism, which inspired his notion of the
proving propositions and theorems. (Fisteus & Kloos, unconscious organized as a language. The epicenter of this
2006) polemic is located around the question of whether defense

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
168 De fe rre d De sign De c ision De libe rat ive De m oc ra cy

mechanisms may be manipulated and indoctrinated in Degree Audit Reporting System (DARS)
order to adapt to the demands of society, versus defense This reporting system for electronic advising through
D mechanisms that witness the huge complexity of the a match of degree requirements with a students
unconscious life that may be explored in order to create completed courses includes transfer articulation of course
fuller meaning and further development. Defense concepts equivalencies. (Langer, 2005)
include projection, introjection, delection, idealization,
splitting, and denial, and all have the common aim of Degree of Abnormality
overcoming anxiety. Groups and organizations develop A probability that represents to what extent a segment is
their own defense mechanisms which may be explored distant to the existing segments in relation with normal
through psychoanalytic-oriented consulting, aiming at events. (Oh et al., 2005)
social change. (Nobre, 2006b)
Degree of Range
Deferred Design Decision Type of transactions developed within the meta-business,
The cornerstone of implementing tailorable information and the way the companies are working together in order
systems, the DDD mechanism through which decisions to set up a workgroup environment. (Joia, 2005)
traditionally are taken during the design phase of an
information system development project, as a result Degree of Reach
of a set of user requirements elicited during analysis, How the involved companies are linked within the meta-
are now being deferred at run-time, until after the user business in order to transmit data and information among
decides about the required information system behavior. themselves. (Joia, 2005)
The information system can then follow the new design
speciications without any maintenance or redevelopment Degree of Structuring
action, and execute them to provide the user-deined The ability that the companies have to extract knowledge
behavior. (Stamoulis, Theotokis, & Martakos, 2005) from the data, and information retrieved and shared by
them. (Joia, 2005)
Deferred Maintenance
The policy of not performing database maintenance Deixis
operations when their need becomes evident, but A linguistic expression whose understanding requires
postponing them to a later time. (Sindoni, 2005a) understanding something besides itself, as with a caption.
(N.C. Rowe, 2005b)
Deferred Option
The option to defer a project or an investment, giving a Delay Jitter
irm an opportunity to make an investment at a later point Variance of the network delay computed over two
in time. (W. Li, 2005) subsequent audio packets. (Roccetti & Ferretti, 2005)

Deinable Set Delay Spike


A set that has a description precisely discriminating Sudden, large increase in the end-to-end network delay,
elements of the set from among all elements of the universe followed by a series of audio packets arriving almost
of interest. (Grzymala-Busse & Ziarko, 2005) simultaneously. (Roccetti & Ferretti, 2005)

Defrag Deliberative Democracy


A disk defragmenter rearranges the iles stored on hard 1: A form of democracy in which citizens share a
disk drives so that they are not spread over the surface commitment to the resolution of problems of collective
of the disk, and so access to the iles is faster. (D. Stern, choice through free public deliberation, and in which
2005) the basic democratic institutions provide a framework
for this. (A.R. Edwards, 2005) 2: Based on a decision-
Degree making consensus-oriented process, where parties can
An index measured by the number of linkage incidents freely participatethe outcome of which is the result of
with an actor. (Assimakopoulos & Yan, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De libe rat ive Poll De m at For m 169

reasoned and argumentative discussions. This model aims Delivery-vs.-Payment (DVP)


to achieve an impartial solution for political problems. A securities-industry procedure in which the buyers
(Magnani et al., 2006) 3: Refers to citizen participation payment for securities is due at the time of delivery;
D
in the context of cultivating a public discourse regarding that is, security delivery and payment are simultaneous.
governmental issues, policies, and courses of action. (Saha, 2006b)
(Holzer & Schweste, 2005)
Delphi Method
Deliberative Poll 1: A consensus technique used not only to obtain consensus
Deliberative poll or TELEVOTE is a scientiic public but also to encourage visionary thinking. (Janes, 2005) 2:
opinion poll with a deliberative element. Generally, a The objective of most Delphi applications is the reliable and
phone survey is conducted, then hundreds of respondents creative exploration of ideas or the production of suitable
are invited, using statistical sampling technology, to come information for decision making. (Shih & Fang, 2006)
together at a single location, or they are asked to deliberate
among themselves and with other interested people and DEM: See Digital Elevation Model.
form opinions. When they gather, they deliberate on the
issue and have an opportunity to work in small groups DEM Geometric Quality
(each like a citizens jury or planning cell), also spending Geometric precision measured in terms of the difference
time in plenary sessions when experts are questioned. At between a digital elevation model (DEM) and a reference
the end of the gathering (usually conducted over two to DEM (R-DEM). (Zelasco et al., 2005)
three days), participants are surveyed again. There is no
movement toward consensus, and responses are individual. Demand Forecasting
(Keskinen & Kuosa, 2005) Projection of the estimated level of goods or service demand
during the months or years covered by a marketing plan.
Deliberative Procedure (Cho, 2005)
A discussion that is governed by the norms of equality and
symmetry in participation, and the right of the participants Demand-Driven Learning Model (DDLM)
to question the agenda and the discussion rules, as well as Provides a framework to support and guide the design,
the way in which the agenda and rules are applied. (A.R. delivery, and evaluation of quality e-learning. The DDLM
Edwards, 2005) has ive main components: the quality standard of superior
structure, three consumer demands (content, delivery, and
Deliberative Process service), and learner outcomes. Quality assurance in the
A careful discussion, pondering, and weighing of facts. DDLM is implied through ongoing program evaluation
(OLooney, 2006) and continual adaptation and improvement. (MacDonald
et al., 2005)
Delivery
High-quality online delivery is deined as delivery that Demand-Driven View of Knowledge
carefully considers usability, interactivity, and tools. A view of knowledge stemming from the requirements of
(MacDonald et al., 2005) the organizationfor example, what knowledge is needed
to carry out a particular activity and how can it be applied?
Delivery Mechanism (J.S. Edwards, 2005)
Process for delivering course material. (Hunter & Carr,
2005) Demand-Side Stakeholder
A person or agency desirous of the services offered by
Delivery Platform and Application any e-government system and who will have an impact
One of several communication tools including a handheld on it in a practical sense. (De, 2005)
wireless device maker, a handheld computing device, a
personal digital assistant, and a mobile handset. (Rlke Demat Form
et al., 2005) The move from physical certificates to electronic
bookkeeping. Actual stock certiicates are slowly being

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
170 De m ogra phic s De pe nde ncy

removed and retired from circulation in exchange for Dense-Wavelength Division Multiplexing
electronic recording. (Saha, 2006b) (DWDM)
D The operation of a passive optical component (multiplexer)
Demographics that separates (and/or combines) two or more signals at
1: Involves the statistical study of characteristics within different wavelengths from one (two) or more inputs into
any population such as age, gender, marital status, address, two (one) or more outputs. (Chochliouros et al., 2005a)
occupation, mobility, health or disease rate, and so on.
(De Weaver, 2005) 2: Refers to the changing population Density
proile of the United States, to its implications for higher 1: An index used to indicate how actors are closely or
education, to the reasons for the explosive growth of loosely connected in a network. It is measured by the
distance learning. (D.B. Johnstone, 2005) proportion of possible lines that are actually present in
a network. (Assimakopoulos & Yan, 2006) 2: The ratio
Dendrogram of realized to possible ties. In a network with a density
1: A tree-like diagram that summarizes the process of of one, every member of a network is connected to every
clustering. Similar cases are joined by links whose position other. In a sparse network, there are few connections
in the diagram is determined by the level of similarity between people. The overall density of a network or a
between the cases. (Oh et al., 2005) 2: A graphical networks sub-region is closely related to every other
procedure for representing the output of a hierarchical network dimension. (Nelson & Hsu, 2006)
clustering method. It is strictly deined as a binary tree
with a distinguished root that has all the data items at its Density-Biased Sampling
leaves. (Chen & Liu, 2005) A database sampling method that combines clustering and
stratiied sampling. (Lutu, 2005)
Denial-of-Service (DOS) Attack
A type of computer system security attack where an Deontic Effect
opponent prevents legitimate users from accessing a service The establishment of an obligation or the fulillment of
or a resource, typically by overloading that resource with an obligation. (Johannesson, 2005a)
fabricated requests. (Knight & Labruyere, 2005)
Dependability
Denormalization A broader concept that includes availability, reliability,
A step backward in the normalization processfor safety, integrity, and maintainability, but not conidentiality.
example, to improve performance. (Kontio, 2005) A system is available if it is ready to perform a service;
it is reliable if it continues providing a correct service.
Denormalized Data Table Safety refers to the absence of catastrophic consequences
A database design that violates principles of a good for users and the environment. A systems integrity
(normalized) data model. Such a database design may guarantees no unauthorized modiications. When systems
lead to various problems such as data redundancy, reduced can be modiied and repaired easily, they are maintainable.
lexibility, and update anomalies. (Millet, 2005) Conidentiality means that information is not disclosed to
unauthorized subjects. (Weippl, 2006)
Denotational Semantics
The meaning is given in terms of mathematical functions. Dependence Relation
(Dasso & Funes, 2005) Relates to data cube query, where some of the group-by
queries could be answered using the results of other.
Dense Data (Tan, 2005a)
Data that has metric values for a substantial percentage
of all possible combinations of the dimension values. Dependency
(Deshpande & Ramasamy, 2005) The relation between data items or ields, or occasionally,
tables. Detecting dependencies is the key to putting tables
Dense Data Cube
A data cube is dense if a signiicant number of its cells (typically
at least 1-10%) are not empty. (Riedewald et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De pe nde nt Va ria ble De sign K now le dge Com pa rison 171

in the various normal forms and, hence, is the key to assertions and deinitions, which impose restrictions on
avoiding anomalies. (Schultz, 2005) possible interpretations according to the knowledge elicited
for a given domain. Each description logic has its set of
D
Dependent Variable constructors. (Colucci et al., 2006) 3: Considered to be
A value representing the presumed effect or consequence the most important knowledge representation formalism
of various states of related independent variables. In other unifying and giving a logical basis to the well-known
words, a dependent variable is the condition for which an traditions of frame-based systems, semantic networks and
explanation is sought. (McHaney, 2005) KL-ONE-like languages, object-oriented representations,
semantic data models, and type systems. (Roldn-Garca
Deployment Cost et al., 2005) 4: Logical formalism to represent structured
The IP-multicast requires additional knowledge in the concepts and the relationships among them. Formally, it is
routers to the basic unicast communication and extra work a subset of FOL dealing with concepts (monadic predicates)
from the administrators of the routers; the ALM needs and roles (binary predicates) which are useful to relate
the traditional unicast IP infrastructure only. (Hossz, concepts. Knowledge databases in description logic are
2005a) composed of a Tbox (the intentional component) and an
Abox (the box of asserts, the extensional component part).
Depot (Alonso-Jimnez et al., 2005)
An intermediate server to choose a proxy server for a
client request. (Tse, 2006) Descriptive Taxonomy
In educational theory and practice, an organizational
Depth of the Intervention scheme for classifying the structure of conditions for
For Andrew Harrison, intervention strategies range from learning, describing the approaches, types, events,
deep to surface level. Deep interventions are those which methods, and goals of instruction. While affective and
act on emotional involvement. These require a high level psycho-motor capabilities are also important, classic
of behavioral knowledge and skill as well as a sensitivity instructional design theory has focused on the cognitive
to the clients needs. Furthermore, there are clearly ethical domain. (Lasnik, 2005)
issues which require the willing participation of a client.
(Grieves, 2006b) Deseasonalization
Sometimes also called seasonal adjustment, a process
Depth-First of removing seasonality from the time series. Most
The method of generating candidates by adding speciic governmental statistics are seasonally adjusted to better
items at the end of the sequences. See also Generating- relect other components in a time series. (G.P. Zhang,
Pruning. (Masseglia et al., 2005) 2005)

DES: See Discrete Event Simulation. Design


1: The intentional creation of objects. (Knight, 2006b)
Description Logic 2: The structured composition of an object, process, or
1: A highly expressive formalism that allows users to specify activity. (Murphy, 2005c)
concepts, properties of concepts, and relationships among
concepts by writing independent logical propositions. Design Framework
(Kamthan & Pai, 2006) 2: Also known as terminological An open-ended design methodology that combines research
logic, it is a family of logic formalisms for knowledge and design activity. (Knight & Jefsioutine, 2006)
representation endowed of a syntax and a semantics,
which is model theoretic. The basic syntax elements of Design Knowledge Comparison
description logics are: concept names standing for sets of The comparison of engineering design knowledge to
objects, role names linking objects in different concepts, identify and determine the relationships among design
and individuals used for named elements belonging to knowledge represented in the given knowledge model.
objects. Basic elements can be combined using constructors (Ma, 2006)
to form concept and role expressions to be used in inclusion

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
172 De sign M e t hod De st inat ion M a rke t ing Orga nizat ion (DM O)

Design Method Design Variables


A method, tool, or technique employed during research, Characteristics of an organization, its processes, control,
D design, and development. (Knight & Jefsioutine, 2006) and coordination structures that can be varied to produce
a speciic organization design. (Morris et al., 2005)
Design Model
A model developed to represent the optimal technical Designation
solution of a speciied user need (as represented in a Representation of a concept by a sign that denotes it.
requirements model). (Krogstie, 2005a) (Gillman, 2006)

Design Perspective Designer


A designer can abstract characteristic types of the modeling A user who collaborates with designers as domain experts,
object and exploit only one characteristic type, such as envisioning new work practices and tools. This is the
behavior; and using that dimension she/he develops a model third stage in the developmental theory of participatory-
that represents that object. (Tobar et al., 2006) design relationships between users and designers. (Carroll,
2005)
Design Rationale Environment for Argumentation
and Modeling (DREAM) Design-for-All Principle
A tool dedicated to design-rationale capture by the way of Design principle in which services are able to be used by
an extended QOC notation. (Lacaze et al., 2006) all members of society. This includes multi-lingual and
services for the disabled. (Knepper & Chen, 2006)
Design Recovery
Recreates design abstractions from a combination of code, Desirable/Undesirable Coevolution
existing design documentation (if available), personal A heuristic with which to talk about knowledge
experience, and general knowledge about problem and management as a process along a continuum. (Land,
application domains. (Tan & Zhao, 2005b) Amjad, et al., 2006)

Design Research Desktop Delivery


1: A methodology developed as a way to carry out Using electronic formats to send articles to users. (Burke
formative research to test and reine educational designs et al., 2005)
based on principles derived from prior research. Design
research is an approach of progressive reinements in Desktop Publishing
design, with the design revisions based on experience, Creating pages for print media using a standard home
until all problems are worked out. It has dual goals of or ofice computer and commercial software, and then
reining both theory and practice. (Woodruff & Nirula, outputting them on a simple desktop printer. (Snyder,
2005) 2: Exploratory activity employed to understand the 2005)
product, process of design, distribution and consumption,
and stakeholders values and inluence. (Knight & Desktop Search
Jefsioutine, 2006) The functionality to index and retrieve personal information
that is stored in desktop computers, including iles, e-mails,
Design, Speciication, and Veriication of Interac- Web pages, and so on. (Hua et al., 2006)
tive Systems (DSV-IS)
An annual international workshop on user interfaces and Desktop Video Conferencing (DVC)
software engineering. The irst DSV-IS workshop was held The use of a desktop computer to send and receive video,
in 1994 in Carrara, Italy. The focus of this workshop series audio, and text in real time via the Internet. (Wild,
ranges from the pure theoretical aspects to the techniques 2005)
and tools for the design, development, and validation of
interactive systems. (Campos & Harrison, 2006) Destination Marketing Organization (DMO)
A public-sector organization charged with the promotion
of a destination. It may operate at the local, regional,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De st inat ion M a rke t ing Syst e m Deve lopm e nt Lit e rat ure 173

or national level, and often includes membership from Developing Country


private-sector organizations. (Carson, 2005) 1: A country in which the average annual income is low,
most of the population is usually engaged in agriculture,
D
Destination Marketing System and the majority live near the subsistence level. In general,
A computerized information system used as a marketing developing countries are not highly industrialized,
tool, usually to distribute information on tourism attractions dependent on foreign capital and development aid, whose
and tourism products for a particular geographical economies are mostly dependent on agriculture and
destination to potential visitors. (Hornby, 2005) primary resources, and do not have a strong industrial
base. (Rahman, 2005d) 2: One of the group of countries
Destination Marketing Web Site generally accepted as containing the poorer nations of the
Web site featuring information about individual products world. It is often used interchangeably with the term third
and generic information about a local, regional, or national world, i.e., belonging neither to the irst world (developed
destination. These sites may be purely for promotion, countries) nor the second world (former countries with
or may include e-commerce facilities for booking and command economies). (Escalante, 2005) 3: A country
purchasing a product. May be managed by DMOs, or by in the process of becoming industrialized, but having
private irms or industry associations not afiliated with constrained resources with which to combat its economical
a DMO. (Carson, 2005) problems. (Shareef & Kinshuk, 2005) 4: A country with
a relatively low per capital gross national product (GNP).
Detailed Project Plan (Ajiferuke & Olatokun, 2005) 5: A country in the process
A plan(s) that speciies detailed schedules, milestones, of converting to a capitalist model in which the economy
humanpower, and equipment requirements necessary for is founded mainly upon manufacturing and service vs.
complementing a project. (Peterson & Kim, 2005) agricultural production. (St.Amant, 2005b) 6: One of the
nations, particularly in Asia and Latin America, that is are
DETC: See Distance Education and Training Council. not as industrially developed as countries in Europe and
North America. A developing country is are characterized
Deterministic Behavior by an underdeveloped and uneven infrastructure in the
If a set of a shared application is started in an equivalent areas of telecommunications, roads, transportation, and
state, and the same set of events is presented to those electricity distribution. Other features of such societies
instances, then if the same state transitions will happen for include low-cost labor, and a large portion of the population
all instances, the application has deterministic behavior. It living in rural areas and employed in the agriculture sector.
is important to note that this deinition is more relaxed than (Tarafdar, 2005)
other ones, in the sense that resources that an application
might need are considered as part of the environment. Developing Project
Where other deinitions might assume that an application Creation of a small group of people that work on an existing
is no longer behaving deterministically if, for example, the problematic theme and design solutions where information
system time of the local machine is used, this deinition and communication technologies make sense. (Giorgi &
regards the system time as a part of the environment. Schrch, 2005)
(Trossen & Molenaar, 2005)
Development Awareness Project
Deterrence-Based Trust Project aimed at promoted awareness and understanding
The irst stage of trust is based on the consistency of of international development issues usually with people
behavior. It develops as team members simply comply as in high-income countries. (Pryor, 2005)
they fear sanctions and damage of the relationship. (Lettl
et al., 2006) Development Literature
Literature about impoverished countries of the world
Detrending that are trying to modernize or to ind different ways of
A process of removing trend from the time series supporting their populations. (McPherson, 2005)
through either differencing of time series observations or
subtracting itted trends from actual observations. (G.P.
Zhang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
174 Deve lopm e nt Proc e ss Dida c t ic a l Sit uat ion

Development Process Diagram Operation


The process for the improvement of society and community, An operation over objects and morphisms that takes a
D through diversiied means, creating demands and solutions certain coniguration of them as an input, input diagram,
at the appropriate dimension of necessity. (Rahman, and augments it with a few newderivedobjects and
2006) morphisms matching the shape of the output diagram.
(Diskin, 2005)
Developmental Theory
Theory of learning that involves growth and other Diagram Predicate
qualitative changes in skills, knowledge, and capacities. A property of a certain coniguration, diagram, of objects
Developmental theory is contrasted to accretive theory in and morphisms. (Diskin, 2005)
which learning is conceived of as a matter of quantitative
improvementmore knowledge or faster performance. Diagrammatic System
(Carroll, 2005) A computerized system that adopts different diagrammatic
representation forms. Many different systems are currently
Deviance Information Criterion (DIC) used in a wide variety of contexts: logic teaching, automated
Measure introduced as a tool for comparing and selecting reasoning, specifying computer programs, reasoning about
complex hierarchical models. DIC combines a measure of situations in physics, graphical user interfaces to computer
it, the deviance statistic, and a measure of complexitythe programs, and so on. (Ferri & Grifoni, 2006)
number of free parameters in the model. Since increasing
complexity is accompanied by a better it, the DIC trades Dial-Up Connection: See Modem.
off these two quantities. (Vidal-Rodeiro et al., 2005)
Dial-Up Internet Connection
Deviation Analysis Method of using telephone lines to call in to a server
Locates and analyzes deviations from normal statistical that then allows the individual to access the Internet and
behavior. (Yeo, 2005) the World Wide Web. (St.Amant, 2005e)

Device Diaspora
1: A piece of equipment used in a network. Devices include, 1: A dispersion of a people from their original homeland,
but are not limited to, workstations, servers, data storage such as the Jewish Diaspora after WWII or the Vietnamese
equipment, printers, routers, switches, hubs, machinery diaspora in the early 1970s. The Khmer diaspora was the
or appliances with network adapters, and punch-down result of the civil war and displacement of people due
panels. (Maris, 2005) 2: An entity that does not deal to the Khmer Rouge regime in the 1970s. Cambodian
with information storage, retrieval, or transmission, but refugees mostly settled in the U.S., Canada, Australia,
only deals with the exchange and transmission of data. France, and Thailand. (Hutchinson, 2005) 2: Immigrant
(Benyon, 2006) communities that live in nation-states other than their
original homelands. (Harris, 2005)
Device Proile
A model of a device storing information about both its costs DIC: See Deviance Information Criterion.
and capabilities. (De Meo, Quattrone, et al., 2005)
Dice
DFD: See Data Flow Diagram. Selecting a range on multiple dimensions to select a sub-
cube of the original space. (Deshpande & Ramasamy,
DFT: See Discrete Fourier Transformation. 2005)

DHT: See Distributed Hash Table. DICOM: See Digital Imaging and Communications in
Medicine.
DHTML: See Dynamic Hypertext Markup Language.
Didactical Situation
A set of circumstances of a teaching situation that can be
linked in a way that is coherent, regular, reproducible, and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Diffe re nc ing Diffusion of I nnovat ion 175

speciic to the targeted knowledge. It is not a theory of division, as well as behavioral attributes of the members
learning but a process of guiding other peoples learning of organizational subsystems. (Peterson, 2005)
(i.e., the dissemination and transposition of knowledge).
D
(Pelton & Pelton, 2005) Differentiation Agent
Comparison-shopping agent specializing in collecting
Differencing price-related, impersonal information, for example,
Removes trend from a time series. This is an effective way Pricewatch.com. (Wan, 2006)
to provide a clearer view of the true underlying behavior
of the series. (Cho, 2005) DiffServ: See Differentiated Service.

Differential Correction Diffusion


The effects of atmospheric and other GPS errors can be 1: A model in which the uptake of an artifact is dependent
reduced using a procedure called differential correction. on its intrinsic merit being easily recognized and passed
Differential correction uses a second GPS receiver at a on to other people. (Brady, 2005) 2: A process by which an
known location to act as a static reference point. The idea, product, practice, behavior, or object is communicated
accuracy of differentially corrected GPS positions can be and circulated to those to whom it is relevant. (Askarany,
from a few millimeters to about ive meters, depending 2005) 3: The process of the spread of an innovation in a
on the equipment, time of observation, and software social system. (Voeth & Liehr, 2005) 4: The act of a higher
processing techniques. (Olla, 2005b) education institution using information, professional
relationships, and structured methods to incorporate an
Differential Time of Arrival (DTOA) innovation into learning, research, and administration,
A positioning technology in which several transmitters bringing about new integrated system-wide change. (Poda
(synchronized to a common time base) are used to & Brescia, 2005) 5: The process by which an innovation is
measure time differences of arrival at the receiver and communicated through certain channels over time among
hence determine the receivers geographical position. the members of a social system. (Askar & Halici, 2005)
(Giaglis, 2005) 6: The process by which new behaviors, innovations, or
practices spread through an organization as people learn
Differential/Incremental Evaluation about them from other employees and try them out. (Jones
To re-evaluate a CQ on the changes that have been made & Gupta, 2005) 7: The spread of an innovation through
in the base data since its previous evaluation. (Khan, a social system. (Green et al., 2005)
2005)
Diffusion of Information Technology
Differentiated Service (DiffServ) Relects the spreading of information technology concepts
1: Architecture for QoS differentiation in the Internet. It among the society of implementation, whether within an
employs marking of IP datagrams to associate packets to organization or within the community at large. (Kamel,
predeined per-hop behaviors. The DiffServ architecture 2005a)
is described in the IETF RFC 2475. (DaSilva, 2005) 2:
Framework where network elements give preferential Diffusion of Innovation
treatment to classiications identiied as having more 1: The process by which an innovation is communicated
demanding requirements. DiffServ provides quality of through certain channels over time among the members
services based on user group needs rather than trafic of a social system. (Lertwongsatien & Wongpinunwatana,
lows. (Gutirrez & Ting, 2005) 2005) 2: The spread of abstract ideas and concepts,
technical information, and actual practices within a social
Differentiation system. In the context of small and medium enterprises
The state of segmentation or division of an organizational (SMEs): low or movement of innovation from a source
system into subsystems, each of which tends to develop to an adopter, typically via communication and inluence.
particular attributes in relation to the requirements posed (Pease & Rowe, 2005)
by the relevant environment. This includes both the formal

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
176 Digit a l Digit a l Cit y

Digital Digital Asset Store


Information represented as discrete numeric values, for A combination of ile systems and databases. (Subramanian,
D example in binary format (zeros or ones), as opposed to 2005)
information in continuous or analog form. Binary digits
(bits) are typically grouped into words of various Digital Audio
lengths8-bit words are called bytes. (Cosemans, Digital representation of sound waveform, recorded as a
2005b) sequence of discrete samples, representing the intensity of
the sound pressure wave at a given time instant. Sampling
Digital Access Index (DAI) frequency describes the number of samples recorded in
An index developed, calculated, and published by the each second, and bit resolution describes the number of
International Telecommunication Union that measures the bits used to represent the quantized (i.e., integer) value of
overall ability of individuals in a country to access and each sample. (Wieczorkowska, 2005)
use new information and communication technologies.
Indicators used to calculate the index are ixed telephone Digital Camera
subscribers per 100 inhabitants, mobile subscribers per A camera that stores images in a digital format rather
100 inhabitants, adult literacy, overall school enrollment than recording them on light-sensitive ilm. Pictures then
(primary, secondary, and tertiary), Internet access price may be downloaded to a computer system as digital iles,
(20 hours per month) as a percent of per-capita income, where they can be stored, displayed, printed, or further
broadband subscribers per 100 inhabitants, international manipulated. (Garrett, 2006a)
Internet bandwidth per capita, and Internet users per 100
inhabitants. (Barrera, 2005) Digital Cash
Classiied into electronic wallet (IC card) or online type
Digital Accessible Information Systems (DAISY) (network). Note that both types of digital cash have appeared
A standard for digital talking books maintained by the recently. The distinction between the two types has been
DAISY Consortium. It was developed with the objective disappearing. (Kurihara, 2006)
of making talking books more accessible and to facilitate
navigation within the book. It allows the storage and Digital Certiicate
retrieval of information in a multi-modal format in order 1: An electronic passport that can be used to establish
to reach out to people with different disabilities. (Lahiri identity in an electronic environment. (Mundy & Otenko,
& Basu, 2005) 2005) 2: A unique digital ID used to identify individuals
(personal certiicates), software (software certiicates),
Digital Asset or Web servers (server certiicates). They are based on a
1: Any asset that exists in a digitized form and is hierarchy of trust. (Sockel & Chen, 2005) 3: An electronic
of intrinsic or commercial value to an organization. data ile issued by a Certiication Authority (CA) to a
(Subramanian, 2005) 2: An electronic media element that certiicate holder. It contains the certiicate holders
may be unstructured such as an image, audio, or video, name, a serial number, the certiicate holders public key,
or structured such as a document or presentation, usually expiration dates, and the digital signature of the CA. It
with associated metadata. (Verhaart & Kinshuk 2006) 3: can be used to establish the holders credentials when
The information (in digital form) a company collects about doing transactions through the Internet. (Xu & Korba,
its customers. Companies that create value with digital 2005) 4: Used to authenticate both parties. CAs must issue
assets may be able to reharvest them through a potentially these certiicates. These are trusted third parties that have
ininite number of transactions. (Lee et al., 2006) carried out identity checks on their certiicate holders and
are prepared to accept a degree of liability for any losses
Digital Asset Management (DAM) due to fraud. CAs also issue the public and private keys.
A set of processes that facilitate the search, retrieval, and (Lei et al., 2005b)
storage of digital assets from an archive. (Subramanian,
2005) Digital City
1: This concept encompasses a diversiied number of
approaches to the co-evolution spatial development and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Digit a l Com m unit y Digit a l Ec onom y 177

the diffusion ICT. (Moutinho & Heitor, 2005) 2: Usually a existing between communities regarding their ability
Web site that is centered on a city, where public authorities, or the possibility to effectively access information and
business, and citizens can communicate and exchange communication technologies. (Costagliola, Di Martino,
D
information. (Jaeger, 2005) Ferrucci, & Gravino, 2006) 5: Refers to segments of the
population lacking Internet access or Internet-related skills.
Digital Community (Holzer & Schweste, 2005) 6: A term used to describe the
A city, town, or community that actively applies interactive disparity between persons who have access to information
communication technologies to enhance all aspects of and computing technology, and those who do not. Often
its culture, community, and commerce. (Geiselhart & used to describe the lack of Internet accessibility to those
Jamieson, 2005) living in rural or remote areas or who lack computing
knowledge and skills. (Becker, 2005a) 7: The discrepancy
Digital Darwinism between people who have access to and the resources to
An ideology framing economic and social situations use new information and communication tools, such as
which argues that only the economically and socially it the Internet, and people who do not have the resources
will survive because of their ability to adapt to the digital and access to the technology. It can exist between rural
world. (Skovira, 2005) and urban areas, between the educated and uneducated,
between economic classes, and between more and less
Digital Deliberation developed nations. (Neumann, 2005) 8: The disparity in
The process of thoughtful discussion regarding an issue access to technology that exists across certain demographic
or course of action through the use of ICTs. Digital groups. Also, a term used to describe the discrepancy
deliberation in government is characterized by access to between those who have the skills, knowledge, and
balanced information, an open agenda, time to consider abilities to use technology and those who do not. (Sharma,
issues expansively, freedom from manipulation or coercion, 2006a) 9: The gap between countries or communities with
a rule-based framework for discussion, participation by an and without access to technology, usually because of a
inclusive sample of citizens, broader and freer interaction combination of economic, socio-political, and historical
between participants, and the recognition of differences causes. The differences relate to ICT infrastructure and
between participants. (Holzer & Schweste, 2005) human resources and skills, although it is usually used
in the context of the inadequate Internet connectivity
Digital Democracy in developing countries or in underdeveloped regions.
Encompasses the use of ICTs in the practice of democracy, (Arellano et al., 2005) 10: The gap created between those
whereby emphasis is placed on the processes and structures using ICT and those who do not, for a range of reasons,
that deine the relationships between government and including a lack of access to ICT as a result of social or
citizens, between elected oficials and appointed civil economic factors, a lack of technical and keyboard skills
servants, and between the legislative and executive to use ICT, and a lack of basic skills or computer literacy
branches of government. (Holzer & Schweste, 2005) skills to understand the requirements and interpret the
information of ICT. (Sutcliffe, 2005)
Digital Divide
1: Refers to individuals or members of communities and Digital Economy
groups whose social, cultural, political, economic, or 1: Accepts as its foundation ICT developments and
personal circumstances constrain access to electronic represents the impact that these have had on the conduct of
communications or limit beneit to their lives from business and commercial activities. Changes in markets and
contemporary electronic technologies. (Malina, 2005) 2: supply chains as well as increasing global competition all
A term used to describe the gap between the technology represent what is encapsulated within the term the digital
haves and have-nots. It is a gap in opportunities economy. (Ritchie & Brindley, 2005) 2: The economy
experienced by those with limited accessibility to based more in the form of intangibles, information,
technology. (Rahman, 2005b) 3: Unequal access and use of innovation, and creativity, to expand economic potential;
data, information, and communication. More speciically, based on the exploitation of ideas rather than material
digital divide means unequal access to ICT infrastructure things using digital infrastructure. (Sharma, 2006a) 3:
or lacking skills in using it. (Heinonen, 2005) 4: Gap Economic system using Internet technology for business

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
178 Digit a l Elevat ion M ode l (DEM ) Digit a l I nclusion

transactions. (Efendioglu, 2006) 4: Economy based on Digital Gap


digital technologies such as computer, software, and digital The disparity or breach among countries generated by
D networks. (Tian & Stewart, 2006) 5: The economy for the lack of communication infrastructure and computer-
the age of networked intelligence. The digital economy based power that contribute to accentuate socioeconomic
is also a knowledge economy. Information, in all forms differences. (Ochoa-Morales, 2005)
digital, is the input of an organizational transformation
or value-creation process. (Lee et al., 2006) Digital Government
1: Digital government has different possible deinitions,
Digital Elevation Model (DEM) from online services to any use of ICTs in the public. In
The set of points in a three-dimensional coordinate system general terms, digital government refers to the use of
modeling a real objects surface. (Zelasco et al., 2005) ICTs in government for at least three purposes: providing
public services, improving managerial effectiveness,
Digital Equity and promoting democracy. (Sharma, 2006b) 2: The
The social-justice goal of ensuring that everyone in our development, adoption, or use of ICT by government
society has equal access to technology tools, computers, organizations and actors. (Hinnant & Sawyer, 2005) 3:
and the Internet. Even more, it occurs when all individuals The use of information and communications technology
have the knowledge and skills to access and use technology to improve the relations between government and its
tools, computers, and the Internet. (Schrum, 2005) employees, citizens, businesses, nonproit partners, and
other agencies by enhancing access to and delivery of
Digital Ethos Condition government information and services. (Knepper & Chen,
One of several factors individuals use to assess the 2006)
credibility or the worth of an online presentation of
information. (St.Amant, 2005c) Digital Identity Management System
A system related to the deinition and lifecycle of digital
Digital Filter identities and proiles, as well as environments for
The digital system that performs digital signal processing, exchanging and validating this information. (Cremonini
that is, transforms an input sequence into a desired output et al., 2006)
sequence. (Jovanovic-Dolecek, 2005a)
Digital Image
Digital Filter Design Image f(x,y) that has been discretized both in spatial
The process of deriving the transfer function of the coordinates and brightness, and consists of a set of elements,
ilter. It is carried out in three steps: deinition of ilter deined on an n-dimensional regular grid, that have the
speciication, approximation of given speciication, and potential for display. It can be considered a matrix whose
implementation of digital ilter in hardware or software. row and column indices identify a point in the image, and
(Jovanovic-Dolecek & Daz-Carmona, 2005) the corresponding matrix element values identify the grey
level at that point. The elements of such a digital array are
Digital Fingerprint called image elements, picture elements, pixels, or pels.
A larger document is not signed in its entirety. Generally (Venters et al., 2005)
a digital ingerprint of the larger document is computed
and signed. For this purpose hash functions are used. They Digital Imaging and Communications in Medicine
should be collision resistant and not invertible. Then two (DICOM)
different meaningful messages have different ingerprints A medical image standard developed by the American
and it is not possible to construct a meaningful message, College of Radiology and the National Electrical
given a ingerprint. (Stickel, 2005) Manufacturers Association. (Tong & Wong, 2005a)

Digital Forensics Digital Inclusion


Techniques to determine the root causes of security 1: The obverse of digital divide; seeks to proactively
violations that have occurred in a computer or a network. focus on including people in the use of ICT for local and
(Thuraisingham, 2005) personal beneit either directly or through distributed

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Digit a l I nt e ra c t ivit y Digit a l Right s M a na ge m e nt (D RM ) 179

application of information, knowledge, practice, and Digital Map


process derived from such technologies. (Erwin & Taylor, 1: A data set stored in a computer in digital form. It is not
2005) 2: Strategies and actions to assure more equal access static, and the lexibility of digital maps is vastly greater
D
to digital technologies and Web facilities, and to strengthen than paper maps. Inherent in this concept is the point that
effective, meaningful, and beneicial use for all members data on which the map is based is available to examine or
of the public in their day-to-day lives. (Malina, 2005) question. Digital maps can be manipulated easily in GIS
package environments. (Al-Hanbali & Sadoun, 2006) 2:
Digital Interactivity Any form of geographic boundaries or spatially referenced
Despite the fact that interactivity as a blanket concept drawings that have been captured, or digitized, into
cannot be precisely deined, the quality of interactivity an electronic form. Each element of the map is or may
deined by the user generally depends on the amount be linked to various descriptive or identifying types of
of common ground, the users perceived ability to information in a database. (Crossland, 2005)
control and inluence form and content of the mediated
environment, to be engaged in mediated space (in terms Digital Media Warehouse
of belief and/or in terms of sensory stimulation or displaced A vast collection of digitized media objects from an
physical enactment or embodiment), and to participate in unrestricted set of different domains. (Windhouwer &
multi-dimensional feedback which offers choice in real Kersten, 2005)
time. (Thomas & Roda, 2006b)
Digital Multimedia
Digital Item Representation The bits that represent texts, images, audios, and videos,
Multimedia content related to the merchandise of the VR- and are treated as data by computer programs. (Oh et al.,
mall, coupled with semantic information that describes and 2005)
categorizes each item. (Lepouras & Vassilakis, 2006)
Digital Reference Service
Digital Library A human-mediated, Internet-based service in which users
1: An organized collection of digital information. (Gregory, queries are answered in real time. (Lewis, 2005)
2005) 2: A cultural infrastructure that collects and stores
information in electronic format, and supports its users Digital Rights Expression (DRE)
in accessing a large collection of information effectively The attachment of metadata to a work in order to describe
through digital means. (Lai et al., 2005) 3: A library that the copyright status of that work. (Hassan & Hietanen,
makes virtually all of its resources available to patrons 2006)
via electronic channels. Individuals interested in using the
library can access databases, catalogs, journals and other Digital Rights Management (DRM)
periodicals, some books, and a variety of other services 1: A set of technologies for content owners to protect their
over the Internet. (Baim, 2006b) 4: A library that provides copyrights and stay in closer contact with their customers.
the resources to select, structure, offer, access, distribute, In most instances, DRM is a system that encrypts digital
preserve, and maintain the integrity of the collections of media content and limits access to only those users who
digital works. (Wu & Lee, 2005) 5: A set of electronic have acquired a proper license to play the content. That is,
documents organized in collections, plus the system that DRM is a technology that enables the secure distribution,
provides access to them. The digital version of traditional promotion, and sale of digital media content on the Internet.
libraries. (Martnez-Gonzlez, 2005) 6: A set of electronic (Kwok, 2005) 2: Technology used to control or restrict
resources (usually documents) combined with a software the use of digital media content on electronic devices,
system that allows storing, organizing, and retrieving the in order to protect intellectual property and to combat
resources. (Loh et al., 2005) piracy. (Ng, 2006) 3: The protection and management of
the intellectual property rights of digital content. It offers a
Digital Literacy means of setting up a contract between content consumers
A term used to describe the ability of users to perform in and providers. Speciically, it provides content creators
digital environments. (Eshet, 2005) or owners with a range of controls over their products
or services. It also offers interoperability to consumers,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
180 Digit a l Sat e llit e I m a ge Digit a l Te levision (DT V )

including end users and any intermediaries such as dealers, can be checked by anyone and, if properly used, assures
distributors, and system administrators. (Wang, Cheng, integrity of the signed message, as well as the identity of
D Cheng, & Huang, 2006) 4: A set of technologies whose the signer. (Stickel, 2005)
purpose is to restrict access to, and the possible uses of,
digital media objects, for example, by scrambling the data Digital Subscriber Line (DSL)
on a DVD to prevent unauthorized copying. (Hughes & 1: Shortened from Asymmetric Digital Subscriber Line
Lang, 2005) 5: The limitation of the access of users to (ADSL). A family of digital telecommunications protocols
information in a repository through the use of technical designed to allow high-speed data communication over
protection measures. (Hassan & Hietanen, 2006) 6: A the existing copper telephone lines between end users
concept for managing and controlling the access and and telephone companies. (Vician & Buche, 2005) 2: A
utilization of digital assets. (Karnouskos & Vilmos, 2006) mechanism for transmitting online information through
7: Refers to methods and technologies designed to control telephone lines, but at a faster speed than permitted by
access to or use of copyrighted data. (Gaedke et al., 2005) a normal telephone connection. (St.Amant, 2005e) 3: A
8: A platform to protect and securely deliver content on a switched telephone service that provides high data rates,
computer. (Upadhyaya et al., 2006) typically more than 1 Mbp. (Raisinghani & Ghanem, 2005)
4: A technique for transferring data over regular phone lines
Digital Satellite Image by using a frequency different from traditional voice calls
A digital image sent by a satellite system that is usually or analog modem trafic over the phone wires. DSL lines
launched in special orbits such as the geostationary orbit. carry voice, video, and data. (Hentea, 2005a) 5: Supports
The latter type of satellite system rotates at about 35,000 consolidation of data, video, and voice trafic for enabling
Km from the surface of the earth and is able to cover the broadband transmissions over ordinary twisted-copper-
same area of the earth 24 hours a day. (Al-Hanbali & wire telephone lines between the telephone company
Sadoun, 2006) central ofice and the subscribers residence. (Littman,
2006) 6: A method implementing a numerical coding
Digital Signal technique for fast Internet access. It uses the ordinary
A discrete-time signal whose amplitude is also discrete. It telephone line and splits the signals of voice and data.
is deined as a function of an independent, integer-valued It can offer speeds up to 8Mbps. (Kirlidog, 2005) 7: A
variable n. Consequently, a digital signal represents a technique for transmitting large amounts of data rapidly
sequence of discrete values (some of which can be zeros) on twisted pairs of copper wires, with the transmission
for each value of integer n. (Jovanovic-Dolecek, 2005a) rates for downstream access being much greater than for
the upstream access. (Hin & Subramaniam, 2005a) 8: A
Digital Signal Processing technology that provides high bandwidth digital data lows
Extracts useful information carried by the digital signals, over existing ordinary copper telephone lines to homes
and is concerned with the mathematical representation and small businesses. (Pease et al., 2005)
of the digital signals and algorithmic operations carried
out on the signal to extract the information. (Jovanovic- Digital Subscriber Loop (DSL)
Dolecek, 2005a) The global term for a family of technologies that transform
the copper local loop into a broadband line capable of
Digital Signature delivering multiple video channels into the home. There are
1: An electronic signature can be deemed the digital a variety of DSL technologies known as xDSL; each type
equivalent of a handwritten signature. Electronic signatures has a unique set of characteristics in terms of performance
can be used to authenticate the identity of the signer of (maximum broadband capacity), distance over maximum
the document and to also conirm the data integrity of performance (measured from the switch), frequency of
the document. (Mundy & Otenko, 2005) 2: Extra data transmission, and cost. (Chochliouros et al., 2005c)
appended to the message in order to authenticate the
identity of the sender and to ensure that the original Digital Television (DTV)
content of the message or document that has been sent 1: The term adopted by the FCC to describe its
is unchanged. (Guan, 2005c) 3: A digital signature may speciication for the next generation of broadcast-television
be used to electronically sign a document. The signature transmissions. DTV encompasses both HDTV and STV.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Digit a l T hink ing Sk ills Dim e nsion 181

(Chochliouros et al., 2005b) 2: The new generation of and audiofor the purposes of copyright protection,
broadcast television transmissions. These are of better authentication, content integrity veriication, and so forth.
quality than the traditional analogical broadcasts and will (Si & Li, 2006) 4: The practice of hiding a message in
D
presumably replace them. (Prata, 2005) 3: Broadcasting digital media, such as a digital image, audio, and/or video.
of television signals by means of digital techniques, used Digital watermarking only gained enormous popularity as
for the provision of TV services. (Hulicki, 2005) a research topic in the latter half of the 1990s. (Sattar &
Yu, 2006) 5: Sometimes also known as digital data hiding,
Digital Thinking Skills a technique for inserting secret information into digital
1: A reinement of the term Digital Literacy describing content in a seemingly innocuous and standards-compliant
the variety of thinking skills that comprise digital literacy. manner for applications of content authentication, covert
(Eshet, 2005) 2: Creation of a new mental model that is communications, copyright control or protection, and
based on an asynchronous mental model and on the ability so forth. In the case of covert communications, it is also
of linking, combining, and associating different, or even called steganography. (Wang, Cheng, Cheng, & Huang,
opposite ideas. (Joia, 2005) 2006) 6: The act of inserting a message into a cover work.
The resulting stego-object can be visible or invisible. (K.
Digital Versatile Disc (DVD) Chen, 2005)
An optical disc technology expected to rapidly replace the
CD-ROM (as well as the audio compact disc) over the next Digitality
few years. The DVD holds 4.7 gigabytes of information The proportion of a companys business that is online.
on one of its two sides, or enough for a 133-minute movie. (Borders & Johnston, 2005)
(Bochicchio & Fiore, 2005)
Digitation
Digital Video Broadcasting (DVB) The process of converting analog data to digital data where
1: Originally meant television broadcasting using digital binary systems are usually used. Programmers ind dealing
signals (as opposed to analog signals), but now refers to with digital data is much easier than dealing with analog
broadcasting all kinds of data as well as sound, often data. (Al-Hanbali & Sadoun, 2006)
accompanied by auxiliary information and including
bidirectional communications. (Chochliouros et al., 2005b) Digitization
2: The European standard for the development of DTV. Measures that automate processes. (Sundaram & Portougal,
(Hulicki, 2005) 3: A standard for sending and receiving 2005a)
digital information. It is used for transmitting television
by satellite and for broadcasting Internet. (D. Stern, Dilution of a Training Program
2005) 4: The European standard for digital TV. This Short circuiting the full delivery of a program, or inaccurate
standard provides a very high-speed, robust transmission presentation of material. (D. Wright, 2005)
chain capable of handling the many megabytes per second
needed for hundreds of MPEG-2 digital TV channels. Dimension
(Cosemans, 2005b) 1: A business perspective useful for analyzing data. A
dimension usually contains one or more hierarchies that
Digital Watermark(ing) can be used to drill up or down to different levels of
1: An image or a logo in digital format embedded in a detail. (Bellatreche & Mohania, 2005) 2: A category of
host image. The embedded data can later be used to prove information relevant to the decision-making purpose of the
the rightful ownership. (Chen, Chen, Ma, et al., 2005) data warehouse (Scime, 2005b). 3: A dimension attribute
2: A process that secretly embeds a message, such as a of an entity is a functional attribute that describes an
logo or data about the authorship, into multimedia. The aspect of the entity such as location or product. Dimension
watermark information still can be detected or extracted attributes can be hierarchical, for example, year-quarter-
after suffering from attacks. Its major intent is establishing month-day for the time dimension. (Riedewald et al.,
an identity of multimedia to prevent unauthorized use. (Lou 2005) 4: A property of a fact that speciies or explains one
et al., 2006) 3: A method of embedding secret information aspect of said fact. Usually a dimension has information
(watermark) into a host mediasuch as image, video, associated with it. (Badia, 2005c) 5: A property of the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
182 Dim e nsion De pe nde ncy Dire c t Audio Broa dc a st ing

data used to classify it and navigate the corresponding Dimensionality Modeling


data cube. In multi-dimensional databases, dimensions A logical design technique that aims to present data in a
D are often organized into several hierarchical levels, for standard, intuitive form that allows for high-performance
example, a time dimension may be organized into days, access. (Kontio, 2005)
months, and years. (Tininini, 2005b) 6: Corresponds
to a perspective under which facts can be fruitfully Dimensionality Reduction
analyzed. It is a structural attribute of a fact, that is, a list 1: A phase of classiier construction that reduces the
of members (variables), all of which are of a similar type number of dimensions of the vector space in which
in the users perception of the data. (Rafanelli, 2005) 7: documents are represented for the purpose of classiication.
Refers to the determinants of quality of each of the three Dimensionality reduction beneicially affects the eficiency
componentsnamely, system quality, information quality, of both the learning process and the classiication process.
and service quality. (Wilkin, 2005) 8: A set of members In fact, shorter vectors need to be handled by the learner
(criteria) allowing to drive the analysis (example for the and by the classiier, and often on the effectiveness of the
Product dimension: product type, manufacturer type). classiier too, since shorter vectors tend to limit the tendency
Members are used to drive the aggregation operations. of the learner to overit the training data. (Sebastiani,
(Schneider, 2005) 9: An axis along which the facts are 2005) 2: A technique used to lower the dimensionality
recorded. (Deshpande & Ramasamy, 2005) 10: Static, of the original dataset. Each object is transformed to
fact-oriented information used in decision support to drill another object that is described by less information. It
down into measurements. (DeLorenzo, 2005) is very useful for indexing purposes, since it increases
the speed of the iltering step. (Kontaki et al., 2005) 3:
Dimension Dependency Process of extracting a signature of low dimensionality
Presents when there is an interaction of the different from the original data while preserving some attributes
dimensions with one another. (Tan, 2005a) of the original data, such as the Euclidean distance.
(Sayal, 2005) 4: The process of transformation of a large
Dimension Table dimensional feature space into a space comprising a small
1: A database table that stores the different possible values number of (uncorrelated) components. Dimensionality
for a dimension, the attributes for those values, and the reduction allows us to visualize, categorize, or simplify
hierarchical values to which it maps. (Deshpande & large datasets. (Aradhye & Dorai, 2005) 5: The removal
Ramasamy, 2005) 2: A table containing the data for one of irrelevant, weakly relevant, or redundant attributes or
dimension within a star schema. The primary key is used to dimensions through the use of techniques such as principle
link to the fact table, and each level in the dimension has a component analysis or sensitivity analysis. (Viktor &
corresponding ield in the dimension table. (Bellatreche & Paquet, 2005)
Mohania, 2005) 3: A dimension table contains the textual
descriptors of the business process being modeled, and Diploma Mill
its depth and breadth deine the analytical usefulness of An organization that offers university diplomas that do
the data warehouse. (Delve, 2005) not relect learning. (Kostopoulos, 2005)

Dimensional Attribute Dipping Diffusion Pattern


One dimension of an m-dimensional context. (Feng & A pattern of IT diffusion in which the late majority/minority
Dillon, 2005) of adopters never arrives, and disconnections from the
Internet result in a reduction in overall numbers of adopters
Dimensional Model over time. (Grifin, 2005)
1: A data model that represents measures of a key business
process in the form of facts and the independent variables Direct Audio Broadcasting
that affect those measurements. (Artz, 2005d) 2: The data The possibility of listening to the transmission of radio
model used in data warehouses and data marts, the most broadcast programming directly from the Web. (Daz-
common being the star schema, comprising a fact table Andrade, 2005)
surrounded by dimension tables. (Delve, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dire c t I m pa c t Dire c t iona l Re lat ion 183

Direct Impact Direct-to-Customer


Information technology investments that can be evaluated An e-commerce business model that connects manufacturers
as causally related to reduced cost or increased proits. For with customers directly by bypassing intermediaries with
D
example, more effective management of inventory leads to Internet-related technology. (Wang, Ding, et al., 2006)
reduced inventory carrying costs. (Dykman, 2005)
Direct-to-Plate
Direct Instruction Technology that enables digital layouts to be sent directly
A highly structured, often scripted lecture and recitation- to a system that images plates appropriate to the printing
based instructional method. (Glick, 2005b) process being used. (Snyder, 2005)

Direct Manipulation User Interface Directed Acyclic Graph (DAG)


An interface that aims at making objects and actions in 1: A graph with directed arcs containing no cycles; in
the systems visible by [graphical] representation. These this type of graph, for any node there is no directed path
were originally proposed as an alternative to command returning to it. (Ramoni & Sebastiani, 2005) 2: A graph
line interfaces. The systems objects and actions are often with one-way edges containing no cycles. (Pourabbas,
represented by metaphorical icons on screen (e.g., dragging 2005b) 3: A graph in which each edge can be followed
a ile to the recycle bin for deleting a ile). Designers from one vertex to the next, and where no path starts and
of direct manipulation user interface strive to provide ends at the same vertex. (Laura, 2005) 4: A directed graph
incremental reversible operations and visible effects. that does not contain a cycle. (Chen, 2005a)
(Thomas & Roda, 2006a)
Directed Graphical Model
Direct Recommendation The graph in this model contains only directed links,
This kind of recommendation is based on a simple user which are used to model asymmetric relations among the
request mechanism in datasets. The user interacts directly variables. They give rise to recursive graphical models,
with the system that helps him in the search of the item also known as probabilistic expert systems. (Giudici &
through a list, with the n-articles that are closest to his or Cerchiello, 2005)
her request in relation to a previously known proile. (Gil
& Garci a, 2006) Direction
1: Refers to specialists issuing rules, directives, and
Direct Recording Electronic (DRE) System operating procedures to guide the behavior of non-
A new technique for collecting and counting ballots. This specialists, less mature specialists, and specialists in
system utilizes, in most cases, some form of touchscreen other ields. Rules and directives can be interpreted as
and stores the vote results in a back-end database server. translations into a limited instruction of a wider body of
(Gibson & Brown, 2006) explicit and tacit knowledge on a subject. (Berends et al.,
2006) 2: A stage of the intelligence cycle. In the direction
Direct Sale stage, one determines the strategic (external) information
The sale of a product or service made over a Web site and requirementsthat is, one determines what environmental
directly payable to the product/service provider (who is data should be collected. (Achterbergh, 2005a)
also the Web site owner). (Shan et al., 2006b)
Directional Relation
Direct Sequence Spread Spectrum (DSSS) The order between two salient objects according to a
The data stream to be transmitted is divided into small direction, or the localization of a salient object inside
pieces, each of which is allocated a frequency channel. images. In the literature, 14 directional relations are
Then the data signal is combined with a higher data-rate considered: Strict: north, south, east, and west; Mixture:
bit sequence known as a chipping code that divides the north-east, north-west, south-east, and south-west; and
data according to a spreading ratio, thus allowing resistance Positional: left, right, up, down, front, and behind. (Chbeir
from interference during transmission. (Akhtar, 2005) & Yetongnon, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
184 Dire c t or y Disc ove r y I nfor m at ic s

Directory Disambiguation in Iconic Interfaces


Other than search engines, directories provide another The process of context-sensitive, on-the-ly semantic
D approach of Web searches. A directory is a subject guide, interpretation of a sequence of icons. The process is
typically organized by major topics and subtopics, which is dificult because of the huge world knowledge required
created based on the submissions from either Webmasters for comprehending and reasoning about natural language.
or editors who have reviewed the pages. (Hu, Yang, Yeh, (Abhishek & Basu, 2006)
et al., 2005)
Disaster Recovery
Directory of Expertise/Expert Locator Recovery in a situation where both the current database
A directory with listings of individuals, their expertise, and its log-iles have been destroyed. (Frank, 2005a)
and contact information used to locate knowledgeable
personnel within the enterprise. (Ribire & Romn, Discount Usability Methods
2006) A focused set of design and evaluation tools and methods
aimed at improving usability with the minimum resources.
Directory Resources (Knight & Jefsioutine, 2006)
Individuals who can get you in touch with other immediately
unknown knowledge stakeholders or experts. (Croasdell Discourse
& Wang, 2006) 1: Characterized by linguists as units of language longer
than a single sentence, such that discourse analysis is
Disability deined as the study of cohesion and other relationships
1: There are two basic approaches. The medical model sees between sentences in written or spoken discourse.
disability as a personal tragedy or deicit located within (Macfadyen & Doff, 2006) 2: Closely associated with the
an individual. The social model argues that it is society that notion of a text, discourse refers to meaning making. This
creates disability, with barriers to participation needing to meaning making may be of many forms such as written,
be addressed systemically. (Newell & Debenham, 2005) spoken, written to be spoken, and spoken to be written.
2: Under the ADA, an individual with a disability is a (Zappavigna, 2006)
person who: (1) has a physical or mental impairment that
substantially limits one or more major life activities; (2) Discourse Analysis
has a record of such an impairment; or (3) is regarded as Generally looks at aspects of texts above the clause or
having such an impairment. (Bursa, et al., 2005) sentence level, and approaches them in their social contexts
rather than as isolated aspects of grammar. (Zappavigna,
Disabled Student 2006)
From the U.S. Federal Register: the child/student has
been evaluated as having mental retardation, a hearing Discourse Support System
impairment including deafness, a speech or language A system of information and communication technologies
impairment, a visual impairment including blindness, providing a Web-based platform, a methodology, and
serious emotional disturbance (hereafter referred to appropriate tools for fruitful discussions. (A.R. Edwards,
as emotional disturbance), an orthopedic impairment, 2005)
autism, traumatic brain injury, another health impairment,
a speciic learning disability, deaf-blindness, or multiple Discovery Informatics
disabilities, and who, by reason thereof, needs special 1: Knowledge explored in databases with the form of
education and related services (IEP or 504). (T. Cavanaugh, association, classiication, regression, summarization/
2005) generalization, and clustering. (Wu & Lee, 2005) 2:
The study and practice of employing the full spectrum
Disablism of computing and analytical science and technology to
Similar to sexism and racism as a concept. (Newell & the singular pursuit of discovering new information by
Debenham, 2005) identifying and validating patterns in data. (Agresti,
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Disc ove r y Tool Disc rim ina nt Ana lysis 185

Discovery Tool Discrete Wavelet Transformation (DWT)


A program that enables users to employ different discovery An orthonormal decomposition that provides a multi-
schemes, including classification, characteristics, resolution (multi-scale) view of the smooth and rough
D
association, and sequence for extracting knowledge from elements of a signal. (Shahabi et al., 2005)
databases. (Owrang O., 2006)
Discrete/Continuous Attribute
Discrepancy of a Model An attribute is a quantity describing an example (or
Assume that f represents the unknown density of the instance); its domain is deined by the attribute type, which
population, and let g=p be a family of density functions denotes the values taken by an attribute. An attribute
(indexed by a vector of I parameters q) that approximates it. can be discrete (or categorical, indeed symbolic) when
Using, to exemplify, the Euclidean distance, the discrepancy the number of values is inite. A continuous attribute
of a model g, with respect to a target model f is: corresponds to real numerical values (for instance, a
measurement). The discretization process transforms an
n
( f , p )= ( f (xi ) p (xi ))2 attribute from continuous to discrete. (Muhlenbach &
i =1 Rakotomalala, 2005)

(Giudici, 2005) Discrete-Event Simulation


Models a system by changing the systems state at discrete
Discrete Data points in time. (Janssen, 2005)
Assuming values that can be counted, the data cannot
assume all values on the number line within their value Discrete-Time Signal
range. An example is: number of children in a family. Deined at discrete time values, and thus the independent
(Yang & Webb, 2005) variable has discrete values n, for example x(n). (Jovanovic-
Dolecek, 2005b)
Discrete Event Simulation (DES)
Use of a computer to mimic the behavior of a complicated Discretionary Access Control (DAC)
system and thereby gain insight into the performance of A model where the owner is responsible for deining
that system under a variety of circumstances. Generally policies in order to protect his/her resources, and (s)he
the system under investigation is viewed in terms of can also deine who is going to be assigned some access
instantaneous changes due to certain sudden events or privileges. (Pallis et al., 2005)
occurrences. (McHaney, 2005)
Discretionary Security
Discrete Fourier Transformation (DFT) A form of security where access to data items is restricted
A transformation from time domain into frequency domain at the discretion of the owner. (Haraty, 2005a)
that is widely used in signal-processing-related ields to
analyze the frequencies contained in a sampled signal. Discretization
(Sayal, 2005) 1: A process that transforms quantitative data to qualitative
data. (Yang & Webb, 2005) 2: Conversion of a numeric
Discrete Multitone Technology variable into a categorical variable, usually though
A technique for subdividing a transmission channel into binning. The entire range of the numeric values is split
256 subchannels of different frequencies through which into a pre-speciied number of bins. The numeric value of
trafic is overlaid. (Hin & Subramaniam, 2005a) the attributes is replaced by the identiier of the bin into
which it falls. (Perlich & Provost, 2005)
Discrete System
A system where the state variables showing its behavior Discriminant Analysis
change only at isolated, discernible points of time. Hence, 1: A multivariate statistical method that separates the data
the behavior of the system is seen as changing in distinct, into categories. (Kumar, 2005) 2: Statistical methodology
separate moments of time. Such systems can be modeled used for classiication that is based on the general regression
using difference equations or incremental event analysis. model, and uses a nominal or ordinal dependent variable.
(Vitolo & Coulston, 2005) (Garrity et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
186 Disc rim ina nt Func t ion Algorit hm Disjunc t ive Dat a o
l g Progra m

Discriminant Function Algorithm cases in the exposed population or population-at-risk.


A term developed for Edward Altman in describing his (Garb & Wait, 2005a)
D Z Score analytical tool in determining the likelihood of
an enterprise going into bankruptcy on a prospective Disembodied
basis. Used as a method for determining inlection Separated from or existing without the body. (Macfadyen,
pointschanges in corporate health vs. for bankruptcy 2006c)
prediction. (Nugent, 2005)
Disinformation
Discriminant Variable False information repeatedly provided in a coordinated
One bit of information that really matters among the many campaign. (N.C. Rowe, 2006d)
apparently involved in the true core of a complex set of
features. (Liberati et al., 2005) Disintermediation
1: The reduction or elimination of the role of the middlemen
Discussion Board/Group in transactions between the producer and the customer,
1: A Web site, or part of a Web site, that allows individuals as in new electronic marketplaces, consumers interact
to post messages, but does not have the capacity for directly with producers. (Sharma, Carson, et al., 2005) 2:
interactive messaging. (Whitty, 2005) 2: An intranet site The removal of intermediaries from the supply chain. The
where members can post their thoughts in writing. (Baugher possibility of disintermediation is said to occur when there
et al., 2005) 3: Also known as a message board, this is market transparency and the inal buyers become aware
term refers to a Web site component that enables users to of manufacturers price intermediaries. (Fraser, 2005) 3:
participate in topics of discussion by posting and replying Going around a player in a supply chain, as in rendering
to comments electronically. (Riffee & Sessums, 2005) 4: that player redundant. (Foley & Samson, 2006) 4: The
Many-to-many asynchronous communication in which a elimination of agents, like wholesale dealers or brokers,
group of people exchanges messages and information on who built the former relationship between producer and
a speciic topic. Members of the group send messages and consumer. Disintermediation allows the direct supply of
reply to messages of other members. (Erlich, 2005) the consumer. (Seitz, 2005) 5: The process of eliminating
intermediaries in the channels of distribution. (Borders
Discussion Thread & Johnston, 2005)
1: A series of posts related to a single topic in a discussion
board. (Baugher et al., 2005) 2: A set of sequential response Disjunctive Database
messages to an original message in a discussion group. A database that allows indeinite information. (Grant &
(Erlich, 2005) 3: A string of messages that follow a common Minker, 2006)
theme and consist of responses and replies to previous
messages. (Ingram & Hathorn, 2005a) Disjunctive Datalog Program
1: A set of rules of the form: A1 A k B1, ..., Bm,
Discussion Tool not Bm+1, , not Bn, k+m+n>0 where A1,,Ak, B1,, Bn are
A Web-based tool that supports multimedia asynchronous atoms of the form p(t1,..., th), p is a predicate symbol of arity
communication among individuals in a learning h and the terms t1,..., th are constants or variables. (Greco &
community. (Morphew, 2005) Zumpano, 2005a) 2: A set of rules r of the form: A1
A k B1, ..., Bm, Bm+1, ,Bn, where k+m+n>0, A1,, Ak,
Disease Mapping B1,, Bn are atoms of the form p(t1,..., th), p is a predicate
The visual display of geographical patterns of disease in symbol of arity h, and the terms t1,..., th are constants or
a map. The maps typically show standardized mortality variables. The disjunction A1 Ak is called head of r
or incidence ratios for geographic areas such as countries, and is denoted by Head(r) while the conjunction B1, ..., Bm,
counties, or districts. (Vidal-Rodeiro et al., 2005) Bm+1, ,Bn is called body and is denoted by Body(r). If
k=1, then r is normal (i.e., -free); if n=0, then r is positive
Disease Rates (i.e., -free); if both m=1 and n=0, then r is normal and
The level of disease in a given time period, population, positive; if k=n=0 then r is a fact, whereas if m=0 then r is
and geographic area. It represents the proportion of disease

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Disjunc t ive Se t of Conjunc t ive Rule s Dist a nc e Educ at ion (DE) 187

a constraint or denial rule, that is, a rule which is satisied Disruptive Innovation
only if Body(r) is false. (Greco & Zumpano, 2005b) An innovation that typically presents a different package
of performance attributesones that, at least at the outset,
D
Disjunctive Set of Conjunctive Rules are not valued by existing customers. (C.-S. Lee, 2005)
A conjunctive rule is a propositional rule whose antecedent
consists of a conjunction of attribute-value pairs. A Dissemination
disjunctive set of conjunctive rules consists of a set of 1: Because information is not created equally, it must
conjunctive rules with the same consequent. It is called be codiied and aggregated such that one producer of
disjunctive because the rules in the set can be combined knowledge is not privileged over another. For example, a
into a single disjunctive rule whose antecedent consists city portal where all community information is collated or
of a disjunction of conjunctions. (An, 2005) republished. (Williamson, 2005) 2: Stage of the intelligence
cycle. In this stage, the intelligence produced in the analysis
Disorientation stage is presented and forwarded to strategic decision
The sensation of feeling lost in a hypermedia document, makers. (Achterbergh, 2005a)
characterized by three categories of the users experience:
(1) the user does not know where to go next, (2) the user Distal Context
knows where to go but not how to get there, or (3) the user The physical scope of a consumer context that is outside
does not know where he or she is in relation to the overall the direct perception of the consumer. Most context-aware
structure of the document. (Boechler, 2006a) applications intend to help mobile consumers obtain useful
and interesting information about their distal context.
Disparity (Sun & Poole, 2005)
The inequality or difference in access to media and
technology. (Reilly, 2005) Distance
A function from pairs of objects into non-negative real
Disparity Map Generation numbers. It can be zero only if the two arguments are
Solving the correspondence problem, that is, to ind the the same. It must be symmetric and obey the triangle
corresponding points in the stereo images by inding inequality. (Chvez & Navarro, 2005)
the difference in spatial position of the points, namely,
disparity. (Ozer et al., 2005) Distance Communication
Communication under conditions of geographic
Dispersed/Distributed Team separation that minimize the possibility of face-to-face
A team separated by some degree of physical distance. and synchronous interactions. (Murphy, 2005c)
(Connaughton, 2005)
Distance Education (DE)
Displaying Pipeline 1: Education in which there is a physical separation between
Collective term for the different stages which must be the learner and the teacher, and is usually contrasted with
passed to show graphical content on screen. (Rosenbaum on-campus education. (Taylor et al., 2005) 2: A form of
et al., 2006) instruction in which a geographical separation exists
between instructor and students; it may be same time/
Disposal different place or different time/different place. Various
Even disconnected computers may lead to cyber-identity types of technology may be used as part of this form of
theft. Careless handling or disposal of discarded computers education, with more technology required for the same-
can lead to identity theft. Furthermore, disposed hardware time format. (Simon et al., 2005) 3: A formal educational
and software may lead to cyber-identity theft. If a user process in which instruction occurs when student and
fails to take precautions such as data deletion or physical instructor are separated by geographic distance or by time.
destruction of a machine, the data are readily accessible for Instruction may be synchronous or asynchronous. Distance
the next userwhoever may ind it. (Close et al., 2006) education may employ correspondence study or audio,
video, or computer technologies. (Beck & Schornack,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
188 Dist a nc e Educ at ion a nd Tra ining Counc il (DETC) Dis t a nc e Te a ching U nive rsit y

2005) 4: A teaching method in which students do not have the range [0,1], with values close to 0 for similar elements.
to come to a speciic location in order to hear lectures or (Chang et al., 2005) 2: Used to express the similarity
D study. The learning materials reach them either by mail, between two objects. It is usually normalized in the range
through the Internet, or through other means (satellite, between 0 to 1. Examples of distance functions used for
cable). The main component of the method is usually time series data are the Euclidean Distance and the Time
written material together with additional components Warping Distance. (Kontaki et al., 2005)
such as assignments, face-to-face (or computer-mediated)
tutorials, and examinations. It involves learning outside Distance Learners Guide
of the traditional avenues of attendance at educational Originally a consumers guide to help prospective online
institutions. (Erlich & Gal-Ezer, 2005) 5: Education that students make intelligent decisions about their provider
takes place when an instructor and student are separated and the tools they will need to be successful. (S.M.
by physical distance, and various technologies (e.g., the Johnstone, 2005)
Internet, videoconferencing, etc.) are used to bridge the
distance. These types of instructional delivery systems Distance Learning: See Distance Education.
can provide non-traditional students with a second chance
at a college education, and reach those disadvantaged Distance Learning Library Service
by time constraints, physical disability, or remote Refers to one of several library services in support of
geographical locations. It is sometimes called distance college, university, or other post-secondary courses and
learning. (Paraskevi & Kollias, 2006) 6: Also known programs offered away from a main campus or in the
as correspondence education, refers to the alternative absence of a traditional campus, and regardless of where
approach to traditional classroom instruction, whereby credit is given. These courses may be taught in traditional
learning packages are delivered to the learners via multiple or non-traditional formats or media, may or may not
channels. The term is used to designate any learning that require physical facilities, and may or may not involve live
takes place between a teacher and a learner when they are interaction of teachers and students. The phrase is inclusive
not in the same place at the same time. Distance learning of courses in all post-secondary programs designated
has evolved into Web-based education due to information as: extension, extended, off-campus, extended campus,
technology, especially the Internet. (Rahman, 2005f) 7: distance, distributed, open, lexible, franchising, virtual,
Learners are connected with educational resources beyond synchronous, or asynchronous. (Buchanan, 2005)
the conines of a traditional classroom, and instructed via
computer-mediated communication and different types of Distance Learning Program
electronic technologies that can overcome the constraints of A program that typically does not meet or hold class
distance, time, physical presence, or location that separate sessions on campus. (Riffee & Sessums, 2005)
instructors and students. Learning may be synchronous
or asynchronous. (Malina, 2005) Distance Learning Satellite Transmission
A learning program transmitted via television signal from
Distance Education and Training Council a remote source and accessed locally by students through
(DETC) a receiver dish antenna. (Switala, 2005)
Established in 1926, the standard-setting agency for
correspondence study and distance education institutions. Distance Measure
(Rhoten, 2006b) One of the calculation techniques to discover the
relationship between two implicit words in a large corpus or
Distance Education Course/Program labels in a large database from the viewpoint of similarity.
1: The curriculum offered through distance education. (Ito, 2005)
(Schifter, 2005) 2: A course designed for students who are
not present in person in class. (Novitzki, 2005) Distance Teaching University
1: A university that teaches students via a wide range
Distance Function of distance education methods and technologies. (Guri-
1: A function used to compute the similarity between two Rosenblit, 2005a) 2: A university in which instructors and
multimedia elements. In particular, it returns a number in students are separated by distance and interact mainly

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dist a nc e Tra ining a nd Educ at ion (DT & E) Dist ribut ed Environm e nt 189

through communication technologies. It allows its students of the remote procedure-calling mechanism and allows
to study wherever convenient, and requires special methods calls to remote objects interacting with COM services.
of course and instructional design, as well as special (Kasi & Young, 2006)
D
organizational and administrative arrangements. (Erlich
& Gal-Ezer, 2005) Distributed Computing
The process of using a number of separate but networked
Distance Training and Education (DT&E) computers to solve a single problem. (Zwitserloot &
The process of delivering instructional resources for Pantic, 2005)
the purposes of training and education to a location (or
to locations) away from a classroom, building, or site Distributed Computing System
to another classroom, building, or site by using video, Computing distributed over networks instead of on single
audio, computer, multimedia communications, or some computers. (Kasi & Young, 2006)
combination of these with other traditional delivery
methods. (Brace & Berge, 2006) Distributed Constructionism (DC)
An extension of the Constructionism theory to knowledge-
Distanced Leadership building communities, where the online learning
Leadership of a team or organizational members that are community (instead of one student) collaboratively
separated by some degree of time and distance from their constructs knowledge artifacts. (Zaphiris et al., 2005)
leader. (Connaughton, 2005)
Distributed Data Mining
Distilled Statecharts 1: Mining information from a very large set of data spread
A statecharts-based formalism for lightweight mobile across multiple locations without transferring the data to
agents. (Fortino et al., 2006) a central location. (Jha & Sural, 2005) 2: Performing the
data-mining task on data sources distributed in different
Distributed Artiicial Intelligence (DAI) sites. (Saygin, 2005)
A subset of Artiicial Intelligence that is concerned with
the study of issues related to knowledge distribution and Distributed Database
problem solving involving a society of decentralized but A collection of multiple, logically interrelated databases
connected entities. (Tang & Sivaramakrishnan, 2005) distributed over a computer network. (Ibrahim, 2005)

Distributed Chase Distributed Delivery


A kind of recursive strategy applied to a database V, based A system whereby information or course content is
on functional dependencies or rules extracted both from delivered through several media, accessible to anyone
V and other autonomous databases, by which a null value regardless of their locations and platforms. (Aworuwa &
or an incomplete value in V is replaced by a new, more Owen, 2005)
complete value. Any differences in semantics among
attributes in the involved databases have to be resolved Distributed Desktop Training (DDT)
irst. (Ras & Dardzinska, 2005) Allows the student (employee) to avail of both audio
and video applications to enhance training by providing
Distributed Cognition interactive communication between the student and the
Cognition is understood as being derived from the trainer, without being limited by distance. (Neville &
environment. It is based on an assumption of equality Powell, 2005)
between people and artifacts in structuring practice.
(Munkvold, 2006) Distributed Environment
An environment in which different components and objects
Distributed Component Object Model (DCOM) comprising an application can be located on different
1: A set of Microsoft concepts that provides a set of computers connected to a network. (Guan, 2005d)
interfaces allowing clients and servers to communicate
within the same platform. (Zhang, 2006) 2: Sits on top

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
190 Dist ribut e d Ex pe r t ise Dist ribut e d Work

Distributed Expertise of learning situations in which the students and instructor


Cognition and knowing are distributed over individuals, are located in different localities. A bit broader than
D their tools, environments, and networks. (Muukkonen et distance education, as it can be used to refer to both
al., 2005) education and training. (Turoff et al., 2005b) 4: A set of
pedagogical strategies that integrate face-to-face with
Distributed Hash Table (DHT) online methodologies. (Ketelhut et al., 2005) 5: Using
A distributed index structure with hash table-like a wide range of information technologies to provide
functionality for information location in the Internet-scale learning opportunities beyond the bounds of the traditional
distributed computing environment. Given a key from a classroom. (Dixon et al., 2005)
pre-speciied lat identiier space, the DHT computes (in
a distributed fashion) and returns the location of the node Distributed Learning Environment
that stores the key. (Shahabi & Banaei-Kashani, 2005) A learning environment where participants are not co-
located, and use computer-based technologies to access
Distributed Knowledge Management Approach instruction and communicate with others. (Graham et
A knowledge management approach based on the duality al., 2005)
of perspective making and taking, the localization and
centralization of knowledge, and the autonomy and Distributed Model with an Object-Oriented
coordination of organizational units. In this approach, Approach
subjectivity and sociality are considered as potential Each object maintains its own state and characteristics,
sources of value rather than as problems to overcome. distinct from all others. (Gur u, 2005)
(Cuel et al., 2006)
Distributed Open Ontology
Distributed Knowledge Management Model Open ontology refers to the ontology that is represented
The model that combines the interdependence of one in standard ways (knowledge representation language and
partial product state model to others, with the idea of structured documents) and can be accessed by standard
knowledge acquisition rather than just the operational interfaces. With the advent of 3W, encoding ontology
exchange relationship. (Metaxiotis, 2006) deinitions as distributed textual Web pages supported
by Web description language and accessing methods is
Distributed Knowledge Management System adopted. In e-learning systems, it is a sharing mechanism to
A knowledge management system that supports two provide commonly agreed understanding of multi-faceted
qualitatively different processes: the autonomous knowledge for all stakeholders and services on the Web in
management of knowledge locally produced within a single e-learning applications. (Liu & Koppelaar, 2005)
unit, and the coordination of the different units without
centrally deined semantics. (Cuel et al., 2006) Distributed Organization
An organization that works across physical boundaries
Distributed Learning and time zones with multiple sites or ofices. (Huq et al.,
1: A student-centered approach to learning that 2006)
incorporates the use of technology in the learning process
and emphasizes four educational characteristics: (1) Distributed System
supports different learning styles by using mixed media, A system made up of components that may be obtained
(2) builds on the learners perspective through interactive from a number of different sources, which together work
educational experiences, (3) builds learning skills and as a single distributed system providing the run-time
social skills through collaboration among learners and infrastructure supporting todays networked computer
with the community, and (4) integrates the learning into applications. (Yow & Moertiyoso, 2005)
daily life by doing authentic tasks. (Rahman, 2005a) 2:
A type of learning made possible by technology that is Distributed Work
dependent neither on place nor time. Distributed learning Collaborative work carried out by several persons at
allows students and instructors to be at different locations different geographical locations. (Wiberg, 2005)
at the same or different times. (Klein, 2005) 3: Consists

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dist ribut ion Cha nne l DN A 191

Distribution Channel Diversity/Flexibility/Tension


The sum of all organizations or parts of an organization Diversity, both in terms of the work assignments offered and
that are involved in making a product or service available the people one interacts with, and a tolerance of differences.
D
to a customer. Distribution channels can also apply media In order to be tolerant of differences, lexibility is needed.
(e.g., the Internet or TV) in order to address customers. Also Both diversity and lexibility can lead to creative tension.
called Channel of Distribution. (Madlberger, 2006) (Torres-Coronas & Gasc-Hernndez, 2005)

Distribution Cycle Time Divide-and-Conquer


The span of time between the beginning of the shipment A well-known algorithm design strategy where the dataset
pickup and the end of the shipment delivery. (Tyan, is partitioned into blocks and each block is processed
2006) independently. The resulting block-level (local) kernels
are merged to realize the global output. It increases the
Distribution List eficiency of the algorithms in terms of both space and
An e-mail list of all participants in the virtual environment time requirements. (Murthy & Diday, 2005)
who can be contacted as a totality or divided into speciied
sub-groups. (Coakes & Willis, 2005) Division of Knowledge
The way in which knowledge is dispersed over organization
Distributive Function members, groups, and departments. The division of
An aggregate function F is called distributive if there exists knowledge varies from a low degree of differentiation
a function g such that the value of F for an n-dimensional (a high degree of redundancy) to a high degree of
cuboid can be computed by applying g to the value of F in differentiation (a low degree of redundancy). (Berends
(n + 1)dimensional cuboid. (Abdulghani, 2005a) et al., 2006)

Distributive Function of a Telecenter DK/NF: See Domain Key/Normal Form.


Set of processes that a telecenter as an open social system
carries out to foster the egalitarian distribution of its beneits DL: See Distance Learning.
and ICT growth and integration into the communitys
social dynamics. (Santos, 2005) DM: See Data Mining.

Distributive Proile DMG: See Data-Mining Group.


A part of a users proile that deines which documents
(from the relevant ones) and how should be presented to DML: See Data Manipulation Language.
him/her in a particular time moment. (Abramowicz et
al., 2006) DMO: See Destination Marketing Organization.

Distributor DMSS: See Decision-Making Support System.


A self-employed individual or a company engaged in
network marketing on behalf of a manufacturer. (D. DMT: See Data-Mining Technology.
Wright, 2005)
DNA
Divergent Thinking Technique 1: Deoxyribonucleic acid. DNA molecules carry the
One of a number of tools used during the divergent phases genetic information necessary for the organization and
of Creative Problem Solving to improve the generation of functioning of most living cells, and control the inheritance
ideas, thoughts, or data without evaluation. These tools of characteristics. (Galitsky, 2005a) 2: Nucleic acid,
are classiied according to their primary use of related or constituting the genes, codifying proteins. (Liberati et
unrelated problem stimuli. Brainstorming, brainwriting, al., 2005) 3: A speciic sequence of deoxyribonucleotide
forced connections, analogies, and metaphors are some units covalently joined through phosphodiester bonds.
of the most used divergent thinking techniques. (Torres- (Tsunoda et al., 2005)
Coronas & Gasc-Hernndez, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
192 DNS Document Type Deinition (DTD)

DNS: See Domain Name System. Document Database


1: A collection of documents associated with a system to
D Doctrine manage the documents and their content. (Lyytikinen
A category endowed with a certain collection of diagram et al., 2005) 2: A database designed for managing and
operations that allow one to perform certain logical manipulating XML documents or even more generic
manipulations with objects and morphisms. For example, in SGML documents. (Chen, 2005b) 3: A collection of
a category called logos, one can join and meet objects, take documents with a uniform user interface. (Schmidt et
images and co-images of objects under given morphisms, al., 2005)
and consider graphs (binary relations) of morphisms. In a
transitive logos, one can, in addition, consider transitive Document Frequency
closures of binary relations. Like relational algebra is The number of documents in the document collection that
an algebraic counterpart of some version of irst-order the term appears in. (Fan & Pathak, 2005)
predicate calculus, a categorical doctrine is a diagram-
algebraic counterpart of some sort of logical calculus. Document Imaging
Correspondingly, a hierarchy of logical calculi ranging Scanning and conversion of hard-copy documents to
from propositional to irst-order predicate to higher-order either analog (ilm) or digital image format. (Asprey et
predicate calculi gives rise to the corresponding hierarchy al., 2005)
of categoriesdoctrines. (Diskin, 2005)
Document Management
Document 1: Implements management controls over digital documents
Any information-bearing message in electronically via integration with standard desktop authoring tools (word
recorded form. Documents are the fundamental unit from processing, spreadsheets, and other tools) and document
which information collections are built, although they library functionality. Registers and tracks physical
may have their own substructure and associated iles. documents. (Asprey & Middleton, 2005) 2: Managing
(Trujillo, 2005) the content consisting of independent logical content units
referred to or manipulated as documents. (Honkaranta &
Document Capture Tyrvinen, 2005)
Registration of an object into a document, image, or content
repository. (Asprey et al., 2005) Document Management System
A set of information management tools that provide
Document Categorization the storage, retrieval, tracking, and administration of
A process that assigns one or more of the predeined documents within an organization. See also Content
categories (labels) to a document. (Mladeni, 2005) Management System. (Ribire & Romn, 2006)

Document Clustering Document Object Model (DOM)


1: A process that groups documents, based on their content An object-oriented model representing different
similarity, using some predeined similarity measure. components of a system and their interfaces. In XML,
(Mladeni, 2005) 2: An unsupervised learning technique DOM allows working with language elements as interactive
that partitions a given set of documents into distinct groups objects with data, methods, and events. (Arya, 2005)
of similar documents based on similarity or distance
measures. (Kim, 2005) 3: The automatic organization Document Ranking
of documents into clusters or group so that documents A function that scores documents in a collection according
within a cluster have high similarity in comparison to to their relevance to a given query so that the more
one another, but are very dissimilar to documents in other relevant a function is, the higher score it has. (Meng &
clusters. (Fung et al., 2005) Chen, 2005)

Document Cut-Off Value (DCV) Document Type Deinition (DTD)


The number of documents that the user is willing to see 1: An XML DTD is a mechanism to deine the structure
as a response to the query. (Fan & Pathak, 2005) of XML documents. It lists the various elements and
attributes in a document and the context in which they

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Doc um e nt Ve c t or Dom a in M ode l 193

are to be used. It can also list any elements a document actual data in a ield are a subset of the ields domain.
cannot contain. (Passi et al., 2005) 2: Provides guidelines (Koeller, 2005)
about how speciic elements in a document are represented
D
or which segments of data may coexist or are mutually Domain Analysis Technique
exclusive. (Hawk & Zheng, 2006) 3: A formal description Search for the larger units of cultural knowledge called
in XML declaration syntax of a particular type of document domains, a synonym for person, place, or thing. Used to
It begins with a <!DOCTYPE keyword and sets out what gain an understanding of the semantic relationships of
names are to be used for the different types of markup terms and categories. (DeLorenzo, 2005)
elements, where they may occur, the elements possible
attributes, and how they all it together. For example, a Domain Key/Normal Form (DK/NF)
DTD may specify that every person markup element must Rather than functional dependencies, DK/NF is based
have a name attribute and that it can have an offspring on domain dependencies and key dependencies only.
element called id whose content must be text. There are Although it is provable that a set of tables in DK/NF avoids
many sorts of DTDs ready to be used in all kinds of areas all anomalies, it is also provable that there is no procedure
that can be downloaded and used freely. (Zarri, 2005b) 4: for producing this normal form. (Schultz, 2005)
A set of rules deining the element types that are allowed
within an XML document, and specifying the allowed Domain Knowledge
content and attributes of each element type. Also deines all 1: A set of small domain knowledge elements makes up
the external entities referenced within the documents and domain knowledge. Domain knowledge represents all
the notations that can be used. (Pallis, Stoupa, & Vakali, topics in teaching domain and forms a complete course
2005) 5: The capability of XML to specify constraints for structure. (Wu & Chen, 2005) 2: Expertise in a given
a class of documents. A DTD deines element and attribute application area. (Hoxmeier, 2005)
names and the hierarchic structure of the elements for the
documents of a class. (Lyytikinen et al., 2005) Domain Language
1: The language, including speciic technical terms,
Document Vector phrases, and shortcuts/abbreviations of speech that are
Each document is represented by a vector of frequencies of unique and speciic to the sphere of knowledge. (Coakes
remaining items after preprocessing within the document. & Clarke, 2006b) 2: Used to learn about some speciic
(Fung et al., 2005) subject domain, for example, in an academic discipline.
This contrasts with more general learning of discussion
Document Warehouse strategies, metacognition, learning to learn, and so forth.
A document database consisting of documents gathered Vicarious learning has thus far been more effectively
from various independent sources. (Schmidt et al., shown to work in the latter type of area than in domain
2005) learning, but this may be quite sensitive to the choice of
domain. (J.R. Lee, 2005)
DOM: See Document Object Model.
Domain Model
Domain 1: A model that contains information about the course taught
1: A scope of information deinition. A domain deines in a wireless emergency service. A usual representation
a collection of information generally recognized as is a concept network specifying concepts and their
appropriate to a ield of study, a business process or relationships. (Gaudioso & Montero, 2006) 2: Codiied
function, or mission. (Fulton, 2005) 2: Combines several information about an application domain, speciically a
secondary structure elements and motifs; has a speciic domain for which a business process is being developed.
function. (Tsunoda et al., 2005) 3: Scope or range of a (Berztiss, 2006b) 3: Representation of the subject domain
subject or sphere of knowledge. (Coakes & Clarke, 2006a) at a conceptual level, often in terms of concepts and their
4: The area of interest for which a data warehouse was relationships. (Houben et al., 2006)
created. (Scime, 2005b) 5: The set of permitted values for
a ield in a database, deined during database design. The

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
194 Dom a in N a m e Dot -Com

Domain Name the domain name back to the person or organization.


Any name representing any record that exists within the (Owen, 2006d)
D domain name system (DNS), the system that attributes a
domain name to an IP address and hence to an Internet Domain-Name System (DNS)
host. Three main typologies of top-level domain (TLD) Because humans remember names more easily than long
names exist that characterize the ending part of each WWW numbers, DNS allows names to be translated into IP
address: Generic Top-Level Domain (gTLD), Country addresses. DNS is used to translate the name information
Code Top-Level Domain (ccTLD), and infrastructure for URLs and e-mail addresses. (Leath, 2005)
top-level domain. (Maggioni & Uberti, 2005)
Domain-Speciic Ontology
Domain of Rule An engineering object deining the model of knowledge
The set of attributes listed in the IF part of a rule. (Ras, in a speciic domain. The level of speciicity may be very
Tzacheva, & Tsay, 2005) deep, but the name is reserved for those ontologies that
are not dependent on speciic applications. (Cristani &
Domain Ontology Cuel, 2006)
Either a domain-specific or an application-specific
ontology. (Cristani & Cuel, 2006) Domestic Product Design
A process of producing a useful, usable, desirable, and
Domain Restriction attractive product in which the design process is grounded
A condition, usually formulated in irst-order logic, that in the principles of human factors, engineering and
deines the set of values that an attribute or variable may manufacturing processes, marketing, and aesthetics.
have. In database terminology, a domain restriction is a kind (Aurum & Demirbilek, 2006)
of integrity constraint. (Aldana Montes et al., 2005)
Domestication of Technology
Domain-Name Back Order Social learning through which users incorporate an
A service provided by domain-name registrars that will introduced technology into their lives by a process of
watch for a domain name to be released upon expiration negotiation and translation, practical activity, and the
and will automatically register that name for the client utilization of local knowledge. (Gibbs et al., 2005)
when this happens. (Owen, 2006d)
Door-to-Door Delivery
Domain-Name Grabbing Shipping service from shippers door to receivers door.
Registering an abandoned or lapsed domain name (Tyan, 2006)
immediately after it is released by a registrar. (Owen,
2006d) Dot Map
A map in which the geographic locations of events, people,
Domain-Name Hijacking or other entities are depicted as points or dots. (Garb &
Obtaining a domain-name transfer of ownership through Wait, 2005b)
fraud. (Owen, 2006d)
Dot Product Queries
Domain-Name Speculation A class of queries where the query answer can be seen
Registering or purchasing a domain on the speculation as the inner product between a vector dependent only on
that it could be used in the future to drive trafic or can be the query and a vector dependent on the data. (Shahabi
resold in the future at a higher amount. (Owen, 2006d) et al., 2005)

Domain-Name Squatting Dot-Com


Registering a trademark, an organizations name, or a 1: A company with operations that are entirely or primarily
persons name as a domain name with the intention to Internet based or, more speciically, a company with a
proit from trafic to an unrelated Web site or by reselling business model that would not be possible if the Internet

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dot -Com Bubble Dra m a Se ria l 195

did not exist. Dot-coms often deliver all their services taxation happens when comparable taxes are imposed by
over an Internet interface, but products might be delivered two or more taxing jurisdictions on the same taxpayer in
through traditional channels as well. Dot-coms are often respect of the same taxable income or capital. (Raisinghani
D
divided into two categories: those that provide products & Petty, 2005)
and services for consumers (B2C) and those that provide
products and services to other businesses (B2B). (Sharma Double-Knit Organization
& Wickramasinghe, 2005) 2: An electronic retailer that An organization where people work in teams for projects,
operates exclusively through one distribution channel. but importantly also belong to a much more enduring and
By nature, dot-coms are non-store-based retailers. Also lasting community of practice in order to keep their skills
known as pure player. (Madlberger, 2006) sharp. (Ray, 2006)

Dot-Com Bubble Double-Loop Learning


1: Refers to the late 1990s during which countless dot-com Together with single-loop learning, describes the way in
companies were booming with a frenzy of investment in which organizations may learn to respond appropriately
Internet-related technical stocks and enterprises. (Hwang & to change. Single-loop learning requires adjustments
Stewart, 2006) 2: The exaggerated enthusiasm in Internet to procedures and operations within the framework of
companies with the overvaluation of high-technology customary, accepted assumptions, but fails to recognize
stocks in the late 1990s. (Tian & Stewart, 2006) or deal effectively with problems that may challenge
fundamental aspects of organizational culture, norms,
Dot-Com Bust or objectives. Double-loop learning questions those
Refers to the years 2000 to 2002, when dot-com industry assumptions from the vantage point of higher order, shared
collapsed and hundreds of dot-com companies went views, in order to solve problems. (Vat, 2005b)
bankrupt due to the NASDAQ crash starting in March
2000. (Hwang & Stewart, 2006) Down-Sampling
Discarding every M-1 sample (retaining every Mth sample).
Dot-Com Company (Mili, 2005)
1: A company that conducts its primary business on
the Internet. It is called dot-com company because the Downlink
companys URL ends with .com. (Tian & Stewart, 2006) The communication link from a satellite to an Earth station.
2: A company using the Internet as its primary means to (Statica & Deek, 2006)
conduct business. The companies typically use the .com
sufix in company name. (Hwang & Stewart, 2006) Download
To move a digital ile (such as a media ile) from a server
Dot-Com Crash where it is stored to a local system for viewing or editing.
The stock market crash of Internet companies in 2000 (Cosemans, 2005a)
and 2001, many of which failed during the crash. Those
companies were overvalued before the crash. (Tian & Download Delay/Download Time
Stewart, 2006) The amount of time needed for elements to appear on a
Web page on the client computer after the page is accessed
Double Talk from the server. (Hantula, 2005)
An interference produced when the speakers at both ends
of a telephone line simultaneously speak. This phenomenon Drama Serial
greatly disturbs the echo canceller performance. (Perez- An ongoing story told in dramatic form incorporating
Meana & Nakano-Miyatake, 2005) sound effects, music, dialogue, and/or narration. It may be
broadcast once, twice, or several times in a week, and it
Double Taxation is usually from 15 to 30 minutes in duration. Sometimes,
When the same taxable item is taxed more than once by it is referred to as a soap opera. (Craddock & Duncan,
either the same or by different government agencies, there 2005)
is said to be double taxation. The juridical type of double

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
196 Dra m a Se rie s Dua l-M ode I nst it ut ion

Drama Series IPMP system and is assigned by a registration authority.


A story told in dramatic form with a ixed number of (Wang, Cheng, Cheng, & Huang, 2006)
D episodes. (Craddock & Duncan, 2005)
Drug Discovery
Drawing Management System A research process that identiies molecules with desired
Implements repository management controls over digital biological effects so to develop new therapeutic drugs.
drawings by integration with CAD authoring tools and (Kusiak & Shah, 2005)
using document library functionality. Registers and tracks
physical drawings. (Asprey & Middleton, 2005) DSA: See Data Staging Area.

Drawing Program DSL: See Digital Subscriber Line; Digital Subscriber


A software program that creates digital images. (Judd, Loop.
2005)
DSMS: See Data Stream Management System.
DRE: See Digital Rights Expression System.
DSS: See Decision Support System.
DRE System: See Direct Recording Electronic
System. DSSS: See Direct Sequence Spread Spectrum.

DREAM: See Design Rationale Environment for DSV-IS: See Design, Speciication, and Veriication of
Argumentation and Modeling. Interactive Systems.

Drill Down/Roll Up DT&E: See Distance Training and Education.


1: A method of exploring multi-dimensional data by
moving from one level of detail to the next. (Sethi & Sethi, DTD: See Document Type Deinition.
2006b) 2: The process of navigating from a top-level view
of overall sales down through the sales territories, to DTOA: See Differential Time of Arrival.
the individual salesperson level. This is a more intuitive
way to obtain information at the detail level. Drill-down DTV: See Digital Television.
levels depend on the granularity of the data in the data
warehouse. Roll up is the opposite function. (Nigro & DTW: See Dynamic Time Warping.
Gonzlez Csaro, 2005b) 3: User interface technique
to navigate into lower levels of information in decision Dual-Channel Assumption
support systems. (DeLorenzo, 2005) 4: Typical OLAP Based on the notion that working memory has two sensory
operation by which aggregate data are visualized at a channels, each responsible for processing different types
iner (coarser) level of detail along one or more analysis of input. The auditory or verbal channel processes written
dimensions. (Tininini, 2005c) 5: A cube operation that and spoken language. The visual channel processes images.
allows users to navigate from summarized cells to more (Boechler, 2006b)
detailed cells. (Abdulghani, 2005b) 6: Opposite operation
of the previous one. (Schneider, 2005) Dual-Mode Distance Teaching University
A university that teaches concurrently on-campus and
DRM: See Digital Rights Management. off-campus students. Usually, the same admission
requirements and the same study materials apply to both
DRM Hook categories of students. (Guri-Rosenblit, 2005a)
Also known as an IPMP hook, this was developed in 1999
and standardized by MPEG-4 in 2000. It allows proprietary Dual-Mode Institution
DRM systems to be used within an MPEG-4-compliant 1: An organization that delivers some courses on-site and
terminal by associating the IPIDS of an IPMP system some courses off-site using distance delivery methods.
with each audiovisual object. The IPIDS is unique for any (Ally, 2005d) 2: An institution that simultaneously offers

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dua l-Ta sk St udy Dyna m ic Digit a l De libe rat ion 197

on-campus courses and distance education courses. DVB: See Digital Video Broadcasting.
(Graham, Allen, et al., 2005)
DVC: See Desktop Video Conferencing; Document Cut-
D
Dual-Task Study Off Value.
A study in which two tasks are performed concurrently
to observe changes in task interference. Usually the DVD: See Digital Versatile Disc.
participant is expected to or asked to focus on the primary
task so that interference is observed only in the secondary DVP: See Delivery-vs.-Payment.
task, but this is not necessarily always the objective.
Observations of task interference are taken to suggest DWL: See Data Warehouse Library.
that the limits of the processing system are being reached.
(Owen, 2006c) DWT: See Discrete Wavelet Transformation.

Duality of Structure Dyadic Communication


The concept in structuration theory that structure is the Refers to communication between two people: the source
medium and the outcome of the conduct it recursively and the receiver. A dyadic approach to communication
organizes. (Saunders, 2006) stresses the role of the relationship between the source
and the receiver. (Jacobson, 2006)
Dublin Core
1: A set of 15 metadata ields, such as title and author, Dynamic Bandwidth Allocation
commonly used by library systems to manage digital assets. Using algorithms with the MPCP arbitration mechanism
All ields are optional. (Verhaart & Kinshuk 2006) 2: A to determine the collision-free upstream transmission
widely accepted standard for metadata about electronic schedule of ONUs and generate GATE messages
documents. Maintained by the Dublin Core Metadata accordingly. (Freire et al., 2005)
Initiative. (Hnisch, 2005)
Dynamic Clustering
Duplicate Document Detection A scheme to discover simultaneous clusters and their
The technique to ind the exact duplicates, which have representations in such a way that they it together
exactly the same content, or partial duplicates, which optimally. The cluster representation is called a Kernel.
have a large percentage of their text in common. (Chan, Mean is a special case of kernel, as in k-means. (Murthy
Ho, et al., 2005) & Diday, 2005)

Duplicate Document Image Retrieval (DDIR) Dynamic Complexity


A system for inding the image-formatted duplicate of How much the communication process depends on time
documents from a database. (Chan, Ho, et al., 2005) constraints, unclear or deicient feedback, and changes
during the process. (Willis, 2005)
Dutch Auction
1: A descending-bid auction in which the price of an Dynamic Conceptual Network
item is lowered until it gets the irst bid, which is the A hierarchical tree for developing the interrelations among
highest price the customer is willing to pay. (Blecker & learning concepts. Each learning concept is stored as
Abdelkai, 2006) 2: A popular kind of auction at many a concept node in the dynamic conceptual network. A
sites, commonly used when a seller has a number of the concept node includes contents, tasks, and attributes. The
same items to sell, for example, 10 posters. The auctioneer contents are represented by text, graphs, audio, and/or
starts with a high asking price. The seller then gradually video, and these contents are stored in a knowledge base.
decreases the offer price, and the irst person to bid is the (Leung & Li, 2005)
winner. (Lei et al., 2005b)
Dynamic Digital Deliberation
Duties Includes applications that are two-way or dialogical, such
The correlative of rights, since rights by their nature impose as digital town hall meetings and digital policy forums.
duties. (Gilbert, 2005) (Holzer & Schweste, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
198 Dyna m ic E-Busine ss Dyna m ic Sa m pling (Ada pt ive Sa m pling)

Dynamic E-Business Dynamic Personalization


The next generation of e-business focusing on the End-user tailoring that occurs during the regular use of
D integration and infrastructure complexities of B2B by the system within a context of a user task, as opposed to
leveraging the beneits of Internet standards and a common a speciic context-free activity directed at the selection of
infrastructure to produce optimal eficiencies for intra- and customization options. (Babaian, 2005)
interenterprise computing. (Jain & Ramesh, 2006)
Dynamic Perspective
Dynamic Feature Extraction The therapeutic approach based on a transference
Analysis and description of the media content at the time relationship between patient and therapist, and which
of querying the database. The information is computed includes psychoanalysis but also nineteenth-century
on demand and discarded after the query is processed. approaches such as magnetism and hypnosis. Dynamic
(Geisler & Kao, 2005; Bretschneider & Kao, 2005) psychiatry is a term invented by historians in the
early 1940s to describe the development of therapeutic
Dynamic Graph methods interested in the psycho-genesis of mental
Graph representing a constantly changing stream of data. illnesses. It takes from psychiatry its classiications and
(Holder & Cook, 2005) clinical approach; from psychology, the postulate of
the dual reality of body and mind, and the proposal of
Dynamic Group Interaction Model the technique of observation of the subjects; and from
In this model elements of several theories with regard to the ancient tradition of witchcraft, the idea itself of
group performance are brought together. Three levels of transferential cure. Apart from the historiography context,
behavior are taken into account: individual goal-directed in current use the term psychodynamic is directly linked
behavior, group processes, and a macro-social perspective. to a psychoanalytical approach. The technical term of
The various notions are brought together in a heuristic transference belongs to psychoanalytical theory, as
model concerning group processes. They are related to previously the term suggestion was used. However, the
traditional input-process-output schemas. (Verburg et historical interpretation of connecting psychoanalysis with
al., 2005) anterior approaches risks reducing the rich and complex
content of the speciic use that transference holds within
Dynamic Hypertext Markup Language psychoanalytic theory. Nevertheless, the full potential of
(DHTML) psychoanalysis cannot be adequately understood without
1: The new standard of HTML which adds scripting a reasonable understanding of its context and historical
language and styling capabilities to HTML, hence allowing conditions for emergence. (Nobre, 2006b)
users more interactive sessions and layout changes of the
Web pages. (Gaffar & Seffah, 2005) 2: A collective term Dynamic Planning System
for a combination of new HTML tags and options, style A three-staged model identifying different approaches to
sheets, and programming, which enable one to create Web planning at different stages of e-business growth. (Burn
pages that are more interactive and faster to download. & Ash, 2006)
(Dez-Higuera & Daz-Pernas, 2005)
Dynamic Programming
Dynamic Model A method for deriving the optimal path through a mesh.
A UML model describing dynamic behavior such as For a Hidden Markov Model (HMM), it is also termed the
state changes, triggers, and object type operations. (D. Viterbi algorithm and involves a method for deriving the
Brandon, Jr., 2005a) optimal state sequence, given a model and an observation
sequence. (Caelli, 2005)
Dynamic Model of a Relationship Between
Paradigms Dynamic Sampling (Adaptive Sampling)
Following Kuhns (1962) concepts of scientiic paradigms, A method of sampling where sampling and processing of
the model of the relationship between KM and IC is data proceed in tandem. After processing each incremental
dynamic and entwined in other dominant paradigms in part of the sample, a decision is made whether to continue
the correlating and overlapping scientiic and practitioners sampling or not. (Lutu, 2005)
communities. (Ariely, 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dyna m ic T im e Wa rping (DT W) Dyst opia 199

Dynamic Time Warping (DTW) Dynamic Weighting


Sequences are allowed to be extended by repeating Reassigning weights on the data points in each iteration
individual time series elements, such as replacing the of an iterative algorithm. (B. Zhang, 2005)
D
sequence X={x1,x2,x3} by X={x1,x2,x2,x3}. The distance
between two sequences under dynamic time warping is Dynamics (of Organization)
the minimum distance that can be achieved by extending Change in an organizations structure (see Structural
both sequences independently. (Denton, 2005) Dynamics) or operation (see Operational Dynamics) along
the time, when time as a parameter is indispensable for the
Dynamic Topic Mining organization, or some aspect of organization, description,
A framework that supports the identiication of meaningful and analysis. Otherwise, although the organizations state
patterns (e.g., events, topics, and topical relations) from changes, if the time as a parameter can be disregarded,
news stream data. (Chung et al., 2005) the organization, or some aspect of the organization,
is considered static. The organizations state changes
Dynamic Topology frequency, state change time, and intensity are examples
Due to the node mobility, the network topology of mobile of an organizations dynamics features and performance
multi-hop ad hoc networks are changing continuously in measures. (Cunha & Putnik, 2005)
time. (Erbas, 2005)
Dystopia
Dynamic Touch The converse of Utopia, a dystopia is any society considered
An experience in cyberspace designed by a professional to be undesirable. It is often used to refer to a ictional
communicator to stimulate emotional responses that will (often near-future) society where current social trends
help advance the interests of the communicators client are taken to terrible and socially destructive extremes.
organization. (Galloway, 2006) (Macfadyen, 2006b)

Dynamic Virtual Enterprise


A set of business partners are linked dynamically on
demand and according to customer requirements through
the development of a virtual marketplace. (Tahinakis et
al., 2006)

Dynamic (Visual) Hierarchy


An alternative mechanism for presenting keywords that is
based on a recognition paradigm and can be dynamically
updated. Keywords are arranged in a tree hierarchy to
facilitate links to keyword phrases and enable browsing.
(Corral et al., 2006)

Dynamic Web Page


1: A virtual page dynamically constructed after a client
request. Usually, the request is managed by a speciic
program or is described using a speciic query language
whose statements are embedded into pages. (Sindoni,
2005b) 2: A Web page whose content varies according
to various events (e.g., the characteristics of users, the
time the pages are accessed, preference settings, browser
capabilities, etc.). An example would be the results of a
search via search engine. (Falk & Sockel, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
200 E- E-Certiicate

E
E- E-Business Model: See Electronic Business Model.
Oftentimes used without the hyphen, the e originally
stood for electronic, as in online. Today the term is E-Business Opportunity: See Electronic Business
used rather freely to describe any situation or solution that Opportunity.
has made the migration from real world to the Internet.
(Passi et al., 2005) E-Business Option: See Electronic Business Option.

E-Administration: See Electronic Administration. E-Business Outcome: See Electronic Business


Outcome.
E-Administrator: See Electronic Administrator.
E-Business Performance Gain: See Electronic
E-ASEAN Business Performance Gain.
A concept capturing the essence of the intent to establish
electronic links at all levels between ASEAN countries. E-Business Planning and Analysis Framework: See
(Sanzogni & Arthur-Gray, 2005) Electronic Business Planning and Analysis Framework.

E-Assessment Project: See Electronic Assessment E-Business Policy Group: See Electronic Business
Project. Policy Group.

E-Auction: See Electronic Auction. E-Business Strategy: See Electronic Business


Strategy.
E-Bario Project
A research initiative undertaken by the Universiti Malaysia E-Business System: See Electronic Business System.
Sarawak (UNIMAS) to demonstrate the many ways in
which ICT can be used to help marginalized and remote E-Business Technology: See Electronic Business
communities in Malaysia to develop socially, culturally, Technology.
and economically. (Gnaniah, Songan, et al., 2005)
E-Business Value Model: See Electronic Business
E-Bedian Project Value Model.
A research initiative by the Universiti Malaysia Sarawak
(UNIMAS) modeled after the E-Bario research project. E-Capability: See Electronic Capability.
(Gnaniah, Songan, et al., 2005)
E-Capability Maturity Level: See Electronic
E-Business: See Electronic Business. Capability Maturity Level.

E-Business Change: See Electronic Business E-Capacity: See Electronic Capacity.


Change.
E-Catalog: See Electronic Catalog.
E-Business Environment: See Electronic Business
Environment. E-Certiicate: See Electronic Certiicate.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
E-Channel E-Fulillment Capability 201

E-Channel: See Electronic Channel. E-CRM


1: A subset of CRM that focuses on acquiring a thorough
E-Citizen: See Electronic Citizen. understanding of an organizations online (via the Internet)
E
visitors and customers to create and maintain online
E-Cluster: See Electronic Cluster. loyalty. (Van Dyke et al., 2006) 2: The fusion of a process,
a strategy, and a technology to blend sales, marketing,
E-Collaboration/Collaborative Commerce: See and service information to identify, attract, and build
Electronic Collaboration/Collaborative Commerce. partnerships with customers. (Borders & Johnston, 2005)
3: A strategy that companies use to identify, manage, and
E-Collaboration Technology: See Electronic improve relationships with their most proitable online
Collaboration Technology. customers to create long-term value for the irm when a
companys customer service operations are on the Internet,
E-Commerce: See Electronic Commerce. using e-mail, fax, Internet call centers, FAQs, online chats,
and Web-based forums. (Gupta & Iyer, 2005)
E-Commerce Beneit: See Electronic Commerce
Beneit. E-CRM Analytics
The process of analyzing and reporting online visitor and
E-Commerce Business Model: See Electronic customer behavior patterns with the objective of acquiring
Commerce Business Model. and retaining customers. (Van Dyke et al., 2006)

E- Commerce Disadvantage: See Electronic E-Deliberation: See Electronic Deliberation.


Commerce Disadvantage.
E-Democracy Technique: See Electronic Democracy
E-Commerce Driving Force: See Electronic Technique.
Commerce Driving Force.
E-Democracy/Teledemocracy: See Electronic
E-Commerce Security Course: See Electronic Democracy/Teledemocracy.
Commerce Security Course.
E-Discourse: See Electronic Discourse.
E-Commerce Strategy: See Electronic Commerce
Strategy. E-Document: See Electronic Document.

E-Commerce Study: See Electronic Commerce E-Dyad: See Electronic Dyad.


Study.
E-Education: See Electronic Education.
E-Commerce System Simulation: See Electronic
Commerce System Simulation. E-Enrollment: See Electronic Enrollment.

E-Communication: See Electronic Communication. E-Fluentials: See Electronic Inluentials.

E-Community: See Electronic Community. E-Folio: See Electronic Portfolio.

E-Consultation: See Electronic Consultation. E-Forum: See Electronic Forum.

E-Course: See Electronic Course. E-Fulillment: See Electronic Fulillment.

E-Crime: See Electronic Crime. E-Fulillment Capability: See Electronic Fulillment


Capability.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
202 E-Gove r na nc e E-Life st yle

E-Governance: See Electronic Governance.


E-Learning Development Team: See Electronic
E E-Government: See Electronic Government. Learning Development Team.

E-Government Integration Stage: See Electronic E-Learning Environment: See Electronic Learning
Government Integration Stage. Environment.

E-Government Internet Security: See Electronic E-Learning Evaluation Framework: See Electronic
Government Internet Security. Learning Evaluation Framework.

E-Government Interoperability: See Electronic E-Learning Experience: See Electronic Learning


Government Interoperability. Experience.

E-Government Portal: See Electronic Government E-Learning Framework: See Electronic Learning
Portal. Framework.

E-Government Stage: See Electronic Government E-Learning Management System: See Electronic
Stage. Learning Management System.

E-Gradebook: See Electronic Gradebook. E-Learning Market: See Electronic Learning


Market.
E-Health: See Electronic Health.
E-Learning Platform: See Electronic Learning
E-Hierarchy: See Electronic Hierarchy. Platform.

E -H I M: See Elect ronic Health Infor mation E-Learning Process: See Electronic Learning
Management. Process.

E-Hub: See Electronic Hub. E-Learning Program: See Electronic Learning


Program.
E-Innovation: See Electronic Innovation.
E-Learning Program Strategic Plan: See Electronic
E-Journal: See Electronic Journal. Learning Program Strategic Plan.

E-Journalism: See Electronic Journalism. E-Learning Study Skill: See Electronic Learning
Study Skill.
E-Knowledge: See Electronic Knowledge.
E-Learning Support and Development Team: See
E-Knowledge Network: See Electronic Knowledge Electronic Learning Support and Development Team.
Network.
E-Learning System: See Electronic Learning
E-Lab: See Electronic Lab. System.

E-Learner: See Electronic Learner. E-Learning Technology: See Electronic Learning


Technology.
E-Learning: See Electronic Learning.
E-Lib: See Electronic Libraries Program.
E-Learning Application: See Electronic Learning
Application. E-Lifestyle: See Electronic Lifestyle.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
E-M a rke t E-Ta ile r 203

E-Market: See Electronic Learning Management E-Partnership: See Electronic Partnership.


System.
E-Petition: See Electronic Petition.
E
E-Loyalty: See Electronic Loyalty.
E-Policy: See Electronic Policy.
E-Mail: See Electronic Mail.
E-Politics: See Electronic Politics.
E-Mail Aliasing: See Electronic Mail Aliasing.
E-Portfolio: See Electronic Portfolio.
E-Mail Bomb: See Electronic Mail Bomb.
E-Press: See Electronic Press.
E -Mai l Management: See Elect ronic Mail
Management. E-Procurement: See Electronic Procurement.

E-Mail Newsletter: See Electronic Mail Newsletter. E-Questionnaire: See Electronic Questionnaire.

E-Mail Protocol: See Electronic Mail Protocol. E-R Model: See Entity-Relationship Model.

E-Mall E-Readiness: See Electronic Readiness.


A number of e-shops that serve as a gateway through which
a visitor can access other e-shops. (Tatnall et al., 2006) E-Research: See Electronic Research.

E-Market: See Electronic Market. E-Retailer: See Electronic Retailer.

E-Marketing: See Electronic Marketing. E-Rollment: See Electronic Enrollment.

E-Marketplace: See Electronic Marketplace. E-Sales Cycle: See Electronic Cycle.

E-Marketplace Portal: See Electronic Marketplace E-Science: See Electronic Science.


Portal.
E-Service: See Electronic Service.
E-Marketplace Technology Course: See Electronic
Marketplace Technology Course. E-Service Catalog: See Electronic Service Catalog.

E-Meeting: See Electronic Meeting. E-Service Quality: See Electronic Service Quality.

E-Mentor: See Electronic Mentor. E-Social Contract: See Electronic Social Contract.

E-Model: See Electronic Model. E-Society: See Electronic Society.

E-Negotiation: See Electronic Negotiation. E-Store: See Electronic Store.

E-OTD: See Enhanced Observed-Time-Difference E-Strategy: See Electronic Strategy.


Method.
E-Supply Chain: See Electronic Supply Chain.
E-PAF: See E-Business Planning and Analysis
Framework. E-Survey: See Electronic Survey.

E-Participation: See Electronic Participation. E-Tailer: See Electronic Tailer.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
204 E-Ta iling Ec ologic a l M e t a phor

E-Tailing: See Electronic Retailing. Eavesdropping


The ability for one to access a call and, either in real
E E-Technology: See Electronic Technology. time or after, reconstruct the conversation. (Wilsdon &
Slay, 2005)
E-Tendering: See Electronic Tendering.
EBBSC
E-Text: See Electronic Text. A balanced scorecard-based framework to formulate and
evaluate e-business strategy consisting of four perspectives:
E-Ticket: See Electronic Ticket. business model, analytic e-CRM, process structure, and
e-knowledge network. (Wang & Forgionne, 2006)
E-Trust: See Electronic Trust.
EBPG: See E-Business Policy Group.
E-Tutor: See Electronic Tutor.
EBS: See Electronic Brainstorming System.
E-Vite: See Electronic Invitation.
EBXML: See Electronic Business XML.
E-Voting: See Electronic Voting.
EC: See Electronic Commerce.
E-WOM: See Electronic Word-of-Mouth.
EC Techno-Structure: See Electronic Commerce
E-Work: See Electronic Work. Techno-Structure.

EAI: See Enterprise Application Integration. ECA Rule


A (business) rule expressed by means of an event, a
EAI Technology condition, and an action. (Cilia, 2005)
Software systems that provide business-to-business
integration functionality by sending and receiving ECMA: See European Computer Manufacturers
messages, and retrieving and storing them in back-end Association.
application systems. (Bussler, 2005b)
ECMS: See Enterprise Content Management System.
EAP: See Extensible Authentication Protocol.
ECN: See Electronic Communication Network.
Earcon
Abstract, synthetic sounds used in structured combinations Ecological Fallacy
whereby the musical qualities of the sounds hold and convey The relationship between geographical variation in disease
information relative to application objects or activities. incidence or mortality and explanatory covariates (e.g.,
(Lumsden, 2005) environmental agents or lifestyle characteristics) measured
on groups is often interpreted as a proxy of the relationship
Early Adopter between disease and exposure in individuals. However,
One who embraces change and is the most likely to adopt the association observed at the group or ecological level
technological innovations quickly. (Salter, 2005c) will not necessarily represent the association between the
corresponding variables at the individual level. This type
Easy PHP of bias is known as ecological fallacy. (Vidal-Rodeiro et
Software application written in the dynamic PHP language al., 2005)
that combines an Apache Web server and a MySQL
database to create lexible Web development tools. Ecological Metaphor
(Boateng & Boateng, 2006a) A way of describing a complex situation, such as IS
curriculum development, by providing a way of allowing

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ec ologic a l N iche Edit Dist a nc e 205

for the inclusion of complexity, and a language and set Economies of Scale
of analytical and descriptive tools from the ecological 1: The achievement of lower average cost per unit through
sciences. (Tatnall & Davey, 2005) increased production, or the decrease in the marginal cost
E
of production as a irms extent of operations expands.
Ecological Niche (D. Kim, 2005) 2: The notion of increased eficiency for
A place where a particular species that is well suited to the production and/or marketing of goods/products by
this environment is able to thrive, where other species pooling or sharing resources. (Braun, 2006) 3: Supply-side
may not. (Tatnall & Davey, 2005) economies of scalereductions in unit costs resulting
from increased size of operations. Demand-side economies
Ecological System of scalethe value of a technology or product increases
The organization and interactions of communities of living exponentially as the number of users increase (network
things, together with the chemical and physical factors in effects lead to demand-side economies of scale). (C.-S.
their environment. (OLooney, 2006) Lee, 2005) 4: The notion of increased eficiency for the
production and/or marketing of goods/products by pooling
Economic Evaluation or sharing resources. (Braun, 2005a)
This approach to evaluation views IT/IS as an investment
or a business facilitation project. Therefore, the focus Economies of Scope
of evaluation shifts from the performance of the IS per Supply-side economies of scopecost of the joint
se to the quality of its outputs (e.g., information) and production of two or more products can be less than the cost
their utilization (e.g., customer satisfaction, creation of of producing them separately. Demand-side economies of
business value). Here the evaluation of IT investments is scopea single set of digital assets can provide value for
based on an organizational analysis that emphasizes the customers across many different and disparate markets.
achievement of predetermined outcomes as a measure (C.-S. Lee, 2005)
of effectiveness (e.g., critical success factors, business
objectives/strategy). In other words the worth of an Ecosystem
IS is sought in the systems performance and inancial 1: The ecosystem represented by the curriculum in a
proitability. (Serafeimidis, 2005) university information systems department contains
(at least) the following species: lecturers, researchers,
Economic Order Quantity (EOQ) students, professional bodies, university administrators,
An approach to deining the lot size for purchasing raw and representatives of the computer industry. (Tatnall
materials, the EOQ is a mathematical expression of the & Davey, 2005) 2: The entire ecological community
trade-off between ordering costs (for purchased items) composed of all living organisms interacting with the
or set-up costs (for manufactured items) and the cost of physical environment as one system. (Targowski, 2005)
storing material as inventory. If set-up or ordering costs
are high, it may make sense to deal in larger batches, with EDA: See Exploratory Data Analysis.
the inherent knock-on effect of increasing inventory costs.
(Carton & Adam, 2005) EDGE: See Enhanced Data Rates for GSM Evolution.

Economic Risk EDI: See Electronic Data Interchange.


A risk derived from increased transaction costs that lead
to reduced inancial returns. (Ratnasingam, 2005) EDIFACT: See Electronic Data Interchange for
Administration, Commerce, and Transport.
Economic Value Added (EVA)
An attempt to measure value over and above return of Edit Distance
costs, and includes many of the intangibles. A typical A measure of string similarity that counts the number of
approach would combine some form of ROI and QWL. character insertions, deletions, and substitutions needed
(Burn & Ash, 2006) to convert one string into the other. (Navarro, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
206 Edit Re st ra int Educ at iona l Ta sk

Edit Restraint programs, adding courses, and asking questions of the


A logical restraint such as a set of business rules that instructor. (Bagwell, 2005)
E assures that an employees listed salary in a job category
is not too high or too low, or that certain contradictory Educational Evaluation
conditions, such as a male hysterectomy, do not occur. Assessment of the educational value of a piece of
(Winkler, 2005) educational software. (Karoulis & Pombortsis, 2005a)

Edit Script Educational Hypermedia


A set of instructions that walk and update a document A Web-based learning environment that offers learners
database node by node. (Schmidt et al., 2005) browsing through the educational content supported by
lexible user interfaces and communication abilities.
Editing Procedure (Magoulas, 2006)
The process of detecting and handling errors in data. It
usually includes three phases: the deinition of a consistent Educational Modeling Language (EML)
system of requirements, their veriication on given data, and Developed by the Open University of The Netherlands;
elimination or substitution of data that is in contradiction since 1998, EML is a notational method for e-learning
with the deined requirements. (Conversano & Siciliano, environments based on a pedagogical meta-model that
2005) considers that didactic design plays a main role. (Garca,
Berlanga, & Garca, 2006)
Editorial Metadata
Metadata obtained manually, by a pool of experts. (Pachet, Educational Organization Structure
2006) The rules and resources offered by the internal educational
institution that are derived from how it is organized, as
EDMS: See Enterprise Document Management well as program requirements, curriculum, and course
System. objectives. (LeRouge & Webb, 2005)

Education Educational Panacea


Formation or instruction process of an individual by The view that technology might be the cure-all or holy
means of the interiorization and assimilation of new assets grail of education. (Salter, 2005a)
of knowledge and capabilities. (Andrade, Ares, Garca,
Rodrguez, Seoane, et al., 2006) Educational Software
Software packages supporting speciic goals in the
Education Process education of target groups, for example, primary school
The use of learning models and supporting learning tutees or impaired children. (Utsi & Lowyck, 2005)
technologies to deliver the learning experience and/or
training with students. (LeRouge & Webb, 2005) Educational Software Development Team
A software development team in a university setting is
Education Process Model multi-faceted and multi-skilled, requiring the skills of
A basic systems model that consists of resources and project managers, subject matter experts, educational
philosophy as inputs; an integrative process of objectives, designers, programmers, graphic designers, interface
methodology, audiences, and instructional technology; designers, IT support staff, editors, and evaluators. In
the outputs of outcomes and experiences; and assessment many cases, one person can assume more than one role.
feedback. (Beck & Schornack, 2005) (Williamson et al., 2006)

Educational Coordinator (Prison) Educational Task


A prison staff member who serves as an intermediary One of several tasks directly associated with the delivery
between a distance learning instructor and the prisoner. of the educational component to students (e.g., lecturers,
An educational coordinator aids prisoners in applying to tutorials, assessment, and so forth). (Darbyshire & Burgess,
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Educational Technology Eficacy 207

Educational Technology incorporating new technology. It has as its principal


1: A ield of study grounded in theories of learning and objective the successful integration of company objectives
instructional design. Educational technology draws with the needs of employees and customers. (Singh &
E
inspiration from other fields and disciplines, such Kotze, 2006)
as psychology, communications, management, and
technology, and focuses on determining the most effective Effective Use
and eficient methods for positively impacting knowledge, 1: The capacity and opportunity to integrate information
learning, and human performance. (Schaffer et al., 2006) and communication technology into the accomplishment
2: Application of one or more electronic or computer- of self- or collaboratively identiied goals. What is most
based devices used in delivering education. (Hantula & important is not so much the physical availability of
DeRosa, 2005) 3: Systematic identiication, development, computers and the Internet, but rather peoples ability to
organization, or utilization of educational resources, make use of those technologies to engage in meaningful
and the management of these processes. The term is social practices. (Kvasny & Payton, 2005) 2: The use
occasionally used in a more limited sense to describe the of communication technology that is fully adaptive
use of multimedia technologies or audiovisual aids as tools and responsive to local needs and goals. Closely related
to enhance the teaching and learning process. (Kinuthia, to community development. (Geiselhart & Jamieson,
2005) 4: Technology used in formal educational contexts, 2005)
such as classrooms. Recent examples are television,
personal computers, and the Internet. (Carroll, 2005) 5: Effectiveness
The use of technology to enhance individual learning and 1: A measure of performance that speciies whether
achieve widespread education. (Magoulas, 2006) the system achieves its longer-term goals or not. (Abu-
Samaha, 2005) 2: A very general goal that refers to how
Educational Television good a system is at doing what it is supposed to do. (Yong,
Generally refers to a television program that has a broad 2005) 3: Explores whether it is an appropriate approach
cultural purpose, such as Sesame Street in America. to assess the learning outcomes. (Diamadis & Polyzos,
(Berg, 2005d) 2005) 4: In the context of IT, this is the measurement
of the capacity of the outputs of an information system
EduPortal or of an IT application to fulill the requirements of the
A portal geared toward education that provides single company and to achieve its goals, making this company
sign-on access to academic and administrative resources more competitive. In a few words, effectiveness can be
for students, staff, and faculty. (Hazari, 2006) understood as the ability to do the right thing. (Barbin
Laurindo et al., 2005) 5: The ability to accomplish a task
EEG: See Electroencephalogram. with fewer errors. (Hunter, 2005)

EF: See Expedited Forwarding. Effectiveness of Team Interaction


Effectiveness as linked to functional components such as:
Effect (1) interdependency in terms of the environment, (2) task
A change in the state of an object. (Dori, 2006) interdependency of team members (skills development
and consequences; sanctions based on results), and
Effective Practice (3) the quality of transactions between team members
An online practice that is replicable and produces (interpersonal relations, production energy, shared
positive outcomes in each of the pillar areas. (Moore et effectiveness, and group cohesion). (Tremblay, 2006b)
al., 2005)
Eficacy
Effective Technical and Human Implementation A measure of performance that establishes whether the
of Computer-Based Systems (ETHICS) system works or notif the transformation of an entity
A problem-solving methodology that has been developed from an input stage to an output stage has been achieved.
to assist the introduction of organizational systems (Abu-Samaha, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
208 Eficiency Elastic Interface

Eficiency Eigenvalue
1: A measure of performance based on comparison of The quantity representing the variance of a set of variables
E the value of the output of the system and the resources included in a factor. (Lee, Peterson, et al., 2005)
needed to achieve the output; in other words, is the system
worthwhile? (Abu-Samaha, 2005) 2: From an IT viewpoint, EIP: See Enhanced Instructional Presentation; Enterprise
this usually relates to improvements within the business, Information Portal; Enterprise Internal Portal.
so for a business it may mean IT systems that reduce costs
or perform tasks more reliably or faster. (Darbyshire & EIP Model: See Enhanced Instructional Presentation
Burgess, 2005) 3: Related to the time spent for assessors Model.
to accomplish the assessment task. (Diamadis & Polyzos,
2005) 4: The ability to accomplish a task with few EIS: See Executive Information System.
resources. (Hunter, 2005) 5: The way a system supports
users in carrying out their tasks, and a measure of how EISP: See Enterprise Information Security Policy.
quickly users can accomplish goals or inish their work
when using the system. (Yong, 2005) EKM: See Enterprise Knowledge Management.

Eficiency of Around-the-Clock Development Elaboration


An index used to indicate a ratio between the time required Issue- or message-relevant cognition. Elaboration is
to follow up the previous work and time spent to continue typically conceptualized as a continuum ranging from
the work. (Lui & Chan, 2005) high elaboration to low elaboration. It is thought to be
inluenced by an individuals motivation and ability to
Eficient cognitively process a message. (Duthler, 2005)
Full eficiency is attained by any DMU if and only if none
of its inputs or outputs can be improved without worsening Elaboration Likelihood Model (ELM)
some of its other inputs or outputs. (Chen, Mottiwalla, et An information processing theory of persuasion irst
al., 2005) proposed in 1981 by social psychologists Richard Petty
and John Cacioppo. The model of persuasion proposes that
Eficient Market individuals either think carefully about the acceptability
A market in which any relevant information is immediately of a persuasive appeal, or instead with little cognitive
impounded in asset or security prices. (Roofe, 2005) effort rely on cues in the persuasive situation to arrive at
a conclusion of the advocacy. (Duthler, 2005)
EFM Fiber
Deined by IEEE 802.3ah. It features a point-to-point iber- Elastic Application
to-the-home network, typically deployed as an active star, A kind of network application that will always wait for
that uses active electronics and Ethernet as its transmission data to arrive rather than proceed without it. (Yang et
protocol. (Kelic, 2005) al., 2005a)

Egress Filtering Elastic Audio Slider


Process of checking whether outgoing packets contain An interface design that enables the interactive
valid source IP addresses before sending them out to the manipulation of audio replay speed by incorporating the
Internet. Packets with forged IP addresses are discarded concept of elastic interfaces in common audio-progress
on the router that connects to the Internet. (Syed et al., bars. (Hrst & Lauer, 2006)
2005)
Elastic Interface
Eigenface An interface or widget that manipulates an object (e.g.,
Another name for face recognition via principal components a slider thumb), not by direct interaction, but instead by
analysis. (Lovell & Chen, 2005) moving it along a straight line that connects the object
with the current position of the cursor. Movements of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ela st ic Pa nning Ele c t ronic Busine ss (E-Busine ss) 209

the object are a function of the length of this connection, fails. (Murthy & Krishnamurthy, 2005a) 2: The process
thus following the rubber-band metaphor. (Hrst & Lauer, of selling online, with the highest bidder winning the
2006) product. (Guan, 2006a)
E
Elastic Panning Electronic Auction Marketplace
An approach for navigation in visual data which has proven A form of a virtual B2B community where goods, services,
to be feasible not only for the visual browsing of static, or information are offered for purchase and bid upon
time-independent data, but for continuous, time-dependent by various organizations under some pre-determined
media streams as well. Similar to the FineSlider, it builds structured process. eBay would be an example of an
on the concept of elastic interfaces and therefore solves electronic auction marketplace. (Turner, 2006)
the scaling problem, which generally appears if a long
document has to be mapped on a slider scale that is limited Electronic Board
by window size and screen resolution. (Hrst, 2006) A classic groupware tool that supports the functionalities
of a traditional whiteboard (sharing sketches, pointing,
Elderly Time Bank annotating) through a set of distributed computers.
A virtual community applying the concept of time bank (Villemur & Drira, 2006)
to support the active aging of elderly and that resorts to
computer networks to facilitate the interactions among Electronic Brainstorming System (EBS)
members. (Camarinha-Matos & Ferrada, 2006) A computer-based system that facilitates brainstorming
between group members. (Aurum, 2005)
Electricity Grid for E-Learning and Professional
Development Electronic Bulletin Board
A metaphor for a systemic environment in which e-learning A Web site where students and instructors can post
and professional development resources and experiences information for others to view at a later time. (Hawkins
low to stakeholders throughout the system. Surplus is built & Baker, 2005)
into the system, and knowledge resources are entered
once and used anywhere. This model enables reduced Electronic Business (E-Business)
marginal costs. (Norris, 2005) 1: A comprehensive term used to describe the way
an organization interacts with its key constituencies,
Electronic Administration including employees, managers, customers, suppliers, and
E-government initiatives that deal particularly with partners through electronic technologies. It has a broader
improving the internal workings of the public sector. connotation than e-commerce because e-commerce is
(Olatokun, 2006) limited to business exchanges or transaction over the
Internet only. (Zhao, 2005) 2: The administration of
Electronic Administrator conducting business via the Internet. This would include
Online course or program administrator. (Whateley et the buying and selling of goods and services, along with
al., 2005) providing technical or customer support through the
Internet. E-business is a term often used in conjunction
Electronic Assessment Project with e-commerce, but it includes services in addition to
A system-wide quality assurance project for Minnesota the sale of goods. (Mockler et al., 2006) 3: The conduct
State Colleges and Universities online programs. (Olson of business on the Internet. It is a more generic term than
& Langer, 2005) e-commerce because it refers to not only buying and
selling, but also electronically back-end integration with
Electronic Auction other business processes such as servicing customers and
1: A centralized protocol for redistributing resources collaborating with business partners. (Sharma, 2006c) 4: A
among agents. Each agent attaches a value to each resource. business made via the Internet, not only selling or buying,
The seller asks a price for a resource, the buyer offers a but also supporting customers and connecting the supply
price, and they negotiate over the Internet to achieve a chain. (de Medeiros et al., 2006) 5: A concept capturing
desired outcome satisfying to both, else the negotiation the essence of conducting business by electronic means in

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
210 Ele c t ronic Busine ss Cha nge Ele c t ronic Busine ss X ML (EBX M L)

addition to or as a substitute for a physical location (bricks Electronic Business Performance Gain
and mortar). In its simplest form, the conduct of business The improvement in corporate resourcing, employee work
E on the Internet. It is a more generic term than e-commerce life, and customer satisfaction. (Ash & Burn, 2006)
because it refers to not only buying and selling, but also
servicing customers and collaborating with business Electronic Business Planning and Analysis
partners. (Sanzogni & Arthur-Gray, 2005) 6: Any inancial Framework (E-PAF)
or non-inancial transaction involving an electronic process A combination of QFD, VCA, and BSC that supports
using the Internet or Internet technologies (OBuyonge & strategic e-business initiatives. (Clegg & Tan, 2006)
Chen, 2006) 7: Derived from such terms as e-mail and
e-commerce, the conduct of business on the Internet or Electronic Business Policy Group (EBPG)
extranet, not only buying or selling, but also servicing A collaboration of representatives of the EU member
customers and collaborating with business partners. states and the European Commission services. (Wiggins,
(Malik, 2006) 8: Business or business activities integrated 2006)
with business processes and usually carried out onlinefor
example, over the Internet. (Mizell & Sugarman, 2005) Electronic Business Strategy
9: Refers to commerce that is conducted via the Internet. 1: An elaborate and systematic plan of action intended
This also applies to e-inance, e-marketing, e-design, and to accomplish speciic e-business goals which considers
e-management. (Reynolds, 2005) e-business multi-dimensional characteristics (Wang
& Forgionne, 2006) 2: Comprehensive set of planning
Electronic Business Change approaches that relect the stage of e-business growth
The process surrounding the effective management of within the organization. (Burn & Ash, 2006)
different stages of online business development and growth.
(Ash & Burn, 2006) Electronic Business System
An organized, structured whole that implements business
Electronic Business Environment activities that are based on electronic technologies,
The business environment characterized by rapid time- methodologies, and processes. (Trcek, 2005)
to-market pressures, heterogeneous technical access, and
quick IT strategic response requirements. (Steinbach & Electronic Business Technology
Knight, 2005) Any technology that enables an organization to conduct
business electronically, with the overall aim of improving
Electronic Business Model irm performance. (Baker & Coltman, 2005)
1: That subset of the general business model that supports
e-business. (Craig, 2005) 2: The set of strategies that enable Electronic Business Value Model
businesses to take advantage of the latest technologies to A model that conveys to management where to focus
generate proits and customer satisfaction. (Boateng & organizational resources by highlighting speciic areas
Boateng, 2006a) of opportunity. (Boonstra & de Brock, 2006)

Electronic Business Opportunity Electronic Business XML (EBXML)


An assessed and selected e-business option. (Boonstra & 1: An EDI standard intended to supplant X12 and UN/
de Brock, 2006) EDIFACT. Based on eXtensible Markup Language (XML)
and using standard Internet protocols, it is expected to lower
Electronic Business Option the cost and dificulty of setting up and using EDI, thereby
A possibility to use an electronic network for a business expanding its use to small and medium-sized enterprises.
purpose. (Boonstra & de Brock, 2006) (Hawk & Zheng, 2006) 2: An XML-based language and
infrastructure that aims at enabling B2B interactions
Electronic Business Outcome among companies of any size. (Fortino et al., 2006) 3: An
E-business forces change to occur in three corporate architecture and set of speciications designed to automate
domainstechnology, process, and peopleat strategic business-process interactions among trading partners.
and operational levels. (Ash & Burn, 2006) (Moser & Melliar-Smith, 2006) 4: Any form of business

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Ca pa bilit y Ele c t ronic Com m e rc e (EC, E-Com m e rc e ) 211

or administrative transaction or information exchange Electronic Cluster


that is executed using information and communications Digitally enabled communities of organizations that come
technology. This may be a transaction performed in a peer- together on a needs basis, in varying formations of virtual
E
to-peer fashion between companies or organizations, or organizations, to meet a temporary business opportunity.
with a customer. Electronic business impacts on the way (Mason et al., 2006)
business is perceived. (Richards et al., 2005)
Electronic Collaboration/Collaborative
Electronic Capability Commerce
The abilities that an organization is able to leverage off 1: IT-enabled joint intellectual efforts between
in order to deliver online products and services. These organizations for planning, design, development,
are often described in terms of their maturity levels. production, and delivery of products and services. (Chuang
(Clegg & Tan, 2006) et al., 2005) 2: The use of ICT by citizens and business
organizations to collaboratively plan, design, develop,
Electronic Capability Maturity Level manage, and research products and services and innovative
The conceptual model describing how advanced an ICT and e-commerce applications. Also called Virtual
organization is in the adoption of Internet-based solutions Collaboration. (Averweg, 2006) 3: The process in which
that support their strategy and operations. The levels range a set of individuals communicate through an intranet or
from low (little adoption) to high (sophisticated levels Internet to coordinate their efforts towards the solution of
of adoption). (Clegg & Tan, 2006) a problem. (Karacapilidis, 2005) 4: Collaboration among
individuals engaged in a common task using electronic
Electronic Capacity technologies. (Signoret, 2006)
The limit of the e-business companys ability to produce or
perform that is imposed by the equipment and/or available Electronic Collaboration Technology
personnel, and the network technology and performance. Electronic technology that enables collaboration among
(Wang & Forgionne, 2006) individuals engaged in a common task. (Kock, 2006)

Electronic Catalog Electronic Commerce (EC, E-Commerce)


1: A graphical user interface that presents product and/or 1: Business transactions conducted by electronic means
service information to users, typically using the World other than conventional telephone service, for example,
Wide Web. (Gangopadhyay & Huang, 2005) 2: Vendors facsimile or electronic mail (e-mail). (Melkonyan, 2005)
catalogs offered either on CD-ROM or on the Internet 2: The conduct of buying and selling products and
to advertise and promote products and services. (Singh, services by businesses and consumers over the Internet.
2005) E- simply means anything done electronically, usually via
the Internet. E-commerce is the means of selling goods
Electronic Channel and services on the Internet. (Sharma, 2006c) 3: Involves
An online marketing channel where companies and a direct inancial transaction in the electronic process
customers conduct business, no matter where they are. using Internet technologies. E-commerce encompasses
Since the e-commerce revolution, many brick-and-mortar business-to-business or B2B, business-to-consumer
businesses have expanded their marketing channel to or B2C (Amazon.com), and consumer-to-consumer or
include e-channel. (I. Lee, 2005) C2C. (OBuyonge & Chen, 2006) 4: The process of
buying, selling, or exchanging products, services, and
Electronic Citizen information using computer networks. (Pease & Rowe,
An e-government initiative that deals particularly with the 2005) 5: The transaction of goods and services through
relationship between government and citizenseither as electronic communications. E-commerce has two primary
voters/stakeholders from whom the public sector should forms: B2B (business-to-business) and B2C (business-to-
derive its legitimacy, or as customers who consume public consumer). (Tian & Stewart, 2006) 6: Usually refers to
services. (Olatokun, 2006) conducting business (electronically) with other businesses
or consumers, but can be extended to include the inner

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
212 Electronic Commerce Beneit Electronic Commerce Techno-Structure

workings within a business. (Peszynski, 2005) 7: The It consists of three main parts: the architecture for the low
buying and selling of information, products, and services of products, services, and information; the generation of
E via computer networks and especially the Internet. (Scupola, value; and the source of revenue. (Madlberger, 2006)
2005) 8: Selling and buying of products and services via the
Internet. (de Medeiros et al., 2006) 9: A concept capturing Electronic Commerce Disadvantage
the essence of carrying out commerce by electronic means. One of the dificulties or problems experienced by a
E-commerce refers to the buying and selling of goods and business following e-commerce adoption. (Vrazalic et
services on the Internet, especially the World Wide Web. al., 2005)
In practice, this term and a newer term, e-business, are
often used interchangeably. (Sanzogni & Arthur-Gray, Electronic Commerce Driving Force
2005) 10: Any business done electronically. The electronic A conditions and/or expectation that facilitates e-commerce
business where information technology is applied to all adoption. (Vrazali et al., 2005)
aspects of a companys operations. (Dholakia, Bang, et
al., 2005) 11: Commercial activities taking place over Electronic Commerce Security Course
electronic networks (primarily the Internet); e-commerce is Technologies, architectures, and infrastructure for
a subset of general commerce. (Craig, 2005) 12: Conducting securing electronic transactions over nonproprietary
business and inancial transactions online via electronic net works. Implementation and maintenance of
means. (T.S. Chan, 2005) 13: Conducting commercial mechanisms that secure electronic documents with
transactions on the Internet, where goods, information, confidentiality, authentication, integrity, and non-
or services are bought and then paid for. (Raisinghani & repudiation. Public key certiicate. Digital signature.
Petty, 2005) 14: Connection, electronic data exchange, (Knight & Chan, 2005)
and transaction capability via the Internet. (Braun, 2005a)
15: Consists of techniques and algorithms used to conduct Electronic Commerce Strategy
business over the Internet. Trading processes such as A subset of general business and information technology
supply-chain management, strategic purchase planning, strategy, focusing on Web-based commercial opportunities.
and market mechanisms for trading commodities online are It may dominate general strategy in some irms. (Craig,
implemented using e-commerce. (Dasgupta et al., 2006) 2005)
16: Doing business electronically, including buying and
selling information, products, and services over a digital Electronic Commerce Study
infrastructure via computer networks. (Rhodes, 2005) 17: Contains elements of information systems, business
Using the Internet and related technologies and software processes, and communications technologies. (Tatnall &
to support business activities in general. It ranges from Burgess, 2005)
simple setup such as e-mail and ile transfer to complex
systems such as supply chain management and enterprise Electronic Commerce System Simulation
resources-planning systems. (Poon, 2005) 18: The process An integrative procedure to run a business processes-
of buying and selling goods and services online. (Gordon oriented simulation program based on both internal and
& Lin, 2005) 19: Financial business transaction that occurs external business environmental factors to demonstrate the
over an electronic network such as the Internet. (Liu & actual results of implementing an e-commerce business
Tucker, 2005) 20: Means selling items over the World model by using computer-driven software toolkits. It is
Wide Web. Consequently, enterprises must incorporate an effective, eficient, and economical approach, and can
new technology information and communication means. be used to experiment and evaluate different e-commerce
(Pires et al., 2006) business models or plans. (Chen, Li, et al., 2006)

Electronic Commerce Beneit Electronic Commerce Techno-Structure


One of several tangible and intangible business advantages An e-commerce system dimension that is related to the
achieved by adopting e-commerce. (Vrazalic et al., 2005) formalized institutional procedures that govern online
trade execution between e-market participants. (Wang,
Electronic Commerce Business Model 2006)
A structured description of an organizations activities in
order to operate a business based on electronic commerce.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Com m unic at ion Ele c t ronic Dat a I nt e rchange (EDI ) 213

Electronic Communication especially the proliferation of self-service channels like


1: A vital concept to the virtual organization is the the Web and WAP phones, has changed consumer buying
ability to communicate through purely electronic means, behavior and forced companies to manage electronically
E
eliminating the need for physical contact and allowing the relationships with customers. The new CRM systems
the geographical dispersion of organization members. are using electronic devices and software applications that
Online collaboration via e-mail, discussion boards, chat, attempt to personalize and add value to customer-company
and other methods, as well as telephone and facsimile interactions. (Gur u, 2005)
communications, are primary contributors to the removal
of time and space in this new organizational concept. (J. Electronic Data Interchange (EDI)
Lee, 2005) 2: From a human perspective, it is the transfer 1: A set of computer interchange standards developed in
of informationtextual, graphic, oral, or visualfrom the 1960s for business documents such as invoices, bills,
one point/person to another via electric, electromagnetic, and purchase orders. It has evolved to use the Internet.
or photonic means. Machine-to-machine communications (McManus & Standing, 2005) 2: A standard, structured
deals in bits and bytes only. (McManus & Carr, 2005) format for exchanging business data. (Hawk & Zheng,
2006) 3: Exchange of business documents through
Electronic Communication Network (ECN) computer networks in a standard format. It was the irst
An electronic system that brings buyers and sellers together generation of e-commerce, applied in B2B transactions
for the electronic execution of trades. ECNs represent before the availability of the Internet in its present form.
orders in NASDAQ stocks; they internally match buy and (Tian & Stewart, 2006) 4: A standard message layout used
sell orders, or represent the highest bid prices and lowest on computer-to-computer commercial data interchange.
ask prices on the open market. (Saha, 2006b) Traditional EDI uses an electronic method called Value-
Added Network (VAN). However, it is increasingly
Electronic Community adopting Internet protocol. (de Medeiros et al., 2006) 5:
1: A group of people sharing common interests, ideas, and A standard used by businesses to transmit documents
feelings on the Internet or other collaborative networks. such as invoices and purchase orders to each other
E-communities exist in discussion groups, chat rooms, electronically. The parties who exchange EDI messages
newsgroups, and so forth. (Markellou et al., 2006) 2: An (which can be encrypted and decrypted) are referred to
online forum to discuss topics of mutual interest. (Coakes as trading partners. (Duan, 2005) 6: A standard used to
& Willis, 2005) govern the formatting and transfer of transaction data
between different companies, using networks such as the
Electronic Consultation Internet. As more companies are linking to the Internet,
An e-democracy technique used for research of EDI is becoming increasingly important as an easy
stakeholders views, and evaluation of proposed rules mechanism for companies to share transaction information
regulatory impact by ICT usage. (Pazyuk, 2005) on buying, selling, and trading. ANSI (American National
Standards Institute) has approved a set of EDI standards
Electronic Course known as the X12 standards. Although not yet a global
An online educational program that introduces and standard, because of EDIFACT, a standard developed
explains a speciic educational subject (Paraskevi & by the United Nations and used primarily in non-North
Kollias, 2006) American countries, negotiations are underway to combine
the two into a worldwide standard. (Archer, 2005) 7: A
Electronic Crime set of document-exchange standards used to implement
The illegal exploitation of computer technologies, such as interorganizational system exchanges to achieve automated
the Internet. (Kyobe, 2006) computer-to-computer document exchange regardless of
the communication technologies used. (Poon, 2005) 8:
Electronic Customer Relationship Management Exchange between businesses of computer-readable data
(E-CRM) in a standard format. (Passi et al., 2005) 9: Meta-term
CRM comprises the methods, systems, and procedures for a multitude of different electronic message standards
that facilitate the interaction between the irm and that allow computerized and highly structured, low-error
its customers. The development of new technologies, communication between computers. A merge between

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
214 EDI FACT Ele c t ronic Disc ourse

EDI and Internet technology can be recently observed by in which to engage the community to participate in and
the upcoming Web-based EDI solutions, where on EDI contribute to the governance process generally, and to
E partner does not have to install EDI, but uses common Web facilitate and enhance the capability of a citizen to have
browsers to communicate via EDI. (Kotzab, 2005) 10: The a say in the impact of governance on themselves and their
computer-to-computer exchange of intercompany business communities. (Sutcliffe, 2005) 4: Depending on what
documents and information through standard interfaces; type of democracy it should support, ICT can be used for
requires hardware, software, and communications electronic voting, online referendums, or to support the
technology that permit those computers to transfer the political parties in their dialogue with the voters. It can also
data electronically (such as purchase orders, invoices, be used to support political debate in a local community or
medical claims, and price lists). (Ratnasingam, 2006) in other political processes. (Jaeger, 2005) 5: A democracy
11: The electronic exchange of business documents in which e-government is involved in the development
using standardized document formats. (Harris & Chen, of direct forms of political deliberation and decision
2006) 12: The interchange of a data message structured making through electronic referendums and similar
under a certain format between business applications. devices. (Sharma, 2006b) 6: A tool-oriented conception
(Mitrakas, 2005) 13: The movement of specially of democracy referring to new democratic practices in
formatted standard business documents, such as orders, which ICTs and innovative institutional arrangements are
bills, and conirmations sent between business partners. utilized (cf. teledemocracy). (Anttiroiko, 2005a) 7: Refers
(Lertwongsatien & Wongpinunwatana, 2005) to relations of two-way and horizontal powerusing
technologies to enhance democratic practice. It is about:
Electronic Data Interchange for Administration, interconnecting citizens among themselves, participation,
Commerce, and Transport (EDIFACT) empowering those in the margins, inclusion, creating and
1: An international standard for the electronic exchange maintaining responsiveness, accountability, maintaining
of business documents widely used in Europe. (Harris & universality, and openness. (Yigitcanlar & Baum,
Chen, 2006) 2: The worldwide EDI messaging standard, 2006a) 8: The electronic process through which citizens
administered and maintained by the UN. (Whiteley, engage with government and its agents (and vice versa),
2006) including consultation and voting. E-democracy is a
two-way process that can be driven by either government
Electronic Deliberation or citizens. (Williamson, 2005) 9: The use of electronic
Online public engagement with emphasis on the deliberative communications to support and increase democratic
element. (Kozeluh, 2005) engagement, and deepen and widen citizen participation.
(Malina, 2005) 10: The use of electronic media such as
Electronic Democracy Technique the Internet to enhance democracy. (Boateng & Boateng,
One of the ways (methods) of citizen engagement in the 2006b) 11: The utilization of electronic communications
process of decision making based on ICT usage. The main technologies, such as the Internet, in enhancing democratic
techniques are: e-consultation, e-petition, and e-voting. processes within a democratic republic or a representative
(Pazyuk, 2005) democracy. It is a political development still in its
infancy, as well as the subject of much debate and activity
Electronic Democracy/Teledemocracy within government, civic-oriented groups, and societies
(E-Democracy) around the world. E-democracy also includes within its
1: The use of modern information and communications scope electronic voting. (Chochliouros & Spiliopoulou-
technologies as instruments to empower the people in a Chochliourou, 2006) 12: The use of ICT, such as the
democracy to help set agendas, establish priorities, make Internet or WWW, to foster democratic processes such as
important policies, and participate in decision making citizen participation. (Hinnant & Sawyer, 2005)
and implementation in an informed and deliberative
way. (Keskinen & Kuosa, 2005) 2: Interaction between Electronic Discourse
public, private, and third sectors by ICT usage in Text-based conversation and discussion generated by
democratic processes; the way in which citizens interact computer-mediated communication asynchronously and
with government by ICT usage. (Pazyuk, 2005) 3: A synchronously. (Han & Hill, 2006)
qualitative term to describe the use of ICT as a medium

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Doc um e nt Ele c t ronic Gove r na nc e (E-Gove rna nc e ) 215

Electronic Document are not uniformly adopted by provider organizations.


A digital object that stores something of use to someone. (Alexander & Burn, 2006)
More general than paper documents, electronic documents
E
can take various forms, including word processing iles, Electronic Fund Transfer
spreadsheet iles, graphics, audio and video iles, and so Any transfer of funds that is initiated through an electronic
forth. (Corral et al., 2006) terminal, telephone, computer, or magnetic tape for the
purpose of ordering, instructing, or authorizing a inancial
Electronic Dyad institution to debit or credit an account. (Singh, 2005a)
Teacher/student and student/student interaction through
electronic media. (Lerch et al., 2005) Electronic Governance (E-Governance)
1: A term to describe the delivery of the governance
Electronic Education process using ICT rather than conventional and traditional
A concept capturing the essence of carrying out education means. (Sutcliffe, 2005) 2: Communication by electronic
by electronic means. (Sanzogni & Arthur-Gray, 2005) means to place power in the hands of citizens to determine
what laws need to be made and how these laws should be
Electronic Enrollment written. (Malina, 2005) 3: Refers to a local governments
Online student enrollment. (Whateley et al., 2005) inventiveness to electronically govern areas under its
jurisdiction. (Averweg, 2006) 4: Refers to a much broader
Electronic Forum range of issues and relationships around the impact of the
Another name for a forum, which is an area on a Web site Internet on political life at all levels, not just the level of
where you can read and post messages on a particular states and their bureaucracies. E-governance is a broader
topic, allowing debate. (Coakes, 2006b) concept, which includes the use of ICT by government and
civil society to promote greater participation of citizens
Electronic Fulillment in the governance of political institutions. (Sharma,
1: A company meets the needs of its customers with whom it 2006b) 5: Most commonly, the concept of governance
carries out some transactions through the Internet. It is most is associated with public governance, which refers to
often associated with B2C e-commerce. (Aigbedo, 2005) coordination, interaction, and institutional arrangements
2: The activities required to ensure that a product ordered that are needed to pursue collective interest in policy-
through an online retailer is delivered to a consumer, making, development, and service processes in the
and may also include reverse logistics (return of goods) context of intersectoral stakeholder relations. Electronic
activities. E-fulillment providers provide services derived governance is technologically mediated communication,
from those offered by traditional logistics, delivery and coordination, and interaction in governance processes.
warehousing providers, as well as an emerging range of new (Anttiroiko, 2005a) 6: The application of electronic
capabilities. Such services may be provided by in-house means in the interaction between government and
departments or increasingly by third-party outsourcers citizens and government and businesses, as well as in
who offer a wide range of supply chain services to online internal government operations to simplify and improve
retailers. (Alexander & Burn, 2006) democratic, government, and business aspects of
governance. (Joia, 2006) 7: The delivery of government
Electronic Fulillment Capability services in an electronic medium. It also includes the online
E-fulillment providers may be identiied from a well- interactions between government and citizens. (Boateng
deined set of capabilities they utilize in offering their & Boateng, 2006b) 8: The process of administration
services. These incorporate traditional logistical, delivery, (elaboration and implementation of policy decisions and
and warehousing services, as well as picking and packing, administration services delivery) based on full-scale ICT
kit delivery, and payment-taking systems. Increasingly, usage at all levels of decision making and all branches
capabilities are incorporating knowledge-based skills and of public administration. (Pazyuk, 2005) 9: The use of
resources, and include such services as online retail Web information and communication technologies to make
site development or hosting, supplier management, and public policy decisions. Examples include electronic voting
customer relationship management. These capabilities to elect public oficials (e-voting), electronic commenting
on regulatory rules (e-rulemaking), and deliberating on

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
216 Ele c t ronic Gove r nm e nt (E-Gove r nm e nt ) Ele c t ronic Gove r nm e nt I nt e rope ra bilit y

public policy issues (deliberative e-democracy). (Knepper sometimes called e-services); the conduct of government
& Chen, 2006) business where the activities are of those involved in
E the process of government itself (such as legislators and
Electronic Government (E-Government) the legislative process), and where some electronic or
1: The ability of government to design and use ICTs to online aspect is under consideration; voting where some
interact internally and externally with government bodies, technological aspect is under consideration. (Kozeluh,
citizens, and businesses in order to deliver integrated 2005) 11: Reengineering the current way of doing business,
electronic public services. (Malina, 2005) 2: A concept by using collaborative transactions and processes required
capturing the essence of carrying out the business of by government departments to function effectively and
government by electronic means, including the delivery of economically, thus improving the quality of life for citizens,
public services and voting (in some instances). (Sanzogni and promoting competition and innovation. To put it simply,
& Arthur-Gray, 2005) 3: A strategy for revolutionizing e-government is about empowering a countrys citizens.
the business of government through the use of information (Singh, 2006) 12: Public administration infrastructure of
technology (IT), particularly Web-based technologies, a government on the Internet; a range of services needed
which improve internal and external processes, eficiencies, by citizens and businesses can be accessed here. (Hin &
and service delivery. (Schelin, 2005) 4: Based on Subramaniam, 2005c) 13: Refers to relations of top-down
ICT, taking place in public administration, concerns powergoverning populations through use of online
electronic ways to perform administrative tasks, and the information and services. It is more about transforming
communication between the public administration and government services to provide more effective and more
the citizens. (Jaeger, 2005) 5: Any government functions eficient services, and also coming to the realization that
or processes that are carried out in digital form over the those services have to be customer-centric. (Yigitcanlar
Internet. E-government refers to the use by government & Baum, 2006a) 14: Set of activities that aim to improve
agencies of information technologies (such as wide area relationships between government institutions and citizens
networks, the Internet, and mobile computing) that have with the help of information systems and technologies.
the ability to transform relations with citizens, businesses, (Crdoba, 2006b) 15: The application of information
and other arms of government. (Sharma, 2006b) 6: The technology by public sector organizations to provide
use of technology to enhance the access to and delivery of services and information to individuals and business
government services to beneit citizens, business partners, organizations. (Toland, Purcell, et al., 2005)
and employees. (Averweg, 2006) 7: Those aspects of
government in which ICTs are or can be utilized, the basic Electronic Government Integration Stage
functions being to increase eficiency in administrative Also partially referred to as Participation stage; it is the
processes (e-administration), to guarantee easy access to formation of networked governments and the integration
information for all, to provide quality e-services, and to of public services both internally (i.e., electronically
enhance democracy with the help of new technological interconnected, multi-tier-transaction-enabled business
mediation tools (e-democracy). (Anttiroiko, 2005a) 8: The processes) and towards the customers, citizens, and
use of information technologies to improve and facilitate businesses (i.e., offering of uniied user access interfaces
citizens relationships with government through democratic directly linked to integrated services). (Werth, 2005)
procedures, cost-effective transactions, and eficient
regulations, all of which enhance these relationships. Electronic Government Internet Security
(Almazn & Gil-Garca, 2006) 9: Governments use Technological tools, standards, policies, and other decisions
of information technology to introduce eficiency and concerning the security of the information and systems
transparency in its own functioning and in its service used by government organizations or in public-sector
offerings to citizens. (De, 2005) 10: A term used to describe settings. (Gil-Garca & Luna-Reyes, 2006)
several closely related topics, it introduces the notion and
practicalities of electronic technology into the various Electronic Government Interoperability
dimensions and ramiications of government. The most The ability of a public service to collaborate (i.e., to
frequent use is related to the delivery of public services, work together) with other public services without special
where there is an online or Internet-based aspect to the effort on the part of the processing unit. This includes the
delivery of the services (online government services are collaboration of the service-executing business processes,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Gove r nm e nt Por t a l Ele c t ronic La b 217

as well as the interaction of the process-supporting Electronic Hub


application systems. (Werth, 2005) A virtual market among companies (B2B marketplaces or
B2B information brokers). (de Medeiros et al., 2006)
E
Electronic Government Portal
An inter-agency or inter-government Web site that Electronic Inluentials (E-Fluentials)
integrates information and services at a single point of The 10% of Internet users who manifest the greatest
entrance and can be customized according to different inluence on other Internet users online behaviors.
constituencies. (Gil-Garca & Luna-Reyes, 2006) (Goldsmith, 2006)

Electronic Government Stage Electronic Innovation


In an evolutionary approach, an e-government stage is one An innovation encouraging users of new communications
of the different steps in the development of e-government. technologies to develop dependable and viable business
Normally, the steps follow a logical progression of increased plans or systems that can be used for an economic (business)
technological sophistication over time. (Gil-Garca & or social (healthcare, education, etc.) enterprise. (Boateng
Luna-Reyes, 2006) & Boateng, 2006a)

Electronic Gradebook Electronic Invitation (E-Vite)


Maintaining a record of a students progress in a Web- A party invitation online social networking application.
based education class by posting grades on the course Web (Mew, 2006)
pages. General gradebooks show all enrollees; personalized
gradebooks can only be viewed by the individual student. Electronic Journal
(Marold, 2005) Electronic form with a series of questions (e.g., seven to
eight) that help to document students progress throughout
Electronic Health a course, pertaining to the students thought processes
1: A concept in which Internet-based technologies are as they progress through the multimedia instructional
used to enhance access, delivery, quality, and effectiveness material. (Bradley et al., 2005)
of health services, as well as information utilized by
patients, physicians, health care organizations, and related Electronic Journalism
partners such as pharmacies, vendors, and insurance The use of every Internet resource to disseminate
providers. (Cannoy & Iyer, 2006) 2: Refers to the market, information on an ongoing, updating basis. (Daz-Andrade,
companies, and initiatives for conducting health care- 2005)
related transactions electronically using the Internet
and/or wireless communications. (Wang, Cheng, & Cheng, Electronic Knowledge
2006) 3: The use of emerging technologies, especially The fusion of perpetual, technology-assisted learning with
the Internet, to improve or enable health and health care- access to vast knowledge resources that are continuously
related services. (OBuyonge & Chen, 2006) 4: Used to changing. E-knowledge is knowledge as it exists in a
characterize not only Internet medicine, but also virtually profoundly networked world. (Norris, 2005)
everything related to computers and medicine. (Kabene,
Takhar, et al. 2005) Electronic Knowledge Network
A repository where new knowledge is created and collected,
Electronic Health Information Management while existing knowledge archived in a data warehouse is
(E-HIM) renewed and updated. (Wang & Forgionne, 2006)
The term created by AHIMA to represent the future reality
of health information. (Zender, 2006) Electronic Lab
The same as a virtual lab, but mainly delivered through
Electronic Hierarchy the Web. (Chu & Lam, 2006)
A market that entails few suppliers as an intermediate step,
from hierarchical, ownership strategies toward electronic
markets. (Setzekorn et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
218 Ele c t ronic Le a r ne r Ele c t ronic Le a r ning Environm e nt

Electronic Learner developed, delivered, and monitored through synchronous


A student who takes advantage of learning that is usually or asynchronous communication. (Vitolo et al., 2005) 10:
E Internet-based learning, but could be any electronically An approach to facilitate and enhance learning through
enhanced learning; e-learners are technology savvy, the use of devices based on information communication
motivated, and self-directed. (Langer, 2005) technologies and the Internet. (Ng, 2006) 11: Any form of
education or training that utilizes online media and remote
Electronic Learning (E-Learning) connectivity for all or part of its curricula. This model
1: The application of computer and network technology includes both purely online courses and those in brick-
in learning activities. (Handzic & Lin, 2005) 2: A form and-mortar universities facilitated by e-mail, the Internet,
of learning that involves electronic or technology- newsgroups, or chat. (Durrett et al., 2005) 12: Discipline
based delivery of learning; examples of forms of delivery that applies current information and communications
include individual computer-based delivery, Internet/Web technologies to the educational ield. This discipline tries
delivery, and virtual classroom delivery. Media can be to facilitate the learning process, since its methods do
in many forms, including videotape and DVD, CD- not depend on physical location or timing circumstances
ROM, satellite transmissions, interactive television, and of the pupil. (Andrade et al., 2006b) 13: The delivery of
various Web-based media (Internet, intranet, extranet). a learning, training, or education activity by electronic
(Simon et al., 2005) 3: Technology-supported learning means. E-learning covers a wide set of applications and
and delivery of content via all electronic media. These processes such as Web-based learning; computer-based
may include the Internet, intranets, computer-based learning; virtual classrooms; and delivery of content via
technology, or interactive television. They may also include satellite, CD-ROM, audio, and videotape. In the last few
the use of e-technology to support traditional methods years, e-learning tends to be limited to a network-enabled
of learning, for example using electronic whiteboards transfer of skills and knowledge. (Esmahi, 2005) 14:
or videoconferencing. This term covers a wide set of Any online framework that brings education or training
applications and processes, such as Web-based learning, to an individual who may access this learning from the
computer-based learning, virtual classrooms, and digital computer. (Iannarelli, 2005) See also Distance Learning;
collaboration. (Torres-Coronas, 2005) 4: Term covering a Web-Based Learning; Online Learning.
wide set of applications and processes, such as Web-based
learning, computer-based learning, virtual classrooms, and Electronic Learning Application
digital collaboration. It includes the delivery of content via An application that includes the development of teaching
the Internet, intranet/extranet (LAN/WAN), audiotape and and learning materials, tools for managing the distant use
videotape, satellite broadcast, interactive TV, CD-ROM, of these materials by students, a platform for the delivery
and more. (Blackmore et al., 2006) 5: Learning using of courses, and standards and policies to be followed by
electronic media. (Janvier & Ghaoui, 2006) 6: A special users. (Rolland & Kaabi, 2006)
kind of technology-based learning. E-learning systems
and tools bring geographically dispersed teams together Electronic Learning Development Team
for learning across great distances. It is now one of the The set of multidisciplinary professionals required to
fastest growing trends in computing and higher education. develop and evaluate an integrated e-learning evaluation.
(Ishaya, 2005) 7: A virtual environment in which the Each team should include designers, developers,
learners interactions with learning materials, including instructors, process managers, social-science staff
readings, laboratories, software, assignments, exercises, professionals (e.g., Psychology, Sociology, Human
peers, and instructors, is mediated through the Internet or Resources practitioners, and managers, among others),
intranets. E-learning includes the use of simulation systems and helpdesk staff, and eventually user representatives of
used to enhance teaching activities and distance education target population. (Rentroia-Bonito et al., 2006)
supported by broadband multimedia communication and
shared electronic work spaces. (Sivakumar, 2006) 8: A Electronic Learning Environment
way of fostering learning activity using electronic tools ICT-based environment particularly aimed at facilitation
based on multimedia technologies. (Cirrincione, 2005) 9: of learning activities, for example by offering e-mail,
All teaching and learning processes and functions from conferencing, chat, FAQs, search engines, glossaries, and
course authoring, course management, examinations, so forth. (Haugen & Ask, 2005)
content delivery, feedback, and course administration

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Le a r ning Eva luat ion Fra m e w ork Ele c t ronic Life st yle 219

Electronic Learning Evaluation Framework Electronic Learning Process


An integrated feedback based on people-, system-, and A sequence of steps or activities performed for learning
context-speciic aspects. (Rentroia-Bonito et al., 2006) purposes and the use of technology to manage, design,
E
deliver, select, transact, coach, support, and extend
Electronic Learning Experience learning. (Snchez-Segura et al., 2005)
A process by which people identify work-related learning
needs, formulate related goals and the associated internal Electronic Learning Program
level-of-success criteria, search for feasible online options The entire organizational, technological, and administrative
to achieve deined learning goals, select and acquire structure that enables students learning via the Internet.
choices, and engage into and complete them successfully by (Levy & Ramim, 2005b)
achieving the related goals in a productive and satisfactory
manner. (Rentroia-Bonito & Jorge, 2005) Electronic Learning Program Strategic Plan
The blueprint of the e-learning program implementation
Electronic Learning Framework process that also includes foreseeable problems and
A formal construct to diagnose and manage learning solutions to such challenges. (Levy & Ramim, 2005a)
outcomes in terms of the operational dynamic of three
basic entities: business process, information systems, and Electronic Learning Study Skill
people. (Rentroia-Bonito & Jorge, 2005) One of the unique study habits and learning strategies used
by students in e-learning (i.e., online education) courses.
Electronic Learning Management System (Watkins, 2005)
(E-LMS)
A software program that is used to deliver and manage Electronic Learning Support and Development
online instructional activities. (Aisami, 2005) Team
The team includes: a program director, a program
Electronic Learning Market coordinator or assistant, an instructional designer, system
The market for the provision, delivery, and administration administrator(s), multiple developers/programmers,
of learning services through the use of new media and multiple support staff (for faculty and students), graphics
network technologies. (Gordon & Lin, 2005) and video production artist, and marketing coordinators.
(Levy & Ramim, 2005a)
Electronic Learning Platform
1: An information system that schools, universities, and Electronic Learning System
institutions can use for teaching (only online or supporting 1: A distributed information system for supporting teaching
traditional teaching) which can have the following and learning on the Internet (an intranet). (Liu & Koppelaar,
features (altogether or individually): (1) be a content 2005) 2: The technological and management system that
management system, guaranteeing the access to didactic facilitates and enables student learning via the Internet.
materials for the students; (2) be a learning management (Levy & Ramim, 2005a)
system, where the use of learning objects makes easier
the learning of a given topic; (3) be a computer-supported Electronic Learning Technology
collaborative learning system, which makes easier the use The technology used for e-learning. (Turoff, Howard, &
of collaborative and situated teaching/learning strategies; Discenza, 2005a)
and (4) build a virtual community of students, tutors,
and professors using knowledge management strategies. Electronic Libraries Program
(Cartelli, 2005a) 2: A set of computer systems that enable British digital library research and development program,
the design, construction, and management of an educative 1995-2000. (McCarthy, 2005b)
environment for use on the Internet. These platforms treat
learning aspects, materials, and communications between Electronic Lifestyle
students and teachers, as well as tools for managing the An online environment in which citizens have equal
courses. (Pedreira et al., 2005) access to information communication technology (ICT)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
220 Ele c t ronic Loya lt y Ele c t ronic M a rke t (E-M a rke t )

regardless of age, language, social background, or ability. Electronic Mail Bomb


(Weber & Lim, 2005) An attempt to overwhelm a mail server by sending large
E numbers of e-mails to a particular account, consuming
Electronic Loyalty system resources and initiating a denial of legitimate
1: A deeply held intention to repurchase a preferred access. (Horiuchi, 2005b)
product/service consistently from a particular e-vendor in
the future, despite the presence of factors or circumstances Electronic Mail Management
that may induce switching behavior. (Yeo & Chiam, 2006) Implements management controls over e-mail and
2: The degree to which online consumers are predisposed attachments. These controls may be implemented by direct
to stay with a speciic e-shop and resist competitive offers. capture (e-mail archiving software) or invoked by the end
(Markellou et al., 2006) user in a document management application. (Asprey &
Middleton, 2005)
Electronic Mail (E-Mail)
1: The use of a computer for personal or business Electronic Mail Newsletter
communications. An e-mail is an electronic document A one-to-many communications device that allows people
similar to a piece of mail that is sent from one person to to update a large group of constituents quickly and cost
another using an address, and contains information. Users effectively. Good e-mail newsletters rely on Web links
leave short, written messages in each others computer for more extensive content, providing easy ways for the
mailboxes. E-mail commonly contains information such reader to judge if they are interested in something and
as sender name and computer address, list of recipient quickly access the material. Newsletters are good for
names and computer addresses, message subject, date breaking news, keeping audiences posted about new Web
and time composed, and message content. Sometimes an site content, or for advocacy call to action. (Kardaras &
e-mail message can have attached computer iles such as Karakostas, 2006)
pictures, programs, and data iles. (Magagula, 2005) 2:
Allows users to communicate electronically with other Electronic Mail Protocol
users as if two typewriters were connected by a channel. Simple Mail-Transport Protocol (SMTP) is a set of
E-mail adds a new dimension to the ofice environment, commands for transport of ASCII-encoded e-mail
replacing paper copies and reducing time of transmittal. messages. Post ofice protocol (POP3) retrieves new
E-mail is the transmission of messages, textual or graphic, messages from a mailbox to a remote e-mail client. A
over various communications networks. (McManus & Carr, remote e-mail client can simultaneously access several
2005) 3: An electronic means for communication in which mailboxes on different mail servers with the Internet
text is usually transmitted; operations include sending, message access protocol (IMAP). (Pulkkis, Grahn, &
storing, processing, and receiving information; users strm, 2005)
are allowed to communicate under speciied conditions;
and messages are held in storage until called for by the Electronic Market (E-Market)
addressee. (Melkonyan, 2005) 4: A form of communication 1: An Internet-based market with many traders (agents)
in which electronic mail is transmitted via communication popularly known as buyers and sellers. These agents
networks. (Boateng & Boateng, 2006b) 5: Messages sent negotiate over the Internet to sell or buy products in any
and received electronically via telecommunication links. market (e.g., shares or stocks in a stock market). (Murthy
(Willis, 2005) 6: The exchange of notes through electronic & Krishnamurthy, 2005a) 2: An online environment where
means, generally but not necessarily over the Internet. (El buyers and sellers use the Internet as a communication
Louadi, 2005a) platform in order to exchange information, goods, and
services, independent from time and space. (Iacob et
Electronic Mail Aliasing al., 2005) 3: a market characterized by ininite numbers
Where an individual has more than one e-mail address; of competing suppliers, selling completely speciiable
the practice allows the user to use different addresses for products. (Setzekorn et al., 2005) 4: The coordination
different tasksfor example, one address for Internet of interdependent activities performed by autonomous
communications and another for business. (de Freitas & organizations by exchanging data between information
Levene, 2006a) systems of buying, selling, and facilitating organizations,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic M a rke t Syst e m Ele c t ronic N e t w ork of Pra c t ic e (EN OP) 221

allowing them to agree on and fulill commitments. exchange information about prices and product offerings.
(Janssen, 2005) 5: An market free from inhibiting (Ratnasingam, 2006)
constraints and affordable for all businesses in any shape,
E
form, or size, and to allow them to easily take part in e- Electronic Marketplace Portal
business with beneicial returns. It is a market in which trust, Extended enterprise portal that offers access to a companys
security, and dependability apply, and in which regulatory extranet services. (Tatnall, 2006)
and legal issues are uniied. It is a market where buyers and
sellers ubiquitously execute business transactions online. Electronic Marketplace Technology Course
These may include searching and identifying competence; System development for online trading applications
ability to identify the right product or service together supporting complex interactions among a variety of users.
with quality, price, and quantity; and virtual auctions. It Theoretical models of online information exchanges
is also based on an open, secure, and reliable collaborative supporting negotiations, including auctions, brokerages,
platform for knowledge exchange, joint product design, and exchanges. (Knight & Chan, 2005)
production planning, and logistics in stable customer-
supplier relationships. (Richards et al., 2005) Electronic Media
Interactive digital technologies used in business,
Electronic Market System publishing, entertainment, and arts. (Baralou & Stepherd,
An interorganizational information system that allows 2005)
participating buyers and sellers to exchange information
about prices and products. (Janssen, 2005) Electronic Meeting
An electronically facilitated meeting allowing participants
Electronic Marketing to share and work on documents remotely. (Elshaw,
1: Conducting marketing activities on any electronic 2006b)
device, including cell phones, PDAs, laptop computers, and
fax machines. (Singh, 2006a) 2: Using electronic means Electronic Mentor
and the Internet to market products/services. (Markellou et A term for an online guide, system, or person that provides
al., 2006) 3: Achieving marketing objectives through use information, resources, assistance, and direction for
of electronic communications technology. (Wang, 2006) learners. (Langer, 2005)

Electronic Marketplace Electronic Mentoring


1: An e-commerce environment that offers new channels Also called cyber-mentoring or telementoring, in which
and business models for buyers and sellers to trade goods the traditional mentoring relationship between a mentor
and services over the Internet. (Fortino et al., 2006) 2: and a protg occurs via an electronic format such as the
A business model for a particular kind of e-business Internet, videoconferencing, and so forth. (Day, 2005)
which aggregates potentially large numbers of business
partners (including buyers, sellers, and intermediaries) and Electronic Model
allows them to interact according to a variety of market The designing of a prototype of electronic business or a
structures, such as a commodity market, an auction, or system that illustrates how digital technology can be used
an exchange. The result can be signiicant cost savings. in any enterprise. (Boateng & Boateng, 2006a)
(Ghenniwa & Huhns, 2005) 3: An interorganizational
system through which multiple buyers and sellers interact Electronic Negotiation
to accomplish one or more of the market-making activities. Standard practice in purchasing or sales consisting of using
(Ratnasingam, 2005) 4: An online marketplace where a networked environment to negotiate in order to reach
many buyers and sellers barter and conduct transactions. an agreement (price, delivery, warranty, etc.) between a
They are frequently owned and operated by a third party. customer and a merchant. (Pierre, 2006a)
(Toland, 2006) 5: A Web-based system that enables
automated transactions, trading, or collaboration between Electronic Network of Practice (ENOP)
business partners. It is an interorganizational information 1: A self-organizing, open activity system that exists
system that allows the participating buyers and sellers to through computer-mediated communication and whose

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
222 Ele c t ronic N e w sgroup Ele c t ronic Proc ure m e nt (E-Proc ure m e nt )

members focus on a shared practice. (Teigland & Wasko, Electronic Portfolio (E-Folio)
2006) 2: A relatively large, emergent social collective 1: A Web-based collection of information and artifacts
E in which individuals working on similar problems self- about an individual. (Wasko, 2005) 2: Part of the
organize to help each other and share perspectives about brand name for the system developed by Avenet, LCC,
their work practice through text-based computer-mediated and the Minnesota State Colleges and Universities:
means, for example, listservs, discussion boards, and so eFolioMinnesota. (Langer, 2005) 3: A portfolio collected,
forth. (Wasko & Teigland, 2006a) 3: An emergent group saved, and stored in electronic format. (Wieseman, 2005a)
of an unlimited number of dispersed individuals working 4: An electronic (often Web-based) personal collection of
on similar tasks using a similar competence whose selected evidence from coursework or work experience and
communication channel is purely electronic. (Teigland relective commentary related to those experiences. The
& Wasko, 2005) e-portfolio is focused on personal (and often professional)
learning and development, and may include artifacts from
Electronic Newsgroup curricular and extra-curricular activities. (Garrett, 2006a)
A collection of messages posted online by individuals on 5: An electronic portfolio used by individuals to house
a speciied subject matter. (Coakes & Willis, 2005) personal information. An e-folio can be thought of as a
specialized version of an e-portfolio. (Wasko, 2005)
Electronic Participation
The engagement of an individual or a group in speciic Electronic Prescription
decision making and action by using ICT means. It aims A prescription created and handled in electronic form in
to encourage those not normally involved in a particular an integrated information system. (Suomi, 2005)
process or decision-making system to be involved.
(Yigitcanlar & Baum, 2006b) Electronic Press
A publishing service with a strong emphasis on the
Electronic Partnership publishing of digital courseware. This does not mean
A partnership relying on electronic (information) that print and traditional media, such as ilm, are not
technologies to communicate and interact amongst used. However, the courseware packs are predominantly
partners. It is mostly associated with e-commerce or e- electronic. (Ching et al., 2005)
business partnerships. (Zhao, 2005)
Electronic Procurement (E-Procurement)
Electronic Patient Record 1: The use of ICT such as the Internet and WWW by
All health-related information related to a patient in government agencies to facilitate the purchasing of goods
electronic form, assembled as a single entity. (Suomi, and services. (Hinnant & Sawyer, 2005) 2: The business-to-
2005) business (B2B) or government-to-business (G2B) purchase
and sale of supplies and services that is facilitated by the
Electronic Petition Internet and is sometimes referred to by other terms such
An e-democracy technique used for citizens appeal to as e-tendering or supplier exchange. (Demediuk, 2005) 3:
public bodies by ICT usage (e-mail, online forums, public The business-to-business purchase and sale of supplies and
bodies online interface). (Pazyuk, 2005) services over the Internet. An important part of many B2B
sites, e-procurement is also sometimes referred to by other
Electronic Policy terms, such as supplier exchange. Typically, e-procurement
The policy formulation and legal function of government. Web sites allow qualiied and registered users to look for
E-policy refers not only to the use of ICTs in government buyers or sellers of goods and services. Depending on the
settings, but also to the leading role of government in approach, buyers or sellers may specify prices or invite
promoting the information society through an adequate bids. Transactions can be initiated and completed. Ongoing
regulatory framework. (Sharma, 2006b) purchases may qualify customers for volume discounts
or special offers. E-procurement software may make it
Electronic Politics possible to automate some buying and selling. Companies
The use of ICT such as the Internet and WWW by political
actors to inform and facilitate public participation in the
political process. (Hinnant & Sawyer, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Proc ure m e nt Syst e m Ele c t ronic Sa le s Cycle 223

participating expect to be able to control parts inventories An e-readiness assessment normally takes into account
more effectively, reduce purchasing agent overhead, and education levels, infrastructure, the accessibility of ICT,
improve manufacturing cycles. E-procurement is expected and legal and regulatory issues. (Toland et al., 2005b) 4:
E
to be integrated with the trend toward computerized supply- Available technological, legal, institutional, and human
chain management. (Mockler et al., 2006) 4: The means for resources infrastructures and political will to engage in
the realization of online purchases, by using appropriate online activities. (Misuraca, 2005) 5: The capacity to
electronic communications services and infrastructures. participate in the global digital economy. (Finquelievich,
(Chochliouros & Spiliopoulou-Chochliourou, 2006) 5: 2005) 6: The state of being prepared to operate and
The online provision of goods and services by government utilize electronic technology. (Poda & Brescia, 2005)
agencies. E-procurement includes online requests for 7: E-readiness may be deined in terms of availability
proposal (RFPs), online requests for bids (RFBs), online bid of ICT infrastructure, the accessibility of information
acceptance, and online monitoring of contracts. (Schelin, and communication technologies (ICTs) to the general
2005) 6: The use of the Internet by government to procure citizen and business organization population, and the
or purchase goods and services, advertise their needs, effect of the legal and regulatory framework on ICT use.
select vendors, manage services, organize fulillment of (Averweg, 2006)
contracts, and effect payments. (Toland, 2006) 7: Using the
Internet and related technologies to facilitate procurement. Electronic Research
(Foley & Samson, 2006) Research that takes advantage of Internet-based tools and
techniques. (Janes, 2005)
Electronic Procurement System
The process of electronically managing the procurement of Electronic Reserve
goods. An e-procurement system cares about this process 1: A digitized collection of reading materials, accessible
and offers interfaces to perform typical activities, such as via a Web browser. A common ile format is .pdf, read
ordering products or browsing a list of available products through Adobe Acrobat Reader. (Buchanan, 2005) 2:
from product suppliers. (Abels & Hahn, 2006) The electronic storage and transmission of course-related
information distributed by local area networks (LANs)
Electronic Product Code (EPC) or the Internet. Also known as e-reserves; in addition to
1: Global coding scheme, administered by EPCglobal, displaying items on a screen, printing to paper and saving
identifying an items manufacturer, product category, to disk are often allowed. (Burke et al., 2005)
and unique serial number. The numerical code is stored
on the RFID chip, which is comparable to a conventional Electronic Retailer
bar code. (Loebbecke, 2006) 2: Uniquely identiies each A collective term applied to any Web site that sells a product
product and is normally a 128-bit code. It is embedded in or service, accepts payments, and fulills orders; a retailer
the RFID tag of the product. (Owens et al., 2005) who has an online storefront. (Scarpi & DallOlmo-Riley,
2006)
Electronic Questionnaire
A questionnaire in an electronic form that can be completed Electronic Retailing (E-Tailing)
via the Internet. (Paraskevi & Kollias, 2006) The application of electronic networks, especially the
Internet, as channels of distribution in order to address
Electronic Readiness (E-Readiness) inal consumers. Like traditional retailing, e-tailing is
1: The aptitude of an economy to use Internet- restricted to buying and selling physical or digital goods,
based computers and information technologies to but no services. (Madlberger, 2006)
migrate traditional businesses into the new economy.
(Lertwongsatien & Wongpinunwatana, 2005) 2: The Electronic Sales Cycle
preparedness of an organizations technology, processes, The time that elapses between the customer initiating the
and people to facilitate or inhibit e-business development. buying process online, and the point at which a decision
(Ash & Burn, 2006) 3: A measurement of how ready a is made on which product to buy. (Wang & Forgionne,
society is to beneit from recent developments in ICT. 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
224 Ele c t ronic Sc ie nc e Ele c t ronic St rat e gy

Electronic Science Electronic Signature


The large-scale science that will increasingly be carried 1: The Electronic Signature Act that President Clinton
E out through distributed global collaborations enabled by signed into law on June 30, 2001, facilitates electronic
the Internet. (Liu, 2005) contractual arrangements involving cryptography
principles, resulting in a digital approval process, allowing
Electronic Service for a handwritten signature or digital certiication.
1: A collection of network-resident software programs (Inoue & Bell, 2005) 2: This term refers to all electronic
that collaborate for supporting users in both accessing and authentication technologies and methods of signing a
selecting data and services of their interest handled by a digital document that serves the same purpose as manual
provider site. Examples of e-services are e-commerce, signatures. (Escalante, 2005)
e-learning, and e-government applications. (De Meo,
Quattrone, et al., 2005) 2: An electronic service accessed Electronic Social Contract
via a network such as the Internet. Example e-services Tacit set of conventions underlying the information society
include online banking, online stock broker, online tax and any kind of digital interaction across the Internet and
information, and online learning. (Yee & Korba, 2006) the World Wide Web. (Skovira, 2005)
3: The provision of a service using ICTs, especially the
Internet and the World Wide Web. (Sharma, 2006b) 4: The Electronic Society
provision of government services via the Internet, including E-government initiatives that deal particularly with
online information, online forms, online transactions, and the relationship between public agencies and other
online referral processes. (Schelin, 2005) institutionsother public agencies, private sector
companies, nonproit and community organizations.
Electronic Service Catalog (Olatokun, 2006)
A mechanism enabling service consumers to locate the
available e-services. Most often, these mechanisms are Electronic Space and Physical Space
hierarchical classiications of the services under some These concepts have been coined to describe the role
categorization axis (offering organization, target group, of geography in the information economy. Rather than
etc). (Vassilakis & Lepouras, 2006) marking the end of geography and the death of distance,
the rapid development of telecommunications networks,
Electronic Service Delivery (ESD) combined with the informatization of the economy and
A method of delivering services and conducting business other activities, have enabled individuals and organizations
with customers, suppliers, and stakeholders to achieve to establish and maintain new forms of relations across
local government developmental goals of improved time and space, often in ways impossible in the past.
customer service and business eficiency. (Averweg, This essentially overlays a new electronic, virtual space
2006) on top of the physical space in which we live. (Kimble
& Li, 2006)
Electronic Service Quality
Customers overall perception and experience of the three Electronic Store
levels of the service offered in e-business: foundation of A portal for purchasing and accessing Internet-delivered
service, customer-oriented services, and value-added materials. (Ryan, 2005)
services. (Wang & Forgionne, 2006)
Electronic Strategy
Electronic Shelf Label 1: The overall framework for national ICT development.
A price tag that provides accurate pricing due to electronic It has a social and an economic dimension. It consists
linkage between the shelves and the checkout system. of e-policies which concern the ICT environment, and
The technology is based on radio frequency, infrared, ICT readiness and usage of three stakeholders in ICT:
and/or WLAN linking a master checkout with the shelves. individuals, businesses, and governments. (Neumann,
(Kotzab, 2005) 2005) 2: The use of the Internet and related technologies
to add power to or reconigure a business strategy. (Foley
& Samson, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Supply Cha in Ele c t ronic Whit e Boa rd 225

Electronic Supply Chain voting, mobile phones, plus a wide variety of face-to-face
The physical dimension of e-business with the role of meetings. The focus of the process is on problem issues
achieving a base level of operational performance in the or on involved planning or envisioning processes. ETM
E
physical sphere. (Zhao, 2005) can be conducted at local, regional, or national levels.
(Keskinen & Kuosa, 2005)
Electronic Survey
A survey based on answers of an e-questionnaire. Electronic Trust
(Paraskevi & Kollias, 2006) A set of speciic beliefs dealing primarily with integrity
(trustee honesty and promise keeping), benevolence
Electronic Tailer (trustee caring and motivation to act in the trusters interest),
An online retail store. (Wang, Ding, et al., 2006) competence (ability of trustee to do what truster needs),
and predictability (trustees behavioral consistency of a
Electronic Technology particular e-vendor). (Yeo & Chiam, 2006)
1: Encompasses information technology, but also includes
any equipment or interconnected system or subsystem Electronic Tutelage
of equipment that is used in the creation, conversion, or Learning of new complex concepts (sometimes called
duplication of data or information. Electronic technology scientiic concepts), not with the intervention of a physical
includes telecommunications products such as telephones, tutor, but via electronically delivered materials; the basic
and ofice equipment such as fax machines. (Burgstahler, theory behind Web-based education. (Marold, 2005)
2005b) 2: Technology including hardware and software,
and their development using Internet, multimedia, mobile, Electronic Tutor
wireless, and security technologies, and so forth. (Youn Off-campus, online academic tutor. (Whateley et al.,
& McLeod, 2006) 2005)

Electronic Tender System Electronic Voting


A system to carry out a series of works from notiication of 1: A term used to describe any of several means of
order placement information on the homepage, application determining peoples collective intent electronically.
for tender participation, sending a tender document, and Electronic voting includes voting by kiosk, Internet,
opening tender documents to the public announcement of telephone, punch card, or optical scan ballot. (Kozeluh,
the result. (Kitagaki, 2005) 2005) 2: An e-democracy technique used for direct
expression of voters will in collective decision making
Electronic Tendering by ICT usage. (Pazyuk, 2005)
Another term for e-procurement. (Demediuk, 2005)
Electronic Voting System
Electronic Text A system to vote electronically using an information
An online electronic book. (Ryan, 2005) terminal of a personal computer. Various technologies have
been created to prevent illegal actions such as alteration of
Electronic Ticket voting contents or the use of abstainers votes. (Kitagaki,
A paperless electronic document used for ticketing 2005)
passengers, particularly in the commercial airline industry.
Virtually all major airlines now use this method of ticketing. Electronic White Board
(Mendes-Filho & Ramos, 2005) Interactive presentation tool that allows efficient
preparation, integration, and display of lessons that might
Electronic Town Meeting (ETM) include Web-based materials, photographs, video/sound
Includes discussion, deliberation among ordinary citizens, clips, and videoconferencing. Electronic white boards
and a vote that determines the outcome. Electronic media enable teachers to control the display from anywhere in
are used to facilitate the process. Generally, a combination a classroom and conduct a collaborative presentation with
of several electronic means is used: interactive TV, a student at the board. (Wild, 2005)
interactive radio, scientiic deliberative polling, telephone

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
226 Ele c t ronic Word-of-M out h (E-WOM ) Em e rge nc e

Electronic Word-of-Mouth (E-WOM) EM Algorithm


Social communication on the Internet. Web surfers either An iterative method for estimating maximum likelihood
E transmitting or receiving product-related information in problems with incomplete (or unlabeled) data. EM
online. (Goldsmith, 2006) algorithm can be used for semi-supervised learning since it
is a form of clustering algorithm that clusters the unlabeled
Electronic Work (E-Work) data around the labeled data. (Kim, 2005)
Work carried out outside ones normal workplaceat
home, tele-work center, or satellite oficeby using ICT Emancipatory Learning
equipment and infrastructure. A previously common term Learning under conditions that do not bind the learner
for this concept is tele-work or tele-commuting (used to traditions, and provides a freedom to pursue learning
especially in the United States). (Heinonen, 2005) needs and demands as determined or established by the
learner. (Taylor et al., 2005)
Electronic Work Sample
A performance-based work sample collected, saved, and EMAS
stored in electronic format. (Wieseman, 2005a) Community Web site operated by Sabah State Library.
(Gilbert, 2005a)
Elementary Entity
A data entity that semantically represents basic objects. Embedded Device
(Hurson & Yang, 2005) A full-featured computer integrated into a machine.
(Blecker & Graf, 2006)
Element
One object of attention within the domain of investigation. Embedded PI Submodel
An element defines the entities upon which the A full or partial PI model over a proper subset of domain
administration of the RepGrid is based. For example, variables. The most general PI models are those over large
to explore the critical success factors of IS projects, IS problem domains that contain embedded PI submodels.
researchers can use IS projects as elements in the RepGrid. (Xiang, 2005)
(Tan & Hunter, 2005)
Embedded Subtree
Elementary Fact Type Let T(N,B) be a tree, where N represents the set of its nodes
In ORM, an elementary fact is an atomic proposition that and B the set of its edges. We say that a tree S(Ns,Bs) is
applies a logical predicate to a sequence of one or more an embedded subtree of T provided that: (1) NsN, and
objects of a given type; it cannot be split into smaller (2) b=(n x,ny)Bs if and only if n x is an ancestor of ny in T.
facts without information loss. An elementary fact type In other words, we require that a branch appear in S if and
is a kind of elementary fact. For example: Person smokes; only if the two vertices are on the same path from the root
Person was born in Country; Person introduced Person to to a leaf in T. (Katsaros & Manolopoulos, 2005b)
Person. In UML, an elementary fact type is known as an
elementary association or elementary relationship type. Embedded Support Device
(Halpin, 2005) Support device integrated in the learning environment.
Learners cannot but use these devices (e.g., structure in
ELM: See a text). (Clarebout et al., 2005b)

Emergence
ELMS: See Enterprise Learning Management System. 1: In the context of natural computing, an emergent
phenomenon can be understood as the one whose global
Elongated Diffusion Pattern properties are neither possessed by, nor directly derivable
A pattern of IT diffusion in which, due to a reduction in from, any of its component parts. For instance, a single
the reputation effect, there is a hiatus prior to the arrival ant is a very simple insect with limited capabilities, but an
of a late minority of adopters. (Grifin, 2005) ant colony is capable of performing complex tasks, such
as nest building and organization. (de Castro, 2005) 2:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Em e rge nc e I ndex Em ot iona l I nt e llige nc e 227

The process by which often unexpected outcomes result Emoticon


from the interaction of different activities and occurrences 1: A text (ASCI) character used to indicate an emotional
within an organization. (Land, Amjad, et al., 2006) state in electronic correspondence. Emoticons or smileys,
E
as they are also called, represent emotional shorthand.
Emergence Index For example :-) represents a smile or happiness. (Garrett,
Image retrieval where the hidden or emergence meanings of 2006b) 2: The word emoticon is probably derived from
the images are studied and based on those hidden meanings the words emotion and icon, suggesting that emoticons
as well as explicit meanings. Where there is no hidden are iconsor imagesexpressing emotions. In written
meaning at all, an index of search is deined to retrieve conversations, such as chats, IMs, or Post-It notes, the lack
images, called emergence index. (Deb, 2005) of visual and aural support often needs to be compensated.
(Dunkels, 2005) 3: A combination of punctuation marks
Emergent Behavior and other special characters from the keyboard used to
The behavior that results from the interaction between a convey the tone of a computer-mediated communication
multitude of entities, where the observed behavior is not message. (Link & Wagner, 2006) 4: A graphical icon
present in any single entity in the multitude comprising that represents one of various emotions in a chat-based
the system that shows emergent behavior. (Zwitserloot & environment. (Champion, 2006a) 5: A graphic-like
Pantic, 2005) icon created using characters available on the standard
keyboard. Emoticons are used to convey emotion or states
Emergent Forms of Educational Method of being, which are often communicated through facial
New methods and techniques that may be employed or expressions such as smiling, frowning, looking puzzled,
used in the education process related to the deployment of and so forth. (Newberry, 2005) 6: An icon created from
Analytical Information Technology in academe. (LeRouge ASCII text used to express an emotion. The most simple
& Webb, 2005) of these is the smiley, created using a colon and bracket
:) (Roberts et al., 2006a)
Emergent Narrative
Aims at solving and/or providing an answer to the narrative Emotion Icon
paradox observed in graphically represented virtual worlds. A combination of keyboard characters or small images
Involves participating users in a highly lexible real-time meant to represent a facial expression. (Xu et al., 2006c)
environment, where authorial activities are minimized, and
the distinction between authoring-time and presentation- Emotion Synthesis
time is substantially removed. (Hall & Woods, 2006) The process of representing emotions in computing devices
using cognitive appraisal or other emotion classiication
Emergent Properties theories. (Byl & Toleman, 2005)
A systems concept from which it is proposed that a whole
system contains properties which are not seen within any Emotion-Extraction Engine
of its components or subsystems. It gives rise to the idea A software system that can extract emotions embedded
that a system is more than the sum of its parts. (Kimble in textual messages. (Xu et al., 2006a)
& Hildreth, 2006)
Emotional Intelligence
Emerging Pattern 1: A facet of human intelligence that includes the ability
An itemset that occurs signiicantly more frequently in one to have, express, recognize, and regulate affective states;
group than another. Utilized as a classiication method by employ them for constructive purposes; and skillfully
several algorithms. (Butler & Webb, 2005) handle the affective arousal of others. The skills of
emotional intelligence have been argued to be a better
EML: See Educational Modeling Language. predictor than IQ for measuring aspects of success in
life. (Pantic, 2005a) 2: A set of competencies that derive
Emote from a neural circuitry emanating in the limbic system.
To express a physical emotion using the keyboard. (Grifiths Personal competencies related to outstanding leadership
et al., 2006) include self-awareness, self-conidence, self-management,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
228 Em piric a l Eva luat ion Enc oding

adaptability, emotional self-control, initiative, achievement combining multiple sections of a course into one large
orientation, trustworthiness, and optimism. Social section, and heavy reliance on computer-based learning
E competencies include social awareness, empathy, service resources and an instructional staff of varying levels of
orientation, and organizational awareness. Relationship skills and expertise. (Twigg, 2005)
management competencies include inspirational
leadership, development of others, change catalyst, conlict EMS: See Enhanced Messaging Service.
management, inluence, teamwork, and collaboration.
(Wong-MingJi, 2005) Emulation
1: Actual software is written to execute something,
Empirical Evaluation instead of simulating it. (Janssen, 2005) 2: The realization,
Evaluation methodology which employs users to interact sometimes also called emulation, of a system or organism
with the system. (Athanasis & Andreas, 2005) corresponds to a literal, material model that implements
functions; it is a substantive functiona l device. Roughly
Empirical Interface Evaluation speaking, a realization is judged primarily by how well it
The empirical evaluation of an interface implies that can function as an implementation of a design speciication.
users are involved. Known methods, among others, are A system or function is used to emulate or realize another,
observational evaluation, survey evaluation, and when one performs in exactly the same way as another. A
thinking aloud protocol. (Karoulis et al., 2006) typical example in computer science is the emulation of
one computer by (a program running on) another computer.
Empirical Method (de Castro, 2005)
Method in which a system is evaluated based on observed
performance in actual use. (Danielson, 2006b) Enabler
A factor that makes something possible, for example,
Employability alignment is an enabler for organizations to cut production
The extent to which employees have skills that the market costs by half. (Lubbe, 2005)
and employers regard as attractive. (Scholarios et al.,
2005) Enabling Technology
A sphere of concern; consists of those technologies that
Employee Abuse are under development at a certain moment and that have
Employees, especially those employees who believe that potential to become part of the global infrastructure in
they are treated unjustly, may provide the data necessary the future. Currently, new 3G terminals and 4G network
for cyber-identity theft. With e-mail and databases full of technologies are typical examples. (Veijalainen & Weske,
consumer information, an employee or other insider can 2005)
pass spreadsheets along to thieves. Employees may divulge
personal information unintentionally or intentionally. Also Enactment
related to cyber-identity theft and the workplace is the Knowledge only takes on meaning as it interacts with the
possibility of phony job listings online in order to obtain learners environment. (Frank et al., 2005)
consumer information. (Close et al., 2006)
Encapsulation
Employee Lifecycle Management (ELM) 1: Data and actions are packaged together in a class, with
The integration of all aspects of information and knowledge the details of the implementation hidden from other classes.
in relation to an employee, from the hiring to the retirement (Lucas, 2005) 2: The ability to insulate data in a class
from the company. ELM enables enterprises to effectively so that both data security and integrity is improved. (D.
manage their portfolio of competencies. (Mller, 2005) Brandon, Jr., 2005a) 3: The addition of control information
by a protocol entity to data obtained from a protocol user.
Emporium Model of Course Redesign (Ngoh & Shankar, 2005)
This model eliminates all regular class meetings, replacing
classes with a learning resource center featuring online Encoding
materials and on-demand personalized assistance. 1: The process by which the content and meaning that is
Additional features of the emporium model often include to be communicated is transformed into a physical form

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Enc r ypt ing Ende m ic 229

suitable for communication. It involves transforming End


thoughts and ideas into words, images, actions, and so Results, consequences, impact, and payoffs. (Kaufman
forth, and then further transforming the words or images & Lick, 2005)
E
into their physical form. (Polovina & Pearson, 2006) 2:
The bit pattern to use for each symbol in a character set. End Result of Understanding
(D. Brandon, Jr., 2005b) 3: The process of using codecs An entity E has understood something S, if and only if E
to convert video iles to different distribution ile formats. can present S in terms of a system of its own primitives
The codecs used for encoding iles for CD-ROM and (i.e., self-explainable notions). (Gelepithis, 2005)
DVD are MPEG-1 and MPEG-2, respectively. (Vitolo et
al., 2005) 4: To input or take into memory, to convert to End User
a usable mental form, or to store into memory. (Atkinson 1: An individual who uses software packages or computer
& Burstein 2006) systems that do not require programming. (Jawahar, 2005)
2: Tutee, working with dedicated educational software
Encrypting packages. (Utsi & Lowyck, 2005)
The process of scrambling data such that it appears
meaningless to an average user. An authorized user can End-User Computing (EUC)
later restore the data back to its original. (Chen et al., 1: Direct, hands-on use of information systems by end
2005a) users whose jobs go beyond entering data into a computer
or processing transactions. (Chen, Holt, et al., 2005) 2:
Encryption The optional development of computer applications and
1: A modiication process that transforms data into a non- models by personnel (individuals or groups) outside the
readable format to protect against unauthorized viewing. MIS department. (Shayo & Guthrie, 2005)
Encryption can be handled by special applications, but it is
often included as a feature of a database system or as a utility End-User Computing Satisfaction
application as part of the operating system. Depending A widely accepted information systems success surrogate
on the encryption/decryption method, information that measures the degree to which a technology provides
transmitted in encrypted format may be decrypted the user with a sense of satisfaction that meaningful usage
routinely and without user intervention by e-mail software has been affected. (McHaney, 2005)
or commodity Web viewers, products such as Microsoft
Internet Explorer, Netscape Navigator, or Mozilla- End-User Development
compliant browsers. (Horiuchi, 2005a) 2: A transformation The development of information systems by end users
of data from an original readily understandable version rather than information system specialists. (Chen, Holt,
(plaintext) to a dificult-to-interpret format (ciphertext) et al., 2005)
as a way of protecting conidentiality until changed back
to the original. Images can also be encrypted to prevent End-User License Agreement (EULA)
recognition. (Friedman, 2005) 3: Concealing data by Spells out the legal rights of both the purchaser and vendor
encoding it in a form that requires a secret key to decode. of software. (Friedman, 2005)
(N.C. Rowe, 2006c) 4: Data coding schemes to protect
information privacy. (Quah, Leow, & Ong, 2006) 5: The End-User Performance
transformation of plaintext into an apparently less readable Performance of end users. (Jawahar, 2005)
form (called ciphertext) through a mathematical process.
The ciphertext may be read by anyone who has the key End-User Training
that decrypts (undoes the encryption of) the ciphertext. Teaching end users to learn and use organizational
(Mezgr, 2005) 6: Scrambling of data into an unreadable computing technology. (Jawahar, 2005)
format as a security measure. (Lawson-Body et al., 2005)
7: The act of protecting information by transforming it. Endemic
(Guan, 2006h) The usual level of disease in a geographic area in a given
period of time. (Garb & Wait, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
230 Ent e rprise Re sourc e Pla nning (ERP) Enha nc e d Obse rve d-T im e -Diffe re nc e M e t hod (E-OT D)

Enterprise Resource Planning (ERP) and to implement various engineering activities. (Ma,
The set of processes of voluntary (conscious) control of 2005a)
E attention. These processes are also referred to as top-down
or goal-driven. An example of an endogenous attentional Enhanced Data Mining with Incomplete Data
mechanism is the attention you are paying to this page Data mining that utilizes incomplete data through fuzzy
as you are reading. Endogenous attention is voluntary; it transformation. (H. Wang & S. Wang, 2005)
requires explicit effort, and it is normally meant to last.
(Thomas & Roda, 2006a) Enhanced Data Rates for GSM Evolution
(EDGE)
Energetic Engagement 1: An enhanced version of GSM networks for higher
Active participation that refers to members ability to data rates. The main difference is the adoption of 8
suggest changes on the policies, the structure, and the QPSK modulation in the air interface which increases
environment/system. (N.C. Rowe, 2006d) the available bit rates. (Louvros et al., 2005b) 2: Gives
GSM and TDMA the capability to handle 3G mobile
Energy Management System phone services with speeds up to 384 kbps. Since it uses
The system used to eficiently manage power network the TDMA infrastructure, a smooth transition from
operation, coordinate optimized power distribution, and TDMA-based systems such as GSM to EDGE is expected.
manage costs of electricity production and distribution. (Akhtar, 2005) 3: A faster version of the GSM wireless
(Jeong et al., 2006) service, EDGE is designed to deliver data at rates up to
384 Kbps, and enable the delivery of multimedia and other
Engagement broadband applications to mobile phone and computer
Becoming involved with a topic at more than a simple users. (Olla, 2005a)
and supericial level; a time when individuals come to
know and understand the detailed content of what they Enhanced Instructional Presentation (EIP)
are studying. (Pritchard, 2005b) A traditional linear presentation (e.g., text, video)
supplemented with learner control features and hyperlinked
Engagement-Supporting Technology material, providing answers to authentic learner questions
One of a number of technologies that enable people to learn and additional support information (e.g., enrichment,
and communicate with fellow citizens about a speciic remedial). (Pelton & Pelton, 2005)
policy-related event or challenge. (OLooney, 2006)
Enhanced Instructional Presentation Model
Engineering Design (EIP Model)
Encompasses a variety of activities aiming at generating A transformation model that guides the transformation of
and reining detailed product descriptions prior to their existing (or newly captured) linear content into hypermedia
physical realization. (Ma, 2006) presentations (online or CD-ROM based). (Pelton &
Pelton, 2005)
Engineering Design Knowledge
All the standards, laws, and best practices that affect Enhanced Messaging Service (EMS)
design decision are called engineering design knowledge. An application-level extension to SMS for cellular phones
(Ma, 2006) available on GSM, TDMA, and CDMA networks. An EMS-
enabled mobile phone can send and receive messages that
Engineering Design Knowledge Management have special text formatting (i.e., bold or italic), animation,
The management of engineering design knowledge pictures, icons, sound effects, and special ringtones.
generally entails its modeling (representation), maintenance, (Lalopoulos et al., 2005a)
integration, and use. (Ma, 2006)
Enhanced Observed-Time-Difference Method
Engineering Information System (E-OTD)
An information system used to manage the information in Similar to OTDOA, without the need for base stations to be
data and knowledge-intensive engineering applications, synchronized (additional elements are used that measure

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Enha nc e d Te levision (Enha nc e d T V ) Ent e rprise Archit e c t ure 231

the real-time differences between base stations to correct Ensemble-Based Method


the measurements). (Ververidis & Polyzos, 2006) A general technique that seeks to proit from the fact that
multiple rule generation followed by prediction averaging
E
Enhanced Television (Enhanced TV) reduces test error. (Muruzbal, 2005)
A television that provides subscribers with the means for
bi-directional communication with real-time, end-to-end Enterprise
information transfer. (Hulicki, 2005) A business organization. (Henry, 2006)

Enhanced TV: See Enhanced Television. Enterprise Application


Provides computer application support for the full lifecycle
Enneagram Personality System of business application development and system support.
Identiies nine personality types, each based on a speciic Involves in-depth understanding of business processes
compulsion and underlying emotion; the enneagram and worklow. (Yow & Moertiyoso, 2005)
diagram shows a different growth path for each of the
nine types. (Kaluzniacky, 2006) Enterprise Application Integration (EAI)
1: Extranets provide the ERP II system with a portal
ENOP: See Electronic Network of Practice. and a platform for integration with other systems inside
or outside the corporation. EAI provides the support
Enriching Digital World for automating processes across various IT platforms,
The process of embedding and encoding those clues or systems, and organizations. (Mller, 2005) 2: The process
signs within an interface from which the user is enabled to of coordinating the operations of various applications
exploit the functionalities of a certain product. (Magnani across an enterprise so they can perform as an integrated,
& Bardone, 2006) enterprise-wide system. This term also refers to the set of
commercial applications designed to facilitate this process.
Enrollment (Mockler et al., 2006) 3: Application of aligned processes,
1: The initial acquisition and registration of biometric software and hardware tools, methodologies, and
data for an individual. Dependent on the type of biometric technologies aimed at interconnecting and consolidating
system, this data may be registered in association with all computer applications, data, and business processes
the identity of the user or against some pseudonym that in order to achieve a friction-free network that allows
preserves anonymity. (Fleming, 2005a) 2: The initial real-time data exchange as well as easy management
process of collecting biometric data from a user and then and (re)coniguration activities. (Blecker, 2006a) 4:
storing it in a template for later comparison. There are Comprehensive middleware software suits that allow
two types: positive enrollment and negative enrollment. connection to an array of applications including Enterprise
(Vatsa et al., 2005) Resource Planning, Customer Relationship Management,
and to various databases. (Hwang, 2005) 5: The plans,
Ensemble methods, and tools aimed at modernizing, consolidating,
1: A combination, typically weighted or unweighted and coordinating the computer applications in an
aggregation, of single induction estimators able to improve enterprise. Typically, an enterprise has existing legacy
the overall accuracy of any single induction method. applications and databases, and wants to continue to use
(Siciliano & Conversano, 2005) 2: A function that returns them while adding or migrating to a new set of applications
a combination of the predictions of multiple machine that exploit the Internet, e-commerce, extranet, and other
learning models. (Oza, 2005) new technologies. (Karakostas, 2005)

Ensemble Learning Enterprise Architecture


A machine learning paradigm using multiple learners to A business and performance-based framework to
solve a problem. (Zhou, 2005) support cross-agency collaboration, transformation, and
organization-wide improvement. (Pang, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
232 Ent e rprise Colla borat ion Ent e rprise M ine r

Enterprise Collaboration Enterprise Information Security Policy (EISP)


Application of systems and communications technologies A policy that sets the strategic direction, scope, and tone
E at the enterprise level to foster the collaboration of people for all of an organizations security efforts. (Mattord &
and organizations to overcome varying levels of dispersion Whitman, 2005)
to accomplish a common goal. This term, when applied to
the use of technologies, is also known as e-collaboration Enterprise Integration
or distributed collaboration. (Morris-Jones & Carter, Refers to the plans, methods, and tools aimed at
2005) modernizing, consolidating, and coordinating software
applications among a group of businesses or organizations
Enterprise Content Management System that interact as consumers and suppliers. Enterprise
(ECMS) integration might involve developing a total view of the
An integrated approach to managing documents, Web organizations businesses and applications, seeing how
content, and digital assets. It combines the capabilities of existing applications it into the new model, and then
an Enterprise Document Management System (EDMS) devising ways to eficiently reuse what already exists, while
and a Content Management System (CMS) with the ability adding new applications and data. Enterprise integration is
to manage the full content lifecycle across a growing done for the mutual beneit of all organizations involved.
assortment of content types. (Sarmento, 2005) (Ghenniwa & Huhns, 2005)

Enterprise Deployment Enterprise Internal Portal (EIP)


Term used in the computer industry to describe hardware A Web-based intranet that allows employees to access,
and software conigurations. These are aimed at addressing store, and transfer knowledge within or outside the
the corporation as a whole, as opposed to a single organization; it also provides a virtual community or
department. (Raisinghani & Nugent, 2005) forum for discussion. (Shen & Tsai, 2006)

Enterprise Document Management System Enterprise Knowledge Management (EKM)


(EDMS) A process aimed at injecting knowledge into business
The set of programs, procedures, and/or software processes and enabling reuse of human expertise through
that manage, control, and provide access to electronic the creation of common data objects and deinitions that
documents. (Sarmento, 2005) can be used with equal ease and success by all employees
in the enterprise. (Framinan, 2005)
Education Multimedia
The use of multimedia for designing educational software. Enterprise Learning Management System
(Uden, 2005) (ELMS)
A full-featured learning management system that also
Enterprise Function includes some of the features and capabilities of a Web
Comprises the typical functions of a business such as portal and content management system. An ELMS is
human resources, marketing and sales, manufacturing, designed for large-scale use and integration with other
accounting, and inance. (Carstens, 2005) products and systems. It also includes multiple levels of
administrative and user access. Content that is stored within
Enterprise Information Portal (EIP) the system is structured within a content hierarchy that
1: Single Web interface to corporate information. (de does not need to be tied to a particular course. (Chapman,
Carvalho, & Ferreira, 2006) 2: A gateway to a corporate 2005a)
intranet used to manage knowledge within an organization.
EIPs are designed primarily for business-to-employee Enterprise Miner
(B2E) processes, and offer employees the means to access Data-mining software developed by SAS Corporation
and share data and information within the enterprise. that is used to create predictive models to solve business
(Tatnall, 2006) challenges. (Athappilly & Rea, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ent e rprise M ode l Ent e rprise Re sourc e Pla nning (ERP) 233

Enterprise Model an enterprise. (Feuerlicht & Vorisek, 2006) 7: Typically,


A diagrammatic representation of an enterprise or part of an ERP systems are software packages composed of several
enterprise. An enterprise usually focuses on certain aspects modules, such as human resources, sales, inance, and
E
of the enterprise, such as its goals and strategies, its business production, and providing cross-organization integration
processes, its organization structure, its information and of transaction-based data throughout imbedded business
knowledge, and so forth. (Opdahl, 2005) processes. These software packages can be customized to
the speciic needs of each organization. (Esteves & Pastor,
Enterprise Performance and Bottom-Line 2005) 8: An integrated information system that supports
Data critical for business success, such as employee most of the business processes and information system
productivity, customer satisfaction, and revenues. (Henry, requirements in an organization. (Sundaram & Portougal,
2006) 2005b) 9: Conigurable enterprise software that integrates
business processes across functions. (Hwang, 2005) 10:
Enterprise Performance Management (EPM) An off-the-shelf accounting-oriented information system
A combination of planning, budgeting, financial that meets the information needs of most organizations. A
consolidation, reporting, strategy planning, and complex and expensive information tool to meet the needs
scorecarding tools. Most vendors using the term do not of an organization to procure, process, and deliver customer
offer the full set of components, so they adjust their goods or services in a timely, predictable manner. (Bradley,
version of the deinition to suit their own product set. 2005) 11: An information system that spans organizational
(Rahman, 2005e) boundaries with various organizational functional modules
and systems, integrated and managed by one system
Enterprise Resource Planning (ERP) application. (Sarkis & Sundarraj, 2005) 12: A business
1: A business management system that can integrate all software package for running every aspect of a company,
facets of the business, including planning, manufacturing, including managing orders, inventory, accounting, and
sales, and marketing, through a common database. As the logistics. Well-known ERP software providers include
ERP methodology has become more popular, software BAAN, Oracle, PeopleSoft, and SAP, collectively
applications have been developed to help business managers known to industry insiders as the BOPS. (Colmenares
implement ERP in business activities such as inventory & Otieno, 2005) 13: An information technology tool
control, order tracking, customer service, inance, and with capacity to integrate a irms business functions or
human resources. (Archer, 2005) 2: A business management facets (e.g., planning, manufacturing, marketing, human
system that integrates all the back-ofice business functions resources, inance, procurement, etc). (Barima, 2006b)
of a business; for example, inventory, sales, marketing, 14: An integrated system that supports a wide range
planning, inance, manufacturing, purchase, and so forth. of transaction processing functions common to most
(Malik, 2006) 3: ERP systems are integrated applications organizations. Applications are designed around modules,
that satisfy the transaction processing requirements for a which are linked to a central database in such a manner
wide range of business activities, including purchasing, that data entered once through one module are available
production planning, warehouse management, inventory to applications of all other modules. (Tarafdar, 2005) 15:
control, sales order processing, distribution, inance, An integrated software system processing data from a
and human resources. (Carton & Adam, 2005) 4: Set of variety of functional areas such as inance, operations,
activities supported by multi-module application software sales, human resources, and supply-chain management.
that helps a manufacturer or other business manage (Troutt & Long, 2005) 16: An enterprise-wide group of
the important parts of its business, including product software applications centered on an integrated database
planning, parts purchasing, maintaining inventories, designed to support a business process view of the
interacting with suppliers, providing customer service, organization, and to balance the supply and demand for
and tracking orders. (Morabito & Provera, 2005) 5: its resources. This software has multiple modules that
Packaged software to support corporate functions such may include manufacturing, distribution, personnel,
as inance, human resources, material management, payroll, and inancials, and is considered to provide the
or sales and distribution. (Framinan, 2005) 6: System necessary infrastructure for electronic commerce. (Dunn
designed to support and automate business processes for & Grabski, 2005) 17: Enables the company to integrate
manufacturing, distribution, payroll, and inances for data used throughout the organizations in functions such

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
234 Ent e rprise Re sourc e Pla nning Com m unit y Ent e rprise Re sourc e Pla nning I I (ERP I I )

as inance, operations, human resources, and sales. This Enterprise Resource Planning Modiication
system extends the pool of information for business A tailoring option, which results in changes being made
E intelligence. (Raisinghani & Nugent, 2005) to the existing ERP (standard) code and custom objects
being created. (Ng, 2005)
Enterprise Resource Planning Community
A model defining the collective relationships and Enterprise Resource Planning Patch-Option
interactions between the three de facto actors (the ERP A tailoring option, where vendors patches are used to
vendor, the ERP consultant, the implementing organization) service a maintenance request. (Ng, 2005)
within the ERP market. (Sammon & Adam, 2005)
Enterprise Resource Planning Stabilization
Enterprise Resource Planning Coniguration Stage
A tailoring option that involves setting or coniguring a The irst weeks after the beginning of an ERP system
generic/industry-speciic ERP system using the switches/ operation in the company. (de Souza & Zwicker, 2005)
tables provided by the vendor in order to personalize the
ERP system to support an organizations business practices Enterprise Resource Planning System
and requirements. (Ng, 2005) 1: A comprehensive information system that collects,
processes, and provides information about all parts of an
Enterprise Resource Planning Customization enterprise, automating business processes and business
Customization simply means that changes, modiications, rules within and across business functions, partly or
or adaptations are needed in order to meet some user completely. (Kurbel, 2005) 2: An integrated information
requirements. It can be carried out via coniguration system purchased as a commercial software package with
tables, adding extensions or making modiications to the the aim of supporting most operations of a company. (de
standard code (but cannot be done by applying any patch Souza & Zwicker, 2005)
provided by the vendor). (Ng, 2005)
Enterprise Resource Planning Total Cost of
Enterprise Resource Planning Decision and Ownership
Selection Stage ERP software lifecycle cost covering the initial
Stage at which the company decides to implement an ERP implementation and installation, continuous maintenance,
system and chooses the supplier. (de Souza & Zwicker, and upgrades to the system until the software is retired from
2005) the production system. It includes all the software, hardware
and equipment, annual maintenance fees, outsourcing,
Enterprise Resource Planning Extension training, documentation, personnel, management, and
A tailoring option that involves adding custom or third- service costs. (Ng, 2005)
party codes to user-exits, add-ons, reports, or user
interfaces, without changing the vendor/standard code. Enterprise Resource Planning II (ERP II)
(Ng, 2005) 1: A term that has been coined to denote the applications
aimed at satisfying organizations that have already
Enterprise Resource Planning Implementation implemented ERP. This appears to include the realization
Stage of eficiency gains originally planned for ERP, the
Stage of an ERP project at which the ERP systems modules implementation of ERP solutions to more vertical market
are put into operation. (de Souza & Zwicker, 2005) segments, and the further integration of key business
processes (for example, to include PLM). (Carton &
Enterprise Resource Planning Lifecycle Adam, 2005) 2: ERP II is understood to mean the re-
1: Consists of the several stages that an ERP system implementation and expansion of ERP. It is an extended,
goes through during its whole life within the hosting open, vertical, and global approach to systems integration
organization. (Esteves & Pastor, 2005) 2: The various and can be understood as an application and deployment
stages through which a project of introducing an ERP strategy for collaborative, operational, and inancial
system in a company passes through. (de Souza & Zwicker, processes within the enterprise, and between the enterprise
2005) and key external partners and markets in an effort to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ent e rprise Re sourc e Pla nning U t ilizat ion St a ge Ent re pre ne uria l I de nt it y 235

provide deep, vertical-speciic functionality coupled Entity Set


with external connectivity. (Sammon & Adam, 2005) 3: 1: Similar entities or objects with common properties are
Opening up ERP systems beyond the enterprise level to summarized into entity sets or entity types; graphically
E
exchange information with supply chain partners. ERP II represented in rectangles. (Bagui, 2005) 2: An entity is a
extends beyond the four walls of the business to trading non-lexical object that in the real world is identiied using
partners. (Bradley, 2005) a deinite description that relates it to other things (e.g.,
the Country that has CountryCode US). Typically, an
Enterprise Resource Planning Utilization Stage entity may undergo changes over time. An entity type is
Stage of an ERP project at which the system starts to a kind of entity, for example, Person, Country. In UML,
belong to the day-by-day operations of the company. (de an entity is called an object, and an entity type is called
Souza & Zwicker, 2005) a class. (Halpin, 2005)

Enterprise Resource Planning-Enabled Entity-Based Query


Organization A probabilistic query that returns a set of objects. (Cheng
An organization with a fully implemented enterprise & Prabhakar, 2005)
resource planning system extending into B2B and/or B2C
applications. (Burn & Ash, 2006) Entity-Relationship (ER)
A conceptual data model that deines the domain in terms
Enterprise Software Coniguration of entities, attributes, and relationships. ERD is an ER
The process of implementing customized information diagram in which entities are represented as rectangles,
lows, business logic, and database design in an ERP attributes as ellipses, and relationships between entities
software. This requires activities such as designing as diamonds. (Shoval & Kabeli, 2005)
forms, reports, and screen layouts; modifying existing
programs; writing code for add-on applications; designing Entity-Relationship Diagram
and implementing databases; and converting data from 1: A graphical representation of the entities and the
legacy systems. (Tarafdar, 2005) relationships between them. Entity relationship diagrams
are a useful medium to achieve a common understanding
Enterprise-Wide Innovation of data among users and application developers. (Alhajj &
Includes leveraging successful innovations so they Polat, 2005a) 2: The most widely used model to express
affect the entire enterprise; provides greater value the database conceptual schema. (De Antonellis et al.,
toward competitive advantage than isolated, individual 2005)
innovations. (Norris, 2005)
Entity-Relationship Model (E-R Model)
Entertainment Service 1: A model to represent real-world requirements through
Providing users recreational services (e.g., downloading hot entities, their attributes, and a variety of relationships
pictures, music tunes, and games). (Lee & Pai, 2005) between them. E-R models can be mapped automatically
to the relational model. (Denton & Besemann, 2005) 2:
Entity One of the most well known and widely used conceptual
1: Anything that can be conceived as real and can be models. The main concepts in the E-R model are entity
named. (Marjomaa, 2005) 2: The basic element in a types, relationships, and their attributes. (Mani & Badia,
conceptual model that represents an abstraction with 2005)
modeling purposes. (Cuadra et al., 2005)
Entrepreneur
Entity Realism A business owner who makes all decisions and operates
An ontological position that entity classes exist in the in uncertain environment. (Kyobe, 2006)
world independent of their being perceived by the modeler.
(Artz, 2005c) Entrepreneurial Identity
There is a view that individuals become entrepreneurs
as they are relexively constituted by the discourse of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
236 Ent re pre ne uria l M a na ge m e nt St yle EPCgloba l

enterprisethat is, they begin to characterize themselves Environment Variable


as entrepreneurs as they adopt the norms, practices, and One of a number of system variables whose value contains
E values of the entrepreneurial community with which they data about a users system coniguration and Web site last
engage. (Warren, 2006) visited. (Szewczak, 2005)

Entrepreneurial Management Style Environmental Constraint


An approach that supports interaction and shared decision A factors in the environment with potential to inhibit or
making with employees and the early adoption of IT. constrain ones behavior and/or performance. (Jawahar,
Employees are encouraged to embrace ambiguity as a 2005)
source of opportunity, present new ideas, and initiate action
in new directions. (Winston & Dologite, 2005) Environmental Factor
Relects the pressure to adopt an innovation that is
Entrepreneurial Orientation external to the organization. Such pressure may be exerted
The practices and decision-making styles managers use by competitors, clients, trading partners, government
to keep the irms competitive. (Kyobe, 2006) initiatives, and other characteristics of the marketplace.
(Cragg & Mills, 2005)
Entrepreneurial University
A wide-ranging term, used in IT to describe universities Environmental Inluence
associated with high rates of knowledge transfer through A factor external to an entity (i.e., in its environment) that
the formation of spin-out companies, and the exploitation affects its conduct of knowledge management. (Holsapple
of intellectual property rights by faculty and students. & Joshi, 2006)
(Warren, 2006)
Environmental Scanning
Entropic Distance The systematic gathering of information in order to
The entropic distance of a distribution g from a target reduce the randomness of the information low into the
distribution f, is: organization, and to provide early warnings of changing
conditions in both the external and internal environment.
fi
E d = i f i log (Parker & Nitse, 2006)
gi
Environmental Variable
(Giudici, 2005) The context within which career decisions are made, such
as the school and work environment. (Beise et al., 2005)
Entropy
1: A measure of the degree of disorder or tendency toward E1
the breakdown of any system. In physics this term is deined One of the links used for the physical interconnection
in the second law of thermodynamics, which states in part between different networks. (Frempong & Braimah,
that the entropy of the universe tends to a maximum. 2005)
(Targowski, 2005) 2: Measures the indeterminateness
inherent to a probability distribution and is dual to EOQ: See Economic Order Quantity.
information. (Kern-Isberner, 2005)
EPC: See Electronic Product Code.
Envelopes
Are calculated as upper and lower envelopes above and EPCglobal
below the global baseline. These are the connected pixels A joint venture between EAN International in Europe
that form the external points of the signature obtained by and the Uniform Code Council in the United States to
sampling the signature at regular intervals. (Chakravarty administer the numbering and data standards for EPC.
et al., 2005a) (Loebbecke, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ephe m e ris Dat a Pa ra m e t e r ERP Com m unit y 237

Ephemeris Data Parameter Equal-Depth Discretization


A short section of the space vehicle or satellite orbit. A technique that divides the attribute value range into
New data are gathered by receivers each hour. However, intervals of equal population (value density). (Shen &
E
the receiver is capable of using data gathered four hours Horiguchi, 2005)
before without signiicant error. Algorithms are used in
conjunction with ephemeris parameters to compute the Equal-Width Discretization
SV position for any time within the period of the orbit A technique that divides the attribute value range into
described by the ephemeris parameter set. (Freeman & intervals of equal width (length). (Shen & Horiguchi,
Auld, 2005) 2005)

Episodal Association Rule Equivalence in Construct Operationalization


A rule of the form X Y, where X is antecedent episode, Y Refers to whether a construct is manifested and
is the consequent episode, and XY = . The conidence of operationalized the same way across cultures. (Karahanna
an episodal association rule is the conditional probability et al., 2005)
that the consequent episode occurs, given the antecedent
episode occurs under the time constraints speciied. The Equivocality
support of the rule is the number of times it holds in the An expression or term liable to more than one interpretation.
database. (Harms, 2005) Equivocality refers to ambiguity, confusion, a lack of
understanding, or the existence of multiple and conlicting
Episode interpretations about a particular situation. Equivocality
1: A combination of events with a partially speciied is addressed by the exchange of existing views among
order. The episode ordering is parallel if no order is individuals to deine problems and resolve conlicts through
speciied and serial if the events of the episode have a the enactment of shared interpretations that can direct
ixed order. (Harms, 2005) 2: A subset or subsequence of future activities. It is used to decide which questions to
a session composed of semantically or functionally related ask to reach agreement and gain commitment. (Croasdell
pageviews. (Mobasher, 2005b) & Wang, 2006)

Episodic Knowledge ER
Declarative memory consists of two types of knowledge See Entity-Relationship.
topic or semantic, and episodic. Episodic knowledge
consists of ones experience with knowledge. These are ER Diagram: See Entity-Relationship Diagram.
learned through experience once the topic knowledge is
obtained from textbooks, formal training, and education. Ergonomy
(Raisinghani, 2005) The science of the interface between people and products. It
is based on human factor considerations such as cognition,
EPM: See Enterprise Performance Management. reasoning, memory, and language. In the context of a
software product, it guides the design and constitutes
EPON: See Ethernet PON. a support for testing and evaluating user interfaces to
facilitate the ease of use of the software system. (Daassi
Equal Employment Opportunity Classiication et al., 2006)
A job classification system set forth by the Equal
Employment Opportunity Commission (EEOC) for Eriksson-Penker Process Diagram
demographic reporting requirements. (Troutt & Long, UML extension created to support business modeling
2005) which adapts the basic UML activity diagram to represent
business processes. (Gur u, 2005)
Equal Error Rate
The error rate when the proportions of FAR and FRR are ERP: See Enterprise Resource Planning.
equal. The accuracy of the biometric system is inversely
proportional to the value of EER. (Chakravarty et al., ERP Community: See Enterprise Resource Planning
2005b) Community.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
238 ERP Coniguration Ethernet

ERP Coniguration: See Enterprise Resource Planning algorithm is used to determine the minimal set of ields
Coniguration. to impute so that the inal (corrected) record will not fail
E edits. (Conversano & Siciliano, 2005)
ERP Customization: See Enterprise Resource
Planning Customization. Erudite Agent
Acts as a broker locating compatible candidates according
ERP Decision and Selection Stage: See Enterprise to speciic similarities found in their proiles. Erudite has
Resource Planning Decision and Selection Stage. two roles: one is upon the requesting of interface agents, it
queries its knowledge base, searching for other candidates
ERP Extension: See Enterprise Resource Planning that seem to have the same interests; the other is to keep
Extension. its knowledge base updated with the candidates speciic
information provided by the resident interface agents. In
ERP Implementation Stage: See Enterprise Resource doing so, it implements the processing part of the SHEIK
Planning Implementation Stage. systems architecture. (Nabuco et al., 2006)

ERP Lifecycle: See Enterprise Resource Planning ES/KBS: See Expert System/Knowledge-Based
Lifecycle. System.

ERP Modiication: See Enterprise Resource Planning ESD: See Electronic Service Delivery.
Modiication.
ESS: See Extended Service Set.
ERP Patch-Option: See Enterprise Resource Planning
Patch-Option. Essentialism
The view that some properties are necessary properties
ERP Stabilization Stage: See Enterprise Resource of the object to which they belong. In the context of IT,
Planning Stabilization Stage. essentialism implies a belief that an individuals cultural
identity (nationality, ethnicity, race, class, etc.) determines
ERP System: See Enterprise Resource Planning and predicts that individuals values, communicative
System. preferences, and behaviors. (Macfadyen, 2006a)

ERP TCO: See Enterprise Resource Planning Total Estimation-Maximization Algorithm


Cost of Ownership. An algorithm for computing maximum likelihood estimates
from incomplete data. In the case of itting mixtures, the
ERP II: See Enterprise Resource Planning II. group labels are the missing data. (Burr, 2005b)

ERP Utilization Stage: See Enterprise Resource Ethernet


Planning Utilization Stage. 1: A communications standard for a Local Area Network
(LAN). When a device wishes to transmit, it waits until
ERP-Enabled Organization: See Enterprise Resource the link is empty and then transmits. In the event that two
Planning-Enabled Organization. or more devices transmit simultaneously (collision), all
devices stop transmitting and wait a random time period
Error Control before attempting to retransmit. (Ruppel & Ruppel, 2005)
Selection of a classiication rule in such a way to obtain 2: A popular LAN technology that supports transmission
a desired proportion of false positive and false negative. rates at 10 Mbps and serves as the basis for the IEEE
(Felici & Truemper, 2005) (Institute of Electrical and Electronics Engineers) 802.3
standard and its extensions. Newer and faster versions
Error Localization of Ethernet include Fast Ethernet (100 Mbps), Gigabit
The (automatic) identiication of the ields to impute in Ethernet (1 Gbps), and 10 Gigabit Ethernet (10 Gbps).
an edit-failing record. In most cases, an optimization (Littman, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Et he r ne t Fra m e Et hnogra phy 239

Ethernet Frame of principles of right conduct. The rules or standards


A standardized set of bits, organized into several ields, governing the conduct of a person or the members of a
used to carry data over an Ethernet system. Those ields profession. (Wang, Chen, et al., 2006) 3: The branch of
E
include the preamble, a start frame delimiter, address philosophy that concerns itself with the study of morality.
ields, a length ield, a variable size data ield that carries (Goodman, 2005) 4: The philosophy of morality. (Knight,
from 46 to 1,500 bytes of data, and an error-checking 2006b) 5: The study of social or interpersonal values and
ield. (Freire et al., 2005) the rules of conduct that follow from them. (Gilbert, 2005)
6: The study of the general nature of morals and values as
Ethernet PON (EPON) well as speciic moral choices; it also may refer to the rules
As deined by IEEE 802.3ah, it features a passive optical or standards of conduct that are agreed upon by cultures
network for iber-to-the-home service that uses Ethernet and organizations that govern personal or professional
as its transmission protocol. (Kelic, 2005) conduct. (Cook, 2005)

Ethical ETHICS: See Effective Technical & Human


Conforming to standards of professional or social behavior Implementation of Computer-Based Systems.
agreed to by all members of a virtual enterprise. (Wong,
2005) Ethics of Knowledge Management
The study of the impact of knowledge management on
Ethical Behavior society, the organization, and the individual, with a
Receives greater attention today, partly due to reported particular emphasis on the damaging effects knowledge
cases of questionable or potentially unethical behavior management can have. (Land et al., 2006b)
and the associated dysfunctions that emerge. Because
ethics involves the study of moral issues and choices, Ethnocentric Content
it is concerned with moral implications springing from Pieces of information provided by local journalists of
virtually every decision. As a result, managers are particular interest for locals who ind suficient elements
challenged to set the standards and act as role models for for understanding it. On the contrary, local and speciic
other employees. (Grieves, 2006a) content could be strange to overseas readers. (Daz-
Andrade, 2005)
Ethical Climate
Indicates whether an organization has a conscience. The Ethnography
more ethical the perceived culture of an organization, the 1: An approach to research that involves in-depth study
less likely it is that unethical decision making will occur. through observation, interviews, and artifact analysis in
(Grieves, 2006a) an attempt to gain a thorough understanding from many
perspectives. (Roibs, 2006b) 2: Research characterized
Ethical Design by an extended period in the ield and which involves
Attempts to promote good through the creation of products the researcher being immersed in the community being
that are made and consumed within a socially accepted studied. (Trauth, 2005b) 3: The branch of anthropology
moral framework. (Knight, 2006b) that provides scientiic description of individual human
societies. (Zaphiris et al., 2005) 4: The work of describing a
Ethical Local Governance culture. The essential core aims to understand another way
Refers to a government where members and staff recognize of life from the native point of view. (DeLorenzo, 2005) 5:
the importance of ethical standards in local governance, While its Greek etymological origins mean description
thus enabling the authority to construct and develop an of a people, ethnography has two separate meanings.
ethical culture and values for the authority. (Yigitcanlar One refers to the process of doing ield research with a
& Baum, 2006a) host community. The second refers to the writing of a
documentary text based on that research. Ethnography has
Ethics been the mainstay of qualitative research in anthropology.
1: A branch of moral philosophy that examines the (Forte, 2005)
standards for proper conduct. (Artz, 2005a) 2: A set

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
240 Et hnom e t hodology Eva luat ion

Ethnomethodology department (ISD), application service providers,


In the context of work, this is an approach to study outsourcing parties, and off-the-shelf vendors. (Shayo &
E how people actually order their working activities Guthrie, 2005)
through mutual attentiveness to what has to be done.
Ethnomethodology refuses any epistemological or EULA: See End-User License Agreement.
ontological commitments, and limits its inquiry to what
is directly observable and what can be plausibly inferred Euclidean Distance
from observation. (Farooq et al., 2006) 1: An index to measure structural similarity among
actors of a network. The less two actors are structurally
Ethos equivalent, the larger the Euclidean distance between them.
The credibility, authority, or presence of an individual. (Assimakopoulos & Yan, 2006) 2: Ordinary straight-line
(St.Amant, 2006a) distance. (Chang, 2005) 3: The distance between a vector
of predicted values, Xg, and a vector of observed values,Xf,
Ethos Condition is expressed by the equation:
One of several factors individuals use to asses the credibility
or the worth of a presentation. (St.Amant, 2005c)
d (X f , X g )= (X X gr )
n
2
2 fr
r =1
Etic
1: A universal framework developed from universal
constructs. (Hunter, 2006b) 2: An outsiders (strangers) (Giudici, 2005)
view of a culture. More speciically, it is used to describe 4: The straight-line distance between two points in a
the anthropologists method of describing cultures from multi-dimensional space. It is calculated by summing
his or her own external cultural perspective. (Champion, up the squares of distances in individual dimensions and
2006a) taking the square root of the sum. (Sayal, 2005)

ETL: See Extraction, Transformation, Load System. European Computer Manufacturers Association
(ECMA)
ETM: See Electronic Town Meeting. Standardizes information and communication systems.
(Barone, 2005)
ETSI: See European Telecommunications Standards
Institute. European Telecommunications Standards Insti-
tute (ETSI)
EUC: See End-User Computing. An organization promulgating engineering standards
for telecommunications equipment. (Chochliouros et al.,
EUC Net Beneit 2005b)
A measure that captures the balance of positive and negative
impacts that result from EUC activities in an organization. Eustress
(Shayo & Guthrie, 2005) A change in biophysical or psychological variables that is
considered good. (Molinari et al., 2005b)
EUC Satisfaction
An affective measure of an end users opinion about the net EVA: See Economic Value Added.
beneits derived from EUC activities in an organization.
(Shayo & Guthrie, 2005) Evaluation
1: A process of inding the value of information services
EUC Success or products according to the needs of their consumers
The degree to which the organizational EUC strategy or users. (Crdoba, 2006b) 2: A quality program has
contributes to individual, group, and organizational continual and ongoing evaluation. This includes a needs
computing success in an environment that includes analysis (diagnostic); emergent data collected throughout
applications developed by the information system the program/course/training allowing changes to be
implemented even as the course/program/training is being

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Eva luat ion Age nt Eve nt M a na ge m e nt Soft w a re 241

delivered (formative); and end-of-the-course/program/ known as primitive event). If the event involves correlation
training surveys and interviews with learners, course or aggregation of happenings, then it is called a complex
facilitators, and programs to determine course/program/ or composite event. (Cilia, 2005) 4: Part of a trigger that
E
training redesign (summative). (MacDonald et al., 2005) 3: refers to the occurrence of a certain situation. When the
The gathering and observing of a broad range of evidence event occurs, the rule is triggered (i.e., is scheduled so
in order to gauge the impact and effectiveness of an object, that its condition is evaluated). In most systems, the event
program, or process. (Naidu, 2005a) 4: The assessment of can mention only basic database actions (e.g., insertions,
the effectiveness of service delivery and the identiication deletions, updates). (Badia, 2005b) 5: Something that
of obstacles or barriers to service delivery. Some means happens at a point in time. (Ale & Espil, 2005) 6: A
of evaluation include understanding the perceptions phenomena that changes the applications state. (Trossen &
of improvement in the organization in the manner in Molenaar, 2005) 7: In contrast to request/reply, producers
which it formalizes knowledge processes, knowledge send unsolicited notiications about events they observe.
structures, and underlying systems. These in turn will Instead of delivering notiications directed to consumers,
affect the operations, products, or services delivered. they are irst sent to an intermediary service. This service
Another means of evaluation of the effectiveness of a delivers the notiications according to the subscriptions
KM strategy is through establishing increased awareness consumers have issued. (Fiege, 2005)
and participation in that strategy. (Zyngier, 2006) 5: The
systematic determination of the merit or worth of an object. Event Algebra
(Nash et al., 2005a) Composite events are expressed using an event algebra.
Such algebras require an order function between events
Evaluation Agent to apply event operators (e.g., sequence) or to consume
Comparison-shopping agent specializing in collecting events. (Cilia, 2005)
product and service rating information. (Wan, 2006)
Event Handler
Evaluation Management A procedure (subroutine) that executes in response to
Used to guide learners e-learning and build their an event. The event may represent a speciic user action
knowledge, and to verify if the information is successfully (e.g., a mouse click) or may be a manifestation of a
turned into knowledge. In order for e-learning to be proven system process (e.g., page has inished loading). Details
effective, online learners need to verify that they have surrounding the event are provided as arguments of the
succeeded in gaining new knowledge or skills. During procedure. (Westin, 2005)
this phase, the relationship between information and
knowledge becomes visible with respect to e-learning. Event Instance
(Xu & Wang, 2006) An event is an instance of an event type associated to a
point in time that belongs to the validity interval of its
Evaluation Strategy type. (Vargas-Solar, 2005)
A process designed to guide the collection and reporting
of evaluation results. (Waddington et al., 2005) Event Logger
A text ile used to record the timestamps, attributes, and
Evaluative Judgment types of navigation events invoked by the teacher during
An assessment based on characteristics of an information the recording stage. The log is treated as synchronization
object, independent of assessments based on information information for dynamic presentation. (Liu & Chen,
prior to encountering the object (predictive judgments). 2005)
(Danielson, 2006c)
Event Management Model
Event Deines policies for detecting, producing, and notifying
1: An act performed by a whole or to the whole that instances of event types. (Vargas-Solar, 2005)
is perceived by an observer directly or through its
consequences on other wholes. (Gelman et al., 2005) 2: An Event Management Software
occurrence of an event type at a given timestamp. (Harms, Integrated software (desktop, network, or Web based) to
2005) 3: An occurrence of a happening of interest (also assist a variety of functions for event managers. This may

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
242 Eve nt Se que nc e Evolut iona r y Ga m e T he or y

include venue booking, delegate registrations, speaker Evolutionary Algorithm


requirements, transport, and accommodation management. An algorithm incorporating aspects of natural selection
E (Carson, 2005) or survival of the ittest. (Guan, 2005e)

Event Sequence Evolutionary Aligning Idea


A inite, time-ordered sequence of events. A sequence A framing idea created over time in an evolutionary manner
of events includes events from a single inite set of event aimed to align a paradox or tension between paradigms
types. (Harms, 2005) toward a perception of uniication. (Ariely, 2006a)

Event Study Evolutionary Approach to E-Government


Event studies have long been used in inance market A way to study e-government that identiies different stages
research to assess how capital markets respond to the release as the right path for e-government evolution. (Almazn
of new information contained in company reports to the & Gil-Garca, 2006)
market. Information event analysis can be used to frame
and interpret quantitative aspects of forum conversation Evolutionary Computation
by providing a study timeframe around some particular 1: A solution approach based on simulation models of
event such as stock ramping. (Campbell, 2006) natural selection which begins with a set of potential
solutions and then iteratively applies algorithms to generate
Event Type new candidates and select the ittest from this set. The
1: A discretized partition identiier that indicates a unique process leads toward a model that has a high proportion
item of interest in the database. The domain of event of it individuals. (Hsu, 2005a) 2: A solution approach
types is a inite set of discrete values. (Harms, 2005) 2: guided by biological evolution that begins with potential
Represents a class of situations produced within an event solution models, then iteratively applies algorithms to
producer and that is interesting for a consumer. In the ind the ittest models from the set to serve as inputs to
context of active systems, an event type represents the the next iteration, ultimately leading to a model that best
class of signiicant situations that trigger an active rule. represents the data. (Lingras et al., 2005) 3: A computer-
Such situations are produced within a validity interval, based problem-solving system that uses a computational
which is the time interval during which instances of the model of evolutionary processes as the key element in
event type can be detected. (Vargas-Solar, 2005) design and implementation. (Lazar, 2005) 4: The solution
approach guided by artiicial evolution; it begins with
Event-Based System random populations (of solution models), then iteratively
A system in which clients (subscribers) must express applies algorithms of various kinds to ind the best or
(subscribe) their interest in receiving particular events. ittest models. (Muruzbal, 2005)
Once clients have subscribed, servers (publishers) publish
events, which will be sent to all interested subscribers. Evolutionary Design
(Kunz & Gaddah, 2005) System development methodology where an ongoing
approach is taken to analyzing the requirements of the
Event-Sharing Paradigm application. (Adam & Pomerol, 2005)
Shared applications that are realized based on the event-
sharing paradigm instantiate a copy of the application Evolutionary Game Theory
on each participating host, distribute an initial start state Study of equilibria of games played by a population of
among all copies, and further distribute all future events players where the itness of the players derives from the
among those copies that result in a state transition of the success each player has in playing the game. It provides tools
applications. (Trossen & Molenaar, 2005) for describing situations where a number of agents interact.
Evolutionary game theory improves upon traditional
Evidence-Based Medicine game theory by providing dynamics describing how the
Health care based on best practice which is encoded in population will change over time. (Polgar, 2005a)
the form of clinical guidelines and protocols. (Metaxiotis,
2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Evolut iona r y I nnovat ion Ex ist e nt K now le dge 243

Evolutionary Innovation the purchase agreement or other internally held reference


A type of innovation which contains narrow extensions or standards developed as a result of interaction with other
improvements of an existing product or process which is e-tailers or non-store retailers (competence), and (2) will
E
not substantially changed. The applied changes are rather not engage in opportunistic behavior at any time in the
small and incremental; the knowledge needed is inside the process of product or service delivery (benevolence). (Yeo
innovators domain. (Paukert et al., 2006) & Chiam, 2006)

Evolutionary Process Executive Information System (EIS)


The process of change in a certain direction regardless 1: A computer-based infor mation deliver y and
of external planning exerted upon the process. Related to communication system designed to support the needs of
the notion that a project can take on a life of its own. senior managers and executives. (Duan & Xu, 2005) 2:
(Nash et al., 2005b) A computer-based system composed of a user-dialogue
system, a graph system, a multi-dimensional database
Evolutionary Strategy query system, and an external communication systemall
An evolutionary algorithm devoted to the parametric which enable decision makers to access a common core of
optimization. (Lazar, 2005) data covering key internal and external business variables
by a variety of dimensions (such as time and business unit).
Evolutionary System (Forgionne et al., 2005) 3: An IS that provides high-level
Involves continuous adjustments of its functionalities and information tailored to the needs of decision makers.
UI according to the user and/or technological changes. Typically a graphics-oriented system, in the context of
(Furtado, 2005) CMIS, the EIS aggregates and uses summary data to
present information to clinicians, executives, and business
Ex Ante Predictor of Student Performance managers in the form of graphs, histograms, pie charts,
One of several student characteristics prior to beginning tables, and so on. (Barnes, 2005) 4: An application designed
a class which have been determined to help forecast the for top executives that often features a dashboard interface,
relative performance of the students. (Benrud, 2005) drill-down capabilities, and trend analysis. (Pang, 2005b)
5: A computerized system intended to provide current
Exact Learning and appropriate information to support decision making
The set of learning approaches that are capable of inducing for senior managers using a networked workstation. The
exact rules. (Dai, 2005a) emphasis is on graphical displays, and there is an easy-
to-use interface. (Power, 2005) 6: An information system
Exact Rule that accesses, reports, and helps users interpret problem-
A rule without uncertainty. (Dai, 2005a) pertinent information. (Forgionne, 2005)

Exception Rule Executive Judgment


A rule with low support and high conidence. (Daly & A decision an executive makes when he or she does not
Taniar, 2005a) have a full understanding of the decision problem, based
on his or her mental model of the environment and vision
Exceptional Pattern for the organization. (Baker & Coltman, 2005)
A pattern that is strongly supported (voted for) by only a
few of a group of data sources. (Zhang & Zhang, 2005) Existence Time
The time when an object exists in the reality. It can be
Exchange Interaction seen as the valid time of the existence of an objectthat
Involves the interactive relationship between e-government is, the valid time of object o exists. (Rodrguez-Tastets,
and the construction industry for potential mutual gain. 2005b)
(Barima, 2006a)
Existent Knowledge
Exchange Trust All the knowledge that characterizes a certain situation,
Customer conidence that the e-tailer: (1) will fulill its entity, organization, and so on. Because it characterizes all
transaction-speciic obligations consistent with the terms of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
244 Exoge nous At t e nt iona l Proc e ss Ex pe rie nc e -Ba se d Le ar ning

the circumstances of that universe, identiied or not, it will Expectation Maximization


not be known in all its extension. (Analide et al., 2006) Process of updating model parameters from new data
E where the new parameter values constitute maximum
Exogenous Attentional Process posterior probability estimates. Typically used for mixture
Refers to one of the set of processes by which attention is models. (Caelli, 2005)
captured by some external event. These processes are also
referred to as bottom-up or stimulus-driven. An example Expedited Forwarding (EF)
of this mechanism would be the attention shift from A per-hop behavior deined in DiffServ meant to provide
your reading due to a sudden noise. Exogenous attention a virtual leased line type of service with guarantees on
is triggered automatically, and it normally lasts a short delay and jitter. (DaSilva, 2005)
time before it is either shifted or becomes controlled by
endogenous processes. (Thomas & Roda, 2006a) Experience
1: A holistic account of a particular episode, which stretches
Exosomatic System over time, often with a deinite beginning and ending.
A computerized system that operates as an extension Examples of (positive) experiences are: visiting a theme
to human memory; the information spaces of it will be park or consuming a bottle of wine. An experience consists
consistent with the cognitive spaces of its human users. of numerous elements (e.g., product, users psychological
(Liu & Koppelaar, 2005) states, beliefs, expectations, goals, other individuals, etc.)
and their relation. It is assumed that humans constantly
Expanded Filter monitor their internal, psychological state. They are able
Expanded ilter G(zM) is obtained by replacing each delay to access their current state during an experience and to
z-1 in the ilter G(z) with M delays zM. In the time domain report it (i.e., experience sampling). Individuals are further
this is equivalent to inserting M-1 zeros between two able to form a summary, retrospective assessment of an
consecutive samples of the impulse response of G(z). experience. However, this retrospective assessment is
(Jovanovic-Dolecek & Daz-Carmona, 2005) not a one-to-one summary of everything that happened
during the experience, but rather overemphasizes single
Expansive Questioning outstanding moments and the end of the experience.
A questioning technique that asks the learner to consider (Hassenzahl, 2006) 2: Experience is a subset of tacit
how a remark might be applied, to more fully explain a knowledge, but not all experiences are tacit. It can be either
remark or to respond to a what if question. The technique obtained through repeatedly performing a task in a similar
has the capacity to invite re-engagement or processing at way or through experimentation with new approaches to
a deeper level. (Bedard-Voorhees, 2005) complete a task. (Fong, 2006b)

Expectance Theory Experience Design


Expectation including two components: the probability The intentional creation of a time-based activity that
of occurrence and an evaluation of the occurrence. The includes physical objects, agents, and situations. (Knight,
discrepancy of conirmation could be either positive or 2006b)
negative. (Hsu & Kulviwat, 2006)
Experience Good
Expectancy Theory A good whose value can be estimated after acquisition
1: An individual will act in a certain way based on the and use. This raises the problem of pricing and other
expectation that the act will be followed by a given marketing issues. Generally speaking, digital goods (e.g.,
outcome and on the attractiveness of that outcome to the books, music, software, news, and, of course, information)
individual. (Kankanhalli et al., 2006) 2: Expectancy models are all experience goods. (Scarso et al., 2006)
are cognitive explanations of human behavior that cast a
person as an active, thinking, predicting creature in his Experience-Based Learning
or her environment. He or she continuously evaluates the This learning model positions the learner and his or her
outcomes of his or her behavior and subjectively assesses experience in the center of all activities. This experience
the likelihood that each of his or her possible actions will comprises all kinds of events in the life of the learner,
lead to various outcomes. (Chen & Lou, 2005) including those that happened earlier, the current events,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex pe rie nc e d Cre dibilit y Ex pe r t Syst e m 245

or those arising from the learners participation in activities Expert Knowledge


implemented by teachers and facilitators. The experience Possessed by individuals who have acquired deep
analysis by relecting, evaluating, and reconstructing knowledge in some particular ield by training and
E
is a key element. It encompasses formal, informal, and experience. Examples are the specialized knowledge of
nonformal learning, lifelong learning, incidental learning, physicians, vintners, or architects. Expert knowledge
and workplace learning. (Correia & Sarmento, 2005) is opposite commonsense knowledge on their shared
dimension. (Ein-Dor, 2006)
Experienced Credibility
A credibility assessment based upon irst-hand experience Expert Reasoning
with a system. (Danielson, 2006c) Implementing rules or procedures, often programmed
to occur automatically, in order to make a decision.
Experiential Learning Background and heuristics that identify how to reach a
1: A process through which a learner constructs knowledge, conclusion are based on the knowledge of human experts
skill, and value from direct experiences. (Sala, 2005a) in that ield. (Lenard & Alam, 2005)
2: Learning achieved through the everyday practice of
an activity, rather than in a formal classroom setting Expert System
or other directed training program; experience as a 1: A special type of artiicial intelligence system that
source of learning and development. (Warren, 2006) 3: contains a limited domain knowledge base, an inference
Learning based on direct and unmediated instruction, mechanism to manipulate this base, and an interface
or on physical interaction with people and materials. to permit the input of new data and user dialogue. (de
(Russell, 2005b) 4: Learning based on experiences rather Carvalho, & Ferreira, 2006) 2: A computer program that
than listening or reading. (Pendegraft, 2005) 5: Refers to simulates the judgment and behavior of a human or an
knowledge generated from and situated in experience; organization that has expert knowledge and experience
for an experience to facilitate learning, the student must in a particular ield. Typically, such a system contains a
be able to identify and analyze speciic goals, needs, and knowledge base of accumulated experience and a set of
outcomes. (McCracken, 2005) rules for applying the knowledge base to each particular
situation that is described in the program. (R., 2005) 3:
Experiment Computer program that uses coded knowledge to (help)
Research method in which the researcher manipulates solve problems of decision making of some complexity.
some independent variables to measure the effects on a (Svensson, 2005) 4: A computer system that attempts
dependent variable. (Pace, 2005) to replicate what human experts normally do. Human
experts make decisions and recommendations, such
Experimental Design as what company strategy to follow or who to give a
The process of deining dependent and independent bank loan to, and do tasks, such as adjust temperature
variables of the underlying model and acceptable ranges controls in a manufacturing plant. They also assist (or
for these variables. In terms of input, output, and model, help) and train others to do tasks and to make decisions.
the experimental design describes which input variables So do expert systems. (Mockler & Dologite, 2005) 5: A
and parameters to manipulate, and according to what computer system that facilitates solving problems in a
range of changes. As these elements are manipulated, given ield or application by drawing inference from a
speciic output variables will be assessed. The connection knowledge base developed from human expertise. Some
between the input- and output-set pairings is embodied expert systems are able to improve their knowledge base
in the description of the model. Identifying what items and develop new inference rules based on their experience
to manipulate and which correspondence should reveal with previous problems. (Raisinghani et al., 2005) 6: A
the effect of the manipulation describes the plan of the computer-based system that performs functions similar
experiment. (Vitolo & Coulston, 2005) to those normally performed by a human expert. It has a
knowledge base, an inference engine, and a user interface.
Expert Jury (Duan & Xu, 2005) 7: Approach designed to mimic human
A method based on forecasting and planning using the logic to solve complex problems. (Hentea, 2005b) 8: An
expertise of a panel of the irms executives. (Pemberton information system that contains and helps disseminate
& Stalker, 2006) expert knowledge. (Kimble & Hildreth, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
246 Ex pe r t Syst e m /K now le dge -Ba se d Syst e m (ES/K BS) Ex plicit Te a m Proc e ss

Expert System/Knowledge-Based System make them more public and observable for other colleagues
(ES/KBS) and pre-service teachers. (Keppell et al., 2005)
E A computer-based system composed of a user-dialogue
system, an inference engine, one or several intelligent Explicit Edit
modules, a knowledge base, and a work memory, which An edit explicitly written by a subject matter specialist.
emulates the problem-solving capabilities of a human (Conversano & Siciliano, 2005)
expert in a speciic domain of knowledge. (Forgionne et
al., 2005) Explicit Goal
Similar to meta-management, each member of the
Expert-Based Evaluation organization is charged with an explicit task to complete
Evaluation methodology which employs experts, mostly as it relates to the overall function of the organization.
from different cognitive domain, to assess certain system Often times, after this single goal is completed, the link
aspects. (Athanasis & Andreas, 2005) between the organization and the entity is dissolved until
a further need for it is realized. At this point, the link is
Expert-Based Interface Evaluation reestablished. (J. Lee, 2005)
Evaluation methodology that employs experts from
different cognitive domains to assess an interface. Explicit Knowledge/Information
(Karoulis et al., 2006) 1: Knowledge that is external in the form of documents,
graphs, tables, and so forth. (Woods et al., 2006) 2: A
Expertise type of knowledge that can be described, formalized,
1: A sources perceived ability to provide information coded, and stored in documents, magazines, journals, and
that is accurate and valid (based on attributes such as so forth. (Aurum & Demirbilek, 2006) 3: Also known
perceived knowledge and skill); with trustworthiness, it as information, this is knowledge that is adequately
is one of two primary attributes of credibility. (Danielson, and properly represented by facts, igures, symbols,
2006c) 2: Highly tacit, domain-speciic knowledge gained and data. (Ray, 2006) 4: Can be expressed in words
through experience, formal education, and collaboration. and numbers, and shared in the form of data, scientiic
(Kulkarni & Freeze, 2006) formulae, speciications, manuals, and the like. This
kind of knowledge can be readily transmitted between
Explanation individuals formally and systematically. (Zeleznikow,
A sequence of statements of the reasons for the behavior 2006) 5: Context-free knowledge that can be codiied using
of the model of a system. (Kontos & Malagardi, 2006) formal and systematic language. Explicit knowledge can
be expressed using words (language) or as mathematical
Explanation-Oriented Data Mining formulae, procedures, or principles. Explicit knowledge
A general framework includes data pre-processing, is easy to codify and communicate. (Sivakumar, 2006)
data transformation, pattern discovery and evaluation, 6: Formal knowledgethat is, know-what represents
pattern explanation and explanation evaluation, and knowledge that is well established and documented.
pattern presentation. This framework is consistent with (Wickramasinghe, 2006) 7: Information that has speciic
the general model of scientiic research processes. (Yao meaning and that can be easily and clearly understood.
& Zhao, 2005) (Neville & Powell, 2005) 8: Knowledge codiied into a
formal and systematized language. It may be transmitted,
Explication preserved, retrieved, and combined. (Falivene & Kaufman,
The act of making clear or removing obscurity from 2006) 9: Knowledge that can be codiied in words, numbers,
the meaning of a word, symbol, expression, and such. or rules and can take the shape of documents, or perhaps
(Marjomaa, 2005) result in the production of some type of equipment.
(Qayyum, 2005)
Explicit
This refers to the act of articulating our reasoning and the Explicit Team Process
rationale for our teaching and learning theories. In effect Openly articulated, overt communication and coordination
we are attempting to articulate our tacit theories in order to behaviors. Example: Member A directly requests task-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex ploit Ex t e nde d ERP 247

relevant information from Member B. (Cuevas et al., atoma and roles and use it in its own context. (Lepouras
2005) et al., 2006)
E
Exploit Export Restriction
1: A program that uses a vulnerability to attack the systems A restriction on the type, quantity, or destination of goods
security mechanisms. Exploits usually compromise that can be exported out of a country. (D. Brandon, Jr.,
secrecy, integrity, or availability and often lead to elevation 2005b)
of privilege. (Weippl, 2006) 2: Taking advantage of a
software vulnerability to carry out an attack. To minimize Export-Oriented Software
the risk of exploits, security updates or software patches A unit is considered export oriented if at least 70% of its
should be applied frequently. (Kayacik et al., 2005) 3: revenue comes from export. (Raisinghani & Rahman,
Weakness in a system through which hackers can gain 2005)
entry into the system. (Friedman, 2005)
Exposed Node
Exploratory Analysis The problem where a transmitting or exposed node is
Part of the Data Analysis French School, developed between within range of a sender, but is out of range of the intended
1960 and 1980. The process of analysis takes as a target destination. (Erbas, 2005)
to discover new relations between the sets of the analyzed
information. (Nigro & Gonzlez Csaro, 2005c) EXPRESS/STEP
To share and exchange product data, the Standard for the
Exploratory Data Analysis (EDA) Exchange of Product Model Data (STEP) is being developed
Comprises a set of techniques used to identify systematic by the International Organization for Standardization
relations between variables when there are no (or not (ISO). EXPRESS is the description method of STEP and
complete) a priori expectations as to the nature of those can be used to model product design, manufacturing, and
relations. In a typical exploratory data analysis process, production data. (Ma, 2005a)
many variables are taken into account and compared,
using a variety of techniques in the search for systematic Expression
patterns. (Katsaros & Manolopoulos, 2005b) The utterance through any language system of prelinguistic
emotion or understanding toward the creation of consensual
Exploratory Factor Analysis meaning between people. (Kettley, 2006b)
A process used to identify statistically signiicant constructs
underlying a set of data. (Martz & Reddy, 2005) Expressiveness
The ability of employees to use oral or facial expression
Exploratory Tree and body language to clearly express what they know.
An oriented tree graph formed by internal nodes and (Chen, Duan, et al., 2006)
terminal nodes, the former allowing the description of the
conditional interaction paths between the response variable Extended Enterprise
and the predictors, whereas the latter are labeled by a The seamless Internet-based integration of a group or
response class/value. (Siciliano & Conversano, 2005) network of trading partners along their supply chains.
(Sammon & Adam, 2005)
Exponentially Decaying
A quantity that decreases such that the momentary rate of Extended ERP
decrease is directly proportional to the quantity. (Kushnir, Extends the foundation ERP systems functionalities such
2006) as inances, distribution, manufacturing, human resources,
and payroll to customer relationship management, supply
Export/Import chain management, sales-force automation, and Internet-
Information systems may deine atoma and roles and then enabled integrated e-commerce and e-business. (Rashid,
export them to be used by other information systems. 2005)
An information system may import any of the exported

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
248 Ex t e nde d I t e m Ex t e nsible Busine ss Re por t ing La ngua ge (X BRL)

Extended Item Extensible Authentication Protocol (EAP)


An item associated with the context where it happens. An authentication protocol used with the IEEE 802.1x
E (Feng & Dillon, 2005) Standard to pass authentication-information messages
between a suppliant and an authentication server. (Pulkkis
Extended Knowledge Management et al., 2005b)
KM methods and practices applied to inter-irm knowledge
management. The adjective extended means activities Extensible Business Reporting Language
that span the organizational boundaries, involving (XBRL)
suppliers, customers, vendors, business partners, and 1: A markup language that allows for the tagging of data
institutions. (Scarso et al., 2006; Bolisani et al., 2006) and is designed for performance reporting. It is a variant
of XML. (Garrity et al., 2005) 2: A general-purpose data
Extended Model of Knowledge-Flow Dynamics representation language similar to the HyperText Markup
A four-dimensional model used to classify and visualize Language (HTML) used in Web pages. (Arya, 2005) 3:
lows of knowledge in the organization. (Nissen, 2005) A language written in Standard Generalized Markup
Language (SGML) that allows one to design markup tags
Extended Organization for easy interchange of documents and data on the Internet.
A knowledge-based organization with links to customers (Zhang, 2006) 4: A simpliied meta language, derived from
and suppliers across an electronic supply chain. (Burn & SGML, emerging as the standard for self-describing data
Ash, 2006) exchange in Internet applications. (Passi et al., 2005) 5: A
standard language for deining the syntax and structure of
Extended RDBMS Schema documents with the goals of interoperability, portability,
A database schema speciied according to the relational data and automatic processing of applications among different
model extended with new data types. RDBMSs allowing the enterprises; the data in an XML document are tagged and
extension of the basic Type System are those implementing thus are self-describing. (Moser & Melliar-Smith, 2006)
the concept of Universal Server. Examples are Oracle, 6: Document type deinitions that can be used to specify
Informix, DB2, and Illustra. (Polese et al., 2005) or describe various types of objects. When a set of these
is used on the Web to describe product information, it is
Extended Service Provider (XSP) referred to as cXML or commerce XML. It works as a
An entity that provides total IT-related services from online meta-language that deines necessary information about
applications through maintenance and reengineering of a product, and standards are being developed for cXML
IT resources to business process consulting for its clients. in a number of industries, performing a function similar
Success of the XSP model should presume the rapid to that of EDI for non-Web-based systems. It will help to
proliferation of the ASP services in an overly complex standardize the exchange of Web catalog content and to
market. If the ASP service demand grows explosively deine request/response processes for secure electronic
in a short period of time, the XSP model will debut in transactions over the Internet. The processes include
the market earlier on, increasing the possibility of XSPs purchase orders, change orders, acknowledgments, status
dominating the industry, as they have scale advantage in updates, ship notiications, and payment transactions.
terms of cost. (D. Kim, 2005) (Archer, 2005) 7: Has been created to overcome some
dificulties proper to HTML thatdeveloped as a means
Extended Service Set (ESS) for instructing the Web browsers how to display a given
A WLAN architecture consisting of dedicated station Web pageis a presentation-oriented markup tool.
computers and many dedicated wireless access points. XML is called extensible because, contrary to HTML,
(Pulkkis et al., 2005b) it is not characterized by a ixed format, but lets the
user design its own customized markup languagesa
Extended Transaction speciic Document Type Description (DTD)for limitless
A transaction associated with the context where it happens. different types of documents; XML is then a content-
(Feng & Dillon, 2005) oriented markup tool. (Zarri, 2006b) 8: Markup language
proposed by the World Wide Web Consortium (W3C) for

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex t e nsible M a rk up La ngua ge (X M L) 249

data and documents interchange. (De Antonellis et al., characterized by a ixed format but lets the user design his
2005) 9: The novel language, standardized by the World own customized markup languagesa speciic Document
Wide Web Consortium, for representing, handling, and Type Description (DTD)for limitless different types of
E
exchanging information on the Web. (De Meo et al., 2005a) documents. XML is then a content-oriented markup tool.
10: A markup language for representing information as (Zarri, 2005b) 8: A meta-language deining the syntax for
structured documents. Developed from an earlier language presenting and exchanging data in Web environments. It
called SGML (Standard Generalized Markup Language) overcomes the limit of ixed tags in HTML and allows users
for the purposes of information management on the to deine their document structures. W3C has designated
Internet. (Lyytikinen et al., 2005) XML as the standard for Web data. (Wang, Cheng, Cheng,
et al., 2006) 9: An open standard, developed by the W3C,
Extensible Markup Language (XML) that involves formal syntax for adding structure and/or
1: A standard with very lexible and simple syntax (a small content information in a Web-based document. This subset
set of rules in human-readable plaintext) used to describe of SGML deines data elements in a neutral way for easy
and share commonly structured platform-independent interchange of structured data, such as markup tags,
information. Main components of its structure are elements deinitions, transmission validation, and interpretations
(markups) and attributes of elements that are nested to create across applications and organizations. (Parikh & Parolia,
a hierarchical tree that easily can be validated. XML is 2005) 10: A language for creating markup languages. There
extensible, because, unlike HTML, anyone can deine new are two kinds of XML documents: well-formed and valid.
tags and attribute names to parameterize or semantically The irst respects the XML standard for the inclusion and
qualify content. It has been a formal recommendation the names of the tags. The second must be well formed
from W3C since 1998, playing an increasingly important and uses a grammar to deine the structure and the types
role in the exchange of a wide variety of data on the Web. of data described by the document. (Nicolle et al., 2005)
(Pereira & Freire, 2005) 2: A mechanism for encoding 11: A meta-language directly derived from SGML but
data into computer-understandable forms, useful for designed for Web documents. It allows the structuring of
applications such as business-to-business electronic information and transmission between applications and
document interchange via the World Wide Web. (Lang, between organizations. (de Campos et al., 2005) 12: A
2006) 3: A speciication developed by the World Wide sublanguage of SGML that provides a way to structure
Web Consortium (W3C). XML is a pared-down version and format data, especially in textual form. The data
of the Standard Generalized Markup Language (SGML), is represented as XML documents; an XML document
designed especially for Web documents. It allows designers may have an optional schema associated with it. XML is
to create their own customized tags, enabling the deinition, considered a semistructured data model because a schema
transmission, validation, and interpretation of data between is not always necessary, and even if a schema is present,
applications and between organizations. (Raisinghani & it could be quite lexible. (Mani & Badia, 2005) 13: An
Sahoo, 2006) 4: A subset of SGML, designed to describe easy-to-use dialect of SGML, this is a lexible technique
data. It incorporates features of extensibility, structure, for storage and interchange of data. One important aspect
and validation, and is currently playing an increasingly of XML is the combination of data and metadata in a
important role in the exchange of a wide variety of data on single document. (Hnisch, 2005) 14: A markup language
the Web and elsewhere. (Dotsika, 2006) 5: A text-based that is quite different from HTML in that XML gives
markup language that describes data in a document. document authors the ability to create their own markup.
Since XML is a platform-independent language, it is XML is lexible in creating data formats and sharing both
used as the standard format for transferring data over a the format and the data with other applications or trading
network using Web services. (Sethi & Sethi, 2006a) 6: partners, compared with HTML. (Suh & Kim, 2005) 15:
An application-independent meta-language for deining A markup language for structured documents. Structure
markup languages. It serves as the basis for syntactic is represented with textual markup that intermixes with
interoperability among information systems. (Antoniou document content. XML is a recommendation from the
et al., 2005) 7: Created to overcome some dificulties World Wide Web Consortium. (Martnez-Gonzlez, 2005)
proper to HTML, whichdeveloped as a means for 16: A W3C standard similar to HTML, but it allows creators
instructing Web browsers how to display a given Web to create their own tags. (Goh & Kinshuk, 2005) 17: A
pageis a presentation-oriented markup tool. XML is speciication for computer-readable documents. XML is
called extensible because, contrary to HTML, it is not actually a meta-language, a mechanism for representing

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
250 Ex t e nsible M a rk up La ngua ge (X M L) Cont e nt Ana lysis M ining Ex t e nsion

other languages in a standardized way; therefore, XML Extensible Markup Language (XML) Schema
provides a syntax to encode data. (Vardaki, 2005) 1: A database-inspired method for specifying constraints
E on XML documents using an XML-based language.
Extensible Markup Language (XML) Content Schemas address deiciencies in DTDs, such as the inability
Analysis Mining to put constraints on the kinds of data that can occur in
Concerned with analyzing texts within XML documents. a particular ield (e.g., all numeric). Since schemas are
(Nayak, 2005b) founded on XML, they are hierarchical, so it is easier
to create an unambiguous speciication, and possible
Extensible Markup Language Database to determine the scope over which a comment is meant
(XMLDB) to apply. (Passi et al., 2005) 2: A more complete way of
A database that accepts XML documents for storage, and specifying the semantics of a set of XML markup elements.
allows for retrieving them in their original XML format. XML schema supplies a complete grammar for specifying
XMLDB can physically store XML data in their original the structure of the elements, allowing one, for example,
format or can transform them internally into relational to deine the cardinality of the offspring elements, default
tables, which are then reverted to their XML format upon values, and so forth. (Zarri, 2005b) 3: An alternative to
retrieval. (Gaffar & Seffah, 2005) DTDs, it is a schema language that assesses the validity
of a well-formed element and attribute information items
Extensible Markup Language (XML) Document within an XML document. There are two major schema
A document consisting of an (optional) XML declaration, models: W3C XML Schema and Microsoft Schema.
followed by either an (optional) DTD or XML schema (Chen, 2005b)
and then followed by document elements. (Chen, 2005b;
Pallis et al., 2005) Extensible Markup Language (XML) Structural
Change
Extensible Markup Language (XML) Interstruc- Not all changes to XML may cause structure changes the
ture Mining language when it is represented as a tree structure. In IT
Concerned with the structure between XML documents. use, only insertion and deletion are called XML structural
Knowledge is discovered about the relationship among changes. (Zhao & Bhowmick, 2005)
subjects, organizations, and nodes on the Web. (Nayak,
2005b) Extensible Markup Language (XML) Structural
Clariication Mining
Extensible Markup Language Metadata Inter- Concerned with distinguishing the similar structured
change (XMI) documents based on content. (Nayak, 2005b)
A widely used interchange format for sharing objects using
XML. (Paiano, 2005) Extensible RDBMS
Relational DBMS implementing the concept of universal
Extensible Markup Language (XML) Mining server. It allows the extension of the DBMS type system by
KnowledgediscoveryfromXMLdocuments(heterogeneous enabling the deinition of user-deined data types (UDTs),
and structural irregular). For example, clustering data- and the associated user-deined manipulation functions
mining techniques can group a collection of XML (UDFs). (Chang et al., 2005)
documents together according to the similarity of their
structures. Classiication data-mining techniques can Extensible Representation of Requirements
classify a number of heterogeneous XML documents into A way to represent easy requirements that were not
a set of predeined classiications of schemas to improve necessarily identified nor truly considered in the
XML document handling and achieve eficient searches. requirements analysis. (Furtado, 2005)
(Nayak, 2005b)
Extension
Extensible Markup Language (XML) Rewrite 1: A Boolean function f that satisies f(x)=1 for xT
A document that is not originally written in XML can be and f(x)=0 for xF for a given pdBf (T, F). (Boros et
rewritten in XML format by adding the necessary syntax al., 2005) 2: An extramural department or division that
and semantics to it. (Gaffar & Seffah, 2005) operates within a university and offer mainly continuing

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex t e nsion, De e p Ex t ra c t ion 251

education and professional upgrade courses. Extensions are External Environmental Structure
typical mainly to American universities. (Guri-Rosenblit, The set of rules and resources offered by outside interests,
2005a) including academic standards bodies, technology
E
developers and vendors, industrial organizations,
Extension, Deep employers, and end users. (LeRouge & Webb, 2005)
Of a concept C, denotes the shallow extension of C union
the deep extension of Cs sons. (Sacco, 2006) External Knowledge
The kind of knowledge that a irm needs in order to
Extension Mechanism compete, but that is standard and available in an open
Speciies how model elements are customized and extended market to any organization on the same conditions of price
with new semantics. (Riesco et al., 2005) and functionality. Thus, it can be bought and sold, and
therefore it is relatively easily integrated in a irm even if
Extension, Shallow it is implicit and collective. (Andreu & Sieber, 2006)
Of a concept C, denotes the set of documents classiied
directly under C. (Sacco, 2006) External Link
A URL address that connects to a site on an intranet or
Extensional Inference Rule the Internet. (Baugher et al., 2005)
Two concepts A and B are related if there is at least one
item d in the knowledge base which is classiied at the same External Metric
time under A (or under one of As descendants) and under A metric used to measure attributes of the product that can
B (or under one of Bs descendants). (Sacco, 2006) be measured only with respect to how the product relates
to its environment. (Xenos, 2006)
External Data
1: A broad term indicating data that is external to a particular External Stakeholder
company. Includes electronic and non-electronic formats. Organizations exchange information and communicate
(Peter & Greenidge, 2005a) 2: Data originating from other with all external stakeholders, who can be divided into
than the operational systems of a corporation. (Peter & business partners and other stakeholders. (Boonstra &
Greenidge, 2005b) 3: Traditionally, most of the data in a de Brock, 2006)
warehouse have come from internal operational systems
such as order entry, inventory, or human resource data. External Support
However, external sources (i.e., demographic, economic, Assistance from persons outside the irm. Some irms
point-of-sale, market feeds, Internet) are becoming more pay for such support by employing a consultant. Other
and more prevalent and will soon be providing more common forms of external support include IS vendors
content to the data warehouse than the internal sources. and advice from peersthat is, managers in other irms.
(Owrang O., 2006) (Cragg & Suraweera, 2005)

External Environment Externalization


1: Comprises factors external to an organizationsuch A knowledge transfer mode that involves new explicit
as new technology, product developments, or changing knowledge being derived from existing tacit knowledge.
rates of market growthwhich an organization must (Wickramasinghe, 2005)
respond to. (Baker & Coltman, 2005) 2: Includes relevant
work structure variables (e.g., task complexity) and other Extraction
external forces (e.g., organizational climate) within the To select the related ields from the Web logs. Traversal
sociotechnical system that both act on and are acted upon patterns typically require three ields: IP address, access
by the organizational unit. (Cuevas et al., 2005) 3: The time, and the page accessed. Other ields, such as referrer
set of conditions, trends, and forces essentially outside the and user agent, can be used in cleansing and sessionization.
control of organizational members. (Rowe et al., 2006) (Yao & Xiao, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
252 Ex t ra c t ion Group Re se a rch M e t hodology (X -Group M e t hodology) Eye Tra cke r

Extraction Group Research Methodology Extran


(X-Group Methodology) An external transaction that is requested by a mobile
E Refers to the combination of focus groups and forum host to be performed in another external computing
messages discourse analysis. X-Group Methodology environment, using message communication. (Murthy
advances the identiication of important actors in a & Krishnamurthy, 2005b)
community and the actual implementation of members
suggestions into their environment as an interaction within Extranet
an immediate space of use. (Lambropoulos, 2006a) 1: A private network that uses Internet protocols and the
public tele-communications system to share a businesss
Extraction, Transformation, Load (ETL) information, data, or operations with external suppliers,
System vendors, or customers. (Vaast, 2005) 2: Allowing an
1: A category of software that eficiently handles three organizations external partners (i.e., pharmacies,
essential components of the warehousing process. First, insurance companies, vendors) to access a computer
data must be extracted (removed from originating system), system via a username and password. (Cannoy & Iyer,
then transformed (reformatted and cleaned), and third, 2006) 3: A set of Internet-based applications that use
loaded (copied/appended) into the data warehouse database standard protocols, middleware, and browser software
system. (Peter & Greenidge, 2005a) 2: The system in charge that fulill functional requirements to support supply-chain
of extracting data from internal transactional databases operations. (Ratnasingam, 2006)
and other sources (e.g., external data), transforming it to
accommodate the data warehouse schema, loading the data Extreme Programming
initially and refreshing the data periodically. The design An agile system development methodology that
of the ETL system is generally the most time-consuming decomposes very large projects into many small projects
task in the construction of a data warehouse. (Hernandez- with minimal requirements and taking just a few weeks
Orallo, 2005a) 3: Data warehousing functions that involve to complete, characterized by pair programming and
extracting data from outside sources, transforming it to refractoring. (Steinbach & Knight, 2005)
it business needs, and ultimately loading it into the data
warehouse. ETL is an important part of data warehousing; Extrinsic Motivation
it is the way data actually gets loaded into the warehouse. 1: An external force that motivates a person. (Whitield,
(Simitsis et al., 2005) 4: A process by which the data 2005) 2: Motivation that derives from what you obtain
warehouse is (re)populated from data in the data sources. from engaging in an activity. An example of extrinsic
During the process, relevant data is extracted from the motivation for using microcomputers is using it because
source, adequately processed for integration, and loaded you think it is useful for your job. (de Souza Dias, 2005)
into the DW. (Badia, 2005c) 5: A key transitional set of steps 3: Motivation through factors external to the person being
in migrating data from the source systems to the database motivated. (Wishart, 2005) 4: The motivation to engage
housing the data warehouse. Extraction refers to drawing in an activity as a means to an end, based on the belief
out the data from the source system, transformation that participation will result in desirable outcomes such
concerns converting the data to the format of the warehouse, as a reward or avoidance of punishment. (Hendriks &
and loading involves storing the data in the warehouse. Sousa, 2006) 5: Motivation that has a material or symbolic
(Pang, 2005a) 6: A set of database utilities used to extract manifestation in the outside world, for example, a bonus,
information from one database, transform it, and load promotion, vacation, reputation, recognition, and so forth.
it into a second database. This represents processing (Ekbia & Hara, 2006)
overhead required to copy data from an external DBMS
or ile. (Rahman, 2005e) 7: Describes the three essential Eye Tracker
steps in the process of data source integration: extracting Device used to determine point-of-regard and to measure
data and schema from the sources, transforming it into a eye movements such as ixations, saccades, and regressions.
common format, and loading the data into an integration Works by tracking the position of various distinguishing
database. (Koeller, 2005) features of the eye, such as relections of infrared light
off the cornea, the boundary between the iris and sclera,
or apparent pupil shape. (Poole & Ball, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Eye Tra ck ing Eye -M ind H ypot he sis 253

Eye Tracking
A technique whereby an individuals eye movements are
measured so that the researcher knows where a person
E
is looking at any given time and how the a persons eyes
are moving from one location to another. (Poole & Ball,
2006)

Eye-Mind Hypothesis
The principle at the origin of most eye-tracking research.
Assumes that what a person is looking at indicates what
the person currently is thinking about or attending to.
Recording eye movements, therefore, can provide a
dynamic trace of where a persons attention is being
directed in relation to a visual display such as a system
interface. (Poole & Ball, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
254 F Va lue Fa c ia l Ac t ion Coding Syst e m (FACS)

F
F Value: See Fisher Value. Face Synthesis
A process of creating a talking head that is able to speak,
FA: See Facial Animation. display (appropriate) lip movements during speech, and
display expressive facial movements. (Pantic, 2005b)
Face Detection
Given an arbitrary image, the goal of face detection is to Face-Based Interface
determine whether or not there are any faces in the image, Regulating (at least partially) the command low that
and if present, return the image location and extent of each streams between the user and the computer by means of
face. (Tan & Zhang, 2006) facial signals. This means associating certain commands
(e.g., mouse pointing, mouse clicking, etc.) with certain
Face Localization facial signals (e.g., gaze direction, winking, etc.). Face-
Given a facial image, the goal of face localization is to based interface can be effectively used to free computer
determine the position of a single face. This is a simpliied users from classic keyboard and mouse commands.
detection problem with the assumption that an input image (Pantic, 2005b)
contains only one face. (Tan & Zhang, 2006)
Face-to-Face (F2F)
Face Model 1: Term used to describe the traditional classroom
General information required for recreating faces in a environment. (Blackmore et al., 2006) 2: Communication
computer graphics system, for example, geometrical occurring in the same physical domain. (Whateley et
parameters. (Arya, 2005) al., 2005) 3: Communication requiring the synchronous
presence of participants in space and time. (Beuschel et
Face Model Feature al., 2005)
One of a set of features used to represent (model) the face
or facial features, such as the width, height, and angle in Face-to-Face Learning
a template of the eye, or all nodes and triangles in a 3D Considered as a traditional environment in which the
face mesh model. (Tan & Zhang, 2006) instructor and students meet in a classroom setting. (S.-
K. Wang, 2005)
Face Recognition
A technique for identity veriication or identiication Facet
based on the users facial features, such as positions of One of several top-level (most general) concepts in a multi-
cheekbones, and positions and shapes of eyes, mouth, and dimensional taxonomy. In general, facets are independent
nose. (Li, 2006) and deine a set of orthogonal conceptual coordinates.
(Sacco, 2006)
Face Space
The vector space spanned by the eigenfaces. (Lovell & Facial Action Coding System (FACS)
Chen, 2005) 1: A comprehensive system that can distinguish the most
possible visually distinguishable facial movements. FACS

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fa c ia l a nd Body Anim at ion (FBA) Fa c ilit at or 255

derives from an analysis of the anatomical basis of facial Facial Feature


movement. Using FACS, it is possible to analyze any facial One of the prominent features of the face, which includes
movement into anatomically based minimal action units intransient facial features such as eyebrows, eyes, nose,
F
(AUs). (Andrs del Valle, 2005) 2: The most widely used mouth, chin, and so forth, and transient facial features
and versatile method for measuring and describing facial such as the regions surrounding the mouth and the eyes.
behaviors which was developed in the 1970s by determining (Tan & Zhang, 2006)
how the contraction of each facial muscle (singly and in
combination with other muscles) changes the appearance Facial Motion Analysis
of the face. (Tan & Zhang, 2006) Procedure of estimating facial motion parameters. It can
also be called face tracing and can be used to extract
Facial and Body Animation (FBA) human face motion information from video, which is
1: A part of the MPEG-4 speciications dealing with the useful input for intelligent video surveillance and human-
deinition and the animation at very low bit rate of an computer interaction. (Wen et al., 2005)
avatar represented as a segmented object. (Prteux &
Preda, 2005) 2: This MPEG-4 system tool was designed Facial Motion Synthesis
for the compression and networked delivery of virtual Procedure of creating synthetic face animations. Examples
human animation. The facial animation part is still in include text-driven face animation and speech-driven face
use, while the body animation part is being replaced by animation. It can be used as an avatar-based visual interface
Bone-Based Animation (BBA) for the sake of genericity. for human-computer interaction. (Wen et al., 2005)
(Di Giacomo et al., 2005)
Facilitated Meeting
Facial Animation (FA) A group of people getting together to explore the issues
The set of CG and CV techniques used to recreate with the help of a facilitator. The facilitator brings a
facial motion and expression. We can classify animated methodology of facilitation which provides process support
characters in two groups: avatars and clones. An avatar and content management. Process support heightens
is a general, standard representation of a human; a clone the effectiveness of relational behaviors in the group
is the exact replication of an existing individual. (Andrs (e.g., everyone getting airtime) and feeling free to share
del Valle, 2005) controversial ideas. Content support enables the mass of
complexity shared during the meeting to be made sense
Facial Animation Parameter (FAP) of. (Shaw et al., 2006)
The standard MPEG-4 deines 68 FAPs, each associated
with the movement of speciic vertices that compose a Facilitation
head mesh so to generate a different facial expression. 1: A teaching style that is student centered. Encourages
(Andrs del Valle, 2005) self-directed learning. The instructor is not a content
transmitter, but rather a coach and partner in student
Facial Deformation Model learning. (Ordonez, 2005) 2: The leadership contributions
Model that explains the non-rigid motions of human faces. of structuring, enabling, and encouraging good group
The non-rigid motions are usually caused by speech and interaction and process, normally with low reliance on
facial expressions. (Wen et al., 2005) positional authority and content expertise, but high reliance
on communication, and interpersonal skills and presence.
Facial Expression Recognition (Cargill, 2006a)
1: Classifying the facial expression to one facial action unit
deined in FACS or a combination of action units, which Facilitator
is also called FACS encoding. (Tan & Zhang, 2006) 2: 1: A faculty role that allows learners to take a more active
Classifying the facial expression to one basic emotional role in learning and determining how they will learn.
category or a combination of categories. Often, six basic The role of a faculty member as a facilitator is to guide
emotions are used, including happiness, sadness, surprise, learners in connecting with the learners knowledge and
fear, anger, and disgust. (Tan & Zhang, 2006) experience. (Stavredes, 2005a) 2: A knowledgeable guide

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
256 FACS Fa c ult y

for a discussion, activity, or course. In many cases, a process. (Tininini, 2005a) 4: The central table in a star
course facilitator or faculty facilitator acts as a mentor for schema, containing the basic facts or measures of interest.
F a course, providing guidance, assistance, or trusted advice Dimension ields are also included (as foreign keys) to link
to the student. (Riffee & Sessums, 2005) 3: A person who to each dimension table. (Bellatreche & Mohania, 2005)
acts in such a way as to allow others to take an active
role in learning, especially in groups. Teachers in this Faction
role typically assist students by asking probing questions In the most basic form, faction is simply street creditability
and by stimulating discussion. (Kukulska-Hulme, 2005) or worthiness in the eyes of NPCs, as it is inevitable that
4: A community member who coordinates the activities there will be enemies among the races. When players make
within the communitys place. (Porto Bellini & Vargas, friends with one particular race, this can consequently
2006) 5: An AHIMA member who volunteers to support make you disliked or hated by another, so as your faction
and champion the success of a particular community. goes up with one race, it will go down with another. This
Such a volunteer monitors activity within the community, effect is not an all or nothing, but a gradual process.
encourages member participation, organizes community (Grifiths et al., 2006)
events, posts resources, and reviews and approves all
submitted resources. (Zender, 2006) 6: Someone helping Factor
people self-discover new approaches and solutions to The expressed requirement of the customer. (Lacaze et
problems. (Whitield, 2005) 7: An instructor who utilizes al., 2006)
the facilitative method for course delivery, is focused on
a student-centered environment, is attentive to students Factor Analysis
needs, and assists students in achieving self-actualization. 1: A process used to identify statistically signiicant
(Ordonez, 2005) constructs underlying a set of data. (W.B. Martz, Jr. &
V.K. Reddy, 2005) 2: Any of several methods for reducing
FACS: See Facial Action Coding System. correlational data to a smaller number of dimensions or
factors; beginning with a correlation matrix, a small number
Fact (Multi-Dimensional Datum) of components or factors are extracted that are regarded
1: A single elementary datum in an OLAP system, as the basic variables that account for the interrelations
the properties of which correspond to dimensions and observed in the data. (Colmenares & Otieno, 2005) 3:
measures. (Tininini, 2005b) 2: An entity of an application Method of grouping questions based on the correlation of
that is the subject of decision-oriented analysis. It is each question to other questions. (Witta & Lee, 2005)
usually represented graphically by means of a table or,
using a metaphor, by a data cube. (Rafanelli, 2005) 3: Factor Score
Basic, irreducible data item that is stored in the data A measure of a factors relative weight to others; it is
warehouse. It represents the basic unit of business analysis obtained using linear combinations of variables. (Lee,
and therefore must represent the basic activity of the Peterson, et al., 2005)
enterprise under consideration. (Badia, 2005c) 4: Element
recorded in a warehouse (e.g., each product sold in a shop) Factual Data
and whose characteristics (i.e., measures) are the object Data that include demographic information such as name,
of the analysis (e.g., quantity of a product sold in a shop). gender, and birth date. It also may contain information
(Schneider, 2005) derived from transactional data such as someones favorite
beverage. (Cook, 2005)
Fact Table
1: A database table that stores the base facts that consist Factual Data Analysis
of values of different metrics for different combinations Another term for data mining, often used by government
of dimension values. (Deshpande & Ramasamy, 2005) 2: agencies. (Cook, 2005)
A member of the star schema data model which records
data about a set of phenomena of interest. (Pourabbas, Faculty
2005b) 3: A table of (integrated) elementary data grouped The collection of teachers at a school, college, or university.
and aggregated in the multi-dimensional querying (Shaw, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fa c ult y Deve lopm e nt Fa ir ne ss 257

Faculty Development and corrected, lead to failure of the system. A fault is the
A purposeful, institutionalized approach to doing that original cause of the error. (Zhao et al., 2005)
which helps faculty do their work better as individuals
F
within an institution and within the collective enterprise Failure Recovery
of higher education. (Kinuthia, 2005) Recovery in a situation where log-iles and the current
database or an old database copy are available. (Frank,
Faculty Function 2005a)
Basic functions of faculty in a cost analysis generally
include preparation, presentation, and assessment of Failure to Enroll Rate
student work. (Berg, 2005c) The condition that arises if the biometric sample captured
is not of proper quality that a template can be generated
Faculty Satisfaction from it. (Vatsa et al., 2005)
The quality principle that recognizes faculty as central to
quality learning. (Moore et al., 2005) Fair Use
1: A term deined in the U.S. Copyright Act. It states the
Faded Information Field exemption for schools to some copyright regulations.
A group of server machines connected in a topology (This exemption pre-dates many current educational
that allows information documents to be distributed in applications of technology and may be not address some
a fashion that can improve retrieval eficiency, typically online learning situations.) (Sales, 2005) 2: The exception
through some algorithmic computation to determine server to the rights of the copyright owner set out under section
locations. (Quah et al., 2006b) 107 of the United States Copyright Act of 1976. This allows
for a limited amount of personal copying in the context
Failed Project of activities such as criticism, teaching, scholarship, and
A projects that is cancelled before completion, never research. The freedom to copy under this section is widely
implemented, or scrapped following installation. (Dalcher, misunderstood, and it is important to note that the courts
2005) have quite tightly restricted the use of this exclusion.
Generally, this exception will only hold if the use is non-
Failed-Out commercial, relates to a factual work of a small amount,
A student who failed a course (or courses) and did not and is not done in a way that impacts on the commercial
meet the academic standard. Therefore, he or she has market for the original. Fair use only applies in the United
been automatically removed from the program. Failed- States, and while some exceptions for similar uses exist
outs are different from no-shows since the failing grade in other jurisdictions, the details differ signiicantly.
resulted from the lack of academic competence rather than Despite this, the term is commonly used internationally
abandoning behavior. (Chyung, 2005) to describe uses of copyright material that are considered
defendable exceptions to the normal regime of protection.
Failure (Marshall, 2005)
The inability of a system or component to perform
its required functions within speciied performance Fairness
requirements. (Schneidewind, 2005) 1: A subjective term deining the level to which a student
feels he or she was treated fairly by the professor with
Failure Analysis respect to the class, including but not limited to test
Computing the time it takes for a manufactured component questions, grading, schedule lexibility, and so forth.
to fail. (Chen, Oppenheim, et al., 2005) (Martz & Reddy, 2005) 2: It is recognized that the greater
the diversity in the methods of assessment, the fairer the
Failure, Error, Fault assessment is to students. Therefore, assessment needs to
A failure is the event of a system generating a result that embrace a variety of kinds of activity, so that candidates
does not satisfy the system speciication or of the system have a greater opportunity to demonstrate their skills on
not generating a result that is required by the system at least some of the assessment occasions they encounter.
speciication. An error is incorrect information, or lack of (Diamadis & Polyzos, 2005)
information, within the system that will, unless detected

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
258 Fa ir ne ss a nd Just ic e Fa m ilia rit y-Ba se d Trust

Fairness and Justice More generally, a false negative occurs when the null
The philosophical view that the moral act is the one that hypothesis is erroneously accepted. Also called Type II
F treats similarly situated people in similar ways with regard error. (Mukherjee, 2005) 3: A mail message that the ilter
to both process and outcome. (Gilbert, 2005) tags as ham but is actually spam. (de Freitas & Levene,
2006a)
False Acceptance Rate
1: Rate of acceptance of a forged signature as a genuine False Positive
signature by a handwritten signature veriication system. 1: A iltering system can make two types of errors: false
(Chakravarty et al., 2005b) 2: The probability of incorrectly acceptance and false rejection. The latter is a false positive.
identifying any impostor against a valid users biometric A spam ilter can wrongly let spam through, or wrongly
template. (Vatsa et al., 2005) 3: A case where an individual ilter real e-mail as spam. In false acceptance, it is not
is authenticated when they were not the person that enrolled doing its job, while in false positives, it is doing it too
the original sample. (Fleming, 2005a) well. Decreasing one type of error tends to increase the
other, as with Type I and Type II errors in experimental
False Alarm design. As the spam-ilter catch rate rises above 99.99%,
A case in which a candidate match is found during the number of false positives also rises. (Whitworth,
preprocessing step of a similarity analysis algorithm 2006b) 2: A prediction of a usability problem reported in
when a match does not really exist. Minimization of false a usability inspection that in reality is not a problem to the
alarms is important because extracting a large amount real users. (Woolrych & Hindmarch, 2006) 3: The error
of false candidates in early steps of an algorithm causes committed when an object is selected as relevant when
performance degradation that will not improve the accuracy it is in fact irrelevant. More generally, a false positive
of the result. (Sayal, 2005) occurs when the null hypothesis is erroneously rejected.
Also called Type I error. (Mukherjee, 2005) 4: A mail
False Discovery Rate (FDR) message that the ilter tags as spam but is actually ham.
The expected proportion of false positives among the (de Freitas & Levene, 2006a)
objects selected as relevant. (Mukherjee, 2005)
False Rejection
False Dismissal A case where an individual is not authenticated, although
A case in which a candidate match is eliminated during he or she has previously enrolled biometric data. (Fleming,
the preprocessing step of a similarity analysis algorithm 2005a)
when a match does exist. Minimization of false dismissals
is important because it reduces accuracy of the algorithm. False Rejection Rate
(Sayal, 2005) 1: Rate of rejection of a genuine signature as a forged
signature by a handwritten signature veriication system.
False Drops (Chakravarty et al., 2005b) 2: The probability of incorrectly
A property of signature iles. Since signature iles use hash rejecting the valid users or failing to verify the legitimate
to activate bits corresponding to the set elements, possibility claimed identity of any user. (Vatsa et al., 2005) 3: The
exists for one or more set elements setting the same bits. probability that a biometric system will fail to identify
When a query signature is evaluated using signatures in an enrollee or verify the legitimate claimed identity of
signature iles, there is a probability that the signatures an enrollee. (Vatsa et al., 2005)
might match, but the actual sets might not match. These
are called false drops. (Ramasamy & Deshpande, 2005) Falsiication Testing
A method for testing the accuracy of predictions made
False Negative during usability inspections. (Woolrych & Hindmarch,
1: A potential usability problem discovered in a usability 2006)
inspection that upon analysis is incorrectly eliminated
by the analyst as an improbable problem. The discovered Familiarity-Based Trust
problem is conirmed in real use as causing dificulties Knowing what to expect of the trusted party based on
to users. (Woolrych & Hindmarch, 2006) 2: The error previous interactions with it. (Paravastu & Gefen, 2006)
committed when a truly relevant object is not selected.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fa m ily PC Progra m Fe at ure 259

Family PC Program the bulk of the data-processing operations while the data
A program launched in Tunisia in April 2001 to help itself is stored on the server. (Rashid, 2005)
households acquire a PC and printer at a total cost of 1000
F
TD (US$700). (El Louadi, 2005a) Fault (Crash, Timing, Omission, Commission,
Byzantine)
Fantasy Role-Playing (FRP) A crash fault occurs when a component operates correctly
Like being and playing in an improvisational drama or up to some point in time, after which it produces no further
free-form theatre, in which the participants (actors) adopt results. A timing fault occurs when a component produces
imaginary characters or parts that have personalities, results at the wrong time. An omission fault occurs when
motivations, and backgrounds different from their own. a component produces some results but not others. A
(Medeni & Medeni, 2006) commission fault occurs when a component generates
incorrect results. A Byzantine or malicious fault is a form
Fantasy Role-Playing Game of commission fault in which a component generates
A type of game that allows players to role-play imaginary incorrect results intentionally to mislead the algorithms
characters in an imaginary setting. Usually, role-players or components of the system. (Zhao et al., 2005)
engage in cooperatively creating a story, each restricting
themselves to the character they themselves introduced Fault Detector, Analyzer, Notiier
to the story. (Medeni & Medeni, 2006) A fault detector monitors the occurrence of faults in a
component. A fault analyzer subscribes to fault reports
Fantasy-Based Virtual Community from a fault notiier and aggregates multiple related fault
A virtual environment where users create their own avatars reports into a single fault report. A fault notiier receives
and personalities, and interact with other users through fault reports from fault detectors and fault analyzers, and
role-playing fantasies. (Jong & Mahatanankoon, 2006) supplies fault reports to subscribers for those reports.
(Zhao et al., 2005)
FAP: See Facial Animation Parameter.
Fault Tolerance
FAQ The ability to provide continuous service, even in the
Frequently asked question. (Toland et al., 2005b) presence of faults. (Zhao et al., 2005)

Farmers and Explorers FBA: See Facial and Body Animation.


Two typologies of data warehouse users. Farmers are users
of data warehouses and other analytical tools that generate FCL: See Fostering Communities of Learners.
periodical reports, such as sales by week, category, and
department. Explorers are more ambitious users of data FD: See Field Dependence.
warehouses which try to better understand the data, to
look for patterns in the data, or to generate new reports. FDBS: See Federated Database Schema.
(Hernandez-Orallo, 2005a)
FDI: See Foreign Direct Investment.
FAST: See Fast Algorithm for Splitting Trees.
FDLP: See Federal Depository Library Program.
Fast Algorithm for Splitting Trees (FAST)
A splitting procedure to grow a binary tree using a suitable FDR: See False Discovery Rate.
mathematical property of the impurity proportional
reduction measure to ind out the optimal split at each Feature
node without trying out necessarily all candidate splits. 1: An attribute derived from transforming the original
(Siciliano & Conversano, 2005) multimedia object by using an analysis algorithm; a feature
is represented by a set of numbers (also called feature
Fat Client/Server Architecture vector). (Hentea, 2005c) 2: Quantity or quality describing
A client/server network architecture where the client (PCs an instance. (Jourdan et al., 2005) 3: Information that can
or workstations on which users run applications) performs be gathered to describe a raw trace such as angles between

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
260 Fe at ure Ex t ra c t ion Fe de rat e d Dat a ba se Syst e m

sampled points, lengths, and the speed of the sketched Feature-Based Image Retrieval
trace. (Mohamed & Ottmann, 2006) Based on speciic visual characteristics called features
F and considered at a low abstraction level. Features are
Feature Extraction commonly referred to perceptive attributes of images,
1: A subject of multimedia processing that involves such as color, texture, shape, and so forth, of images.
applying algorithms to calculate and extract some attributes (Y.-J. Zhang, 2005a)
for describing the media. (Wei & Li, 2005) 2: The process
to obtain a group of features with the characters we need Feature-Level Architecture
from the original data set. It usually uses a transform (e.g., In this type of architecture, modality fusion operates
principal component analysis) to obtain a group of features at a low level of modality processing. The recognition
at one time of computation. (Chu & Wang, 2005) 3: Use process in one modality can inluence the recognition
of one or more transformations of the input features to process in another modality. Feature-level architectures
produce more useful features. (Hentea, 2005c) generally are considered appropriate for tightly related
and synchronized modalities, such as speech and lip
Feature Reduction Method movements. (Bourguet, 2006)
The goal of a feature reduction method is to identify the
minimum set of non-redundant features (e.g., SNPs, genes) FEC: See Forwarding Equivalence Class.
that are useful in classiication. (Kusiak & Shah, 2005)
Federal Depository Library Program (FDLP)
Feature Selection Federal program of disseminating government program
1: A process of choosing an optimal subset of features from information products in all media to participating libraries.
original features, according to a certain criterion. (Yu & (Inoue & Bell, 2005)
Liu, 2005) 2: The process of selecting some features we
need from all the original features. It usually measures Federal Model
the character (e.g., t-test score) of each feature irst, then A hybrid coniguration of centralization and decentralization
chooses some features we need. (Chu & Wang, 2005) 3: in which decision making is differentiated across divisional
The process of identifying the most effective subset of the and corporate units. (Peterson, 2005)
original features. (Hentea, 2005c) 4: The task of identifying
and selecting a useful subset of features from a large set Federated Database
of redundant, perhaps irrelevant features. (Jourdan et al., A type of multi-database in which component databases
2005) 5: The process of identifying the most effective preserve their autonomy. (Unal et al., 2006)
subset of the original features to use in data analysis such
as clustering. (Huang, 2005) 6: The process of identifying Federated Database Schema (FDBS)
those input attributes that contribute signiicantly to Collection of autonomous cooperating database systems
building a predictive model for a speciied output or target. working in either a homogenous environmentthat is,
(Mani et al., 2005) dealing with schemas of databases having the same data
model and identical database management systemsor
Feature Space a heterogeneous environment. (Bounif, 2005)
The higher dimensional space that results from mapping
the input space, as opposed to the input space occupied Federated Database System
by the training examples. (Awad & Khan, 2005) 1: A network of independent and autonomous databases
cooperating in a loosely coupled manner to share and
Feature Vector exchange information. (Leong, 2005a) 2: A system that
1: A vector in which every dimension represents a property integrates a number of pre-existing autonomous database
of a 3D structure. A good feature vector captures similarity management systems (DBMSs) that can be homogeneous
and dissimilarity of 3D structures. (X. Wang, 2005) 2: Data or heterogeneous. They can use different underlying
that describes the content of the corresponding multimedia data models, data deinition and manipulation facilities,
object. The elements of the feature vector represent the and transaction management and concurrency control
extracted descriptive information with respect to the mechanisms. A DBMS in the federation can be integrated
utilized analysis. (Bretschneider & Kao, 2005) by a mediator providing a uniied view of data: a global

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fe de rat e d I nfor m at ion Syst e m (FI S) Fibrat ion 261

schema, a global query language, a global catalog, and a Feedback Technique


global transaction manager. The underlying transaction One of a number of methods such as questionnaires used
model considers, in general, a set of transactions to acquire information or data on the question under study.
F
synchronized by a global transaction. Synchronization is (Martz & Shepherd, 2005)
achieved using protocols such as the Two-Phase Commit
(2PC) Protocol. (Vargas-Solar, 2005) Feedforward Neural Network
A special type of neural network where processing
Federated Information System (FIS) elements are arranged in layers and the information is one
An information system is considered federated when it -directional from input layer to hidden layer(s) to output
supports interoperation among several autonomous and layer. (G.P. Zhang, 2005)
possibly heterogeneous information systems, by means of a
shared global data schema. (De Antonellis et al., 2005) FHSS: See Frequency Hopping Spread Spectrum.

Federated Representational Model FI: See Frequent Itemset.


An approach for building representational models
according to which each information system deines some Fiankoma Method
aspects of an entity model, contributing thus to a global An approach to community, working with ICTs
entity model. (Lepouras et al., 2006) emphasizing active authorship. (Pryor, 2005)

Federated Web Service Fiber Optic


Usually, problems like authorization are handled on a A technology that uses bundles of glass iber to transmit
network-by-network basisa given login may only be valid data at high speed by rapid laser light signal pulses. It can
to a single network or site. Federation provides a means carry a much greater amount of data than metal cable.
to transcend this limitation. In our example, groups could (D. Stern, 2005)
federate by declaring trust in each other, thus permitting
authorization across multiple organizations. (Gaedke et Fiber Optic Cable
al., 2005) 1: A transmission medium that provides high data rates
and low errors. Glass or plastic ibers are woven together
Feedback to form the core of the cable. The core is surrounded by
A process whereby an input variable is fed back by the a glass or plastic layer, called the cladding. The cladding
output variable. For example, an increased (or decreased) is covered with plastic or other material for protection.
customer base leads to an increase (or decrease) in The cable requires a light source, most commonly laser
sales from word of mouth, which then is fed back to the or light-emitting diodes. (Raisinghani & Ghanem, 2005)
customer base, increasingly or decreasingly. (Qudrat- 2: Composed of one or more optical ibers, a iber-optic
Ullah, 2006) cable transmits data as a lightwave over long distances at
a high speed. (Harris, 2005)
Feedback Learning
Deals with learning based on the input-process-output- Fiber-to-the-Home (FTTH)
feedback process in which three laws shape the learning The use of iber-optic cable, for the provisioning of
process: (1) exercise law: reiteration strengthens the narrowband and broadband services to the residential
connection between response and stimulus; (2) effect customer, rather than traditional copper wiring. (Kelic,
law: the succession of stimulus-response is not enough for 2005)
learning, and reinforcement is needed; and (3) disposition
law: achieving goals is a reinforcement particular to every Fibration
action that has a clear aim. (Xodo, 2005) A basic construct of category theory. Roughly, it is a triple
(C,B,f ) with C a category (of, say, models), B another
Feedback Loop category (say, meta-models) called base, and f: CB a
A self-perpetuating mechanism of change. (OLooney, functor (mapping) between categories (that assigns to
2006) each model its meta-model). Given a base object (meta-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
262 Fide lit y File Tra nsfe r Prot oc ol (FT P)

MB, Cobjects (models, schemas) S for which S. f = M of automation devices, for example, assembly lines,
and Carrows between them s: SS for which s.f = id M production cells, or single machines. Depending on
F (identity mapping of M), form a category (of models in the the nature of the business, different types of FANs are
meta-model M), CM. This category is called the iber over applied, which are either based on ield buses or Internet
M. Fibers are mutually connected in the following way. Let technologies. Well-known FANs are, for example, Proibus,
m: MM be a base arrow (meta-model interpretation) and DeviceNet, CAN Open, and SERCOS. (Blecker, 2006a)
S be an object over M, S. f = M. Then there is an object S*
over M, S*.f =M, and an arrow m*: S*S over m, m*.f Fieldwork
=m, having some remarkable properties (their formulation Often used interchangeably with ethnography (see
is too technical to be presented here). In the MMt context, deinition), it is, in fact, less precise and much broader as a
object S* is the same model S, but its elements are concept. Fieldwork may be ethnographic or not, qualitative
renamed in terms of meta-model M as governed by the or quantitative, short term or long term. What deines
interpretation m, and m* is the renaming mapping. The ieldwork is a situation of doing research outside of the
technical properties just mentioned abstract this intuition conines of a laboratory or a library, gathering primary
in terms of morphisms in C and B. (Diskin, 2005) data in person, and locating oneself within a given social
formation (e.g., a neighborhood, political party, social
Fidelity club, school, hospital, etc.). Fieldwork in the ethnographic
The measure of how well the rules extracted from a mode typically involves an anthropologist relocating to
complicated model mimic the behavior of that model. a distant society to learn and document another culture,
(Zhou, 2005) usually involving periods of continuous stay of a year or
more, and relying heavily on Participant Observation as
Field Creation a research method. (Forte, 2005)
In traditional ethnographic ield research (see ethnography,
ieldwork), an anthropologist would spend time in a ield Figuration
site (i.e., a village belonging to a tribe) that logically As deined in image theory, a complex construction
predated the existence of a research project. Field creation comprising multiple images. Figurations are inherently
involves this process, only in reverse. In this case, an less eficient for extracting information than images,
anthropologist or other researcher constructs a particular according to image theory. (Crossland, 2005)
site that then attracts interest and generates a network
of social interaction around itinformants come to the File Format
site created by the researcher. The creation of a Web- The way a ile stores informationthe way in which a
based information resource that fosters a community of ile is saved. The ile format depends on the content that
interacting interests, and then becomes a site of research is being stored, the application that is being used, and the
about itself, is one example of ield creation. (Forte, compression algorithm that is being used. (Prata, 2005)
2005)
File Server
Field Dependence (FD) A piece of equipment that allows one to distribute a software
Measures a persons ability to separate an item from an program from a single source to a number of computers.
organized ield or to overcome an embedded context. (Switala, 2005)
(Crossland, 2005)
File Transfer Protocol (FTP)
Field Learning 1: An application and network protocol for transferring iles
Derives rules by looking at the ield of the values of each between host computers. Such a protocol allows users to
attribute in all the instances of the training data set. (Dai, quickly transfer text and binary iles to and from a distant
2005a) or local PC. (Gillani, 2005b) 2: A computer protocol used
for accessing a remote computer over the Internet and
Field-Area Network retrieving iles from it. (Kirlidog, 2005) 3: A protocol
Real-time network on the ield level (shop loor) of industrial used to transfer iles over a TCP/IP network (Internet,
irms communication systems for the interconnection UNIX, etc.). (Parikh & Parolia, 2005) 4: A protocol
to transfer iles from one computer to another over the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Filt e r Finge rprint 263

Internet. (Moreira & da Silva, 2005) 5: A convention for Financial Distress


the transfer of iles across computer networks. (Murphy, A company is said to be under inancial distress if it is
2005a) 6: Protocol that allows users to copy iles between unable to pay its debts as they become due, which is
F
their local system and any system they can reach on the aggravated if the value of the irms assets is lower than
network. (Kontolemakis et al., 2005) its liabilities. (Galvo et al., 2005)

Filter Financial Information Exchange (FIX)


A saved set of chosen criteria that speciies a subset of A vendor-neutral standard-message-format protocol
information in a data warehouse. (Nigro & Gonzlez for describing real-time security transactions. FIX is a
Csaro, 2005b) public-domain speciication owned and maintained by
FIX Protocol, Ltd. The protocol supports all electronic
Filter Technique conversations between brokers and other financial
Any technique for reducing the number of models, with institutions. (Saha, 2006b)
the aim of avoiding overwhelming the user. (Butler &
Webb, 2005) Financial Intermediary
A bank, securities irm, or other inancial institution
Filter-Based Information Access Approach that collects deposits and makes loans, manages the risk
System responses are iltered on the basis of a rudimentary associated with the loan process, and/or facilitates the
user proile storing long-term user interests. (Koutrika, low of capital between operating units and the economy.
2005) (Roofe, 2005)

Filter-Reinement Processing Financial Service


A technique used in query processing composed of the Providing users services of inancial issue (e.g., mobile
ilter step and the reinement step. The ilter step discards banking, mobile shopping, etc.). (Lee & Pai, 2005)
parts of the database that cannot contribute to the inal
answer and determines a set of candidate objects, which are Financial Virtual Community
then processed by the reinement step. Filtering is usually A Virtual Community focusing on inancial products
enhanced by eficient indexing schemes for improved and services from a consumer perspective. (Kardaras &
performance. (Kontaki et al., 2005) Karakostas, 2006)

Filtering Financing Models


1: A collective term for techniques that automatically A model that provides capital to the public sector.
select product attributes that meet customer proiles and Exemplary inancing models are factoring, lending, or
preferences by applying predeined rules, similarities, or borrowing (inance market models); leasing, renting, or
clustering. (Blecker, 2006b) 2: A technique that selects contracting out (reward models); and marketing of ones
speciic things according to criteria of similarity with own resources or sponsoring (fundraising). (Knust &
particular patterns. (Nabuco et al., 2006) Hagenhoff, 2005)

Filtering Machine Financing Round


Filtering is performed autonomously by a set of specialized One of a number of successive stages of inancing received
source agents dispatched by the agent-based filter. by a new venture (seed, irst, second, etc.); also called
We introduced a new automatic navigation technique: tranch; may be an up round or a down round (in an up
information ants. The ant-like agents carry the warehouse round, the value of the venture has increased since the
proiles. New documents are parsed, indexed, and matched previous round). (Craig, 2006b)
with all proiles respectively. If a document matches the
proile, it is downloaded and re-indexed in order to store it in Fingerprint
a Data Warehouse Library (DWL). (Wecel et al., 2005) Also called a label, this is a feature of the carrier and is
used to distinguish it from other carriers. Moreover, it

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
264 Finge rprint Sc a nning Fishe r Ex a c t Te st

allows the copyrighted owner to trace pirates if the carrier Firewall


is redisseminated illegally. The major difference between 1: A combination of hardware and software that prevents
F watermarking and ingerprinting is whether the identity unauthorized access to network resourcesincluding
of the transmitter or that of the recipient is embedded in information and applications. (Tassabehji, 2005a) 2: A
the carrier. (Lou et al., 2006) set of related programs that reside on a network gateway
server that protects the resources of a private network from
Fingerprint Scanning users from other networks. (Dudding, 2005) 3: A system
Enables the identiication of an individual based on the that implements a set of security rules to enforce access
analysis of unique patterns and ridges found in a ingerprint. control to a network from outside intrusions. (Syed et al.,
(Scott et al., 2006) 2005b) 4: Special software used to prevent unauthorized
access to a companys conidential data from the Internet
Fingerprinting through iltering all network packets entering the irewall
1: A technique for identity veriication or identiication at one or more levels of network protocols. (Wang, Cheng,
based on the users ingerprint features, such as location & Cheng, 2006a) 5: The set of related programs, located at
and orientation of bifurcations and endings of ridges, a network gateway server, that protects the resources of a
peaks, and valleys. (Li, 2006) 2: A technique to associate private network from users from other networks. Basically,
a singleand smallrepresentation of an audio signal a irewall, working closely with a router program, ilters
that is robust to usual audio deformations. Used for all network packets to determine whether to forward them
identiication. (Pachet, 2006) 3: Used for calling the toward their destination. A irewall is often installed away
hidden serial numbers or anything else that should allow from the rest of the network so that no incoming request
the copyright owner to identify which reseller broke the can get directly at private network resources. (Vaast,
license agreement. It is used for multi-level document 2005) 6: Hardware or software to prevent unauthorized
distribution. (Nesi & Spinu, 2005) users from gaining access to a computer or network.
(Friedman, 2005)
Finite Element Method
1: Numerical method to solve the differential equations First Generation (1G)
with boundary/initial conditions over a domain. (Kanapady 1: A irst-generation system is analog, circuit-based,
& Lazarevic, 2005) 2: A second approach to simulate soft narrowband, and suitable for voice communication only.
bodies and deformations. It is also used to model fabrics (Lei et al., 2005a) 2: An old-fashioned analog mobile
by considering its surface as a continuum and not a ixed phone system capable of handling very limited or no data
set of points. This method is more accurate but slower to at all. (Akhtar, 2005)
compute. (Volino et al., 2005)
First Story Detection
Finite Impulse Response (FIR) Filter A Topic Detection and Tracking (TDT) component that
1: A digital ilter with a inite impulse response. FIR identiies whether a new document belongs to an existing
ilters are always stable. FIR ilters have only zeros (all topic or a new topic. (Chung et al., 2005)
poles are at the origin). (Jovanovic-Dolecek, 2005a) 2:
This digital ilter can be designed to have linear phase; First-Person Perspective
it ilters with the symmetric impulse response. The main The visualization of the gaming environment through the
disadvantage is high complexity. (Jovanovic-Dolecek & eyes of the character. (Ip & Jacobs, 2006)
Daz-Carmona, 2005)
FIS: See Federated Information System.
FIPA: See Foundation for Intelligent Physical Agents.
Fisher Exact Test
FIPSE: See Fund for the Improvement of Post-Secondary A statistical test that can distinguish differences in data
Education. sets with binary categories and small sizes. In our case, 19
total students with two choices (agree-disagree). (Martz
FIR Filter: See Finite Impulse Response Filter. & Shepherd, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fishe r Va lue (F Va lue ) Fla sh M e m or y 265

Fisher Value (F Value) computer to undertake tasks alone or in collaboration


1: A statistical distribution, used here to indicate the with others. (Chan & Fang, 2005)
probability that an ANOVA model is good. In the ANOVA
F
calculations, it is the ratio of squared variances. A large Fixed Cost
number translates to conidence in the model. (Morantz, One of the set of one-time costs that must be incurred for
2005) 2: Combines recall and precision in a single eficiency an activity to occur. (Fisher, 2005)
measure (it is the harmonic mean of precision and recall):
F = 2 * (recall * precision) / (recall + precision). (Song, Fixed Weighting
Song, Hu, & Han, 2005) Optimal weights are estimated and are used unchanged
to combine forecasts for a number of periods. (C.K. Chan,
Fit/Alignment 2005)
Terms used to explain the relationship between IT and
strategy. The IT strategy should work in synergy with the Flame War
organizations strategy. These terms have their roots in The repetitive exchange of offensive messages between
the meta-theory contingency theory. (Baker & Coltman, members of a discussion forum which can eventually
2005) escalate and degenerate an exchange of injuries. (Gur u,
2006)
Fitness for Use
Describes the many variables that need to be considered Flaming
when evaluating the quality of an information product. Posting a personally offensive message, as a response to an
(Chengalur-Smith et al., 2005) opinion expressed on a discussion forum. (Gur u, 2006)

Fitness Landscape Flaming Episode


Optimization space due to the characteristics of the itness An inappropriate, rude, or hostile exchange that occurs in
measure used to deine the evolutionary computation an asynchronous discussion group. (Shaw, 2005)
process. (Muruzbal, 2005)
Flash
Five Forces Model 1: A multimedia authoring tool in which interactive
A theoretical framework proposed by Michael Porter that learning objects may be created. (Kaur et al., 2005) 2:
can be used to analyze the relative attractiveness of an A tool that is a registered trademark of Macromedia and
industry from ive different dimensions. (Wang, Ding, was originally created to allow developers to create simple
et al., 2006) animations or movies that could be inserted into a Web page
and displayed on any computer that had the appropriate
Five Pillars browser plug-in. (Burrage & Pelton, 2005)
The Sloan-C quality elements of learning effectiveness,
cost effectiveness, access, faculty satisfaction, and student Flash Crowd Problem
satisfaction. (Moore et al., 2005) Occurs when the request load overwhelms some aspect
of a Web sites infrastructure, such as the front-end Web
FIX: See Financial Information Exchange. server, network equipment or bandwidth, or the back-
end transaction-processing infrastructure. The resulting
Fixation overload can crash a site or cause unusually high response
The moment when the eyes are relatively stationary, times. (Katsaros & Manolopoulos, 2005a)
taking in or encoding information. Fixations last for 218
milliseconds on average, with a typical range of 66 to 416 Flash Memory
milliseconds. (Poole & Ball, 2006) A kind of non-volatile storage similar to EEPROM, but
updating can only be done either in blocks or for the entire
Fixed Context of Use chip, making it easy to update. (Hu, Yeh, et al., 2006)
Traditional user interface design and testing assumes
a single domain, with the users always using the same

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
266 Fla sh Pla ye r Flow

Flash Player some of their learning on campus and some of their learning
A multiple-platform client that Web users must download off campus. (Klobas & Renzi, 2005b)
F and install (a browser plug-in) in order to view and interact
with Macromedia Flash content. (Barone, 2005) Flexible Mining of Association Rules
Mining association rules in user-speciied forms to suit
Flexibility different needs, such as on dimension, level of abstraction,
1: The ease with which a system or component can be and interestingness. (Shen, 2005)
modiied for use in applications or environments other than
those for which it was originally designed. A lexible system Flexible Workplace
may be transformed by IT professionals and customized by Organizational settings that can quickly take external
end users. (Vaast, 2005) 2: The host- and the IP-multicast and internal changes into account in their processes.
are lexible, and it is easy to change the topology of the (Oravec, 2005)
multicast tree. (Hosszu, 2005a) 3: Virtual organizations
are, by their nature, lexible. Traditional organizational Flexography
structures are rooted in the physical world and rely on A printing process that uses a raised or relief-type image
structures, unalterable networks, and speciic locations on a lexible photoploymer or rubber plate. Commonly used
to function properly. Because of this, when it becomes for printing corrugated and lexible packaging, newsprint,
necessary to introduce change into a speciic organization, and other media. (Snyder, 2005)
a barrier is reached where further alteration requires
physical, costly modiications. A virtual organization Floating Catchment Area Method
is unhindered by these problems. These structures are A Geographic Information System (GIS)-supported
designed so that they can operate regardless of time or method for assessing the scarcity of supply vs. demand.
place, independent of existing physical realities. (J. Lee, For example, assuming a threshold travel distance of 15
2005) miles for primary healthcare, a 15-mile circle is drawn
around a residential location as its catchment area. The
Flexible Attribute circle loats from one location to another throughout a
An attribute is called lexible if its value can be changed study area, and the physician-to-population ratio within
in time. (Ras et al., 2005) each catchment indicates whether an area is medically
underserved. (Wang & Lou, 2005)
Flexible Calendar Option
Typically, school districts are bound to a relatively ixed Flooding-Based Broadcasting Mechanism
calendar, either by state or local policy. Flexible calendar The unconditional broadcasting mechanism utilized
option refers to one of a variety of programs that might by Gnutella peers to forward their searching queries.
include year-round schooling, alternate calendars, or Gnutella peers implement such a looding-based searching
alternate daily schedules. (Glick, 2005a) mechanism in order to maximize their searching coverage
on the networks. (Kwok et al., 2006)
Flexible Job Shop
A shop in which resources are lexible and can execute Floor Control
many types of tasks with variable performances according Functionality that allows for resolving concurrent access
to the assignment choices. (Kacem, 2005) to common resources, such as mouse pointers in shared
applications. A loor is usually assigned to such a resource
Flexible Learning together with a policy for access authorization. (Trossen
1: A combination of varied teaching practices, including & Molenaar, 2005)
applied research and investigative projects within a lexible
learning mode, that is aimed at maximizing learner FLOSS: See Free/Libre Open Source Software.
engagement through action learning methodologies and
advanced technologies. The key focus driving educational Flow
design is meeting the learners needs. (Baskin et al., 2005) 1: The amount of change in a variable over time. Flow
2: A systems in which students may choose to complete represents the change in the status or the quantity of a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
F/OSS For m a l Com m unic at ion 267

variable over a speciied time unit. (Maani, 2005) 2: A Foreign Direct Investment (FDI)
psychological state experienced when there is a match An acquisition of an asset in a foreign country (host
between task requirements and a users skills, a state that country) made by an investor in another country (home
F
involves high attention and leads to feelings of control and country) with the intention to manage this asset. (Brock
enjoyment. (Sas, 2006) 3: A psychological state in which & Zhou, 2006)
one is so focused on an activity that one loses a sense of
self and of the passage of time. (Bridges et al., 2006) 4: A Foreign Key
representation of the rate of change in the condition of a 1: A key is a ield or set of ields in a relational database
variable in a system dynamics model. (Casado, 2005) 5: table that has unique valuesthat is, no duplicates. A ield
A set of packets associated with a single application and or set of ields whose values form a subset of the values
that share common requirements. (Gutirrez & Ting, 2005) in the key of another table is called a foreign key. Foreign
6: The holistic sensation that people feel when they act in keys express relationships between ields of different
total involvement. (Scarpi & DallOlmo-Riley, 2006) tables. (Koeller, 2005) 2: A set of one or more attributes
that correspond to a primary key in order to simulate a
F/OSS: See Free/Open Source Software. relationship. It links two tables. (Alhajj & Polat, 2005a)

Focal Element Forensic Systems Engineering


Subset of the frame of discernment with a positive mass Postmortem analysis and study of project failures and
value associated with it. (Beynon, 2005a) disasters aimed at uncovering causes and relationships.
(Dalcher, 2005)
Focus Group
A small group interview, conducted by a moderator, Foresight Methodology
which is used to discuss one or more issues. (McPherson, Provides tools and systematic approaches to integrate
2005) various partners and views in order to provide the necessary
framework for, for example, measures to improve economic
Focus+Context Technique development. It is closely connected with the Triple-Helix
Allows one to interactively transfer the focus as desired Model. (Hofer, 2006)
while the context of the region in focus remains in view,
with gradually degrading resolution to the rim. In contrast, Forking
allows the standard zoom+panning technique to select the Source code is said to fork when another group of
magniication factor, trading detail, and overview, and developers creates a derivative version of the source code
involves harsh view cut-offs. (Walter, 2005) that is separate, if not incompatible, with the current road
the source codes development is following. The result is
For-Proit Business source code that takes a different fork in the road. (St.
A business enterprise or organization that exists to provide Amant & Still, 2005)
products and/or services to customers in exchange for
delivering a proit to the owners and/or investors of the Form Element
business. (Baim, 2006a) Any part of an HTML form, including input boxes, check
boxes, pull-down menus, submit or reset buttons, or radio
Force Model options. (Fagan, 2005)
A model showing that a users motivation to exert effort
into using an application is the summation of the products Form Factor
of the attractiveness of the application and the probability This platform or operating system runs on a handheld
that a certain level of effort will result in successfully device. Major form factors include Palm, Pocket PC, and
using the application. (Chen & Lou, 2005) WAP. (Chan & Fang, 2005)

Forecasting Model Formal Communication


A computational and/or mathematical model that simulates Communication that is institutionally planned and
time series behavior with the purpose of forecasting their functionally deined. (Beuschel et al., 2005)
future values. (Castro & Braga, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
268 For m a l Conc e pt Ana lysis Forw a rd Error Corre c t ion

Formal Concept Analysis Formal Ontology


A mathematical framework that provides formal and A formal representation of a shared conceptualization.
F mathematical treatment of the notion of a concept in a In the context of the Semantic Web, ontologies provide
given universe. (Saquer, 2005) shared vocabularies for metadata descriptions. (Sicilia
& Garca-Barriocanal, 2006)
Formal Leader
One who is formally appointed or authorized by either the Formal Veriication
group or an external party to hold an oficially designated Act of proving or disproving the correctness of a system
leadership role for the group or team. Such a leader may with respect to a certain property (speciication) using
or may not display strong leadership behavior. (Cargill, mathematical formalisms and methods. (Fisteus & Kloos,
2006a) 2006)

Formal Learning System Formative Evaluation of Learning


A system specially designed to facilitate learning. This 1: Used when the intention is to give feedback to guide
situation takes place at a given time in a particular physical or improve practice. (Diamadis & Polyzos, 2005) 2: An
environment equipped with dedicated furniture and evaluation designed and used to improve a program,
technical facilities. (Blandin, 2005) especially when it is still being developed. (Nelson, 2005)
3: Evaluation performed throughout the design process
Formal Mentoring conducted for the purpose of improving and changing
A deliberate pairing of a more skilled or experienced whatever is evaluated. (Zaphiris & Zacharia, 2005) 4:
person with a lesser skilled or experienced one, with the The collection of usability data during the development
agreed-upon goal of having the lesser skilled or experienced of a system in order to guide iterative design. (Danielson,
person grow and develop speciic competencies. (Long 2006b) 5: The elicitation of information that can be used
et al., 2005) to improve a program while it is in the development stage.
(Nash et al., 2005a) 6: The elicitation of information
Formal Method that can be used to improve a program while it is in the
1: One of a set of rigorous techniques based on mathematical development stage. (Nash et al., 2005b) 7: The gathering
notation that can be used to specify and verify software of data from stakeholders on an innovation during the
models. (Kefalas et al., 2005) 2: A set of tools and notations process of its development. (Naidu, 2005a)
(based on formal semantics) used for unambiguously
specifying the requirements of computing systems that Formulary
allow one to prove properties of speciications and to A list of drugs that are approved for use under a given
prove the consistency of implementations with their health insurance program. (Rosson, 2006)
speciications. (Fisteus & Kloos, 2006) 3: The variety of
mathematical modeling techniques that are applicable to Forum
computer system (software and hardware) design. Formal The context or the setting in which information is presented
methods may be used to specify and model the behavior of a to other individuals. (St. Amant, 2006a)
system, and to mathematically verify that the system design
and implementation satisfy system functional and safety Forward Engineering
properties. These speciications, models, and veriications The process of transforming a model into code through
may be done using a variety of techniques and with various a mapping to a speciic implementation language. (Favre
degrees of rigor. (Mauco & Riesco, 2005) et al., 2005)

Formal Network of Practice Forward Error Correction


A network of practice that has a membership controlled A technique used in the receiving system for correcting
by fees and/or acceptance through some central authority errors in data transmission. (Hin & Subramaniam,
that also assists in organizing, facilitating, and supporting 2005a)
member communications, events, and discussion topics.
(Archer, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Forw a rd-Look ing Re sponsibilit y Fra gm e nt at ion 269

Forward-Looking Responsibility 4G: See Fourth Generation.


Addresses the particular responsibilities of individuals,
groups, and partners in advance of a products use or a Fourth Generation (4G)
F
systems implementation; it deines guidelines for creating Planned evolution of 3G technology expected to provide
quality products, measures the quality of the products, and support for data rates up to 100 Mbps, allowing high-quality
deines the method of evaluation, the limitations, and the and smooth-video transmission. (Akhtar, 2005)
scope of the operation in advance of harmful incidents.
(George, 2005a) Fourth-Generation Language
Includes business application languages and tools such
Forwarding Equivalence Class (FEC) as database and decision supports tools such as SQL,
A group of network packets forwarded in the same manner ACCESS, and EXCEL; ERP and other reporting tools;
(e.g., over the same path, with the same forwarding and Web development environments such as ColdFusion
treatment). A forwarding equivalence class is therefore and FrontPage. (Beise et al., 2005)
the set of packets that could safely be mapped to the same
label. Note that there may be reasons that packets from Fractal Geometry
a single forwarding equivalence class may be mapped The geometry of the irregular shapes found in nature;
to multiple labels (e.g., when stream merge is not used). in general, fractals are characterized by ininite details,
(Gutirrez & Ting, 2005) ininite length, self-similarity, fractal dimensions, and the
absence of smoothness or derivative. (de Castro, 2005)
Fostering Communities of Learners (FCL)
Main features of FCL with respect to communities of Fractional Factorial
learners are represented by relection and discussion. A subset of the full factorial designthat is, a subset of
The relection is based on three main activities: research, all possible combinations. (Lo, 2005)
sharing of information, and fair jobs. Discussions and
speech have the main aim of stimulating auto-criticism and Fragile
auto-relective thinking in these communities. (Cartelli, After a message is embedded into a carrier, the hidden
2006a) message is destroyed if the carrier is destroyed or modiied.
The scheme is not suitable to prove a legal copyright, but
Foundation for Intelligent Physical Agents useful to detect a carrier that has been tampered with.
(FIPA) (Lou et al., 2006)
An international non-proit association of companies
promoting and developing speciications to support Fragile Watermarking
interoperability among agents and agent-based applications. 1: A method for embedding a secret message that is
(Cardoso & Freire, 2005) intended to be undetectable even after minor malicious
or non-malicious manipulations on the host media in
4C/ID-model: See Four-Component Instructional which it is embedded. (C.-T. Li, 2005) 2: Another category
Design Model. of digital watermarking which requires the embedded
watermark to be un-extractable after any manipulation
Four-Component Instructional Design Model on the host media. It is widely used in the applications
(4C/ID-Model) of authentication and content integrity veriication. (Si
An instructional design model incorporating teaching & Li, 2006) 3: A technique that does not guarantee the
of knowledge structures and algorithmic methods in watermark presence after few document manipulations.
supporting roles to mental models and heuristic problem- (Nesi & Spinu, 2005)
solving instruction. Its four components are: compilation
(algorithmic learning and instruction), restricted encoding Fragmentation
(includes facts, concepts, principles, and plans), elaboration When the data packet is too large to transfer on a given
(includes conceptual models, goal plan hierarchies, causal network, it is divided into smaller packets. These smaller
models, mental models), and induction (includes heuristics packets are reassembled on a destination host. Along with
and systematic approaches to problem solving). (Pelton other methods, intruders can deliberately divide the data
& Pelton, 2005) packets to evade IDSs. (Kayacik et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
270 Fra gm e nt e d Va lue Cha in Fre e Riding

Fragmented Value Chain network type is characterized by a centralized structure,


Neither the buyer-driven nor the seller-driven model of low competition, and a common scope of operations among
F the value chain dominates. (Jeffcoate, 2005) members. (Priestley, 2006)

Frame Franchisee
A small piece of information or a statement to which the The individual or business that receives the business
student is exposed, such as a page with a single question. In rights and pays the royalties for using the rights. (Chen
linear programmed instruction, a frame includes a stimulus, et al., 2005b)
a response, and reinforcement (positive feedback). (Owen
& Aworuwa, 2005) Franchisee Lifecycle
The stages a franchisee goes through in the franchise
Frame of Discernment system: Courting, We, Me, Rebel, Renewal. (Chen et
A inite, non-empty set of hypotheses. (Beynon, 2005a) al., 2005a)

Frame Rate Franchising


The number of frames projected per second. (Vitolo et A business opportunity based on granting the business
al., 2005) rights and collecting royalties in return. (Chen et al.,
2005a)
Frame Relay
A form of packet switching based on the use of variable- Franchisor
length link layer frames. (Butcher-Powell, 2005) The individual or business who grants the business rights.
(Chen et al., 2005a)
Frame Size
The height and width of the video window according to Franchisor/Franchisee Learning Process
the number of pixels. (Vitolo et al., 2005) The stages of learning, including beginner, novice,
advanced, master, and professional. (Chen et al., 2005b)
Frame-Based Representation
A way of deining the meaning of a concept by using Franchisor/Franchisee Relationship Manage-
a set of properties (frame) with associated classes of ment
admitted valuesthis frame is linked with the node The vital factor for the success of a franchise, including:
representing the concept. Associating a frame with the Knowledge, Attitude, Motivation, Individual Behavior,
concept ci to be deined corresponds to establishing a and Group Behavior. (Chen et al., 2005b)
relationship between ci and some of the other concepts of
the ontology; this relationship indicates that the concepts Fraud
c1, c2 cn used in the frame deining ci denote the class Criminal deception leading to unjust enrichment. (Rowe,
of illers (speciic concepts or instances) that can be 2006b)
associated with the slots (properties, attributes, qualities,
etc.) of the frame for ci. (Zarri, 2005a) Fraudulent Financial Reporting
Intentional or reckless conduct, whether by act or omission,
Framework that results in materially misleading inancial statements.
1: A software foundation that speciies how a software (Lenard & Alam, 2005)
system is to be built. It includes standards at all levels,
both internal construction and external appearance and Free (Random) MA
behavior. (D. Brandon, 2005a) 2: The underlying structure A class of non-coordinated distributed multiple-access
supporting or containing something. (Solberg, Oldevik, protocols where collisions may occur. (Markhasin et al.,
& Jensvoll, 2005) 2005)

Franchise Network Free Riding


A structured network of N organizations sharing a common 1: Using person-to-person (P2P) ile-sharing networks to
brand or public identity (e.g., Holiday Inn hotels). This acquire iles by downloading without making any iles

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fre e Soft w a re Fre que ncy Dom a in 271

on ones own machine available to the network in return. ignore the other, and as such, can be used as a compromise
(Hughes & Lang, 2005) 2: The act of enjoying the public term palatable to adherents of either movement. It also
good without contributing anything to its creation or emphasizes the libre meaning of the word free rather
F
maintenance. (Teigland & Wasko, 2005) 3: Consuming than the free of charge or gratis meaning, which those
community resources without contributing, a well-known unfamiliar with the subject might assume. This all-inclusive
problem in peer-to-peer ile-sharing systems (and in many acronym has the extra advantage of being non-anglo-
other public good provisioning settings) where certain centric: the F stands for Frei in German while the L stands
users only download iles without sharing iles themselves. for Libre in French and Spanish, Livre in Portuguese,
(Efstathiou & Polyzos, 2006) 4: The user behavior when a and Libero in Italian, showing that the concepts and their
user contributes nothing or undesired content to the P2P implementation are not exclusive to the English-speaking
network, while consuming the contributions of others. world. (Y.-W. Lin, 2005)
(Kwok et al., 2006)
Free/Open Source Software (F/OSS)
Free Software 1: Software whose source code, under certain license
1: An earlier name for open source software, emphasizing agreements, is freely available for modification,
the liberties given to end users and developers of derivative distribution, and innovation. (Sowe, Samoladas, &
works. There is no requirement that the software be Stamelos, 2005) 2: Software with an unrestrictive license
distributed at no charge; thus, distinct from freeware. whose source code is made available for modiication,
(Carillo & Okoli, 2006) 2: Software that is distributed customization, and distribution by others. (Boateng &
under the terms of a license agreement that makes it Boateng, 2006a)
freely available in source code form. Strong advocates of
free software insist that the ideas underlying a piece of Freeblock Scheduling
software, once published, must always be freely available. A disk arm scheduling method that uses opportunistic
(Fleming, 2005b) accesses to disk blocks required for a low-priority activity.
(Thomasian, 2005a)
Free Software Foundation (FSF)
Founded by Richard Stallman in 1985 to promote free Freely Available
software, especially the Copyleft concept. Produced the Wide distribution at no cost to the consumer. (Fleming,
GNU Manifesto (1985), the GNU General Public License 2005b)
(1989, 1991), the GNU Lesser General Public License
(1991, 1999), and the GNU Free Documentation License Freeware
(2000, 2001, 2002). (Okoli & Carillo, 2006) Software provided at no charge to the user. Might be open
source or proprietarythat is, the developer only permits
Free Tree redistribution and use, with no modiications permitted.
Let G be a connected acyclic labeled graph. Because of In fact, most open source software is freeware, but most
its acyclicity, each connected acyclic labeled graph has freeware is not open source. (Carillo & Okoli, 2006)
at least one node which is connected to the rest of the
graph by only one edgethat is, a leaf. If we label the Freight Consolidation
leaves with zero and the other nodes recursively with the The combining of small shipments into a composite
minimal label of its neighbors plus one, then we get an truckload or other unit of volume that is sent to a destination
unordered, unrooted tree-like structure, a so-called free point. (Tyan, 2006)
tree. It is a well-known fact that every free tree has at most
two nodes, which minimize the maximal distance to all Frequency
other nodes in the tree, the so-called centers. (Katsaros Rate of signal oscillation in Hertz. (Statica & Deek,
& Manolopoulos, 2005b) 2006)

Free/Libre Open Source Software (FLOSS) Frequency Domain


Generically indicating non-proprietary software, combines The representation of a signal as a function of frequency,
the concepts of free software and open source software. for example as the sum of sinusoidal waves of different
It makes it easier to talk about one movement and not amplitudes and frequencies. (Dixon, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
272 Fre que ncy H opping Spre a d Spe c t rum (FH SS) Front -End I nt e rope ra bilit y

Frequency Hopping Spread Spectrum (FHSS) the itemset. A frequent itemset is an itemset with support
When a broad slice of bandwidth spectrum is divided above a pre-speciied threshold. (Zhou & Wang, 2005)
F into many possible broadcast frequencies to be used by 9: An itemsets that has support at least equal to minsup.
the transmitted signal. (Akhtar, 2005) (Daly & Taniar, 2005a)

Frequency Response Frequent Pattern


j
H(e ): The discrete-time Fourier transform of the impulse Pattern the support of which exceeds a user-speciied
response of the system; it provides a frequency-domain threshold. (Kryszkiewicz, 2005)
description of the system. In general, it has a complex
value. (Jovanovic-Dolecek, 2005c) Frequent Subgraph
A subgraph that occurs in a certain percentage of all graphs
Frequency Selective Filter in a database. (Fischer & Meinl, 2005)
A digital ilter which passes desired frequency components
in a signal without distortion and attenuates other frequency Frequent Subgraph Mining
components. A low-pass (LP) ilter passes low-frequency Finding all subgraphs within a set of graph transactions
components to the output while eliminating high-frequency whose frequency satisfies a user-specified level of
components. Conversely, a high-pass (HP) ilter passes minimum support. (Holder & Cook, 2005)
all high-frequency components and rejects all low-
frequency components. A band-pass (BP) ilter blocks Frictionless Capitalism
both low- and high-frequency components while passing A view of economic/business relationships that suggests
the intermediate range. A bands-stop (BS) ilter eliminates information and communication technologies can reduce
the intermediate band of frequencies while passing both or eradicate barriers to proit making, such as distance
low- and high-frequency components. (Jovanovic-Dolecek between businesses and markets, imperfect market
& Daz-Carmona, 2005) knowledge, and low productivity. (Lepawsky & Park,
2006)
Frequency-Division Multiplexing
The process of subdividing a telecommunications line into Friendster(.com)
multiple channels, with each channel allocated a portion of The original and still most popular online social networking
the frequency of the line. (Hin & Subramaniam, 2005a) application. Claims to have more than ive million
registered users. (Mew, 2006)
Frequent Itemset (FI)
1: An itemset whose support is greater than or equal to Front and Back Region
the minimal support. (Zou & Chu, 2005) 2: The itemset Front region is a setting that stays put, geographically
with support greater than or equal to a certain threshold, speaking (e.g., an ofice, a class). Back region is a setting
called minsupport. (Wong, & Fu, 2005) 3: A set of items which cannot be easily intruded upon. (Baralou &
(e.g., {A, B, C}) that simultaneously co-occur with high Stepherd, 2005)
frequency in a set of transactions. This is a prerequisite
to inding association rules of the form (e.g., {A, B}C). Front-End Analysis
When items are URLs or products (i.e., books, movies, The process of collecting information before and
etc.) sold or provided on a Web site, frequent itemsets in preparation for the design, development, and
can correspond to implicit collaborative user proiles. implementation of any innovation. This is also referred
(Nasraoui, 2005) 4: A set of itemsets that have the user- to as needs assessment. (Naidu, 2005a)
speciied support threshold. (Ashrai et al., 2005) 5: An
itemset contained in a number of objects at least equal Front-End Interoperability
to some user-deined threshold. (Pasquier, 2005) 6: An User-centric integration approach that presents consolidated
itemset that has a support greater than user-speciied information retrieved from different sources and enables
minimum support. (Shen, 2005) 7: An itemset with support the access to multiple application systems in order to
higher than a predeined threshold, denoted minsup. perform a set of coherent transactions at once. (Werth,
(Dumitriu, 2005) 8: The support of an itemset refers to as 2005)
the percentage of transactions that contain all the items in

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Front -End Proc e ssing Func t iona l Ge nom ic s 273

Front-End Processing equals one-half of a full-time equivalent. (Calzonetti &


Computing the raw data and managing the pre-computed deChambeau, 2006)
aggregated data in either in 3D data cube or n-dimensional
F
table. (Tan, 2005b) Fully Interactive Video
Two-way interactive video. The interaction between two
FRP: See Fantasy Role-Playing. sites with audio and video. (Danenberg & Chen, 2005)

FSF: See Free Software Foundation. Fully Online Model of Course Redesign
This model shares many of the features of the other course
FTE: See Full-Time Equivalent. redesign models. For example, it shares the feature of
online interactive learning activities of the Replacement
FTP: See File Transfer Protocol. model, heavy reliance on computer-based learning
resources, and instructional stafing of the Emporium and
FTTH: See Fiber-to-the-Home. Supplemental models. The most distinctive feature is that
learners generally do not meet face to face on campus.
FTTx (Twigg, 2005)
Fiber to the cabinet (Cab), curb (C), building (B), or home
(H). (Chochliouros et al., 2005a) Function
A programming construct where code that does a particular
F2F: See Face-to-Face. task is segregated from the main body of a program; the
function may be sent arguments and may return arguments
Fulillment to the body of the program. (D. Brandon, Jr., 2005a)
The capability to deliver that which is transacted. (Samuel
& Samson, 2006) Functional Area
Companies that make products to sell have several
Full PI Model functional areas of operations. Each functional area
A PI model where every proper subset of variables is comprises a variety of business functions or business
marginally independent. Full PI models are the most basic activities. (Sundaram & Portougal, 2005a)
PI models. (Xiang, 2005)
Functional Dependence
Full REALLOCATE 1: For attribute sets C, D, we say that D depends functionally
A heuristic algorithm for computing a new data allocation, on C, in symbols CD, in case IND(C)IND(D). Also
given some number of servers and a system optimization non-exact (partial) functional dependencies to a degree
parameter. This heuristic is iterative, searching for stepwise are considered. (Pawlak et al., 2005) 2: Intuitively, one
solution reinement. This heuristic evaluates the effect of attribute is functionally dependent on a second attribute
independently moving each database relation to the new when you need to know the value of the second in order to
server joining the distributed database system. It then ind out the value of the irst. More precisely, each value
holds this relation at the new server and reiterates with of the second attribute has no more than one value of the
a reevaluation of moving an additional relation. (Chin, irst associated with it. (Schultz, 2005) 3: For any record
2005) r in a record type, its sequence of values of the attributes
in X is referred to as the X-value of r. Let R be a record
Full-Text Index type, and X and Y be sequences of attributes of R. We say
An index supporting retrieval of identiiers from documents that the functional dependency, XY of R, holds at time
containing a particular word. (Nrvg, 2005) t, if at time t, for any two R records r and s, the X-values
of r and s are identical, then the U-values of r and s are
Full-Time Equivalent (FTE) also identical. (Tan & Zhao, 2005a)
An accumulation of work time that adds up to a full-
time position. For example, two half-time positions Functional Genomics
equal one full-time equivalent; or 20 hours per week The study of gene functions on a genomic scale, especially
based on microarrays. (Fu, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
274 Func t iona l I llit e ra cy Fuzzy Dat a ba se M ode l

Functional Illiteracy development of new approaches to teaching and learning


A person can read such things as menus or environmental online. (S.M. Johnstone, 2005)
F print (signs, wrappers of food, labels, etc.), but cannot
read a sentence or make meaning out of text. (Trammell, Fundamental Analysis
2005) The use of company-reported inancial data to determine
an intrinsic (or fair value) for a security. Used to identify
Functional Information cases where companies are undervalued, with a view to
Information, based on engineering knowledge, that proiting from the future price movements. This style of
describes how components and subsystems of a tangible analysis is generally long term. (Vanstone & Tan, 2005)
product interact, and how these interactions give rise to
different product features and varying levels of product Funding Organization
performance. (McIntosh & Siau, 2005) Organization, either corporate or academic, that funds
an e-learning project to meet some need within the
Functional Margin organization. (Kapp, 2005)
Geometrically, the Euclidean distance of the closest point
from the decision boundary to the input space. (Awad & Fusion System
Khan, 2005) A system based on an architecture that associates diverse
sources of data, information, and knowledge. (Tauber &
Functional Model Schwartz, 2006)
A model concerned primarily with how to interact with a
system, how it is operated. (Maceield, 2006) Fuzzy Association Rule
An implication rule showing the conditions of co-
Functional Product occurrence of itemsets that are deined by fuzzy sets whose
A product having stable and predictable demand, a long elements have probabilistic values. (Shen & Horiguchi,
lifecycle, and well-developed competition that results in 2005)
a low proit margin. (Abraham & Leon, 2006)
Fuzzy Clustering
Functional Use Quality Cluster analysis where a data object can have membership
The quality of a product to deliver a beneicial value to degrees to different clusters. Usually it is assumed that the
the user. (Knight, 2006a) membership degrees of a data object to all clusters add up
to one, so a membership degree can also be interpreted
Functionality as the probability that the data object belongs to the
1: The external quality factor that refers to a set of functions corresponding cluster. (Klawonn & Rehm, 2005)
and speciied properties that satisfy stated or implied needs.
(Xenos, 2006) 2: The task that the parties wish to jointly Fuzzy Conceptual Data Model
compute. (Lindell, 2005) The extension of traditional conceptual data models, such
as ER/EER and UML fuzzy conceptual data models, which
Functionally or Culturally Diverse can model imperfect data and semantic relationships at a
The nature of global diversity and the ability to locate high level of data abstraction. (Ma, 2005b)
organizational functions across the globe creates a diverse
environment for the entire organization. Since members Fuzzy C-Means Algorithm
are all in different locations and charged with different A clustering algorithm that assigns a fuzzy membership
tasks, diversity exists that is only found in the very largest in various clusters to an object instead of assigning the
multi-national corporations. (J. Lee, 2005) object precisely to a cluster. (Lingras et al., 2005)

Fund for the Improvement of Post-Secondary Fuzzy Database Model


Education (FIPSE) A database model with the ability to store and handle
A granting group within the U.S. Department of Education. fuzzy data, mainly including the fuzzy relational database
In the last 10 years it has been instrumental in supporting the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fuzzy Dat a ba se M ode ling Fuzzy Tra nsfor m at ion 275

model, fuzzy nested relational database model, and fuzzy fuzzy logic is that many classes in the natural environment
object-oriented database model. (Ma, 2005b) are fuzzy rather than crisp. It deals with imprecise and
uncertain data. (Begg, 2005)
F
Fuzzy Database Modeling
In addition to the issues of fuzzy database models, fuzzy Fuzzy Membership
conceptual data models, and conceptual design of fuzzy Instead of specifying whether an object precisely belongs to
databases, fuzzy database modeling focuses on fuzzy a set, fuzzy membership speciies a degree of membership
database systems and discusses (fuzzy) query, (fuzzy) data between [0,1]. (Lingras et al., 2005)
handling, database theory (e.g., fuzzy data dependencies
and formalization in fuzzy relational databases), database Fuzzy Number
implementation, and so forth. (Ma, 2005b) Quantitative mathematical description of fuzzy
information concerning a one-dimensional numerical
Fuzzy Estimate quantity. (Viertl, 2005)
Generalized statistical estimation technique for the
situation of non-precise data. (Viertl, 2005) Fuzzy Relation
In fuzzy relations, degrees of association between objects
Fuzzy Histogram are represented not as crisp relations, but membership
A generalized histogram based on non-precise data whose grade in the same manner as degrees of set membership
heights are fuzzy numbers. (Viertl, 2005) are represented in a fuzzy set. (Kim, 2005)

Fuzzy Information Fuzzy Set


Information not given in the form of precise numbers, 1: A set that captures the different degrees of belongingness
precise vectors, or precisely deined terms. (Viertl, of different objects in the universe instead of a sharp
2005) demarcation between objects that belong to a set and
those that do not. (Bala et al., 2005) 2: The set in which
Fuzzy Logic elements are associated with membership degrees in (0,1)
1: A mathematical technique that classiies subjective to indicate how they belong to the set. Fuzzy-set theory
reasoning and assigns data to a particular group or was originated by L. A. Zadeh in 1965 and can be used
cluster, based on the degree of possibility the data has for imprecise information processing. (Ma, 2005b) 3: Let
of being in that group. (Lenard & Alam, 2005) 2: A U be a set of objects so called universe of discourse. A
procedure for analyzing approximate reasoning, which fuzzy set F in U is characterized by a function of inclusion
uses its imprecision and settles borderline cases with the m F taking values in the interval [0,1], i.e., F : U [0,1];
concept of precision. Human reasoning is imprecise, and where F(u) represents the degree in which uU belongs
the ability to make reasonable decisions in such a clear to fuzzy set F. (Nigro & Gonzlez Csaro, 2005c)
environment of uncertainty is a major aspect that depends
on the possibilities to obtain an approximate answer to Fuzzy Set Theory
some questions based on the acquired knowledge, which Replaces the two-valued set-membership function with a
is normally inexact and not always reliable. (Xodo & real-valued functionthat is, membership is treated as a
Nigro, 2005) 3: A type of logic that does not rely on a probability or as a degree of truthfulness. (Lazar, 2005)
binary yes or no. Instead, computer systems are able to
rank responses on a scale of 0.0 to 1.0, with 0.0 being false Fuzzy Statistics
to 1.0 being true. This allows computer systems to deal Statistical analysis methods for the situation of fuzzy
with probabilities rather than absolutes. (Athappilly & information. (Viertl, 2005)
Rea, 2005) 4: Fuzzy logic is applied to fuzzy sets where
membership in a fuzzy set is a probability, not necessarily 0 Fuzzy Transformation
or 1. (Xu et al., 2006a) 5: Fuzzy logic provides an approach The process of transforming an observation with missing
to approximate reasoning in which the rules of inference values into fuzzy patterns that are equivalent to the
are approximate rather than exact. Fuzzy logic is useful observation based on fuzzy set theory. (H. Wang & S.
in manipulating information that is incomplete, imprecise, Wang, 2005)
or unreliable. (Hou, Sheng, et al., 2005) 6: The concept of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
276 Fuzzy Va lue d Func t ion Fuzzy Ve c t or

Fuzzy Valued Function


Generalized real valued function whose value is a set of
F fuzzy numbers. (Viertl, 2005)

Fuzzy Vector
Mathematical description of non-precise vector quantities.
(Viertl, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
GA Gat he ring 277

G
GA: See Genetic Algorithm. Game Theory
Mathematical theory of rational behavior for situations
GA A P: See Generally Accepted Accounting involving conlicts of interest. (Heucke et al., 2005)
Principles.
Game User Interface
GADP: See General Additive Data Perturbation. Elements and devices through which the user interacts
with the game. (Ip & Jacobs, 2006)
Gait Analysis
Analysis of human walking patterns. It is used to analyze Game Using
abnormality in lower limb problems and assess treatment Stage in Gaming and Simulation. During the using stage,
or intervention outcomes. (Begg, 2005) game facilitators make preparations for playing the game,
and participants actually play the game (given a certain
Galaxy Structure scenario). (Achterbergh, 2005a)
Structure of a warehouse for which two different types of
facts share a same dimension. (Schneider, 2005) Gaming and Simulation
The process of building and using simulation games as a
Galois Lattice means to deal with complex problems. See also Simulation
Provides some meanings to analyze and represent data. Game. (Achterbergh, 2005a)
Refers to two-ordered set. An ordered set (I,#) is the set I,
together with a partial ordering # on I. (Nigro & Gonzlez Gantt Chart
Csaro, 2005c) A chart displaying schedule information in a graphical
form. It may display tasks, duration, start/inish dates for
Gambling activities and milestones, dependencies, and allocated
A leisure activity in which money is staked with the resources. (Asprey, 2005)
anticipation of making a gain and/or winning a prize.
(Brindley, 2006) Gap/Racial Gap
Inequality of access to media and technology based on
Game ethnicity. (Reilly, 2005)
A simulation in which people are part of the model and their
decisions partially determine the outcome. (Pendegraft, Gathering
2005) An event where participants share their knowledge with the
group on a particular topic. A gathering focuses exclusively
Game Building on occupational knowledge and encourages an evaluation of
Stage in Gaming and Simulation. During the building the legitimacy of other peoples contributions. A gathering
stage, game constructors make a model of the problem they is unlike a brainstorm, which discourages evaluation
want to incorporate into the game. Next, they transform and encourages wild and wacky ideas. Following a
the model into a speciic game, and inally they deine gathering, facilitated group discussion is conducted on
different scenarios that can be played during the game. the contributions shared. (Shaw, 2006)
(Achterbergh, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
278 Ga ze Ge ne ra l K now le dge

Gaze physiology by controlling the production of proteins. Each


An eye-tracking metric, usually the sum of all ixation individual has a unique sequence of genes, called genetic
G durations within a prescribed area. Also called dwell, code. (Galitsky, 2005a)
ixation cluster, or ixation cycle. (Poole & Ball, 2006)
Gene Expression
Gaze Tracking 1: Describes how the information of transcription and
The set of mechanisms allowing the recording and analysis translation encoded in a segment of DNA is converted
of human eye-gaze. Gaze tracking is normally motivated into proteins in a cell. (Fung & Ng, 2005) 2: Production
by the assumption that the locus of eye-gaze may, to some of mRNA from DNA (a process known as transcription)
extent, correspond to the locus of attention, or it can help and production of protein from mRNA (a process known
capture user interests. Several techniques exist for eye as translation). Microarrays are used to measure the
tracking varying in their level of intrusion (from requiring level of gene expression in a tissue or cell. (Fu, 2005) 3:
the user to wear special lenses to just having camera-like The proteins actually produced in a speciic cell by an
devices installed on the computer), their accuracy, and ease individual. (Liberati et al., 2005)
to use. Normally devices need to be calibrated before use
(some systems allow memorized calibrations for speciic Gene Expression Microarray
users). (Thomas & Roda, 2006a) One of a number of silicon chips that simultaneously
measure the expression levels of thousands of genes. (Yu
GCI: See Growth Competitiveness Index; Group & Liu, 2005)
Competitiveness Index.
Gene Expression Proile
GCSS: See Group Communication Support System. Through microarray chips, an image that describes to what
extent genes are expressed can be obtained. It usually uses
GDB: See Geographic Database. red to indicate the high expression level and uses green to
indicate the low expression level. This image is also called
GDP: See Gross Domestic Product. a gene expression proile. (Chu & Wang, 2005)

GDSS: See Group Decision Support System. Gene Microarray Data


Measurements of mRNA abundances derived from
GDT: See Geographically Dispersed Team. biochemical devices called microarrays. These are
essentially measures of gene activity. (Mukherjee,
Gender Divide 2005)
The term broadly used to indicate the difference
between males and females that have ready accessibility General Additive Data Perturbation (GADP)
to information and technology, and the skills to use A general form of Additive Data Perturbation techniques.
information and technology, and those males and females This method is based on the idea that the relationships
who do not have the same or similar level of accessibility between the conidential and non-conidential attributes
to information and technology, and the skills to use should be the same before and after perturbation of the
information and technology. (Arthur-Gray & Campbell, conidential attributes has occurred. Designed both to
2005) eliminate all forms of statistical bias found in other additive
methods and to provide for the highest level of security of
Gene all data perturbation techniques. (Wilson et al., 2006b)
1: A hereditary unit consisting of a sequence of DNA
that contains all the information necessary to produce General Knowledge
a molecule that performs some biological function. (Yu The contextual knowledge that goes across or is shared
& Liu, 2005) 2: The unit of heredity. A gene contains by particular individuals, groups, societies, times, and
hereditary information encoded in the form of DNA and locations. General knowledge can be tacit or explicit.
located at a speciic position on a chromosome in a cells (Medeni, 2006a)
nucleus. Genes determine many aspects of anatomy and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ge ne ra l (or M e ga ) Por t a l Ge ne ra lizat ion-Spe c ia lizat ion H ie ra rchy 279

General (or Mega) Portal of the source code to create new free programs. (Lowry
A portal that provides links to all sorts of different sites et al., 2005a) 2: Speciically links source code to legally
of the users choosing, often from a menu of options. protected freedom to publish, distribute, and make use of
G
(Tatnall, 2006) derived works. (Fleming, 2005b)

General Packet Radio Service (GPRS) General Purpose Methodology


1: A packet-linked technology that enables high-speed Methodology that attempts to be applicable across domains
wireless Internet and other data communications. and for different kinds of systems and purposes. (Solberg
GPRS provides more than four times greater speed than et al., 2005)
conventional GSM systems. Using a packet data service,
subscribers are always connected and always online, so General System Theory
services will be easy and quick to access. (Wong, 2006) Collection of tools, approaches, hypotheses, and models
2: A standard for wireless communications that operates that can be used for scientiic discovery. (Szczerbicki,
at speeds up to 115 kilobits per second. It is designed for 2005)
eficiently sending and receiving small packets of data.
Therefore, it is suited for wireless Internet connectivity and Generalist E-Fulillment (GO) Provider
such applications as e-mail and Web browsing. (Garrett, Third party e-fulillment providers may choose to offer a
2006a) 3: An evolution of GSM networks that supports large range of e-fulillment capabilities. These may be either
data services with higher bit rates than GSM. It uses the Physco or Knowco in nature, though a greater proportion
same air interface as GSM, but it supports IP signaling back of GO providers are tending to concentrate on Knowco
to the core network. (Louvros, Karaboulas, et al., 2005) capabilities. GOs appear likely to compete in more open
4: A wireless data protocol suited for data transmission, markets using innovation and cost-competition. Though
available to users of GSM mobile phones. Its theoretical these providers may have large customers, they are more
bandwidth is 170 kbit/s, while the realistic one is 30-70 likely to have a large range of customers. (Alexander &
kbit/s. Sometimes it is referred as 2.5G (i.e., a technology Burn, 2006)
between the second generations of mobile systems) like
GSM, and the third one (3G) like UMTS. (Costagliola, Di Generality
Martino, & Ferrucci, 2006) 5: A packet-based wireless A measure that quantiies the coverage of an explanation
communication service that promises data rates from 56 up in the whole data set. (Yao & Zhao, 2005)
to 114 Kbps, and continuous connection to the Internet for
mobile phone and computer users. The higher data rates will Generalization
allow users to take part in videoconferences, and interact 1: The goal of neural network training is to develop a model
with multimedia Web sites and similar applications using that generalizes its knowledge to unseen data. Overtraining
mobile handheld devices as well as notebook computers. must be avoided for generalization to occur. (Smith, 2005)
(Olla, 2005a) 6: Provides data rates up to 115 kbps for 2: When entities have similar basic attributes, they can be
wireless Internet and other types of data communications, classiied into a generalized entity type. Generalization is
using packet data services. (Akhtar, 2005) 7: A standard the process of inding commonalities between entities to be
for wireless communication that runs at speeds up to 115 able to abstract to a higher-level entity set. (Bagui, 2005)
kilobits per second, compared to current GSM (global 3: A cubegrade is a generalization if the set of descriptors
system for mobile communications) systems 9.6 kilobits. of the target cell are a subset of the set of attribute-value
GPRS supports a wide range of bandwidths, is an eficient pairs of the source cell. (Abdulghani, 2005b)
use of limited bandwidth, and is particularly suited for
sending and receiving small bursts of data, such as e- Generalization-Specialization Hierarchy
mail and Web browsing, as well as large volumes of data. A set of concepts organized by specialization and
(Roibs, 2006b) generalization relationships into an inverted tree-like
structure, such that concepts higher in the tree are broader
General Public License (GPL) and encompass the concepts lower in the tree. (Woods et
1: License designed so that people can freely (or for a al., 2006)
charge) distribute copies of free software, receive the
source code, change the source code, and use portions

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
280 Ge ne ra lize d Disjunc t ion-Fre e Pat t e r n Ge ne ric Top-Leve l Dom a in (gT LD)

Generalized Disjunction-Free Pattern Generation


Pattern the support of which is not determinable from the The basic unit of progress in genetic and evolutionary
G supports of its proper subsets. (Kryszkiewicz, 2005) computation, a step in which selection is applied over a
population. Usually, crossover and mutation are applied
Generalized Disjunctive Pattern once per generation, in strict order. (Hsu, 2005a)
Pattern the support of which is determinable from the
supports of its proper subsets. (Kryszkiewicz, 2005) Generation 1 Portfolio
A paper-based portfolio. (Wasko, 2005)
Generalized Division
A generalized version of the binary relational algebra Generation 2 Portfolio
division operation where the tuples of the left table are Refers to any form of electronic portfolio. eFolio Minnesota
grouped by an attribute and only those groups whose is a current example of a Generation 2 portfolio. (Wasko,
set of values for another speciied attribute satisies a 2005)
desired set comparison (e.g., equality) with a set of similar
values from the right table are passed to the output table. Generation 3 Portfolio
The generalized division operator can be expressed in A Generation 2 portfolio that includes tools to assist an
terms of the ive principal relational algebra operations. individual in developing his or her individual education
(Dadashzadeh, 2005) and/or career goals. (Wasko, 2005)

Generalized Icon Generative Knowledge Integration


One of a set of icons used to describe multimedia objects Occurs when communication and exchange of knowledge
such as images, sounds, texts, motions, and videos. It is a within a group or a team evokes novel associations,
dual object with a logical part and a physical part. (Chang connections, and hunches such that new meanings and
et al., 2005) insights are generated. (Newell, 2006)

Generalized Reciprocity Generative Strategy


Cooperative interchange of favors or obligations between Encourages learners to construct their own learning
individuals in a group, where return is not expected from experience by allowing them to develop their own structure
the same speciic individual given to, but rather from anyone for acquiring knowledge and skills. (Stavredes, 2005a)
in the group or the group as a whole. (Ridings, 2006b)
Generic Algorithm
Generally Accepted Accounting Principles An algorithm for optimizing a binary string based on an
(GAAP) evolutionary mechanism that uses replication, deletion,
A widely accepted set of rules, conventions, standards, and mutation operators carried out over many generations.
and procedures for reporting inancial information, as (An, 2005)
established by the Financial Accounting Standards Board.
(J. Wang et al., 2006a) Generic Model Management (gMMt)
An MMt environment/system applicable to a wide range
Generating-Pruning of MMt tasks across a wide range of meta-models. (Diskin
The method of inding frequent sequential patterns by & Kadish, 2005)
generating candidates sequences (from size 2 to the
maximal size) step by step. At each step a new generation Generic Top-Level Domain (gTLD)
of candidates having the same length is generated and TLD reserved regardless of the geographical position. At
tested over the databases. Only frequent sequences are present, there are the following gTLDs: .aero, .biz, .com,
kept (pruning) and used in the next step to create a new .coop, .info, .int, .museum, .name, .net, .org, and .pro.
generation of (longer) candidate sequences. (Masseglia Three peculiar gTLDs exist.edu, .mil, and .govthat
et al., 2005) are reserved to United States educational, military, and
governmental institutions or organizations. (Maggioni
& Uberti, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ge ne t ic Algorit hm (GA) Ge nom ic Dat a ba se 281

Genetic Algorithm (GA) solutions are then used to solve the problem. (Athappilly &
1: A class of algorithms commonly used for training neural Rea, 2005) 12: An evolutionary algorithm that generates
networks. The process is modeled after the methods by each individual from some encoded form known as a
G
which biological DNA are combined or mutated to breed chromosome or genome. Chromosomes are combined
new individuals. The crossover technique, whereby DNA or mutated to breed new individuals. Crossover, the
reproduces itself by joining portions of each parents kind of recombination of chromosomes found in sexual
DNA, is used to simulate a form of genetic-like breeding reproduction in nature, is often also used in GAs. Here,
of alternative solutions. Representing the biological an offsprings chromosome is created by joining segments
chromosomes found in DNA, genetic algorithms use chosen alternately from each of two parents chromosomes,
arrays of data, representing various model solutions. which are of ixed length. (Lazar, 2005)
Genetic algorithms are useful for multi-dimensional
optimization problems in which the chromosome can Genetic Operators, Crossover and Mutation
encode the values for connections found in the artiicial Crossover takes two selected chromosomes, the
neural network. (Kitchens, 2005) 2: A ield of algorithms parents, and cuts their gene (bit) strings at some randomly
inspired by the evolution of species and applying natural chosen position, producing two head and two tail
operators like selection, crossover, and mutation. (Kacem, substrings. The tail substrings are then switched, giving
2005) 3: A heuristic used to ind approximate solutions rise to two new individuals called offsprings, which
to dificult-to-solve problems through application of the each inherit some genes from each of the parents. The
principles of evolutionary biology to computer science. offsprings are then created through the exchange of genetic
(Guan, 2006f) 4: An optimization algorithm based on material. Mutation consists of a random modiication of
the mechanisms of Darwinian evolution, which uses the genes with a certain probability (normally a small one,
random mutation, crossover, and selection procedures e.g., 0.0001) called the mutation rate. (Zarri, 2006a)
to breed better models or solutions from an originally
random starting population or sample. (Hou, Sheng, et Genetic Programming
al., 2005) 5: A heuristic optimization algorithm based on 1: A stochastic search algorithm based on evolutionary
the concept of biological evolution. (Caramia & Felici, theory, with the aim to optimize structure or functional
2005) 6: A search and optimization technique that uses form. A tree structure is commonly used for representation
the concept of survival of genetic materials over various of solutions. (Fan & Pathak, 2005) 2: Search method
generations of populations much like the theory of natural inspired by natural selection. The basic idea is to evolve
evolution. (Bala et al., 2005) 7: An iterative procedure a population of programs candidates to the solution of
that consists of a constant-size population of individuals, a speciic problem. (Yeo, 2005)
each represented by a inite string of symbols, known
as the genome, encoding a possible solution in a given Genetic Tree
problem space. (Mart, 2005) 8: Class of algorithms A variety of dendrogram (diagram) in which organisms
used to ind approximate solutions to dificult-to-solve are shown arranged on branches that link them according
problems, inspired and named after biological processes to their relatedness and evolutionary descent. (Galitsky,
of inheritance, mutation, natural selection, and generic 2005a)
crossover. Genetic algorithms are a particular class of
evolutionary algorithms. (Polgar, 2005a) 9: Evolutionary Genome
algorithm using a population and based on the Darwinian 1: All the genetic information or hereditary material
principle, the survival of the ittest. (Jourdan et al., 2005) possessed by an organism. (Yu & Liu, 2005) 2: All the
10: Optimization technique inspired by the mechanisms genetic material in the chromosomes of a particular
of evolution by natural selection, in which the possible organism; its size is generally given as its total number of
solutions are represented as the chromosomes of individuals base pairs. (Galitsky, 2005a) 3: The genetic information
competing for survival in a population. (Galvo et al., 2005) of an organism. (Tsunoda et al., 2005)
11: A large collection of rules that represents all possible
solutions to a problem. Inspired by Darwins theory of Genomic Database
evolution, these rules are simultaneously applied to data An organized collection of data pertaining to the genetic
using powerful software on high-speed computers. The best material of an organism. (Segall, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
282 Ge nom ic M e dic ine Ge ogra phic I nfor m at ion Syst e m (GI S)

Genomic Medicine usually handled by standard relational DBMSs. Spatial


Integration of genomic and clinical data for medical attributes need additional power in order to design, store,
G decision. (Fu, 2005) and manipulate the spatial part of geographic entities.
(Faz, 2005)
Genotype
1: Anthony Dunnes alternative to the prototypea Geographic Database (GDB)
non-working yet complete product speciically aimed at A database integrated into the GIS, storing spatial and
provoking ictive, social, and aesthetic considerations in alphanumerical data. (Faz & Mahmoudi, 2005)
an audience. (Kettley, 2006a) 2: The exact genetic makeup
of an organism. (Tzanis et al., 2005) Geographic Information System (GIS)
1: A database of a region and software interfaces to view
Genuine Miss and manage the data. GIS implementation often begins
A usability problem that causes user dificulties that with a digitized map of an area derived from original parcel
remains undiscovered in usability inspection. (Woolrych maps or aerial photography. Multiple layers are created
& Hindmarch, 2006) for the map to include different infrastructure systems
such as roads, sewers, and telecommunications. (Horiuchi,
Geo-Field 2005a) 2: A marriage of accurately scaled digital maps with
An object class used to represent objects and phenomena a database. The digital maps comprise spatially referenced
that are continuously distributed over the space. Examples details such as natural elements (lakes, rivers, topographic
of phenomena that are represented using geo-ields are elevation contours, etc.), man-made objects (buildings,
temperature, rainfall, topography, and soil type. (Davis roads, pipelines, etc.), and political boundaries (city
et al., 2005) limits, state and county lines, international boundaries,
etc.). These natural elements are typically referenced,
Geo-Object with varying degrees of precision, to latitude/longitude
An object class that represents an individual, particular coordinates on the Earths surface. (Crossland, 2005) 3:
real-world geographic object. Such objects can usually be Tool for processing localized information. A GIS will
traced back to individually identiiable elements, such as model and locate the spatial data of a real phenomenon.
houses, lakes, and trees. (Davis et al., 2005) (Zelasco et al., 2005) 4: An organized collection of
computer hardware, software, data, and personnel designed
Geo-Reference to capture, store and update, manipulate, analyze, and
The relationship between page-coordinates on a planar map display geographically referenced information. (Rambaldi,
and known, real-world coordinates. (Rambaldi, 2005) 2005) 5: A spatial data management system that allows
the user to deal with (save, retrieve, extract, manipulate,
Geocoding and visualize) the information of physical entities. (Jeong
1: A function of the GIS through which the geographic et al., 2006) 6: Map-based tools used to gather, transform,
location of an address is given a set of geographic manipulate, analyze, and produce information related to
coordinates by reference to a standard geographically the surface of the Earth. (Pang, 2005a) 7: A computerized
referenced database. These coordinates are then used for database system used for the capture, conversion, storage,
mapping. (Garb & Wait, 2005b) 2: A generic term used to retrieval, analysis, and display of spatial objects. (Ferri
describe the GIS function of providing a speciic location & Rafanelli, 2005) 8: Computer system for acquiring,
to descriptive data. Geocoding applies to point data (e.g., storing, processing, analyzing, and displaying combined
alcohol outlet) as well as to area data (e.g., assaults in a spatial and non-spatial data for academic, societal, or
census tract). (Lipton et al., 2005) organizational purposes. (Hendricks, 2005) 9: Information
system storing geographical data along with alphanumeric
Geographic Data and spatial components. GIS systems also provide the
Characterized by the fact that they are constituted of two data structures and algorithms to represent and eficiently
kinds of attributes: descriptive or non-spatial attributes, query a collection of geographical data. (De Antonellis
and positioning or spatial attributes. Non-spatial data et al., 2005) 10: An information system that stores and
are not speciic of geographic applications, and they are manipulates data for geographical entities such as streets,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ge ogra phic Posit ion Syst e m (GPS) Ge ospat ia l Dat a 283

road junctions, railway, land-use, or even terrain. The data objects, each of them implemented by a layer. Often a
is associated with the location of the entities to allow fast geographical database includes raster, topological vector,
geo-referencing. (Leong, 2005a) 11: The geographic use image processing, and graphics production functionality.
G
of data to develop maps and statistical relationships that (Ferri & Rafanelli, 2005)
help describe processes like the relationship between
alcohol outlets and violence or vehicle crashes and alcohol Geographical Dispersion
outlets. (Lipton et al., 2005) 12: A set of tools that rely The combination of virtual organization with IT allows
on data management technologies to manage, process, groups of employees to make progress on one project
and present geospatial data, which in turn can vary with while working in tandem with another group in a distant
time. (Ganguly et al., 2005) 13: A system composed physical location. Because information can be shared and
of computer hardware, software, geographic data, and meetings can be held with the use of high-speed networks
personnel designed to capture, store, update, manipulate, and computers, tasks can be carried out in the location
analyze, and display all forms of geographically referenced that is most appropriate and germane to that function. (J.
information. (Gilbert, 2005a) 14: A system to provide tools Lee, 2005)
to provision and administer base map data such as built
structures (streets and buildings) and terrain (mountain, Geographically Dispersed Team (GDT)
rivers, etc.). (Fraunholz et al., 2005) 15: A computer system A group of people who work together across boundaries
that permits the user to examine and handle numerous of time, space, and organizations, usually supported by
layers of spatial data. The system is intended to solve network and communication technologies. Team members
problems and investigate relationships. The data symbolize generally have complementary skills, sharing an overall
real-world entities, including spatial and quantitative purpose and interdependent performance goals, along
attributes of these entities. (Sadoun, 2006) 16: A computer with an approach to work that the team adopts, by which
system capable of capturing, storing, analyzing, and members hold themselves mutually accountable. (Dara-
displaying geographically referenced information. (Faz Abrams, 2006)
& Mahmoudi, 2005) 17: An information system that
manages geographic datathat is, data for which the Geometric Hashing
geometric shape and spatial location are indispensable The technique identifying an object in the scene, together
parts, which must be considered while working with them. with its position and orientation. (Chan & Chang, 2005)
(Davis et al., 2005)
Geometric Texture
Geographic Position System (GPS) Geometric distortions and additions applied to the original
A satellite-based system with applications for determining geometric shapes (e.g., roughness, bristle, fur, etc.).
locations, navigating, and monitoring the movement of (Sourin, 2006)
people and objects, including provision of accurate times
and velocities. (Barima, 2006b) Geoprocessing
Operations in GIS for integrating, analyzing, computing,
Geographical Analysis Model and presenting geospatial data. (Karimi & Peachavanish,
A model to derive new spatial information by combining 2005)
existing spatial and attribute data sources as appear useful
for a given research goal (e.g., route selection, service area Georeferencing
deinition). (Hendricks, 2005) Identifying the geographic location of features and their
boundaries on the Earths surface, for example, derived
Geographical Database from GPS, remote sensing, mapping, and surveying
A database in which geographical information is store by technologies. (Hendricks, 2005)
x-y coordinates of single points, or points that identify
the boundaries of lines (or polylines, which sometimes Geospatial Data
represent the boundaries of polygons). Different attributes Data representing objects on or near the surface of the
characterize the objects stored in these databases. In Earth. (Karimi & Peachavanish, 2005)
general, the storing structure consists of classes of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
284 Ge ospat ia l I nfor m at ion Syst e m (GI S) Globa l Digit al Divide

Geospatial Information System (GIS) GIG: See Global Information Grid.


1: An information system capable of storing, managing,
G computing, and displaying geospatial data for solving Gigabit PON (GPON)
geospatial problems. (Karimi & Peachavanish, 2005) 2: Deined by the ITU-T G.984 series of recommendations;
A system that provides a common framework for jointly features a passive optical network for iber-to-the-home
visualizing the world. (Morris-Jones & Carter, 2005) service that is capable of providing at least 1 Gbps service
in the downstream direction. (Kelic, 2005)
Geospatial Problem
One of a number of problems involving geospatial data, GIS: See Geographic Information System; Geospatial
objects, and phenomena. (Karimi & Peachavanish, Information Systems; Global Information Society.
2005)
GIS Distance and Adjacency Function
Geostationary The distance between individual objects (e.g., bars and
Refers to geosynchronous satellite angle with zero crashes) and whether areas are adjacent to one another.
inclinationthat is, the satellite appears to hover over one (Lipton et al., 2005)
spot on the Earths equator. (Statica & Deek, 2006)
Gisting
Geovisualization Using computing technologies to provide a rough or
Data representation using more than one dimension imperfect but understandable translation of a text. (St.
to convey meaning, including animation and dynamic Amant, 2005e)
cartography, and spatialization (using geographic
metaphors to generate georeferenced displays of non- Global Baseline
spatial data such as text, image, or sound archives). The median value of pixel distribution along the vertical
(Hendricks, 2005) projection. (Chakravarty et al., 2005a)

Gesture Global Civil Society


Refers in our case to digital-pen gestures, which are Consists of the myriad groups and networks of action and
movements of the hands while writing onto digital screens knowledge that can, but do not necessarily, extend across
that are interpreted as system commands. (Mohamed & state borders. (Smith & Smythe, 2005)
Ottmann, 2006)
Global Culture
Gesture/Activity Recognition The new emerging layer of cultures, triggered by the
Dynamic body coniguration that involves spatiotemporal developments of the global economy. At this layer, partners
analysis. (Ozer et al., 2005) from different cultures and civilizations deliberately apply
the same patterns of behavior in order to achieve successful
Gesture Tracking communication in business (political, social, and so forth)
The set of mechanisms allowing one to record and analyze endeavors. (Targowski & Metwalli, 2005)
human motion. Gesture may be tracked either in 2D or 3D.
Gesture tracking ranges from the recording and analysis of Global Delivery Model
postures (e.g., head, body) to that of more detailed elements A model built to distribute and manage software
such as hand-ine movement or facial expression. The aims development across multiple global locations. GDM requires
of gesture tracking in HCI span from recognizing the users infrastructure, project management, cultural sensitivity,
current activity (or lack of), to recognizing emotional and process guidelines to support communication and
states. Gesture tracking is often used in combination with coordination between locations. (Hawk & Kaiser, 2005)
gaze tracking. (Thomas & Roda, 2006a)
Global Digital Divide
GIF The gap established due to unequal capacity among
Internet graphics image ile format. (Friedman, 2005) countries to access, adapt, and create knowledge via the
use of digital information and communication technologies.
(Trujillo, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Globa l Dist ribut ion Syst e m Globa l Posit ioning Syst e m (GPS) 285

Global Distribution System Global Information Grid (GIG)


A type of system used by airlines, travel agencies, and The Department of Defenses next-generation network
other intermediaries to manage product inventory, and and future infrastructure for advanced data, information,
G
to sell tourism products and packages. In the past, these and knowledge operations. Current GIG initiatives involve
have been dedicated-line electronic services, but virtually high-security systems. (Maule, 2006)
all of the major GDSs (Amadeus, SABRE, Galileo, etc.)
have migrated to online systems. (Carson, 2005) Global Information Society (GIS)
Refers to the linking of people using the Internet to share
Global Economy information for the beneit of all societies around the
Largely understood in terms of worldwide economic and globe. (Singh, 2005)
political convergence around liberal market principles
and the increasing real-time integration of business, Global Infrastructure
technological, and inancial systems. (Targowski & A sphere of concern; consists of the wireless access and
Metwalli, 2005) backbone networks, as well as servers and terminals that
are necessary for e-commerce in general and m-commerce
Global Electronic Commerce in particular at a certain moment. Global infrastructure
Commercial activities that take place over a computer is shaped by the organizational entities within the
network, usually the Internet and the Web, across national regulatory framework sphere, and controlled and operated
borders. (He, 2006) by companies and governments. Global infrastructure
consists of heterogeneous components (WLANs, 2G and
Global E-Market Segmentation 3G telecom network, wireline telecom networks, Internet,
Process leading to the identiication of homogeneous proprietary IP networks, and a great variety of wireless
consumer groups in global Internet markets. (Ortega Egea terminals) and evolves over time as new technologies are
& Menndez, 2006) adopted from the enabling technologies sphere, where they
are developed. (Veijalainen & Weske, 2005)
Global E-Marketing
Marketing efforts undertaken by companies outside their Global Outsourcing
domestic market. (Ortega Egea & Menndez, 2006) 1: The trend towards directing outsourcingcontracting
with other irms to perform non-critical functions for a
Global E-Marketing Mix businesstoward countries with low workforce costs.
Combination of elements (promotion, price, place, (Trauth, 2005a) 2: The sourcing of IT jobs to foreign
and product) used by online companies to market their countries and corporations (outsourcing) or employment of
products/services on a global scale. (Ortega Egea & foreign nationals in foreign countries by U.S. corporations
Menndez, 2006) (insourcing). (Mendonca, 2005)

Global Feature Global Popularity


One of a set of features extracted using the complete Depends on the number of requests to the object. (Kacimi
signature image or signal as a single entity. (Chakravarty et al., 2005)
et al., 2005b)
Global Positioning Satellite (GPS)
Global Frequent Itemset A format of presenting geospatial data for tracking
A set of words that occur together in some minimum purposes used often in location-based services. (Morris-
fraction of the whole document set. (Fung et al., 2005) Jones & Carter, 2005)

Global (General) Knowledge Interaction Global Positioning System (GPS)


Knowledge interaction that occurs among entities that are 1: A satellite-based system used for determining
relatively at the same global level, such as the development geographical positions, with a precision of 10 meters. It
and use of international standards among nations and uses a constellation of 24 satellites and is controlled by the
institutions. (Medeni, 2006a) U.S. Department of Defense. (Costagliola et al., 2006) 2:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
286 Globa l Sche m a Globa l Syst e m for M obile Com m unic ati on (GSM )

A system of determining the absolute location of features portable GPS receiver very accurately. (Strauss, 2005) 11:
by calculating x, y, z coordinates of ground locations from An MEO (medium earth orbit) public satellite navigation
G the signal of satellites orbiting the Earth. (Hendricks, system consisting of 24 satellites used for determining
2005) 3: The worldwide satellite-based radio navigation ones precise location and providing a highly accurate time
system. The systems satellites transmit messages that a reference almost anywhere on Earth. (Dhar, 2005)
receiver uses to determine its own geographical position.
(Giaglis, 2005) 4: Provides real-time, satellite-derived Global Schema
location information based on information received by an Schema obtained after integrating local schemas. (Passi
appropriate GPS receiver. GPS is funded by and controlled et al., 2005)
by the U.S. Department of Defense. While there are many
thousands of civil users of GPS worldwide, the system Global Semantics of Referential Actions
was designed for and is operated by the U.S. military. A The whole effect interacting referential actions lead to
GPS may be employed in the original construction of the under update operations on the database state. (Rivero,
digital map information to be stored in a GIS. Or, if the 2005)
GIS is already constructed, the GPS may be employed to
accurately render the position of new elements to be added Global Serializability
to the GIS or the current position of a mobile element to be The correctness criterion for concurrent execution of
referenced against the information stored in the GIS. A good global transactions over many database systems. It is a
example might be a freight truck moving on a highway. The stronger correctness criterion than serializability. (Leong,
GPS receiver on the truck can derive its current latitude 2005b)
and longitude, and then send that information to the GIS
system in the truck cab, to a GIS in a central control center Global Software Team
via radio, or to both for subsequent reporting and analysis. Software teams located in different countries collaborate
(Crossland, 2005) 5: Worldwide radio-navigation system as a single team for a clear objective project. (Lui & Chan,
formed from a constellation of 24 satellites and their ground 2005)
stations that provide reference points to calculate positions
accurate to a matter of meters, and with advanced forms, to Global System for Mobile Communication
less than a centimeter. GPS receivers are so miniaturized (GSM)
that they are becoming accessible to virtually everyone. 1: The second generation of mobile technology in Europe.
Used in cars, boats, aircraft, construction equipment, farm (Hackbarth et al., 2005) 2: A digital cellular telephone
machinery, and even laptop computers, they are predicted system introduced in 1991 that is the major system in Europe
to become almost as basic as the telephone. (Latchem & and Asia, and is increasing in its use in North America. GSM
Maru, 2005) 6: Satellite technology that locates people and uses Time Division Multiple Access (TDMA) technology,
objects on earth with high accuracy. (Szewczak, 2006) 7: A which allows up to eight simultaneous calls on the same
self-positioning, wave-based positioning system consisting radio frequency. (Garrett, 2006a) 3: A world standard
of 24 satellites revolving around the Earth in six orbits, for digital cellular communications using narrowband
which send continuous radio signals using triangulation TDMA. It is the standard most commonly used in Europe
to determine an exact location. (Fraunholz et al., 2005) 8: and Asia, but not in the United States. (Lei et al., 2005a)
A system developed by the U.S. Department of Defense 4: Industry standard for second-generation digital cellular
to allow the military to accurately determine its precise communications networks, soon to be superseded by Third
location anywhere in the world. GPS uses a collection of Generation (3G) networks. (Gilbert, 2005b) 5: A mobile
24 satellites positioned in orbit to allow a person who has network that provides all services of ixed telephony to
the proper equipment to automatically have their position wireless subscribers. (Louvros, Karaboulas, et al., 2005)
triangulated to determine their location. (Kontolemakis et 6: Industry standard for 2G digital cellular networks.
al., 2005) 9: Utilizes a wide-reaching radio broadcasting (Gilbert, 2005c) 7: For mobile telecommunications, a digital
system, originally produced to aid navigation, consisting cellular communication network standard. (Fraunholz
of a group of 24 satellites plus terrestrial receiving devices. et al., 2005) 8: A digital mobile telephone system that is
(Friedman, 2005) 10: A satellite-based, publicly available widely used in Europe and other parts of the world. GSM
navigation system that can determine the position of a small uses a variation of TDMA and is the most widely used of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Globa l Te st Glossing 287

the three digital wireless telephone technologies (TDMA, Globalization


GSM, and CDMA). GSM digitizes and compresses data, 1: The bypassing of traditional geographic borders using
then sends it down a channel with two other streams of information technology to enable global orientation of
G
user data, each in its own time slot. It operates at either the business and remote curriculum delivery. (Russell, 2005a)
900-MHz or 1,800-MHz frequency band. (Olla, 2005a) 2: Commonly refers to the process whereby the capitalist
9: The dominant digital mobile phone standard that uses economy becomes increasingly integrated and organized
SIM cards that subscribers place inside their phones. It on a global scale. (Smith & Smythe, 2005) 3: International
supports data transmission as well as voice. (D. Stern, exchange or sharing of labor force, production, ideas,
2005) 10: In 1982, the European Conference of Postal knowledge, cultures, products, and services across national
and Telecommunications Administrations founded a borders. (He, 2006) 4: The marketing and selling of a
consortium for the coordination and standardization of product outside a companys home country. (D. Brandon,
a future pan-European telephone network called Group Jr., 2005b) 5: The process of planning and implementing
Spcial Mobile that was later renamed Global System products and services so that they can be adapted to
for Mobile Communications. (Kaspar & Hagenhoff, different local languages and cultures. (OHagan, 2005) 6:
2005) 11: A worldwide standard for digital wireless The trend towards thinking and acting globally, with multi-
mobile phone systems. The standard was originated by the national corporations, partners, and competitors across the
European Conference of Postal and Telecommunications globe. (Marshall & Gregor, 2005) 7: This term was irst
Administrations, who was responsible for the creation of applied to the world economy, which under conditions
ETSI. Currently, ETSI is responsible for the development of global information and communication network can
of the GSM standard. (Akhtar, 2005) basically operate as a uniied system in the real-time mode.
(Azarov, 2005) 8: Business issues associated with taking
Global Test a product global. It involves both internationalization and
Veriies that an update operation violates an integrity localization. (T.S. Chan, 2005)
constraint by accessing data at remote sites. (Ibrahim,
2005) Globalized Education
Educational programs in which both students and educators
Global Village may be globally distributed. (Grasso & Leng, 2005)
As computers all over the world become interconnected via
the Internet, and the frequency of communication in and Glocal
between organizations, countries, cultures, societies, and A portmanteau expression created from the combination of
so forth has increased accordingly via these networks, we the expressions global and local to denote something
can now on a daily basis and quite easily maintain contact that is simultaneously global and local. (Taylor et al.,
with anybody independent of time and space; that is, we 2005)
are able to interact anytime, anywhere. (Wiberg, 2005)
Glocal Knowledge Interaction
Global Virtual Team Knowledge interaction from the global knowledge level
A group that: (1) is identiied by its organization(s) to that of local knowledge; for instance, tailoring the
and members as a team; (2) is responsible for making product of a multi-national company, or the development
and/or implementing decisions important to the project of an international aid organization, with respect
organizations global strategy; (3) uses technology- to the unique characteristics of a region or community.
supported communication substantially more than face-to- (Medeni, 2006a)
face communication; and (iv) works and lives in different
countries. (Wei & Wang, 2006) Glocalization
Creation of products or services intended for the global
Global-As-View market, but customized to suit the local culture. (He,
The situation in which the global schema is deined directly 2006)
in terms of the source schemas. GAV systems typically
arise in the context where the source schemas are given, Glossing
and the global schema is to be derived from the local The telling or retelling of a story in a way that emphasizes
schemas. (Balsters, 2005) or excludes particular points of view. (Connell, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
288 Glyc e m ic Cont rol Goa ls-Ba se d Eva luat ion

Glycemic Control realization, such as a requirement to contemplate


Tells how well controlled are the sugars of a diabetic patient. collaboration. (Tobar et al., 2006)
G Usually measured by HgbA1c. (Breault, 2005)
Goal Orientation
gMMt: See Generic Model Management. The degree of orientation towards a deined target; low goal
orientation means the common intention of a community
GNU or network is diffuse. (Meller-Prothmann, 2006a)
A recursive acronym for GNUs Not Unix. The GNU
Project was launched in 1984 to develop a free Unix-like Goal Setting
operating system. (Lowry, Grover, et al., 2005) 1: Ability to articulate steps within a strategy and to
accomplish them. (Crichton, 2005) 2: Deining goals, be
GNU General Public License they benign or corrupt; political processes are invoked.
1: The irst and still the most radical open source software The goals themselves can be constructive or destructive,
license, created for the GNU Project. Requires that all formally or informally arrived at, at the level of the
derivative works be equally free (in the open source organization or the individual, public or private. (Land,
sense); that is, all derivative works must provide the full Amjad, et al., 2006)
source code and must permit free use, modiication,
and redistribution. (Carillo & Okoli, 2006) 2: The irst Goal-Directed Behavior
and still the most radical open source software license, The concept that individuals are motivated to expend time
created for the GNU Project. Requires that all derivative and energy to achieve some desired objective (the goal).
works be equally free (in the open source sense); that is, A signiicant amount of online consumer behavior is goal
all derivative works must provide the full source code and directed. (Porter, 2006)
must permit free use, modiication, and redistribution.
(Okoli & Carillo, 2006) Goal-Oriented Representation
An application designed to solve rather than simply describe
GNU Project a problem or process. (OLooney, 2006)
1: Stands for Gnus Not Unix. Established by Richard
Stallman in 1983 under the auspices of the Free Software Goal-Setting Theory
Foundation. Its goal was, and still is, to create an open This theory, developed by Locke and Latham, states that
source Unix-based operating system. This goal was realized individuals make calculated decisions about their desired
in 1991 by Linus Torvalds creation of Linux. (Carillo & goals, and that these goals and intentions, once established,
Okoli, 2006) 2: Project launched by Richard Stallman with direct and motivate efforts to attain them. (Hendriks &
the goal of creating a complete free operating system: the Sousa, 2006)
GNU system. GNU is a recursive acronym for GNUs
Not Unix. (Curti, 2005) Goals of Scientiic Research
The purposes of science are to describe and predict, to
Go-Live improve or to manipulate the world around us, and to
The actual operation of an information system. (Sarkis explain our world. One goal of scientiic research is to
& Sundarraj, 2005) discover new and useful knowledge for the purpose of
science. As a speciic research ield, data mining shares
Goal this common goal, and may be considered as a research
1: A high-level representation of the purpose of a multi- support system. (Yao & Zhao, 2005)
agent system. (Sterling, 2006) 2: A speciication of the
desired changes a work system attempts to achieve in an Goals-Based Evaluation
application domain. (Diaper, 2006) A type of evaluation used to determine the extent to which
programs are achieving their overall, predetermined
Goal Condition objectives. (Nelson, 2005)
A condition underlying application descriptions and related
to external concepts to be considered by an application

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
GOM S Gove r nm e nt -t o-Cit ize n (G2 C) 289

GOMS Governance Archetype


A set of techniques for modeling human task performance. Archetypes typically involve various stakeholder
It stands for Goals, Operators, Methods, and Selection constituencies and their decision rights within the purview
G
rules. GOMS has become an important model for of IT governance. (Saha, 2006a)
human-computer interaction studies. (Chen, Sockel, et
al., 2005) Governance Decision
Represents the most crucial domain of IT decisions that are
Good Governance key to good IT governance, and includes IT principles, IT
The exercise of the governance authority with the architecture, IT infrastructure, business application needs,
participation, interest, and livelihood of the governed as the and IT investment management. (Saha, 2006a)
driving force (UNDESA/DPADM). (Misuraca, 2005)
Governance Mechanism
Good Practice The set of approaches adopted by organizations to
Institutional practice or design of a project, geared towards implement and institutionalize governance structures and
solving a problem, achieving a goal, improving the process, practices. (Saha, 2006a)
better rendering a service, or upgrading productivity,
quality, or organizational effectiveness. (Falivene & Government
Kaufman, 2006) The art of managing relationships between citizens
to ensure their welfare and in general their personal,
Goodwill economic, and social development. (Crdoba, 2006b)
The amount of repeat business resulting from happy and
loyal customers. (Forgionne & Ingsriswang, 2005) Government-Led E-Democracy
Top-down change process. Governments create points of
Google AdWords electronic interface in order to consult or capture opinion
A plain, text-based advertisement displayed prominently from citizens. This is most often a change processa
on Google.com. For a fee, advertisers sponsor search new way of recreating existing communication and
words/terms entered by users of the Google.com search consultation models, for example, consultation on policy
engine. The sponsored search words are predicted by the issues or planning processes and clinics with politicians.
sponsor to relate to a product or service offered. (Duthler, (Williamson, 2005)
2005)
Government-Private Sector Partnership
Governance The teaming of different entities in the government and
1: A multi-faceted compound situation of institutions, the private sector to realize a change and a transformation
systems, structures, processes, procedures, practices, in the development of information technology at large
relationships, and leadership behavior in the exercise of and, more speciically, in the software industry. (Kamel,
social, political, economic, and managerial/administrative 2005a)
authority in the running of public or private affairs
(UNDESA/DPADM). 2: A process that is a framework of Government-to-Business (G2B)
authority to ensure the delivery of anticipated or predicted Refers to government contracts and other services available
beneits of a service or process. The operationalization of online for businesses to bid for. (Hin & Subramaniam,
the particular organizational strategy is therefore executed 2006)
in an authorized and regulated manner. Governance acts
to manage risk, evaluate and review strategic goals and Government-to-Citizen (G2C)
objectives, and exercise iscal accountability to ensure 1: Different citizen-centric services provided by the
the return on investment of those strategies. (Zyngier, government for the beneits of the citizen. These include
2006) providing birth and death certiicates, records of rights
of land, information on government Schemes, and so
on. (Borbora & Dutta, 2005) 2: Refers to the various

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
290 Gove r nm e nt -t o-Gove r nm e nt (G2 G) Gra nulat ion a nd Pa r ti t ion

government services that citizens need access to. (Hin & concept associated with the relative degree of complexity of
Subramaniam, 2006) 3: Governments offering services a component part to its aggregate, subsuming structure. Fine
G to citizens online. (Toland, 2006) silt is more granular than sand, which is more granular than
rock, and so forth. In taxonomic development, the smaller
Government-to-Government (G2G) the relative size to the taxons (units) of classiication, the
1: Online interactions between different government higher the degree of granularity. In instructional design,
agencies. (Toland, 2006) 2: The digital-enabled the concept of granularity is multi-faceted and can refer
collaboration and cooperation perspective among distinct to the size of learning units or scope (e.g., degree or
government agencies. (Joia, 2006) certiicate curricula, courses, lessons, modules, activities);
learning element prioritization or sequencing (e.g., logical
Government-to-Partners (G2P) order of lessons, concept formation, and skill acquisition
The type of relationship that exists in associative or network to optimize scaffolding in new knowledge construction);
governance models between government and partners or content domains architecture (e.g., superordinate concepts,
stakeholders, and vice versa. (Kaufman, 2005) subordinate concepts, rules, principles); teaching strategy
(e.g., individual vs. group learning, passive learner/
Governmental Agency expository vs. active leaner/discovery, inductive vs.
A branch, division, or department of a local, regional, or deductive, tutorial vs. simulation, abstract vs. problem
national government that carries out one or more duties or oriented, synchronous online chat vs. asynchronous
activities in support of the public good. Such duties often threaded discussions, etc.); media design and utilization
involve regulating aspects of commerce, public health, (e.g., relative size and complexity of single components or
safety, and so forth. (Baim, 2006a) combined components; type of media element including
text, graphics/visuals, audio, animation, degree of user
GPL: See General Public License. control, etc.); and learner assessment (e.g., conventional
declarative-convergent testing using multiple-choice,
GPON: See Gigabit PON. matching, and short-answer questions vs. holistic,
constructivist-divergent portfolios with demonstration
GPRS: See General Packet Radio Service. work-product artifacts from individual and group projects,
internships, and service learning). (Lasnik, 2005) 3: Refers
GPS: See Geographic Position System; Global Positioning to the size of a shareable learning object. The smaller the
System; Global Positioning Satellite. learning object, the greater the granularity it has. Smaller
learning objects have a greater opportunity for reusability.
Grammars (Stavredes, 2005b) 4: The level of detail of the facts stored
A set of formal rules that deine how to perform inference in a data warehouse, or a concept in the database. (Nigro
over a dictionary of terms. (Caelli, 2005) & Gonzlez Csaro, 2005b)

Grant, Tied Grant Granularity of Time


A grant is generally a sum of money that is either paid in A concept that denotes precision in a temporal database.
full or installments over the life of a particular project, An example of progressive time granularity includes a
while a tied grant stipulates particular conditions. (De day, an hour, a second, or a nanosecond. (Raisinghani &
Weaver, 2005) Klassen, 2005)

Granular Data Granulation and Partition


Data representing the lowest level of detail that resides in Partition is a decomposition of a set into a collection of
the data warehouse. (Peter & Greenidge, 2005b) mutually disjoint subsets. Granulation is deined similarly,
but allows the subsets to be generalized subsets, such
Granularity as fuzzy sets, and permits the overlapping. (T.Y. Lin,
1: The level of detail or complexity at which an information 2005)
resource is described. (Lin et al., 2005) 2: A hierarchical

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Gra ph Gravit y M ode l 291

Graph and understandable graph-theoretic patterns in a graph


1: A graph consists of vertices and edges. Each edge is representation of data. (Holder & Cook, 2005)
connected to a source node and a target node. Vertices and
G
edges can be labeled with numbers and symbols. (Fischer, Graphical Content
2005) 2: A set of vertices (nodes) connected in various ways Information represented by an image, perceived via the
by edges. (Caelli, 2005) 3: In mathematics, a set of vertices human visual system. (Rosenbaum et al., 2006)
or nodes connected by links or edges. A pair of vertices
that are connected by multiple edges yield a multi-graph; Graphical Curiosity
vertices that are connected to themselves via looping edge Curious to see visually complex or multimedia effects.
yield a pseudo-graph. (Banerjee et al., 2005) (Wishart, 2005)

Graph Encoding Graphical Model


A method to assign the nodes of a directed graph a number A family of probability distributions incorporating the
or a bit string, which relects some properties of that graph conditional independence assumptions represented by
and can be used to facilitate computation. (Chen, 2005a) a graph. It is speciied via a graph that depicts the local
relations among the variables (that are represented with
Graph Grammar nodes). (Giudici & Cerchiello, 2005)
Grammar describing the construction of a set of graphs,
where terminals and non-terminals represent vertices, Graphical Process Modeling Technique
edges, or entire subgraphs. (Holder & Cook, 2005) A technique for representing models of processes with a
graphical notation. (Rodrguez-Elias et al., 2006)
Graph Invariants
Quantities to characterize the topological structure of a Graphical User Interface (GUI)
graph. If two graphs are topologically identical, they have 1: A software interface based on the computers graphics
identical graph invariants. (Li, 2005) capabilities with pointing devices such as the mouse that
frees the user from learning complex commands for using
Graph Production programs. (Rashid, 2005) 2: A software interface that
Similar to productions in general Chomsky grammars, a relies on icons, bars, buttons, boxes, and other images to
graph production consists of a left-hand side and a right- initiate computer-based tasks for users. (Mathieu & Levary,
hand side. The left-hand side is embedded in a host graph. 2005) 3: A standardized way of presenting information and
Then it is removed and, in the resulting hole, the right- opportunities for interaction on the computer screen using
hand side of the graph production is inserted. To specify the graphical capabilities of modern computers. GUIs use
how this right-hand side is attached into this hole, how windows, icons, standard menu formats, and so forth, and
edges are connected to the new nodes, some additional most are used with a mouse as well as a keyboard. (Henley
information is necessary. Different approaches exist of & Noyes, 2006) 4: Speciically involves pull-down menus
how to handle this problem. (Fischer, 2005) for keyboard and mouse inputs. (Mohamed & Ottmann,
2006) 5: Most of the modern operating systems provide
Graph Rewriting a GUI, which enables a user to use a pointing device,
The application of a graph production to a graph is also such as a computer mouse, to provide the computer with
called graph rewriting. (Fischer, 2005) information about the users intentions. (Sarkar, 2005)

Graph Spectra Grassroots ICT Intermediary


The plot of the eigenvalues of the graph adjacency matrix. Person serving a community by adding human skills and
(Caelli, 2005) knowledge to the presence of ICT, often operating in a
telecenter. (Cecchini, 2005)
Graph-Based Data Mining
1: A method of data mining used to ind novel, useful, Gravity Model
and understandable patterns in graph representations A model that measures the interaction between social/
of data. (Banerjee et al., 2005) 2: Finding novel, useful, economic objects, similar to the gravity model in physics.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
292 Gra y M a rke t ing Group De c ision Suppor t Syst e m (GDSS)

In the model, the intensity of interaction (e.g., trips, purchases of goods and services. (Dholakia & Kshetri,
migration, or communication) is positively related to the 2005)
G sizes of objects (e.g., population), but inversely related
to the distance or travel time between them. (Wang & Grounded Theory
Lou, 2005) 1: A method used to systematically derive theories of
human behavior from empirical data. (Trauth, 2005b) 2:
Gray Marketing A qualitative research methodology. (Molinari, 2005) 3:
Occurs when products are sold through non-authorized A mutual understanding about problems and tasks for
channels of distribution. (Rosson, 2006) groups of learners. (Berg, 2005f)

Grayscale Image Group


Shades of gray or continuous-tone of gray representing A number of individuals who interact for purposes of
an image. (Chen, Chen, Ma, et al., 2005) addressing some shared purpose or task. This differentiates
human collectives from random clusters of people who
Greedy Algorithm happen to be co-located, or who have no purpose that
An algorithm that always takes the best immediate, requires interaction. (Cargill, 2006b)
or local, solution while inding an answer. Greedy
algorithms ind the overall, or globally, optimal solution Group Authoring and Design Tool
for some optimization problems, but may ind less-than- One of a set of collaboration tools used by work groups
optimal solutions for some instances of other problems. to jointly create or edit common documents interactively,
(Chakraborty et al., 2005) including design documents. The display is updated on
each participants computer as changes are made jointly
Greenstone and can be saved by each participant for future reference.
Widely used open source software for digital libraries (Wild, 2005)
developed in New Zealand. (McCarthy, 2005b)
Group Communication Support System (GCSS)
Grey Market Informatics An environment created to support the communication
Processes in which differences in national privacy laws are process and reduce communication barriers. (Signoret,
used to compile and distribute personal data on individuals. 2006)
(St.Amant, 2006b)
Group Decision
Grid Computing A decision adopted by a group of people with complete
1: A distributed computing setting which has the tendency interaction under majority or consensus conditions.
to allow users to communicate and share resources without (Xodo, 2005)
much worry about its origin. (Sowe et al., 2005) 2: A form
of distributed computing that involves coordinating and Group Dynamics
sharing computing, application, data, storage, or network Field of inquiry dedicated to advancing knowledge about
resources across dynamic and geographically dispersed the nature of groups. (Verburg et al., 2005)
organizations. (Yen, 2005) 3: Grid (network) of computing
resources designed to provide computing and storage to Group Decision Support System (GDSS)
applications in a scalable and reliable manner, ensuring 1: A collection of hardware and software used to support
high levels of utilization. (Feuerlicht & Vorisek, 2006) 4: decision makers. (Banks, 2005) 2: An interactive
Linking computers from different locations to a computer computer-based system that facilitates solutions to
network, which allows users to share applications, computer unstructured problems by decision makers working as
power, data, and other resources. (Luppicini, 2006) a group. Among other features, the software package
includes idea organizers, electronic brainstorming tools,
Gross Domestic Product (GDP) questionnaire tools, and group dictionaries. (Ruhi, 2006)
The sum of the total value of consumption expenditure, 3: An interactive, computer-based system that aids a set of
total value of investment expenditure, and government decision makers working together as a group in solving ill-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Group Ex plore r Groupw a re 293

structured problems. It enables decision makers to analyze computer-based information systems that support and
problem situations and perform group decision-making structure group interaction and facilitate group meetings.
tasks. (Karacapilidis, 2005) 4: Information systems that (Klein, 2005) 6: A system providing computer-based
G
support the work of groups (communication, decision support for group communication, decision making, and
making) generally working on unstructured or semi- work activities of co-located (same time, same place)
structured problems. (Duan & Xu, 2005) 5: A collective of or dispersed (same time, different place; or different
computer-based technologies that are speciically designed time, different place) members of a group. (Chen & Lou,
to support the activities and processes related to multi- 2005)
participant decision making. (Xodo, 2005)
Group Technology (GP)
Group Explorer The concept of grouping parts, resources, or data according
Software used in a group which (in part) enables each to similar characteristics. (Mathieu & Levary, 2005)
participant to directly insert his/her knowledge (in the form
of contributions and causal links) into a group map. Group Groupware
Explorer works with Decision Explorer, which displays 1: A generic term for specialized computer aids designed
the group map on the public screen. (Shaw, 2006) for the user of collaborative work groups. Typically, these
groups are small project-oriented teams that have important
Group Formation tasks and tight deadlines. Groupware can involve software,
The process of creating a suitable group of learners to hardware, services, and/or group process support. (Daassi
increase the learning eficiency for both the individual et al., 2006) 2: Class of technologies that allow groups
peers and the group as a whole. (Devedi, 2006) to communicate and coordinate activities. Typically
network-driven software. (Green et al., 2005) 3: Computer
Group Map software allowing groups, teams, and people in different
A structured representation of the contributions of a range locations to work together and share information. (Mitchell,
of people. The contributions are structured with links 2005b) 4: ICT applications that support communication,
that are agreed by the group members during intensive, coordination, cooperation, learning, and/or social
facilitated discussion of the issues that follow a gathering. encounters through facilities such as information exchange,
(Shaw, 2006) shared repositories, discussion forums, and messaging.
(Verburg et al., 2005) 5: Multi-user software for carrying
Group Potency out communication and collaborative activities. (Neale
A collective belief in the capability of the group to meet et al., 2005) 6: Software applications that help people
a task objective. (Wong & Staples, 2005) work together virtually while being physically located
at a distance from one another. Groupware applications
Group Query and services include the sharing of work schedules, event
It is representative of a group, and the result of grouped calendars, electronic meetings, shared databases, and
queries is computed from the group query. (Khan, group e-mail accounts. (Ruhi, 2006) 7: Software that
2005) supports teams of individuals working together via network
technology, facilitating communication, coordination,
Group Support System (GSS) and collaboration among team members. (Dara-Abrams,
1: An integrated computer-based system composed of a 2006) 8: Software that supports the collaborative efforts
communication subsystem and model-driven DMSS (DSS), of a team to communicate, cooperate, coordinate, solve
to support problem formulation and potential solution of problems, compete, or negotiate. Groupware technologies
unstructured decision problems in a group meeting. are typically categorized along two primary dimensions:
(Forgionne et al., 2005) 2: A set of technologies used to time (synchronous or asynchronous) and place (collocated
help groups in their decision-making processes. (Blanger, or face to face, or non-collocated or distant). (Wild, 2005)
2005) 3: A wide variety of technologies conigured to 9: Speciic software which allows groups of people to
support group interactions. GSS typically features software share information and to coordinate their activities over
and hardware arrangements that facilitate. (Alavi et al., a computer network. (Metaxiotis, 2006) 10: The multi-
2005) 4: Any combination of hardware and software that user software supporting CSCW. Sometimes this term
enhances group work. (Limayem, 2005) 5: Interactive is broadened to incorporate the styles and practices that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
294 Groupw a re Applic at ion Guild

are essential for any collaborative activity to succeed, GSM: See Global System for Mobile Communication.
whether or not it is supported by computer. (Karacapilidis,
G 2005) 11: The software and technological part of CSCW. GSS: See Group Support System.
It contains application studies and platforms adapted to
groups and supporting group working. (Villemur & Drira, GSS Anonymity
2006 CSCW) 12: This software can be used by a group A key feature usually available in most group support
of people who are working on the same information at systems that allows group members to interact with each
separate workstations. It includes features such as e-mail, other while remaining unidentiied to each other. GSS
shared calendar, task list, and address book, and is used for anonymity masks status and gender cues, and reduces
project management, brainstorming, and action planning. inhibitions. (Klein, 2005)
(Nightingale, 2005) 13: Type of software designed to help
teams that are geographically dispersed who need to work gTLD: See Generic Top-Level Domain.
together. (de Carvalho & Ferreira, 2006)
G2B: See Government-to-Business.
Groupware Application
A class of computer technologies designed to support G2C: See Government-to-Citizen.
communication, collaboration, and cooperation among a
group of knowledge workers. (Chen & Lou, 2005) G2G: See Government-to-Government.

Groupz G2P: See Government-to-Partners.


Online groups. z indicates the easiness of language use
in online communication. (Lambropoulos, 2006b) GUI: See Graphical User Interface.

Groupz Management GUI Sharing Paradigm


The organization of an online community by the moderator. A shared application follows the GUI sharing paradigm
(Lambropoulos, 2006b) if the output of a centralized application is shared
among all participants of the conference. Feedback from
Groupz-Ware Technology the participants is sent to the centralized server to be
The groupz-ware needed depending on the nature and incorporated in the control of the application, if desired.
culture of each community. (Lambropoulos, 2006b) (Trossen & Molenaar, 2005)

Groupz-Ware Theory Guided Tour


Refers to the multidisciplinary nature of virtual 1: Combination of links that guides a user along a
communities and the interaction between disciplines collection of hypermedia nodes that have some topic or
such as learning, psychology of the individual and concept in common. In MESH, guided tours are generated
the masses, sociology, linguistics, communication dynamically at runtime, based on the type of previously
studies, management, human-computer interaction, and followed links by a particular user. (Lemahieu, 2005) 2: A
information systems. (Lambropoulos, 2006b) navigation type that leads users to a predeined trail of nodes
without freely explorative navigation, using, for example,
Growth Competitiveness Index (GCI) previous and next anchors. (Suh & Kim, 2005)
An index that aims to measure the capacity of the national
economy to achieve sustained economic growth over Guideline
the medium term, controlling for the current level of Design and development principles that must be followed
development. (Neumann, 2005) in order to achieve a good application. (Prata, 2005)

Growth Rate Guild


The ratio of the proportion of data covered by the emerging A collection of players who share a common principle or
pattern in one group over the proportion of the data it outlook. A guild is a specialized group. Guilds are popular
covers in another group. (Butler & Webb, 2005) among the variety of MMORPGs available. Often, guilds
will have a deity alignment (good, evil, neutral) and carry

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Gulf Coope rat ion Counc il 295

out actions consistent with that alignment. However, any


players caught behaving badly or against the policies of
the guild will be dealt with appropriately, such as being
G
expelled from the guild. (Grifiths et al., 2006)

Gulf Cooperation Council


A union consisting of the following Arabian Gulf nations:
Bahrain, Kuwait, Oman, Saudi Arabia, Qatar, and the
United Arab Emirates, which share a common economic
market and defense-planning structure. (Reynolds,
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
296 H .3 2 3 H a m m ing Dist a nc e

H
H.323 to describe individuals who gain unauthorized access to
An ITU-T speciication that deines network protocols, computer systems for the purpose of stealing or corrupting
operations, and components for transporting real-time information or data. Hackers see themselves as the white
video, audio, and data over IP networks such as the Internet hats or the good guys who breach security for the greater
and I2. (Littman, 2005) good. The media at large makes no distinction between a
hacker and a Cracker. (Tassabehji, 2005a) 5: A computer
H-Anim (Humanoid Animation) expert who breaks into a network or computer system
1: Part of VRML speciications consisting of node prototypes with (usually) malicious intent. (De, 2006)
allowing the deinition of an avatar. (Prteux & Preda, 2005)
2: The VRML Consortium Charter for Humanoid Animation Hacking
Working Group recently produced the International Hacking, or entering anothers computer, is a common
Standard, Information TechnologyComputer Graphics method of the cyber-identity thief. (Close et al., 2006)
and Image ProcessingHumanoid Animation (H-Anim),
an abstract representation for modeling three-dimensional Hacktivism
human igures. (Sappa et al., 2005) Clandestine use of hacking for the advance of political
causes. (De, 2006)
HA: See High Availability.
Half-Band Filters
Habermasian Logic A low-pass or high-pass ilter that divides the basis band
The learning process of the human species takes place in two equal bands, and satisies prescribed symmetry
through the accumulation of both technical and moral- conditions. (Mili, 2005)
practical knowledge within social interactions yielding a
logic of growing insight. (Pemberton & Stalker, 2006) Halftone
A method to reproduce photographic images in printed
HAC: See Hierarchical Agglomerative Clustering. media by creating a pattern of dots that change in size to
create the perception of lighter and darker tones. (Snyder,
Hack 2005)
To get access to the contents of a networks database
without permission. (Msiska, 2005) HAM
Legitimate e-mail communication. (Willis, 2005)
Hacker
1: A very knowledgeable computer user who uses his Hamming Clustering
or her knowledge to invade other peoples computers A fast binary rule generator and variable selector able to
through the computer network. (Chen, Holt, et al., 2005) build understandable logical expressions by analyzing the
2: An entity outside of an organization that gains or hamming distance between samples. (Liberati, 2005)
attempts to gain access to a system or system resource
without having authorization to do so. (Wilson et al., Hamming Distance
2006b) 3: Someone who breaks into a computer system The distance between two binary strings (with the same
for fun. (Rowe, 2006c) 4: A slang term for a computer length) given by the number of different bits. (Muselli,
enthusiast or clever programmer, more commonly used 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H a ndhe ld H a rd Te chnology 297

Handheld Haptic
A computer small and light enough to be held in a users 1: Relating to the sense of touch. (Murphy, 2005b) 2: The
hand. (Ketelhut et al., 2005) technology of touch which uses the tactile sense to send
H
and receive data. (Ajiferuke & Markus, 2005)
Handheld Computer
Also called personal digital assistant (PDA); an electronic Haptic Device
device small enough to hold in one hand and lightweight Involves physical contact between the computer and the
enough to carry in a pocket. (Woodruff & Nirula, 2005) user, usually through an input and output device, such as a
joystick or data gloves, that senses the bodys movements.
Handheld Device (Yong & Choo, 2005)
Also known as pen-based computing. (Garrett, 2006b)
Haptic Output
Handheld PC: See Web Pad. A device that produces a tactile or force output. Nearly
all devices with tactile output have been developed for
Handheld Service graphical or robotic applications. (Bourguet, 2006)
The use of a handheld device, such as a Personal Digital
Assistant (PDA) or Pocket PC, as an extension of workstation Hard Case
resources through the use of client-/server-based software A case that cannot be solved by simply applying formal
for access and synchronization in conjunction with rules, either because: (1) the characteristics of the case
wireless access service provider. Handheld services are are not easily matched to the formal rules, (2) the formal
used for electronic prescribing, real-time drug references, rules do not deliver clear conclusions, and/or (3) applying
scheduling, charge capture, and so forth. (OBuyonge & the formal legal rules leads to unacceptable results.
Chen, 2006) (Svensson, 2005)

Handheld Technology Hard Clustering


A computing device that can be easily held in one hand Cluster analysis where each data object is assigned to a
while the other hand is used to operate it. (Parikh & unique cluster. (Klawonn & Georgevia, 2005)
Parolia, 2005)
Hard Data
Handoff/Handover Historical, usually accurate data, often from transaction
1: The process of changing some of the parameters processing systems. (Holstein & Crnkovic, 2005)
of a channel (frequency, time slot, spreading code, or
a combination of them) associated with the current Hard Knowledge
connection in progress. Handoffs are initiated by a Knowledge that is unambiguous and unequivocal, can
clients movement, by crossing a cell boundary, or by be clearly and fully expressed, can be formalized and
a deteriorated quality of signal received on a currently structured, can be owned without being used, and is
employed channel. (Katsaros et al., 2005) 2: Process that both abstract and static: it is about, but not in, the world.
occurs after a cell change. The mobile host identiies (Kimble & Hildreth, 2005)
itself at the Management Support System (MSS) of the
cell into which it has moved. (Coratella, Felder, Hirsch, & Hard Skill
Rodriguez, 2005) 3: In a cellular network, the radio and One of several measurable capabilities and academic
ixed voice connections are not permanently allocated for knowledge acquired through traditional tertiary study.
the duration of a call. Handover, or handoff as it is called Current MIS curriculum examples include communications
in North America, means switching an ongoing call to and report writing, systems analysis and design, client/
a different channel or cell. This often results in loss of server applications, and business applications. (Lowry
connection. (K.J. MacGregor, 2005) & Turner, 2005)

Hands-Free Operation Hard Technology


Allows the user to interact with data and information Examples include: computer equipment, software,
without the use of hands. (de Freitas & Levene, 2006b) networks, and so forth. (Graham et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
298 H a rdw a re a nd Soft w a re Wat e r m a rk H e a lt h I nfor m at ion Syst e m

Hardware and Software Watermark HDTV: See High-Deinition Television.


A unique identiier (e.g., a serial number) embedded in
H computer equipment and programs. (Szewczak, 2006) Head Pose
Position of the head in 3D space including head tilt and
Harmony rotation (Lovell & Chen, 2005)
A pleasing combination of elements in a whole. The
combination of elements intended to form a connected Head-Mounted Display (HMD)
whole, as opposed to alignment where the elements remain A visual display unit that is worn on the head as in the use
separate. (Johnston, 2005) of a virtual reality system. (de Freitas & Levene, 2006b)

Harvard Case-Based Learning Head-Up Display (HUP)


Students are given a realistic case relevant to the course A display of data and information that is superimposed upon
(information systems, accounting, management, etc.). the users ield of view. (de Freitas & Levene, 2006b)
Students work through the case, in or out of class, and
decide what should be done. They then meet with the Header
entire class or in groups, and discuss and resolve the case. The beginning portion of a message. By design, it should
(Jennings et al., 2005) contain the source and target address for the message.
(Horiuchi, 2005b)
HASP: See High-Altitude Stratosphere Platform.
Health Care Enterprise Memory
HAVA: See Help America Vote Act. A knowledge management info-structure which supports
the functionality to acquire, share, and operationalize the
Hazard Communication Standard (HCS) various modalities of knowledge existent in a health care
The OSHA (Occupational Safety and Health Act) regulation enterprise. (Metaxiotis, 2006)
on the Hazard Communication Standard states that
chemical manufacturers and importers must research Health Care Industry
the chemicals they produce and import. If a substance The complex of entities engaged in delivering, inancing,
presents any of the physical and health hazards speciied or monitoring health care. (Rada, 2005)
in the HCS, then the manufacturer or importer must
communicate the hazards and cautions to their employees Health Care Supply Chain
as well as to downstream employers who purchase the A managed set of activities related to the health care activity
hazardous chemicals. (Jeong et al., 2006) of a patient, organized so that all necessary information is
available all the time, and the participants in the chain have
Hazard Function a complete picture of the total process. (Suomi, 2005)
A time-to-failure function that gives the instantaneous
probability of the event (failure) given that it has not yet Health Care System
occurred. (Chen, Oppenheim, et al., 2005) A system composed of health care providers, health plans
or insurance companies, and patients. (Rada, 2006)
HCI: See Human-Computer Interaction.
Health Information Management (HIM)
HCI Pattern The practice of managing, analyzing, and utilizing data
A pattern that focuses on how users interact with computers vital for patient care and making it accessible to health care
via the interface of the application. (Gaffar & Seffah, providers when it is needed most. (Zender, 2006)
2005)
Health Information System
HCS: See Hazard Communication Standard. The system, whether automated or manual, that comprises
people, machines, and /or methods organized to collect,
HDM: See Hypermedia Design Methodology. process, transmit, and disseminate data that represent user
information in health care. (Hyrinen & Saranto, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H e a lt h I nsura nc e Por t a bilit y a nd Ac c ount a bilit y Ac t (H I PAA) H e r m e ne ut ic 299

Health Insurance Portability and Accountability Hegelian/Kantian Perspective of Knowledge


Act (HIPAA) Management
1: Standard guidelines and policies enforced by the Refers to the subjective component of knowledge
H
U.S. federal government to protect conidential medical management; can be viewed as an ongoing phenomenon,
records. (Wang, Cheng, & Cheng, 2006) 2: Requires the being shaped by social practices of communities, and
U.S. Secretary of Health and Human Services to publicize encouraging discourse and divergence of meaning, and
standards for the electronic exchange, privacy, and security the recognition of the existence of multiple approaches.
of health information. (Cannoy & Salam, 2006) 3: An (Wickramasinghe, 2006)
American law that put certain restrictions on the way
health information can be used and transmitted. As part Help America Vote Act (HAVA)
of their jobs, many AHIMA members design policies Provided funding to states to encourage the adoption of
and procedures to help their facilities implement the law. new electronic voting systems. It also provided voluntary
(Zender, 2006) federal guidelines to be followed in implementing these
systems. (Gibson & Brown, 2006)
Health Literacy
The capacity of an individual to obtain, interpret, and Help Desk
understand basic health information and services, and the A section that can respond to technical queries by users.
competence to use such information and services in ways (Demediuk, 2005)
that are health enhancing. (Becker, 2005a)
Hermeneutic
Health Plan Employer Data and Information 1: A medium that allows for interpretation of different
Set cultural and social perspectives. (Champion, 2006b) 2:
A quality assurance system established by the National A branch of philosophy which studies interpretation
Committee for Quality Assurance (NCQA). (Troutt & processes. Methodology is the choice of the adequate
Long, 2005) method for performing research or any scientiic activity.
Hermeneutics can be understood as a parallel and
Health Professional Shortage Area (HPSA) complementary process to a method. The method identiies,
A geographic area or population group designated by the organizes, and orders the necessary steps to accomplish a
U.S. Department of Health and Human Services (DHHS) certain activity and a ixed objective. And hermeneutics
that is underserved in health care. (Wang & Lou, 2005) calls attention to the intrinsic necessity of constantly
interpreting the laws and adapting the rules, norms, and
HEDIS: See Health Plan Employer Data and Information indications given by the method to the idiosyncrasy of a
Set. concrete situation, the context, the situatedness, and the
horizons of the interpreting community. Hermeneutics
Hedonic developed out of the interpretation of sacred texts. It started
Referring to the senses, feelings, and emotions. (Bridges from relatively rigid and formalized procedures, and then
et al., 2006) developed to highly dynamic and lexible approaches. The
idea behind modern hermeneuticsdeveloped from the
Hedonic/Recreational Consumer 1950s onwards, though with roots from the late-nineteenth
A consumer who enjoys shopping for his or her own sake, centuryis that all reality is a text analog so that it may
not just for the items purchased; such consumers are driven be read and interpreted as a text. This interpretation
by fun, pleasure, curiosity, and exploration. (Scarpi & process, again, is not rigid and static, but rather it has
DallOlmo-Riley, 2006) an ontological and epistemological dimension. Through
interpretation, reality manifests itself ontologically, and
Hedonic Use Quality through this process the resulting knowledge is organized
The quality of a product to deliver pleasurable value to in an epistemic waythat is, creating meaningful
the user. (Knight, 2006a) structures and conceptualized hierarchies. This approach
to hermeneutics proposes a highly creative, constructive,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
300 H e t e roge ne it y H idde n M a rkov M ode l (H M M )

and transformative process of dealing with human be drawn from previous examples of business successes
interpretation of reality, thus its potential for fertile change and failures. Artiicial intelligence models rely on these
H and development at the community and organizational rules to ind relationships, patterns, or associations among
levels. (Nobre, 2006a) variables. (Athappilly & Rea, 2005)

Heterogeneity Heuristic Algorithm


Effects that unobserved variables can introduce in disease An optimization algorithm that does not guarantee to
rates and that vary in an unstructured manner in either identify the optimal solution of the problem it is applied
space or time. (Vidal-Rodeiro et al., 2005) to, but which usually provides good quality solutions in
an acceptable time. (Calvo et al., 2005)
Heterogeneous Agent
Agent of a multi-agent system that differs in the resources Heuristic Evaluation
available to it in the problem-solving methods and expertise A technique for early evaluation of interactive systems
it uses, or in everything except in the interaction language designs. Heuristic evaluation involves systematic
it uses. (Zwitserloot & Pantic, 2005) inspection of the design by means of broad guidelines
for good practice. Typically, three to ive experts should
Heterogeneous Information System perform the analysis independently, and afterwards
A set of information systems that differs in syntactical or combine and rank the results. A well-known set of heuristics
logical aspects, such as hardware platforms, data models, is the one proposed by Nielsen: visibility of system status;
or semantics. (Buccella et al., 2005) match between the system and the real world; user control
and freedom; consistency and standards; error prevention;
Heterogeneous Network recognition rather than recall; lexibility and eficiency of
A network where network clients run a variety of operating use; aesthetic and minimalist design; help users recognize,
systems. An example would be a network of machines diagnose, and recover from errors; help and documentation.
running Windows, Unix, and Mac OS X. (Ruppel & (Campos & Harrison, 2006)
Ruppel, 2005)
Heuristic Rule
Heuristic A commonsense rule (or set of rules) intended to increase
1: One of a set of rules intended to increase probability the probability of solving some problem. (Barolli &
of solving problem. (Guan, 2006c) 2: An algorithm, Koyama, 2005a)
particularly used to solve and achieve near-optimal
solutions to intractable problems. (Chin, 2005) 3: From the Heuristic Sketch
Greek heuriskein, meaning to discover. A heuristic aids An ad-hoc drawing used to assist the group relection and
discovery, particularly the search for solutions in domains communication process by making unstable knowledge
that are dificult and poorly understood. It is commonly explicit and debatable. (Eppler & Burkhard, 2006)
known as a rule of thumb. Unlike algorithms, heuristics
do not guarantee optimal or even feasible solutions and HF
frequently do not have a theoretical guarantee. (George, High-frequency or shortwave radio operating in 3-22 MHz
2005a) 4: One of a set of rules or criteria which derive range. (Chand & Leeming, 2005)
directly from practice. Usually, they are not proven
in a scientiic way, yet they are broadly acceptable. HF Radio Modem
(Athanasis & Andreas, 2005; Karoulis & Pombortsis, A device for transmitting data between high-frequency
2005a) 5: A rule of thumb, simpliication, or educated (HF) radios. HF has the advantage of transmitting over
guess that reduces or limits the search for solutions in thousands of kilometers. Although the data throughput is
domains that are dificult and poorly understood. Unlike relatively low compared to other frequencies, it is free
algorithms, heuristics do not guarantee optimal, or even to air. (D. Stern, 2005)
feasible, solutions and are often used with no theoretical
guarantee. (Lazar, 2005) 6: A set of rules derived from Hidden Markov Model (HMM)
years of experience in solving problems. These rules can 1: A statistical model where the system being modeled is
assumed to be a Markov process with unknown parameters,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H idde n M a rkov Ra ndom Fie ld (H M RF) H ie ra rchy of Lea r ning 301

and the challenge is to determine the hidden parameters Hierarchical Clustering


from the observable parameters, based on this assumption. 1: A clustering method characterized by the successive
(Song et al., 2005) 2: A variant of a inite state machine aggregation (agglomerative hierarchical methods) or
H
having a set of states, an output alphabet, transition desegregation (divisive hierarchical methods) of objects in
probabilities, output probabilities, and initial state order to ind clusters in a dataset. (Santos et al., 2005) 2:
probabilities. It is only the outcome, not the state visible to A hierarchy of partitions is generated as output; it may be
an external observer, and therefore states are hidden to the depicted as a tree of partitions or a pyramid of overlapping
outside; hence, the name Hidden Markov Model. (Chang & clusters. (Murthy & Diday, 2005)
Hsu, 2005) 3: A statistical model of sequential data utilized
in many machine learning applications (e.g., speech and Hierarchical Conjoint Analysis
gesture recognition). (Karpouzis et al., 2005) Variant of conjoint analysis that allows the integration
of an extended amount of conjoint features. (Voeth &
Hidden Markov Random Field (HMRF) Liehr, 2005)
A Markov Random Field (MRF) with additional
observation variables at each node, whose values are Hierarchical Data File
dependent on the node states. Additional pyramids of A database system that is organized in the shape of a
MRFs deined over the HMRF give rise to hierarchical pyramid, with each row of objects linked to objects directly
HMRFs (HHMRFs). (Caelli, 2005) beneath it. This approach has generally been superceded
by relationship database systems. (Pang, 2005a)
Hidden Neurons
The name given to the layer of neurons between the input Hierarchical Storage Management (HSM)
variables and the output neuron. If too many hidden neurons An extension of storage management to include tape
are used, the neural network may be easily overtrained. If media as tertiary storage, thereby extending primary
too few hidden neurons are used, the neural network may storage (main memory) and secondary storage (disks)
be unable to learn the training data. (Smith, 2005) by an additional hierarchy level. For management of spatio-
temporal objects such as raster data, spatial clustering on
Hidden Node tape is an issue to minimize data access and tape load
A node may be hidden or out of range from a sender, but cycles. (Baumann, 2005)
within range of its intended receiver. (Erbas, 2005)
Hierarchy
Hierarchical Agglomerative Clustering (HAC) 1: A hierarchy on a dimension represents the different levels
A family of clustering algorithms, which start with each at which data can be aggregated and viewed along that
individual item in its own cluster and iteratively merge dimension. (Deshpande & Ramasamy, 2005) 2: An ordered
clusters until all items belong in one cluster. (Katsaros structure where the order is established between individuals
et al., 2005) or between classes of individuals; the ordering function may
be any function deining a partial order. (Rafanelli, 2005)
Hierarchical Bayesian Model 3: The members of a dimension are generally organized
The enterprise of specifying a model over several levels is along levels into a hierarchy. (Schneider, 2005) 4: The
called hierarchical modeling, with each new distribution structures created by an abstraction process by which a
forming a new level in hierarchy. Suppose that we have a selection of a set of attributes, objects, or actions from a
collection of observations y=(y1, y2, , yk) that are assumed much larger set of attributes, objects, or actions according
to come from a distribution p(y|) where =(1,2,,k). It to certain criteria is deined. (Pourabbas, 2005a)
can also be assumed that is a random quantity draw from
the distribution p(|l) where l is a vector of parameters. Hierarchy of Learning
In principle, the parameter l can depend itself on a The concept that learning can be sequentially ordered along
collection of other parameters. This sequence of parameters a continuum from lower order to higher order. Blooms
and distributions constitutes a hierarchical model. The Taxonomy is one of many that have been proposed. (Owen
hierarchy must stop at some point, with the remaining & Aworuwa, 2005)
parameters known. (Vidal-Rodeiro et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
302 H igh-Alt it ude St rat osphe re Plat for m (H ASP) H ist ogra m

High-Altitude Stratosphere Platform (HASP) High-Dimensional Index Structure


A special platform to support overlay coverage in The organization of indexes for storing the feature vectors
H large geographical areas with the advantage of a closer of images where the number of their dimensions is large,
distance than satellites. They operate in the stratosphere at least over 10. (Chang, 2005)
at altitudes of up to 22 km, exploiting the best features
of both terrestrial and satellite systems. They are usually High-Pass Digital Filter
implemented though the use of unmanned aeronautical Digital ilter that passes only high frequencies deined by the
vehicles. (Louvros, Karaboulas, et al., 2005) pass-band cutoff frequency and attenuates all frequencies
from 0 to cutoff stop-band frequency. (Jovanovic-Dolecek,
High Availability (HA) 2005c)
A measure of the uptime of a system; typically means
ive nines (99.999%) or better, which corresponds to 5.25 High-Vote Pattern
minutes of planned and unplanned downtime per year. A pattern supported (voted for) by most of a group of data
(Zhao et al., 2006) sources. (Zhang & Zhang, 2005)

High Tech Higher Education


A colloquial phrase meaning more use of technology than 1: Education opportunities offered post-K-12 public
human resources and people. (Laws et al., 2005) education. (Schifter, 2005) 2: Education at degree level
and above. Higher education courses are those leading
High Technology to the award of a bachelors degree, graduate certiicate,
Includes space and aviation, computers and office graduate diploma, masters degree, or doctoral degree.
machinery, electronics and telecommunication equipment, Some courses leading to the award of a diploma or advanced
pharmaceuticals, scientific instruments, electrical diploma may also be accredited as higher education. In
machines and equipment, chemicals, non-electrical the Republic of Ireland, a majority of all higher education
machines, and weapons. (Watson, 2005) is offered by universities and colleges of technology.
(Donnelly, 2005)
High Touch
A colloquial phrase meaning more use of human resources Higher Education Program
and people than technology. (Laws et al., 2005) The processes, learning materials, and associated
procedures and facilities that lead to the completion of a
High-Context Culture degree or related qualiication. (Grasso & Leng, 2005)
This is when one looks for information in the physical
context or internalized in the person, while very little Highest Weighting
is coded, explicit, or transmitted as part of the message. Use the individual forecast procedure that is given the
(Zakaria & Yusof, 2005) highest weight in the ixed weighting method. This is not
a combination. This method is equivalent to choosing the
High-Deinition Television (HDTV) forecasting technique, which is the best on the weight
A new type of television that provides much better estimation period. (C.K. Chan, 2005)
resolution than current televisions based on the NTSC
standard. There is a number of competing HDTV standards, HIM: See Health Information Management.
which is one reason why the new technology has not been
widely implemented. All of the standards support a wider HIPAA: See Health Insurance Portability and
screen than NTSC and roughly twice the resolution. To Accountability Act.
pump this additional data through the narrow TV channels,
images are digitalized and then compressed before they Histogram
are transmitted, and then decompressed when they reach 1: A data structure that maintains one or more attributes
the TV. HDTV can offer bit rates within the range of 20 or columns of a relational database management system
to 30 Mbit/s. (Chochliouros et al., 2005b) to assist the query optimizer. (Thomasian, 2005b) 2: A

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H ist oric a l Cost H OBBit Dist a nc e 303

set of buckets implementing a partition of the overall History Retrieval


domain of a relation attribute. (Buccafurri & Lax, 2005) In Web browsing, it is the act of recalling Web sites that
3: A vector whose components represent similar colors have been previously visited. (Guan, 2005b)
H
in an image. The value of a component is the number
of image pixels having that color. (Sural et al., 2005) 4: Hit Rate
Approximation, obtained by sampling, of a distribution 1: Any request for data from a Web page, a way to compare
(e.g., a distance distribution). (Chvez & Navarro, 2005) the popularity/trafic of a site. (Waterson, 2006) 2: The
5: The original term refers to a bar graph that represents ratio of requests served by the cache (hits) over the total
a distribution. In information retrieval, it also refers to a number of requests made by the clients. (Danalis, 2005)
weighted vector that describes the properties of an object
or the comparison of properties between two objects. Like Hit Ratio
a feature vector, a good histogram captures similarity and The number of times an item is found in the cache divided
dissimilarity of the objects of interest. (X. Wang, 2005) by the number of times an item is being matched. (Tse,
6: Typically used for representing one-dimensional data, 2006)
though multi-dimensional histograms are being researched
in the database ield. A histogram is a division of the Hit Request
domain of a one-dimensional ordered attribute into buckets, An HTTP request made by a Web client agent (e.g., a
where each bucket is represented by a contiguous interval browser) for a particular Web resource. It can be explicit
along the domain, along with the count of the number of (user initiated) or implicit (Web client initiated). Explicit
tuples contained within this interval and other statistics. Web requests are sometimes called clickthroughs.
(Das, 2005) (Mobasher, 2005b)

Historical Cost HITS: See Hypertext-Induced Topic Selection.


This type of cost relects the price of the network equipment
at the time of acquisition. (Hackbarth et al., 2005) HITS Algorithm
A Web search technique for ranking Web pages according
Historical Document Version to relevance to a particular search term or search phrase.
A non-current document version. This is a version that has Two concepts, authority and hub, are proposed to
later been updated, and the last version that existed before characterize the importance of each Web page. (Li,
the document was deleted. (Nrvg, 2005) 2005)

Historical XML HMD: See Head-Mounted Display.


A sequence of XML documents, which are different
versions of the same XML document. It records the change HMDS: See Hyperbolic Multi-Dimensional Scaling.
history of the XML document. (Zhao & Bhowmick,
2005) HMI in Manufacturing
Relation between a human operator and one or more
Historically Underserved Group machines via an interface for embracing the functions of
Refers to those who lack access to computers and the machine handling, programming, simulation, maintenance,
Internet. Historically this has included Americans who diagnosis, and initialization. (Blecker & Graf, 2006)
have low incomes, live in rural communities, have limited
education, and are members of racial or ethnic minorities. HMM: See Hidden Markov Model.
(Kvasny & Payton, 2005)
HMRF: See Hidden Markov Random Field.
History of Implementation Success
Describes the track record of IT projects in HR and the HMS: See Human-Machine System.
effectiveness of HR into IT people management issues.
(Dery & Samson, 2005) HOBBit Distance
A computationally eficient distance metric. In one
dimension, it is the number of digits by which the binary

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
304 H oldout Te chnique H orizon of Obse r vat ion

representation of an integer has to be right-shifted to Homogenous Temporal Relation


make two numbers equal. In another dimension, it is Attribute values in any tuple of a relation are all deined
H the maximum of the HOBBit distances in the individual with the same period of time. In a heterogeneous relation,
dimensions. (Perrizo, Ding, Ding, et al., 2005) attribute values in a tuple may have different time periods
of existence. (Tansel, 2005)
Holdout Technique
A ilter technique that splits the data into exploratory and Homologous Point
holdout sets. Rules discovered from the exploratory set then The point in the DEM and the point in the R-DEM modeling
can be evaluated against the holdout set using statistical the same point in the real surface. Their distance is the
tests. (Butler & Webb, 2005) error of the DEM point, assuming the point in the R-DEM
is without error. (Zelasco et al., 2005)
Holistic Function
An aggregate function F is called holistic if the value of Homology
F for an n-dimensional cell cannot be computed from a Relationship by evolutionary descent from a common
constant number of aggregates of the (n+1)-dimensional ancestral precursor. (Tsunoda et al., 2005)
cell. (Abdulghani, 2005a)
Homonymy
Holistic Nature of an IT/End-User Relationship A particular interschema property. An homonymy between
The important elements making up a relationship between two concepts A and B indicates that they have the same
an IT professional and its end user(s) at a given time name but different meanings. (De Meo, Terracina, et al.,
should be organized together as a whole. If any of these 2005)
elements are disturbed in a negative sense, the whole
relationship between the IT professional and the end user(s) Homoscedasticity
is undermined. In other words, the relationship as a whole A statistical assumption for linear regression models. It
is more than the sum of its elements. (Leonard, 2005) requires that the variations around the regression line be
constant for all values of input variables. (Lee, Peterson,
Homeostasis et al., 2005)
The condition of stability that an organization can obtain
by being cognizant of and responsive to environmental Honeypot
changes. Homeostasis is one of the most typical properties A deceptive computer system that entraps attackers into
of highly complex open systems. Such a system reacts revealing their methods. (Rowe, 2006c)
to every change in the environment, or to every random
disturbance, through a series of modiications of equal size Hopield Neural Network
and opposite direction to those that created the disturbance. A neural network with a single layer of nodes that have
The goal of these modiications is to maintain the internal binary inputs and outputs. The output of each node is
balances. (Hall & Croasdell, 2006) fed back to all other nodes simultaneously, and each of
the node forms a weighted sum of inputs and passes the
Homepage output result through a nonlinearity function. It applies a
A textual and graphical display that usually welcomes users supervised learning algorithm, and the learning process
to a Web site and provides a point of access to other static continues until a stable state is reached. (H. Wang & S.
and dynamic Web pages. (Handzic & Lin, 2005) Wang, 2005)

Homogeneity Horizon of Observation


The degree of similarity or uniformity among individuals Based in distributed cognitive theory, it is the portion of
of a population. (Lee, Peterson, et al., 2005) the workspace that a participant can observe or monitor.
It addresses how learning in a collaborative environment
Homogeneous Agent takes place, and how technologies expand the 4 by allowing
One of the set of agents of a multi-agent system that are for the identiication of different knowledge sources that
designed in an identical way and have a priori of the same can contribute to learning within communities. (Paquette,
capabilities. (Zwitserloot & Pantic, 2005) 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H orizont a l a nd Ve r t ic a l Proje c t ions H orizont a lly Pa r t it ione d Dat a 305

Horizontal and Vertical Projections Horizontal Industry Portal


Horizontal projection is the projection of the binary image A portal utilized by a broad base of users across a horizontal
along the horizontal axis. Similarly, vertical projection is market. (Tatnall & Burgess, 2006)
H
the projection of the binary image along the vertical axis.
They can be calculated as follows: Horizontal Integration
In information management systems, traditionally
Ph [y]= black.pixe l(x, y), Pv [x ]= black.pixe l(x, y),
n m
addresses information sharing across systems, which often
x =1 y =1
means across functions or departments. In the context of
organizational structure, horizontal integration typically
where m = width of the image and n = height of the image. refers to cross-business-unit integration in pursuit of scope
(Chakravarty et al., 2005a) economies. (Gordon & Mulligan, 2005)

Horizontal ASP Horizontal Partitioning


Horizontal ASPs provide online applications for a speciic Distributing the rows of a table into several separate tables.
business function such as human resource management, (Bellatreche & Mohania, 2005)
procurement, customer relations, and so forth. (D. Kim,
2005) Horizontal Portal
A multi-functional space used for information, navigation,
Horizontal Classiication System communication, and e-commerce that offers broad content
Classiication systems can be divided into horizontal and to the mass market. (Vrazalic & Hyland, 2005)
vertical classiication systems. Horizontal classiication
systems try to cover all areas of a certain domain. Well- Horizontal vs. Vertical Dimension
known examples are the ECl@ss-system and UNSPSC, The horizontal dimension is represented by the current
which try to provide classes for all manufactured products. community at the institutional level. It is the dimension
(Abels & Hahn, 2006) of structuralism that focuses on the parts that make
up a whole. Science searches for total autonomy of its
Horizontal Fiscal Equalization object, being thus insensitive to any referentialthat is,
A series of intergovernmental grants that ensures that all to the vertical dimension. The horizontal dimension in
Australians have access to an average level of services. philosophy represents the content and the ontological
First implemented in Australia in 1934, Horizontal Fiscal consistency of the de-centering in the world. Structuralism
Equalization was seen to be a basic tenet of Australian raises attention to the meaning of the content and to its
Federalism. Horizontal Fiscal Equalization was designed relative autonomy. The horizontal dimension represents
to prevent independent economies developing in the the presence of differences and the signiication power of
different communities in different geographic locations in the elements of the world as a globality. An empty world,
Australia, and to ensure that citizens were not signiicantly void of differences, could never be a philosophical world.
disadvantaged in the delivery of government services due On the other hand, the vertical dimension is represented
to their geographic location. (Cameron, 2005) by the institutional memory. The vertical dimension is
the attraction towards a referent. Philosophy is always
Horizontal Industry Application facing a referent, never being closed within the game
A horizontal industry is one that aims to produce a of its internal structures, though these are present and
wide range of goods and services. Horizontal industry crucial in philosophy, where both vertical and horizontal
applications are utilized across many different industries. dimensions are present. (Nobre, 2006b)
While the core part of the application does not require
changes, an organization needs customization at the Horizontally Partitioned Data
front end or at the back end. Database access and service A distributed architecture in which the all the sites share
representative dispatch are typical examples of these the same database schema but have information about
applications. (Bose et al., 2005) different entities. The union of all the rows across all the
sites forms the complete database. (Jha & Sural, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
306 H or n Cla use H 2 DV

Horn Clause HSI Model


One of a set of clauses in conjunctive normal form (i.e., A color model in which a color is described by three
H a conjunction of disjunctions of literals) is a Horn set characteristics: hue (H), saturation (S), and intensity
of clauses if each clause contains at most one positive (I). They form a 3D color space. The HSI model is quite
predicate. That is, all literals are positive when written coherent with human perception. A closely related model
as Prolog clauses (Head:-Body), since the negated literals is HSV model, in which value (V) takes the place of
become a conjunction of positive predicates when put into intensity. (Zhang, 2005c)
the Body of the clause. When resolved with positive facts,
such clauses can only result in new positive facts, and HSM: See Hierarchical Storage Management.
the complete set of such results is enumerable for Horn
clauses and is a unique initial (i.e., smallest) model for HSV Color Space
the clauses. (Buehrer, 2005) A color space consisting of hue, saturation, and intensity
value. It is a popular way of representing color content of
Host an image. (Sural et al., 2005)
A computer connected directly into a network such as the
Internet. Whenever one dials into the Internet, one makes a HTML: See Hypertext Markup Language.
connection through a host computer. (Magagula, 2005)
HTML Document
Host-Multicast A document embedded with HTML codes or tags that
Application-layer multicast technology that does not specify how the document will be displayed when viewed
require any additional protocol in the network routers, on the Internet. (Cooper, 2005)
since it uses the traditional unicast IP transmission.
(Hossz, 2005b) HTTP: See Hypertext Transfer Protocol.

Host-Multicast Routing Protocol HTTP Server


The members of the hosts construct a delivery tree using A program that listens on various TCP/IP ports (usually
similar algorithms than the IP-multicast routing protocols. port 80), awaiting an HTTP request from a browser. Once
(Hossz, 2005b) a request is made, the server authenticates the request and
serves up either a static HTML document or runs a CGI
Hot-Chatting program to generate dynamic HTML content. Apache is
Two or more individuals engaging in discourses that move an example of an HTTP Server software suite. (Chim,
beyond light-hearted lirting. (Whitty, 2005) 2006)

Hotelling (Neighborhood Work Center) HTTP Session


Organizational facility for employees to work at, but A program executed upon accessing a Web page. This is
where they do not have a permanently assigned desk. a security risk, because users end up running programs
They must check-in every time they come to work there. they do not know and/or trust. (Chim, 2006)
(Blanger, 2005)
H2
Hotspot Two-dimensional hyperbolic space (plane). (Walter,
Traditionally, an area where people congregate that would 2005)
be appropriate for setting up a Wi-Fi access point. Now
synonymous with an area where a Wi-Fi access point H2DV
already exists. (Efstathiou & Polyzos, 2006) The Hybrid Hyperbolic Data Viewer incorporates two-
stage browsing and navigation using the HSOM for a
HPSA: See Health Professional Shortage Area. coarse thematic mapping of large object collections and
the HMDS for detailed inspection of smaller subsets in
HPT: See Human Performance Technology. the object level. (Walter, 2005)

HR: See Human Resources.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H U H um a n Pe rc e pt ua l M ode l 307

HU: See Hypothetical Update. minds of employees. (Hsu & Mykytyn, 2006) 2: Relects
a human potential in knowledge, skills, and attitude
Hub that can provide better solutions (meaning), eficiency
H
1: A Web site that provides collections of links to (time), and effectiveness (money) of work. (Targowski,
authorities. (Hu et al., 2005b) 2: A centralized location 2005) 3: The attributes, competencies, and mindsets of
where activities or interactions take place. (St.Amant, the individuals that make up an organization. (Smith,
2005b) 3: A term for Web pages in link analysis. In 2006b) 4: The knowledge and knowing that exists within
contrast to an authority page, a hub page does not contain a particular unit which could be a team, an organization,
high-quality content itself, but links to the authorities. A an industry, or even a society. (Newell, 2006) 5: The
hub represents an excellent information provider and may knowledge, skills, abilities, and experiences of employees
be a clearinghouse or a link collection. The high quality that provide value-added contributions for a competitive
of these pages is shown by the information sources they advantage in organizations. (Wong-MingJi, 2005) 6: The
contain. (Mandl, 2006) unique capabilities and knowledge of individuals that aid
productivity. (Ridings, 2006b) 7: Individual skills and
Hub Company capabilities that allow actors to act in new and innovative
A lead company in a supply chain or value network that ways, and to respond to new challenges with creative
organizes and manages the work for end products and/or solutions. (von Wartburg et al., 2006)
services. This is, for example, an automotive manufacturer,
an aircraft manufacturer, a clothing manufacturer, or major Human Capital Index
food supplier. These are usually large companies, but can A measurable deinition of human capital is deined by
be small if the end product is in building construction, for the product of competence and commitment. While
instance. Usually the manufacturing and services chain is they align with business strategy, competencies need to
complex and contains many sub-products that have to be be generated through more than one mechanism, such
drawn together with processes and services to meet design- as buy, build, borrow, bounce, and bind. Commitment is
to-manufacture targets and delivery excellence. In a value concerned with how employees relate to each other and
network the tier N suppliers are part of the collaborative feel about a irm. (Hsu & Mykytyn, 2006)
network. It is to be noted that communication in the old
economy was EDI and in the new economy will be fully Human Ecology
open system interoperable ICT. (Richards et al., 2005) In a holistic vision of the environment, human ecology
is an approach to read changes and transformation in
Hub Page action; a way of integration of history, culture, and work
One of the pages that contain a large number of links to in peripheral regions in a communicative and distance-
pages that contain information about the query topics. exchange perspective; a tool for creating conditions for
(Lee-Post & Jin, 2005a) sustainable development. (Giorgi & Schrch, 2005)

Hubs and Authorities Human Factor


Web pages deined by a mutually reinforcing relationship A user characteristic in terms of personality and cognitive
with respect to their hyperlink structure. Hubs are Web factors that impact the task performance and the quality
pages that link to many related authorities; authorities of interaction with any artifact. (Sas, 2006)
are those pages that are linked to by many good hubs.
(Mobasher, 2005a) Human Language Technology
Branch of information science that deals with natural
Human Body Modeling language information. (He, 2006)
Digital model generally describing the shape and motion
of a human body. (Sappa et al., 2005) Human Perceptual Model
A set of features, including the Human Visual System
Human Capital (HVS) and Human Auditory System (HAS), describing
1: The combination of knowledge, skill, innovativeness, the physical characteristics of human eyes and ears. This
and ability of a companys individual employees to meet model expatiates on the sensitivities of human senses,
the task. It refers to the tacit knowledge embedded in the and thus allows more distortions introduced to the host

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
308 H um a n Pe rfor m a nc e Te chnology (H PT ) H um a noid Anim at ion (H -Anim )

media by watermarking without being perceived. (Si & reliability, consistency, portability, naturalness, and
Li, 2006) users subjective satisfaction. (Pantic, 2005a) 5: The
H study of how humans interact with computers, and how
Human Performance Technology (HPT) to design computer systems that are usable, easy, quick,
The systematic and systemic identiication and removal and productive for humans to use. (Janvier & Ghaoui,
of barriers to individual and organizational performance. 2006) 6: The study, planning, and design of what happens
(Banerji & Scales, 2005) when humans and computers work together. (Laghos &
Zaphiris, 2005a)
Human Resource Information System
An integrated system used to gather and store information Human-Computer Interface
regarding an organizations employees. (Troutt & Long, 1: A software application, a system that realizes human-
2005) computer interaction. (Pantic, 2005a) 2: Integrated
computing environment that allows the data miner to
Human Resources (HR) access the data visualization instruments, select data sets,
All activities of planning, staffing, appraisal and invoke the query process, organize the screen, set colors
remunerating, improving employees and the working and animation speed, and manage the intermediate data-
environment, and establishing and maintaining working mining results.(S. Wang & H. Wang, 2005)
relationships. (Dery & Samson, 2005)
Human-Machine System (HMS)
Human Right Based on the acceptance of an interaction between human
One of those rights that all humans have simply by reason and machine, it is a summary of all elements of hardware,
of being human, without regard to an individual government software, and useware. The term includes the micro (UI)
units laws. (Gilbert, 2005) and macro (organization) aspects of a human-machine
system. (Rse, 2006b)
Human-Centered Design
1: An alternative name for user-centered design (UCD) Humanistic Value
used in ISO process standards. (Knight & Jefsioutine, OD promotes humanistic values through empowerment
2006) 2: The process of designing sociotechnical systems that is, by articulating values designed to facilitate
(people in interaction with technology) based on an analysis visioning, organizational learning, and problem solving
of how people think, learn, perceive, work, and interact. in the interests of a collaborative management. Values are
(Sharples, 2006) seen to be central to promoting trust, collaboration, and
openness. (Grieves, 2006a)
Human-Computer Interaction (HCI)
1: A discipline concerned with the design, evaluation, Human/Problem-Sensitivity
and implementation of interactive computing systems The proximity to the human-centered/problem-oriented
for human use and with the study of major phenomena concepts, as opposed to the computer-centered/software-
surrounding them. (Debbabi & Baile, 2006) 2: A ield oriented concepts (i.e., computer/software solution-
of research and development, methodology, theory and sensitivity). (Andrade et al., 2006a)
practice with the objective of designing, constructing, and
evaluating computer-based interactive systemsincluding Humanoid
hardware, software, input/output devices, displays, An automaton that resembles a human being. (Yong &
training and documentationso that people can use Choo, 2005)
them eficiently, effectively, safely, and with satisfaction.
(Singh, 2005b) 3: Study of human behavior in interacting Humanoid Animation (H-Anim)
with any computer-based device. HCI is concerned 1: Part of VRML speciications consisting of node
with identifying ways to optimize, such as through the prototypes allowing the deinition of an avatar. (Prteux
design of technology, the relationship between humans & Preda, 2005) 2: The VRML Consortium Charter for
and computers. (Carstens, 2005) 4: The command and Humanoid Animation Working Group recently produced
information low that streams between the user and the the International Standard, Information Technology
computer. It is usually characterized in terms of speed, Computer Graphics and Image ProcessingHumanoid

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H um a nw a re H ybrid M ode l of I nve st m e nt Privat izat ion Funds 309

Animation (H-Anim), an abstract representation for Hybrid Filtering


modeling three-dimensional human igures. (Sappa et A combination of iltering techniques in which the
al., 2005) disadvantages of one type of iltering are counteracted by
H
the advantages of another. (Parmar & Angelides, 2005)
Humanware
With more information- and knowledge-intensive issues Hybrid Knowledge Network
driving economies, people or humanware become On one side, it groups together elements from the
invaluable for their contribution to societys development traditional virtual community of interest and from the more
and growth. (Kamel, 2005b) sophisticated communities of practice, and on the other
side, promotes collaborative multidisciplinary research
HUP: See Head-Up Display. that produces high-quality research results and stimulates
their transfer. (Ranguelov & Rodrguez, 2006)
Hybrid
The instructor and students meet both in the online learning Hybrid Learning
environment and in the classroom. (S.-K. Wang, 2005) Learning that involves both computer-mediated and face-
to-face communication. (Ketelhut et al., 2005)
Hybrid Course
1: A course taught using a combination of online and in- Hybrid Learning Environment
class instruction. (Baugher et al., 2005) 2: Another name A mix of traditional and Web-based instructional delivery
for a blended course. Typically, a course that replaces some methods in which the class meets for lectures, assignments,
face-to-face instructional time with computer-mediated and tests, while a course management platform is used
activities. (Graham et al., 2005) 3: University or college to deliver course materials, and conduct discussions and
classes that contain a reduced number of face-to-face exams. A term sometimes used synonymously with blended
class meetings between the instructor and students while model. (Aworuwa & Owen, 2005)
concurrently offering signiicant learning activities though
the Internet. (Bahn, 2006) Hybrid Learning Taxonomy
A comprehensive organizational scheme in applied
Hybrid Data Analysis Method learning and instructional design theory and practice that
A data analysis technique using methods from statistics integrates both descriptive and prescriptive taxonomic
and from fuzzy modeling. (Viertl, 2005) domains. While a number of conceptually useful hybrid
learning taxonomies have been proposed, there is to date no
Hybrid Distance Learning single, inclusive, unifying hybrid taxonomy that effectively
A distance learning program using both electronic delivery synthesizes all of the design elements of instruction to
and local facilitators or mentors to coach, counsel, and suficient practical levels of granularity and application.
support students. (Riffee & Sessums, 2005) (Lasnik, 2005)

Hybrid E-Retailer Hybrid MA: See Hybrid Multiple-Access.


A click-and-mortar company that conducts retailing
through e-channel as well as physical stores and other Hybrid Model
distribution channels. Compared to its pure e-commerce In distance learning, a hybrid model relects the learning
competitors, a hybrid e-retailer can leverage existing model that combines traditional with unconventional tools
physical stores, brand recognition, distribution network, and techniques in delivering knowledge to the community
existing customer base, and so forth. (I. Lee, 2005) of recipients. (Kamel, 2005b)

Hybrid Fiber Coaxial Cable Modem Hybrid Model of Investment Privatization


A technology that enables transmission of information at Funds
high rates over the cable television networks infrastructure The hybrid model is not, in the context of investment
comprising optical ibers and coaxial cables. (Hin & privatization funds, simply a model that incorporates
Subramaniam, 2005c) elements of two or more organizational forms. This
hybrid model encompasses a more dynamic entity. Firms

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
310 H ybrid M ult iple -Ac c e ss (H ybrid M A) H ype rlink Ana lysis

that adopt this structure typically maintain a general Hybridization


afinity towards a dominant form (e.g., uniied), but they The phenomenon occurring at universities where there is
H temporarily create contrasting organizational relationships an increasing overlap of the boundaries of traditional on-
(e.g., allied or portal) that do not it with the current campus courses and distance education courses. (Graham
organizational design. Much like evolution, the transition et al., 2005)
between dominant forms occurs over an extended period
of time and as the result of numerous hybridizations. Hyperbolic Multi-Dimensional Scaling (HMDS)
(Gordon & Mulligan, 2005) Laying out objects in the H2 such that the spatial
arrangement resembles the dissimilarity structure of the
Hybrid Multiple-Access (Hybrid MA) data as close as possible. (Walter, 2005)
A class of multiple-access consisting of a combination
of controlled multiple-access and free multiple-access. Hyperbolic Tree Viewer
(Markhasin et al., 2005) Visualizes tree-like graphs in the Poincar mapping of
the H2 or H3. (Walter, 2005)
Hybrid Organizational Memory
An organizational memory whose contents are expressed HyperClass 1
by means of languages presenting different levels of 1: Classes, lectures, seminars, and tutorials that take
formality (formal, semi-formal, informal). Such memories place in a co-action ield in HyperReality. This means
contain textual resources (be they structured or not, and an interaction between virtual teachers and students
either mono- or multimedia) as well as formal semantic and objects, and physically real teachers and students
resources (annotations and ontologies). (Fortier & Kassel, and objects to learn how to apply a speciic domain of
2006) knowledge. It allows for the use of artiicially intelligent
tutors. Such systems are currently experimental, but have
Hybrid Peer-to-Peer Networks the potential to be used on the Internet. (Rajasingham
In hybrid peer-to-peer networks, no ixed central server & Tifin, 2005) 2: Intermixing a real classroom and a
but dynamic supernodes are present to provide directory virtual classroom where a real teacher and students and
services, serving a group of peers and relecting only a a virtual teacher and students come together and hold a
partial view of the whole network. (Kwok et al., 2006) class. (Terashima, 2005)

Hybrid Replication Hyperlink


A replication technique using protocols that may either 1: A structural unit that connects a Web page to a different
behave as eager or as lazy, depending on the given system location, either within the same Web page or to a different
coniguration. (Muoz-Esco et al., 2005) Web page. A hyperlink that connects to a different part of
the same page is called an intra-document hyperlink, and
Hybrid System a hyperlink that connects two different pages is called an
1: The integration of two or more artiicial intelligence tools inter-document hyperlink. (Mobasher, 2005a) 2: A link
to improve eficiency or system performance. (Begg, 2005) in a document to information within the same document
2: This systems evolution in time is composed by both or another document. These links are usually represented
smooth dynamics and sudden jumps. (Liberati, 2005) by highlighted words or images. (Lee-Post & Jin, 2005a)
3: A selectable connection from one word, phrase,
Hybrid Technique picture, or information object to another. By clicking on a
A combination of two or more soft computing techniques hyperlink, a Web user can move easily from one Web page
used for data mining. Examples are neuro-fuzzy and to another page. The most common form of hyperlink is
neuro-genetic. (Bala et al., 2005) the highlighted word, phrase, or picture. (Hu , Yang, Yeh,
et al., 2005) 4: Text or graphics that can be clicked on to
Hybrid Transformer view other information. (Falk & Sockel, 2005)
Device used to connect two one-directional with one bi-
directional channel, keeping uncoupled among them the Hyperlink Analysis
two one-directional channels. (Perez-Meana & Nakano- Also called link analysis, this is the analysis of Web
Miyatake, 2005) hyperlinks for the purpose of identifying communities

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H ype r m e dia H ype r t ex t 311

underlying the Web pages or hyperlinking practices within brought together through the communication networks,
Web communities. (Thelwall, 2006) and work or play together as if they were at the same place.
(Terashima, 2005)
H
Hypermedia
1: Often taken as synonymous with hypertext, though HyperSchool/HyperCollege/HyperUniversity
some authors use hypermedia to refer to hypertext The term hyper means that these institutions could exist
systems that contain not just text data, but also graphics, in HyperReality. HyperReality is where virtual reality and
animation, video, audio, and other media. Principal physical reality seamlessly intersect to allow interaction
deining features of a hypermedia system are a highly between their components, and where human and artiicial
interactive, visual, media-rich user interface and lexible intelligences can communicate. The technological
navigation mechanisms. Hypermedia is a specialized capability for this is at an experimental stage, but could
type of interactive digital multimedia. (M. Lang, 2005) be made available with broadband Internet. (Rajasingham
2: A term used to describe the interlinking of textual & Tifin, 2005)
information and other forms of media, such as audio,
video, and photographic images. (Theng, 2005) 3: A Hyperspace
computer-based information retrieval system that enables 1: Information spaces interlinked together with hypermedia
a user to gain or provide access to texts, audio and video structures. Concerning the World Wide Web, the term
recordings, photographs, and computer graphics related to cyberspace is sometimes used instead of hyperspace. (Suh
a particular subject. (Rahman, 2005c) 4: An extension of & Kim, 2005) 2: Space with more than three dimensions.
hypertext that supports linking graphics, sound, and video (Murphy, 2005b) 3: Users view of the Semantic Web
elements, in addition to text elements. (Sala, 2005b) 5: The environment, which provides information and action
style of building systems for information representation services mainly through hypermedia pages. (Liu &
and management around the network of multimedia nodes Koppelaar, 2005)
connected together by typed links. (Garca et al., 2006)
6: A way of organizing data as a network of nodes and Hypertext
links. (Lemahieu, 2005) 1: Any text that contains links to other documents. (Lee-
Post & Jin, 2005a) 2: A collection of documents containing
Hypermedia Authoring Tool cross-references that, with the aid of a browser program,
Authoring tools for hypermedia systems are meant to allow the reader to move easily from one document to
provide environments where authors may create their another. (Vician & Buche, 2005) 3: A collection of electronic
own hypermedia systems in varying domains. (Garca texts connected through electronic links. In addition to
et al., 2006) text, the documents also may contain pictures, videos,
demonstrations, or sound resources. With the addition of
Hypermedia Design Methodology (HDM) such media, hypertext often is referred to as hypermedia.
1: Developed by Polytechnic of Milan (Italy), it is a (Shapiro, 2006) 4: A term conceived and coined by Ted
methodology to design hypermedia applications. (Paiano, Nelson, who described it as interactive branching of
2005) 2: The modeling language used by W2000 to describe text information structured into non-sequential format
the information, navigation, and presentation aspects of a into nodes and links. The nonlinear nature of hypertext
hypermedia application. (Bochicchio & Fiore, 2005) provides freedom to readers who enjoy associational
thinking and reading. (Theng, 2005) 5: An approach to
Hypermedia-Based Learning information management in which data is stored as a
Learning in hypermedia environments, allowing nonlinear network of inter-related nodes (also commonly known
access to information through links provided within text, as documents or pages) that may be purposefully
images, animation, audio, and video. It is considered navigated or casually browsed in a nonlinear sequence by
lexible, where varied instructional needs can be addressed. means of various user-selected paths, following hyperlinks.
(Chambel & Guimares, 2005) These hyperlinks may be hardcoded into the system or
dynamically generated at run-time. (Lang, M., 2005)
HyperReality 6: The presentation of information as a linked network
Providing a communication environment where of nodes that readers are free to navigate in a nonlinear
inhabitants, real or virtual, at different locations, are fashion. It allows for multiple authors, a blurring of the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
312 H ype r t ex t M a rk up La ngua ge (H T M L) H ypot he sis Te st (i ng)

author and reader functions, extended works with diffuse Hypertext Structure
boundaries, and multiple reading paths. (Sala, 2005a) 7: Organization structure described by Nonaka, distinguishing
H The organization of information units as a network of a functionally organized, hierarchical, and bureaucratic
associations, which a user can choose to resolve. Hypertext business system layer for regular knowledge exploitation; a
links are the instances of such associations. (Martnez- project layer for development work; and a knowledge base
Gonzlez, 2005) layer connecting the irst two layers. (Hendriks, 2006)

Hypertext Markup Language (HTML) Hypertext Transfer Protocol (HTTP)


1: A language used to organize and present content on The underlying protocol used by the World Wide Web.
Web pages. HTML uses tags such as <h1> and </h1> to HTTP deines how messages are formatted and transmitted
structure text into headings, paragraphs, lists, hypertext between Web servers and browsers. (Cardoso, 2006)
links, and so forth. (Burgstahler, 2005b) 2: A markup
language used to structure text and multimedia objects, Hypertext-Induced Topic Selection (HITS)
as well as set up links between documents. This language A Web graph mining algorithm to compute authority scores
is used extensively on the Internet and can be viewed in and hub scores for Web pages. (Wen, 2005b)
a Web browser. (Nightingale, 2005) 3: A set of tags used
to structure text and multimedia documents, and to set Hypervideo
up hypertext links between documents, most commonly 1: Indexed video enriched with hypertextual and
on the World Wide Web. (Fagan, 2005) 4: A standard multimedia elements. It is a fast and effective way to
language for representing text, formatting speciications navigate in long video clips and to ind out the main
and hyperlinks. (Yen, 2005) 5: The authoring language content of the video. (Bochicchio & Fiore, 2005) 2: Refers
used to create documents on the World Wide Web. HTML to the integration of video in truly hypermedia spaces,
deines the structure and layout of a Web document by where it is not regarded as a mere illustration, but can
using a variety of tags and attributes. HTML is derived also be structured through links deined in its spatial and
from SGML, although it is not a strict subset. (Valenti, temporal dimensions. Sometimes called video-based
2005) 6: HTML was originally developed for the use of hypermedia. (Chambel & Guimares, 2005)
plain text to hide HTTP links. (Clayton, 2006a) 7: The
language in which most pages on the World Wide Web HyperWorld
are written. These pages can be read using a browser. Intermixing a real world and a virtual world seamlessly.
(Dasgupta & Chandrashekaran, 2005) 8: A hypertext (Terashima, 2005)
document format used on the World Wide Web. HTML
is an application of the Standard Generalized Markup Hyponymy/Hypernymy
Language (SGML). Tags embedded into the text describe A particular interschema property. Concept A is said to be
certain properties of the text elements and can include a hyponym of a concept B (which, in turn, is a hypernym
other elements such as links to HTML pages or to other of A), if A has a more speciic meaning than B. (De Meo
resources such as images. HTML is a recommendation et al., 2005b)
of the W3C. (Chang, 2005) 9: Markup language that
uses tags in pairs of angle brackets, for identifying and Hypothesis
representing the Web structure and layout through Web One of a particular set or class of candidate functions
browsers; it is not a procedural programming language before you begin to learn the correct function. (Awad &
like C, Fortran, or Visual Basic. (Suh & Kim, 2005) 10: Khan, 2005)
The most often-used coding language used on the World
Wide Web. It uses basic word processing tags to specify Hypothesis Test(ing)
formatting, linking, and so forth during the creation of Web 1: A formal statistical procedure by which an interesting
pages. HTML requires no special Web layout software. hypothesis (the alternative hypothesis) is accepted or
(Szabados & Sonwalkar, 2005) 11: A language based on rejected on the basis of data. (Mukherjee, 2005) 2: The
labels to describe the structure and layout of a hypertext. process of using statistical analysis to determine if the
(Sindoni, 2005b) observed differences between two or more samples are due

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H ypot he t ic a l Re a soning H ypot he t ic o-De duc t ive Re a soning 313

to random chance (as stated in the null hypothesis) or to


true differences in the samples (as stated in the alternate
hypothesis). (Tan & Zhao, 2005a)
H
Hypothetical Reasoning
The process of creating hypothetical scenarios based on
hypotheses and hypothetical assertions, and of exploring
the hypothesis space for results of given queries. (Dang
& Embury, 2005)

Hypothetical Update (HU)


A proposed update that will not be applied on the real
database, but the hypothetical effect of which we wish to
explore. (Dang & Embury, 2005)

Hypothetico-Deductive Reasoning
In a particular situation, applying relevant knowledge of
principles and constraints, and visualizing, in the abstract,
the plausible outcomes that might result from various
changes one can imagine to be imposed on the system.
(Donnelly, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
314 i-m at e I CM

I
i-mate IBSS: See Independent Basic Service Set.
A PDA device manufactured by Carrier Devices with an
integrated GSM cellular phone and digital camera. The IBT: See Identiication-Based Trust.
device also incorporates a built-in microphone and speaker,
a secure digital expansion card slot, and Bluetooth wireless IC: See Integrated Circuit; Intellectual Capital;
connectivity. (Garrett, 2006a) Interaction Channel.
.
i-mode ICA: See Independent Component Analysis.
1: A packet-switching wireless technology, used by NTT
DoCoMo (Japan). A range of commercial and inancial ICALL: See Intelligent Computer-Assisted Language
services are offered, including browsing the Web from Learning.
a mobile phone. (Petrova, 2006) 2: A wireless Internet
service for mobile phones using HTTP, popular in Japan and ICAT:
increasingly elsewhere (i.e., the United States, Germany, Internet Categorization of Attacks Toolkit. (Cardoso &
Belgium, France, Spain, Italy, Greece, Taiwan, etc.). It was Freire, 2005)
inspired by WAP, which was developed in the U.S., and it
was launched in 1999 in Japan. It became a runaway success ICD-10: See International Statistical Classiication of
because of its well-designed services and business model. Diseases and Related Health Problems, Tenth Revision.
(Lalopoulos et al., 2005a) 3: Brand name for voice plus a
wide range of data services delivered by NTT DoCoMo ICDL: See International Computer Driving License.
in Japan. (Gilbert, 2005b) 4: The full-color, always-on,
packet-switched Internet service for cellular phone users Iceberg Cubes
offered by NTT DoCoMo. With i-mode, cellular phone The set of cells in a cube that satisies an iceberg query.
users are able to access to tens of thousands of Internet (Abdulghani, 2005b)
sites, as well as specialized services such as e-mail, online
shopping and banking, ticket reservations, and restaurant Iceberg Distance Join
advice. (Hu, Yang, & Yeh, 2006) 5: The packet-based A spatial query involving two spatial datasets, a distance
service for mobile phones offered by Japans leader in threshold d, and a cardinality threshold K (K1). The
wireless technology, NTT DoCoMo. The i-mode protocol answer is a set of pairs of objects from the two input datasets
uses compact HTML (cHTML) as its markup language that are within distance d from each other, provided that
instead of WAPs wireless markup language (WML) to the irst object appears at least K times in the join result.
provide mobile phone voice service, Internet, and e-mail. (Corral & Vassilakopoulos, 2005)
(Lei, 2006)
Iceberg Query
IAB: See Internet Architecture Board. A query on top of a cube that asks for aggregates above
a certain threshold. (Abdulghani, 2005b)
IB: See Integration Broker.
ICM: See Intellectual Capital Management.
IBL: See Inquiry-Based Learning.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I CM P M e ssa ge I DEF0 N ot at ion 315

ICMP Message: See Internet Control Message Protocol ICT-Based Development Projects: See Information
Message. and Communication Technology-Based Development
Projects.
I
ICMS: See Intellectual Capital Management System.
ICT-Enabled Knowledge Management: See
Icon Information and Communication Technology-Enabled
1: In computer science, the icon is a graphic symbol (usually Knowledge Management.
a simple picture) that denotes a program, command,
data ile, or concept in a graphical user interface. (Sala, ICT Indicator: See Information and Communication
2005b) 2: A principal feature of GUIs, an icon is a small Technology Indicator.
picture representing an object, ile, program, user, and so
forth. Clicking on the icon will open whatever is being ICT in E-Procurement: See Information and
represented. (Henley & Noyes, 2006) Communication Technology in E-Procurement.

ICR: See Intelligent Call Routing. ICT in Teaching: See Information and Communication
Technology in Teaching.
ICT: See Information and Communication Technology.
ID: See Instructional Design.
ICT Alliance: See Information and Communication
Technology Alliance. Idea-Generation Tool
A technology designed to stimulate thinking and
ICT Architecture: See Information and Communication association. Enables users to detect hidden patterns from
Technology Architecture. mounds of data and discover relationships among entities.
(Chua, 2006)
ICT as a Cognitive Partner: See Information and
Communication Technology as a Cognitive Partner. Ideal Model
A virtual setting where all parties interact with an
ICT Diffusion: See Information and Communication incorruptible trusted party who carries out the joint
Technology Diffusion. computation for them. (Lindell, 2005)

ICT Infrast ruct ure: See Infor mation and Ideal Type
Communication Technology Infrastructure. An abstraction from the particulars and the idiosyncrasies
of the world which produce statements of general validity,
ICT Integration: See Information and Communication and we know some part of the world because of its character
Technology Integration. as ideal typical knowledge. (Shariq & Vendel, 2006)

ICT Level of Knowledge: See Information and Ideal Vision


Communication Technology Level of Knowledge. A statement, in measurable terms, that describes where we
are headed and how to tell when we have arrived in terms
ICT Planning in Schools: See Information and of societal value added. (Kaufman & Lick, 2005)
Communication Technology Planning in Schools.
IDEF0 Notation
ICT Sector: See Information and Communication Boxes within a diagram depict the sub-activities of the
Technology Sector. activity named by the diagram. Arrows between boxes
depict availability of work products to activities. Arrows
ICT Selection: See Information and Communication entering the left side of a box are inputs to the activity.
Technology Selection. Arrows exiting the right side of a box are outputs from the
activity. Arrows entering the top of a box are controls that
ICT Seva Kendra: See Information and Communication regulate the activity, and those entering the bottom are
Technology Seva Kendra. mechanisms that support the activity. (Leung, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
316 I DEF1 X I EEE 8 0 2 .1 1 b

IDEF1X billed. (Friedman, 2005) 2: Pretending to be someone or


One of the IDEF tools developed by Integrated Computer- some category of person that one is not. (Rowe, 2006d)
I Aided Manufacturing (ICAM), it is a formal framework 3: The act of using someone elses personal information
for consistent modeling of the data necessary for the such as name, PIN, or even biometric data without
integration of various functional areas in computer- her/his knowledge for malicious purposes. (Li, 2006) 4:
integrated manufacturing. (Ma, 2005a) The stealing and use of a persons identity through the
acquisition of personal information without that persons
Identiication knowledge or permission. (Szewczak, 2005)
1: A one-to-many matching process for establishing the
identity of the user if the submitted biometric sample Idiographic
matches one of the registered templates. (Li, 2006) 2: A An approach focusing on the subjective experiences of
user is not compelled to claim an identity irst; instead, the individual, and presenting results in expressions and
the biometric is scanned and then matched against all the terms used by the individual. The resulting RepGrid is
templates in the database (also referred to as recognition). considered unique in that there are no common elements
(Lowry, Stephens, et al., 2005) 3: A condition where the or constructs employed in the elicitation process across
interests of the individual merge with the interests of the sample. (Tan & Hunter, 2005)
the organization, resulting in the creation of an identity
based on those interests. (Kankanhalli et al., 2006) 4: Idiomatic Expression
The process in which an individual comes to see an A phrase associated with a particular, non-literal meaning.
object (e.g., an individual, group, organization) as being (St.Amant, 2005d)
deinitive of oneself and forms a psychological connection
with that object. Although scholars have offered a variety I-DMSS: See Integrated Decision-Making Support
of conceptual deinitions for identiication, we view it System; Intelligent Decision-Making Support System.
as a communicative process, rooted in discourse and
constituting a communicative expression of ones identity. IDS: See Internet Discussion Site; Intrusion-Detection
(Connaughton, 2005) System.

Identiication-Based Trust (IBT) IEE: See Innovation Engineering Environment.


1: Trust that is grounded in mutual understanding and
appreciation of each others wants, desires, and intentions. IEEE 802.11
(Wang & Gwebu, 2006) 2: The third stage of trust is 1: A family of speciications developed by the IEEE for
built on empathy and shared values; team members can wireless LAN technology. 802.11 speciies an over-the-
completely rely on each other. (Lettl et al., 2006) air interface between a wireless client and a base station
or between two wireless clients. The IEEE accepted the
Identity speciication in 1997. (Bose et al., 2005) 2: A family of IEEE
1: A thing to represent or identify oneself to the other party standards for wireless local area networks. (Hu, 2005)
or audience. (Park, 2006) 2: The degree of identiication of
the individual members with the community or network, IEEE 802.11b/a/g
and thus also an indicator for the identiication of a Generally refers to wireless LAN standards. The IEEE
community or network as such; strong or weak identity 802.11b is the wireless LAN standard with a maximum
show the identiication of the members as a group and their bandwidth of 11Mbps operating at 2.4GHz. The IEEE
sense of community. (Meller-Prothmann, 2006a) 802.11a is the high-speed wireless LAN with a maximum
bandwidth of 54Mbps operating at 5GHz. The IEEE 802.11g
Identity Theft is backward compatible with the IEEE 802.11b, with a
1: The act of a person who successfully pretends to be maximum bandwidth of 54Mbps operating at 2.4GHz.
another person for the purpose of committing fraud. (Sarkar, 2005)
An identity thief discovers some bit of your personal
information and appropriates it for him/herself without IEEE 802.11b
your knowledge to acquire a privilege (e.g., driving license), An established protocol or standard for wireless networking.
some property, or some service for which the victim is (Wilsdon & Slay, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I EEE 8 0 2 .1 x St a nda rd I m a ge Copyright 317

IEEE 802.1x Standard Ill-Structured Problem


A standard that deines port-based network-access control. A learning challenge of a complex nature with no one
It is used to provide authenticated network access for local right answer. (Molinari, 2005)
I
area networks and, using some extensions, for wireless
networks. (Knight & Labruyere, 2005) Illumination Model
A mathematical formula for calculating the amount of
IEEE Learning Technologies Standards diffuse light, ambient light, and specular relection that
Committee (LTSC) contributes to the color value that will represent a particular
The LTSC was set up by IEEE to develop standards, and surface point on the screen. (Cottingham, 2005)
to recommend practices and guides for anyone developing
tools and content for the e-learning market. Standards Illusory Shape Emergence
developed under the auspices of IEEE-LTSC will be In illusory shape emergence, contours deining a shape
put forward to ISO for full standardization. The most are perceived even though no contours are physically
signiicant contribution from the IEEE-LTSC has been present. Here set theory procedures are not enough and
the draft standard for Learning Object Metadata (LOM), more effective procedures have to be applied to ind these
the committees implementation of the IMS metadata hidden shapes. (Deb, 2005)
speciication. This has emerged as the most mature of all
the emerging standards. (Gordon & Lin, 2005) ILE: See Interactive Learning Environment.

IEEE LOM ILP: See Inductive Logic Programming.


IEEE 1484.12.1 Standard for Learning Object Metadata.
The standard speciies the syntax and semantics of IM: See Instant Message; Instant Messaging.
learning object metadata, deined as the attributes required
to fully/adequately describe a learning object. Learning Image:
objects are deined here as any entity, digital or non-digital, As deined in image theory, a meaningful visual form,
which can be used, reused, or referenced during technology- perceptible in a minimum instant of vision. (Crossland,
supported learning. (Sicilia & Snchez-Alonso, 2006) 2005)

IEEE LTSC: See IEEE Learning Technologies Standards Image Analysis


Committee. An important layer of image engineering concerned
with the extraction of information (by meaningful
IETF: See Internet Engineering Task Force. measurements with descriptive parameters) from an image
(especially from interesting objects), with the goal of inding
IFADIS: See Integrated Framework for the Analysis of what objects (based on identiication, recognition, and
Dependable Interactive Systems. classiication) are present in the image. (Zhang, 2005c)

IFIR Structure Image Classiication


The cascade of the expanded shaping or model ilter G(zM) Classifying a new image, according to the image content,
and the interpolator I(z). (Jovanovic-Dolecek, 2005c) to one of the predeined classes of images (supervised
classiication). (Swierzowicz, 2005)
IGMP: See Internet Group Management Protocol.
Image Clustering
IIR Filter: See Ininite Impulse Response Filter. Classifying a new image into an image cluster according
to the image content (e.g., color, texture, shape, or their
Ill-Formed XML Document combination) without a priori knowledge (unsupervised
A document lacking any ixed and rigid structure. (Nayak, classiication). (Swierzowicz, 2005)
2005b)
Image Copyright
The rightful ownership of an image. (Chen, Chen, Ma,
et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
318 I m a ge Dat a M ining I m m e diat e M a int e na nc e

Image Data Mining primarily includes the acquisition, representation,


A process of inding unusual patterns, and making compression, enhancement, restoration, and reconstruction
I associations between different images from large image of images. All of these treatments are concerned with the
databases. One could mine for associations between manipulation of an image to produce another (improved)
images, cluster images, classify images, as well as detect image. (Y.J. Zhang, 2005b)
unusual patterns. (Oh et al., 2005)
Image Processing Technique
Image Engineering A group of techniques concerned with the manipulation of
A general discipline that encompasses all techniques for an image to produce another (improved) image. It primarily
treating images. It could be referred to as the collection of includes the acquisition, representation, compression,
three related and partially overlapped categories of image enhancement, restoration, and reconstruction of images.
techniques, that is, image processing (IP), image analysis (Y.J. Zhang, 2005a)
(IA), and image understanding (IU). It is a broad subject
encompassing studies of mathematics, physics, biology, Image Resolution
physiology, psychology, electrical engineering, computer The degree of discernible details of an image. It strongly
science, automation, and so forth. (Y.J. Zhang, 2005a) depends on the number of samples and gray levels used in
the digitization stage and then used for the representation
Image Feature of this image. (Y.J. Zhang, 2005a)
1: A structure in the image with interesting characteristics.
Examples of features are single points, curves, edges, lines, Image Retrieval
surfaces. (Aifanti et al., 2005) 2: One of a number of discrete Retrieving an image according to some primitive (e.g.,
properties of images that can be local or global. Examples color, texture, shape of image elements) or compound
of local features include edges, contours, textures, speciications (e.g., objects, given type, abstract attributes).
and regions. Examples of global features include color (Swierzowicz, 2005)
histograms and Fourier components. (Caelli, 2005)
Image Sampling and Quantization
Image Format To be suitable for computer processing, an analog image
Used to permanently store graphical content, based on obtained from a scene must be digitized both spatially
the use of raster graphics or vector graphics. (Rosenbaum and in amplitude. Digitization of the spatial coordinates
et al., 2006) is called image sampling, and amplitude digitization is
called gray-level quantization. (Y.J. Zhang, 2005a)
Image Indexing
1: Assigning concise and signiicant descriptors to an Image Score
image. Objects shapes and positions are used in several An image obtained from a page of music sheet, it can
indexing approaches where image is represented as a graph include a main score or a part. (Nesi & Spinu, 2005)
or tree (R-tree, B-tree, etc.). (Chbeir & Yetongnon, 2005) 2:
Fast and eficient mechanism based on dimension reduction Image Understanding
and similarity measures. (Swierzowicz, 2005) The process of interpreting images in terms of what is
being sensed. (Caelli, 2005)
Image Mining
Extracting image patterns not explicitly stored in images Imagesetter
from a large collection of images. (Swierzowicz, 2005) An output device used primarily to generate ilms for the
production of printing plates. (Snyder, 2005)
Image Processing (IP)
1: Processing technique algorithms designed to enhance IMM: See Interactive Multimedia Method.
and manipulate an image. (Andrs del Valle, 2005) 2: A
research area detecting abnormal patterns that deviate Immediate Maintenance
from the norm, and retrieving images by content. (Oh et al., The policy of performing database maintenance operations
2005) 3: The irst of the three layers of image engineering; as soon as their need becomes evident. (Sindoni, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I m m e rsion I m ple m e nt at ion Risk 319

Immersion Imperceptibility
1: A quality of a system, usually a computer-generated After a message is hidden in a carrier, it is dificult for a
world consisting of a set of technological factors that viewer or listener to distinguish between the carrier that
I
enable users to experience the virtual world vividly and contains the hidden message and those that do not. (Lou
exclusively. (Sas, 2006) 2: Relects the degree to which a et al., 2006)
community members behavior is dominated by the state
of low caused by human-machine interaction. (Signoret, Imperceptible
2006) Not easily detectable with the human visual system. (Chen,
Chen, Ma, et al., 2005)
Immersion School
A language or culturally based school that allows students Imperfect Knowledge
to study all or most subjects in a language other than their The imperfection of knowledge has to do with its
own. These are typically schools within a school district incompleteness (absence of a value), with its imprecision
or programs within a particular school. (Glick, 2005b) (lack of precision in a value), and with its uncertainty (doubt
on the truthfulness of a fact). (Analide et al., 2006)
Immersive IntraVascular UltraSound (IVUS)
Image Implementation
The real-time cross-sectional image obtained from a 1: The code placed inside of methods. For some languages,
pullback IntraVascular UltraSound transducer in human this code is pre-compiled or interpreted. (D. Brandon,
arteries. The dataset is usually a volume with artifacts Jr., 2005a) 2: The implementation of information system
caused by the complicated immersed environments. (Liu includes different phases: user needs and requirements
et al., 2005) analysis (speciication), system design, and initial system
implementation and testing. The system requirements
Immersive IVUS Image: See Immersive IntraVascular analysis includes worklow analysis; the initial system
UltraSound Images. implementation includes technical installation of
information system, integration of the information
Immersive System system to other information systems, and users training.
A system that provides the graphical illusion of being in (Hyrinen & Saranto, 2005)
a three-dimensional space by displaying visual output in
stereo and in a three-dimensional perspective according Implementation of an Innovation
to head position, and by allowing navigation through the The process of mutually itting innovation and organization
space. (Modrk & Marcn, 2006) to one another until the it is so good that the (former)
innovation is routine. (Klobas & Renzi, 2005a)
Impacted Domain
The area affected by a change to the pivot domain. (Abou- Implementation Quality
Zeid, 2005a) The outcome of an IT installation in an organization,
where operational success can be indicated by increased
Impaired Learner internal organizational performance and eficiency, better
A learners hampered by physical or psychological customer service, and higher quality working life within
deiciencies. (Utsi & Lowyck, 2005) the organization, although other traditional indicators
are increased proits, greater market share, and improved
Imperative Mode return on investment performance. (Winston & Dologite,
Command-oriented languages such as Fortran and Cobol 2005)
that use the commands, DO, GO TO, and so forth. (Murthy
& Krishnamurthy, 2005c) Implementation Risk
A risk derived from poor business practices such as
Imperative or State-Oriented Formal Speciica- lack of training, lack of uniform standards, quality, and
tion Language procedures that causes dissatisfaction among trading
Allows the use of variables. (Dasso & Funes, 2005) partners. (Ratnasingam, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
320 I m plic it Edit I n-Se r vic e

Implicit Edit Impulse Response h(n)


An unstated edit derived logically from explicit edits that The response of a digital ilter to a unit sample sequence,
I were written by a subject matter specialist. (Conversano which consists of a single sample at index n = 0 with unit
& Siciliano, 2005) amplitude. (Jovanovic-Dolecek, 2005c)

Implicit Function Imputation


When used in 3D shape modeling, implicit functions f(x, The method of illing in missing data that sometimes
y, z)=0 deine a 3D surface of the shape. For example, an preserves statistical distributions and satisfies edit
origin-centered sphere with radius 5 is deined with 52- restraints. (Winkler, 2005)
x2-y2-z2=0. (Sourin, 2006)
IMS: See Inst r uctional Management System;
Implicit (Tacit) Knowledge Instructional Management Speciication.
1: A type of knowledge that is stored in the minds of
individuals in the form of memory, skills, experience, IMSI: See International Mobile Subscriber Identity.
education, imagination, and creativity. (Aurum &
Demirbilek, 2006) 2: Knowledge not explicitly given in In Degree
the knowledge base but derivable from it using various The number of Web pages that link to the current Web
assumptions. (Grant & Minker, 2006) 3: Knowledge page. (Chen, Tsai, et al., 2005)
acquired through experience and task execution, where
it helps individuals in performing their work. (Qayyum, In-Group Trust
2005) 4: Knowledge that is uncodiied and dificult to Communities of people that have similar beliefs, values,
diffuse. It is hard to verbalize because it is expressed and personality traits induced by cultural forces and are
through action-based skills and cannot be reduced to more willing to identify members inside their group as
rules and recipes. Implicit knowledge is the same as tacit trustworthy. Individuals within these communities obtain
knowledge. (Herschel, 2005) role models and opinion leaders within their group that
inluence individuals beliefs and behavior to include
Implicit Team Process buying decision processes. (Carstens, 2005)
A set of largely unverbalized, tacit communication and
coordination behaviors, founded on shared understanding In-Network Processing
of members roles/abilities and task/situational demands. A technique employed in sensor database systems
Example: Member A provides Member B with backup whereby the data recorded is processed by the sensor
assistance without being asked. (Cuevas et al., 2005) nodes themselves. This is in contrast to the standard
approach, which demands that data is routed to a so-called
Import Restriction sink computer located outside the sensor network for
One of a number of restrictions on the type, quantity, or processing. In-network processing is critical for sensor
origin of goods that can be imported into a country. (D. nodes because they are highly resource constrained, in
Brandon, Jr., 2005b) particular in terms of battery power, and this approach
can extend their useful life quite considerably. (Roussos
Impression Building & Zoumboulakis, 2005)
Portraying outcomes of endeavors as highly positive
achievements to promote an image of competence and In-Service
success. (Sipior, 2005) Brief and/or short-duration training for practicing teachers
that tends to be informative (about new mandates, for
Impulse Response example). Delivery tends to be traditional, and attendees
The time domain characteristic of a ilter; represents the must determine for themselves how the data relates to
output of the unit sample input sequence. (Jovanovic- their situation(s) or discipline(s). Follow-up is rare, as is
Dolecek, 2005a) any effort to collect evidence of change practices. (Bober,
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I na pplic a ble Re sponse I nc om ple t e Cont ra c t (Flex ibilit y) 321

Inapplicable Response (or multiple places in the same program). (D. Brandon,
Respondents omit an answer due to doubts of applicability. 2005a)
(Brown & Kros, 2005)
I
Inclusion
Incentive A classroom design where all students should take part
1: An intrinsic or extrinsic motivational factor that impacts and attend regular classes. Generally, an ESE and
faculty decisions to participate in distance education. regular education teacher work together with the same
(Dooley et al., 2005) 2: An attractive inducement offered group of students, including students with disabilities
to providers of services to be more eficient. (De, 2005) 3: and general education students. Both of the teachers share
Any factor that inluences action or behavior by its presence the responsibility for all of the students. (T. Cavanaugh,
or absence. (Marcinkiewicz & McLean, 2005a) 2005)

Incentive Regulation Inclusion Dependency


Simply stated, it refers to a variety of regulatory approaches 1: A pattern between two databases, stating that the values
(starting with price caps) that attempt to provide or in a ield (or set of ields) in one database form a subset
enhance incentives for utilities to operate more eficiently. of the values in some ield (or set of ields) in another
Incentive regulation is a response to the limits of the database. (Koeller, 2005) 2: The existence of attributes
traditional rate of return regulation, which set rates so in a table whose values must be a subset of the values
as to cover operating expenses and ensure a reasonable of the corresponding attributes in another (or the same).
return on invested capital. This was administratively Expressed as R[X]S[Z]. R and S are relation names
cumbersome, detrimental to eficiency, and subject to the (possibly the same); R[X] and S[Z] are named the inclusion
risk of overcapitalizations. (Arbore, 2005) dependencys left and right sides respectively. X, Z are
compatible attributes. (Rivero, 2005) 3: Let R and S be
Incentive Structure two record types (not necessarily distinct) and X and Y be
The material or symbolic reward or punishment mechanism sequences of attributes of R and S, respectively, such that
that organizations apply in order to encourage or discourage the numbers of attributes in X and Y are identical. We say
a certain organizational behavior, for example, the sharing that the inclusion dependency (IND), R[X] S[Y], holds at
of knowledge, skills, or insights with other members of time t if at time t, for each R record r, an S record s exists
the organization. (Ekbia & Hara, 2006) such that r[X] = s[Y]. (Tan & Zhao, 2005b)

Incentives and Rewards Inclusive Design


To encourage knowledge sharing, incentives and rewards The design of mainstream products and/or services that are
are offered. Research has established that intrinsic rewards, accessible to and usable by as many people as reasonably
such as being recognized and being encouraged to possible on a global basis, in a wide variety of situations,
participate in decision making, are powerful motivators. On and to the greatest extent possible without the need for
the other hand, it is argued that with internal competition, special adaptation or specialized design. (Keates et al.,
knowledge workers would be very cautious about openly 2006)
sharing their knowledge with colleagues so not to give up
individual advantages. (Fink & Disterer, 2006) Inclusiveness
Both a value and a design processthat is, inclusive
Incidental Impact environments are purposefully designed to address
Impact that is un-planned; by-product of a systems accessibility challenges and to make resources and services
development process that had not, or could not, have available to the broadest (and most diverse) possible
been envisaged at the projects outset. (Doherty & King, audience. An approach based on inclusiveness is also
2005) known as universal instructional design and user-centered
design. (Campbell, 2005)
Include
Some code stored separately from the main body of a Incomplete Contract (Flexibility)
program, so that this code can be used in many programs Most outsourcing contracts are incomplete since rapidly
changing technology, uncertainty (i.e., complexity), and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
322 I nc om ple t e Dat a I nde pe nde nt Ba sic Se r vic e Se t (I BSS)

organizational environments make it so dificult to specify Incremental Growth Framework


every contingency in the contract. (Khalfan et al., 2005) A methodology for incrementally expanding a distributed
I database system. A new data allocation is computed with
Incomplete Data the introduction of each new server. (Chin, 2005)
The data set for data mining contains some data entries
with missing values. For instance, when surveys and Incremental Innovation
questionnaires are partially completed by respondents, The generation of new ideas (new knowledge) that leads to
the entire response data becomes incomplete data. (H. the incremental development of new products or services
Wang & S. Wang, 2005) that build on existing practices. (Newell, 2006)

Inconsistency Incremental Mining


Database state that does not relect a real-world state. In most real-life applications, the data are incrementally
(Rivero, 2005) accumulated in the database, and not completely altered
overnight. This makes it possible to use the previously
Inconsistency Tolerance mined rules for updates, rather than reforming new ones.
The strategy that lets a system answer and process data (Nigro & Gonzlez Csaro, 2005a)
despite the fact that databases are inconsistent. (Rodrguez-
Tastets, 2005a) Incubator Program
A form of collaboration usually between the industry,
Inconsistent Database corporations, and the business community and educational
A database violating some integrity constraint. (Flesca sector, aiming at identifying industry and market needs,
et al., 2005a) catering for these needs, and creating employment
opportunities for the society, especially young graduates.
Incorporation by Reference (Kamel, 2005a)
To make one document a part of another by identifying the
document to be incorporated, with information that allows Independence
the recipient to access and obtain the incorporated message 1: The ability and willingness of a group to work with
in its entirety, and by expressing the intention that it be minimal input from an instructor. (Ingram & Hathorn,
part of the incorporating message. Such an incorporated 2005a) 2: The independence of a group from a central
message shall have the same effect as if it had been fully authority, such as an instructor or manager, ensures that
stated in the message. (Mitrakas, 2005) the group can truly collaborate among themselves and
produce results that are unique and new. (Ingram, 2005)
Incoterm 3: Views V1 and V2 are conditionally independent given
One of a standard set of international logistic acronyms. the class if for all x = (x1,x2), P(x1,x2| y) = P(x1| y)P(x2|y).
(D. Brandon Jr., 2005b) (Scheffer, 2005)

Incremental Cost Independent


The cost of providing a speciic service over a common Two random variables are independent when knowing
network structure. (Hackbarth et al., 2005) something about the value of one of them does not yield
any information about the value of the other. (Bashir et
Incremental Development al., 2005)
An approach to software development in which fully
working versions of a system are successively delivered Independent Basic Service Set (IBSS)
over time, each new increment (version) adding to and A WLAN architecture (also called ad hoc) in which
upgrading the functionality of the previous version. May each network unit has both AP and station-computer
be used in conjunction with timeboxing, whereby a functionality. (Pulkkis, Grahn, & Karlsson, 2005)
wishlist of requirements is prioritized and ordered into
a staged plan of increments to be rolled out over time. (M.
Lang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nde pe nde nt Busine ss-t o-Busine ss M a rke t pla c e (or E-M a rke t pla c e ) I ndisc e r nibilit y Re lat ion 323

Independent Business-to-Business Marketplace Index Structure


(or E-Marketplace) An adapted data structure to accelerate retrieval. The a
An Internet destination where businesses from around the priori extracted features are organized in such a way that
I
world can come together to buy and sell goods and services the comparisons can be focused to a certain area around
in an auction format. (Mockler et al., 2006) the query. (Bretschneider & Kao, 2005)

Independent Component Analysis (ICA) Index Tree


A higher-order signal processing technique used for blind Partitions the space in a single dimension or multiple
source separation, in which the objective is to extract source dimensions for eficient access to the subset of the data
signals from their linear mixtures by using as little a priori that is of interest. (Thomasian, 2005b)
information as possible. (Sattar & Yu, 2006)
Indexed Searching
Independent Learner Searching with the help of an index, a data structure
Students who are independent learners and information previously built on the text. (Navarro, 2005)
literate pursue information related to personal interests,
appreciate literature and other creative expressions of Indexing Parser
information, and strive for excellence in information Because of the heterogeneous nature of Web documents,
seeking and knowledge generation. (Jesness, 2005) we argue that indexing must also be performed at the stage
of parsing Web documents. Hence, each source agent has
Independent Testing Authority (ITA) a built-in indexing parser capable of building a document
One of a number of companies authorized by the representation (index) based on the internal structure
government to test and certify proprietary DRE software and the content of a given Web document. Typically the
and hardware systems. (Gibson & Brown, 2006) hierarchy of tags is taken into account while building the
document index. Another important part of the process
Independent Variable is taking into account source-speciic lists of stop words,
A value representing a presumed cause of a particular thesauri, and ontologies. Each resulting index consists
outcome. (McHaney, 2005) of a weighted set of terms that occurred in the analyzed
document. This format is a standard vector space model
Index format that is commonly utilized in document iltering
1: A data structure built on a database to speed up searches. and retrieval. (Wecel et al., 2005)
(Chvez & Navarro, 2005) 2: In the area of information
retrieval, an index is the representation or summarization Indicator
of a data item used for matching with queries to obtain the 1: A term used to refer to something that would point
similarity between the data and the query, or matching with to quality or a lack thereof. (Wilkin, 2005) 2: Generally
the indexes of other data items. For example, keywords are quantitative expressions that relate variables to deined
frequently used indexes of textual documents, and a color criteria. They can be statistics, numbers, values, reasons,
histogram is a common index of images. Indexes can be or other ways of representing information. (Xodo &
manually assigned or automatically extracted. The text Nigro, 2005)
description of an image is usually manually given, but
its color histogram can be computed by programs. (Li et Indirect Impact
al., 2005) 3: In data storage and retrieval, the creation and Information technology that is not clearly related to
use of a list that inventories and cross-references data. In measurable impact. For example, a new system helps
database operations, a method to ind data more eficiently executives make better decisions through providing access
by indexing on primary key ields of the database tables. to better or more accurate information. (Dykman, 2005)
(Lin et al., 2005) 4: Mechanism for sorting the multimedia
data according to the features of interest to users to speed Indiscernibility Relation
up retrieval of objects. (Hentea, 2005c) 5: Used to create Objects x,y are indiscernible iff information about x
an external memory data structure in order to speed up is equal to (similar with) information about y. In the
search and retrieval of information. (Bozanis, 2006) former case the indiscernibility relation is an equivalence

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
324 I ndividua l I ndividua lize d I nst ruc t ion

relation; in the latter it is a similarity relation. Any object Individual Learning


x deines an indiscernibility class (neighborhood) of An instruction method in which students work individually
I objects indiscernible with this object. Also soft cases of at their own level and rate toward an academic goal.
indiscernibility relation are considered. Discernibility (Moreira & da Silva, 2005)
relation is a binary relation on objects deined as follows:
Objects x,y are discernible iff information about x is Individual Privacy
discernible from information about y. In the simplest case, Freedom from excessive intrusion by those seeking
objects x,y are discernible iff it is not true that they are personal information about the individual. Allows for the
indiscernible. (Pawlak et al., 2005) individual to choose the extent and circumstances under
which personal information will be shared with others.
Individual (Mullen, 2005)
A single candidate solution in genetic and evolutionary
computation, typically represented using strings (often Individual Style (Learning and Cognitive Style)
of ixed length) and permutations in genetic algorithms, Relates to implicit main individual modes of acquiring
or using problem-solver representations (programs, information, organizing, and processing information in
generative grammars, or circuits) in genetic programming. memory. Assessed by using questionnaire or psychometric
(Hsu, 2005a) test. (Rentroia-Bonito et al., 2006)

Individual Critical Mass Individual Variable


Characteristic of the installed base that has to be One of several characteristics of individuals, such as
surpassed in order to make an individual willing to adopt attitudes and preferences. (Beise et al., 2005)
a communication product. (Voeth & Liehr, 2005)
Individualism/Collectivism
Individual Difference 1: An individualist society is one where each person is
1: In the context of Web-based instruction, this term expected to be self-suficient and look after themselves and
is usually used to denote a number of important their immediate family. A collectivist society is one where
human factors, such as gender differences, learning every person is a member of a group, and loyalty is to that
styles, attitudes, abilities, personality factors, cultural group. Typically, in an individualist society, any money
backgrounds, prior knowledge, knowledge level, aptitudes earned will be kept by the individual that earns it, whereas
and preferences for processing information, constructing in a collectivist society, earnings will be shared among the
meaning from information, and applying it to real-world group. (Frank et al., 2005) 2: Concerned with individual
situations. (Magoulas, 2006) 2: Many of a learners personal interest as opposed to group interest (collectivism). That
characteristics can affect how he or she learns. Individual is, everyone grows up to look after himself/herself. The
differences are often explanations for differences in relationship between superiors and subordinates is based
learning and performance among learners. The study on mutual advantage. (Peszynski, 2005) 3: Refers to a
of individual differences among learners permits is preference for a loose-knit social framework in society
done with the idea that results can help educators design in which individuals are only supposed to take care of
instruction that better meets the needs of each learners themselves and their immediate families. This is opposed
needs. (Campbell & Berge, 2005) to collectivism, which implies a preference for a tightly
knit social framework in which individuals can expect
Individual Knowledge their relatives and clan to protect them in exchange for
Knowledge possessed by persons rather than social entities. loyalty. (Limayem, 2005)
It is frequently tacit in nature, rendering it absolutely
personal. When tacit knowledge is made explicit, it moves Individualized Instruction
toward the other end of its dimensionsocial knowledge. Providing dynamic content and presentation based on
(Ein-Dor, 2006) individual preferences, attitudes, and knowledge. (Shareef
& Kinshuk, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I ndividua lize d Te m pe ra m e nt N e t w ork I ndust ria lize d N at ion 325

Individualized Temperament Network Inductive Learning System


A neural-network-like structure representing a particular 1: One of a set of data mining or knowledge discovery tools
cognitive trait (e.g., working-memory capacity) of the that learn relationships among a dataset by systematically
I
learner. (Lin & Kinshuk, 2005) analyzing cases. Output of these approaches is typically
in decision tree (or rule) form. Popular algorithms of this
Individuation genre include See5, CART, ID3, and C4.5. (Fuller &
The process by which the individual develops into a fully Wilson, 2006) 2: Acquiring concept descriptions from
differentiated, balanced, and uniied personality. A concept labeled examples. (Muslea, 2005)
introduced by Carl Jung. (Chambel & Guimares, 2005)
Inductive Logic Programming (ILP)
Indoor Global Positioning System (Indoor GPS) 1: A field of research at the intersection of logic
A variation of the Global Positioning System (GPS) for use programming and inductive machine learning, drawing
in indoor environments, where the normal GPS signal does ideas and methods from both disciplines. The objective
not typically work, because the signal strength is too low of ILP methods is the inductive construction of irst-order
to penetrate a building. Indoor GPS navigation signals are Horn clauses from a set of examples and background
generated by a number of pseudolites (pseudo-satellites) knowledge in relational form. (Perlich & Provost, 2005) 2:
and are sent to pseudolite-compatible receivers that use A set of techniques for learning a irst-order logic theory to
the information to determine their own geographical describe a set of relational data. (Holder & Cook, 2005)
positions. (Giaglis, 2005)
Inductive Reasoning
Indoor GPS: See Indoor Global Positioning System. The task of extracting intelligible information from a
collection of examples pertaining to a physical system.
Induced Subtree (Muselli, 2005)
Let T(N,B) be a tree, where N represents the set of its
nodes and B the set of its edges. We say that a tree S(Ns,Bs) Industrial Economy
is an induced subtree of T provided that: (1) NsN, and A traditional economic perspective that presumes restricted
(2) b=(nx,ny)Bs if and only if nx is a parent of ny in T. expansion opportunities based on scarcity of physical
Thus, induced subtrees are a specialization of embedded resources, available labor, capital, and so forth. (Ng &
subtrees. (Katsaros & Manolopoulos, 2005b) Pemberton, 2006)

Induction Industrial Ethernet


1: The process of deriving a concept from particular Special type of Ethernet for ield-area networks based on
facts or instances. Inductive knowledge is empirical the relevant international standards (e.g., IEEE 802.3). It
knowledge, of facts and information. (Nobre, 2006a) 2: is adjusted to the speciic environmental conditions in
Process of learning, from cases or instances, resulting in industrial production systems, for example, regarding
a general hypothesis of hidden concept in data. (Leni et electromagnetic compatibility, shaking, moisture, and
al., 2005) 3: A technique that infers generalizations from chemical resistance. (Blecker, 2006a)
the information in the data. (Beynon, 2005b)
Industrial Wave
Inductive Database A phase of civilization in which industries based on
1: Database system integrating in the database source data material processing and handling are dominant factors
and data-mining patterns deined as the result of data- in the economy. (Targowski, 2005)
mining queries on source data. (Meo & Psaila, 2005) 2:
An emerging research domain, where knowledge discovery Industrialized Nation
processes are considered as querying processes. Inductive A country in which capitalism has long served as the model
databases contain both data and patterns, or models, which upon which business practices are based and the economy
hold in the data. They are queried by means of more or is founded mainly upon manufacturing and services. (St.
less ad-hoc query languages. (Boulicaut, 2005) Amant, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
326 Industry Certiication Infocracy

Industry Certiication Inference


Certiication involves passing a recognized standardized 1: A logical conclusion derived by making implicit
I test (or set of tests) within particular subject areas. It knowledge explicit. (Kamthan & Pai, 2006) 2: Capability to
intends to establish a standard of competency in deined deduce new knowledge from existing knowledge. (Dieng-
areas. ICT industry certiications are designed to provide Kuntz, 2006) 3: Derivation using rules and assumptions.
targeted skills that have immediate applicability in the (Grant & Minker, 2006)
workplace. (McGill & Dixon, 2005)
INET: See International Networking.
Industry-University Gap
Disconnect between the knowledge and skill needs of Inference Channel
industry practitioners, and the knowledge and skills A particular case of a covert channel that exists when
imparted on students by universities. (Kock, 2005) high-classiied data can be deduced from low-classiied
data. (Gabillon, 2005)
Industry Value Chain
Consists of the organizational value chain, together with the Inference to the Best Interaction
value chains of the organizations competitors, suppliers, Any interface provides some clue from which the user is
and customers. It represents the movement of goods and enabled to perform the correct action in order to accomplish
services from the source of raw materials through to the tasks with a product. The process of inferring the correct
inal customer. (Jeffcoate, 2005) action can be called inference to the best interaction.
(Magnani & Bardone, 2006)
Industry-Based Knowledge
A general type of knowledge, widely available to Inlection Point
individuals in their role-related organizational activities, A signiicant change in corporate performance. (Nugent,
across both irms and industry. It is not speciic to either 2005)
organizations or any individual organizational tasks as
such; it is, however, highly industry speciic. Examples Ininite Impulse Response Filter (IIR Filter)
of this type of knowledge are knowledge of the industry 1: A digital ilter with an ininite impulse response. IIR
structure, of its current state of development, and of the ilters always have poles and are stable if all poles are
key individuals, networks, and alliances in an industry. inside the unit circle. (Jovanovic-Dolecek, 2005a) 2: Digital
(Butler & Murphy, 2006) ilter with ininite impulse response. This ilter must be
checked for the stability and does not have linear phase.
Industry-Wide Platform This ilter has lower complexity than its FIR counterpart.
Uses a mixture of information and communications (Jovanovic-Dolecek & Daz-Carmona, 2005)
technologies set up over the Internet to set up a multi-
purpose platform that enables irms within a sector, along Inluence
a supply chain, or as part of a consortium to exchange Making a difference in a virtual community. (Signoret,
business information and transact. (Poon, 2005) 2006)

Inexact Learning Info Pyramid


The learning by which inexact rules are induced. (Dai, Multimedia data representation based on storing different
2005a) versions of media objects with different modalities and
idelities. (Cavallaro, 2005)
Inexact Rules
Rules with uncertainty. (Dai, 2005a) Infocracy
A form of organization in which information provides
Inexperienced Software Team the underpinning of structure and the primary basis
Most members of a software team are graduates or of individual power. In a more typical bureaucracy,
inexperienced in disciplined software development. (Lui hierarchical organizational structure dominates and is a
& Chan, 2005) primary driver of individual power. Information lows are

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfode sign I nfor m at ion 327

then designed to support the structure and reinforce the at the discretion of the mentor and protg, and persists as
power relationships. In an infocracy, information lows long as the parties involved experience suficient positive
from point of origin to point of use, without regard to outcomes. (Long et al., 2005)
I
structure or pre-determined power relationships. As such,
the organizational structure evolves to support required Informatic
information lows. (Gordon & Mulligan, 2005) Term used in Latin America as an equivalent to computer
based. (Barrera, 2005)
Infodesign
A broad term for the design tasks of deciding how to Informatics Project
structure, select, and present information. (Roibs, One of a number of projects that involve in any way
2006a) possible the use, design, delivery, implementation, and
management of information technology irrespective of
Infolink the element involved, including software, hardware, and
The human resources department Web site on the intranet. so forth. (Kamel, 2005a)
(Al-Gharbi & Khalfan, 2005)
Information
Infomediary 1: A process with data as input and knowledge as output.
A combination of the words infor mation and An individual is the subject who transforms the data into
intermediary. Infomediary refers to a vehicle (e.g., a Web knowledge. Relations between two technical devices are
site) that can collect and provide information. A virtual data exchange processes. Relations between two or more
community provides the functions of an infomediary individuals are communication processes. The reverse
in several ways. It is an information source of product information process is called documentation process (e.g.,
and service to consumers, and an information source writing an article). (Hofer, 2006) 2: Data with context
of consumers needs to the business. (Wang, Wei, et al., and utility. (Hoxmeier, 2005) 3: A comparative unit of
2006) cognition that deines a change between the previous and
present state of the natural, artiicial, or semiotic systems.
Informal Communication (Targowski, 2005) 4: A message, or data, which makes
Communication that is neither institutionally planned nor a difference. Information has meaning, and becomes
functionally deined, but opportunistic and spontaneous. knowledge when a person internalizes it. (Huotari &
(Beuschel et al., 2005) Iivonen, 2005) 5: Commonly known as a collection of facts
or data. In Computer Science, it refers to processed, stored,
Informal Leader or transmitted data. In Knowledge Management, it refers
One who demonstrates substantial leadership behavior to codiied knowledge. (Theng, 2005) 6: Contextualized
even though not oficially appointed or designated to hold data that can be analyzed and applied to decision-making
such authority. Informal leaders often emerge tacitly from circumstances. (Taylor, 2005) 7: Data that is associated
within a group. (Cargill, 2006a) with some system that enables meaning to be derived by
some entity. (Benyon, 2006) 8: Data with attributes of
Informal Learning relevance and purpose. (Joia, 2005) 9: In intelligence usage,
1: Learning anytime, everywhere in a non-organized unprocessed data of every description which may be used
way, where most of the time learning is unidentiied and in the production of intelligence. (Melkonyan, 2005) 10:
without recognition. (Lambropoulos, 2006b) 2: Learning Interpreted symbols and symbol structures that reduce both
that takes place often in work settings without any formal uncertainty and equivocality over a deined period of time.
structure; often considered to be a main way that people (Hirji, 2005) 11: Knowledge acquired through experience
learn at work. (Berg, 2005h) or study. (Drake, 2006) 12: Knowledge derived from
reading, observation, or instruction, at times consisting
Informal Mentoring of unorganized or unrelated facts or data. Data endowed
The non-assigned pairing of an experienced person who with relevance and purpose, for example, a irms balance
respects, guides, protects, sponsors, promotes, and teaches sheet and income statement. (Mockler & Dologite, 2005)
younger, less experienced personnel; it develops naturally 13: A term referring to details about an event or situation

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
328 I nfor m at ion About Obje c t I nfor m at ion a nd Com m unicat ion Te chnology Archit e c t ure

in the past or simply a scientiic fact. Information can be addition to Internet-based technologies such as computers,
regarded as a piece of knowledge of an objective kind. It telephones, and networks, ICTs in a broad sense include
I results from placing data within some meaningful context, digital television, cable and satellite technologies, and
often in the form of a message. It is purely descriptive and music formats (e.g., MP3), DVDs, and CDs. ICTs may be
explicit, does not enable decisions or actions, nor does it used to facilitate remote human interaction for good and evil
trigger new questions. (Haghirian, 2006) purposes. ICTs are used to increase human communication;
broaden education, literacy, and knowledge; and enhance
Information About Object social, cultural, political, and economic capacity. It is
x in a given information system (U,A) is deined by hoped that this will help address problems attributed
InfA(x)={(a,a(x)): aA}. (Pawlak et al., 2005) to the so-called digital divide. (Malina, 2005) 4: A
sector including a great variety of technologies such as
Information Age desktop and laptop computers, software, peripherals, and
A label given to the post-Cold War sociological and connections to the Internet that are intended to fulill
economic conditions of the world, which are driven by information processing and communications functions.
technology and information. (Reynolds, 2005) (Chochliouros & Spiliopoulou-Chochliourou, 2006) 5:
The amalgam of computing, telecommunications, and
Information Agent data networking technologies used to handle information
Program capable of retrieving information from a remote and communication. It is the convergence of information
Web site by means of Internet protocols, storing it in a technology, telecommunications, and data networking
data repository and using it for executing speciic tasks. technologies into a single technology. It encompasses
(Castro & Braga, 2006) an array of hardware and software such as computers,
digital cameras, CD-ROMs, radio, television, video and
Information and Communication System of Local digital cameras, digital media, the Internet, e-mail, word
and Regional Development processing, databases, the Internet, e-business, and e-
A system that combines all the subjects on the basis commerce. (Magagula, 2005) 6: Refers to the utilization
of common principles to realize information and of technology to process and access information, and to
communication interaction for local and regional assist and facilitate communication. (Bodomo, 2005b)
development. (Molodtsov, 2005) 7: Includes ICT equipment (computer hardware, end-
user communications equipment, ofice equipment and
Information and Communication Technology datacom, and network equipment) plus software products,
(ICT) IT service, and carrier services. (Damaskopoulos &
1: The technological convergence between digital Gatautis, 2006) 8: A range of goods, applications, and
computing, telecommunications, and broadcasting. services used for producing, distributing, processing, and
Whereas computers were largely focused on the processing transforming information, including telecommunications,
of information, ICT undertakes both processing and television and radio broadcasting, computer hardware and
communication of information. (Moodley, 2005) 2: A software, computer services, the Internet, electronic mail,
generic term used to encapsulate the diverse range of and electronic commerce. (Rhodes, 2005)
technological developments (e.g., computer storage and
retrieval, computing capacity, wired communications, Information and Communication Technology
wireless communications, portable technologies) that Alliance
have enhanced the internal and external activities of A partnership between two or more nation states to share
organizations. Especially important is the manner in which knowledge and resources in the area of ICT developments.
these strands of technological development have been (Toland, Purcell, et al., 2005)
integrated to provide greater synergy. (Ritchie & Brindley,
2005) 3: While often meaning different things in different Information and Communication Technology
timescales, places, and contexts, ICTs describe all media Architecture
and a mix of converging technology tools involved in the The ICT architecture provides a conceptual model,
dynamic transfer and storage of analog and digital data. In specifying (at a general level) the parts of an ICT

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I CT a s Cognit ive Pa r t ne r I CT-Ba se d Deve lopm e nt Proje c t 329

infrastructure (applications, databases, technological ICT diffusion of courseware, and to communication between
elements) and their relations. In this chapter we concentrate teachers and students, including communication between
on the application and database parts. (Achterbergh, teachers and between students by electronic means. (El
I
2005b) Louadi, 2005a)

Information and Communication Technology as Information and Communication Technology


a Cognitive Partner Integration
Traditionally, ICT is used as a vehicle of information, The degree to which ICT is used to achieve organizational
but when used as a cognitive partner, it collaborates in goals. In the educational context, integration means that
the thinking processes of humans by performing actions ICT is used transparently to achieve curriculum objectives
such as changing a graph instantaneously or supporting a and is not taught for its own sake. (Mackey, 2005)
person to build his ideas when designing a concept map.
(Santos, 2005) Information and Communication Technology
Level of Knowledge
Information and Communication Technology The level of knowledge in the ield of information and
Diffusion communication technologies that someone has. (Paraskevi
Spread of ICT beneits to the majority of the population & Kollias, 2006)
for using ICT to increase productivity and regional
development. (Borbora & Dutta, 2005) Information and Communication Technology
Planning in Schools
Information and Communication Technology Specific school planning relating to the provision,
Indicator acquisition, implementation, curriculum integration,
One of a number of indicators that show the extent of maintenance, and replacement of ICT, and the professional
the development of an information and communication development of staff relating to ICT. (Mackey, 2005)
infrastructure. Examples include ixed telephone density,
mobile telephone density, personal computer density, Information and Communication Technology
Internet access, and host density, usually expressed as a Sector
ratio of inhabitants. (Daz-Andrade, 2005) A combination of manufacturing and services industries
that capture, transmit, and display data and information
Information and Communication Technology electronically. (Moodley, 2005)
Infrastructure
1: The deployment of telecom (both ixed and mobile), Information and Communication Technology
TVs, radio, computers, and Internet connections to Selection
enable the populace access to ICT services. (Frempong The process of selecting proper parts of the technological
& Braimah, 2005) 2: The underlying facilities, services, infrastructure and/or speciic applications. In the context
and installations needed for information communication of CI, speciic criteria are used: criteria regarding costs,
technology to operate. (M. Rowe, 2005b) appropriateness in supporting intelligence activities, and their
it or contribution to the CI infrastructure. (Vriens, 2005a)
Information and Communication Technology in
E-Procurement Information and Communication Technology
Portals and electronic systems that facilitate registration of Seva Kendra
suppliers; notiication of tenders; issue and downloading of A community-owned cooperative entity that nurtures
tender documents; receiving and responding to enquiries; learning and innovation in the community. (Shaligram,
submission of tender offers; notiication of contract award; 2005)
and supply administration. (Demediuk, 2005)
Information and Communication Technology-
Information and Communication Technology in Based Development Project
Teaching A development project that employs information
Hardware, software, networks, and services related to the communication technologies as a strategic tool or approach
use and operation of equipment in the preparation and for achieving desired outcomes. (M. Mitchell, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
330 I CT-Ena ble d K now le dge M a na ge m e nt I nfor m at ion Ec onom y

Information and Communication 2005) 2: Refers to how members of the community


Technology-Enabled Knowledge Management receive information from various sources such as face-
I ICT facilitates both knowledge personalization and to-face, newspaper, telephone, mail/letters, notice boards,
codiication. Examples of the former are expert inder community meetings, church congregation, church
systems containing proiles of employees with special newsletter, radio, and television. (Gnaniah, Songan et
expertise, communities of practice where employees with al., 2005)
similar professional interests can meet, and electronic
blackboards. Examples of the latter are classiication Information Closure
systems to retrieve objects by keywords, full-text search Boundary deined by information, and the sources
features, and topic maps. (Fink & Disterer, 2006) necessary for autonomous (sub)systems functioning.
(Szczerbicki, 2005)
Information Architecture
1: How the Web sites Web pages are organized, labeled, Information Content
and navigated to support user browsing. (Falk & Sockel, Availability of information to compare across alternatives
2005) 2: Mostly, the technological architecture that acts the completeness of information provided about a irm,
as an enabling mechanism to the information system. product and service, and so on. (Shih & Fang, 2006)
(Dykman, 2006)
Information Delivery Theory
Information Artifact Teaching is just a delivery of information and students are
Any artifact whose purpose is to allow information to just recipients of information. (Cirrincione, 2005)
be stored, retrieved, and possibly transformed. (Benyon,
2006) Information Design
A similar soft technology applied to information more
Information Asymmetry broadly for the purpose of successful access to information.
1: A situation where one party to a transaction has more (Duchastel, 2005)
information than another party. In many cases it is the seller
who has more and better information about the quality and Information Dissemination
underlying costs of a product than the buyer. (Fraser, 2005) Content of any book, paper, map, machine-readable
2: Condition in which at least some relevant information is material, audiovisual, or other documentary material,
known to some, but not all parties involved. Information regardless of physical form or characteristics; making
asymmetry causes markets to become ineficient, since all them available to the public is a form of information
market participants do not have access to the information dissemination. Means of dissemination may be through
they need for their decision-making processes. (Wong, information resource databases, information portals, the
2005) Internet, or other available media. (Rahman, 2006)

Information Broker Information Divide


A key software component that supports intelligent portals. The term broadly used to indicate the difference between
The information broker has the ability to coordinate groups, societies, or countries that have ready accessibility
between search engine, worklow engine, and portal to information and those groups, societies, or countries that
management. Without an information broker, an individual do not have the same or similar levels of access to this or
users proile would not be managed and consequently similar information. (Arthur-Gray & Campbell, 2005)
would not be serviced by context-sensitive portals. The
information broker may work behind the Web server to Information Economics
provide the personalized services for Web users. It may A scoring method that assesses the value of the information
also work directly with WWW for searching Web services that results from the use of an information system.
online. (Li, 2005a) (Dykman, 2005)

Information Channel Information Economy


1: A term used to describe the various combinations of 1: An economic system characterized by knowledge-
sources and formats of information. (McGill & Dixon, based work and processing, and exchange of information

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Engine e ring I nfor m at ion H iding 331

and data as its primary activities. (Hantula & DeRosa, Information Filtering System
2005) 2: An economy dominated by information-related A system whose goal is to deliver to a user only this
activities. (Ajiferuke & Olatokun, 2005) 3: A concept information that is relevant to her/his profile; the
I
created to illustrate a fundamental change in the business system operates on large streams of unstructured data.
environment. The nature of the economy has changed as (Abramowicz et al., 2006)
measured by the informational (intangible) elements of
our products, services, and production processes, and the Information Format
proportion of the workforce whose primary activities are The arrangement and appearance of information. Format
informational. Information has become the most important includes both the media used and the style of presentation.
resource upon which the eficiency and competitiveness of (McGill & Dixon, 2005)
all organizations depend. This is true in not only services
or high-tech industries, but also across the board in primary Information Gain
and manufacturing industriesand in both private and Given a set E of classiied examples and a partition P =
public sectors. (Kimble & Li, 2006) {E1, ..., En} of E, the information gain is deined as
n
| Ei |
Information Engineering entropy(E ) entropy(Ei ) *
Proper design of information low, its management, its i =1 |E|
use, and its maintenance. (Szczerbicki, 2005)
where |X| is the number of examples in X, and
Information Exchange
m
entropy ( X ) = p j log 2 ( p j )
Putting ideas and concepts in the correct formats and
getting them circulated to other persons can be termed j =1
as information exchange. However, experiences and prior
knowledge about the content are essential for making it (assuming there are m classes in X and pj denotes the
become knowledge. (Rahman, 2006) probability of the jth class in X). Intuitively, the information
gain measures the decrease of the weighted average
Information Extraction impurity of the partitions E1, ..., En, compared with the
1: A process of extracting data from the text, commonly impurity of the complete set of examples E. (An, 2005)
used to ill the data into ields of a database based on
text documents. (Mladeni, 2005) 2: An information Information Gap
extraction task is to extract or pull out user-deined and A gap that exists between the amount and types of
pertinent information from input documents. (Chang & information received and needed by members of the
Hsu, 2005) 3: The process of pulling out or extracting community. (Gnaniah, Songan, et al., 2005)
relevant or predeined types of information from a set of
documents. The extracted information can range from a Information Granularity
list of entity names to a database of event descriptions. The data structure that can be classiied. (Gabillon,
(Lee-Post & Jin, 2005a) 4: The process of using a computer 2005)
to automatically extract speciic facts and rules from texts.
(Kulyukin & Nicholson, 2005) Information Heterogeneity
The differences in syntax, structure, and semantics used in
Information Filtering different information systems. (Karimi & Peachavanish,
Filtering information from a dynamic information space 2005)
based on a users long-term information needs. (Parmar
& Angelides, 2005) Information Hiding
The umbrella term referring to techniques of hiding various
Information Filtering Agent forms of messages into cover work. (K. Chen, 2005)
Intelligent agent that applies user-input preferences
autonomously to screen passively and sort information.
(Gates & Nissen, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
332 I nfor m at ion I nt e grat ion I nfor m at ion Proc e ssing

Information Integration function effectively, sometimes leading to a situation in


The process of consolidating and managing customer which nothing gets done and the user gives the impression
I information from all available sources. Also called of being a rabbit caught in the glare of car headlights.
customer data integration. (Moore et al., 2006) (Pritchard, 2005a) 2: Learners face the information
overload problem when acquiring increasing amounts of
Information Integrity information from a hypermedia system. It causes learners
Comprising data management, data quality, and data frustration with the technology and anxiety that inhibits
cleansing disciplines, information integrity refers to the the creative aspects of the learning experience. (Magoulas,
state of data within an organization or IT system that 2006) 3: The availability of excess information beyond
adheres to the proper deinition of data standardization that which is desired or needed by a user, requiring non-
per established business rules and is accurate, correct, productive processing. (Kasi & Jain, 2006) 4: Undesirable
and complete. (Malik, 2006) or irrelevant information that disturbs the user and distracts
him or her from the main objective. This kind of problem
Information Literacy usually occurs in contexts that offer excessive amounts of
1: An ability that has been acquired by training to locate, information, badly handled due to low-usability systems.
understand, evaluate, and use needed data eficiently and (Gil & Garca, 2006)
effectively. (Poda & Brescia, 2005) 2: An integrated set of
skills and the knowledge of information tools and resources Information Paralysis
that allow a person to recognize an information need and A condition where too much data causes dificulty
locate, evaluate, and use information effectively. (Gregory, in determining relevancy and extracting meaningful
2005) 3: Consists of computer literacy and information information and knowledge. (Nemati & Barko, 2005)
retrieval abilities and communication skills. Computer
literacy means basic skills in computer use, for example, Information Portal
being able to read and write with computers. (Hyrinen Can also be viewed as part of a category in their own right
& Saranto, 2005) 4: Students who are information literate as portals whose prime aim is to provide a speciic type
access information eficiently and effectively, evaluate of information. (Tatnall, 2006)
information critically and competently, and use information
accurately and creatively. (Jesness, 2005) Information Privacy
The interest an individual has in controlling, or at least
Information Management signiicantly inluencing, the handling of data about
The management of all aspects of information in an themselves. (Sharma, 2006b)
organization, generally seen to encompass technical,
human, and organizational information. (Kimble & Information Privacy Trust
Hildreth, 2006) Unauthorized tracking and unauthorized information
dissemination which refer to an e-tailers privacy protection
Information Model responsibilities. (Yeo & Chiam, 2006)
A rich central model of the business or of a domain within
the business. A traditional data model or object model may Information Process
serve as the basis for an information model, but ideally data The process of information products creation, collection,
models should be extended to a full ontology. (Schwartz processing, accumulating, storage, search, dissemination,
& Schreiber, 2005) and use. (Molodtsov, 2005)

Information Needs Information Processing


The information that contributes to solving a goal. This Study of how humans interact within their environment
information should be properly integrated and focused on while interpreting information to identify a decision.
the goal. (Albers, 2006) Humans are a unique form of a machine and must process
information in order to formulate a decision. (Carstens,
Information Overload 2005)
1: A situation where an individual has access to so much
information that it becomes impossible for him or her to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Proc e ssing T he or y (I PT ) I nfor m at ion Re t rieva l (I R) 333

Information Processing Theory (IPT) Information Requirement Elicitation (IRE)


An explanation for the organization structure-environment An interactive mode of context-aware application that
relationship suggested by CT. IPT suggests that the helps consumers specify their information requirements
I
information processing requirements dictated through with adaptive choice prompts in order to obtain desired
interactions with the environment force certain structures supply context information. (Sun & Poole, 2005)
in order to be eficient and effective. (Durrett et al.,
2005) Information Reservoir
A container of data, information, concepts, knowledge,
Information Product and wisdom. (Targowski, 2005)
1: A speciic audience-targeted content combined with the
accompanying service. Different information products may Information Resource
be based on the same service. As an example, products 1: A collection of valuable information generated by
Regional News and Press Conference Announcements human activities. In a broader sense, it also includes
may base on one service such as Newsline. Additional related equipment, personnel, and capital. (Lai, Fu, &
services (i.e., searches, e-mail lists) may serve to support Zhang, 2005) 2: One of the set of resources required
each information product that owns its own marketing to produce information, including hardware, software,
strategy and development standards. Consideration of user technical support, users, facilities, data systems, and
needs, requests, and possibilities are the key to establishing data. (Law, 2005)
quality information products. (Arkhypska et al., 2005)
2: The output of an information manufacturing system; Information Resources Development
it implies stages of development, such as information The process of collecting, processing, storing, disseminating,
suppliers, manufacturers, consumers, and managers. and utilizing information resources according to the need
(Chengalur-Smith et al., 2005) of the society. (Lai et al., 2005)

Information Pull Information Resources Management


The process of user access to information stored in The planning, organization, allocation, and utilization
servers linked via the Internet or an intranet. (Quah et of information and related resources through legal,
al., 2006b) technological, and other methods to support institutional
goals and missions. (Lai et al., 2005)
Information Push
The process of a directory server relocating information Information Resources of Local and Regional
iles to active server machines within a faded information Development
ield based on the frequency of users accesses. (Quah, An organized entity of information products, which
Leow, & Soh, 2006) are created and disseminated for local and regional
development needs. (Molodtsov, 2005)
Information Quality
1: A global judgment of the degree to which these Information Retrieval (IR)
stakeholders are provided with information of excellent 1: Interdisciplinary science of searching for information,
quality with regard to their deined needs, excluding user given a user query, in document repositories. The emphasis
manuals and help screens (features of system quality). is on the retrieval of information as opposed to the retrieval
(Wilkin, 2005) 2: The accuracy, completeness, timeliness, of data. (Fernndez & Layos, 2005) 2: The art and science
and utility of performance-related information that is used of searching for information in documents, searching
as the basis of management decision making. (Wright for documents themselves, searching for metadata that
& Taylor, 2005) 3: The degree to which information describe documents, or searching within databases,
consistently meets the requirements and expectations of the whether relational stand-alone databases or hypertext-
knowledge workers in performing their jobs. (Chengalur- networked databases such as the Internet or intranets for
Smith et al., 2005) 4: The success of the information text, sound, images, or data. (Denoyer & Gallinari, 2005)
being meaningful and useful to the receiver. (Shayo & 3: The research area that deals with the storage, indexing,
Guthrie, 2005) organization of, search, and access to information items,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
334 I nfor m at ion Re t rieva l Age nt I nfor m at ion Soc ie t y

typically textual documents. Although its deinition including those measures necessary to detect, document,
includes multimedia retrieval (since information items and counter such threats. (Mitrakas, 2006)
I can be multimedia), the conventional IR refers to the work
on textual documents, including retrieval, classiication, Information Security Management
clustering, iltering, visualization, summarization, and A framework for ensuring the effectiveness of information
so forth. The research on IR started nearly half a century security controls over information resources; it addresses
ago; it grew fast in the past 20 years with the efforts of monitoring and control of security issues related to security
librarians, information experts, researchers on artiicial policy compliance, technologies, and actions based on
intelligence, and other areas. A system for the retrieval of decisions made by humans. (Hentea, 2005b)
textual data is an IR system, such as all the commercial
Web search engines. (Li et al., 2005) 4: The process of Information Security Management System
discovering and indexing the relevant documents from (ISMS)
a collection of documents, based on a query presented A part of the overall management system, based on
by the user. (Lee-Post & Jin, 2005a) 5: A discipline that a business risk approach, to develop, implement,
deals with inding documents that meet a set of speciic achieve, review, and maintain information security. The
requirements. (Cunningham & Hu, 2005) 6: A technology management system includes organizational structure,
that can retrieve useful information effectively for some policies, the planning of activities, responsibilities,
themes from the Internet by artiicial or automatic method. practices, procedures, processes, and resources. (Tong
(Chen, Tsai, et al., 2005) 7: Denotes the attempt to match a & Wong, 2005a)
set of related documents to a given query using semantic
considerations (e.g., library catalog systems often employ Information Security Policy
information retrieval techniques). (Peter & Greenidge, A document that outlines the basic rules of safe processing
2005a) 8: Concerned with the representation of knowledge and dissemination of information. (Janczewski &
and subsequent search for relevant information within Portougal, 2005)
these knowledge sources. Information retrieval provides
the technology behind search engines. (Mandl, 2006) Information Service
1: Providing users up-to-date information (e.g., information
Information Retrieval Agent of weather, news, sports, mapping, etc.). (Lee & Pai, 2005)
An intelligent agent that searches for and collects 2: The activity of providing information products and
information autonomously based on user-prescribed related services according to users needs. In a broader
criteria. (Gates & Nissen, 2005a) sense, it refers to providing users with information through
any form of product or service. (Lai et al., 2005)
Information Sector
A component of the information economy. The primary Information Shopping
information sector includes those who develop hardware, The gathering of auction information, including the time
software, and information systems. The secondary and place of the auction and other related information.
information sector includes those engaged in information (Guan, 2006a)
processing activities in the course of doing work related
to some other primary activity such as insurance claims Information Society
processing. (Trauth, 2005a) 1: A context in which people interact with technology
as an important part of life and social organization to
Information Security exchange information. (Demediuk, 2005) 2: A societal
1: Domain of knowledge dealing with issues of preserving transformation in which information is the key resource.
conidentiality, integrity, and availability of information. (Trauth, 2005a) 3: A society in which economic and
(Janczewski & Portougal, 2005) 2: The protection of cultural life is integrated by complex communication
information systems against unauthorized access to or networks, and critically dependent on information and
modiication of information, whether in storage, processing, communications technologies. (Rahman, 2005b) 4: A
or transit, and against the denial of service to authorized society in which information is used heavily in the everyday
users or the provision of service to unauthorized users, life of most citizens. (Ajiferuke & Olatokun, 2005) 5:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Sourc e I nfor m at ion Syst e m (I S) 335

A society that is very much affected by the innovations Information System (IS)
and advancements in information and communication 1: A system that communicates, transforms, and preserves
technology management and applications, and is gaining information for human users. An information system
I
more ground within the development and diffusion of the comprises one or more computerized data systems along
global digital economy. (Kamel, 2005b) 6: Communal with their human users, operators, and maintainers.
interaction based on the global informational systems of (Opdahl, 2005) 2: A system that uses IT to capture, transmit,
the Internet and the World Wide Web. Social relationships store, retrieve, manipulate, or display data for business
are informational lows, and people are informational processes in an organization. (Aurum, 2005) 3: A collection
entities or links. (Skovira, 2005) of organized procedures collecting, storing, processing,
and retrieving data. It provides information to support the
Information Source organization. (Szczerbicki, 2005) 4: A collection of sources
1: An organization or person from which information containing potential information. Information systems can
is obtained. (McGill & Dixon, 2005) 2: The source be of variable structure and size, from small bibliographic
from where information is obtained by members of the catalogs to the Web itself. (Pharo & Jrvelin, 2005) 5:
community, such as relatives, friends, government oficers, A system consisting of functions for input, processing,
teachers, community leaders, outside visitors, and the storing, output, and presentation of information. (Avdic,
grapevine. (Gnaniah et al., 2005a) 2005) 6: A pair (U,A) where U is the universe of objects
and A is a set of attributesthat is, functions on U with
Information Space values in respective value sets Va for aA. (Pawlak et al.,
1: A collection of information artifacts and, optionally, 2005) 7: The set of all human and mechanical resources
agents and devices that enable information to be stored, needed for acquisition, storage, retrieval, and management
retrieved, and possibly transformed. (Benyon, 2006) 2: of the vital data of a given system. With human resources
The aggregate of all determined objects and subjects, and are usually intended both the individuals involved in the
information ties between them, which function and interact use of the system and the procedures they have to carry
to provide for information needs of people and professional out. With mechanical resources have to be intended both
corporate communities, subject to local self-governance, the hardware and software instruments to be used for
region, society, and state. (Molodtsov, 2005) the management of data. (Cartelli, 2005b, 2006b) 8: A
system for supporting communication within and between
Information Stratiication organizations. (Johannesson, 2005A) 9: A computer-
The role distribution between the information interaction based system that helps people deal with the planning
objects according to the amounts and types of information for, development, management, and use of information
products, the creation of which is based on specialization technology tools to help them perform all tasks related to
in a speciic activity sphere and on its scale. (Molodtsov, their information needs. (Chen, Holt, et al., 2005) 10: A
2005) curriculum that integrates technical skills and knowledge
with applied business and organizational knowledge.
Information Superhighway Sometimes found in business schools, other times in schools
1: Encompasses those components that capture the visions of science, engineering, or in stand-alone IT academic units.
of a nationwide, invisible, dynamic Web learner and the Variations include the Business Information System (BIS),
source of information. Includes, but is not limited to: private Computer Information System (CIS), and Management
and public high-speed interactive, narrow, and broadband Information System (MIS). (Beise et al., 2005) 11: Uses
networks; satellite, terrestrial, and wireless technologies; data to create information and knowledge to assist in
databases; the written word; a ilm; a piece of music; a operational, management, and strategic organizational
sound recording; a picture; or computer software. (G. Lang, decision making. It is also an umbrella term for computer
2005) 2: A mixture of the full duplex (two-way), wired information systems, management information systems,
and wireless capabilities of telephones and networked and information technology. (Scime, 2005a) 12: First known
computers with television, and radios capacity to transmit as business data processing (BDP) and later as management
hundreds of programs. (Msiska, 2005) information system (MIS). The operative word is system,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
336 I nfor m at ion Syst e m Blue print I nfor m at ion Te chnology (I T )

because it combines technology, people, processes, and Information Systems Security


organizational mechanisms for the purpose of improving The protection of information and systems that use, store,
I organizational performance. (Singh & Dix, 2006) 13: The and transmit information. (Kyobe, 2006)
means to transform data into information; used in planning
and managing resources. (Sadoun, 2006) 14: Interrelated Information Systems Support
components working together to collect, process, store, An IS function supporting people taking purposeful action.
and disseminate information to support decision making, This is often done by indicating that the purposeful action
coordination, control, analysis, and visualization in can itself be expressed via activity models, a fundamental
an organization. (Hunter, 2005) 15: Normally taken to re-thinking of what is entailed in providing informational
include all elements of information, encompassing both support to purposeful action. The idea is that in order to
the technical and human aspects. (Dykman, 2006) 16: conceptualize and so create an IS support that serves, it is
Refers to a set of people, procedures, and resources used irst necessary to conceptualize that which is served, since
to collect, process/transform, and disseminate information the way the latter is thought of will dictate what would be
in an organization. (Singh, 2005) necessary to serve or support it. (Vat, 2005c)

Information System Blueprint Information Technology (IT)


An initial, functioning skeleton of a tailorable information 1: Computer and information-based systems that are
system, built to relect a problem-solving framework mediated through electronic communication and integrated
within a speciic problem domain which, by means of into the activities of individuals and groups. (Crdoba &
an inherent deferred design decision mechanism, can be Robson, 2006) 2: An umbrella term that encompasses
tailored by the end user to acquire or amend its existing a range of professional positions requiring at least a
behavior, in order to meet the speciic needs of a particular baccalaureate degree in Computer Science, Information
business/organizational context. A blueprint of a tailorable Systems, or closely related majors. (Beise et al., 2005) 3: A
information system can truly achieve lexibility. (Stamoulis major that focuses mainly on fourth-generation language
et al., 2005) application development and maintenance. (Beise et al.,
2005) 4: A computer-based tool (hardware and software)
Information System Outsourcing that people use to work with information and support
The transfer of an organizations IS function(s) to an the information-processing needs of an organization.
external provider who takes the responsibility for managing (Chen, Holt, et al., 2005) 5: All hardware, software,
these functions on behalf of the organization. (Gupta & communications, telephones, facsimiles; all personnel
Iyer, 2005) and resources dedicated to the delivery of information and
processes via computerized mediums. (Dery & Samson,
Information Systems Architecture 2005) 6: Computer hardware and software, as well as
The set of information systems in an organization, the the peripheral devices closely associated with computer-
relationships between those information systems, and the based systems that facilitate data processing tasks, such as
relationships between the information systems and the rest capturing, transmitting, storing, retrieving, manipulating or
of the organization. (Opdahl, 2005) displaying data. IT includes matters concerned with design,
development, and implementation of information systems
Information Systems Development and applications. (Aurum, 2005) 7: The use of hardware,
Constitutes analysis, design, constr uction, and software, services, and supporting infrastructure to handle
implementation of information systems. (Ericsson & and deliver information using voice, data, and video.
Avdic, 2005) (Partow-Navid & Slusky, 2005) 8: The comprehensive and
diversiied set of technologies for information processing,
Information Systems Project Management such as software, hardware, and telecommunications.
The process of managing the creation of an IS through (de Medeiros et al., 2006) 9: The physical equipment
the establishment of project goals; organizing, leading, (hardware), software, and telecommunications technology,
co-coordinating the efforts of staff processes and tasks; including data, image, and voice networks, employed
and controlling other resources to achieve a set of agreed to support business processes. (Narayanan, 2005) 10:
objectives. (McPherson, 2005) The main vehicle for creating, collecting, transmitting,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Te chnology Alignm e nt I nfor m at ion Te chnology End-U se r Re lat ionship 337

displaying, and storing information. This includes Information Technology Alignment


hardware, software media, and networks. IT is a term 1: How well a irms information systems are linked to the
that encompasses all forms of technology used to create, needs of the business. One way of measuring alignment is
I
store, exchange, and use information in its various forms to examine how well a irms business strategy is linked
(business data, voice conversations, still images, motion to its IS strategy. (Cragg & Suraweera, 2005) 2: The
pictures, multimedia presentations, and other forms, it between the business and its IT; particularly, the
including those not yet conceived). It is a convenient term it between business strategy and IT strategy. (Cragg &
for including both telephony and computer technology Todorova, 2005)
in the same word. It is the technology that is driving
what has often been called the information revolution. Information Technology Application
(Rahman, 2005f) 11: Uses existing commercial software 1: A local business-functional application embedded in
applications to solve organizational problems. Sometimes business processes, activities, products, and/or services.
referred to as information systems. It is also the umbrella (Peterson, 2005) 2: Research and development work
term for all the disciplines involved with the computer. performed to create a situation-speciic bridge between
(Scime, 2005a) 12: According to the World Bank, it new or existing IT hardware and software technologies,
consists of hardware, software, and media for collection, and the information needs/wants of a customer. The
storage, processing, transmission, and presentation of combination of proper hardware, software, and tailored
information. (Finquelievich, 2005) 13: Computer systems application delivers a well-rounded IT solution for the
and applications that include the organizations hardware, customers problem. (Baim, 2005)
software, networking, and telecommunications. (McManus
& Carr, 2005) 14: Computer-based methods for processing Information Technology Architecture
data into a useable form for users. (Hunter & Carr, A conceptual framework of IT in an organization that
2005) 15: Encompasses all forms of technology used in supports business processes. IT includes hardware,
processing and disseminating information. (Ajiferuke & software, telecommunications, database management,
Olatokun, 2005) 16: Hardware and software that constitute and other information processing technologies used in
informational systems, as well as techniques for handling computer-based information systems. (Mandal et al.,
informational content and lows. (Skovira, 2005) 17: 2005)
Hardware, software, network, and services related to the
use and operation of equipment with the aim of processing Information Technology Competitive Advantage
and communication of analog and digital data, information, (ITCA)
and knowledge. These include computers and computer The increased proitability and market share by a better
applications such as the Internet, intranets, extranets, positioning due to strategy and structure selection based
Electronic Data Interchange, electronic commerce, mobile on the alignment model. (Theodorou, 2005)
and ixed lines, and so forth. (El Louadi, 2005b) 18:
Encompasses all forms of technology used in the processing Information Technology Enabled
and disseminating information. (Olatokun & Ajiferuke, Indicating that a design variable or team can only function
2006) 19: Refers to the physical components that are through the use of information technologies. (Morris,
needed to create information products; normally refers to Marshall, & Rainer, 2005)
the hardware, such as computers, monitors, printers, and
other computer components. (Singh, 2005) 20: Information Information Technology End-User Relationship
technology is the crucial component of a modern virtual A relationship between IT and the end user consists of
organization. Without advances in technology, many two dimensions, namely a physical dimension and an
of the realities of todays virtual companies would be abstract dimension. The physical dimension describes
merely science iction. These components include the those elements that are necessary in order to enable
Internet, LANs (local area networks), and WANs (wide contact between IT and its end users, whereas the abstract
area networks) for business, e-mail and online chat and dimension describes the soft issues of a relationship.
bulletin boards, and real-time videoconferencing. These (Leonard, 2005)
technologies allow smaller workgroups as part of a larger
company to operate independently of each other across a
room or the globe. (J. Lee, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
338 I nfor m at ion Te chnology Fit I nfor m at ion Te chnology Lit e ra cy

Information Technology Fit IT, to evaluating the success or failure of the IT in an


The best relation that can be achieved in a strategic organization. (Winston & Dologite, 2005)
I alignment model among information technology, business
structure, and business strategy. (Theodorou, 2005) Information Technology Implementation
Success
Information Technology Governance Often, when a new system has been introduced, there
(1) Locus of IT decision-making authority (narrow is either a formal or informal evaluation of whether the
deinition). (2) The distribution of IT decision-making system has beneited the organization. This evaluation
rights and responsibilities among different stakeholders could include the degree to which a system has achieved
in the organization, and the rules and procedures for its expectations or goals. (Cragg & Todorova, 2005)
making and monitoring decisions on strategic IT concerns
(comprehensive deinition). (Peterson, 2005) Information Technology Industry
The accumulation of all elements of information technology
Information Technology Governance design, delivery, and management. (Kamel, 2005a)
Comprehensiveness
Degree to which IT decision-making/-monitoring activities Information Technology Industry Development
are systematically and exhaustively addressed. (Peterson, Measured by gross IT sales, IT sales relative to GDP, irms
2005) in IT and their relative size, and IT industry employment
relative to total employment. (Watson, 2005)
Information Technology Governance
Formalization Information Technology Industry Success
Degree to which IT decision-making/-monitoring follows Measured by IT software and hardware exports, high-
speciied rules and standard procedures. (Peterson, technology exports, and IT stock market listings. Includes
2005) the IT hardware and IT software industries; excludes
embedded hardware and software in other products (e.g.,
Information Technology Governance washing machines). (Watson, 2005)
Integration
Degree to which business and IT decisions are integrated Information Technology Infrastructure
administratively, sequentially, or reciprocally. (Peterson, 1: Technological infrastructure that enables the transfer
2005) of information. (Fernando, 2005) 2: The base foundation
of the IT portfolio, delivered as reliable shared services
Information Technology Governance Maturity throughout the organization, and centrally directed, usually
Model by corporate IT management. (Peterson, 2005)
This is part of the COBIT management guidelines, and is a
ive-stage maturity model of IT governance and a series of Information Technology Investment Intensity
tool kits, audit guidelines, and implementation guidelines. A concept similar to, but also somewhat different from, the
The levels ranging from non-existent to optimized concept of information intensity. Information intensity is
represent a progressively higher degree of effective the degree to which information is present in the product/
governance practices and processes. (Saha, 2006a) service of a business. The degree to which IT is present
in an investment decision relects the IT level of intensity
Information Technology Hardware of that decision. IT investment intensity is deined as the
Includes telecommunications equipment, computing ratio of spending on IT to total investment. (Chou et al.,
hardware, and computing parts. Excludes embedded 2005)
hardware in other products. (Watson, 2005)
Information Technology Literacy
Information Technology Implementation A process by which people undertake skills-based training
Process in how to use information and communication technology.
All the activities involved in initiating IT in an organization, (Weber & Lim, 2005)
from the original inception of an idea to innovate or install

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Te chnology M a st e r Pla n (I T M P) I nfor m at ion V isua lizat ion 339

Information Technology Master Plan (ITMP) Information Technology Standard


Strategic document identifying links among goals, actions One of a set of international standards that ensure
necessary to achieve them, resources, and constraints. compatibility of technologies produced throughout the
I
(Gilbert, 2005a) world. (M. Rowe, 2005a)

Information Technology Outsourcing Information Technology Strategic Alliance


The outsourcing of enterprise information systems and A broad agreement between business partners to operate
management to computer manufacturers or software cooperatively, usually facilitated by IT systems. (Mandal
companies (the term outsourcing stems from using an et al., 2005)
outside resource). Companies can save purchasing cost,
maintenance cost, and labor cost by outsourcing and Information Technology Strategy
paying for those services. Outsourcing has become a 1: A description of the plans, actions, or steps an
common practice in the United States where companies organization intends to take in order to make the best
are faced with uncertain returns of massive investment use of IT within itself. (Johnston, 2005) 2: Refers to
in IT resources. (D. Kim, 2005) applications, technology, and managementin particular,
the IT applications an organization chooses to run, the IT
Information Technology Outsourcing technology it chooses to operate, and how the organization
Partnership plans to manage the applications and the technology. (Cragg
The relationship between the service recipient and the & Todorova, 2005)
service provider is deined in contracts describing the
mutual obligations. The contract value of IT outsourcing Information Technology Transfer (ITT)
partnerships is substantial, meaning over 10 million The movement of information technology from creators
U.S. dollars or Euros. These contracts are also long-term to users. (Petter et al., 2005)
contracts. The average duration of a contract is over 36
months. (Beulen, 2005) Information Technology (IT) Worker
One who works in the primary or secondary information
Information Technology Portfolio sector. (Trauth, 2005a)
Portfolio of investments and activities regarding IT
operations and IT developments spanning IT infrastructure Information Theory
(technical and organizational components) and IT In this method, probability and ergodic theory are
applications. (Peterson, 2005) employed to study the statistical characteristics of data
and communication systems and coding theory, which
Information Technology Professional uses mainly algebraic and geometric tools to contrive
A term used to describe a person for whom development eficient codes for various situations. Introduced by Claude
and support of IT systems and related activities is their Shannon in 1948, it was a revolutionary new probabilistic
primary employment. This includes people who design way of thinking about communication and the irst truly
hardware, who develop and support information systems, mathematical theory of entropy. (Polgar, 2005b)
and who train end users. It does not include people who use
ICT in the course of pursuing other professions. (McGill Information Type
& Dixon, 2005) The description of necessary content in an application.
(Uden, 2005)
Information Technology Skill
All IT professionals require some computer skills; these Information Visualization
may include particular programming languages, or 1: A ield of study aims to utilize a humans perceptual and
database or networking skills. (McGill & Dixon, 2005) cognitive abilities to enable and enhance our understanding
of patterns and trends in complex and abstract information.
Information Technology Software Computer-generated two- and three-dimensional
Includes software applications, computer services, and interactive graphical representations are among the most
training. Excludes embedded software in other products. frequently used forms. (Chen, Toprani, et al., 2006) 2:
(Watson, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
340 I nfor m at ion Wave I nfor m e d Conse nt

Computer-supported interactive visual representations Information-Retrieval Mobile Agent


of abstract data which help improve understanding. A small, portable program code that can migrate from
I (Metaxiotis, 2006) 3: The use of computer-supported server to server and execute its masters instructions for
methods to interactively explore and derive new insights information retrieval. (Quah, Leow, & Soh, 2006)
through the visualization of large sets of information.
(Eppler & Burkhard, 2006) 4: The visualization of data- Information-Rich Web Site
mining models, focusing on the results of data mining and A Web site designed to provide the user with information
the data-mining process itself. Techniques include rule- about a topic, such as a medical site. In general, it contains
based scatter plots, connectivity diagrams, multi-attribute more information than a user can be expected to read and
generalization, and decision tree and association rule understand. (Albers, 2006)
visualization. (Viktor & Paquet, 2005) 5: Visualization
of phenomena by means of appropriate representations. Informational Digital Skill
It is a ield different from scientiic visualization since The ability of information consumers to critically assess
information visualization emphasizes delivering digital information they are looded with in cyberspace.
visualizations that improve comprehension, whereas (Eshet, 2005)
scientiic visualization emphasizes delivering realistic
visualizations. (Pareja-Flores & Iturbide, 2005) Informational Privacy
The control over ones personal information in the form of
Information Wave text, pictures, recordings, and such. (Cook, 2005)
A phase of civilization in which industries based on
information processing and handling are dominant factors Informationalization
in the economy. (Targowski, 2005) The process of social advances in which human society
transforms from industrial society to information society.
Information-Based Integration (Lai et al., 2005)
Process in which, given informational inputs and outputs of
autonomous (sub)systems, an analyst develops the overall Informationbase
system being designed that meets the desired functions Set of reports and graphs, structured by means of chapters,
and is interconnected through the low of information. updated automatically and/or manually. (Dragan, 2005)
(Szczerbicki, 2005)
Informationbase Chapter
Information-Eficient Market Part of informationbase, group of reports or graphs.
Information and its dissemination are central elements in (Dragan, 2005)
the traditional view of an eficient market. Internet inance
forums have the potential to enhance the information Informationbase Entry
eficiency of a market by creating an environment where Part of an informationbase chapter, single report or graph.
information is continuously discussed and evaluated. (Dragan, 2005)
(Campbell, 2006)
Informativeness
Information-Gathering Strategy A Web sites ability to inform consumers of product
The approaches and processes used by information seekers. alternatives for their greatest possible satisfaction. (Gao,
Information-seeking behavior is inluenced by previous 2005a)
experience, mental models, and preferences of information
seekers. (McGill & Dixon, 2005) Informed Consent
1: The process by which people make decisions based
Information-Literate Knowledge Worker on adequate information, voluntariness, and capacity to
A worker who knows what information is needed, knows understand and appreciate the consequences of whatever
how and where to obtain that information, understands is being consented to. Also called valid consent.
the meaning of the information, and can act based on the (Goodman, 2005) 2: An individuals freely given consent
information to help the organization achieve its greatest to participate in research based on information provided
advantage. (Mandal et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m e d Em be dding I nhe rit a nc e 341

by the researcher(s) about the research, possible risks department chairs. (Riffee & Sessums, 2005) 5: The
associated with the research, and the voluntary nature of underlying resources that provide the necessary capability
participation. Informed consent must be obtained without for achieving outcomes. (Samuel & Samson, 2006)
I
coercion or undue inluence. (Roberts et al., 2005)
Infrastructure Interdependency
Informed Embedding Denotes a bidirectional relationship between two or
A data embedding method that exploits the information more infrastructures, through which the state of each
about the host media available at the embedder side. (C.- infrastructure inluences or is correlated to the state of
T. Li, 2005) the other infrastructure. (Jeong et al., 2006)

Infostructure Infrastructure TLD: See Infrastructure Top-Level


The complementary set of infrastructures, including an Domain.
underlying electrical and telephonic grid, national core
computing, and capacity access to online subscriptions Infrastructure Top-Level Domain (TLD)
and digital libraries. (Trujillo, 2005) The .arpa (address and routing parameter area) domain
is reserved exclusively for those who implement the
Infotainment architecture and infrastructure of the Internet. (Maggioni
Word formed from information and entertainment. In the & Uberti, 2005)
automotive domain, it identiies a set of features provided
by a VTS, such as audio module, Web browser, and so Infrequent Itemset
forth. (Costagliolam Di Martino, & Ferrucci, 2006) Itemset with support smaller than a certain threshold,
called minsupport. (Wong & Fu, 2005)
Infrared (IR)
A wireless technology that enables short-range Infrequent Pattern
communication between senders and receivers through An itemset that is not a frequent pattern. (Zou & Chu,
beaming. The signal goes straight and will not go through 2005)
walls. (Yang, 2005)
Inheritance
Infrastructure 1: A class inherits its state and behavior from its superclass.
1: A class of wireless networking architectures in which Inheritance provides a powerful and natural mechanism
mobile stations communicate with each other via access for organizing and structuring software programs. (Wong
points, which are usually linked to a wired backbone. Such & Chan, 2006) 2: A feature of object-oriented languages
a network has a ixed infrastructure and has centralized that allows a new class to be derived from another class
control. (Sarkar, 2005) 2: An emerging class of companies (a more general class); derived classes (more speciic
have opted to approach the Application Service Provider classes) inherit the form and functionality of their base
(ASP) market by providing infrastructure management and class. (D. Brandon, 2005a) 3: A special relation between
outsourcing services to ASPs, freeing up their resources two classes of objects; class A inherits from class B when
to focus more directly on application management issues it is considered that A possesses all the characteristics
(telco, data center, networking). (Guah & Currie, 2005) 3: of B (and possibly some more) simply because it is a
An internal supportive framework. Among other things, subclass of class B. Models that support inheritance
infrastructure can refer to the computer networking explicitly allow economical expression of facts, because
technology found in an organization. (Baker & Schihl, declaring A as a subclass of B implies inheritance in
2005) 4: The often unseen network of services provided such models. (Badia, 2005d) 4: A subclass inherits all the
within the institution that supports the daily operations. In attributes of a superclass and all the relationships that it
this case, the distance teaching and learning infrastructure (the superclass) participates in. (Bagui, 2005) 5: A way
includes people working behind the scenes that support of organizing classes so that properties can be deined
students, albeit in an invisible fashion. For example, the once and applied to a whole collection of classes, with a
registrars ofice, the ofice of student inances, the inancial general class deining those properties and specialized
aid ofice, information technology system specialists, classes inheriting them. (Lucas, 2005) 6: The ability of a
as well as distance learning administrators, deans, and superclass to pass its characteristics (methods and instance

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
342 I nhe rit a nc e H ie ra rchy I nnovat ion

variables) onto its subclasses, allowing subclasses to reuse InkML


these characteristics. (Alhajj & Polat, 2005) An Extensible Markup Language (XML) data format for
I representing digital-ink data. (Mohamed & Ottmann,
Inheritance Hierarchy 2006)
Ontologies/taxonomies are structured as hierarchies of
concepts (inheritance hierarchies) by means of IsA Inlink
links. A semantic interpretation of this relationship among A link to a Web site from a different Web site. (Thelwall,
concepts, when noted as (IsA B A), means that concept B 2006)
is a specialization of the more general concept A. In other
terms, A subsumes B. This assertion can be expressed Innovation
in logical form as: x (B(x)A(x)) (1)(1) says that, for 1: A new technology, idea, or process; (verb) the process of
example, if any elephant_ (B, a concept) IsA mammal_ identifying, adopting, and implementing a new technology,
(A, a more general concept), and if clyde_ (an instance or idea, or process. (Klobas & Renzi, 2005a) 2: A process in
individual) is an elephant_, then clyde_ is also a mammal_. which organizations create and deine problems, actively
(Zarri, 2005a) developing new knowledge to solve them, and generating
new products, processes, or services. (Ng & Pemberton,
Inhibitor 2006) 3: An idea, practice, or object that is perceived as
A factor that can stop an activity. (Lubbe, 2005) new by an individual or other unit of adoption. (Askar &
Halici, 2005) 4: Any idea, product, practice, behavior,
Initial Model or object that is apparent as new. (Askarany, 2005) 5:
The unique set of unit consequents of a set of Horn clauses. Something new. It can be a product or a process and must
(Buehrer, 2005) provide beneit to the organization and to the advancement
of society. An invention only becomes an innovation when
Initial Public Offering it has become commercially successful. (Mitchell, 2005a)
1: A companys irst offering of its stock to the public. 6: The application, in any organization, of ideas new to
(Hwang & Stewart, 2006) 2: First sale of a ventures it, whether they are embodied in products, processes, or
common shares to the public; usually results in large proits services. (Tatnall, 2005b) 7: The creation of something
for early stage venture investors. (Craig, 2006b) new. This involves a radical step of making something
different from before or creating something that has not
Initial Teacher Licensure or Teacher Credential existed before. (Fong, 2006a) 8: The generation of new
State certiication document of an individual who has ideas (new knowledge) that leads to the development of
qualiied for the irst time to enter public school teaching, new products or organizational practices. (Newell, 2006)
according to the states requirements. (Wieseman, 9: The successful exploitation of a new idea. This may be
2005a) in the industrial domain (products, processes, campaigns)
or the scientiic domain (theories, insights, methodologies).
Initial Trust (Paukert et al., 2006) 10: The term innovation involves
Trust in another person or organization before the trusting the transformation of an idea into a marketable product or
party gets to know them. (Paravastu & Gefen, 2006) service, a new or improved manufacturing or distribution
process, or a new method of social service. The term also
Initiative encompasses social, institutional, and organizational
The characteristic of originating new ideas or methods. innovation, including in the services sector. The concept
(Olatokun, 2006) of innovation is also used in connection with the analysis
of processes of technological change. Traditionally,
Ink technological change was viewed as consisting of three
A feature of tablet PCs that allows users to enter information stages: invention, innovation, and diffusion. Innovations
using a pen. (Roldan, 2005) can take place at any time in all areas of the economy.
(Finquelievich, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nnovat ion Ca pit a l I nput Ac c e le rat ion 343

Innovation Capital Innovation Network


This innovation-oriented approach focuses on explicit A structured network of N organizations sharing common
knowledge that will eventually facilitate organizational goals related to research and/or development of new
I
learning. The learned organization will then have better products/technologies (e.g., The Human Genome Project).
capabilities to innovate and compete. (Hsu & Mykytyn, This network type is characterized by a decentralized
2006) structure, low-medium competition, and uncommon scope
of operations among members. (Priestley, 2006)
Innovation Diffusion
A theory of innovation in which the main elements are: Innovation Translation
characteristics of the innovation itself, the nature of the A theory of innovation in which, instead of using an
communication channels, the passage of time, and the innovation in the form it is proposed, potential adopters
social system through which the innovation diffuses. translate into a form that suits their needs. (Tatnall &
(Tatnall & Burgess, 2005) Burgess, 2005)

Innovation Engineering Environment (IEE) Innovation-Decision Process


A lexible and adaptable framework based on information The process through which an individual passes from
and knowledge technology for systematic innovation having knowledge of an innovation, to the formation of
support. It includes four core components: Innovation an attitude toward the innovation, to a decision to adopt
Process Management, Generic Innovation Support or reject it, to the implementation and use of the new idea,
Components, Application-Speciic Coniguration Support, and then to the conirmation of this process (knowledge,
and Innovation Environment Coniguration Support. persuasion, decision, implementation, and conirmation).
(Paukert et al., 2006) (Askar & Kocak-Usluel, 2005)

Innovation Factor Innovative Cognition


One of the characteristics of a speciic innovation that A cognitive style that processes information, intuitively,
encourages an organization to adopt an innovation, integratively, and prefers to construct new paradigms.
including the perceived beneits of the innovation and (Kaluzniacky, 2006)
the compatibility of the innovation to the organization.
(Cragg & Mills, 2005) Innovative Culture
An organizational climate that fosters new ideas and
Innovation Hub relection on learning from experiences. (Wright &
Designed to encourage the formation and growth of Taylor, 2005)
knowledge-based enterprises or high value-added tertiary
irms. Innovation hubs generally aim at promoting and Innovative Product
catalyzing innovation and entrepreneurship within an A product having uncertain demand, a high proit margin,
innovative milieu. (Moodley, 2005) and a short lifecycle due to ensuing competition that forces
companies to introduce newer innovations. (Abraham &
Innovation Implementation Potential Leon, 2006)
The likelihood that a particular innovation will be adopted
in the system it was intended for in a way similar to its Innovativeness
intended purpose. (Taylor, 2005) The degree to which an individual or other unit of adoption
is relatively earlier in adopting new ideas than others.
Innovation Knowledge Lifecycle (Lertwongsatien & Wongpinunwatana, 2005)
Model of the knowledge-related activities in which the
innovation process is embedded; this includes a problem Input Acceleration
cycle that feeds the innovation process and that can also A technique for expanding user input, allowing a large
be triggered by innovation, as well as a knowledge cycle volume of input to be provided with few user actions.
that describes activities around knowledge objects within (Trewin & Keates, 2006)
the innovation process on an abstract level. (Paukert et
al., 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
344 I nput De bugging I nst a nc e

Input Debugging Inquiry Training


A process performed on a router to determine from which A structured teaching model that allows individuals to
I adjacent router the packets matching a particular attack learn the way scientists learn. Such a model follows speciic
signature are coming from. (Syed, Nur, et al., 2005) phases of instruction that include solving a real problem
by making hypotheses, gathering and organizing data, and
Input/Output testing different hypotheses to come up with a possible
The performance measures used in DEA evaluation. Inputs solution to dealing with a problem. (Gillani, 2005b)
usually refer to the resources used, and outputs refer to the
outcomes achieved by an organization or DMU. (Chen, Inquiry-Based Learning (IBL)
Motiwalla, et al., 2005) A student-centered, active learning approach focusing on
questioning, critical thinking, and problem solving. IBL
Inquiring Organization is expressed by the idea involve me and I understand.
An organization founded on the principles of one or The IBL approach is more focused on using and learning
more inquiring systems that seeks to increase its learning content as a means to develop information-processing
potential. Inquiring organizations are learning-oriented and problem-solving skills. The system is more student
organizations that strive to include both creation and centered, with the teacher as a facilitator of learning.
management of knowledge in their cache of core There is more emphasis on how we come to know and
competencies. The philosophical foundations of inquiring less on what we know. Students are involved in the
organizations come from Churchmans (1971) discourse construction of knowledge through active involvement.
of knowledge creation and inquiring systems from the The more interested and engaged students are by a subject
viewpoints of selected Western philosophers. These or project, the easier it will be for them to construct in-
perspectives are particularly well suited to knowledge depth knowledge of it. Learning becomes easier when it
management and serve to differentiate the inquiring relects their interests and goals, and piques their natural
organization from other learning organizations. (Hall & curiosity. (Lowry & Turner, 2005)
Croasdell, 2006)
Insourcing
Inquiring System/Inquirer 1: Formalization of the supply relationship between two
Any one of the systems developed by Churchman that departments of the same organization. (Beaumont, 2005)
supports inquiry and is founded on the philosophies of 2: The internal IT division of service recipients executes
Leibniz, Locke, Kant, Hegel, or Singer. (Hall & Croasdell, the IT services to the departments of the service recipient.
2006) (Beulen, 2005)

Inquiring Theory Inspirational Behavior


The theory espoused by Churchman that systems should Inluences others by using emotional appeals, and vivid
be designed to create new knowledge while incorporating and persuasive images, to elevate their performance.
ethics and aesthetics, culminating in knowledge that (Sipior, 2005)
creates the greatest good for the greatest number. (Hall
& Croasdell, 2006) Installed Base
Number of current users of a certain communication
Inquiry product and compatible products. (Voeth & Liehr, 2005)
The process of being actively engaged in the pursuit of
knowledge. (Hall & Croasdell, 2006) Instance
1: A set of attributes, their values, and a class label. Also
Inquiry Style called example, record, or case. (Maloof, 2005) 2: A
An individual approach to learning based on dominant vector of attribute values in a multi-dimensional space
information acquisition, change, the relationship to others, deined by the attributes, also called a record, tuple, or
and problem-solving behavior. (Handzic & Lin, 2005) data point. (Liu & Yu, 2005) 3: Of a model: a set of data

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nst a nc e Se le c t ion I nst it ut iona l St re ngt he ning 345

items structured according to the model. Data instantiate The applications are increasingly used to provide quick
the model (or data schema in this context). (Diskin & user help and feedback, build relationships, and easily share
Kadish, 2005) 4: An example (or record) of the dataset; comments. (Kardaras & Karakostas, 2006) See Chat.
I
it is often a row of the data table. Instances of a dataset
are usually seen as a sample of the whole population (the Instant Messenger
universe). An instance is described by its attribute values, 1: A program that hooks up to a service for conversation
which can be continuous or discrete. (Muhlenbach & in real time. Involved parties see each line of text right
Rakotomalala, 2005) after it is typed (line-by-line), thus making it more like a
telephone conversation than exchanging letters. Popular
Instance Selection instant messaging services on the public Internet include
A process of choosing a subset of data to achieve the AOL Instant Messenger, Yahoo! Messenger, .NET
original purpose of a data-mining application as if the Messenger Service, and ICQ. (Kao & Rerrer, 2006) 2:
whole data is used. (Liu & Yu, 2005) An information technology that enables people to send
real-time text messages. (Wang, J. et al., 2006b)
Instant Message (IM)
A written message, synchronous or asynchronous, sent Instantiation
via an IM tool. The IM tool allows the user to see which Creation of an object, or class instance, from a class.
pre-deined contacts are online and send synchronous (Lucas, 2005)
messages, the conversation taking the character of a chat,
or asynchronous, leaving the message until the contact Institution-Based Trust
goes online. Examples of IM tools are Icq and MSN. 1: Trust based on the guarantees of a third party. (Paravastu
(Dunkels, 2005) & Gefen, 2006) 2: Trust formed when organizational
members believe that their organization as a whole has
Instant Messaging (IM) their best interests at heart and acts accordingly. (Smith,
1: A type of communications service that enables you to 2006b)
create a kind of private chat room with another individual
in order to communicate in real time over the Internet. Institutional Connectivity
It is analogous to a telephone conversation but uses text- Refers to an organization or institutions ability to link with
based, not voice-based, communication. Typically, the others networks and the rate at which this connection is
instant messaging system alerts you whenever somebody made. (Poda & Brescia, 2005)
on your private list is online. You can then initiate a chat
session with that particular individual. (Lalopoulos et al., Institutional Dimension
2005b) 2: A method for real-time communication over a Considering the need for integrated evaluation of business
wired or wireless network. An evolution from IRC (inter- ideas/solutions enabled by IT, it is emergent that there are
relay chat), an early Internet real-time communication organizational dimensions (or institutions). They include
protocol. (Horiuchi, 2005b) 3: An application that provides the context where evaluation is integrated (e.g., the systems
immediate delivery of messages over ixed-line and development lifecycle, the IS management practices and
mobile IP networks. (Gilbert, 2005b) 4: Near-synchronous processes, the peoples roles, the organizational culture) and
Internet-based one-to-one communication technology. furthermore, the understanding of stakeholders behavior
IM allows two users to exchange short text messages in within this context. (Serafeimidis, 2005)
real time. (Hwang & Stewart, 2005) 5: Communication
service on the Internet that enables textual private chats Institutional Policy
with other individuals in real time. (Beuschel et al., 2005) A plan or course of action developed by an institution to
6: A computer application that allows two or more users guide actions. (Schifter, 2005)
to communicate with each other in real time via typed
messages. (Elshaw, 2006b) 7: An application (such as Institutional Strengthening
ICQ, PowWow, and AOLs Instant Messenger) that allows Awareness and effective use of human and technological
members of a group to see who is online at any moment, available resources in all their scope to accomplish
send instant messages, and set up spontaneous small chats. institutional goals. (Falivene & Kaufman, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
346 I nst ruc t iona l Conc e pt ion I nst ruc t iona l Deve lopm e nt

Instructional Conception constraints, motivation, psychology, and related issues.


Conception about the functionalities of (elements of) a (Sales, 2005) 10: The soft technology of organizing
I learning environment. Such conceptions can relate to learning materials and events so that instruction will be
the effectiveness or eficiency of speciic features in a most successful. (Duchastel, 2005) 11: The systematic
learning environment (e.g., tools) or to the environment design of course materials. A common model called ADDIE
as a whole (e.g., KABISA as a learning environment). includes Analysis, Design, Development, Implementation,
(Clarebout et al., 2005b) and Evaluation. (Baker & Schihl, 2005) 12: The systematic
method of how to plan, develop, evaluate, and manage the
Instructional Design (ID) instructional process effectively. (Askar et al., 2005) 13:
1: Conventionally, instructional design refers to linear The systematic process of translating general principles
and externally controlled design practices consisting of learning and instruction into plans for instruction and
of systematic choices and use of procedures, methods, learning. (Askar & Halici, 2005)
prescriptions, and devices to bring about effective,
eficient, and productive learning. However, in CSCL, Instructional Design Model
designing often points to more iterative and cyclical 1: A representation of how instructional design is conducted
design endeavors, where design activities and procedures or how the analysis, design, development, implementation,
integrate collaborative learning theories, technology- and evaluation of an instructional design is conceptualized.
based learning environments, and diverse actors in a (Shambaugh, 2005) 2: Traditional design models are
pedagogically relevant way. (Pys & Lowyck, 2005) 2: prescriptive step-by-step processes, usually associated with
A systematic approach for designing learning materials behaviorist instructional strategies. Phenomenological
based on learning theories and research. (Ally, 2005b) 3: models incorporate constructivist philosophies and
Layout of an optimal integration of educational content practices. In either aspect, design models guide the user
and interface layout of end-user software. (Utsi & Lowyck, in designing effective instruction that takes all aspects
2005) 4: The process of analyzing the students, content, of design (see ADDIE) and reminds the user of critical
and intended context of an instructional program to provide elements and decisions in designing effective instruction.
detailed speciications for an instructional program or (Rogers, 2005a)
curriculum to achieve effective and eficient student
learning within an affordable and accessible delivery Instructional Design Process
format. (Boettcher, 2005a) 5: A systematic approach The process of analyzing the students, content, and intended
for designing learning materials based on learning context of an instructional program to provide detailed
theories and research. (Ally, 2005a) 6: A systematic speciications for an instructional program or curriculum
process for responding to instructional problems, needs, to achieve effective and eficient student learning within
and opportunities. (Shambaugh, 2005) 7: An applied, an affordable and accessible delivery format. (Boettcher,
cross-disciplinary professional (post-graduate) design 2005b)
discipline that integrates human learning theory and
instructional practice to develop, produce, implement, and Instructional Development
evaluate effective educational experiences and learning 1: The development of learner, instructor, and management
environments to improve human performance outcomes, materials (both print and nonprint) that incorporates
knowledge construction, and the acquisition of robust speciications for an effective, eficient, and relevant
transfer competencies. (Lasnik, 2005) 8: The ield of learner environment. Instr uctional development
instructional design includes a range of professions from includes formative and summative evaluation of the
programmers and graphic artists to the instructional instructional product. (Kinuthia, 2005) 2: The process
designer. Designers are able to analyze instruction, of implementing the design plans under instructional
learners, environments, strategies, and media to develop technology (instructional technology = instructional design
effective instruction of training. Designers may or may not + instructional development). Instructional development
be subject matter experts. (Rogers, 2005a) 9: The process provides a process and framework for systematically
of planning for the development and delivery of effective planning, developing, and adapting instruction based
education and training materials. Instructional designers on identiiable learner needs and content requirements.
employ a systematic process that considers learner need, This process is essential in distance education, where
desired learning outcomes, delivery requirements and the instructor and students may share limited common

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nst ruc t iona l I m pe rat ive I nst ruc t ivist Pe rspe c t ive 347

background and typically have minimal face-to-face Instructional Scaffolding


contact. Although instructional development models and Refers to a developmental process of constructing
processes abound, the majority follow the same basic sequential instruction components to achieve an original
I
stages of design, development, evaluation, and revision. outcome. (McCracken, 2005)
(Rahman, 2005a)
Instructional Strategy
Instructional Imperative A communication activity used to engage the learner
Any training or business requirement, such as strategies, in an educational experience and to assist the learner
delivery methods, or constraints, that accommodates in acquiring the planned knowledge, skill, or attitude.
the stakeholder requirement. (Jeffery & Bratton-Jeffery, Instructional strategies include lectures, discussions,
2005) reading assignments, panel presentations, study and media
projects, problem analysis and solutions, ield trips, and
Instructional Management System (IMS) assessment activities. (Boettcher, 2005a)
System and information technology tool that allows
educators to create, organize, and manage online courses Instructional System Design (ISD)
quickly and easily though the use of Web-based templates A process that applies a systematic approach to design,
for online course delivery. Most IMS vendors advertise develop, implement, and evaluate instruction. Such an
their product as a course management tool that allows approach is based on the target learners needs and aims to
individuals to create course content as easily as they create achieve pre-deined learning outcomes. (Aisami, 2005)
documents or presentations in software applications such
as Word or PowerPoint. (Proctor, 2005) Instructional Technology
The systemic and systematic application of strategies
Instructional Management Speciication (IMS) and techniques derived from behavioral, cognitive, and
IMS is originally an abbreviation for Instructional constructivist theories to the solution of instructional
Management Speciication, and is now also commonly problems. It is the systematic application of theory and
used as the short form for the IMS Global Learning other organized knowledge to the task of instructional
Consortium (www.imsproject.org), a group of interested design and development. (Rahman, 2005a)
parties (companies, academics, standards bodies, etc.). IMS
is systematically trying to create workable speciications Instructional Television (ITV)
for all aspects of the learning processaiming from Typically used to describe whole videotaped academic
enterprise issues through content creation and management courses; often set in a studio or classroom using a traditional
to modeling learning styles. IMS has established working lecture format. (Berg, 2005d)
groups in every conceivable activity in the e-learning
domain. The IMS Global Learning Consortium is Instructional/Pedagogical Design/Approach
speciically involved in development of speciications In the context of Web-based instruction, this usually
leaving standards creation, accreditation paths, and so relates to pedagogical decision making, which concerns
forthto other bodies. (Gordon & Lin, 2005) two different aspects of the system design: planning the
educational content (what concepts should be the focus of
Instructional Media the course) and planning the delivery of instruction (how
Modes of communication in which teaching takes place, to present these concepts). (Magoulas, 2006)
such as instruction by face-to-face interaction, lessons by
radio, deployment of curricula or interactive learning via Instructivist Perspective
the Internet, and so forth. (Fisher, 2005) A perspective on learning that places emphasis on the
teacher in the role of an instructor that is in control of what
Instructional Objective is to be learned and how it is to be learned. The learner is
A description of a performance you want learners to be the passive recipient of knowledge. Often referred to as
able to exhibit before you consider them competent. An teacher-centered learning environment. (Torrisi-Steele,
objective describes an intended result of instruction rather 2005)
than the process of instruction itself. (I. Chen, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
348 I nst rum e nt a lit y I nt e grat e d Libra r y Syst e m

Instrumentality Integrated Circuit (IC)


The notion that action, including knowledge management, A small electronic device made out of a semiconductor
I is carried out for a purpose, and that the purpose underlying material. Integrated circuits are used for a variety of
the action can be maligning as well as beneicial. (Land, devices, including microprocessors, audio and video
Nolas, et al., 2006) equipment, and automobiles. (Lee & Warkentin, 2006)

Insurance Integrated Decision-Making Support System


Protection against future loss. In exchange for a dollar (I-DMSS)
value (premium), insurance is a promise of reimbursement An information system that integrates the functions of one
in the case of loss. Contractual arrangement of insurance or more individual (standalone) decision-making support
may be voluntarily or by government mandate (such as systems. (Forgionne, 2005) See also Management Support
minimum requirements for automobile insurance for System (MSS).
licensed drivers). (Kitchens, 2005)
Integrated Framework for the Analysis of
Insurance Underwriter: See Underwriter. Dependable Interactive Systems (IFADIS)
A tool for the analysis of user interface models developed
Intangible Asset at the University of York (UK). (Campos & Harrison,
1: Higher education institutions are traditionally based upon 2006)
ideas, one form of intangible assets. However, the modern
university frequently seeks to differentiate itself from its Integrated ICT Planning
competition. Intangible assets include an investment or Planning that blends ICT planning or information systems
outcome enjoyed by the institution in knowledge-based planning with strategic planning. (Mackey, 2005)
resources and processes. Typically, these intangible
assets are termed soft assets because they are not either Integrated Learning Environment
infrastructure or equipment. Some examples are training Current and emerging learning management systems
programs, improvements to organizational communication combine information management and productivity tools
lows, or new quality assurance systems. (Williamson et along with Group Support System (GSS) features for
al., 2006) 2: An organizational asset that does not have any support and management of individual and collaborative
physical manifestation, or that has physical measures with learning. Document and multimedia information
no bearing on its value. The following is a typical list of management (drop boxes and other tools for storage,
intangible assets that an organization may have: fragmented retrieval, sharing, and organization of learning content
knowledge residing with individuals, or encapsulated in and discussions), threaded discussions for asynchronous
artifacts such as documentation and software code; codiied communication, instant messaging for synchronous
and classiied knowledge residing in repositories; unique communication, and advanced e-mail (spell check, multiple
systems, processes, methodologies, and frameworks views allowing sorting of messages, and other extensive
that the organization follows; formalized intellectual message editing capabilities) are important features in
property, such as patents, trademarks, and brands; and learning management systems. Testing, grading, student
relationships and alliances that the organization may have registration, and management of question-and-answer
shaped (Kochikar & Suresh, 2005) sessions also enable management of the learning process.
(Alavi et al., 2005)
Intangible Cost
One of a number of costs that are dificult to be measured Integrated Library System
in a direct way, since they refer to vague concepts. (Esteves The automation system for libraries that combines modules
& Pastor, 2005) for cataloging, acquisition, circulation, end-user searching,
database access, and other library functions through a
INTASC Principle common set of interfaces and databases. (Nicholson &
One of a set of core standards for what all beginning Stanton, 2005)
teachers should know, be like, and be able to do in order
to practice responsibly, regardless of the subject matter or
grade level being taught. (Shaw & Slick, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e grat e d Pe rsona l Fina nc ia l Se r vic e (I PFS) I nt egrit y 349

Integrated Personal Financial Service (IPFS) the system in every other component of the system. For
The seamless integration of previously independent example, if a Human Resources system is integrated,
inancial products and services. Prior independence of and an employee changes his or her address through any
I
these inancial products was a function of organizational, human interface that allows it, then the new address will
regulatory, and/or technological constraints imposed upon be shown automatically every place else in the system.
the providers. For example, in a true IPFS relationship, (Fulton, 2005) 3: Refers to how work is performed.
funds would low seamlessly between insurance, banking, Knowledge entities cannot be merged but should be looked
investment, and tax accounts. (Gordon & Mulligan, upon as a distributed system of cognitive elements whose
2005) integrative potential lies in the collective ability to perform.
(Munkvold, 2006)
Integrated Services (IntServ)
Architecture where network resources are apportioned Integration Adapter
according to an applications Quality of Service (QoS) Data and application adapters (also known as data
request, subject to bandwidth management policy and interfaces or data drivers) are native software objects that
focused on individual lows. (Gutirrez & Ting, 2005) allow integration tools to retrieve data eficiently from
complex, sometimes proprietary stores of information.
Integrated Services Digital Network (ISDN) (Karakostas, 2005)
1: A set of communications standards allowing a single
wire or optical iber to carry voice, digital network services, Integration Broker (IB)
and video that may replace the plain, old telephone system. A middleware product that uses an internal (or virtual)
(Vician & Buche, 2005) 2: A set of CCITT/ITU (Comit representation of a Common Data Model (CDM) to mediate
Consultatif International Tlphonique et Tlgraphique/ the exchange of data and data-related services among
International Telecommunications Union) standards for applications. An IB manages the physical, syntactic, and
digital transmission over ordinary telephone copper wire as semantic translation of data from any application, the
well as over other media. ISDN in concept is the integration validation of rules of authorization and business processing,
of both analog or voice data, together with digital data over and the transport to each application and component
the same network. (Rahman, 2005c) 3: A communication required to preserve system-wide consistency of the virtual
technology that allows the clear transmission of voice, collection of data. (Fulton, 2005)
data, image, and their combinations. ISDN users can
have more than one call at a time. (Kirlidog, 2005) 4: A Integration Hub
telecommunication service that uses digital transmission A hub is a messaging server that exchanges important
and switching technology to support voice and digital information between different applications so that the
communications. (Butcher-Powell, 2005) 5: A digital applications can interact in a meaningful way. (Karakostas,
telephone/telecommunications network which carries 2005)
voice, data, and video over existing telephone network
infrastructure. It is designed to provide a single interface Integration of Processes
for hooking up a phone, fax machine, PC, and so forth. The coordination and integration of processes seamlessly
(Cosemans, 2005a) within and without the organization. (Sundaram &
Portougal, 2005a)
Integration
1: The process of achieving unity of effort among various Integrity
subsystems in the accomplishment of the organizational 1: Allows the system to verify whether modiications
task (process focus); the quality of the state of collaboration have occurred; it does not make sure that information was
that exists among departments which is required to achieve not altered. (Pierre, 2006b) 2: In databases, integrity
unity of effort by the demands of the environment (outcome is largely synonymous to semantic consistencythat
focus). (Peterson, 2005) 2: A system is integrated when it is, the correctness of stored data with regard to their
is suficiently interconnected that a change to any element intended meaning. Integrity, as expressed by integrity
of the system by any component of the system is relected constraints, should not be confused with a namesake
appropriatelythat is, according to the business rules of issue often associated with data security. (Decker, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
350 I nt e grit y Che ck ing I nt e lle c t ua l Ca pit a l (I C)

3: The condition that exists when data is unchanged from Integrity Satisfaction
its source and has not been modiied, altered, or destroyed A given database state satisies integrity if each integrity
I at any operation according to an expectation of data constraint in the database schema, posed as a query, returns
quality. (Mitrakas, 2006) 4: Prevention of unauthorized the required yes/no answer. An ostensibly equivalent,
modiication of information. (Tong & Wong, 2005a) 5: The but in fact slightly weaker deinition says that integrity is
belief the other party is honest and adheres to accepted satisied if it is not violated (see Integrity Violation). The
modes of behavior. (Paravastu & Gefen, 2006) 6: As difference between both deinitions manifests itself in
deined by the American Institute of Certiied Public incomplete databases. (Decker, 2005)
Accountants, it includes the character traits of honesty,
candor, and protection of conidentiality. (Wang, Chen, Integrity Violation
et al., 2006) In a given database state, integrity is violated if any one
of the integrity constraints, posed as a query, returns the
Integrity Checking opposite of the required yes/no answer. (Decker, 2005)
Systematic tests ensuring that integrity remains satisied
(see Integrity Satisfaction). If integrity is violated (see Intellectual Alignment
Integrity Violation), then the update causing inconsistency Describes a state where the content of IT and HR business
must be rejected or some other action must be taken to plans are consistent and externally valid. (Dery & Samson,
enforce a consistent state, that is, one that satisies integrity 2005)
(see Integrity Enforcement). (Decker, 2005)
Intellectual Capital (IC)
Integrity Constraint 1: The aggregation of individual human capital in a
1: A rule that must be satisied by the database or knowledge sense that the aggregation is more than the sum of it
base if it is consistent. (Grant & Minker, 2006) 2: A parts, that is, encompassing organizational routines and
requirement on the consistency of the information stored. capabilities. (von Wartburg et al., 2006) 2: The sum of the
(Decker, 2005) 3: One of a set of properties that the data individual imagination that, when aggregated, becomes
of a database are required to satisfy; they are expected everything everybody in an organization or team knows
to be satisied after each transaction performed on the and which provides them with some advantage over their
database. Integrity constraints provide a way of ensuring competitors. Organizational IC comes from the interplay
that changes made to the database do not result in a loss of structural capital, which augments the value of human
of data consistency. Integrity constraints include key capital, leading to an increase in customer/supplier capital.
references and cardinality restrictions. (Aldana Montes (Williamson et al., 2006) 3: Knowledge and know-how
et al., 2005) 4: Set of constraints which must be satisied possessed by an individual or an organization that can be
by database instances. (Flesca, Furfaro, et al., 2005) 5: converted into value in markets. Roughly the same as the
A statement that speciies the set of valid values in a concept of intangible assets. (Anttiroiko, 2005b) 4: Can be
database. Integrity constraints must be satisied to protect divided into three categories: human capitalthat in the
the database against inconsistencies. (Rivero, 2005) minds of individuals, including knowledge, competences,
experience, know-how, and so forth; structural capital
Integrity Control that which is left after employees go home for the night,
Deals with the prevention of semantic errors made by including processes, information systems, databases and
the users due to their carelessness or lack of knowledge. so forth; and customer capitalcustomer relationships,
(Ibrahim, 2005) brands, trademarks, and so forth (Herschel, 2005) 5:
Everything that is known within an organization as
Integrity Enforcement exempliied in knowledge itself, in ideas and competencies,
Actions taken to ensure that integrity remains satisied and in systems and processes. (Archer, 2006) 6: Refers
across database updates (see Integrity Satisfaction). to intellectual materialknowledge, information,
Conservative integrity enforcement rejects updates that intellectual property, and experiencethat can be put to use
would violate integrity (see Integrity Violation). Progressive for creating wealth. (Hsu & Mykytyn, 2006) 7: Knowledge
integrity enforcement attempts to satisfy the update while gathered by an organization and its employees that has
maintaining integrity by further data modiications, value and would help the organization gain beneit when
possibly consulting the user. (Decker, 2005) reused. (Elshaw, 2006a) 8: Knowledge or information that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e lle c t ua l Ca pit a l M a na ge m e nt (I CM ) I nt e lle c t ual Prope r t y Right s 351

is created through collaborative activity by a community. It (Fleming, 2005b) 6: A comparatively recent description
can be dificult to ensure clear notions of ownership since of the much older concept that intellectual effort can
knowledge is jointly held. The organization of communities be treated as a form of property and controlled so as to
I
must deine codes of behavior to deal with ownership circumscribe or limit the ways in which that intellectual
issues. (Fleming, 2005c) 9: The human intelligence asset effort is used by others. The concept of intellectual property
that belongs to a company. It consists of people, the skills, encompasses copyright, patent, trademarks, moral rights,
values, learning, and knowledge that they bring to the and other similar forms of legal protection. A contested
organization. (Ray, 2006) 10: The set of intangible assets implication of the use of the term is that intellectual work
that enable a company to function. (Casado, 2005) should attract the same level of legal protection that is given
to physical property. (Marshall, 2005) 7: A general term for
Intellectual Capital Management (ICM) intangible property rights that are a result of intellectual
A management of value creation through intangible effort. (Pemberton & Stalker, 2006) 8: Any product of
assets. Close to the concept of knowledge management. the human intellect that is unique, novel, and unobvious
(Anttiroiko, 2005b) (and has some value in the marketplace)that is, an idea,
invention, expression or literary creation, unique name,
Intellectual Capital Management System business method, industrial process, chemical formula,
(ICMS) computer program process, or presentation. (Du Mont,
A combination of communities, processes, and technology 2005) 9: Includes business designs, business process
brought together to identify, value, categorize, and capture techniques, or patterns. Technology held proprietary
intellectual capital for reuse. (Elshaw, 2006a) through patents, copyrights, or trade secrets can deter new
entrants and achieve a competitive advantage by exploiting
Intellectual Creation economies of scale and scope or through differentiation.
Any work of creation, such as authorship, visual arts, Five steps are suggested to establish intellectual property
performing arts, or music. (Kieler & West, 2005) capital: conduct an intellectual property audit, incubate
new ideas, reduce the ideas to practical form, protect the
Intellectual Property (IP) idea, and exploit the idea. (Hsu & Mykytyn, 2006) 10: A
1: A product of the intellect (intangible property) that concept allowing individuals or organizations to own their
has commercial value such as patents, trademarks, creativity and innovation in the same way that they can
copyrights, and so forth. (Zhao, 2005) 2: Any product of own physical property. The owners of IP can control its
the human intellect that is unique and has some value in use and be rewarded for it; in principle, this encourages
the marketplace. It may be an idea, composition, invention, further innovation and creativity. (Warren, 2006)
method, formula, computer software, or something similar.
In practice, special attention is paid to such intellectual Intellectual Property Rights (IPRS)
property that can be protected by the law (e.g., patent and 1: Treating certain intangible products of the human
copyright). (Anttiroiko, 2005b) 3: A formal measurable mind as belonging to the creator or holder in legal form
subset of Intellectual Capital (IC); the tangible product that such as patents, trademarks, or copyright. (Demediuk,
results from the idea, and is represented and recognized 2005) 2: One of a set of copyright and connected rights
through patents, trademarks, designs, and copyright (which that include, inter alia, the right of copying, modifying,
includes software and multimedia). IP can also be extended and distributing the protected work. (Cevenini, 2005)
to cover a much broader and often more intangible grouping 3: Exclusive rights accorded by a state to legal persons
that extends to trade secrets, plant varieties, geographical based on intangible knowledge, permitting them to
indications, and performers rights. (Williamson et al., control how the knowledge is distributed or exploited for
2006) 4: The time-limited monopoly (a copyright or inancial or other beneit. Consists of copyrights, patents,
patent) given to one who has made a contribution to that trademarks, and trade secrets. (Okoli & Carillo, 2006) 4:
progress. It is suficient to deine IP as the protection Laws and enforcement mechanisms to afford the creator
measure for IC once identiied and deined. (Ariely, 2006a) of an intellectual property (e.g., software) the means of
5: Wider right to control ownership over any material of a controlling how their work is used, and ensuring that the
conceptual nature (i.e., invention, idea, concept) as well as creator is properly rewarded and recognized for his or her
encompassing material originally covered by copyright. work. (Hawk & Kaiser, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
352 I nt e lle c t ua l Tur ning Point I nt e llige nt Age nt Te chnology

Intellectual Turning Point foundation that consists of information technology-based


Scientiic work that has fundamentally changed the facilities, systems, and services that support holistic
I subsequence development in its field. Identifying intelligent behaviors throughout an organization. (Tang
intellectual turning points is one of the potentially beneicial & Sivaramakrishnan, 2005)
areas of applications of trend detection techniques. (Chen,
Toprani, et al., 2006) Intelligence Need
One of the topics that an organization must monitor in
Intelligence order to stay competitive. (Parker & Nitse, 2006)
1: Ability of a given system to act appropriately (i.e., to
increase the probability of the achievement of given aims) Intelligent Agent
in an uncertain and changing environment. (Szczerbicki, 1: A proactive computer system capable of lexible
2005) 2: Information, news, and advice. Brain power or autonomous action in order to meet its design objectives
cognitive skills. IBM uses the term business intelligence as set out by the designer. (Ally, 2005b) 2: A piece of
systems to describe its mixed integrated knowledge software, used extensively on the Web that performs
systems. (Mockler & Dologite, 2005) tasks such as retrieving and delivering information, and
automating repetitive tasks. It internally uses some form
Intelligence Cycle of knowledge representation based on logics. (Sicilia
1: A complete process of intelligence data, divided into data & Garca-Barriocanal, 2006) 3: A proactive computer
collection, data processing and exploitation, data analysis, system that is capable of lexible autonomous action in
and production and dissemination. (Badia, 2006) 2: Cycle order to meet its design objectives set out by the designer.
of four stages (collections of intelligence activities). The (Ally, 2005a) 4: A program that gathers information or
stages are direction (also referred to as planning, in which performs some other service without your immediate
the strategic information requirements are determined), presence and on some regular schedule. (Raisinghani
collection (determining sources and retrieving data), et al., 2005) 5: A program that makes use of Artiicial
analysis (assessing the strategic relevance of data), and Intelligence (AI) approaches to provide timely contextual
dissemination (of the intelligence to strategic decision help or instruction to a learner. (Askar et al., 2005) 6: A
makers). (Vriens, 2005b) software entity that performs a set of operations on behalf
of a user or another program. Such entities are embedded
Intelligence Data Source in computer-based information systems to make them
One of the origins of data captured in the data-collection smarter. This is usually achieved with the employment of
phase; the term covers both people (HUMINT) and artiicial intelligence techniques. (Karacapilidis, 2005) 7:
mechanical or technical means (SIGINT, IMINT, An agent that is capable of lexible behavior: responding to
MASINT). (Badia, 2006) events timely, exhibiting goal-directed behavior and social
behavior, and conducting machine learning to improve its
Intelligence Density own performance over time. (Soh & Jiang, 2006) 8: An
The useful decision support information that a decision agent who acts in an intelligent way (autonomy, learning,
maker gets from using a system for a certain amount of reasoning, etc.). (Karoui, 2005) 9: An autonomous software
time, or alternately the amount of time taken to get the program that performs certain tasks delegated to it by
essence of the underlying data from the output. (Sundaram its master. The program is able to learn and adapt to its
& Portougal, 2005b) environment in order to perform the tasks better. Task-
speciic intelligent agents are given different names based
Intelligence Infrastructure on their functionalities, such as interface agent, information
1: Comprises all technological, human resources, and agent, e-commerce agent, and personal assistant agent.
organizational means needed to manage, support, and (Tang & Sivaramakrishnan, 2005)
perform the intelligence activities. It consists of three
sub-infrastructures: the technological infrastructure, the Intelligent Agent Technology
human resources infrastructure, and the organizational Integration of network, Internet, and artiicial intelligence
infrastructure. (Vriens, 2005a) 2: The organizational techniques. (Hentea, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e llige nt Algorit hm I nt e llige nt Que r y Answ e ring 353

Intelligent Algorithm are inside, and present and retrieve the related and interested
A human-centered algorithm with the capacity for portions for the users. (Y.-J. Zhang, 2005a)
thought and reason, especially to a high degree. (Barolli
I
& Koyama, 2005a) Intelligent Interface
A point of communication between a human and a computer
Intelligent Call Routing (ICR) that displays qualities that mimic traits observed in human
A communications service that provides companies communication such as the use of natural languages.
with the ability to route inbound calls automatically to (Alkhalifa, 2005b)
destinations such as a distributed network of employees,
remote sites, or call-center agents. Call routing is typically Intelligent Key
based on criteria such as area code, ZIP code, caller ID, Contains data that has a meaning beyond the unique
customer value, previous customer status, or other business identiication of a database record. For example, a vehicle
rules. (Lalopoulos et al., 2005b) identiication number (VIN) contains information about the
manufacturer, model, and other attributes of the vehicle.
Intelligent Computer-Assisted Language (Millet, 2005)
Learning (ICALL)
The exploration of the use of artiicial intelligence methods Intelligent Metabusiness
and techniques for language learning. (Laghos & Zaphiris, A metabusiness with a high degree of reach, range, and
2005a) structuring. (Joia, 2005)

Intelligent Data Analysis Intelligent Organization


An interdisciplinary study concerned with the effective An organization is a living organism where all components
analysis of data, which draws the techniques from diverse and subsystems work coherently together to enable the
ields including artiicial intelligence, databases, high- organization to maximize its potential in its goal-driven
performance computing, pattern recognition, and statistics. endeavors. It is characterized by learning and adapting to
(Liu, 2005) the changing environment. (Tang & Sivaramakrishnan,
2005)
Intelligent Decision-Making Support System
(I-DMSS) Intelligent Portal
Computer-based system composed of a user-dialogue Portal designed for decision-making purposes. An
subsystem, a multi-dimensional database and knowledge intelligent portal is not an agent program, but a content-
base subsystem, and a quantitative and qualitative based information package that knows what it is used for
processing subsystem enhanced with AI-based techniques, and how it can achieve its goal. In practice, intelligent
designed to support all phases of the decision-making portals are supported by a software component, namely,
process. (Forgionne et al., 2005) an Information Broker running on application servers over
the Internet. The intelligence comes from the mechanisms
Intelligent Enterprise that support the portals to deliver information at the right
1: An organization that is able to understand changing time to the right place. (Li, 2005a)
environments, and adapt with agility and resourcefulness
in order to outperform competitors. (Jones & Gupta, 2005) Intelligent Program
2: An organization capable of acting effectively in the A program that is intelligent in some sense, using learning,
present and dealing effectively with the challenges of the adaptive, or evolutionary algorithms. (Guan, 2006d)
future by being proactive, adaptable, knowledgeable, and
well resourced. (Framinan, 2005) Intelligent Query Answering
Enhancements of query answering systems into sort of
Intelligent Image Data intelligent systems (capable or being adapted or molded).
A data format that embeds pixel information of images Such systems should be able to interpret incorrectly posed
as well as higher-level information, such as indices and questions and compose an answer not necessarily relecting
semantic information. This format is self-descriptive in the precisely what is directly referred to by the question, but
sense that data could explain by themselves what contents rather relecting what the intermediary understands to be

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
354 I nt e llige nt Sc a le I nt e r-Orga nizat iona l I nfor m at ion Syst e m (I OI S)

the intention linked with the question. (Ras & Dardzinska, content, pedagogical, and diagnostic expertise during
2005) the learning process. (Ally, 2005d) 3: A computer-based
I instructional system using artiicial intelligence modeling
Intelligent Scale and reasoning techniques for providing a personalized
A scale equipped with a special camera and identiication learning experience. ITSs typically rely on three types of
software. Based on an objects structure, size, color, and knowledge: expert model, student model, and instructor
thermal image, the scale automatically recognizes the item, model. (Esmahi, 2005)
weighs it, and prints out a price tag. (Kotzab, 2005)
Intelligent Web Search
Intelligent (Smart) Querying A Web search system that learns a users information
Querying that is driven by some kind of inference engine preference. (Meng & Chen, 2005)
or mechanism for reining, formulating, or completing
query construction. (Kapetanios, 2005) Intention to Use
An attitude measure of an end users goal to use a speciic
Intelligent Software Agent information system. (Shayo & Guthrie, 2005)
1: A computer application software that is proactive and
capable of lexible autonomous action in order to meet its Intentional Community of Practice
design objectives set out by the designer. The software A community created by an organization rather than being
learns about the user, and adapts the interface and the an informal cluster or network of employees who share a
information to the users needs and style. (Ally, 2005c) passion, who share knowledge, or work together to solve
2: A software agent that uses Artiicial Intelligence (AI) problems. (Tremblay, 2006b)
in the pursuit of the goals of its clients. (Wan, 2006)
3: An intelligent software agent acts at speed over the Intentional Online Learning Plan
electronic communication channel on behalf of human Individualized written strategy developed between a
individuals or companies as their proxy; it is a program student and facilitator that outlines needs and goals.
acting on behalf of another person, entity, or process. An (Crichton, 2005)
intelligent software agent is an autonomous program that
is capable of perceiving and interpreting data sensed from Intentional Versioning
its environment, relecting events in its environment, and Automatic construction of versions based on coniguration
taking actions to achieve given goals without permanent rules. (Martnez-Gonzlez, 2005)
guidance from its user. Agents have to have the intrinsic
ability to communicate, cooperate, coordinate, negotiate, Inter-Arrival Distribution
and learn, as well as the capability to evolve through their The probability density function that describes likely
interactions with other agents. Agents can be stand-alone or and unlikely inter-arrival times for packets. (Guster et
be part of a multi-agent system. (Richards et al., 2005) al., 2005)

Intelligent System Inter-Domain Routing Protocol


A conceptual system that learns during its existence and IP-level routing protocol in order to create paths through
acts on the environment where it lives, maybe modifying the border-routers of an Autonomous System (AS).
it. (Analide et al., 2006) (Hossz, 2006)

Intelligent Tool Inter-Organizational Information System (IOIS)


A tool that can adjust its responses based on learner needs An automated information system, built around computer
and queries. (Bonk et al., 2005) and communication technology, which is shared by two
or more companies. It facilitates the creation, storage,
Intelligent Tutoring System (ITS) transformation, and transmission of information across
1: A software system capable of interacting with a a companys organizational boundaries to its business
student, providing guidance in the students learning of partners. Sometimes referred to as an IOS. (Archer,
a subject matter. (Soh, 2006) 2: An automated tutor to 2005)
help students achieve their learning goals by providing

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r-Proje c t Le a r ning I nt e ra c t ion Syst e m 355

Inter-Project Learning Interaction Channel (IC)


1: A learning activity in which project-speciic knowledge, A bidirectional channel established between the
templates, or designs are transferred from a source project to service provider and the user for interaction purposes.
I
other projects. (Oshri, 2006) 2: In project-based industries, (Chochliouros et al., 2005b)
people are organized around projects rather than on a
functional basis. Learning rarely happens in a project, Interaction Design
as people will disband upon its completion, and all the 1: A similar soft technology focusing on the processes of
successes or failures are easily forgotten or not learned by interacting with information, particularly in high-impact
those who are not involved. This concept involves trying or strongly emotive contexts. (Duchastel, 2005) 2: The
to leverage knowledge and experience from other projects coordination of information exchange between the user
which may beneit the current one. (Fong, 2006a) and the system. (Ferre, Juristo, & Moreno, 2006) 3: The
process of designing interactive products to support people
Inter-Sectorial Cooperation in their everyday and work lives. (Singh & Dix, 2006)
Cooperation that is represented by a more or less stable
partnership between the private and the public sector. Interaction Management
(Knust & Hagenhoff, 2005) An entire system that monitors customer communications
at every possible contact point, regardless of sourcethat
Inter-University Cooperation is, Web, telephone, fax, e-mail, kiosks, or in person.
Cooperation between different universities or university (Borders & Johnston, 2005)
institutes. Such universities must be state-run and
not private-run, otherwise such cooperation would be Interaction Management System
considered an inter-sectorial one. (Knust & Hagenhoff, An information system providing an environment for
2005) communications and coordination of work activities for
virtual teams. (Dustdar, 2005)
Interaction
1: Bidirectional information exchange between users and Interaction Method
equipment (Bevan, 2006) 2: Contact and communication The ways an e-shopper can manipulate items within the
between faculty and students, and between the students virtual mall. The interaction methods may vary, depending
themselves, is one of the important determinants of on the type of item representation (video, 3D model,
completion and retention. (Lindsay, Howell, et al., photograph), the item semantics, and the preferences or
2005) 3: How a user communicates, or interacts, with a expertise of the user. (Lepouras & Vassilakis, 2006)
computer. Interaction focuses on the low of interaction,
the dialogue between person and computer, how input Interaction Process
relates to output, stimulus-response compatibility, and The process customers go through in order to ind
feedback mechanisms. (Singh, 2005) 4: Interaction or conigure the product variations that meet their
among members of a group is necessary to produce requirements via the online channel. (Blecker & Abdelkai,
collaboration. It can be measured by examining the 2006)
give-and-take nature of the discussion threads. (Ingram,
2005) 5: Mediated communication between two or more Interaction Standard
individuals. (Woods & Baker, 2005) 6: The mutual One of a set of standards that are primarily used in business
response and acknowledgment of members of the group transactions. These standards address communication
to ideas and suggestions from other members of the group. content and interfaces in e-business. (Hawk & Zheng,
It involves challenging, defending, and accepting those 2006)
ideas. (Ingram & Hathorn, 2005a) 7: Usually refers to
reciprocal communication between two (or more) parties Interaction System
where there are feedback, comments, suggestions, and Comprehensive entity for optimal customer-supplier
so forth. It can also be one way, for example, in learner- interaction in e-business consisting of two separate
content interaction, where the interaction is relective in yet interconnected information systems: an advisory
nature. (Kung-Ming & Khoon-Seng 2005) component and a product conigurator. (Blecker, 2006b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
356 I nt e ra c t ion w it h Cla ssm at e s I nt e ra c t ive M ult im e dia M e t hod (I M M )

Interaction with Classmates Interactive Delivery Mode


Interaction among learners through debate, collaboration, Interaction between student and instructor in a synchronous
I discussion, and peer review, as well as informal and mode. (Hunter & Carr, 2005)
incidental learning among classmates. (Swan, 2005)
Interactive Digital Multimedia
Interaction with Content A system enabling end users to customize and select the
The learners interaction with the knowledge, skills, and information they see and receive by actively engaging with
attitudes being studied. (Swan, 2005) the system (e.g., tourism kiosk, interactive television), as
opposed to passive multimedia where the end user has
Interaction with Instructors no control over the timing, sequence, or content (e.g.,
The myriad ways in which instructors teach, guide, videotape, linear presentation). (Lang, 2005)
correct, and support their students by interacting with
them. (Swan, 2005) Interactive Learning
1: An environment where the student is actively involved
Interaction-Oriented Intervention in a reciprocal exchange of information with the teacher
The appropriate presence of the teacher in an active learning and other students. (Baxendale, 2005) 2: The process of
and student-centered environment. (Bodomo, 2005a) exchanging and sharing knowledge resources conducive
to innovation between an innovator, its suppliers, and/or
Interactional Approach its clients. It may start with a resource-based argument,
An approach that acknowledges that both characteristics speciied by introducing competing and complementary
of the person and the environment inluence behaviors theoretical arguments, such as the complexity and
and outcomes. (Jawahar, 2005) structuring of innovative activities and cross-sectoral
technological dynamics. (Rahman, 2005c) 3: The process
Interactive of exchanging and sharing knowledge resources conducive
1: A computer-delivered format allowing the user to control, to innovation between an innovator, its suppliers, and/or its
combine, and manipulate different types of media, such clients. It may start with a resource-based argument, which
as text, sound, video, computer graphics, and animation. is speciied by introducing competing and complementary
(Ryan, 2005) 2: A computer system that allows the person theoretical arguments such as the complexity and
using it to affect the way in which it works or the outcome, structuring of innovative activities, and cross-sectoral
such that the user is not playing a passive role. (Sieber & technological dynamics. (Rahman, 2005a)
Andrew, 2005)
Interactive Media
Interactive Advertising Media that allows for a two-way interaction or exchange of
Advertising that simulates a one-on-one interaction to information via interactive tools. (Ketelhut et al., 2005)
give consumers more control over their experience with
product information than do traditional media ads. (Gao, Interactive Learning Environment (ILE)
2005b) A software system that interacts with a learner and may
immerse the learner in an environment conducive to
Interactive Classroom learning; it does not necessarily provide tutoring for the
A classroom that facilitates virtual and face-to-face learner. (Soh & Jiang, 2006)
conversations among teachers and learners. (Roldan,
2005) Interactive Multimedia Method (IMM)
A multimedia system in which related items of information
Interactive Data Mining are connected and can be presented together. This system
Human-computer collaboration knowledge discovery combines different media for its communication purposes,
process through the interaction between the data miner and such as text, graphics, sound, and so forth. (Rahman,
the computer to extract novel, plausible, useful, relevant, 2005c)
and interesting knowledge from the database. (S. Wang
& H. Wang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e ra c t ive M ult im e dia Te chnique I nt e ra c t ivit y 357

Interactive Multimedia Technique Interactive Video


One of several techniques that a multimedia system uses, Presentation of class via video with student ability to
and in which related items of information are connected respond to the instructor. (Witta, 2005)
I
and can be presented together. Multimedia can arguably
be distinguished from traditional motion pictures or Interactive Voice Response (IVR)
movies, both by the scale of the production (multimedia is An automated telephone answering system that responds
usually smaller and less expensive) and by the possibility with a voice menu, and allows the user to make choices and
of audience interactivity or involvement (in which case it is enter information via keypad. IVR systems are widely used
usually called interactive multimedia). Interactive elements in call centers and as a replacement for human switchboard
can include: voice command, mouse manipulation, text operators. (Malik, 2006)
entry, touch screen, video capture of the user, or live
participation (in live presentations). (Rahman, 2005d) Interactive Web Site
A Web site or page conigured so as to invite correspondence
Interactive Radio Counseling between the user and the originator/sponsor of the site.
Radio stations across the country broadcast interactive Such sites go beyond passively providing information to
phone-in counseling every Sunday (4:00 to 5:00 p.m.). The those who browse the site. Customarily, there are options
students participate from their homes through toll-free to complete online surveys, send e-mail to the sponsor,
telephone numbers to interact with the experts at various request specialized or personalized response(s), and so
AIR studios. (Sharma, 2005) forth. (Baim, 2005)

Interactive Service Interactivity


A telecommunication service that provides users with 1: A characteristic of a medium in which the user can
the ability to control and inluence the subjects of inluence the form and content of the mediated presentation
communication. (Hulicki, 2005) or experience. (Gao, 2005b) 2: A reciprocal exchange
between the technology and the learner, a process which
Interactive Session is referred to as feedback. (Askar et al., 2005) 3: The set
A period of communication for the exchange of ideas by of functions and operations available to the learner that
an assembly of people for a common purpose. (Mohamed involve, engage, and motivate the learner to interact in a
& Ottmann, 2006) computer-based environment. (Kung-Ming & Khoon-Seng
2005) 4: Concerned with the engagement between the
Interactive System medium itself, whereby people manipulate the medium
1: A system that supports communication in both directions, to provide information or perform functions commanded
from user to computer and back again. A crucial property by the user. (Weber & Lim, 2005) 5: A process whereby
of any interactive system is its support for human activity. students are systematically encouraged to be active
(Singh, 2005) 2: A system that supports communication participants in their own learning. It is achieved by teaching
in both directions, from user to computer and back. A approaches that engage students in the construction of
crucial property of any interactive system is its support knowledge. (Sala, 2005a) 6: Media or channels that permit
for human activity. (Singh, 2005b) two-way communication whether the format is one to
one (telephone), one to many (interactive television), or
Interactive Television (ITV) many to many (the Internet). (Roberts & Schwaab, 2006)
1: A course broadcast between two or more remote 7: Occurs when a student works within a multimedia
locations that allows instructor and students to interact in exercise in which the student and the program interchange
real time. (Dorniden, 2005) 2: Domestic television boosted information in order to complete the exercise. (Kaur et
by interactive functions, made possible by the signiicant al., 2005) 8: One of the main features of modern digital
effects of digital technology on television transmission ICTs which refers to the interchange of responses and
systems. It supports subscriber-initiated choices or actions actions between humans and machines, or among human
that are related to one or more video programming streams. beings. (Bodomo, 2005b) 9: The ability of a multimedia
(Pagani, 2005a) system to respond to user input. The interactivity element

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
358 I nt e ra c t ivit y Dim e nsion I nt e rfa c e

of multimedia is considered of central importance from Intercultural Communication Competence


the point of view that it facilitates the active knowledge The ability to effectively and appropriately execute
I construction by enabling learners to make decisions about communication behaviors to elicit a desired response in
pathways they will follow through content. (Torrisi-Steele, a speciic environment. (Zakaria & Yusof, 2005)
2005) 10: The level of interaction among communication
partners. (Chan, Tan, et al., 2005) 11: The relationship Intercultural Human-Machine System
between the learner and the educational environment. A system that takes into account the cultural diversity
(Russell, 2005b) 12: Usually taken to mean the chance for of human (different user requirements) and machine
interactive communication among subjects. Technically, (variation of usage situations), in addition to a standard
interactivity implies the presence of a return channel in human-machine system. (Rse, 2006b)
the communication system, going from the user to the
source of information. The channel is a vehicle for the Interdependence
data bytes that represent the choices or reactions of the 1: Interdependence among members of a small group is
user (input). (Pagani, 2005a) a necessary element of collaboration. It means that group
members could not produce the results they did without one
Interactivity Dimension another. (Ingram, 2005) 2: Mutual dependence between
The number of users that a single transducer, display parties in an organizational setting. A situational factor
system, or application software can support (by means of proposed to contribute to the occurrence of LPB. (Moore
complete hardware or software simulations) during one & Burke, 2005) 3: The level of dependence that one group
particular interactive session. (Mohamed & Ottmann, member has on other group members in order to complete
2006) the learning tasks. (Graham & Misanchuk, 2005) 4: The
mutual sharing of information between members of a group
Interactor to promote understanding in all members with the purpose
One of a number of elementary interactive components of achieving the group goal. (Ingram & Hathorn, 2005a)
such as push buttons, text ields, list boxes, and so forth.
(Bastide et al., 2006) Interestingness
1: An elusive concept that is very dificult to characterize
Intercluster Similarity and operationalize. A pattern is interesting if it arouses
1: A measurement of the similarity between the clusters attention in the minds of the examiner. Interestingness
identiied in a particular clustering process. These clusters has many facets like unexpectedness, actionability, prior
must be as dissimilar as possible. (Santos et al., 2005) 2: knowledge, and knowledge goals, in addition to many
The overall similarity among documents from two different unidentiied domain-dependent features. Features of
clusters. (Fung et al., 2005) interestingness may be user dependent, domain dependent,
or/and there might be a temporal aspect associated with it.
Intercultural (Natarajan & Shekar, 2006) 2: The set of methods used to
1: In contrast to multi-cultural (which simply describes order and prune the set of rules produced by association
the heterogeneous cultural identities of a group), cross- rule algorithms. This facilitates their use and interpretation
cultural (which implies some kind of opposition), or by the user. Metrics for interestingness include measures
transcultural (which has been used to suggest a cultural such as conidence, added value, mutual information. and
transition), intercultural is used to describe the creative conviction measures. (Imberman & Tansel, 2006)
interactive interface that is constructed and shared by
communicating individuals from different cultural Interexchange Carrier (IXC)
backgrounds. (Macfadyen, 2006a) 2: A situation where Long-distance companies that transport inter Local Access
individuals from different cultures interact with or Transport Area (LATA) trafic. (Nugent, 2005)
exchange information with one another; interchangeable
with the term cross-cultural. (St.Amant, 2005c) Interface
1: A contract in the form of a collection of methods
and constant declarations. When a class implements an

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e rfa c e Age nt I nt e r na l Cont ex t 359

interface, it promises to implement all of the methods called an intergalactic client-server program. (Murthy
declared in that interface. (Wong & Chan, 2006) 2: A set of & Krishnamurthy, 2005b)
commands or menus through which a user communicates
I
with a software program. (Proserpio & Magni, 2005) 3: Interlibrary Loan
Portion of a computer application that is used by the user The process by which a library requests material from,
to communicate with the application. It is particularly or supplies material to, another library. (Raisinghani &
important for a dashboard, because it may impinge on Hohertz, 2005)
the ability of users to properly interpret the variations in
the indicators shown to them. (Adam & Pomerol, 2005) Interlinking
4: The set of components of a computer program that Linking between two or more Web sites. (Thelwall,
allow the user to interact with the information. (Ally, 2006)
2005c) 5: The design on the computer screen with which
the user interacts. (Szabados & Sonwalkar, 2005) 6: The Intermedia Synchronization
point at which two systems connect, and the method by Maintaining the requirements of the temporal relationships
which communication is accomplished. The computer between two or more media. Lip synchronization
keyboard, mouse, printer, and video display exemplify between video and audio is an example of interstream
interfaces between the machines internal operations and synchronization where the display of video must
the human user. (Horiuchi, 2005a) 7: The speciication synchronize with audio. (Yang et al., 2005b)
for a method (what a method does); how that function
is called from another program. Interfaces are provided Intermedia Transcoding
in source form as opposed to implementations which are The process of converting the media input into another
secure. This allows one to use a method without regard media format. (Cavallaro, 2005)
for how that method is coded. It also allows multiple
implementations of the same interface. (D. Brandon, Jr., Intermediary
2005a) 8: The way a user interacts with a product, what he 1: In the tourism and travel sectors, intermediaries are
or she does, and how it responds. (Magnani & Bardone, those organizations that package or on-sell a product.
2006) 9: In general, extraneous energy from natural or These include travel agents, tour packagers, inbound
man-made sources that impedes the reception of desired tour operators, and destination marketing organizations.
signals. (Ragazzi, 2005) The Internet has led to the emergence of electronic
intermediaries that offer their services entirely online.
Interface Agent (Carson, 2005) 2: A party that acts as an agent in
A semi-autonomous agent that assists a user with, or transactions or markets. (Foley & Samson, 2006) 3:
partially automates, his or her tasks. (Mohamed & A person or organization performing a (booking) role
Ottmann, 2006) between consumers and business. (Braun, 2005b)

Interface Design Internal Audit


Design of the interactions between humans and computers. The irst step to determining what is taught online via
(Chan & Fang, 2005) distance education, what is taught online onsite, and
what is not taught online or uses limited technology.
Interface Evaluation (Robinson, 2005)
Interface evaluation of a software system is a procedure
intended to identify and propose solutions for usability Internal Champion
problems caused by the speciic software design. (Karoulis Highly respected individual within an organization
et al., 2006) who possesses expertise in a speciic area, speciically
information systems. (Hunter, 2005)
Intergalactic Client-Server Program
In the mobile computing environment, the traditional Internal Context
transaction model is replaced by a more realistic model The physical scope of a consumer context comprised of
called a worklow model between several clients and sensible body conditions that may inluence the consumers
servers that interact, compete, and cooperate. This is physiological needs. Certain context-aware applications

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
360 I nt e r na l Cont rol I nt e r nat iona l N e t w ork ing (I N ET )

can use bodily attached sensors to keep track of the to manage a speciic business transaction, as opposed
internal context information of mobile consumers. (Sun to buying it on the market. In knowledge management
I & Poole, 2005) literature, internalization is one of four knowledge
transmission mechanisms. It refers to the explicit-to-tacit
Internal Control process of knowledge transfer. This process takes place
1: A system of people, technology, processes, and when individuals use explicit knowledge to extend their
procedures designed to provide reasonable assurance own tacit knowledge base. (Brock & Zhou, 2006) 3: It is
that an organization achieves its business process goals. the process of making a Web site interoperable in a speciic
(Chengalur-Smith et al., 2005) 2: A set of procedures market or locale. In general, interoperability means that
applied by a business organization that ensures information the functionality of the site is not dependent on a speciic
is safeguarded, that it is accurate and reliable, and that it is language or culture and is readily adaptable to others.
processed eficiently and in accordance with managements (Becker, 2005b)
prescribed policies. (Lenard & Alam, 2005)
International Computer Driving License (ICDL)
Internal Data An international certiication that serves as a benchmark
Previously cleaned warehouse data that originated from for computer literacy. (Reynolds, 2005)
the daily information processing systems of a company.
(Peter & Greenidge, 2005a) International Divide
The digital divide that exists between countries. (Cecchini,
Internal Divide 2005)
The digital divide that exists between socioeconomic
groups within a country. (Cecchini, 2005) International Division of Labor
The spatial location of production facilities in international
Internal Knowledge networks resulting from capital investment by irms in
An organization-speciic knowledge that gives idiosyncratic countries or regions where wage rates and/or regulatory
cohesiveness to the integration of external knowledge into regimes offer cost savings in comparison to those in a
a irm. Firm and context dependent, it is an indispensable irms country of origin. The emergence of advanced
complement to external knowledge in order to build up telecommunications and the abilities they afford to
knowledge-based competitive advantages when it is coordinate industrial activity in different places and times
appreciated by clients. It is more valuable inside the irm are often cited as signiicant factors in organizing these
where it originates than in the open market. It is very divisions of labor. (Lepawsky & Park, 2006)
dificult to be transmitted to a different context. (Andreu
& Sieber, 2006) International Instructor
In many regions of Asia and Africa, professional
Internal Locus of Control development programs rely on expertise from elsewhere
Characterized by the belief that personal achievement in the world, and there is heavy use of experienced invited
is due to ability and effort, as opposed to luck, fate, or speakers. Increasingly, these invited speakers provide
situational factors. (Adkins & Nitsch, 2005) electronic resources and also teach online. They may even
do all of their teaching in an online mode. These invited
Internal Metric teachers, many of whom teach in English, are described
A metric used to measure attributes of the product that as international instructors. (Ching et al., 2005)
can be measured directly by examining the product on its
own, irrespective of its behavior. (Xenos, 2006) International Mobile Subscriber Identity (IMSI)
A speciic number of subscriber, used exclusively in GSM
Internalization network, according to international numbering standards
1: A knowledge transfer mode that involves new tacit referred to as E.212. (Louvros et al., 2006)
knowledge being derived from existing explicit knowledge.
(Wickramasinghe, 2005) 2: In international business and International Networking (INET)
organization science literature, internalization means that An annual meeting held by the ISOC. (Rhoten, 2006b)
an organization makes use of its organizational hierarchy

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r nat iona l Online I nt e ra c t ion (I OI ) I nt e r ne t 361

International Online Interaction (IOI) information and knowledge sharing. (Ribire & Romn,
Situation in which individuals from two or more cultures 2006) 3: A decentralized, global network. The World Wide
use an online medium to interact directly with one another. Web is only a part of this network. Other components
I
(St.Amant, 2005c) of the Internet include e-mail, news servers, Gopher,
and TELNET. (Cosemans, 2005a) 4: A global network
International Organization for Standardization connecting millions of computers linking exchange of data,
(ISO) news, and opinions. The Internet is not synonymous with
A non-governmental organization consisting of standards World Wide Web. (Sieber & Andrew, 2005) 5: A global
institutes of 148 countries. ISOs central secretariat (located public network that utilizes TCP/IP protocols to transfer
in Geneva, Switzerland) coordinates the system. (K. Chen data from one computer to another. The Internet is often
et al., 2005) referred to as a network of networks, as it is made up of
thousands of smaller privately owned networks. (Fraser,
International Outsourcing 2005) 6: A global system of interconnected networks that
1: A production model in online media used to send work allows for data transmission between myriad computers.
to employees located in a nation (generally, a developing The Internet can usually be accessed using Internet
nation). (St.Amant & Still, 2005) 2: A production process service providers. (Escalante, 2005) 7: A large system of
in which work is sent to overseas employees for completion. interconnected computer networks composed of backbone
(St.Amant, 2006b) networks, mid-level networks, and local networks. This
includes networks owned and managed by public, private,
International Statistical Classiication of Diseases and nonproit sector organizations. (Hinnant & Sawyer,
and Related Health Problems, Tenth Revision 2005) 8: A vast network of computers that connects
(ICD-10) millions of people worldwide. (Olatokun & Ajiferuke,
A medical classiication system in which conditions have 2006) 9: A worldwide interconnection of individual
been grouped for general epidemiological purposes and networks operated by government, industry, academia, and
the evaluation of health care. (Zender, 2006) private parties. (Phala, 2005) 10: A worldwide information
network connecting millions of computers. Also called
International Telecommunications Union (ITU) the Net. (Burke et al., 2005) 11: A worldwide network of
A body that closely works with all standards organizations computer networks that use the TCP/IP network protocols
to form an international uniform standards system for data to facilitate data transmission. It provides access to a vast
communications over telephone networks. Before 1993, amount of information resources including multimedia
ITU was known as CCITT. (Rhoten, 2006a) (movies, sound, and images), software, text documents,
news articles, electronic journals, travel information, and
International Virtual Ofice (IVO) so forth. It also provides an environment for buying and
A work group composed of individuals who are situated in selling products and services over a network. (Aurum,
different nations and who use online media to collaborate 2005) 12: A worldwide system of networks that has
on the same project. (St.Amant, 2005d) transformed communications and methods of commerce
by allowing various computer networks to interconnect.
Internationalize Sometimes referred to as a network of networks, the
Generalizing a design so that it can handle multiple Internet materialized in the United States in the 1970s,
languages content. (T.S. Chan, 2005) but did not become overtly visible until the early 1990s.
(Nightingale, 2005) 13: Global communications network
Internet consisting of thousands of interconnected networks.
1: The vast collection of interconnected networks that all (Ortega Egea & Menndez, 2006) 14: A global network
use TCP/IP protocols. (Kabene, Takhar, et al., 2005) 2: A connecting millions of computers. The word is derived from
worldwide system of computer servers from which users interconnected network. (Sala, 2005a) 15: The electronic
at any computer can extract information or knowledge. system that links various computer networks around the
Intranets and extranets are Internet-like networks whose world. It includes educational venues, databases, electronic
scope is to restrict access to internal personnel or external mail, news agencies, and chat rooms. (Switala, 2005)
partners within an enterprise, with the goal of fostering

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
362 I nt e r ne t Abuse I nt e r ne t Disc onne c t ion

Internet Abuse Internet Caf


Any wrongful or improper use of the Internet in the 1: A public place that offers access to computers, e-mail,
I workplace. (Mahatanankoon, 2005) and the Internet for a fee. In Uganda, as in many other
parts of the world, cafs also offer other ICT-related
Internet Addiction services, such as printing and photocopying, as well as
1: A term used to describe excessive Internet use; it has refreshments. (Mwesige, 2005) 2: A cafeteria offering
also been referred to as Internet addiction disorder, Internet public-access online computers for Web suring and e-mail
addiction syndrome, and pathological Internet use. As transmission or service bureau, or offering other services
with other addictions, Internet addiction features the such as online gaming and love matching. It sometimes
core components of other addictive behaviors (salience, also serves as an Internet service provider (ISP). (Hu et
mood modiication, tolerance, withdrawal, conlict, and al., 2006a) 3: Business units that resell Internet access to
relapse) and can be deined as a repetitive habit pattern people. (Frempong & Braimah, 2005)
that increases the risk of disease and/or associated personal
and social problems. It is often experienced subjectively Internet Cash
as loss of control, and these habit patterns are typically Users are digitally signed but are not stored in the database.
characterized by immediate gratiication (short-term It is a kind of debit card. (Kurihara, 2006)
rewards), often coupled with delayed, deleterious effects
(long-term costs). Attempts to change an addictive behavior Internet Control Message Protocol Message
(via treatment or by self-initiation) are typically marked (ICMP Message)
by high relapse rates (see also technological addictions). A message control and error-reporting protocol that
(Grifiths, 2005) 2: Use of the Internet and network operates between a host and a gateway to the Internet.
resources that undermines the fulillment of some of an (Syed, Nur, et al., 2005)
individuals basic human needs. (Oravec, 2005)
Internet Credibility
Internet Adoption A multi-faceted concept in journalism research that
Occurs when a irm embraces an Internet application consists of believability, accuracy, trustworthiness, and
for the irst time. Typical Internet applications include bias. (Borchers, 2005)
e-mail, Web browsing, Web site presence, and electronic
transactions. Firms will often adopt Internet technology in Internet Data
stages (or levels) over time, beginning with one application Data collected through the Internet by an organization.
and adding another and so on. Each new application can be (Kumar, 2005)
regarded as an Internet adoption. (Cragg & Mills, 2005)
Internet Democracy
Internet and Communication Technology (ICT) A derivative term for electronic democracy, especially
Technology that utilizes the Internet and networking related to projects and concepts centered on using the
capabilities. (Aggarwal, 2005) Internet (and not other electronic communications
technologies like short message services or teletext)
Internet Architecture Board (IAB) for deliberative and participatory aims. Concrete
Chartered both as a committee of the Internet Engineering implementations of Internet democracy projects include
Task Force (IETF) and as an advisory body of the Internet electronic town hall meetings or citizen consultations, the
Society (ISOC). (Rhoten, 2006b) use of discussion boards on party or candidate Web sites,
and the virtualization of traditional political institutions
Internet Browser Usage or mechanisms like party conventions, protest marches,
The set of Internet technologies and applications that center or petitions. (Kozeluh, 2005)
on the Internet browser and are generally involved in the
presentation of Web sites to the viewer, in the undertaking Internet Disconnection
of research and in open-forum communications. (Grifin, The event of irms becoming disenchanted with Internet
2005) applications and removing all Internet-based applications
from their organization. (Grifin, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r ne t Disc ussion Sit e (I DS) I nt e r ne t Priva cy 363

Internet Discussion Site (IDS) Internet Host


A text-based online forum where members can post a A domain name that has an Internet Protocol (IP) address
message or engage others in conversation on a range record associated with it. This would be any computer
I
of inancial topics usually in a bulletin board-style system connected to the Internet (via full- or part-time,
environment containing distinct topic threads. Forum direct or dial-up connections). (Maggioni & Uberti,
participants include amateur investors, day traders, and 2005)
professional brokers, all of whom, despite their diversity
of expertise, share a common interest in stock market Internet Hyperlink (or Hypertext Link)
investment. (Campbell, 2006) An active link placed in a Web page that allows the Net
surfer to jump directly from this Web page to another and
Internet Economy retrieve information. This dynamic and no-hierarchical
1: A large collection of global networks, applications, idea of linking information was irst introduced by Tim
electronic markets, producers, consumers, and Barners Lee to manage information within a complex
intermediaries. (Scupola, 2005) 2: Economy with revenues and continuously changing environment like CERN. The
from the Internet or Internet-related products or services. Internet hyperlinks are directional: outgoing links leaving
(Tian & Stewart, 2006) 3: That part of the economy that a Web page and incoming links targeting a Web page.
deals with information goods such as software, online (Maggioni & Uberti, 2005)
content, knowledge-based goods, the new media, and
supporting technology industries using the Internet. Internet Lag Time
(Sharma, 2006a) The delay in transmitting the signals from users terminals
to the Internet server and back due to congestion of the
Internet EDI Internet link connecting the two. (Kung-Ming & Khoon-
The use of the Internet to exchange business documents Seng 2005)
using standardized document formats. (Harris & Chen,
2006) Internet Marketing
Conducting marketing activities on the Internet. (Singh,
Internet Engineering Task Force (IETF) 2006a)
1: A large, open, international community of network
designers, operators, vendors, and researchers concerned Internet Native
with the evolution of the Internet architecture and the Somebody who has never experienced life before the
smooth operation of the Internet. (Rhoten, 2006b) 2: Internet. The term is sometimes used to distinguish
An open international community engaged in Internet the original Internet users, students, and researchers as
architecture evolution (IETF, 2003). Working Groups in examples, from those who want to exploit the Net for
several topical areas develop technical drafts and Internet commercial or other reasons and who might be called
standards. (Pulkkis, Grahn, & strm, 2005) 3: The Internet imperialists. (Dunkels, 2005)
collaboration of working groups in several topical areas that
develop technical drafts and Internet standards. (Pulkkis Internet Option
et al., 2005a) 4: A voluntary association for developing A possibility to use the Internet for a business purpose.
Internet standards. (Hosszu, 2005a) (Boonstra & de Brock, 2006)

Internet Filtering and Monitoring Software Internet Pharmacy


Software tools used for reducing occurrences of Internet A pharmacy that has no storefront presence and where
abuse by blocking inappropriate Web sites and identifying the Internet is a key technology for serving customers.
frequently visited Web sites. (Mahatanankoon, 2005) (Rosson, 2006)

Internet Group Management Protocol (IGMP) Internet Privacy


Implemented within the IP module of a host and extends Concerns expressed by Internet users regarding the
the hosts IP implementation to support multi-casting. security and conidentiality of information transmitted
(Chakraborty et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
364 I nt e r ne t Prot oc ol (I P) I nt e r ne t Se r vic e Provide r (I SP)

electronically. Government agencies and business/industry Internet Public Kiosk


professional groups share responsibility to address Internet A booth that provides Internet access in return for a
I privacy concerns. (Baim, 2005) payment on a time basis. (Daz-Andrade, 2005)

Internet Protocol (IP) Internet Relay Chat (IRC)


1: Code numbers designating the computer attached to a 1: A network of computer servers and client programs that
network. (Rowe, 2006b) 2: A network protocol that provides provide a text-based virtual environment in which multiple
connectionless, best-effort delivery of datagrams (self- users can engage in synchronous computer-mediated
contained, independent set of data). IP and Transmission communication. (Roberts et al., 2006a) 2: Internet-based
Control Protocol (TCP) are the networking protocols chat technology that allows a group of people to exchange
that the Internet is based on. (Papagiannidis et al., 2005) text messages in real time. To join group chatting, one needs
3: A protocol is a rule which guides how an activity an IRC program to connect to an IRC server. Examples
should be performed. IP is used to deine how devices include mIRC, Pirch, and Virc for Windows and Homer
can communicate across a packet-switched network of or Ircle for Macintosh. (Hwang & Stewart, 2005)
networks (including the public Internet). The umbrella suite
of protocols to which IP is referred to is the TCP/IP suite, Internet Remote Experimentation
after two of the most important protocols in it: Transmission The use of the Internet to carry out physical experimental
Control Protocol and the Internet Protocol. (Leath, 2005) work at a remote location. (Ko et al., 2005)
4: Speciies the format of packets, also called datagrams,
and the addressing scheme. IP by itself is something like Internet Security
the postal system. It allows you to address a package and The phenomenon by which a company assures that its
drop it in the system, but there is no direct link between data and entire Internet infrastructure are protected from
you and the recipient. (Singh, 2005a) 5: The network layer damage caused by miscreants through activities such as
protocol used on the Internet and many private networks. hacking. (Aigbedo, 2005)
Different versions of IP include IPv4, IPv6, and IPng
(next generation). (Raisinghani & Ghanem, 2005) 6: The Internet Service Provider (ISP)
network-level protocol used in the Internet. (Hossz, 2006) 1: Middleman between computer users and the Internet.
7: The protocol mechanism used in gateways to connect Provides the local phone numbers a computer calls. At each
networks at the OSI Network Layer (Layer 3) and above. of these, there is a bank of modems, sometimes ranging into
(Malik, 2006) the hundreds, connected to a router that allows all the data
lowing through those modems to enter and exit the Internet.
Internet Protocol Backbone (Latchem, 2005) 2: Refers to a company that provides
XML is used to tag the data, SOAP is used to transfer the access to the Internet and other related services (e.g., Web
data, WSDL is used to describe the services available, hosting) to the public and other companies. (Syed, Nur, et
and UDDI is used to list what services are available. al., 2005) 3: A company that provides other companies or
Used primarily as a means for businesses to communicate individuals with access to, or presence on, the Internet.
with each other and with clients, Web services allow (Vician & Buche, 2005) 4: An organization that provides
organizations to communicate data without intimate Internet access to individuals or other organizations.
knowledge of each others IT systems behind the irewall. (Escalante, 2005) 5: A company such as a Netcom, UUNet,
(Blecker & Graf, 2006) and SprintNet that sells to users Internet connectivity, either
via a 24-hour dedicated line or a dial-up connection. This
Internet Protocol Security (IPSec) could either be on a dedicated connection (for example,
Developed by an IETF Security Area Working Group. a telephone connection that stays open 24 hours a day)
IPSec introduces a new TCP/IP stack layer below IP. IPSec or a dial-up connection. Usually users run software such
adds authentication and optional encryption to transmitted as PPP or SLIP to allow Internet connectivity across the
data packets. Authentication ensures that packets are from line. (Magagula, 2005) 6: Provides access to the Internet
the right sender and have not been altered. Encryption via different communications channels such as traditional
prevents unauthorized reading of packet contents. (Pulkkis, telephone lines or a high-speed iber optics channel. (Guah
Grahn, Karlsson, 2005b) & Currie, 2005) 7: Provides the hardware that connects

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r ne t Soc ie t y (I SOC) I nt e rope ra bilit y 365

customers to content and applications providers, usually to help organizations communicate proper Internet usage
for a monthly fee. (Rlke et al., 2005) 8: A company that behaviors, lessen employees perceived expectation of
provides Internet access to individuals, groups, or corporate privacy, and reduce costly litigation that may occur from
I
organizations through normal telephones, satellites, or the use of Internet monitoring and iltering software.
iber optics. (Frempong & Braimah, 2005) (Mahatanankoon, 2005)

Internet Society (ISOC) Internet-Based EDI


Founded in 1992, a professional membership society An alternative to traditional Electronic Data Interchange
with more than 150 organization and 16,000 individual (EDI) that uses proprietary systems in HTML format.
members in over 180 countries. It provides leadership in (Ratnasingam, 2006)
addressing issues that confront the future of the Internet,
and is the organization home for the groups responsible Internet-Based Learning
for Internet infrastructure standards, including the Learning delivered primarily by TCP/IP network
Internet Engineering Task Force (IETF) and the Internet technologies such as e-mail, newsgroups, proprietary
Architecture Board (IAB). (Rhoten, 2006b) applications, and so forth. Although the term is often used
synonymously with Web-based training, Internet-based
Internet Streaming training is not necessarily delivered over the World Wide
Video format that intermittently downloads sections of a Web, and may not use the HTTP and HTML technologies
media ile to a client. (Vitolo et al., 2005) that make Web-based training possible. (Torres-Coronas,
2005)
Internet Supply Chain Management Course
System architectures, technologies, and infrastructure Internet-Based Survey
requirements in the context of supply chain systems. Design, A contemporary survey technique through which
development, and implementation of systems that facilitate researchers may obtain respondents opinions via online
collaboration with customers and suppliers. Development survey processes. Respondents may either be asked to
of messaging-based collaborative frameworks using Web go to a Web site to complete a survey (Web-based) or the
services. (Knight & Chan, 2005) survey questionnaire may be e-mailed to the respondents (e-
mail-based) for them to complete and return electronically.
Internet Technology (Baim, 2005)
1: Family of technologies suitable for exchanging
structured data through package-oriented transmissions Internet-Mediated Community
on heterogeneous platforms, in particular, protocols, Group of people sharing interests and making use for
programming languages, hardware, and software. (Blecker, some time of the same class of Internet technologies to
2006a) 2: The group of technologies that allow users to exchange information to each other regarding the shared
access information and communication over the World interests. (Porto Bellini & Vargas, 2006)
Wide Web (Web browsers, ftp, e-mail, associated hardware,
Internet service providers, and so forth). (Darbyshire & Internet-Scale Distributed Data Source
Burgess, 2005) Autonomous data source connected through the Internet.
(Khan, 2005)
Internet Technology Cluster
The range of identiiably separate families of technologies Interoperability
involved in the e-business platform comprising e-mail, 1: Ability to work together, sharing information,
browser usages, and advanced Internet applications. capabilities, or other speciic goals, while being different
(Grifin, 2005) at some technological level. (Ishaya, 2005) 2: The ability
of heterogeneous software and hardware to communicate
Internet Usage Policy (IUP) and share information. (Nicolle et al., 2005) 3: The ability
An organizational policy handed down to employees that of two or more heterogeneous systems to work together
governs the use of the Internet in a speciic workplace. The in a seamless manner. (Karimi & Peachavanish, 2005)
goals of an IUP, if properly written and implemented, are 4: The property of software applications that will enable

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
366 I nt e rope ra bilit y Ent e rprise Archit e c t ure I nt e rpola t ion Filt e r

diverse applications to interact and share data seamlessly. for much human intervention. Examples of IOIT include
(Yow & Moertiyoso, 2005) Electronic Data Interchange (EDI) systems. (Abraham
I & Leon, 2006)
Interoperability Enterprise Architecture
A set of consistent methods to specify the interaction Interorganizational Learning
behavior of a network of public organizations. It includes The sharing of information and process knowledge across
organizational structures, public services, and business organizational boundaries. The information and knowledge
processes, as well as interaction interactions, protocols, pertain to tasks or processes that are carried out by the
and patterns. (Werth, 2005) various organizations. By making use of the information
and process knowledge, these organizations can change the
Interoperability Framework way they carry out these tasks and processes to improve
Not simply a purely technical issue concerned with performance. (Abraham & Leon, 2006)
linking up various systems, but the wider set of policies,
measures, standards, practices, and guidelines describing Interorganizational Relationship
the way in which various organizations have agreed, or Cooperative interorganizational relationships include
should agree, to do business with each other. (Chochliouros strategic alliances, partnerships, coalitions, joint ventures,
& Spiliopoulou-Chochliourou, 2006) franchises, and network organizations. (Rowe et al.,
2006)
Interoperability Interface
An interface between XML documents and other software Interorganizational System (IOS)
programs. The interoperability stems from the fact that 1: A computer and communication infrastructure that
the XML documents can be read and operated upon by permits the sharing of an application across organizational
any software application designed to use this interface. boundaries. The aim of an IOS is to create and exploit
(Gaffar & Seffah, 2005) interorganizational eficiencies. (Rowe et al., 2006) 2: A
system that provides information links between companies.
Interoperability Problem (Harris & Chen, 2006)
Getting a collection of autonomous legacy systems to
cooperate in a single federated system. (Balsters, 2005) Interorganizational Trust
The conidence of one organization in the certainty of
Interorganization Cooperative Process another organizations ability to perform an expected
An abstraction of a complex business process involving outcome, such as delivering promised goods, services,
different organizations that cooperate with one another to information, or payment. (Turner, 2006)
offer complex services. The interorganization cooperative
process is supported by an application that helps in the Interpersonal Communication
coordination of services. (Rolland & Kaabi, 2006) This occurs in one-on-one situations or within a small
group dynamic. (Weber & Lim, 2005)
Interorganizational Communication
Communication that includes entities that are legally Interpolation
external from the organization where legal recourse may 1: A family of mathematical functions to compute unknown
occur due to the content of the message. (McManus & states between two known states. For instance, it is possible
Carr, 2005) to interpolate between two 3D models of a body to obtain
an intermediate one. (Volino et al., 2005) 2: The process
Interorganizational Information Technology of increasing the sampling rate. Interpolation consists of
(IOIT) upsampling and iltering. (Jovanovic-Dolecek, 2005b)
Consists of networking and software applications that
enable business networks to share data and information Interpolation Filter
with each other. Networks (public or private) are used to The ilter used in interpolation to remove the unwanted
provide connectivity between the software applications images in the spectra of the upsampled signal. (Jovanovic-
located within each organization. The software applications Dolecek, 2005b)
are designed to share data and information without the need

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e rpolat or I nt e r ve nt ion St rat e gy 367

Interpolator for the message to register or the advertisement(s) to be


The ilter I(z) which is used to eliminate the unwanted read. (Lalopoulos et al., 2005b)
spectrum introduced by expansion of the model ilter in
I
an IFIR Structure. For the low-pass prototype ilter design, Interstream Synchronization
this ilter is a low-pass ilter with lower complexity than Ensures that all receivers play the same segment of a
the prototype ilter. (Jovanovic-Dolecek & Daz-Carmona, medium at the same time. Interstream synchronization
2005) may be needed in collaborative environments. For example,
in a collaborative session, the same media information
Interpretation may be reacted upon by several participants. (Yang et
The process involved in converting the source speech in al., 2005b)
one natural language into the target speech in another
language. (OHagan, 2005) Intertitle
One of the set of title cards used in silent ilms to describe
Interpreter settings, plot developments, or dialogue. (Berg, 2005e)
The traditional deinition in computer science is a program
that translates and executes source language statements Intertransactional Association
one line at a time. Also, a program that accesses the model Correlations among items not only within the same
to understand the requested navigation, one user action at transactions but also across different transactions. (Feng
a time. (Paiano, 2005) & Dillon, 2005)

Interpretive Evaluation Interval Set


Formal-rational approaches (technical and economic) If a set cannot be precisely deined, one can describe it in
emphasize the technology features at the expense of terms of a lower bound and an upper bound. The set will
the organizational and social aspects. Also, a move contain its lower bound and will be contained in its upper
towards the interactionist role of the technology with bound. (Lingras et al., 2005)
the organizational structures, culture, and stakeholders.
IS evaluation focuses on the analysis and understanding Interval Set Clustering Algorithm
of the social and subjective nature of the phenomenon. A clustering algorithm that assigns objects to lower and
(Serafeimidis, 2005) upper bounds of a cluster, making it possible for an object
to belong to more than one cluster. (Lingras et al., 2005)
Interpretive Research
Exploring the deeper structure of a phenomenon within Interval Uncertainty
its cultural context by examining the subjective meanings A model of sensor uncertainty where each stored data
that people create. (Trauth, 2005b) value is represented by a closed interval, called uncertain
interval. (Cheng & Prabhakar, 2005)
Interpretivism
A research approach that attempts to reach an understanding Interval-Based Model of Time
of social action in order to arrive at a causal explanation Temporality is speciied using regular or irregular intervals
of its course and effects. (McPherson, 2005) or periods, which are durative temporal references.
(Rodrguez-Tastets, 2005b)
Interschema Property
Terminological and structural relationships involving Intervention Strategy
concepts belonging to different sources. (De Meo, Refers to speciic approaches to developing the organization
Terracina, et al., 2005) through its people. While obvious intervention strategies
may include techniques such as team development, self-
Interstitial directed learning, training approaches to personal growth
A page that is inserted in the normal low of the editorial and empowerment, T-groups, force ield analysis, and
content structure on a Web site for the purpose of advertising organizational learning, a more methodological approach
or promoting. It is usually designed to move automatically is identiied by Blake and Mouton. In their Strategies of
to the page the user requested after allowing enough time Consultation, they identify ive types of intervention

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
368 I nt onat ion I nt rat ra nsa c t iona l Assoc iat ion

acceptant, catalytic, confrontation, prescriptive, principles authorization. An intranets Web sites look and act just
models and theoriesthat may be applied at ive levels like any other Web sites, but the irewall surrounding an
I individual, team, inter-group, organization, society. The intranet fends off unauthorized access. (Singh, 2005a)
important point about this schema is that it forces the 4: A network within the organization using Internet
consultant to think carefully about the purpose of the technologies. (Baugher et al., 2005) 5: A private network
intervention. (Grieves, 2006b) inside a company or organization that is based on Web
standards (i.e., TCP/IP) and offers various applications for
Intonation members of a speciied group. (Vaast, 2005) 6: A restricted-
How the pitch pattern (the property of sound that varies access or internal network that works like the Internet.
with variation in the frequency of vibration) or fundamental It enables employees, or those with access, to browse or
frequency (F0) changes during speech. It refers to the share resources. Intranets are private computing networks,
rise and fall of the voice pitch. (Syed, Chakrobartty, et internal to an organization, used for sharing organizational
al., 2005) information. (Boersma & Kingma, 2006) 7: Allowing
access to a hospitals computer system to internal users via
INTOPS-1 a username and password. (Cannoy & Iyer, 2006) 8: An
Requirements of the non-European market on machine intranet can be thought of as the Internet restricted to the
design. This project was founded by the German Ministry conines of an organization in order for both the employer
of Education and Research (1996-1998). (Rse, 2006a) and employees to be able to share information within that
organization. An intranet is based on a local area network.
INTOPS-2 (Sarkar, 2005) 9: A computer network contained entirely
Requirements of the user in Mainland China for human- within an organization. (Ruppel & Ruppel, 2005)
machine systems in the area of production automation. This
project was founded by several companies from Germany Intranet and Portal Course
and Switzerland (2000-2001). (Rse, 2006a) Intranet development methodology, data warehousing,
and online analytical processing. Enterprise information
Intracluster Similarity portals. Transforming information into knowledge.
1: A measurement of the similarity between the objects Decision support. Customer applications. Content
inside a cluster. Objects in a cluster must be as similar as personalization. (Knight & Chan, 2005)
possible. (Santos et al., 2005) 2: The overall similarity
among documents within a cluster. (Fung et al., 2005) Intraorganizational Communication
Communication internal to the legal boundaries of
Intramedia Transcoding an organization, though it may cross departmental or
A transcoding process that does not change the media divisional boundaries. There is no legal recourse for the
nature of the input signal. (Cavallaro, 2005) content of a message. (McManus & Carr, 2005)

Intran Intraorganizational Knowledge


A transaction that is executed within a mobile host as Knowledge that is highly irm and industry speciic, but
an internal transaction (for brevity, Intran) using its own is not speciic to organizational activities or tasks. In
internal operations and data. (Murthy & Krishnamurthy, effect, this component of social actors knowledge is irm-
2005b) speciic meta-knowledge. Examples are knowledge about
colleagues, knowledge about elements of the organizational
Intranet culture, communication channels, informal networks,
1: A computer network that provides services within knowledge of the irms strategy and goals, and so on.
an organization. (Clayton, 2006a) 2: A network-based (Butler & Murphy, 2006)
Internet belonging to an organization or groups where
information is accessed with authorization. (Inoue & Intratransactional Association
Bell, 2005) 3: A network based on TCP/IP belonging to Correlations among items within the same transactions.
an organization, usually a corporation, accessible only by (Feng & Dillon, 2005)
the organizations members, employees, or others with

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Intrinsic Dificulty Inverse Transformation 369

Intrinsic Dificulty various areas within a computer or a network in order to


A numerical measure of how hard searching a given identify possible security breaches, which include both
database is, independent of the index used. It grows with intrusions (attacks from outside the organization) and
I
the Intrinsic Dimension. (Chvez & Navarro, 2005) misuse (attacks from within the organization). (Cardoso
& Freire, 2005) 3: Software for detecting when suspicious
Intrinsic Dimension behavior occurs on a computer or network. (Rowe, 2006b)
The minimum representational dimension in which the 4: Attempts to discover attacks while they are in progress,
database could be represented without distorting its or at least discover them before much damage has been
distances. (Chvez & Navarro, 2005) done. (Janczewski & Portougal, 2005) 5: Detecting network
attacks, usually by recognizing attack signatures extracted
Intrinsic Motivation from earlier attack packets. (Syed, Nur, et al., 2005) 6:
1: Motivation that comes from within a person. (Whitield, Identifying a set of malicious actions that compromise the
2005) 2: Motivation that derives from the activity itself. An integrity, conidentiality, and availability of information
example of intrinsic motivation for using microcomputers resources. (Lazarevic, 2005) 7: A set of techniques used
is using it because you enjoy it. (de Souza Dias, 2005) 3: to protect a computer system or network from a speciic
Motivation that stems from an internal desire for more threat, which is unauthorized access. (Thuraisingham,
satisfaction and challenge in ones career, rather than 2005) 8: Software for detecting when suspicious behavior
desires for enhanced salary and career mobility. (Adkins occurs on a computer or network. (Rowe, 2006a)
& Nitsch, 2005) 4: Motivation through factors internal
to the person being motivated. (Wishart, 2005) 5: The IntServ: See Integrated Services.
motivation to engage in an activity for its own sake,
because the activity is considered enjoyable, worthwhile, Intuitiveness
or important. (Hendriks & Sousa, 2006) 6: Motivation Knowing or understanding immediately how a product/
that has no external manifestation in terms of rewards, system will work without reasoning or being taught.
but is psychologically effective in stimulating or driving Intuitiveness is linked closely to naturalness (i.e., designs
people to seek self-satisfaction or self-consistency, for that are intuitive also will be perceived as being natural).
example, job satisfaction, commitment, and so forth. (Noyes, 2006)
(Ekbia & Hara, 2006)
Invalid Access Prevention Policy
Intrusion A policy requiring that in order to manage multiple
Malicious, externally induced, operational fault in the clients concurrent read/write operations in the client/
computer system. (Lazarevic, 2005) server architecture, no transactions that access stale
multimedia data should be allowed to commit. In general,
Intrusion Prevention there are two different approaches to achieve this policy.
Protecting networks against attacks by taking some The detection-based (lazy) policy ensures the validity of
preemptive action such as access control, preventing the accessed multimedia data, and the avoidance-based (eager)
transmission of invalid IP addresses, and so forth. (Syed, policy ensures that invalid multimedia data is preemptively
Nur, et al., 2005) removed from the client caches. (Parker & Chen, 2005)

Intrusion Tracking Invention


The process of tracking an attack to its point of origin. The discovery or creation of new ideas. (Tatnall, 2005b)
(Syed, Nur, et al., 2005)
Inventory Carrying Cost
Intrusion-Detection System (IDS) One of the costs associated with carrying the storage of
1: A utility that continuously monitors for malicious supplies and inal products. (Tyan, 2006)
packets or unusual activity (usually checks for matches
with attack signatures extracted from earlier attack Inverse Transformation
packets). (Syed, Chakrobartty, et al., 2005) 2: A type of Considering schema transformation , the transformation
security management system for computers and networks is the inverse of if its application undoes the result of
in which the IDS gathers and analyzes information from the application of . The instance mapping of can be

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
370 I nve st m e nt I P-St yle Se m a nt ic s

used to undo the effect of applying the instance mapping Ionosphere


of on a set of data. (Hainaut, 2005) A band of particles 80-120 miles above the earths surface.
I (Freeman & Auld, 2005)
Investment
An item of value purchased for income or capital IOS: See Interorganizational System.
appreciation. (Lawson-Body, 2005)
IP: See Image Processing; Intellectual Property; Internet
Investment Portfolio Protocol.
A set of investments (sale and purchase of shares) in a
determined period of time. The portfolio keeps a history IP Address
of operations in the stock market. The construction of 1: A unique number consisting of four parts separated by
an optimal portfolio requires a priori estimates of asset dots, such as 145.223.105.5. Every machine on the Internet
returns and risk. (Castro & Braga, 2006) has a unique IP address. (Nasraoui, 2005) 2: A number
assigned to a device for the purposes of identiication by
Invisible College TCP/IP and associated protocols. It could be thought of as
A group of researchers within the same branch of science akin to a street address or telephone number that allows
who have personal relationships with one another. (Teigland devices to communicate. (Leath, 2005)
& Wasko, 2006)
IP Asset Management
Invisible Computer Involves management and enabling the trade of content,
A computer or computer interface that disappears and includes accepting content from creators into an asset-
cognitively either through user expertise or by direct management system. (Upadhyaya et al., 2006)
mapping of the relationship between interface elements,
and the actions afforded by them. Other current terms IP Based
are transparency and seamlessness and their antonyms, Network technologies based on Internet protocols.
relection and seamfulness. (Kettley, 2006b) (Murphy, 2005c)

Invisible Web IP Multicast


Denotes those signiicant portions of the Internet where 1: A set of IP packets transported via point-to-multipoint
data is stored which are inaccessible to the major search connections over a network to designated groups of
engines. The invisible Web represents an often ignored/ multicast recipients. IP multicasts conserve bandwidth
neglected source of potential online information. (Peter and network resources. (Littman, 2005) 2: Network-level
& Greenidge, 2005a) multicast technology that uses the special Class-D IP-
address range. It requires multicast routing protocols in
Involuntary Attention the network routers. (Hossz, 2005b)
The idea that something can take a persons attention by
being novel, contrasting, startling, and so forth. (Owen, IP Traceback
2006b) The process of tracking the attack packets back to their
source along the route they traveled. (Syed, Nur, et al.,
Inwards Projection 2005)
Estimating the expected number of customers that would
sign on to a marketing promotion, based on customer IP-Multicast Routing Protocol
characteristics and proiles. (Mani et al., 2005) To forward the multicast packets, the routers must create
multicast routing tables using multicast routing protocols.
IOI: See International Online Interaction. (Hossz, 2005b)

IOIS: See Inter-Organizational Information System. IP-Style Semantics


Similar to the traditional (unicast) IP communication, a
IOI T: Se e In te ro r ga n i za t i o n a l In fo r m a t i o n source can send data at any time; for this it does not have
Technology. to join the group of hosts. (Hosszu, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I PFS I S-Archit e c t ure Alignm e nt 371

IPFS: See Integrated Personal Financial Service. IS: See Information System.

IPMA IS Success
I
International Project Management Association. (D. A global judgment of the degree to which stakeholders
Brandon, 2005b) believe they are better off. The term is sometimes used
interchangeably with IS effectiveness. (Wilkin, 2005)
IPO: See Initial Public Offering.
IS Support
IPRS: See Intellectual Property Rights. An information system (IS) function supporting people
taking purposeful action. This is often done by indicating
IPSec: See Internet Protocol Security. that the purposeful action can itself be expressed via
activity models, through a fundamental re-thinking of
IPT: See Information Processing Theory. what is entailed in providing informational support to
purposeful action. The idea is that in order to create IS
IPTV support that serves, it is irst necessary to conceptualize
The result of large-scale adoption of broadband, as well the organizational system that is served, since this order
as advances in networking technology and digital media, of thinking should inform what relevant services would
which together have made it possible for service providers indeed be needed in the IS support. (Vat, 2006)
to economically deliver high-quality live and on-demand
movies and TV content over IP networks. (Papagiannidis IS/IT Beneits Realization Methodology
et al., 2005) An approach used to ensure that beneits expected in IS/IT
investments by organizations are realized or delivered.
IR: See Information Retrieval; Infrared. (Lin & Pervan, 2005)

IRC: See Internet Relay Chat. IS/IT Evaluation


The weighing up process to rationally assess the value of
IRE: See Information Requirement Elicitation. any acquisition of software or hardware that is expected to
improve business value of an organizations information
Iris Recognition systems. (Lin & Pervan, 2005)
A technique for identity veriication or identiication based
on the users encoded iris pattern. (Li, 2006) IS/IT Investment Evaluation Methodology
An approach used to evaluate organizations IS/IT
Iris Scanning investments. (Lin & Pervan, 2005)
Enables the identiication of an individual based on the
analysis of the colored tissue surrounding the pupil. (Scott IS/IT Outsourcing
et al., 2006) The process of transferring IS/IT assets, staff, and
management responsibility for delivery of services from
Irrational Commitment to Opportunities internal IS/IT functions to external contractors. (Lin &
The tendency to seize opportunities without proper Pervan, 2005)
consideration given to potential implications. (Kyobe,
2006) IS-A Hierarchy
A directed acyclic graph where each node is a class and
Irrevocability each edge represents a subclassOf relationship from a
The inability of an individual to be able to somehow class to one of its superclasses. In class algebra, the classes
cancel some credential. Biometric systems run a high are labeled by normalized class algebra expressions.
risk of compromising irrevocability, if biometric data (Buehrer, 2005)
belonging to an individual is ever acquired and used to
spoof a system. (Fleming, 2005a) IS-Architecture Alignment
The process of selecting an IS-architecture vision that
is strategically and operationally it for the enterprise,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
372 I S-Archit e c t ure M ode l I SO 9 2 4 1 -1 1 1

simple and well structured, well managed, and clearly with leading companies. BS7799 Part 1 incorporates a
and explicitly described. (Opdahl, 2005) broad range of security practices and procedures that
I can be adopted by any organization of any size and in
IS-Architecture Model any industry sector. This is now international standard.
An enterprise model that focuses on the enterprises IS- (Tassabehji, 2005b)
architecture and that can be used to represent a current
architecture or to illustrate a candidate or selected ISO 15504
architecture vision. An IS-architecture sketch is a high- An international standard that proposes the standard
level model, whereas an architecture blueprint is more project SPICE, which establishes maturity levels for
detailed. (Opdahl, 2005) each individual process: Level 0Incomplete; Level
1Performed; Level 2Managed; Level 3Established;
IS-Architecture Principle Level 4Predictable; Level 5Optimizing. (Monteiro
A high-level rule that can be used to make decisions de Carvalho et al., 2005)
about developing and/or evolving individual ICT systems.
(Opdahl, 2005) ISO 9001
An international standard that speciies the requirements
IS-Architecture Vision of a quality management system. It is applicable to any
A coherent set of IS-architecture principles that together organization regardless of product, service, organizational
guide all the aspects of IS-architecture evolution that are size, or whether it is a public or private company. (Leung,
considered important. (Opdahl, 2005) 2005)

ISD: See Instructional System Design. ISO 9001:2001


Provides standards used to assess an organizations ability
ISDN: See Integrated Services Digital Network. to meet its customers requirements and achieve customer
satisfaction. Software irms use it as an alternative to
ISEEK CMM. (Hawk & Kaiser, 2005)
An acronym for the Internet System for Education and
Employment Knowledge system, a comprehensive ISO 9000-3
online tool of information and resources on careers, A guide to help ISO 9001 interpretation for the software
jobs, education programs, and providers; developed by ieldthat is, the development, supply, acquisition, and
a collaboration of Minnesota agencies and institutions. maintenance of software. (Monteiro de Carvalho et al.,
(Langer, 2005) 2005)

Ishikawa Diagram: See Root Cause Analysis. ISO 9241


A standard describing ergonomic requirements for ofice
Island Mode GP work with visual display terminals. It deines how to specify
A type of parallel GP, where multiple subpopulations and measure the usability of products, and deines the
(demes) are maintained and evolve independently, factors that have an effect on usability. (Singh, 2005b)
except during scheduled exchanges of individuals. (Hsu,
2005b) ISO 9241-11 1
1: A standard that describes ergonomic requirements for
ISMS: See Information Security Management System. ofice work with visual display terminals. This standard
deines how to specify and measure the usability of products
I S O: S e e I n t e r n a t i o n a l O r g a n i z a t i o n f o r and deines the factors that have an effect on usability.
Standardization. (Singh, 2006) 2: The part of ISO 9241 that introduces
the concept of usability but does not make speciic
ISO/IEC 17799 recommendations in terms of product attributes. Instead,
The British Standards Institute published a code of practice it deines usability as the extent to which a product can
for managing information security following consultation be used by speciied users to achieve speciied goals with

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I SO 1 7 7 9 9 I T Gove r na nc e M at urit y M ode l 373

effectiveness, eficiency, and satisfaction in a speciied Isoluminance Contour


context of use. (Singh & Dix, 2006) Planar polygon that has a single constant color at all points
it encloses. (Cottingham, 2005)
I
ISO 17799
International standard describing managing information ISP: See Internet Service Provider.
security processes. (Janczewski & Portougal, 2005)
ISPS
ISO 13407 Internet service providers provide access to the Internet
International standard providing guidance on human- via different communications channels such as traditional
centered design activities throughout the lifecycle of telephone lines or high-speed iber optic channels. (Phala,
interactive computer-based systems. It is a tool for those 2005)
managing design processes, and provides guidance on
sources of information and standards relevant to the human- ISSP: See Issue-Speciic Security Policy.
centered approach. It describes human-centered design as
a multidisciplinary activity, which incorporates human Issue-Speciic Security Policy (ISSP)
factors and ergonomics knowledge and techniques with A policy that provides detailed, targeted guidance to
the objective of enhancing effectiveness and eficiency, instruct all members of the organization in the use of
improving human working conditions, and counteracting technology-based systems. (Mattord & Whitman, 2005)
possible adverse effects of use on human health, safety,
and performance. (Singh, 2006) IT: See Information Technology.

ISOC: See Internet Society. IT Alignment: See Information Technolog y


Alignment.
Isochronous
1: Processing that must occur at regular time intervals. IT Application: See Information Technolog y
(Swierzowicz, 2005) 2: Time-dependent processes where Application.
data must be delivered within certain time constraints.
For example, multimedia streams require an isochronous IT Architecture: See Information Technology
transport mechanism to ensure that data is delivered Architecture.
as fast as it is displayed, and to ensure that the audio is
synchronized with the video. Isochronous processes can IT Enabled: See Information Technology Enabled.
be contrasted with asynchronous processes, which refer
to processes in which data streams can be broken by IT End-User Relationship: See Information
random intervals, and synchronous processes, in which Technology End-User Relationship.
data streams can be delivered only at speciic intervals.
Isochronous service is not as rigid as synchronous service, IT Governance: See Information Technolog y
but not as lenient as asynchronous service. (Yang et al., Governance.
2005b)
IT Governance Comprehensiveness: See Information
Isolation Anomaly Technology Governance Comprehensiveness.
One of the set of inconsistencies that occur when
transactions are executed without the isolation property. IT Governance Formalization: See Information
(Frank, 2005b) Technology Governance Formalization.

Isolation Level IT Governance Integration: See Information


One of the different degrees of isolation that use up to Technology Governance Integration.
three different types of isolation anomalies, which are
accepted when concurrent transactions are executed. IT Governance Maturity Model: See Information
(Frank, 2005b) Technology Governance Maturity Model.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
374 I T H a rdw a re I U P

IT Hardware: See Infor mation Technolog y Item Equivalence


Hardware. Refers to whether identical instruments are used to measure
I the constructs across cultures. (Karahanna et al., 2005)
IT Implementation Process: See Information
Technology Implementation Process. Item Presentation
The set of WCDSS product display and promotion formats
IT Implementation Success: See Information such as virtual catalogs, 3D picture display, and samples
Technology Implementation Success. and trials. (F. Wang, 2006)

IT Industry: See Information Technology Industry. Itemset


1: A conjunction of items (attribute-value pairs) (e.g., age
IT Industry Development: See Information Technology = teen hair = brown). (Butler & Webb, 2005) 2: A set
Industry Development. of binary attributes, each corresponding to an attribute
value or an interval of attribute values. (Pasquier, 2005)
IT Industry Success: See Information Technology 3: A set of database items. (Daly & Taniar, 2005a) 4: A
Industry Success. set of one or more items that are purchased together in a
single transaction. (Jha & Sural, 2005) 5: An unordered
IT Infrastructure: See Information Technology set of unique items, which may be products or features. For
Infrastructure. computational eficiency, the items are often represented
by integers. A frequent itemset is one with a support count
IT Investment Intensity: See Information Technology that exceeds the support threshold, and a candidate itemset
Investment Intensity. is a potential frequent itemset. A k-itemset is an itemset
with exactly k items. (Woon et al., 2005) 6: A set of items
IT Literacy: See Information Technology Literacy. that occur together. (Masseglia et al., 2005)

IT Outsourcing Partnership: See Information Itemset Support


Technology Outsourcing Partnership. The ratio between the number of transactions in D
comprising all the items in I and the total number of
IT Portfolio: See Information Technology Portfolio. transactions in D (support(I) = |{TiD| (ijI) ijTi }| /
|D|). (Dumitriu, 2005)
IT Software: See Information Technology Software.
Iterative Development
IT Standard: See Information Technology Standard. An approach to software development where the overall
lifecycle is composed of several iterations in sequence.
IT Strategy: See Information Technology Strategy. (Ferre et al., 2006)

ITA: See Independent Testing Authority. ITMP: See Information Technology Master Plan.

ITCA: See Information Technology Competitive ITS: See Intelligent Tutoring System.
Advantage.
ITT: See Information Technology Transfer.
Item
A sales product, or a feature or attribute. (Kryszkiewicz, ITU: See International Telecommunications Union.
2005)
ITV: See Instructional Television; Interactive
Item Bias Television.
Refers to measurement artifacts. (Karahanna et al.,
2005) IUP: See Internet Usage Policy.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I VO I XC 375

IVO: See International Virtual Ofice.

IVR: See Interactive Voice Response.


I
IVUS Data Reconciliation
Mining in the IVUS individual dataset to compensate or
decrease artifacts to get improved data usage for further
cardiac calculation and medical knowledge discovery.
(Liu et al., 2005)

IXC: See Interexchange Carrier.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
376 JADE J ha i Foundat ion

J
JADE: See Java Agent Development Framework. Java Media Framework (JMF)
A Java library for the development of stand-alone and
JalChitra networked multimedia systems. (Fortino, 2005)
A village water resources mapping and water auditing
software developed by Dr. Vikram Vyas. (Literal meaning Java 2 Enterprise Edition (J2EE)
of Jal is water and Chitra is picture.) (Shaligram, 2005) Designed to simplify complex problems with the
development, deployment, and management of a multi-
Java tier enterprise solution. J2EE is an industry standard
1: A high-level programming language similar to C++ that helps build Web services (e.g., used with IBMs
developed by SUN Microsystems. (Guan, 2005c) 2: A WebSphere, HPs Web Services Platform, and Suns Sun
platform-independent programming language, produced ONE). (Chen, 2006)
by Sun Microsystems. Java is built as a method to provide
services over the WWW. With Java, a Web site provides a Java Virtual Machine (JVM)
Java application (called an applet), which is downloaded A platform-independent execution environment that
by the client and executed on the client machine. Java is converts Java byte-code into machine language and then
speciically built so that an application can be run on any executes it. (Lucas, 2005)
kind of system, so a separate MAC, Windows, Sun, and
so forth version is not needed. Java also has some security Java/RMI
features built in, to make it more dificult for destructive A Java application programming interface known as remote
applets to be written. (Dez-Higuera & Daz-Pernas, method invocation. (Yen, 2005)
2005) 3: An object-oriented language that is widely used
for Internet or Web-based applications. It was designed JavaScript
speciically for distributed environments. (Dasgupta A scripting language developed to enable Web authors to
& Chandrashekaran, 2005) 4: Programming language add dynamic content to sites. Although it shares many of
designed to be portable, used to create programs that will the features and structures of the Java language, it was
run on mobile phones and PDAs, as well as Macintosh, developed independently. It is supported by recent browsers
Windows, and Unix desktop computers. (Houser & from Netscape and Microsoft. (Valenti, 2005)
Thornton, 2005)
JAWS: See Job Access for Windows.
Java Agent Development Framework (JADE)
A middleware tool used in implementation of agent- JDM: See Java Data Mining.
based systems (http://jade.tilab.com). (Cardoso & Freire,
2005) Jhai Foundation
A non-proit organization founded by American, Lee
Java Data Mining (JDM) Thorn. The foundation is managed by an advisory board
An emerging standard API for the programming language and includes many volunteers as well as paid contractors.
Java. An object-oriented interface that speciies a set of Java Its aim is to assist the people of Laos in a collaborative
classes and interfaces supporting data-mining operations manner in the areas of economic development, education,
for building, testing, and applying a data-mining model. and information technology. (Anderson, 2005)
(Zendulka, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
J I T Joypa d 377

JIT: See Just-In-Time Training. is more likely that the community will sustain its validity.
(Louis, 2006)
JITAIT: See Just-In-Time Artiicially Intelligent Tutor.
J
Joint Intellectual Property
JMF: See Java Media Framework. The result of a company taking the view that it is owned
by its customers and they have ownership in product
Job Access for Windows (JAWS) development. This notion goes beyond normal customer
A Windows screen reader from Henter-Joyce. JAWS works relationships and co-creates new businesses based on
with PCs to provide access to software applications and the customer education and co-development. It is probably
Internet. With its internal software speech synthesizer and the most intense form of cooperation between a company
the computers sound card, information from the screen and its customers. (Paquette, 2006b)
is read aloud for visually impaired and blind people. (Yu,
2005a) Joint Outcome
Part of the direct output and by-products of the education
Job Characteristics Theory process including student learning, an employable
1: Task attributes inluence effectiveness through their workforce, AIT market exposure, and contributions to
impact on critical psychological states such as motivation industrial and academic research. (LeRouge & Webb,
and satisfaction with the work. (Wong & Staples, 2005) 2005)
2: This motivation theory, which stems from Hackman
and Oldham, identiies several characteristics of jobs, Joint Probability
such as skill variety and autonomy, that inluence the The probability of two events occurring in conjunction.
experienced meaningfulness of work, and therefore (Bashir et al., 2005)
the internal motivation and job satisfaction of workers.
(Hendriks & Sousa, 2006) Joint Probability Distribution
A function that encodes the probabilistic dependencies
Join Dependency among a set of variables in a domain. (Vargas, 2005)
Any decomposition of tables must be able to be rejoined to
recover the original table. Tables in 5NF are join dependent. Joint Venture Model
(Schultz, 2005) A model for collaboration between institutions where
modules and courses are developed and offered through
Join Index joint efforts; a jigsaw of different specialties and resources.
Built by translating restrictions on the column value of a (Haugen & Ask, 2005)
dimension table to restrictions on a large fact table. The
index is implemented using one of two representations, row Journey Making
id or bitmap, depending on the cardinality of the indexed Group mapping activities are often a central part of a
column. (Bellatreche & Mohania, 2005) groups JOint Understanding, Relection, and NEgotiation
of strategY. The methodology aims to support groups
Joint Diagnostic Relationship in their development of a feasible strategy that they are
As a result of the methods used, the approach of OD is individually and collectively committed to implementing.
informed by a joint diagnostic relationship between the OD (Shaw, 2006)
consultant or change agent and various stakeholders in the
organization. This enables the problem to be understood Joypad
from multiple perspectives. (Grieves, 2006b) A palm-sized device designed for use with both hands to
interact with the game. Its layout is typiied by directional
Joint Enterprise keys on the left, and buttons on the right and top sections
Allows the community to extend the boundaries and of the pad. Modern pads incorporate additional analog
interpretations beyond those that were created. By sharing sticks on the left or on both the left and right sides. (Ip &
a common goal, members of the community negotiate their Jacobs, 2006)
situations in their reactions to them. With joint enterprise it

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
378 Joyst ick J V M

Joystick Just-In-Time Learning


A 360-degree stick mounted on a sturdy platform of buttons Strategic knowledge acquisition enmeshed in business
J used for interacting with the game; used predominantly activities to support employees in learning new skills when
in stand-alone arcade machines and early home consoles. performing day-to-day tasks, while fostering the alignment
(Ip & Jacobs, 2006) between learning outcomes, and technological and strategic
business issues. (Rentroia-Bonito & Jorge, 2005)
JPEG
1: A standard file type for computerized images, Just-in-Time Material
determined by the Joint Photographic Experts Group. Material to supplement a traditional presentation available
(M. Lang, 2005) 2: Joint Photographic Experts Group for the learner to access when it may be needed. (Pelton
speciication for reproduction of digital images, widely & Pelton, 2005)
used on the Internet. (McCarthy, 2005a)
Just-In-Time Training (JIT)
J2EE: See Java 2 Enterprise Edition. The philosophy of providing training at the exact point
when one needs the knowledge/skills to perform a task
Junction Tree or job function. (Hanson, 2005)
A representation that captures the joint probability
distribution of a set of variables in a very eficient data JVM: See Java Virtual Machine.
structure. A junction tree contains cliques, each of which
is a set of variables from the domain. The junction tree is
conigured to maintain the probabilistic dependencies of
the domain variables and provides a data structure over
queries of the type What is the most probable value of
variable D given that the values of variables A, B, etc.,
are known? (Vargas, 2005)

Junction Tree Algorithm


A two-pass method for updating probabilities in Bayesian
networks. For triangulated networks the inference
procedure is optimal. (Caelli, 2005)

Junk Computing
The use of organizational information technology that
does not align with organizational goals. (Mahatanankoon,
2005)

Just-in-Time
An approach to learning where knowledge and skills are
acquired when, how, and where needed by the learner, and
using various technologies to deliver the learning event.
(Stavredes, 2005a)

Just-In-Time Artiicially Intelligent Tutor


(JITAIT)
One of several expert systems available on demand in
HyperReality environments to respond to frequently asked
student questions about speciic domains of knowledge.
(Rajasingham & Tifin, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K Close st Pa irs Que r y K a rhune n-Loeve Tra nsfor m (K LT ) 379

K
K Closest Pairs Query conidence constraints are not used. (Butler & Webb,
This spatial query involves two spatial datasets and a 2005)
cardinality threshold K (K1). It discovers the K distinct
pairs of objects from the two input datasets that have K-Nearest Neighbor
the K smallest distances between them. (Corral & A technique that classiies each Web page in a set based on
Vassilakopoulos, 2005) a combination of the classes of the k records most similar
to it. (Chen, Tsai, et al., 2005)
K-Anonymity
A privacy metric that ensures an individuals information K-Nearest Neighbors Join
cannot be distinguished from at least k-1 other people when This spatial query involves two spatial datasets and a
a data source is disclosed. (Saygin, 2005) cardinality threshold K (K1). The answer is a set of pairs
from the two input datasets that includes, for each of the
K-Line spatial objects of the irst dataset, the pairs formed with
An Asian version of a stock price bar chart where a lower each of its K nearest neighbors in the second dataset.
close than open on a day period is shaded dark and a higher (Corral & Vassilakopoulos, 2005)
close day period is shaded light. (Hou et al., 2005b)
K-Systemic Competency
K-Means Clustering One of the set of utilization-oriented characteristics of
1: A cluster analysis technique in which clusters are knowledge that could contribute positively to the creation
formed by randomly selecting k data points as initial of new business strategy or better support of existing
seeds or centroids, and the remaining data points are business strategy. (Abou-Zeid, 2005a)
assigned to the closest cluster on the basis of the distance
between the data point and the cluster centroid. (Voges, K-12
2005) 2: A clustering method that groups items that are Kindergarten through Grade 12. (Dell, 2005)
close together, based on a distance metric like Euclidean
distance, to form clusters. The members in each of the K-16
clusters can be described succinctly using the mean (or Kindergarten through undergraduate degree. (Dell,
centroid) of the respective cluster. (Mani et al., 2005) 3: 2005)
An algorithm that performs disjoint cluster analysis on
the basis of Euclidean distances computed from variables KA: See Knowledge Area; Knowledge Asset.
and randomly generated initial seeds. (Yeo, 2005) 4:
Iterative clustering technique subdividing the data in KAI: See Kirton Adaption-Innovation Inventory.
such a way to maximize the distance among centroids of
different clusters, while minimizing the distance among Karhunen-Loeve Transform (KLT)
data within each cluster. It is sensitive to initialization. Utilizes principal component analysis or singular value
(Liberati et al., 2005) decomposition to minimize the distance error introduced
for that level of dimensionality reduction. (Thomasian,
K-Most Interesting Rule Discovery 2005b)
The process of inding k rules that optimize some
interestingness measure. Minimum support and/or

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
380 K b Ke r ne lize d Archit e c t ure

Kb: See Kilobytes. from teaching machines and programmed instructions.


(I. Chen, 2005)
K Kbps: See Kilobits Per Second.
Kerberos
KBSE: See Knowledge-Based Support Environment. A type of authentication developed at MIT where a
Kerberos server issues a session ticket when a valid user
KC: See Knowledge Component. requests services. The users logon password is not sent
through the network. (Knight & Labruyere, 2005)
KCU: See Knowledge Currency Unit.
Kernel
KD: See Knowledge Distance. A function of data points. A simple instantiation is the
centroid. (Murthy & Diday, 2005)
KDD: See Knowledge Discovery in Databases.
Kernel Function
KDE: See Kernel-Density Estimation. 1: A function that computes the inner product between
mapped instances in a feature space. It is a symmetric,
KDviz: See Knowledge Domain Visualization. positive deinite function. (Lodhi, 2005) 2: A function that
intrinsically deines the projection of two feature vectors
KID Debate: See Knowledge Information Data (function arguments) onto a high-dimensional space and a
Debate. dot product therein. (Aradhye & Dorai, 2005) 3: A function
K, such that for all x, zX , K(x, z) = <(x),(z)> where
Kilobyte (Kb) is a mapping from X to a (inner-product) feature space
A unit of computer data equal to 1,024 (210) bytes, or more F. (Awad & Khan, 2005) 4: A nonlinear function of two
commonly, 1,000 bytes. (Hantula, 2005) vectors, used with a support vector machine to generate
nonlinear separating surfaces. (Musicant, 2005)
Kilobits Per Second (Kbps)
A measure of bandwidth (the amount of data that can low Kernel Matrix
in a given time) on a data-transmission medium. Higher A matrix that contains almost all the information required
bandwidths are more conveniently expressed in megabits by kernel methods. It is obtained by computing the inner
per second (Mbps, or millions of bits per second) and in product between instances. (Lodhi, 2005)
gigabits per second (Gbps, or billions of bits per second).
(Olla, 2005a) Kernel Method
One of a set of pattern analysis techniques that work by
Kirton Adaption-Innovation Inventory (KAI) embedding the data into a high-dimensional vector space
An instrument that measures cognitive problem-solving and by detecting linear relations in that space. A kernel
style. It takes the form of a questionnaire, on which the function takes care of the embedding. (Domeniconi &
respondent is asked to rate himself or herself against 32 Gunopulos, 2005)
character traits. (Mullany, 2005)
Kernel-Density Estimation (KDE)
Keller Plan Consider the vector space in which the data points are
The Keller Plan (sometimes called Keller Method, embedded. The inluence of each data point is modeled
personalized system of instruction or PSI), individually through a kernel function. The total density is calculated
prescribed instruction (IPI), program for learning in as the sum of kernel functions for each data point. (Denton,
accordance with needs (PLAN), and individually guided 2005)
education are all examples of individualized instruction.
The Keller Plan was developed by F.S. Keller, his Kernelized Architecture
colleague J. Gilmore Sherman, and two psychologists at An architecture in which data are physically stored in
the University of Brazilia. The Keller Plan is derived from databases according to sensitivity level. (Haraty, 2005a)
the behaviorists reinforcement psychology, with inluence

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ke y K irk pat rick s Leve l 3 Eva luat ion (Tra nsfe r) 381

Key Keypad
1: A unique sequence of values that deines the location A handheld device that allows a participant to communicate
of a node in a tree data structure. (Woon et al., 2005) 2: data to an audience response system. (Banks, 2005)
K
A data item or ield used to locate records in a table. A
primary key uniquely identiies each record. If more than Keyword
one ield is needed to guarantee unique identiication, the An attribute of an electronic document used to describe
primary key is called a concatenated key or composite key. the document. (Corral et al., 2006)
When more than one combination of data items or ields
could serve as a primary key, the keys not actively used Keyword Search
are called candidate keys. (Schultz, 2005) 1: A search for documents containing one or more
words that are speciied by a user. (Galitsky, 2005c) 2:
Key Business Process A traditional search mechanism for locating electronic
A collection of intentional business activities that is both documents based on a speciic (keyword) attribute list.
measurable and worthy of improvement or optimization. Keyword searching is based on a recall paradigm of
(Artz, 2005d) cognitive retrieval. Keyword searching is currently the
most widely used retrieval mechanism, however, it is not
Key Frame without its limitations. (Corral et al., 2006)
1: Representative image of each shot. (Swierzowicz, 2005)
2: One of the representative shots extracted from a video KIBS: See Knowledge-Intensive Business Services.
that illustrate its main content. (N.C. Rowe, 2005a)
KIF: See Knowledge Interchange Format.
Key Frames Selection
The selection of a set of representative frames to abstract Killer App
video shots. Key frames are the most important frames in 1: A software application that is so popular that it drives
a shot, so that they can represent the shot in both browsing the widespread adoption of a new technology. For example,
and similarity matching operations, as well as be used as desktop spreadsheet software was so effective that it made
access points. (Farag, 2005b) personal computers a must-have technology for virtually all
businesses. (Hughes & Lang, 2005) 2: Technical jargon for
Key Intelligence Topic (KIT) the eternal search for the next big idea. (Singh, 2006b)
A process for identifying intelligence requirements by
considering strategic decisions, early-warning topics, and Killile
key players. (Parker & Nitse, 2006) In newsgroups, a list of e-mail names you do not want to
read messages from. (Rowe, 2006b)
Key Logger/Keystroke Logger
Software that runs imperceptibly during computer use that Kirkpatricks Level 1 Evaluation (Reaction)
records each keystroke, either saving the results to a log An assessment of participants perceptions of and reactions
ile or sending the results to a second party. (Friedman, to the training event. (Waddington et al., 2005)
2005)
Kirkpatricks Level 2 Evaluation (Learning)
Key Performance Indicator (KPI) An assessment of participants knowledge and skill gain as
One of the set of quantiiable measurements that help a result of the training event. (Waddington et al., 2005)
an organization evaluate how it is progressing towards
organizational goals. (Khan et al., 2006) Kirkpatricks Level 3 Evaluation (Transfer)
An assessment of the extent to which participants are
Key Process Area using what they learned in the training event on their job
A set of activities that deine a speciic capability area; the and in their roles, and whether participants behavior has
CMM has 18 key process areas. (Berztiss, 2006a) changed as a result of the training event. (Waddington
et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
382 K irk pat rick s Leve l 4 Eva luat ion (Busine ss Re sult s) K now le dge

Kirkpatricks Level 4 Evaluation KM Instrument


(Business Results) A bundle of measures encompassing the organization,
K An assessment of whether business results have been human resources, and ICT with the goal of improving KM-
achieved as a result of the training event, such as increased related performance indicators. Examples of ICT-related
sales or improved customer satisfaction. (Waddington et KM instruments are competency management systems,
al., 2005) knowledge maps, or ICT support for communities and
knowledge networks. (Hdrich & Maier, 2006)
KIT: See Key Intelligence Topic.
K M Spectrum: See Knowledge Management
KJ Spectrum.
A technique to structure information, typically after
a brainstorm. Keywords are written on stickers and KMS: See Knowledge Management System.
organized according to group. The technique is named after
Japanese Ethnologist Jiro Kawakita. (Dingsyr, 2006) Know-How
Knowledge embedded in the individual. Examples of know-
KL-ONE how are skills, capabilities, and expertise. (Haghirian,
A knowledge representation system in the late 1970s that 2006)
inspired the development of a number of frame-based
representation systems. These systems embraced the Knowcos
ideas of frames as structured descriptions, as well as E-fulillment organizations concentrating on knowledge-
the idea of differentiating between terminological and based capabilities such as Web development, business
assertional aspects of knowledge representation and the consulting, supplier management, and customer
central role of subsumption and classiication inferences. management are termed Knowcos. They concentrate
(Kapetanios, 2005) on offering innovative services to become competitive
through effectiveness of such services, and the ability to
Kleisly Morphism outsource supply chains and customer-facing tasks for
A basic construct of categorical algebra. In the context online retailers. The degree of Knowco-ness and the range
of MMt, a Kleisly morphism from model S to model T of capabilities it applies varies for different providers.
is a mapping of the source models items to derived or (Alexander & Burn, 2006)
basic items of the target model. In other words, a Kleisly
morphism assumes (1) a set of queries Q to the target Knowledge
model and (2) a mapping (function) m: SderQT into 1: A reasoning unit of cognition that creates awareness
an augmentation of the target model with derived items based on facts scientiically proven, rules, laws, coherent
corresponding to the queries from Q. (Diskin, 2005) inferences, and well-deined methods. (Targowski, 2005)
2: An individual and social construction that allows us to
KLT: See Karhunen-Loeve Transform. relate to the world and each other (Baralou & Stepherd,
2005) 3: An organizational resource, either explicit or
KM: See Knowledge Management. tacit, and often context speciic, and the basis on which
organizations create superior business performance. (Ng
KM Infrastructure & Pemberton, 2006) 4: An understanding gained through
The tools and technologies (the speciic tools required to experience or learning: the sum or a subset of what has been
capture and codify organizational knowledge, speciic perceived and discovered by an individual. Knowledge
tools required to share and distribute organizational exists in the minds of individuals, and is generated and
knowledge) that are required to support and facilitate KM shaped through interaction with others. (Ali & Warne,
in the organization. KM tools and technologies are the 2005) 5: Familiarity gained by actual experience, practical
systems that integrate various legacy systems, databases, skill, or expertise. The act or state of understanding.
ERP systems, and data warehouses to help organizations Valuable information arising from relection, synthesis, and
to create and use KM systems in the organization. other cognitive activities of the human mind. It is often,
(Wickramasinghe & Sharma, 2005) but not always, hard to structure, dificult to capture on

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Ac c e ss K now le dge Archit e c t ure 383

machines, sometimes tacit, and hard to transfer. Knowledge employer, is a dificult asset to control, as it is fragmented
includes data and information (organized data which are in documents, policies, procedures, and other data storage
relevant and purposeful), and knowing how to apply and mediums. Another challenge for management is to retain
K
use that information and data. The term ledge means this knowledge in a form that is easily retrievable. This is
to put to work or apply. The word knowledge, therefore, not an easy task, since the enterprise must irst identify the
means knowing how to put to work what we know, and location of all needed knowledge, and second determine
so in popular usage can in certain situations encompass the easiest way to retrieve it. (Galup et al., 2005)
information and data. (Mockler & Dologite, 2005) 6:
Human life, as well as the philosophical exercise, are not Knowledge Access
a suffered climbing towards the unattainable mountain of A process that allows authorized information users to
truth. Human beings frequently face the question of truth read, update, duplicate, and transfer data in a convenient
as a victory over totality, the knowledge of everything, and prompt way. Based on Internet searching algorithms,
absolute knowledgeas if this total knowledge would be database technology, and modern communication
anterior and external to humans. The knowledge of being technology, people are able to access knowledge networks
is one of the most radical constituent drives of humans, at anytime, anywhere, and from any terminal on the
and it happens within the compromise of action, and never Internet. (Croasdell & Wang, 2006)
in the summing up, whether total or partial, of discreet
units. At the origin of all knowledge, there is the drive Knowledge Acquisition
to organize reality in order to optimize it. It is this drive 1: Comprises all activities that increase the global stock
that promotes the creation of all knowledge and that also of knowledge potentially useful to the organization. An
uniies it. All knowledge departs from cultural worlds, organization may acquire new knowledge through creation
all knowledge is made possible through the action of or other means (e.g., acquisition of another organization,
human beings, and all knowledge is directed towards the communication with consultants, etc.). (Prat, 2006) 2:
widest horizon possible. The engine behind the global The individual or collective process aimed at obtaining
movement of knowledge is the ontological demand felt, in knowledge from another actor, by one or more of the
particular by the areas that use natural language. (Nobre, subprocesses of transaction, communication, cooperation,
2006b) 7: The ability to enable action in the organization imitation, or appropriation. (Kraaijenbrink & Wijnhoven,
(e.g., good decisions, appropriate behaviors, useful work). 2006)
As such it complements information, which provides
the context for and meaning of action (e.g., criteria for Knowledge Agent
decisions, motivations for actions, speciications for work), An individual or organization storing, retrieving,
as well as data, which supply details associated with transferring, and applying/exploiting knowledge resources.
action (e.g., facts, observations, measurements). (Nissen (Loebbecke & Angehrn, 2006)
& Levitt, 2006) 8: Includes but is not limited to those
descriptions, hypotheses, concepts, theories, principles, Knowledge Animation
and procedures which to a reasonable degree of certainty An interactive application that consists of interactive
are either true or useful. In the growing discipline in mechanisms that foster the reconstruction of knowledge
Knowledge Management, knowledge is divided into or the generation of new insights. (Eppler & Burkhard,
explicit (information), implicit, and tacit knowledge. 2006)
(Theng, 2005) 9: Information combined with experience,
context, interpretation, and relection. (Hirji, 2005) 10: Knowledge Appropriation
The application of a combination of instincts, ideas, rules, Individually or collectively obtaining rights to utilize
procedures, and information to guide the actions and acquired knowledge in a certain way. (Kraaijenbrink &
decisions of a problem solver within a particular context. Wijnhoven, 2006)
(Xodo, 2005) 11: Knowledge can be perceived as a discrete,
objective, largely cognitive entity, susceptible of being Knowledge Architecture
classiied as tacit and explicit, or it can be considered as a The blueprints of subjective and objective knowledge,
process or practice of knowing, being socially constructed its lows, and cartography of knowledge within the
and embedded in practice. (Sarmento, 2005) 12: An organization. (Wickramasinghe & Sharma, 2005)
intellectual property that, although paid for in part by the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
384 K now le dge Are a (K A) K now le dge Ca pa bilit y Are a

Knowledge Area (KA) (Nabuco et al., 2006) 3: An entity comprising facts, rules,
Also called Project Management Knowledge Area. For and integrity constraints used for collecting and querying
K PMI there are nine knowledge areas: integration, scope, diverse types of information. (Grant & Minker, 2006) 4:
time, cost, quality, human resources, communications, An online repository of information that represents the
risk, and procurement. (D. Brandon, 2005b) collective wisdom regarding a product or service. (Borders
& Johnston, 2005) 5: The primary repository for all course
Knowledge Artifact materials. Relevant information from the knowledge base
Anything that helps illustrate or answer how, why, when, will later be extracted out in providing personalized course
what, where, and so forth. (Croasdell & Wang, 2006) materials for individual students. (Leung & Li, 2005)

Knowledge Asset (KA) Knowledge Base Model


1: A statement, assumption, abstract model, and other Formally described concept of a certain problem; usually
form of knowledge regarding the organization itself and its represented by a set of production rules, semantic nets,
environment (markets, customers, etc.) that an organization frames, and the like. (Bruha, 2005)
possesses. Such assets provide economic or other value
to an organization when interacting within it or with its Knowledge Building
environment. (Anttiroiko, 2005b) 2: An organizations 1: A framework for collective knowledge advancement
schematic and content knowledge resources, including and development of knowledge artifacts. (Muukkonen
knowledge held by the organizations participants, et al., 2005) 2: In a knowledge-building environment,
various artifacts belonging to the organization (e.g., knowledge is brought into the environment and something
documents, manuals, videos), the organizations culture, is done collectively to it that enhances its value. The goal
and its particular infrastructure of roles, relationships, and is to maximize the value added to knowledge: either the
regulations. (Holsapple & Jones, 2006) 3: An intangible public knowledge represented in the community database
asset that encompass knowledge as well as the ability of or the private knowledge and skills of its individual
an organization to leverage that knowledge. (Kulkarni learners. Knowledge building has three characteristics:
& Freeze, 2006) 4: The knowledge regarding markets, (1) knowledge building is not just a process, but it is
products, technologies, processes, and organizations that aimed at creating a product; (2) its product is some kind
a business owns or needs to own and which enable its of conceptual artifact, for instance, an explanation, design,
business processes to generate proits, add value, and so historical account, or interpretation of a literacy work; and
forth. (Wickramasinghe & Sharma, 2005) (3) a conceptual artifact is not something in the individual
minds of the students and not something materialistic or
Knowledge Asymmetry visible, but is nevertheless real, existing in the holistic
Designates the gap in the level of understanding regarding works of student collaborative learning communities.
a particular topic among two or more people, for example (Kwok Lai-yin & Tan Yew-Gee, 2005) 3: Production and
among decision makers and experts regarding decision- improvement of knowledge objects that can be discussed,
relevant insights. Knowledge asymmetry cannot be tested, compared, hypothetically modiied, and so forth,
resolved in the same manner as information asymmetry, and not simply the completion of school tasks. (Nason &
as the mere transfer of information is insuficient for a Woodruff, 2005a)
mutual level of understanding. Hence, collaborative sense-
making processes need to take place in order to overcome Knowledge Calibration
knowledge asymmetry. (Eppler, 2006) Correspondence between knowledge accuracy and
conidence with which knowledge is held. (Goldsmith &
Knowledge Base Pillai, 2006)
1: A collection of rules deined as expressions written
in predicate calculus. These rules have a form of Knowledge Capability Area
associations between conjuncts of values of attributes. A subset of knowledge assets identiied as either expertise,
(Ras & Dardzinska, 2005) 2: A knowledge repository, lessons learned, knowledge documents, or data. (Kulkarni
organized according to formal descriptive rules, permitting & Freeze, 2006)
performance of operations over the represented knowledge.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Ca pit a l K now le dge Cont rol 385

Knowledge Capital a test), and know-who (e.g., the experiences with others)
The sum or worth of the knowledge held within an through face-to-face (co-located) or media-based (virtual)
organization. Often held to be of primary importance, but interactions. (Eppler, 2006)
K
dificult to quantify. (Udechukwu et al., 2006)
Knowledge Community
Knowledge Capture Self-organized, altruistic relationships of trust between
The process of eliciting knowledge (either explicit or tacit) people for research, development, and innovation-oriented
that resides within people, artifacts, or organizational knowledge exchange within a wide domain of knowledge.
entities, and representing it in an electronic form such (Meller-Prothmann, 2006a)
as a knowledge-based system for later reuse or retrieval.
(Becerra-Fernandez & Sabherwal, 2006) Knowledge Component (KC)
The logical division and element of a course. Various content
Knowledge Category representations in a course are normally organized around
A category used to characterize the topics or areas of each knowledge component. (Y.J. Zhang, 2005b)
knowledge dealt with by documents. (Woods et al.,
2006) Knowledge Composition
Involves assembling knowledge atoms (such as triples in
Knowledge Center RDF and OWL) to build more complex knowledge maps.
A support structure that assigns a distinct set of knowledge- (Aleman-Meza et al., 2005)
related tasks, usually within the coordination domain, to
a separate department. (Hendriks, 2006) Knowledge Concept
A concept that is part of an ontology used for deining and
Knowledge Chain Model describing the knowledge related with a community, such
A model that identiies generic knowledge management as the kinds of knowledge or the sources of knowledge.
activities, which are keys to achieving competitive (Rodrguez-Elias et al., 2006)
advantage and therefore can guide the formation of KM
strategies. (Holsapple & Jones, 2006) Knowledge Construction
1: Process by which knowledge new to the individual or
Knowledge Codiication group is created based on a generative process. (Collis
1: The documentation of knowledgethat is, the conversion & Moonen, 2005a) 2: Refers to the act or process of
of tacit knowledge into an explicit form. ICT is often a contributing to the development of a body of ideas, attitudes,
strong facilitator to support this strategy of knowledge and/or beliefs. (McCracken, 2005)
management. For example, knowledge objects are stored in
databases that allow lexible and fast access and retrieval. Knowledge (Content) Management Software
It is a product-centric view of knowledge management. Research software that helps content semantic search,
(Fink & Disterer, 2006) 2: The process of packaging indexation, and coding automatically. (Lambropoulos,
knowledge into formats that enable the organization to 2006a)
transmit it to other parts and thus facilitate knowledge
transfer. Codiication of knowledge is therefore a means of Knowledge Contributor
representing it and enables all members of the organization A person who provides knowledge that may be shared with
to access relevant knowledge. (Haghirian, 2006) other organizational members (used interchangeably with
knowledge producer). (Kankanhalli et al., 2006)
Knowledge Communication
The (deliberate) activity of interactively conveying and co- Knowledge Control
constructing insights, assessments, experiences, or skills A process that provides data safeguards against invasion,
through verbal and non-verbal means. It designates the corruption, and knowledge theft. It also provides statistics
successful transfer of know-how (e.g., how to accomplish to network administrators for monitoring the operating
a task), know-why (e.g., the cause-effect relationships of status of the network. (Croasdell & Wang, 2006)
a complex phenomenon), know-what (e.g., the results of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
386 K now le dge Cre at ion K now le dge Disc ove r y

Knowledge Creation Knowledge Diffusion


1: The continuous and dynamic interaction between tacit- The adaptation of knowledge in a broad range of scientiic
K explicit and speciic-general knowledge that happens at and engineering research and development. (Chen &
different individual, group, organizational, and social Lobo, 2006)
levels, and within and among entities. (Medeni, 2006a)
2: The creation of new knowledge or the combination of Knowledge Dimension
existing knowledge to achieve an outcome, which can be Any knowledge object comprises numerous characteristics.
in terms of innovation or problem solving. (Fong, 2006a) Pairs of these characteristics represent opposite ends
3: The evaluation and interpretation of patterns, trends, of dimensions, and an item of knowledge may display
or anomalies that have been discovered in a collection of combinations of the two characteristics on any dimension.
texts (or data in general), as well as the formulation of its (Ein-Dor, 2006)
implications and consequences, including suggestions
concerning reactive business decisions. (Kroeze, 2005) 4: Knowledge Directory
The irst step in the KM process (the other steps include An enterprise-wide taxonomy for organizing content from
represent/store, access/use/reuse, disseminate/transfer); Web sites, document databases, and ile systems, as well
impacts the other consequent steps. (Wickramasinghe, as portlets, communities, and user proiles. (Wojtkowski,
2006) 5: This can be divided into both explicit knowledge, 2006)
which can be formulated in terms of words and numbers
and distributed as data, reports, and scientiic formulas, Knowledge Discovery
and tacit knowledge, which is related to ideas, emotions, 1: A computer-supported process that uses computational
intuition, and experience. (Khan et al., 2006) algorithms and tools as visualization methods to help a
user to discover knowledge from stored data. (Antonio
Knowledge Currency Unit (KCU) do Prado et al., 2005) 2: In data sets, the process of
A mechanism deined at Infosys Technologies to convert identifying valid, novel, potentially useful, and ultimately
all knowledge-sharing activities to a common denominator, understandable patterns/models in data. (Lazar, 2005)
in order to enable their measurement in quantitative terms. 3: Similar to data mining, this relates to the inding or
(Kochikar & Suresh, 2005) the process of inding previously unknown patterns or
relationships in a set of data. This might be extended to the
Knowledge Deinition identiication of important or relevant input attributes to
Describes part of the structure or behavior of the be used for classiication. (Fuller & Wilson, 2006) 4: The
sociotechnical system; for example, a worklow, an development of new tacit or explicit knowledge from data
information tool used, or a norm regulating the behavior and information, or from the synthesis of prior knowledge.
of community members. (Signoret, 2006) (Becerra-Fernandez & Sabherwal, 2006) 5: The discovery
of patterns, trends, or anomalies that already exist in a
Knowledge Dialogue collection of texts (or data in general), but have not yet been
Designates conversations that have as their prime objective identiied or described. (Kroeze, 2005) 6: The process by
the manipulation of knowledge, that is to say to create new which new pieces of information can be revealed from a
knowledge (Crealogues), share knowledge (Sharealogues), set of data. For example, given a set of data for variables
evaluate knowledge (Assessalogues), or apply and utilize {A,B,C,D}, a knowledge discovery process could discover
knowledge (Doalogues). Participants in knowledge unknown probabilistic dependencies among variables in
dialogues pay special attention to the role of language in the domain, using measures such as Kullbacks mutual
creating new insights, conveying what one knows to others, information, which, for the discrete case, is given by the
or critically examining arguments. In the case of Doalogues formula:
that convert knowledge into action, as in the other three
p ( ai , b j )
types of knowledge-focused talk, conversations are not I ( A : B) = p(a , b ) log P(a ) P(b )
i j
just held, but actively managed. (Eppler, 2006) i j i j

(Vargas, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Disc ove r y in Dat a ba se s (K DD) K now le dge Ec onom y 387

Knowledge Discovery in Databases (KDD) Knowledge Distance (KD)


1: The process of data selection, sampling, pre-processing, Conceptualizes industry-speciic knowledge differences
cleaning, transformation, dimension reduction, analysis, among managers from different sectors. (Choudhary,
K
visualization, and evaluation for the purpose of inding 2005)
hidden knowledge from massive databases. (Dholakia et al.,
2005a) 2: Knowledge discovery process from the database, Knowledge Document
performing tasks of data pre-processing, transformation Documented knowledge with an established, extended
and selection, and extraction of data-mining patterns and shelf life that resides in an explicit form and may originate
their post-processing and interpretation. (Meo & Psaila, internally or externally. (Kulkarni & Freeze, 2006)
2005) 3: The process of knowledge discovery in large
databases. (de Carvalho et al., 2005) 4: A paradigm for Knowledge Domain
the analysis of large datasets. The process is cyclic and 1: An area of knowledge a community agrees to learn
iterative, with several steps including data preparation, about and advance, representing common ground and a
analysis, and interpretation. KDD uses various methods sense of common identity that legitimizes the community
from such diverse ields as machine learning, artiicial by afirming its purpose and value to members. (Ng &
intelligence, pattern recognition, database management Pemberton, 2006) 2: The knowledge related to deining,
and design, statistics, expert systems, and data recognizing, and solving a speciic problem. (Achterbergh,
visualization. (Imberman & Tansel, 2006) 5: Also referred 2005b)
to as data mining; the extraction of large hidden predictive
information databases. (Zhang & Zhang, 2005) 6: A process Knowledge Domain Visualization (KDviz)
of producing statements that describe objects, concepts, 1: An emerging ield that focuses on using data analysis,
and regularities. It consists of several steps, for example, modeling, and visualization techniques to facilitate the
identiication of a problem, cleaning, preprocessing and study of a knowledge domain, which includes research
transforming data, applying suitable data-mining models fronts, intellectual basis, and other aspects of a knowledge
and algorithms, interpreting, visualizing, testing, and domain. KDviz emphasizes a holistic approach to treat
verifying results. (Swierzowicz, 2005) a knowledge domain as a cohesive whole in historical,
logical, and social contexts. (Chen & Lobo, 2006) 2: A
Knowledge Discovery from Texts subield of information visualization that is concerned with
A computer-supported process that uses computational creating effective visualizations for speciic knowledge
algorithms and tools as visualization methods to help a user domains. (Thelwall, 2005) 3: Focuses on identifying and
to discover knowledge from stored textual data. It can be visually presenting the dynamics of scientiic frontiers
understood that this process gives to the user information in a multidisciplinary context, and allows new ways of
that would not be recovered by traditional queries, since accessing knowledge sources by visualizing linkage,
the information is not explicitly stated or declared in the relationships, and the structures of scientiic domains.
textual data. (Antonio do Prado et al., 2005) (Eppler & Burkhard, 2006)

Knowledge Discovery Process Knowledge Economy


The overall process of information discovery in large 1: A realm of economic activity encompassing factors
volumes of warehoused data. (Brown & Kros, 2005) forming the core of a high value-added economy where
knowledge is a key to economic success, and where skills
Knowledge Dissemination and learning are valued and productively employed.
The act of making information as a component of (Ng & Pemberton, 2006) 2: An economy where the
knowledge available to others. As a purposeful act, continuous innovations in information and communication
knowledge dissemination can be manipulated to withhold, technology have forged stronger links between
amplify, or distort information in order to deceive the individuals, organizations, and nations, contributing to
recipient. (Land et al., 2006b) global knowledge dissemination. (Kamel, 2005b) 3: An
economy where the resource of most value is knowledge.
(Mason et al., 2006) 4: Economic growth is driven by the
accumulation of knowledge, which is the basic form of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
388 K now le dge Engine e ring K now le dge I nfra st ruc t ure

capital. A knowledge-driven economy is one in which or propagation of knowledge across space, time, people,
the generation and exploitation of knowledge plays the and organizations. (Nissen, 2005) 3: The ways in which
K predominant part in the creation of wealth. (Aurum, knowledge can move between a Community of Practice
2005) 5: The knowledge economy is a state of economic (CoP) and the larger organization, or between members of
being and a process of economic becoming that leverages, the CoP. A free low of knowledge may be facilitated by
both intensively and extensively, knowledge assets and human or technological means or may result as a natural
competences, as well as economic learning to catalyze exchange between individuals, for example, a conversation.
and accelerate sustainable and robust economic growth. (Wenn, 2006a)
(Moodley, 2005) 6: The knowledge-based economy is
all about adding ideas to products and turning new ideas Knowledge Forum
into new products. Relationships with trading partners, A single, communal multimedia database designed to
customers and suppliers, distribution networks, intellectual facilitate computer-supported collaborative learning.
property, patents, image, and so forth are all elements of a (Nason & Woodruff, 2005a)
knowledge economy. These elements represent intellectual
capital. (Sharma et al., 2005) Knowledge Gap
The different knowledge possession through mass media
Knowledge Engineering by social groups with varied social-economic-status.
The process of eliciting an experts knowledge in order (Tarnanas & Kikis, 2005)
to construct a knowledge-based system or organizational
memory. (Becerra-Fernandez & Sabherwal, 2006) Knowledge Hierarchy
The hierarchical relationship between knowledge,
Knowledge Exchange Protocol information, and data, with each level building upon the
A method of structuring tacit knowledge sharing so as to one below. (Nissen, 2005)
make its conversion to explicit knowledge more eficient. It
emphasizes the use of dialogue segmenting accompanied Knowledge Identiication
by structural content headings to deliver implicit content. The individual or collective process aimed at locating
(Herschel, 2005) knowledge at a source, by one or more of the subprocesses
of need identiication, gap analysis, searching, viewing,
Knowledge Extraction or inding. (Kraaijenbrink & Wijnhoven, 2006)
Explicitation of the internal knowledge of a system or set
of data in a way that is easily interpretable by the user. Knowledge Imitation
(Rabual Dopico et al., 2005) Individually or collectively reproducing knowledge from
another actor by copying its objects or actions, with or
Knowledge Facilitator without its assent. (Kraaijenbrink & Wijnhoven, 2006)
A knowledge worker who ensures that knowledge is
captured, indexed, and was made available for reuse. Knowledge Indexing
(Oshri, 2006) Consists of organizing knowledge in individual or
collective memory in order to ease its subsequent retrieval.
Knowledge Finding (Prat, 2006)
Coming across knowledge or sources of knowledge by an
individual or a collective, regardless of the engendering Knowledge Information Data (KID) Debate
process. (Kraaijenbrink & Wijnhoven, 2006) A discussion (alternatively, the data-information-
knowledge debate) that pervades the knowledge-
Knowledge Flow management literature and attempts to determine at what
1: Deines how the knowledge lows through the activities point, if any, data becomes information, and information
performed by a community according to the kinds becomes knowledge. (Schwartz, 2006)
of knowledge and knowledge sources involved in the
activities, the mechanisms used by the people involved Knowledge Infrastructure
in the activity to obtain or share that knowledge, and so A technical infrastructure supporting the development
forth. (Rodrguez-Elias et al., 2006) 2: The movement of organizational knowledge, whose design philosophy

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge I nt e grat ion K now le dge M a na ge m e nt (K M ) 389

is often organization speciic. An example is to consider by different programmers, at different times, in different
the infrastructure as a three-tiered system comprising the languages, and so forth). KIF is not intended as a primary
front-end knowledge management services, the middle language for interaction with human users (though it can
K
knowledge management architecture, and the back-end be used for this purpose). The purpose of KIF is roughly
organizational memory. (Vat, 2006) analogous to that of PostScript, which is commonly used
by text and graphics formatting systems in communicating
Knowledge Integration information about documents to printers. (Kapetanios,
1: Solving problems raised by specialization. Specialization 2005)
leads to a dispersion of specialized bodies of knowledge
that are held by different specialists. Knowledge Knowledge Leakage
integration refers to how this drawing on different bodies The low of company proprietary knowledge across irm
of specialized knowledge is organized. (Munkvold, 2006) boundaries. (Teigland & Wasko, 2006)
2: In most organizations, the knowledge required for
innovation and production lies dispersed over individual Knowledge Lifecycle
organization members, groups, and departments. The The activities encompassing the treatment of knowledge
performance of organizations depends on the integration as it moves through the stages of creation and capture,
of that specialized knowledge. Knowledge integration storage, retrieval and transfer, and application and reuse.
is the process in which different pieces of knowledge, (Kulkarni & Freeze, 2006)
which are valuable for a particular organizational process
and held by different organization members, are applied Knowledge Logistics
to that organizational process. (Berends et al., 2006) 3: The distribution and storage of knowledge. (Wijnhoven,
Methodology of combining, modifying, reining, and 2006)
merging usually several models (knowledge bases) into one
robust, more predictable, and usually redundant model, or Knowledge Management (KM)
that of combining decisions of single (base) models. (Bruha, 1: A set of business practices and technologies used to
2005) 4: The effectiveness of an organization to integrate assist an organization to obtain maximum advantage
the specialized knowledge of its members along three of its knowledge. (Narayanan, 2005) 2: Efforts made
dimensions: eficiency, scope, and lexibility. (Teigland by an organization to manage knowledge. Knowledge
& Wasko, 2006) 5: The identiication, acquisition, and management is a discipline that promotes an integrated
utilization of knowledge that is external to an individual approach to identifying, capturing, storing, retrieving, and
or collective actor. (Kraaijenbrink & Wijnhoven, 2006) transferring an organizations knowledge so as to enhance
6: The process whereby several individuals share and its competitive advantage. (Jasimuddin et al., 2006) 3:
combine their information to collectively create new The process through which organizations generate value
knowledge. (Newell, 2006) from their intellectual and knowledge-based assets. Most
often, generating value from such assets involves sharing
Knowledge Integration Mechanism them among employees, departments, and even with other
1: A mechanism through which the process of knowledge companies in an effort to devise best practices. KM is a
integration can be realized. The existing literature newly emerging interdisciplinary business approach that
describes sequencing, decision support systems, direction, involves utilizing people, processes, and technologies to
thinking along, group problem solving, and knowledge create, store, and transfer knowledge. (Wickramasinghe
transfer as knowledge integration mechanisms. (Berends & Sharma, 2005) 4: Management theory and practice on
et al., 2006) 2: The mechanism from where knowledge managing intellectual capital and knowledge assets, and
integration is performed (becomes visible). Examples also the processes that act upon them. In practical sense
are tinkering, enacting, storytelling, circulating, and KM is about governing the creation, dissemination, and
interplaying. (Munkvold, 2006) utilization of knowledge in organizations. (Anttiroiko,
2005b) 5: Set of activities which deals with knowledge
Knowledge Interchange Format (KIF) acquisition, selection, internalization, and usage. (Xodo,
A language designed for use in the interchange of 2005) 6: The collection of processes that manage the
knowledge among disparate computer systems (created creation, dissemination, and utilization of knowledge

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
390 K now le dge M a na ge m e nt Archit e c t ure K now le dge M a na ge m e nt M e cha nism

for learning, problem solving, and decision making. Knowledge Management Effectiveness
KM often encompasses identifying intellectual assets The measure of how well knowledge management
K within organizations. The management of knowledge is processes are implemented. (Jennex, 2006a)
regarded as a main source of competitive advantage for
organizations. KM brings together three organizational Knowledge Management Episode
resourcespeople, processes, and technologiesand A coniguration of knowledge manipulation activities,
enables the organization to use and share information more by a collection of knowledge processors, operating on
effectively. (Aurum, 2005) 7: The gamut of organizational available knowledge resources, subject to knowledge
processes, responsibilities, and systems directed toward management inluences, and yielding learning and/or
the assimilation, dissemination, harvest, and reuse of projections. (Holsapple & Joshi, 2006)
knowledge. (Kochikar & Suresh, 2005) 8: Practices
and technologies that facilitate the eficient creation Knowledge Management Infrastructure
and exchange of knowledge on an organizational level. 1: The long-term foundation on which knowledge
(Mitchell, 2005b) 9: A concept in which an enterprise management resides. It includes ive main components:
gathers, organizes, shares, and analyzes its knowledge in organization culture, organization structure, communities
terms of resources, documents, and people skills. It involves of practice, information technology infrastructure, and
capturing, warehousing, transforming, and disseminating common knowledge. (Becerra-Fernandez & Sabherwal,
data/information within an organization to leverage 2006) 2: To successfully implement knowledge management,
knowledge for competitiveness enhancement. (Rahman, it is important to understand the infrastructure required to
2005b) 10: A combination of management awareness, support the acquisition, generation, transfer, and storage
attitudes, processes, and practices for creating, acquiring, of tacit and explicit knowledge resources. Knowledge
capturing, sharing, and using knowledge to enhance management involves the coordination and integration
learning and performance in organizations. (Bellarby of multiple knowledge-based activities, structures,
& Orange, 2006) 11: A concept where an organization systems, processes, and individuals with diverse roles in
deliberately and comprehensively gathers, organizes, the organization. These elements are frequently grouped
and analyzes its knowledge, then shares it internally and into three categoriespeople, processes, and technology.
sometimes externally. (Pang, 2005a) 12: A program for (Cepeda-Carrin, 2006)
managing a irms intellectual capital by systematically
capturing, storing, sharing, and disseminating the irms Knowledge Management Initiative
explicit and tacit knowledge. (Herschel, 2005) 13: A set A systematic effort in the form of a project, for example,
of sociotechnological enablers and processes that move or that aims at generally fostering KM and speciically
modify knowledge resources and foster learning. (Handzic implementing a KM instrument in an organization. (Maier
& Lin, 2005) 14: A systematic attempt to use knowledge & Hdrich, 2006)
within an organization to improve overall performance.
(Walker, 2006) 15: An entitys systematic and deliberate Knowledge Management Instrument
efforts to expand, cultivate, and apply available knowledge A bundle of measures encompassing organization,
in ways that add value to the entity, in the sense of positive human resources, and ICT with the goal of improving
results in accomplishing its objectives or fulilling its organizational effectiveness. The support of KM
purpose. (Holsapple & Joshi, 2006) instruments distinguishes a KMS from a more traditional
ICT. (Maier & Hdrich, 2006)
Knowledge Management Architecture
The technology and procedural platforms employed by a Knowledge Management Lifecycle
irm to enable knowledge capture, sharing, retention, and The cycle of activities associated with managing
distribution. (Herschel, 2005) knowledge. (Nissen, 2005)

Knowledge Management Directory Knowledge Management Mechanism


A knowledge directory points to knowledge (in people, Organizational or structural means used to promote
documents, or databases), but does not contain it. (Galup knowledge management. They may (or may not) utilize
et al., 2005) technology, but they do involve some kind of organizational

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge M a na ge m e nt Proble m K now le dge M a na ge m e nt Syst e m (K M S) 391

arrangement or social or structural means of facilitating Knowledge Management Suite


KM. (Becerra-Fernandez & Sabherwal, 2006) One of several software packages that provide solutions
for creating centralized repositories for storing and
K
Knowledge Management Problem sharing knowledge, support content management, allow
The problem of the representation and maintenance of for communication between the members of the group,
diverse, dynamic knowledge within an organization. and assist group work. (Dotsika, 2006)
(Sterling, 2006)
Knowledge Management System (KMS)
Knowledge Management Process 1: A combination of people, processes and technology
1: Also called knowledge management activity; may be whose purpose is to perform knowledge management in
thought of as the part of a structured system that manages an organization. (J.S. Edwards, 2005) 2: A comprehensive
knowledge effectively. Encompasses four processes: ICT platform for collaboration and knowledge sharing,
creation, storage, transfer, and application. These processes with advanced knowledge services built on top that are
do not always occur in a linear sequence and are often contextualized and integrated on the basis of a shared
concurrent. (Xu & Wang, 2006) 2: The broad processes ontology, and personalized for participants networked in
that help in discovering, capturing, sharing, and applying communities. KMSs foster the implementation of KM
knowledge. (Becerra-Fernandez & Sabherwal, 2006) instruments in support of knowledge processes targeted
at increasing organizational effectiveness. (Maier &
Knowledge Management Process Capability Hdrich, 2006) 3: An integrated and integrative technology
Knowledge processes are perceived as an enabler of the architecture consisting of a variety of technologies
organization to capture, reconcile, and transfer knowledge database and database management, communication and
in an eficient manner. Knowledge processes are acquisition messaging, and browsing and retrievalthat seamlessly
oriented, conversion oriented, application oriented, and integrates knowledge sources in an organization. (Galup
security oriented. (Hsu & Mykytyn, 2006) et al., 2005) 4: The system created for users to interact
with the organizational memory system. (Jennex, 2005)
Knowledge Management Software 5: Using technology to manage knowledge systematically
Software speciically intended for knowledge management, to enable it to be gathered, organized, and shared for
such as data mining and people inder software. (J.S. the beneit of the organization. (Mitchell, 2005b) 6: An
Edwards, 2005) application that collects, stores and makes information
easily available among individuals in an organization.
Knowledge Management (KM) Spectrum (Brown, 2006) 7: Information systems designed to
A management tool for organizations that provides insight support certain KM processes like the dissemination or
into knowledge management options, and assists with the application of knowledge. (Derballa & Pousttchi, 2006b)
assessment of the many applications and technologies that 8: An information and communication technology
are available. (Mitchell, 2005b) platform combining and integrating functions for
handling knowledge. (Zboralski & Gemnden, 2006)
Knowledge Management Strategy 9: Information systems and technologies designed for
A plan for marshaling and applying knowledge-oriented knowledge management. They include both old software
resources (knowledge assets and knowledge processing tools rearranged and new ones. (Bolisani et al., 2006)
capabilities) in the interest of supporting the organizations 10: Integrates technologies and mechanisms to support
purpose. (Holsapple & Jones, 2006) KM processes. (Becerra-Fernandez & Sabherwal, 2006)
11: Typically, directive systems developed to manage
Knowledge Management Success knowledge directly or indirectly to give support for an
The improvement in organizational performance that improved quality of a decision made in workers daily
comes from using knowledge as a result of a knowledge work, and as an extension, an increased organizational
management initiative. Success can be expressed as the ability. (Ericsson & Avdic, 2005)
result of the impacts caused by the use of knowledge
and/or the effective implementation of KM processes.
(Jennex, 2006b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
392 K now le dge M a na ge m e nt Syst e m Effe c t ive ne ss K now le dge N e t w ork

Knowledge Management System Effectiveness learning services (such as application sharing or visualized
The measure of how well the components of a knowledge chat sessions). (Eppler, 2006)
K management system are implemented or perform their
intended functions. (Jennex, 2006a) Knowledge Mediation
The process of matching the knowledge of agents when they
Knowledge Management System Success communicate or cooperate in tasks. (Sterling, 2006)
The improvement in organizational performance that
comes from using knowledge as a result of a knowledge Knowledge Mining
management system. Success can be expressed as the result A practical synonym of knowledge discovery, not an
of the impacts caused by the use of the KMS or the effective extension of it. At present, the use of the term is strongly
implementation of KMS processes. (Jennex, 2006b) associated as a synonym of knowledge discovery and data
mining. Knowledge mining consists of the following four
Knowledge Management System Success Factor integrated components designed to seamlessly guide the
Anything necessary to encourage or increase the effective extraction process and contribute to providing corporations
use of a KMS. (Jennex, 2006b) with a concise understanding of their business rules:
system-wide knowledge recovery, program-level analysis,
Knowledge Manager business rule extraction, and automatic documentation.
Support structure that assigns a distinct set of knowledge- (Raisinghani, 2005)
related tasks, usually within the coordination domain, to
an individual person. (Hendriks, 2006) Knowledge Modeling
Consists of representing the knowledge in some selected
Knowledge Manipulation language or notation. (Ma, 2006)
The abuse of knowledge management; when information
is hidden, distorted, withheld for a particular purpose. Knowledge Need Identiication
(Land, Nolas, et al., 2006) The process of inding out to a satisfying degree what
knowledge an individual or collective actor needs at a
Knowledge Manipulation Activity certain moment for a particular purpose. (Kraaijenbrink
An activity that processes usable knowledge representations & Wijnhoven, 2006)
embedded within an entitys knowledge resources.
(Holsapple & Joshi, 2006) Knowledge Negotiation
Decision-making process to determine what knowledge is
Knowledge Map essential to collaborative knowledge work and learning.
1: An Intranet hypertext-clickable map to visually display Virtual learning spaces and concept maps may facilitate
the architecture of a knowledge domain. Knowledge maps this process. (Brown, 2006)
are also known as topic maps and skill maps. (Jennex,
2005) 2: Cartographic depiction of knowledge sources, Knowledge Network
structures, assets, and development or applications steps. 1: These networks are viewed like a relection of the growing
A knowledge map does not directly represent knowledge, dependence of the companies in front of external sources
but reference it for easier identiication and assessment. of knowledge. Therefore, they are not only sensitive to the
(Eppler & Burkhard, 2006) social contacts, but they are also important for the mobility
of the knowledge and, in consequence, at the space distance
Knowledge Media among the components of the network. (Ranguelov &
Information technology-based infrastructures that enable Rodrguez, 2006) 2: A self-managing community of people
knowledge codiication and transfer. They are platforms who share mutual trust and respect, and come together to
for the exchange of insights, experiences, and methods share their knowledge. (Elshaw, 2006a) 3: Knowledge is
among scientiic communities and communities of practice. information with guidance for action based upon insight
Knowledge media offer various electronic knowledge and experience. A network is the connection of two or
services, such as expert directories (who knows what), more entities so that they can share resources. A knowledge
knowledge maps (how are areas of knowledge related), network is an interconnected resource entity to improve the
notiication services (what is new), or communication and results of perception and learning, and reasoning. (Rahman,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge N ode K now le dge Pe rsona lizat ion 393

2005b) 4: Organizational members who share a strong Knowledge of Performance


interest in a particular topic and interact frequently to share A pathway to learning for a student. Having knowledge
and create new knowledge, for example, new solutions to of their performance by way of grades, comments, or
K
business problems, a new technology, or a new business. other feedback is part of the learning process. (Bagwell,
Often initiated and supported by management to build 2005)
both individual and organizational capabilities. (Hustad
& Munkvold, 2006) 5: Relationships of a large number of Knowledge Oficer
loosely coupled participants with a diffuse common domain A military oficer with varying levels of responsibilities
of knowledge and without clearly deined boundaries. depending on the ser vice and operation. Navy
(Meller-Prothmann, 2006a) 6: The conventional name for experimentation has involved knowledge oficers reporting
an information and communication system, the framework to a chief knowledge oficer with overall strategic
of which includes information interaction and mutually responsibilities for information and communications.
beneicial collaboration of corporate professional groups (Maule, 2006)
for the purpose of information and knowledge exchange.
(Molodtsov, 2005) 7: Common name for communities Knowledge Ontology
of practice, basically referring to an informal network Common deinitions established for captured knowledge,
of professionals belonging to the different domains of similar to key words, used to capture and express a common
interest for the communities of practice. (Ray, 2006) 8: context for search, retrieval, and use of knowledge.
Formally set-up mechanisms, structures, and behavioral (Jennex, 2005)
patterns that connect knowledge agents who were not
previously connected because of functional, hierarchical, Knowledge Operations Management
or legal boundaries between organizations. (Loebbecke In the context of KOM, the operations management input-
& Angehrn, 2006) 9: Inter-irms formal or informal output objects are knowledge. The input objects may be
agreements whose main goal is to share knowledge and handled in operations without fundamentally changing
exploit new ideas. Knowledge networks provide the them. This process is named knowledge logistics, and
member irms with access to complementary knowledge includes the storing and distributing of knowledge. In other
resources and extend their core capabilities. In a knowledge operation processes, the knowledge inputs are transformed
network, each node represents a unique repository of to new or different knowledge objects. This operation
knowledge, whereas the links represent economic and method is called learning. These operation methods are
strategic ties that enable knowledge lows among nodes. realized by certain human and information technological
(Scarso et al., 2006) means for speciic goals. (Wijnhoven, 2006)

Knowledge Node Knowledge Organization


The reiication of an organizational unit, either formal (e.g., Characterized by weak hierarchies, dense lateral
divisions, market sectors) or informal (e.g., interest groups, connections, low departmental walls, and openness to
communities of practice, communities of knowing), that the environment. A number of studies suggest that use of
exhibits some degree of semantic autonomy. (Cuel et al., hierarchical contacts (frequently, equated with formal
2006) structure) are not as effective for knowledge sharing as
lateral or informal contacts. (Nelson & Hsu, 2006)
Knowledge Object
The set of these are the inputs and outputs of KOM. There Knowledge Owner
are at least four types of knowledge (conscious knowledge, An entity (individual or collective) that has the capability of
automatic knowledge, shared body of knowledge, and managing its own knowledge from a syntactical, semantic,
collective knowledge), on the basis of the dimensions and technological point of view. (Cuel et al., 2006)
codiication (explicit vs. tacit) and sharedness (individual
vs. group) of knowledge. Additionally, information is a Knowledge Personalization
representation of knowledge or a representation of objects The application of speciic knowledge to the context of the
from the real world. (Wijnhoven, 2006) clients circumstances. An understanding of the clients

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
394 K now le dge Por t a l K now le dge Se a rch

needs is essential, and strong relationships between the Knowledge Repository


knowledge provider and the knowledge receiver need to A collection of meaningful data and information, including
K be developed so that knowledge is accepted and utilized. implicit and explicit data, which serves a particular
It is a process-centric view of knowledge management. community of practice. (Qayyum, 2005)
(Fink & Disterer, 2006)
Knowledge Representation
Knowledge Portal 1: Writing down, in some language or communicative
A personalized interface to online resources for knowledge medium, descriptions or pictures that correspond to
workers to integrate applications and data. It is an evolution the world or a state of the world. (Alpert, 2006) 2: A
of EIP. (de Carvalho, & Ferreira, 2006) fragmentary theory of intelligent reasoning, expressed
in terms of three components: (1) the representations
Knowledge Process fundamental conception of intelligent reasoning, (2) the
1: A service process supporting the low of knowledge set of inferences the representation sanctions, and (3)
within and between knowledge-intensive business the set of inferences it recommends. (Roldn-Garca et
processes. Knowledge processes comprise a number al., 2005)
of functions on knowledge, for example, capture,
organization, storage, packaging, search, retrieval, Knowledge Representation, Soft Programming
transportation, (re)use, revision, and feedback, and they Approach
can be supported by KMS. (Maier & Hdrich, 2006) 2: In In this case (neural networks, genetic algorithms, etc.), only
the literature, one often inds four knowledge processes: (1) the input and output values have an explicit correspondence
generating knowledge, (2) sharing knowledge, (3) storing with the entities of the domain. For the other elements
knowledge, and (4) applying knowledge. (Achterbergh, and factors, it is normally impossible to establish a local
2005b) 3: The organizational process for managing correspondence between them and the symbols of the
knowledge; speciically, it is one of the formal processes knowledge representation system, and the resolution
for knowledge capture and reuse, determining how the processes (where statistical and probabilistic methods
knowledge will be stored, and metrics for measuring the play an important role) are not grounded on any explicit
effectiveness of knowledge use. (Jennex, 2006a) 4: The notion of correspondence. (Zarri, 2006a)
process of leveraging the collective individual learning
of an organization to produce a higher-level organization- Knowledge Representation, Symbolic Approach
wide intellectual asset. This is supposed to be a continuous The classical way of representing knowledge. According
process of creating, acquiring, and transferring knowledge to the symbolic approach, there is a well-deined, one-to-
accompanied by a possible modiication of behavior to one (bijective) correspondence between all the entities
relect new knowledge and insight, and to produce a of the domain to be modeled (and their relationships),
higher-level intellectual content. (Vat, 2006a) and the symbols used in the knowledge representation
language. Moreover, the knowledge manipulation
Knowledge Processing Capability algorithms (inferences) take explicitly into account this
The set of practices and technologies of an organization correspondence. (Zarri, 2006a)
that can be used operating on knowledge assets. (Holsapple
& Jones, 2006) Knowledge Retrieval
Accessing knowledge previously stored in individual
Knowledge Protection or collective memory. Knowledge retrieval makes use
Ensures that knowledge will be transferred only to of the index deined when that knowledge was stored.
authorized individuals, groups, or organizations. (Prat, (Prat, 2006)
2006)
Knowledge Search
Knowledge Provider The intentional individual or collective process of striving
Stakeholder who supplies relevant knowledge to the to ind knowledge or sources of knowledge, regardless of
network. (Croasdell & Wang, 2006) its outcome. (Kraaijenbrink & Wijnhoven, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Se e ke r K now le dge Spira l 395

Knowledge Seeker is two way through process, structural, or social means.


A person who searches for and acquires knowledge from (Paquette, 2006a) 10: The intentional sharing of awareness
other organizational members (used interchangeably with and experiences among learners with the goal of not only
K
knowledge consumer). (Kankanhalli et al., 2006) enriching their own individual learning, but also of creating
or maintaining a common repository of reusable knowledge
Knowledge Sharing objects. (Collis & Moonen, 2005b) 11: The process through
1: A cross-functional and collaborative information- which explicit or tacit knowledge is communicated and
distribution and learning activity. Advantages of knowledge appropriated to other individuals. (Becerra-Fernandez
sharing include its commonsense comprehensibility, & Sabherwal, 2006) 12: The processes of transforming
along with a certain degree of interactivity implicit in and transferring knowledge through an organization are
any sharing. Drawbacks include the possibility that even designated by knowledge sharing. (Disterer, 2005) 13:
sharing is insuficiently interactive, and that it implies The sharing of knowledge possessed by experienced
that the existence of knowledge precedes the sharing professionals with those less experienced. This is not an
process, thereby separating knowledge management from easy task since much knowledge is of a tacit nature, which
innovation and research. (Croasdell & Wang, 2006) 2: A needs to be made explicit and communicated. Reward
process of leveraging the collective individual learning systems are often used to encourage knowledge sharing,
of an organization, such as a group of people, to produce and knowledge possessed is regarded as a competitive
a higher-level organization-wide intellectual asset. It is advantage not to be given up readily. (Fink & Disterer,
supposed to be a continuous process of creating, acquiring, 2006) 14: Voluntary activities (process) of transferring
and transferring knowledge accompanied by a possible or disseminating knowledge from one person to another
modiication of behavior to relect new knowledge and person or group in an organization. (Kankanhalli et al.,
insight, and produce a higher-level intellectual content. 2006)
(Vat, 2006a) 3: A process of mutual exchange of knowledge
between two or more parties. (Bolisani et al., 2006) 4: Knowledge Sharing and Reuse
Formal, deliberate and systematic activities of transferring Capability to share knowledge resources among members
or disseminating knowledge from one person, group, of an organization and to reuse knowledge underlying such
or organization to another. (Wright & Taylor, 2005) 5: resources. This capability can be extended to privileged
Involves giving people some of the knowledge you have. partners of the organization (customers, providers,
It may be about how to do a particular job, where to ind collaborating partners, etc.). (Dieng-Kuntz, 2006)
information, knowledge of a customers products, and
of industry developments. (Mitchell, 2005a) 6: People Knowledge Source
share their experiences, knowledge, and insights through A source of information which can be useful to obtain
explicit or implicit means. (Fong, 2006b) 7: Refers to an knowledge for practical application such as know-how,
exchange of knowledge between two individuals: one who know-what, know-where, and so forthfor example,
communicates knowledge and one who assimilates it. In lessons learned or members of the community. (Rodrguez-
knowledge sharing, the focus is on human capital and the Elias et al., 2006)
interaction of individuals. Strictly speaking, knowledge
can never be shared. Because it exists in a context, the Knowledge Space
receiver interprets it in light of his or her own background. The space deined by the neural network weights. (Alippi
(Jacobson, 2006) 8: The exchange of knowledge among & Vanini, 2005)
individuals within and among teams, organizational units,
and organizations. This exchange may be focused or Knowledge Spiral
unfocused, but it usually does not have a clear objective. Developed by Nonaka, refers to the process of transforming
(King, 2006b) 9: The intentional (and often unintentional) the form of knowledge, and thus increasing the extant
low of knowledge between individuals, groups, and knowledge base as well as the amount and utilization
organizations. The goal is to provide valuable internal of the knowledge within the organization. The key
knowledge in exchange for external knowledge, which transformations effected by the knowledge spiral include
is often combined via organizational learning to create socialization (tacit-tacit knowledge transfer), combination
new and meaningful knowledge. Sharing implies the low (explicit-explicit knowledge transfer), internalization

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
396 K now le dge St a ke holde r K now le dge Tra nsfor m at ion

(explicit-tacit knowledge transfer), and externalization the organization, typically by using advanced information
(tacit-explicit knowledge transfer). (Wickramasinghe, technologies. (Vat, 2006a)
K 2006)
Knowledge Taxonomy
Knowledge Stakeholder The hierarchical organization of knowledge categories
Someone with critical knowledge speciic to current within a knowledge management system. (Jennex,
problems, opportunities, and prior consulting engagements, 2005)
and who can act as a human directory resource. (Croasdell
& Wang, 2006) Knowledge Topic
Deinition of a particular area of knowledge useful for a
Knowledge Stance person or the members of a community. (Rodrguez-Elias
A recurring situation in knowledge work deined by et al., 2006)
a certain occasion, a context, and a mode resulting in
knowledge-oriented actions. It describes a situation in Knowledge Trail
which an employee can, should, or must switch from a Provides information on who did what, when, how, and
business-oriented function to a knowledge-oriented action. why. (Dustdar, 2005)
(Hdrich & Maier, 2006)
Knowledge Transaction
Knowledge Storage An economic exchange whose object is knowledge. (Scarso
Retaining knowledge in individual or collective memory. et al., 2006)
When knowledge is stored, it is indexed in memory. (Prat,
2006) Knowledge Transfer
1: Knowledge is transferred from the sender(s) (person,
Knowledge Structure group, team, or organization) to the recipient(s) (person,
A parameterized concept that could help explain why a group, team, or organization). (Chen, Duan, et al.,
speciic knowledge discovery technique performs best 2006) 2: Refers to an exchange of knowledge in which
for a particular knowledge discovery task. The concept the focus is on structural capital (knowledge that has
is analogous to the form and meaning (i.e., underlying been built into processes, products, or services) and on
structure) of the knowledge to be discovered in a database, the transformation of individual knowledge to group
and deined by a set of parameters P. (Wilson et al., knowledge or organizational knowledge. (Jacobson, 2006)
2006a) 3: The focused, objective-seeking communication of
knowledge between individuals, groups, or organizations
Knowledge Substitution such that the recipient of knowledge: (1) has a cognitive
The degree to which one kind of knowledge (e.g., specialist understanding, (2) has the ability to apply the knowledge,
design knowledge) can be substituted for another (e.g., or (3) applies the knowledge. (King, 2006a) 4: The process
generalist technology development knowledge) without concerning the transfer of knowledge from a source to
affecting organizational performance. (Nissen & Levitt, a recipient or user. It is the most studied process in the
2006) KM literature. (Bolisani et al., 2006) 5: The sharing of
knowledge within or between individuals, groups, and
Knowledge Supply Network organizations. (Prat, 2006)
An integrated set of manufacturing and distribution
competence, engineering and technology deployment Knowledge Transformation
competence, and marketing and customer service The process in which the learner behaves as a passive
competence that work together to market, design, and information receiver at the beginning of a course, but
deliver end products and services to markets. (Abraham gradually plays an active role in learning and constructing
& Leon, 2006) knowledge midway through the course. (Bodomo,
2005a)
Knowledge Synthesis
The broad process of creating, locating, organizing,
transferring, and using the information and expertise within

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge U t ilizat ion K now le dge -Ba se d Orga nizat ion 397

Knowledge Utilization require advanced ICT support. (Maier & Hdrich, 2006)
1: The application of knowledge to business processes. 3: Refers to work conducted by knowledge workersthat
Knowledge has no value per se, but draws its value from is, work that comprises to a large extent the tasks of
K
concrete application to business processes. (Prat, 2006) retrieving, evaluating, integrating, and creating knowledge.
2: The individual or collective process aimed at using (Derballa & Pousttchi, 2006b) 4: The ability to create an
knowledge by one or more of the subprocesses of direction, understanding of nature, organizations, and processes,
routinization, diffusion, application, or exploitation. and to apply this understanding as a means of generating
(Kraaijenbrink & Wijnhoven, 2006) wealth in the organization. (Heavin & Neville, 2006) 5:
Work accomplished through the manipulation of data and
Knowledge Viewing symbols. (Hantula & DeRosa, 2005)
Individually or collectively monitoring the existing
external knowledge base to detect relevant changes. Knowledge Worker
(Kraaijenbrink & Wijnhoven, 2006) 1: Anyone whose work involves tasks that require the
processing of information. These tasks include collecting,
Knowledge Vision analyzing, synthesizing, structuring, storing, retrieving,
A root deinition of what knowledge will give the and using information. (Lindsey, 2006) 2: People who
organization a competitive edge in the knowledge-based look to different repositories or wealth of knowledge to
economy. (Vat, 2006a) ind new solutions to challenges faced in a dynamic and
changing work environment. (Ray, 2006)
Knowledge Visualization
1: A visual (or other sense-based) representation of Knowledge-Based Economy
knowledge; a portrayal via graphical or other sensory 1: A form of modern economy referring to a speciic
means of knowledge, say, of a particular domain, making structural transformation, where the fast creation of new
that knowledge explicit, accessible, viewable, scrutable, knowledge and the improvement of access to various
and shareable. (Alpert, 2006) 2: Designates all graphic knowledge bases increasingly constitute the main resource
means that can be used to develop or convey insights, for greater eficiency, novelty, and competitiveness.
experiences, methods, or skills. (Eppler & Burkhard, (Chochliouros & Spiliopoulou-Chochliourou, 2006) 2:
2006) Economy that thrives because people have the necessary
knowledge and skills. (Gnaniah et al., 2005b)
Knowledge Warrior
A facilitator of information with responsibilities for shaping Knowledge-Based Enterprise
knowledge in response to information requirements to An enterprise that derives the most value from intellectual
speed decision times. (Maule, 2006) rather than physical assets. A knowledge-based enterprise
is a irm that is fully embracing knowledge management
Knowledge Web and committed to fostering continuous learning.
The use of electronic linkages among different teaching and (Wickramasinghe & Sharma, 2005)
learning communities to facilitate information acquisition
and knowledge building. (Neville & Powell, 2005) Knowledge-Based Future
Essentially this relects the new economy whereby
Knowledge Work knowledge sharing and knowledge management are critical
1: Conceptual and analytical practices that require domain- to an organizations success and the achievement of a
speciic knowledge and can be conducted from a variety of sustainable competitive advantage. Knowledge sharing
locations and, thus, are not tied to processes or technologies is also important for the community as a whole. (Pease
of speciic workplace locations. (P.M. Leonardi, 2005) 2: et al., 2005)
Creative work solving unstructured problems that can be
characterized by a high degree of variety and exceptions, Knowledge-Based Organization
strong communication needs, weakly structured processes, An organization that competes on the basis of its differential
teamwork in the form of project teams, networks and knowledge. (Nissen, 2005)
communities, and a high level of skill and expertise that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
398 K now le dge -Ba se d Pe rsona lizat ion K now le dge m e dia r y

Knowledge-Based Personalization interactions between individuals, and is formed when


Personalization that is based on: (1) explicit representation the individuals get to know one another well. (Smith,
K of knowledge about the user and the domain of operation, 2006b)
and (2) automatic inference from that knowledge. (Babaian,
2005) Knowledge-Flow Theory
An emerging basis of theory describing the dynamics
Knowledge-Based Perspective of how knowledge moves between various people,
A special form of resource-based perspective stressing organizations, locations, and points in time. (Nissen &
the signiicance of knowledge as a scarce resource and Levitt, 2006)
organizational differentiator. (Loebbecke & Angehrn,
2006) Knowledge-Free Image Processing
A general method of dealing with an image that does
Knowledge-Based Society not require speciic information or data. The image is
The United Nations Economic and Social Council simply iltered, typically uniformly, and so transformed or
decision 1999/281 deines the function of information processed without the need for knowledge-based methods.
technology in the context of a world economy based in (George, 2005b)
knowledge. This decision determines the importance of
information technology in conjunction with knowledge to KnowledgeFriendly Organization Structure
create a society in which these parameters will contribute An organization structure that, in the combination
to disseminate knowledge, create participation among of its basic structure and support structure, provides
countries and therefore among individuals, and generate an appropriate infrastructure for knowledge to gain
economic growth. All the latter will take place within a organizational value. (Hendriks, 2006)
societal framework that helps to preserve and increase the
social and economic well-being of the inhabitants of the Knowledge-Intensive Business Service (KIBS)
world. (Ochoa-Morales, 2005) A business service irm that provides knowledge-intensive,
technology-based services with a high level of supplier-
Knowledge-Based Support Environment user interaction, generally produced by irms employing
(KBSE) a highly educated labor force. (Scarso et al., 2006)
A dynamic repository of existing learning and processing
systems such as discussion forums, virtual libraries, and Knowledge-Related Antecedent Factor
research to allow academics and students to retrieve An arduous relationship, causal ambiguity, shared
knowledge (either tacit or explicit) based on individual understanding, knowledge observability, and absorptive
proiles. (Neville & Powell, 2005) capacity are important knowledge-related antecedent
factors for effective knowledge transfer. (King, 2006b)
Knowledge-Based System
1: A hybrid extended technique between collaborative- Knowledgeable Navigational Assistance System
iltering and content-based systems. It builds knowledge A system that helps a user carry out navigational tasks
about users by linking their information with knowledge in a virtual environment by using data-mining models
about products. (Gil & Garci a, 2006) 2: An information derived from analyzing the navigational data of previous
system that captures and delivers problem-pertinent users. (Sadeghian et al., 2006)
knowledge to users. (Forgionne, 2005)
Knowledgemediary
Knowledge-Based Trust An online company providing services to support
1: Trust that relies on information which contributes to knowledge transactions. Such companies are able to
behavioral predictability of the involved parties. (Wang & solve knowledge-intensive problems, to act as broker
Gwebu, 2006) 2: The second stage of trust is grounded on between knowledge sources and users, and to design and
the others predictability and emerges as team members use information and communication technologies for
become more familiar with each other. (Lettl et al., 2006) knowledge management aims. (Scarso et al., 2006)
3: Trust that emerges on the basis of recurring social

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Kohone n Fe at ure M a p Kullba ck -Le ible r Dive rge nc e 399

Kohonen Feature Map Kullback-Leibler Divergence


A feedforward/feedback type neural net. Built of an input The Kullback-Leibler divergence of a parametric model p,
layer (i.e., the neuron of one layer is connected with each with respect to an unknown density f is deined by:
K
neuron of another layer), called feature map. The feature
map can be one or two dimensional, and each of its neurons f (x i )
is connected to all other neurons on the map. It is mainly K L (f , p )= i f (xi )log
used for classiication. (R., 2005) p (x i )

Kolmogorov Complexity of a String where the sufix indicates the values of the parameters,
The length of shortest program that can generate the given which minimizes the distance with respect to f. (Giudici,
string. (T.Y. Lin, 2005) 2005)

KOM Goals
Integration, adaptation, goals attainment, and pattern
maintenance. (Wijnhoven, 2006)

KOM Means
Information technological and human means, which
support knowledge logistic processes (acquisition, storage,
maintenance, search and retrieval, and dissemination).
(Wijnhoven, 2006)

Kompong Speu
A province of Cambodia; its capital is Kompong Speu.
(Hutchinson, 2005)

KPI: See Key Performance Indicator.

Kriging
1: A technique that can be used to develop contour maps
(e.g., maps that show lines of equal value such as DWI
rates) from a limited number of points or areas (which
can be given a value at the centroid). (Lipton et al.,
2005) 2: A geostatistical gridding method that produces
visually appealing maps from irregularly spaced data.
The estimates of kriging are unbiased and have minimum
variance. The method is based on the assumption of spatial
autocorrelation of data, and the autocorrelation structure
(spatial distribution of the data) is addressed through
variogram modeling. The underlying assumption of the
variogram is that two observations close together are more
similar than those further apart. (Ali et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
400 L = P + Q Language of Temporal Ordering Speciications (LOTOS)

L
L=P+Q LAD: See Logical Analysis of Data.
AL is based on the radical concept that signiicant learning
(L) only results when based on routine knowledge in Laity
use (P) and questioning insight (Q) brought together The condition or state of a layman, the body of the people
through a process of personal and communal relection that not in orders; as opposed to the clergy. (Rogers & Howell,
integrates research on what is best practice or obscure with 2005)
practical action to resolve a problem. (Smith, 2006a)
LAN: See Local Area Network.
LAAS: See Local Area Augmentation System.
Land Information System (LIS)
Label A GIS specially designed for use with land information.
A short, ixed-length, physically contiguous, locally Land rights, ownership, boundaries, utility, land cover,
signiicant identiier used to identify a stream. (Gutirrez and zoning data are common layers and attributes in an
& Ting, 2005) LIS. (Velibeyoglu, 2005)

Label Swapping Landed Cost


A forwarding paradigm allowing streamlined forwarding The cost of an order including the price of goods, shipping
of data by using labels to identify streams of data to be charges, insurance, duties/customs, value added tax (VAT),
forwarded. (Gutirrez & Ting, 2005) and any import or export fees. (D. Brandon, Jr., 2005b)

Labeled Data Landmark Knowledge


A sequence of training instances with corresponding class A type of spatial knowledge dealing with information about
labels, where the class label is the value to be predicted visual features of landmarks. (Sadeghian et al., 2006)
by the hypothesis. (Scheffer, 2005)
Language
Laboratory for Innovative Technology and A means of verbal and non-verbal communication of
Engineering Education (LITEE) thoughts and ways of speaking. (Sharma & Mishra,
National Science Foundation-sponsored research group 2005)
at Auburn University that develops award-winning
multimedia instructional materials that bring theory, Language Divide
practice, and design together for the purpose of bringing The inability to understand, communicate, receive, or
real-world issues into engineering and business classrooms. transfer information in a recognized language of the
(Bradley et al., 2005) persons state or community. (Arthur-Gray & Campbell,
2005)
LabVIEW
The graphical development environment for creating Language of Temporal Ordering Speciications
lexible and scalable test, measurement, and control (LOTOS)
applications. With LabVIEW, users can interface with real- A formal speciication language for specifying concurrent
world signals, analyze data for meaningful information, and distributed systems. LOTOS syntax and semantics
and share results and applications. (Chu & Lam, 2006) is deined by ISO standard 8807:1989. LOTOS has

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
La ngua ge s for Spe c ia l Purpose s (LSP) La ye r 401

been used, for example, to specify the Open Systems connectiongenerally made of a pair of copper wires
Interconnection (OSI) architecture (ISO 7498). (Campos between the subscribers location and the nearest telephone
& Harrison, 2006) exchange. The last mile, which is also called line or
L
subscriber line, coincides with the most restrictive
Languages for Special Purposes (LSP) deinition of local loop. (Arbore, 2005)
The languages used for particular and restricted types of
communication (e.g., for medical reports, scientiic writing, Last-Mile Capabilities
air-trafic control). They are semi-autonomous, complex A new category of e-fulillment capabilities which involves
semiotic systems based on and derived from general all aspects of delivering to customers workplaces or
language; their use presupposes special education and is homes. Quality, cost-effectiveness, and lexibility of such
restricted to communication among specialists in the same deliveries is critical to the success of online retailers but
or closely related ield. (Ahmad & Al-Sayed, 2006) includes a host of problems that must be overcome. Issues
such as payments, security, extended delivery times,
Laptop returns, customer presence, and handling of different-
A portable personal computer small enough to use on temperature and perishable deliveries have catalyzed the
your lap with a QWERTY keyboard and display screen. development of new capabilities such as locked boxes,
It usually has an A4-sized footprint in a clamshell wireless payment devices, and innovative courier networks.
coniguration and may incorporate a variety of peripheral (Alexander & Burn, 2006)
devices (e.g., trackball, CD-ROM, wireless network card,
etc.). (Garrett, 2006b) LATA: See Local Access Transport Area.

Laptop University Late Majority Adopter


A university in which all students and faculty are required A member of a group within a social structure that
to have a laptop computer, and in which much of the constitutes people who have delayed the adoption of ideas,
instruction is carried out using computer technologies. innovations, or technology. (Weber & Lim, 2005)
(Reynolds, 2005)
Latency of Feedback/Feedback Latency
Large Dataset The amount of time elapsed between a learners response
A dataset that does not it in the main memory of a machine, to a prompt or question and the instructors or systems
so it is stored on a disk and is read into the memory based evaluative response to the student. (Hantula, 2005)
on need. Note that disk access is more time consuming
than memory access. (Murthy & Diday, 2005) Latent Semantic Indexing
A dimension-reduction technique used in information
Laser Disc (Videodisc) retrieval. During the analysis of natural-language text,
An analog optical storage device irst commercialized each word is usually used for the semantic representation.
as a distribution medium for motion pictures in a 1980 As a result, a large number of words describe a text.
joint venture, DiscoVision Associates, between IBM and Latent semantic indexing combines many features and
MCA. Laser discs provided the foundational technologies inds a smaller set of dimensions for the representation
for Philips and Sonys CD formats that have evolved that describes approximately the same content. (Mandl,
into CD-ROMs, CD-Rs, CD-RWs, and DVDs (digital 2006)
videodiscs). (Reisman, 2006)
LAV: See Local-As-View.
Last Mile
Informally refers to the part of the Public Switched Layer
Telephone Network (PSTN) that extends from the A set of practices that characterizes activities of a
Customer Premise Equipment (CPE) to the irst networks community. These practices are not homogenous, although
switching center (the central ofice, also called local or they share common features. (Crdoba & Robson,
switching exchange). In plain English, it is the physical 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
402 La ye r 4 Sw it ch Le a n M e dia

Layer 4 Switch Main research areas are traits of the leading individual,
A switch that can retrieve from the network packets context factors of the situation where leadership takes
L information about the port number they are using, and thus place, and different inluence tactics employed by the
the application that generated them. (Danalis, 2005) leading person. (von Wartburg & Teichert) 2: The ability
to organize and motivate others, overcome problems,
Layered Biometric System and initiate and accept responsibility. (Petska & Berge,
Multi-layered, layered, and multimodal biometric systems 2005) 3: The dynamic phenomenon in group life where
combine more than one physiological or behavioral an individual or individuals consciously or unconsciously
characteristic for veriication or identiication. By promoting inluence and direct the activities and interactions of
multi-layered identification and authenticationthat that group. Leadership may be formally constructed
means parallel use of strong passwords, smart tokens, and and embodied within an organizational role, or emerge
biometricsmany signiicant security problems can be informally from the interactions of the group by tacit
eliminated. The combination of multiple biometric methods processes. (Cargill, 2006a)
such as voice and ingerprints, in conjunction with, for
example, digital certiicates and smart cards, offer the Leadership Behavior
companies an ideal solution to provide a very high level of The various actions that leaders contribute to group and
protection for their sensitive information. (Mezgr, 2005) team life that may be generally categorized as task related
or relationship oriented. Task behaviors aim to structure,
Layered Security Approach direct, and progress the work of the group. Relationship
The use of multiple, overlapping security technologies behaviors aim to address the way the group members
and applications to protect an organizations information feel about and interact with each other, with the leader,
assets. (Wilson et al., 2006b) and with the task they are tackling. The holding and
communicating of a vision for the group is also generally
LBS: See Location-Based Service. acknowledged as a leadership behavior that is both task
related and relationship oriented. (Cargill, 2006a)
LCMS: See Learning Content Management System.
Leadership Style
LCSS: See Longest Common Subsequence Similarity. The manner in which leaders carry out their responsibilities
and the way they interact with others deines their style
LDAP: See Lightweight Directory Access Protocol. of leadership. (Petska & Berge, 2005)

LDC: See Lesser Developed Country. Leading


Guiding the work efforts of other people in directions
LDT: appropriate to action plans. Leading involves building
Location determination technology. (Fraunholz et al., commitment and encouraging work efforts that support
2005) goal attainment. (Cragg & Suraweera, 2005)

LDTV: See Low-Deinition Television. Leaf


A node not further splitthe terminal groupingin a
Leader-Led E-Learning classiication or decision tree. (Beynon, 2005b)
Electronic learning that involves an instructor and where
students can access real-time materials (synchronous) via Lean Media
videoconferencing or audio or text messaging, or they can Media with reduced capacity to carry information, with
access delayed materials (asynchronous). (Cirrincione, face-to-face communication being the standard by which
2005) others are judged. Asynchronous text communication for
example is considered to be lean media, while full motion
Leadership video/audio is considered to be rich. (Newberry, 2005)
1: Denotes irst a constellation of a person who is called
a leader and other individuals who are called followers.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a ne r-Le a r ne r I nt e ra c t ion Le a r ne r-Cont e nt I nt e ra c ti on 403

Leaner-Learner Interaction Learner Model


Interaction between a learner and other learners in a one-to- A model representing static beliefs about the learner and,
one, one-to-many, or many-to-many setting. (Kung-Ming in some cases, able to simulate the learners reasoning.
L
& Khoon-Seng 2005) (Esmahi, 2005)

Leapfrogging Learner Segment


The notion that access to ICTs will enable people to skip Onen of the different populations of students that utilize
over stages of technological and economic development. post-secondary education and training opportunities for
(Pryor, 2005) their own unique needs. (Langer, 2005)

Learn to Learn Learner (Supervised) Learning Algorithm


In this context, learning to manage (select, extract, classify) A general inductive process that automatically generates
the great amount of information existing in actual society, in a classiier from a training set of preclassiied documents.
order to identify real and signiicant knowledge. (Pedreira (Sebastiani, 2005)
et al., 2005)
Learner-Centered
Learnability 1: Based on adult learning theories and new paradigms of
1: The degree to which a system can transfer knowledge learning that focus on the learners taking responsibility for
in a natural way. Natural in this context is the way their learning and assuming control over how they learn,
the user is used to acquire the knowledge. (Athanasis & where they learn, and when they learn. (Stavredes, 2005a)
Andreas, 2005) 2: How easy it is to learn to use a system. 2: Education that focuses on students and their learning,
(Yong, 2005) 3: The degree to which a system can transfer rather than on teachers and their methods. There has
knowledge in a natural way. Natural in this context is the been a signiicant paradigm shift toward learner-centered
way the user is used to acquire the knowledge. (Karoulis education in the last decade. (Lindsay, Williams, et al.,
& Pombortsis, 2005a) 2005)

Learner Learner-Centered Education


Given a training set of (representative) examples Refers to a philosophy to education and administration
(accompanied usually by their desired classes/concepts), that focuses upon the student as its priority; all policy
a learner induces concept description (model, knowledge making, instructional, and support activities are developed
base) for a given task that then is usually utilized in the and delivered with an emphasis on student preferences,
corresponding decision-supporting system. (Bruha, learning styles, and resources. (McCracken, 2005)
2005)
Learner-Centered Paradigm
Learner Characteristic The viewpoint or learning philosophy that takes the
Not all students approach learning in the same way. The perspective of the learner when considering the design,
degree of novelty or familiarity of a subject to a learner delivery, or assessment of learning. (Bonk et al., 2005)
inluences the selection of the manner of representing
the information from kinesthetic, to aural and visual, or Learner-Centered Psychological Principle
abstract. (Marcinkiewicz & McLean, 2005b) One of 14 principles developed by the American
Psychological Association based on decades of research
Learner Control on human learning, development, and motivation that
A learning environment where the learner has control of focus on ways to help learners learn and are intended to
the pace and direction of the learning situation. (Pelton provide vital information for the redesign of schooling.
& Pelton, 2005) (Bonk et al., 2005)

Learner Differences Learner-Content Interaction


The differences that exist in the manner in which an 1: Learners talk to themselves about the information or
individual acquires information. (Alkhalifa, 2006) ideas contained in the material. (Kung-Ming & Khoon-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
404 Le a r ne r-I nst ruc t or I nt e ra c t ion Le a r ning by Doing

Seng 2005) 2: Interactions that occur between the learner learner submissions, feedback, and assessment. (Collis
and the content of the course or activity that they are & Moonen, 2005a)
L pursuing (i.e., textbooks, Web pages, database activities,
etc.). (Day, 2005) Learning Algorithm
The method used to change the weights so that the error
Learner-Instructor Interaction is minimized. Training data is repeatedly presented to
1: Interaction between the learner(s) with the instructor. the MFNN through the input layer, the output of the
(Kung-Ming & Khoon-Seng 2005) 2: Interaction between MFNN is calculated and compared to the desired output.
the various members of the learning community and their Error information is used to determine which weights
relation to the course or activity in which each is involved need to be modiied, and by how much. There are several
(i.e., cohorts, learning teams, collaborative learning parameters involved in the learning algorithm including
community). (Day, 2005) learning rate, momentum factor, initial weights, and so
forth. (Smith, 2005)
Learner-Medium Interaction
Interaction between learners, teachers, and support Learning Allostatic Load
personnel in relation to the method of communications that The accumulation of perceptions and decisions that develop
is being utilized for the course or activity (i.e., Internet, into self-esteem and protective strategies that may or may
intranet, server system, video, or satellite communications). not be beneicial to future learning events. (Molinari et
(Day, 2005) al., 2005c)

Learner-Resource Interaction Learning Allostatic Model


The interaction that involves lear ners actively A holistic framework suggesting the simultaneous study
communicating with textbooks, hard-copy handouts, of biophysical and educational variables. (Molinari et
lecture notes, and with ICT-based current and remote al., 2005b)
resources such as online lecture notes and outlines,
CD-ROMs, glossaries, calendars of activities, progress Learning Allostatis
reports, quizzes, and links to experts and more resources. The constant changes an individual makes to maintain
(Bodomo, 2005b) homeostatis. The actions are in response to learning
and life events that impact knowledge and performance.
Learner-Teacher Interaction (Molinari et al., 2005c)
Interaction between the learners and their instructor or
facilitator in which the process of learning occurs within the Learning Allostatis Model
course or activity (lectures online, facilitated newsgroups, A whole-person model describing learner characteristics
etc.). (Day, 2005) and relationships to stress and learning. (Molinari et al.,
2005c)
Learning
1: A process of understanding, assimilating, and absorbing Learning at a Distance
knowledge. (Pyke, 2006) 2: Cognitive processing and Refers to all learning activities that are carried out where
integration of new educational content, if possible induced and when the learners are separated from the learning
through exercises or games. (Utsi & Lowyck, 2005) 3: organization and the teachers for much of the learning
Educational process for self-education or instruction process. (Naidu, 2005b)
using the study or the experience. (Andrade, Ares, Garcia,
Rodriguez, Seoane, et al., 2006) Learning by Doing
1: A kind of learning by going through a process of
Learning Activity creativity by the students. (Sala, 2005b) 2: An approach in
1: One of the activities engaged in by the learner for the learning where it is possible to gain the ability to navigate
purpose of acquiring certain skills, concepts, or knowledge, a challenge or problem, or even ones life, by implementing
whether guided by an instructor or not. (Sala, 2005a) 2: the learners own powerful natural process of exploration
In a course content, learning-oriented tasks involving and discovery. (Sala, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning Ce nt e r Le a r ning Flow 405

Learning Center (Kayama & Okamoto, 2005) 5: Focuses on creating,


A location where students can come for individualized reusing, locating, sharing, or improving learning content.
instruction. (Crichton, 2005) (Diamadis & Polyzos, 2005)
L
Learning Community/Community of Learners Learning Contract
1: All participants in a learning process (students, An agreement negotiated between a learner and a teacher
teachers, tutors, and experts) have valuable expertise and stating that certain activities will be undertaken to achieve
skills, which beneit collective efforts. (Muukkonen et particular learning goals and that speciic evidence will
al., 2005) 2: A collaborative learning community refers be produced to demonstrate that the goals have been
to a learning culture in which students are involved in a reached. This agreement is a mechanism for reassuring
collective effort of understanding with an emphasis on both parties involved about whether a piece of work will
diversity of expertise, shared objectives, learning how meet the requirements of a certain course or module.
and why to learn, and sharing what is learned, thereby It is based on the idea that learners are active partners
advancing the students individual knowledge and sharing in all of the learning and teaching process. (Correia &
the communitys knowledge. (Kwok Lai-yin & Tan Yew- Sarmento, 2005)
Gee, 2005) 3: A community that is established or which
comes together with the purpose of studying or learning. Learning Culture
Often created to support a course of study in real life, A particular way of considering the learning process,
or can emerge spontaneously when common purpose how it occurs, in what conditions, and so forth. It relies
or interest is identiied. (Fleming, 2005c) 4: A group on an explicit or an implicit theory that provides more
that is characterized by its members collective capacity or less accurate representations of the learning process.
and willingness to engage in similar learning activities. (Blandin, 2005)
(Teghe & Knight, 2005) 5: A purposeful restructuring
of curriculum to link together courses or coursework Learning Design
so that students ind greater coherence in what they are 1: The description of a program of activities, roles,
learning and greater interaction with faculty and peers. and learning objectives. (Sicilia & Snchez-Alonso,
(Paoletti, 2005) 2006) 2: Explicit design that more focused than simply
problem-based learning, collaborative learning, and
Learning Content Management System (LCMS) social constructivism. The learning design is the schema
1: A system providing a set of tools for publishing, utilized to design the teaching and learning interactions.
communicating, and tracking student activity. (Dixon et (Keppell et al., 2005)
al., 2005) 2: An environment where developers can create,
store, reuse, manage, and deliver learning content from Learning Effectiveness
a central object repository, such as a database. (Brown, 1: The degree to which learning outcomes have been
2006) 3: Designed for the design, delivery, and management achieved or learning is effective. (Blicker, 2005) 2: The
of educational materials and e-learning courses. These quality principle that assures that learning outcomes
systems usually include authoring tools for producing online are at least equivalent to learning outcomes in other
learning objects, a repository for storing learning objects, delivery modes. (Moore et al., 2005)
a framework and structure for content aggregation, and
a course delivery module with administrative functions. Learning Environment
(Ng, 2006) 4: A system used to create, store, assemble, 1: A term used to describe the interactions that occur among
and deliver personalized content in the form of learning individuals and groups, and the setting within which they
objects in an e-learning environment. LCMS includes and operate. (Clayton, 2006b) 2: Overall university setting
combines the functions of a content repository/database or in which many educational and administrative processes
CMS (content management system) and an LMS. Although interact. (Fernando, 2005)
the LMS has functions to manage the learning courses,
the LCMS has functions to manage the content and permit Learning Flow
locating stored content, authoring new content, attaching Process by which knowledge is transferred and diffused
metadata to content, and managing versions of content. between the different levels of the organization. It describes

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
406 Le a r ning Group Le a r ning M a na ge m e nt Syst e m (LM S)

the new knowledge production process (feedforward) and to manage their training needs, from planning through
the use of the knowledge that has already been generated registration and completion. (Waddington et al., 2005)
L (feedback). (Real et al., 2006) 6: An e-learning infrastructure with real-time databases
that deal with user (learner, coach, faculty, and so on)
Learning Group information, including the users learning competencies,
A group of people, often with a luid hierarchy and shifting learning objects for each type of learning style and form,
roles, whose emphasis is learning before eficiency. The and learning activity and performance log tracking. An
focus is on the process (the product being secondary), extended LMS may also support authoring, performance
with the idea that the best learning outcomes will occur assessment, classroom management, competency
when participants take on challenges and unfamiliar tasks management, knowledge management, certiication and
in order to gain competency in new areas. (Graham & compliance training, personalization, mentoring and
Misanchuk, 2005) coaching, and communication. (Kayama & Okamoto,
2005) 7: Includes all the functions for student and course
Learning Infrastructure management, learning assessment, and tracking and
1: The set of physical and digital buildings, applications, reporting on student progress and activity. (Diamadis &
services, and people that provide and support the Polyzos, 2005) 8: Software designed to help administer the
environments for learning. (Boettcher, 2005a) 2: The set teaching/training environment. The LMS registers users,
of physical and digital buildings, applications, services, tracks courses, records data from learners, and provides
and people that provide and support the environments for reports to the instructor. The focus is on managing courses,
learning. (Boettcher, 2005b) not on content creation. (Du Mont, 2005) 9: A collection
of server-side Web tools that help an instructor to create a
Learning Management System (LMS) course Web site. (Bagwell, 2005) 10: A broad term used
1: A Web-based program that manages the administration to describe a wide range of systems that organize and
of training. Typically includes functionality for course provide access to e-learning environments for students,
catalogs, housing courses, launching courses, registering tutors, and administrators. (Clayton, 2006b) 11: Enterprise
students, tracking student progress, and conducting software used to manage learning activities through the
assessments. (Kapp, 2005) 2: A software application ability to catalog, register, deliver, and track learners
used to plan, implement, and assess learning processes. and learning. (Snchez-Segura et al., 2005) 12: Software
Typically, an LMS provides an instructor with a way to that automates the administration of training events by
create and deliver content, monitor student communication registering users, tracking courses, recording the learners
and participation, and assess student performance; it data, and providing reports to management. (Brown,
also provides students with the ability to use interactive 2006) 13: Designed for the delivery and management of
features such as threaded discussions, videoconferencing, e-learning courses. Generally includes a learner interface
and discussion forums. (Chapman, 2005a) 3: A software and some administrative functions such as course setup,
that automates the administration of training events. The learner registration, course assignment, and reporting of
LMS registers users, tracks courses in a catalog, and learners progress. (Ng, 2006) 14: Software environment
records data from learners; it also provides reports to within which students access learning objects provided
management. The database capabilities of the LMS extend by an instructor. An LMS-based course is a framework
to additional functions such as company management, and structure that contains learning objects and directions
online assessments, personalization, and other resources. to students from the instructor regarding how and when
Learning management systems administer and track both they should be accessed. With LMSs, instructors focus
online and classroom-based learning events, as well as their energy and expertise on the creation or utilization of
other training processes (these would need to be manually learning objects and the day-to-day management of their
entered into the system for tracking purposes). (Galitsky, courses. (Reisman, 2006) 15: Refers to an environment
2005b) 4: A system that automates, totally or partially, whose primary focus is the management of the learning
the creation, management, and execution of learning process (i.e., registration and tracking of students,
activities and their related processes of design, auditing, content creation and delivery capability, skill assessment
and assessment. (Sicilia & Snchez-Alonso, 2006) 5: A and development planning, organizational resource
Web-based application designed to enable employees management). (Esmahi, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning M e t a phor Le a r ning Obje c t (LO) 407

Learning Metaphor Learning Network Member


An image representing the way the brain is supposed to One of the primary clients of learning networks; the
process information to produce knowledge. This image term refers to all managers and practitioners who are in
L
is built according to the implicit theory in use or to the the network in order to acquire new knowledge. They are
explicit theory espoused. (Blandin, 2005) supposed to act as company representatives rather than as
individuals, although during the course of shared learning,
Learning Network they have to make decisions on their own. In some cases,
1: An informal association of members of different especially when their organization is a large company, they
organizations for the purpose of knowledge exchange. also assume the role of the liaison oficers in the sense of
Learning networks are characterized by voluntary connecting various individuals and departments within
membership, intrinsic motivation to participate, and a the organization with discussions and learning within the
focus on collaborative rather than competitive thinking. network. (Tsekouras & Roussos, 2006)
(Angehrn & Gibbert, 2005) 2: People within a learning
network use computer mediated communication to work Learning Network Moderator
and learn together, at the time, place, and pace that best Also called network coordinator or network broker, this
suits them and is appropriate to achieving pre-determined is the managing director of the network. The network
learning outcomes and targets. (Wheeler & Lewis- moderator deals with the strategic decisions of the network
Fitzgerald, 2005) 3: An inter-organizational network (e.g., learning focus, selection criteria for accepting
where structures have been established with the primary members, etc.) and plays a bridging role between the
purpose of increasing the participants knowledge. These network members and the network board. The network
networks involve representatives of different organizations, moderator is the person who monitors the activities of
mainly private irms. They are formally established with the network facilitators, and engages in nurturing and
clear and deined boundaries for participation, and have disciplinary behavior. He or she is also responsible for
a explicit structure for operation with regular processes. maintaining a database of speakers and facilitators for
The outcomes of the network can be fully assessed and the network, and promoting and publishing the activities
evaluated; these results feed back to the network, giving of the network. (Tsekouras & Roussos, 2006)
it the opportunity to improvise. A typical structure for a
learning network includes the network moderator, network Learning Network Referral Procedure
facilitators, and network members. (Tsekouras & Roussos, Refers to the procedure by which new organizations/
2006) 4: A computer network used for both educational members are recruited for learning networks. The central
and training purposes. Consists of groups of people feature of this procedure is that it uses existing members
working together, online, to educate both themselves and and their industrial and social relationships in order to
others. The hardware and software that forms the network recruit new members. Learning networks use the social
system is the only limitation to these groups. (Neville & networks of existing members to spread the word about
Powell, 2005) the network, attract interest to its activities, or even
recruit new members. Existing network members can
Learning Network Facilitator also refer to the network when they face problems with
The network manager responsible for running the network other collaborating or supplying companies. (Tsekouras
processes on the ground such as network sessions, & Roussos, 2006)
workshops, visits, and so forth. His or her role is far from
being a tutor or expert to teaching network members new Learning Object (LO)
knowledge. More speciically, the facilitator organizes the 1: A reusable unit of educational materials. It is the basic
practical aspects of networking (e.g., venue, dates), eases building block for e-learning content. A learning object
the learning process of the managers who participate in the can be aggregated from other learning objects and can be
network sessions, and unblocks the change management used in more than one educational activity. (Ng, 2006)
process in his or her organization. The job requires strong 2: Reusable digital learning material. (Reisman, 2006)
inter-personal skills and a competence in tackling the 3: Also called reusable learning object; not really a set
human aspects of learning and change. (Tsekouras & technology, but rather a philosophy for how content can
Roussos, 2006) be created and deployed. Learning objects refer to self-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
408 Le a r ning Obje c t M e t a dat a (LOM ) Le a r ning Orga nizati on

contained chunks of training content that can be assembled of educational contents for speciic needs. (Sicilia &
with other learning objects to create courses and curricula, Snchez-Alonso, 2006) 3: Metadata that contain semantic
L much the same way a childs Lego blocks are assembled information about learning objects. The main aim of LOM
to create all types of structures. Learning objects are speciication is to enable the reuse, search, and retrieval
designed to be used in multiple training contexts, aim of learning objects. The standard, developed by the IEEE
to increase the lexibility of training, and make updating Learning Technology Standards Committee (LTSC) in
courses much easier to manage. (Galitsky, 2005b) 4: A 1997, speciies a conceptual data schema that deines
digital entity described by a metadata record that facilitates the structure of metadata instances for a learning object.
its reuse in online learning. (Sicilia & Snchez-Alonso, (Ishaya, 2005) 4: The IEEE standard conceptual schema
2006) 5: An artifact or group of artifacts with learning that speciies the set of attributes required to describe a
objectives that can be used to increase our knowledge. learning object. (Esmahi, 2005)
(Verhaart & Kinshuk 2006) 6: Any entity, digital or non-
digital, that can be used, reused, or referenced during Learning Object Repository
technology-supported learning. (Askar & Halici, 2005) 7: Digital resources within a structure accessible through
An object mainly used to refer to a digital resource that a computer network connection using interoperable
can be reused to support learning. However, the broadest functions. (Luppicini, 2006)
deinition includes any instructional components that
can be reused in different learning contexts. (Esmahi, Learning Object Reusability
2005) 8: Any entity (digital or non-digital) that may be The capability of a learning object to be used in different
used for learning/education/training. A learning object educational contexts. It is commonly agreed that reusability
is usually the smallest unit of instruction managed by an is a property of the design of the learning object and of its
LMS. However, a learning object may grow increasingly associated metadata record. (Sicilia & Snchez-Alonso,
complex, have any internal structure, and may get more 2006)
size or granularity. In order to reuse, learning objects
are described by metadata. (Kayama & Okamoto, 2005) Learning on Demand
9: Chunks of learning content that can be combined to A phrase associated with the concept of Just-in-Time
comprise teaching modules or courses. (ODea, 2005) Learning. It is speciically associated with the learners
10: Available information (usually on the Web) that role in determining what he or she wants or needs to learn
is reusable and applicable to many different learning at any given time. (Iannarelli, 2005)
contexts. (Lindsay, Williams, et al., 2005) 11: Deined
as any entitydigital or non-digitalthat may be used, Learning or Information Ecology
reused, or referenced for learning, education, or training. For preserving the chances of offering the complexity
Examples of learning objects include multimedia content, and potential plurality within the technological shaping
instructional content, learning objectives, instructional of knowledge representation and diffusion, the learning-
software and software tools, people, organizations, and or information-ecology approach is indispensable for
events referenced during technology-supported learning. cultivating practical judgments concerning possible
(Ishaya, 2005) 12: A digital resource that can be reused in alternatives of action in a democratic society, providing the
more than one learning experience. (Chapman, 2005b) critical linguistic essences, and creating different historical
kinds of cultural and technical information mixtures.
Learning Object Metadata (LOM) Noteworthy is the fact that learning or knowledge involves
1: Semantic information attached to learning objects. a dynamic, living, and evolving state. (Kwok Lai-yin &
There are a number of LOM standards. The main aim of Tan Yew-Gee, 2005)
the LOM speciication is to enable the reuse, search, and
retrieval of the LOs content and the integration of LOs Learning Organization
with external systems. (ODea, 2005) 2: The description 1: An enterprise that facilitates the learning of all its
of the contents, technical characteristics, and prospective members and continuously transforms itself. (Brace &
educational usages of a piece of Web content, aimed at Berge, 2006) 2: An organization that continually strives to
its reuse and used as a facilitator for the implementation create a culture and environment that promotes learning,
of advanced resource search and selection services exploration, and innovation, and that continuously

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning Orie nt at ion Le a r ning St yle 409

transforms itself to achieve superior competitive Learning Platform


performance. (Jones & Gupta, 2005) 3: An organization A software system used to deliver and support online
that helps transfer learning from individuals to a group, teaching and learning. Learning platforms manage access
L
provide for organizational renewal, keep an open attitude to to the platform and to learning materials, and usually
the outside world, and support a commitment to knowledge. include various communication tools. (Link & Wagner,
It is also considered as the organization that focuses on 2006)
developing and using its information and knowledge
capabilities in order to create higher-value information and Learning Portal
knowledge, to modify behaviors to relect new knowledge Integrates information, administrative, communication,
and insights, and to improve bottom-line results. (Vat, research, teaching, and learning support systems with
2006) 4: An organization which actively engages itself global networks of resources and services. Learning
in promoting the development of knowledge assets by portals are typically designed to increase lexibility and
extracting, storing, and nurturing the knowledge that accessibility to institutional resources, and to encourage
exists in individuals and systems. (Huq et al., 2006) 5: interaction and engagement with diverse communities of
Type or form of organization that continuously expands users. (Campbell, 2005)
its capacity to create the wished-for results, using learning
as an intentional and strategic tool for organizational and Learning Preference
individual improvement, and facilitates the learning of all Individual favoring of one teaching method over another,
its members via the elimination of any kind of barrier. which can be consistently observed through individual
(Real et al., 2006) 6: Those that have in place systems, choices or actions. (Rentroia-Bonito et al., 2006)
mechanisms, and processes that are used to continually
enhance their capabilities, and those who work with it Learning Rules for Neural Networks
or for it to achieve sustainable objectives for themselves Rules that concern the modiication of the weights w of the
and the communities in which they participate. (Sharma, connections among neurons according to a speciic input
Wickramasinghe, et al., 2005) pattern. The learning method based on backpropagation
consists of adjusting the weights making use of the
Learning Orientation difference, for a given pattern of input values to the network,
1: Personal way individuals understand and manage their between the desired activation levels for the neurons of the
own intentional learning. (Molinari et al., 2005) 2: Set of output layer and the levels really obtained. Using then a
organizational values, such as the commitment to learning, training set made up of couples of input-output patterns,
the shared vision, and open-mindedness that inluence the the weights are cyclically modiied so that the differences
propensity of the company to create and use knowledge. are eventually minimized according to a least-squares
(Real et al., 2006) sense. (Zarri, 2006a)

Learning Outcome Learning Stock


1: A measure of the performance of a student after receiving Knowledge store in a speciic agent (i.e., individual, group,
treatment. (Witta, 2005) 2: Often used at some institutions and organization) both in its technical dimensions or know-
as a synonym for competencies, but generally deined how and its cognitive dimension. (Real et al., 2006)
more broadly and sometimes confused with completion
of assignments. An acceptable learning outcome might Learning Stress
be, for instance, a passing grade on an essay. Unless the Physiological and psychological changes occurring during
assignment is carefully designed, however, neither the essay learning events. (Molinari et al., 2005b)
nor its grade may reveal much about the true extent of the
students knowledge, skills, and abilities in the subject Learning Style
area. (D.B. Johnstone, 2005) 3: The achieved objectives; 1: A consistent way of responding to and using stimuli
evidence that learning has occurred, performance has in the context of learning on the basis of either learned
changed, and results have been attained. Also, a measurable or inherited traits. Also known as cognitive preference.
change in knowledge, attitude, behavior, skill level, or a (Chambel & Guimares, 2005) 2: A persons preferred
condition, status, or situation. (Blicker, 2005) way to learn and process information, interact with others,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
410 Le a r ning St yle Fa c t or Le a r ning Volit ion

and complete practical tasks. (Ally, 2005c) 3: Consists of Learning Technology Standard/Specification
the ways and modes people acquire knowledge, so it helps (LTS)
L greatly in knowledge acquisition and retention. There are 1: A de jure standard for learning/education/training with
four important learning styles identiied: feeling (concrete information technology. This type of standard includes
experience), thinking (abstract conceptualization), a formal accredited normative speciication or set of
watching (relective observation), and doing (active guidelines, typically including conformance criteria. A
experimentation). (Y.J. Zhang, 2005b) 4: Generally standard is created by a formal standards development
accepted to be a students existing learning strengths organization (SDO), like the European Committee on
or preferred manner of learning. (Kaur et al., 2005) 5: Standardization (CEN), the International Organization for
Generally refers to learning dispositions that students adopt Standardization (ISO), and the IEEE Learning Technology
in educational environments; sometimes called learning Standards Committee (IEEE LTSC). (Kayama & Okamoto,
approach or learning orientation. (Berg, 2005d) 2005) 2: Agreement about the characteristics that a
learning element should have in order to be compatible,
Learning Style Factor interchangeable, and interoperable into other learning
Linear combination of the original questions that represent systems. The use of standards ensures instructional
the underlying constructs that summarize the original technologies interoperability and their learning objects for
questions. Actionneed to physically participate in universities and corporations around the globe. Examples
a course; authority dependenceneed for instructor of LTSs are Instructional Management Speciication (IMS),
feedback and direction; avoidancedesire to stay Educational Modeling Language (EML), and IEEE LOM.
away from class; communicationability to write and (Garca et al., 2006)
understand written communication; concreteprefer
concrete rather than abstract; instructor organization Learning Theory
need for clear instructions from the instructor; reading/ 1: One of a range of theoretical models used to facilitate
listeningpreference for reading or listening rather understanding of the process of learning. (Sieber & Andrew,
than talking or interacting; recognitionneed for the 2005) 2: A set of hypotheses or beliefs that explain the
teacher to recognize work; sociabilitythe need for process of learning or acquiring knowledge and skill.
social or face-to-face interactions with peers; and student (Boettcher, 2005a)
organizationability to set up a study schedule and abide
by it. (Witta & Lee, 2005) Learning Tool
A tool included in a Web-based learning environment for
Learning Task managing the course, and geared to facilitating student
One of a set of steps with a deined learning goal addressing learning in the environment. (Lammintakanen & Rissanen,
speciic training needs identiied within business processes 2005a)
driving the deinition of proper instructional design and
e-learning system requirements. (Rentroia-Bonito & Learning Trajectory
Jorge, 2005) An individual or collective learning pattern in a irm geared
to the development of the adequate mix of internal and
Learning Technology (LT) external knowledge from which to extract competitive
1: Media, computing, and telecommunications tools used potential. Knowledge-management initiatives can be
to support the learning process either on or off campus understood, ultimately, as tactical arrangements to support
such as audio and video recorders, fax machines, CD- the proper collection of learning trajectories needed at a
ROMs, video projectors, computers, modems, telephones, given juncture for the development of a irms required
audio and video conferencing systems, satellite systems, knowledge base. (Andreu & Sieber, 2006)
ilm, and television. (Campbell & Berge, 2005) 2: Any
technology that is used with the intention of promoting Learning Volition
learning. (Sieber & Andrew, 2005) There are two types of learning volition: internal and
external. The former has to do with the learners spontaneity

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning-Cur ve Effe c t Le ibnizia n Fa c t N e t 411

and interest, the latter one arises from external factors such tasks. Systems that have become outdated, as business
as competition with the others, rewards, and penalties. needs change and the hardware/software available in the
(Barolli & Koyama, 2005b) marketplace have improved. (Bradley, 2005)
L
Learning-Curve Effect Legitimacy in CoPs
Originally, the experience- or learning-curve effect The element that deines the force and authority in relations
describes that each doubling of the accumulated amount within the group, but that legitimacy need not be formal.
of production reduces the production unit costs by (Ranguelov & Rodrguez, 2006)
approximately 20-30%. This effect not only refers to
production, but can appear in all business areas to a certain Legitimate Peripheral Participation (LPP)
degree. (Knust & Hagenhoff, 2005) 1: A conceptual framework that recognizes that different
kinds of learners can contribute to learning in a Virtual
Least Signiicant Bit (LSB) Community of Practice (VCoP). As a consequence, novices
The last or the right-most bit in a binary number. The are welcome to participate in the group even if their
reason it is called LSB is because changing its value will positions in the social network are peripheral and their
not dramatically affect the resulting number. (K. Chen, contributions marginal. Over time, provided opportunities
2005) for situated learning, they are acquiring a growing body of
knowledge and may become core members of the respective
Legacy Data community. (von Wartburg et al., 2006) 2: A complex and
1: Contents of databases that precede the installation composite process through which new members become
and implementation of new systems. Optimally, legacy matured members by acquiring knowledge from the
data are migrated into new data systems; following this group. (Chua, 2006) 3: The process by which a newcomer
process, the older application and data structure may be gradually works his/her way towards full participation in
archived or deleted. Frequently, in an effort to reduce the the community. (Kimble & Hildreth, 2005) 4: When non-
cost of implementation, legacy data remains outside a members are allowed the opportunity to fully participate in
new data store and accessed as foreign data records from community activities and begin to behave as community
the new application. (Horiuchi, 2005a) 2: Data that you members. It is through this membership that knowledge can
already have and use. Most often, this takes the form of be shared with the rest of the community. These individuals
records in an existing database on a system in current use. must have access to the periphery of the practice, which
(Bellatreche & Mohania, 2005) allows for either observation or participation in the practice,
and eventually their participation becomes legitimized.
Legacy System Periphery is not used in the geographical sense, but as the
1: Typically, a database management system in which an degree of involvement an individual may have with the
organization has invested considerable time and money, community. (Paquette, 2006a) 5: States that all members
and which resides on a mainframe or minicomputer. of a community (also the less expert or more peripheral to
(Pang, 2005b) 2: A software system that continues to it) have the same rights and are legitimated in accessing
be used because of the cost of replacing or redesigning all resources and participating in all practices of the
it, despite its poor competitiveness and compatibility community. It is strongly based on Vygotskjis ZPD
with modern equivalents. (Aversano et al., 2005) 3: An concept. (Cartelli, 2006a)
information system from an earlier period of technology
and development. (Mackey, 2005) 4: A mission-critical Leibnizian Fact Net
aging system that supported business functions for many A knowledge store founded on axioms. Leibnizian inquiry
years, however it is no longer considered state-of-the-art does not begin with inputs that are externally given, but with
technology and has limitations in design and use. Within innate ideas where aspects of the symbol stream are under
organizations, the vast majority were replaced pre-Y2K the control of the inquiry system. The truth is the end point
with ERP systems. (Sammon & Adam, 2005) 5: Older of the process of inquiring and is concomitant with internal
computing technology used by an organization over time. consistency, completeness, and comprehensiveness. In this
Legacy systems perform business-critical functions and inquiring system, all sentences are contingent. A candidate
can be integrated with newer systems. (Yoon et al., 2005) 6: sentence becomes a contingent truth if it can be linked
Transaction processing system designed to perform speciic to some sentence in memory. Thus, the memory becomes

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
412 Le sse r Deve lope d Count r y (LDC) Life long Le a r ning

a fact net by which the truth of a sentence is veriied. entities in the future as a result of past transactions or
(Hall & Croasdell, 2006) events. (Tahinakis et al., 2006)
L
Lesser Developed Country (LDC) Library
A class of country in developing, emerging markets with a 1: A group of functions and/or classes stored separately
least developed status; older and more politically incorrect from the main body of the main program; an include
terms for these countries include second and third world, ile consisting of functions and/or classes. (D. Brandon,
and underdeveloped/undeveloped. (Petter et al., 2005) Jr., 2005a) 2: A library generally includes many different
collections, each organized differentlythough there
Lessons Learned is a strong family resemblance in how collections are
Task- or situation-speciic knowledge gained while presented. (Trujillo, 2005)
completing tasks or projects, also referred to as best-known
methods, best practices, and internal benchmarking. LIC: See Low-Intensity Conlict.
(Kulkarni & Freeze, 2006)
Licensing Domain
Level in the Hybrid Network Characterization of the breadth of availability and level
The proposed model of network includes distinct levels of of access to open materials. (Fleming, 2005b)
participation, but the distinction in levels is not based on
the degree of involvement in tasks, but on the personality Life Event
of members, their degree of commitment, and the type of 1: A way to classify information and services in government
tasks to be performed. (Ranguelov & Rodrguez, 2006) Web sites that refer to those moments in peoples lives
when there exists more need for information and service.
Levelwise Discovery For example, moving, dealing with crime, having a baby,
A class of data-mining algorithms that discovers patterns and so on. (Kaufman, 2005) 2: An incident for a service
of a certain size by irst discovering patterns of size 1, then consumer that necessitates the use of a number of services.
using information from that step to discover patterns of (Vassilakis & Lepouras, 2006)
size 2, and so on. A well-known example of a levelwise
algorithm is the Apriori Algorithm used to mine association Life Span
rules. (Koeller, 2005) The time over which a database object is deined. (Ale
& Rossi, 2005)
Leverage
1: Investing with borrowed money as a way to amplify Life Table
potential gains (at the risk of greater losses). (Lubbe, Describing the survival rate as a function of time, referred
2005) 2: Knowing which actions may yield long-lasting to as the survivor function. (Chen, Oppenheim, et al.,
outcomes. Knowing where and when to intervene or 2005)
inluence a system to gain long-lasting desired change
using minimal effort and energy. (Maani, 2005) Lifecycle
Common process identiied in PMMM Level 2 which
Lexical Indices could be broken into ive phases: embryonic, executive
Lexical items, for example, proper names and events, used management acceptance, line management acceptance,
to index texts. (Kulyukin & Nicholson, 2005) growth, and maturity. (Monteiro de Carvalho et al.,
2005)
Lexicographer
A compiler or writer of a dictionary for practical use or for Lifelong Learning
any other purposes. (Ahmad & Al-Sayed, 2006) 1: A process of acquiring knowledge or skills throughout
ones lifetime via education, training, work, and general
Liability experiences. It is a concept of continuous personal
Can be deined as probable future sacriices of economic development through personal learning with an emphasis
beneits arising from present obligations of a particular on independent study determined by contextual personal
business to transfer assets or provide services to other

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Life Shir t Lim it e d-Pe rspe c t ive Bia s (LPB) 413

needs. (Rahman, 2005b) 2: All learning activity undertaken


throughout life with the aim of improving knowledge, conidence
confidence{A
rt{A B}
B} sup port{A B}
=
skills, and competencies within a personal, civic, social,
lift { A B=} =
sup port{B}
=
sup port(A)sup port{B} L
and/or employment-related perspective. Lifelong learning
is about the acquisition and update of all kinds of abilities, (Giudici & Cerchiello, 2005)
interests, knowledge, and qualiications from the preschool
years to post-retirement. It also values all forms of learning, Light Gun
including formal learning, non-formal learning, and A device used for shooting games, which allows the user
informal learning. (Correia & Sarmento, 2005) 3: Learning to target objects on screen; used predominantly in stand-
for employees, sometimes in the working environment. alone arcade machines and some home consoles. (Ip &
Helps to keep the employees upgraded and productive. Jacobs, 2006)
(Karoulis & Pombortsis, 2005b) 4: Learning that extends
beyond formal instruction and beyond the classroom. Lightweight Directory Access Protocol (LDAP)
Distance education is facilitating the education of countless A protocol deinition for accessing specialized databases
individuals in later stages of their lives. (Lindsay, Williams, called directories. An LDAP directory is organized by a
et al., 2005) 5: An expression used to indicate that acquiring simple tree hierarchy. (Pallis et al., 2005)
new knowledge is a continuous process that does not end
after one leaves school or university. The learning continues Lightweight IDS: See Light Weight Intrusion Detection
uninterrupted throughout ones professional life and even System.
after retirement, spreading to embrace all stages of life and
all social groups to the possibilities offered by e-learning. Lightweight Intrusion Detection System (Light
(Gordon & Lin, 2005) Weight IDS)
An intrusion detection system, which is easy to deploy
LifeShirt and has a small footprint on system resources. (Kayacik
A wearable ambulatory monitoring device produced by et al., 2005)
VivoMetrics, Inc., that measures 30 cardiopulmonary
variables. It is FDA approved for sleep studies. (Molinari Limit Conjoint Analysis
et al., 2005b) Further development of traditional conjoint analysis in
which choice data are directly integrated into conjoint
Lifetime analysis. (Voeth & Liehr, 2005)
Data that measure lifetime or the length of time until the
occurrence of an event. (Chen, Oppenheim, et al., 2005) Limitation (of Mobile Device)
Onen of the set of hardware restrictions mostly imposed
Lifetime Value by the application area; main limitations are processing
A measure of the proit-generating potential, or value, of power, screen dimensions, and transmission bandwidth.
a customer; a composite of expected tenure (how long the (Rosenbaum et al., 2006)
customer stays with the business provider) and expected
revenue (how much a customer spends with the business Limited Capacity Assumption
provider). (Mani et al., 2005) Applies to the dual channels of verbal and auditory
processing. The assumption is that each of these channels
Lift has a limit as to the amount of information that can be
A measure used to determine the value of an association processed at one time. (Boechler, 2006b)
rule that tells us how much the presence of the antecedent
inluences the appearance of the consequent. (Ale & Limited-Perspective Bias (LPB)
Rossi, 2005) A cognitive bias that relects a human tendency to
overestimate the completeness of what we know, and to
Lift of a Rule act on our own (limited) perspective of what is important
Relates the conidence of a rule with the support of the and what can be done. (Moore & Burke, 2005)
head of the same rule:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
414 Lim it e d-Re sourc e M ode l Link Consist e ncy

Limited-Resource Model Linguistic Term


The idea that the human information processing system One of a set of linguistic terms, which are subjective
L has a limited pool of resources available for the concurrent categories for the linguistic variable, each described by a
performance of any number of tasks. The observation of membership function. (Beynon, 2005b)
degraded performance in one or more processing tasks is
taken to suggest that the capacity of the system is being Linguistic Variable
approached. (Owen, 2006c) A variable made up of a number of words (linguistic
terms) with associated degrees of membership. (Beynon,
Line: See Last Mile. 2005b)

Linear Discriminant Analysis Link


Multivariate classiication technique that models the classes 1: Navigation path between two nodes in a hypermedia
under consideration by normal distributions with equal environment. (Lemahieu, 2005) 2: A way to relate
covariances, which leads to hyperplanes as the optimal the elements and constructs. The link shows how the
decision surfaces. (Galvo et al., 2005) research participants interpret each element relative to
each construct. Further, the link reveals the research
Linear Network participants interpretations of the similarities and
The speciic physicalthat is, realarrangement of the differences between the elements and constructs. (Tan
elements of the network. (Melkonyan, 2005) & Hunter, 2005)

Linear Presentation Link Analysis


A traditional form of instruction where material is 1: A data-mining technique that uses concepts and
presented to a learner in a predetermined sequence. (Pelton techniques from graph theory to make associations.
& Pelton, 2005) (Thuraisingham, 2005) 2: The links between pages on
the Web are a large knowledge source that is exploited
Linear Programmed Instruction by link-analysis algorithms for many ends. Many
A design whereby a series of frames are presented to the algorithms similar to PageRank determine a quality or
student in a speciic sequential order. The student actively authority score based on the number of incoming links of
responds to stimuli in each frame and receives immediate a page. Furthermore, link analysis is applied to identify
feedback to that response. Learning results through operant thematically similar pages, Web communities, and other
conditioning. (Owen & Aworuwa, 2005) social structures. (Mandl, 2006) 3: This data-mining task
establishes internal relationship to reveal hidden afinity
Linear Regression among items in a given data set. Link analysis exposes
1: A classic statistical problem is to try to determine the samples and trends by predicting correlation of items that
relationship between two random variables X and Y. are otherwise not obvious. (Nayak, 2005a)
For example, we might consider height and weight of a
sample of adults. Linear regression attempts to explain this Link Analysis Data-Mining Task
relationship with a straight line it to the data. (Hamdi, Establishes internal relationship to reveal hidden afinity
2005a) 2: Used to make predictions about a single value. among items in a given data set. Link analysis exposes
Simple linear regression involves discovering the equation samples and trends by predicting correlation of items that
for a line that most nearly its the given data. That linear are otherwise not obvious. (Nayak, 2005c)
equation is then used to predict values for the data. For
instance, if a cost modeler wants to know the prospective Link Annotation
cost for a new contract based on the data collected from Adding some visual hints to hype. (Wu & Chen, 2005)
previous contracts, then he or she may apply linear
regression. (Katsaros & Manolopoulos, 2005b) Link Consistency
The ability of a hypertext network links to always point
to an existing and semantically coherent target. (Sindoni,
2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Link M ining Lit e ra cy Sk ill 415

Link Mining messages are sent to the program, which then distributes
A method of data mining that combines techniques from to all registered users. (Ridings, 2006a) 4: Mailing list that
link analysis, hypertext and Web mining, relational forwards e-mail messages to everyone who has subscribed
L
learning and inductive logic programming, and graph to the list. Members seldom know each other due to the
mining. Link mining places primary emphasis on links, large size of these lists. (Teigland & Wasko, 2005)
and is used in both predictive and descriptive modeling.
(Banerjee et al., 2005) LITE: See LOTOS Integrated Tool Environment.

Link Sorting LITEE: See Laboratory for Innovative Technology and


Reordering the pointers to various WAP pages. (Quah & Engineering Education.
Seet, 2006)
Literacy
Link Type 1: A literate person is deined by the United Nations and
Type-level deinition of properties (domain, inverse link World Bank as someone who can, with understanding,
type, cardinalities) for a group of similar links. (Lemahieu, both read and write a short, simple statement on his or
2005) her everyday life. In many contexts, a wider deinition
is used and literacy is seen to include additional skills
Link-Rot such as numeracy and practical problem-solving skills
The name given to a link that leads to a Web page or site relevant to daily life. (Arellano et al., 2005) 2: Citizens
that has either moved or no longer exists. (Burke et al., have the skills to use ICT effectively to meet their needs.
2005) In policy terms, ICT literacy should be considered a basic
skill alongside traditional literacy. Strategies are required
LinkedIn(.com) to achieve equity in this area and ensure that existing
Online social networking application. (Mew, 2006) educational, geographical, cultural, or socioeconomic
barriers do not exacerbate the digital divide. (Williamson,
Linux 2005) 3: Generally refers to the ability to read and write.
A Unix-based Open Source operating system designed for It can then extend to include different types of literacy,
Intel-based microcomputers. The kernel was created in for example, computer literacy, functional literacy,
1991 by Linus Torvalds, and it was added on to the GNU information literacy, political literacy, and so forth. It
Project to form what is properly called the GNU/Linux is a multidisciplinary concept; its deinition thus varies
operating system. (Carillo & Okoli, 2006) according to different ields of studies. (Bodomo, 2005b)
4: Operational and cognitive skills necessary to work
Linux Kernel effectively and eficiently with educational software. (Utsi
Basic programming code for the Linux operating system. & Lowyck, 2005) 5: Traditional literacythat is, being
(Sahraoui, 2006) able to read and write. (Reilly, 2005) 6: Traditionally
deined as the ability to read, write, and communicate,
Lip-Sync usually in a print-text-based environment. New literacy
An application to synchronize the lip movement with the studies researchers now view literacies as social practices,
audio elements. (Lee, Lin, et al., 2005) moving away from individual and cognitive-based
models. This model of literacy recognizes that language
LIS: See Land Information System. does not simply represent some kind of objective truth,
but actually constitutes meaning in a given context;
Listserv literacy, therefore, represents an individuals ability to
1: A collection of online users who have chosen to belong communicate effectively within a given socio-cultural
to an e-mail-based information exchange. (Goldsmith, context. (Macfadyen & Doff, 2006)
2006) 2: An e-mail discussion group using ListProc
software, which permits participants to be subscribed Literacy Skill
and receive e-mail. Listserv discussions can be archived One of the set of skills needed to read, write, and make
and searched. (Paoletti, 2005) 3: E-mail program used to sense of text in various forms. (Trammell, 2005)
facilitate communication among a large group of people;

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
416 Lit e rat ure Revie w Loc a l Are a Ra dio N e t w ork

Literature Review Local Access: See Local Network.


Reviewing the research indings reported by a certain ield
L of research; the process usually involves the examination Local Access Transport Area (LATA)
of articles published in the research journals of a particular A geographic area deined by the Federal Communication
ield. (St.Amant, 2005c) Commission. (Nugent, 2005)

Live Update Local and Regional Development (LRD)


An integrated/embedded program of the antivirus A two-dimensional phenomenon involving the human
software. It is intended to provide frequent (weekly or element (active or inactive, economically involved in
self-scheduled) virus deinition and program module society or not), and the individual and overall enrichment
updates. It can automatically run in the background and of the regions players. (Moreau, Raymond, & Vermot-
connect (talk to) the server of an antivirus software Desroches, 2005)
vendor to identify whether an update is available. If so, it
will automatically download and install the update. (Luo Local Area Augmentation System (LAAS)
& Warkentin, 2005) A safety-critical navigation system that provides
positioning information within a limited geographic area.
Living-Learning (Freeman & Auld, 2005)
A residential arrangement (community or program) that
brings students with a common major or interest together Local Area Network (LAN)
with a mentor (advanced student, staff person, or faculty), 1: A group of computers and associated devices that
who oversees the curricular aspect of the program. share a common communications line or wireless link,
(Paoletti, 2005) and typically share the resources of a single processor
or server within a small geographic area. (Boersma &
LLID: See Logical Link Identiier. Kingma, 2006) 2: A class of computer networks in which
the coverage area is usually limited to a room, building, or
LLU: See Local Loop Unbundling. campus. (Sarkar, 2005) 3: Refers to a network connecting
devices inside a single building or inside buildings close
LM: See Location Manager. to each other. (Shuaib, 2005) 4: A group of computers
and other devices sharing a single communications
LMS: See Learning Management System. link. Typically, the longest distance between any two
connections is a few kilometers. Usually owned by a single
LO: See Learning Object. organization. (Ruppel & Ruppel, 2005) 5: A LAN is a
type of network topology commonly used in businesses
Load Balancing and organizations. It is a means of networking computers
1: The method of distributing system load evenly across within an internal speciied area. (Grifiths et al., 2006)
server machines by placing identical copies of frequently 6: A data communications system that: (1) lies within
accessed information among available server machines. a limited spatial area, (2) has a speciic user group, (3)
(Bose et al., 2005) 2: Techniques to distribute the tasks has a speciic topology, and (4) is not a public-switched
over the single processors in parallel systems in a way that telecommunications network, but may be connected to
idle time is minimized. (Geisler & Kao, 2005) one. (Chochliouros et al., 2005a)

Load Shedding Local Area Radio Network


1: Process of dropping data elements from a data stream Mobile radio networks can either be built up as wide
randomly or semantically. Load shedding is applied for area networks consisting of several radio cells or as
reducing the amount of data that needs to be processed. local area networks usually consisting of just one radio
(Sayal, 2005) 2: The discarding of input data by the DSMS cell. Depending on the signal reach of the transmission
when the input stream rate exceeds system capacity. It can technology used, a local area network can range from
either be semantic (based on certain semantic rules) or several meters up to several hundred meters. (Kaspar &
random. (Chatziantoniou & Doukidis, 2005) Hagenhoff, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Loc a l E-Gove r nm e nt Loc a lizat ion 417

Local E-Government Local Mobility


Refers to information, services, or transactions that local Refers to mobility within a certain space, as between
governments provide online to citizens using the Internet rooms or loors. (Mkinen, 2006)
L
and Web sites. It is also the realization of the e-governance
vision at the local level, at the point where the vast majority Local Network
of services are delivered. (Yigitcanlar & Baum, 2006a) Refers to all local telecommunication assets, including
switching and Last Mile transport facilities. The expression
Local E-Government Standard local has a spatial meaning and typically refers to an
One of a set of standards being established to ensure that urban area. (Arbore, 2005)
national Local E-Government Strategies are supported
with effective and appropriate standards and mechanisms Local Online Content
to exploit existing projects, products, and services. Their Content developed for the World Wide Web by local
primary aims are to provide easy access to comprehensive communities relecting their intrinsic values, traditions,
and authoritative best practice, information on local service and needs. (Harris, 2005)
interoperability standards, analysis and development
of standards, and scrutiny of e-government projects. Local Pattern Analysis
(Yigitcanlar & Baum, 2006a) An in-place strategy speciically designed for generating
globally interesting models from local patterns in multi-
Local Feature dimensional spaces. (Zhang & Zhang, 2005)
The geometric information of the signature is extracted
in terms of features after dividing the signature image Local Popularity
or signal into grids and sections. (Chakravarty et al., Depends on the number of requests to a segment. (Kacimi
2005b) et al., 2005)

Local Feature Relevance Local (Speciic) Knowledge Interaction


Amount of information that a feature carries to predict the Knowledge interaction that occurs among entities that are
class posterior probabilities at a given query. (Domeniconi relatively within the same local level, such as knowledge
& Gunopulos, 2005) sharing activities among the members of a community.
(Medeni, 2006a)
Local Loop
1: See Local Network. See also, for a more restrictive Local Test
deinition, Last Mile. (Arbore, 2005) 2: The access network Veriies that an update operation violates an integrity
connection between the customers premises and the local constraint by accessing data at the local site. (Ibrahim,
Public Switched Telephony Network (PSTN) exchange, 2005)
usually a loop comprising two copper wires. In fact, it is
the physical twisted metallic pair circuit connecting the Local-As-View (LAV)
network termination point at the subscribers premises The relation between the global schema and the sources
to the main distribution frame or equivalent facility in is established by deining every source as a view over the
the ixed public telephone network. (Chochliouros et al., global schema. LAV systems typically arise in the context
2005c) where the global schema is given beforehand, and the local
schemas are to be derived in terms of the global schema.
Local Loop Unbundling (LLU) (Balsters, 2005)
One of the most important and controversial policy
instruments adopted in many countries since the second Locale
half of the 1990s to foster the competitive process in The combination of language and dialect. (D. Brandon,
local telecommunication markets. LLU codiies the legal Jr., 2005b)
obligation for the incumbent operator to provide, at cost,
part of its local network facilities (unbundled elements) Localization
to its competitors. (Arbore, 2005) 1: The process of adapting an internationalized Web site
to meet language, culture, religion, and other requirements

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
418 Loc a lize Loc at ion-De pe nde nt Ca che I nva lidat ion

of a speciic market or locale. (Becker, 2005b) 2: Process Location Registration


to create a product that looks as though it was created in Mobile users update their location information with a
L the target country or market. (He, 2006) 3: The process wireless system. (Wang, 2006)
of adapting software to a particular language, culture,
and desired local look and feel. This may include Location Update
local sensitivities, geographic examples, and adhering to A signaling procedure in cellular networks to locate the
local legal and business requirements. (Hawk & Kaiser, subscriber in the geographical area of coverage and update
2005) 4: The process of revising materials designed the location information to speciic databases. (Louvros
for one particular culture to meet the communication et al., 2006)
expectations of a different cultural group. (St.Amant,
2005a) 5: The process to adapt content to speciic users Location-Aware Service
in speciic locations. (Sofokleous, Angelides, & Schizas, A mobile service that provides information based on a users
2005) 6: Through GPS technology, service providers location through the support of a global positioning system.
can accurately identify the location of the user so that Such services include mobile maps, weather, restaurants,
m-commerce providers will be better able to receive and and movie directories. (Chan & Fang, 2005)
send information relative to a speciic location. (Clarke
& Flaherty, 2005) Location-Based Service (LBS)
1: The provisioning of value-added services to cellular
Localize subscribers based on the physical location of their mobile
1: Design linguistically and culturally appropriate to devices within the network. (Tan & Teo, 2005) 2: Set of
the locality where a product or service is being used and applications that can obtain information about the customer
sold. (T.S. Chan, 2005) 2: Make a Web site linguistically, location and use it to customize the service offered.
culturally, and in all other ways accessible to customers (Petrova, 2006) 3: A service that uses a mobile device and
outside ones home territory. (D. Brandon, Jr., 2005b) a location-speciic transmission, usually within a relatively
small Personal Area Network (PAN). (Clegg & Tan, 2006)
Locally Shared Conceptual Schema 4: A service providing or iltering information using the
A special artifact that explicitly represents the communitys users current position or environment. Thus, speciic
perspective. In simple situations, it can be the system of and customized services are created. (Kao & Rerrer,
categorization used to classify documents; in more complex 2006) 5: A synonym for Mobile Location Service (MLS)
scenarios, it can be an ontology, a collection of guidelines, denoting an application that utilizes the knowledge of ones
or a business process. (Cuel et al., 2006) geographical position to provide added-value services.
(Giaglis, 2005) 6: The service that answers queries based
Location Identiication on the locations with which the queries are associated.
The ability of mobile hosts to determine the geographical (Xu, 2006) 7: An application that reacts according to a
location of wireless access devices. (Giaglis, 2005) geographic trigger. A geographic trigger might be the input
of a town name, ZIP code, or street into a Web page; the
Location Management position of a mobile phone user; or the precise position
A technique that updates the location of mobile users of someones car as he or she is driving home from the
during the course of their movement and determines the ofice. Using the knowledge of where someone is or where
locations of mobile users for call delivery. (Wang, 2006) he or she intends to go is the essence of location-based
services. The arrival of high-bandwidth mobile networks
Location Manager (LM) has highlighted the potential development of location-based
A gateway that aggregates the location estimates for services. (Tzouramanis, 2005)
the mobile device from the various LDTs, computes the
user location, and estimates the certainty of that location Location-Dependent Cache Invalidation
before being forwarded to the application. (Fraunholz et The procedure of verifying the validity of cached location-
al., 2005) dependent data with respect to the current location. (Xu,
2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Loc at ion-De pe nde nt Que r y Logic Que r y 419

Location-Dependent Query obtain the preference of each individual user, which could
A query whose results depend on the current location of the be learned from query logs. (Wen, 2005a)
query issuer. For example, the query Which is the nearest
L
gas station? will return different gas stations depending Log-Based Query Clustering
on the current location of a driver. (Leong, 2005a) A technique aiming at grouping users semantically related
queries collected in Web query logs. (Wen, 2005a)
Locational Community
A community that is based on the shared physical location Log-Based Query Expansion
of its members. Villages, towns, and cities are examples A new query expansion method based on query log mining.
of locational communities. (Roberts et al., 2006c) Probabilistic correlations between terms in the user queries
and those in the documents can then be established through
Lockean/Leibnitzian Perspective of Knowledge user logs. With these term-term correlations, relevant
Management expansion terms can be selected from the documents for
Refers to the objective aspects of knowledge management, a query. (Wen, 2005a)
where the need for knowledge is to improve effectiveness
and eficiencies and the search for the correct approach. Logging
(Wickramasinghe, 2006) 1: Creating a record of all employee Internet usage.
(Urbaczewski, 2005) 2: Recording vital information about
Locus of Attention an incident. Recorded information should be suficient
Among all sensory input, the locus of attention is the input to identify the time, origin, target, and if applicable
to which one allocates mental resources. Input that falls characteristics of the attack. (Kayacik et al., 2005)
outside the locus of attention may go absolutely unnoticed.
An example of locus of attention is a speciic section of a Logic Data Mining
computer screen. (Thomas & Roda, 2006a) The application of data-mining techniques where both
data and extracted information are expressed by logic
Locus of Control variables. (Felici & Truemper, 2005)
1: Individuals perceptions of whether they themselves
inluence events and outcomes in their lives (internal Logic of Determination
control), or that events and outcomes are inluenced by Explains organizational change in terms of the variation
factors such as luck, fate, chance, or powerful others of a set of predictor variables. (Saunders, 2006)
(external control). Locus of control is considered a trait
characteristic that is unlikely to change signiicantly in Logic of Opposition
an individuals lifetime. (Kase & Ritter, 2005) 2: Where Explains organizational change by identifying forces
an individuals beliefs about controlling entities are sited. both promoting change and impeding change. (Saunders,
People range from being highly internally controlled, 2006)
that is, they are sure that they inluence what happens to
them, to highly externally controlledthat is, those who Logic Programming
are sure that anything that happens to them is the result A declarative, relational style of programming based on
of fate or work by others. (Wishart, 2005) irst-order logic. The original logic programming language
was Prolog. The concept is based on Horn clauses. (Chang
Log File & Hsu, 2005)
A record of all online activities occurring on a Web site
as captured by the software monitoring the server. (Hin Logic Query
& Subramaniam, 2005b) A disjunctive data log query over a database deines a
mapping from the database to a inite (possibly empty) set
Log-Based Personalized Search of inite (possibly empty) relations for the goal. A query
Personalized search targets to return results related to is a pair <G,P> where G is an atom, called goal, and P is
users preferences. The core task of personalization is to a program. The application of a query Q to a database D
is denoted by Q(D). (Greco & Zumpano, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
420 Logic Synt he sis Logist ic s Suppor t Syst e m

Logic Synthesis inconsistency is usually restricted to express the violation


The process of reconstructing an unknown Boolean of integrity constraints. This restriction makes sense
L function from (a portion of) its truth table. (Muselli, when the data are atomic formulas. (Alonso-Jimnez et
2005) al., 2005)

Logical Analysis of Data (LAD) Logical Link Identiier (LLID)


A methodology that tries to extract and/or discover A 2-byte tag in the preamble of an Ethernet frame. This
knowledge from datasets by utilizing the concept of 2-byte tag uses 1-bit as a mode indicator (point-to-point
Boolean functions. (Boros et al., 2005) or broadcast mode) and the remaining 15-bits as the ONU
ID. (Freire et al., 2005)
Logical Connectivity Rule
In STL, certain logical rules are deined to allow for Logical Model
connecting components to produce semantically correct 1: Generalized formal structure in the rules of information
artifacts. Incorrect connections are not allowed. (Gaffar, science. For relational database, the logical model generally
2005) conforms to relational theory. (Pardede et al., 2005) 2:
In a design methodology, tools to transform conceptual
Logical Consistency schemata into a schemata near to implementation. A well-
Verifying whether the given logical condition is met. It known principal model is the relational model. (Cuadra
usually is employed to check qualitative data. (Conversano et al., 2005)
& Siciliano, 2005)
Logical Reasoning
Logical Data General, context-independent, objective reasoning that
Input of model building, training, and applying tasks in leads to a single conclusion. (Artz, 2005a)
SQL/MM data mining and Java data mining. It describes
the logical nature of the data used as input of the task Logical Schema
(referred to as physical data). (Zendulka, 2005c) The description of the data structures of a database
according to the model of a speciic technology, for
Logical Data Model example, an RDBMS. The logical schema of a database is
An abstract representation of a set of data entities and the implementation of its conceptual schema. Application
their relationship, usually including their key attributes. programs know the database through its logical schema.
(Sethi & Sethi, 2006b) (Hainaut et al., 2005)

Logical Database Modeling of Engineering Logistic/Logit Regression


Information 1: Special form of regression in which the dependent
Using logic database models to implement the data modeling variable is a non-metric, dichotomous (binary) variable.
of engineering information. The logical database models Although some differences exist, the general manner of
for engineering data modeling include some traditional interpretation is quite similar to linear regression. (Wilson
database models such as relational database model and et al., 2006a) 2: A technique for making predictions when
object-oriented database model, and some special, hybrid, the dependent variable is a dichotomy, and the independent
and extended database models. (Ma, 2005a) variables are continuous and/or discrete. (Yeo, 2005)

Logical Design Logistics


A formal or semi-formal description produced by the The art of moving goods within the supply chain.
translation of the conceptual model into terms of the (Raisinghani & Singh, 2005)
database structures. (Doorn, 2005)
Logistics Support System
Logical Inconsistency A computer package that assists in the planning and
A logical theory is inconsistent if there are no logical deploying the movement and maintenance of forces
models for it. In the logic database paradigm, the notion of in the military. The package deals with the design and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
LOM Low -Cont ex t Cult ure 421

development, acquisition, storage, movement, distribution, second-order extension of probabilistic relaxation labeling.
maintenance, evacuation, and disposition of material; (Caelli, 2005)
movement, evacuation, and hospitalization of personnel;
L
acquisition of construction, maintenance, operation, and Lossless Representation of Frequent Patterns
disposition of facilities; and acquisition of furnishing of Fraction of patterns suficient to distinguish between
services. (Pang, 2005b) frequent and infrequent patterns, and to determine the
supports of frequent patterns. (Kryszkiewicz, 2005)
LOM: See Learning Object Metadata.
Lossy Compression
Long-Lived Transaction A multimedia compression operation that reduces the size
A transaction that runs for so long that it will block access of the media by removing data redundancy or discarding
to the records it has accessed if traditional concurrency some details. The distortion incurred by the operation is
control is used. (Frank, 2005b) permanent. (C.-T. Li, 2005)

Long-Term Orientation Lossy Encoding


1: Refers to a societys attitude towards time: do they tend Removal of data that represents redundant information, or
to plan for a long- or a short-term time horizon? (Frank differences presumed imperceptible to humans, in order
et al., 2005) 2: This stands for the fostering of virtues to reduce stored or transmitted quantities of digital data.
oriented toward future rewards, in particular, perseverance (Kieler & West, 2005)
and thrift. Its opposite pole, short-term orientation, stands
for the fostering of virtues related to the past and present, Lost in Hyperspace
in particular, respect for tradition, preservation of face, A feeling experienced by learners when losing any sense
and fulilling social obligations. (Limayem, 2005) of location and direction in the hyperspace. It is also called
disorientation and is caused by badly designed systems that
Longest Common Subsequence Similarity do not provide users with navigation tools, signposting, or
(LCSS) any information about their structure. (Magoulas, 2006)
Sequences are compared based on the assumption that
elements may be dropped. For example, a sequence LOTOS: See Language of Temporal Ordering
X={x1,x2,x3} may be replaced by X={x1,x3}. Similarity Speciications.
between two time series is calculated as the maximum
number of matching time series elements that can be LOTUS Integrated Tool Environment (LITE)
achieved if elements are dropped independently from both An integrated tool environment for working with LOTOS
sequences. Matches in real-valued data are deined as lying speciications. It provides speciication, veriication/
within some predeined tolerance. (Denton, 2005) validation, and implementation support. The tools in LITE
have been developed by participants in the LOTOSPHERE
Longitudinal Case Study project (funded by the Commission of the European
Research method that involves looking at particular cases Community ESPRIT II program). (Campos & Harrison,
over a longer period of time, with repeated measures to 2006)
observe a phenomenon as it evolves. (Blanger, 2005)
Low Prediction Accuracy Problem
Loop Identiier The problem when derived rules can it the training data
A symbol that denotes the nature of each important loop in very well, but fail to achieve a high accuracy rate on new
a system dynamics model. It can be reinforcing (positive unseen cases. (Dai, 2005a)
loop) or balancing (negative loop). (Casado, 2005)
Low-Context Culture
Loopy Belief Propagation A situation where the mass of the information is vested in
A parallel method for update beliefs or probabilities of the explicit code. Thus, in a low-context culture, senders
states of random variables in a Bayesian network. It is a assume little or no shared knowledge with receivers.
(Zakaria & Yusof, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
422 Low-Deinition Television (LDTV) Lurking

Low-Deinition Television (LDTV) LPP: See Legitimate Peripheral Participation.


A type of television providing a quality of image usually
L compared to VHS; this practically corresponds to the LRD: See Local and Regional Development.
collection of television fragments videotaped directly
from the TV screen. The bit rate offered is 1.5 Mbit/s (1.15 LSB: See Least Signiicant Bit.
Mbit/s for the video only), which corresponds to the bit rate
offered by the original standard MPEG-1. (Chochliouros LSP: See Languages for Special Purposes.
et al., 2005b)
LT: See Learning Technology.
Low-Intensity Conlict (LIC)
A military confrontation in which at least one side is either LTS: See Learning Technology Standard/Speciication.
not a regular army (e.g., guerilla forces, insurgents) or not
deployed in full scale. Hence, it is usually characterized Lurker
by asymmetric forces, with contradictious symmetry in 1: A member of an online community, discussion board,
the ability to implement force advantages on a prolonged or Web site that interacts only passively. (Ajiferuke
time axis. (Ariely, 2006b) & Markus, 2005) 2: A participant in a chat room or a
subscriber to a discussion group, listserv, or mailing list
Low-Pass Digital Filter who passively observes. These individuals typically do
Digital ilter that passes only low frequencies deined by not actively partake in the discussions that befall in these
the pass-band cutoff frequency and attenuates all high forums. (Whitty, 2005) 3: A participant who reads posts
frequencies from the cutoff stop-band frequency to p. and monitors the communities activities without directly
(Jovanovic-Dolecek, 2005c) or explicitly participating. Often and increasingly viewed
as a negative due to the lack of contribution; however, the
Low-Quality Data individual may utilize learning gained from monitoring
Data with lots of noise, missing values, redundant features, the activities. (Patrick et al., 2006)
mistakes, and so forth. (Dai, 2005a)
Lurking
Low-Risk Perception The act of reading interactions between electronic network
Refers to the subjective assessment of the probability of of practice participants, but seldom if ever publicly
a risk. (Kyobe, 2006) contributing anything. (Teigland & Wasko, 2005)

Lower Approximation
In rough sets theory, one of the two sets used to deine
a rough or approximate set. The lower approximation
contains objects that are deinitely in the approximation
set. (Voges, 2005)

Lower Approximation of a Rough Set


Maximum deinable set contained in the rough set.
(Grzymala-Busse & Ziarko, 2005)

Lower (Upper) Approximation


Of a set XU is the union of all indiscernibility classes
contained in X (that intersect X)that is, it is the greatest
exact set contained in X (the smallest exact set containing
X). Instead of exact containment, containment to a degree
is used. (Pawlak et al., 2005)

LPB: See Limited-Perspective Bias.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M /M /1 M ode l M a chine Le a r ning 423

M
M/M/1 Model Machine Learning
Exponential/exponential with one server. The queuing 1: A computer-embedded capability of data analysis
model that assumes an exponential distribution for inter- with the purpose of acquiring selected characteristics
arrival times, an exponential distribution for service times, (attributes, patterns, behavior) of an object or system.
and a single server. (Guster et al., 2005) (Nabuco et al., 2006) 2: A discipline in computer science,
generally considered a subpart of artiicial intelligence,
M-Business: See Mobile Business. which develops paradigms and techniques for making
computers learn autonomously. There are several types of
M-Commerce: See Mobile Commerce. learning: inductive, abductive, and by analogy. Data mining
integrates many techniques from inductive learning,
M-CLIP devoted to learn general models from data. (Hernandez-
A structured, expanded proile of information needs, Orallo, 2005b) 3: A discipline that comprises the study of
used in conjunction with specialized templates to aid how machines learn from experience. (Lodhi, 2005) 4: A
in the identiication of critical intelligence needs, an ield of computer science concerned with the question of
expansion mechanism to help insure that no key concepts how to construct computer programs that automatically
are overlooked, and an adaptive mechanism to remove improve with experience. The key algorithms that form
ineffective topics. (Parker & Nitse, 2006) the core of machine learning include neural networks,
genetic algorithms, support vector machines, Bayesian
M-CRM networks, and Markov models. (Pantic, 2005b) 5: A
Interactions between a company and its customers for research area of artiicial intelligence that is interested
marketing, sales, and support services through the mobile in developing solutions from data or in an interactive
Web and wireless channel. (Chan & Fang, 2005) environment alone. (Kayacik et al., 2005) 6: A study of
how computers can be used automatically to acquire new
M-Government: See Mobile Government. knowledge from past cases or experience, or from the
computers own experiences. (Liu, 2005) 7: A sub-ield of
M-Learning: See Mobile Learning. artiicial intelligence. The idea is that a computing system
could perhaps learn to solve problems in much the same
M-Security: See Mobile Security. way that humans do, that is to say, by example. A program
is needed that learns the concepts of a domain under
MA: See Multiple-Access. varying degrees of supervision from a human teacher.
In one approach, the teacher presents the program with a
MAC: See Medium Access Control; Mandatory Access set of examples of a concept, and the programs task is to
Control. identify what collection of attributes and values deines the
concept. (Hamdi, 2005b) 8: An area of artiicial intelligence
Machine Interactivity involving developing techniques to allow computers to
Interactivity resulting from human-to-machine or learn. More speciically, machine learning is a method
machine-to-machine communications. Typically, the later for creating computer programs by the analysis of data
form is of less interest to most human-computer studies. sets rather than the intuition of engineers. (Denoyer &
(El-Gayar et al., 2005) Gallinari, 2005) 9: An area of artiicial intelligence, the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
424 M a chine Le a r ning Syst e m M a in Dist ribut ion Fra m e (M DF)

goal of which is to build computer systems that can adapt Magic Lantern
and learn from their experience. (Tzanis et al., 2005) 10: An e-mail containing an attachment that, if opened, would
M Artiicial intelligence methods that use a dataset to allow insert a Trojan horse that is activated upon launch of
the computer to learn models that it the data. (Cunningham the popular encryption program, Pretty Good Privacy.
& Hu, 2005) 11: Sub-area of artiicial intelligence that Then it sends all the keystrokes the unwitting user types.
includes techniques able to learn new concepts from a set (Friedman, 2005)
of samples. (de Carvalho et al., 2005)
Magic Set
Machine Learning System Given SQL query with a correlated, nested subquery,
An information system that mimics the human learning the magic set is the set of values that are relevant for the
process and delivers the knowledge to users. (Forgionne, computation of the subquery as parameters. This set is
2005) obtained by computing all conditions in the outer query,
except the one involving the subquery. (Badia, 2005a)
Machine Learning Technique
One of several techniques that can automatically improve Magic Set Technique
computational models based on experiences. (Wen et al., Binding propagation technique based on the rewriting of
2005) the source query, with respect to the query goal, into an
equivalent query which simulates top-down evaluation by
Machine Translation (MT) bottom-up query computation engines so that irrelevant
1: A computer program to translate text written in one facts are not considered. (Greco & Zumpano, 2005b)
natural language into another. (OHagan, 2005) 2: Using
special software programs to translate passages of written Magnitude Response
text from one language to another. (St.Amant, 2005e) 1: Absolute value of the complex frequency response.
(Jovanovic-Dolecek, 2005c) 2: The absolute value of the
Machine Vision Fourier transform of the unit sample response. For a real
A ield of computer science concerned with the question impulse response digital ilter, the magnitude response is
of how to construct computer programs that automatically a real even function of the frequency. (Jovanovic-Dolecek,
analyze images and produce descriptions of what is imaged. 2005a)
(Pantic, 2005b)
Mail Client
Machine-Readable Cataloging Record (MARC) A software process that moves mail from a message store
A standard for the representation and communication of and presents it to a user. (Horiuchi, 2005b)
bibliographic and related information in machine-readable
form, developed by the Library of Congress. (Hnisch, Mail Server
2005) A software process that receives mail from other mail
systems and manages the message store. (Horiuchi,
Macro-Ecology of Information 2005b)
The study of information (cognition) as a whole, and
concerned with aggregates across nations and markets. Mail Survey
(Targowski, 2005) A traditional survey technique in which a multi-part
survey questionnaire is mailed to a randomized sample
Macromedia Flash of individuals (within a larger population) who are asked
Vector-based animation software program produced to complete the questionnaire and return it to the survey
by Macromedia Corporation. (Szabados & Sonwalkar, researcher for tabulation and analysis. (Baim, 2005)
2005)
Main Distribution Frame (MDF)
Macropayment The apparatus in the local concentrator (exchange) building
Any payment typically over $20. (Karnouskos & Vilmos, where the copper cables terminate and where cross-
2006) connection to other apparatuses can be made by lexible
jumpers. (Chochliouros et al., 2005c)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M a in M e m or y M a na ge m e nt I nfor m at ion Syst e m (M I S) 425

Main Memory Man-in-the-Middle


Memory that is used for storing data and program code, Intruders set up a base station transceiver with a modiied
and that can be directly accessed by the processor (random phone and put themselves in between the target user
M
access memory). (Meixner, 2005) and a genuine network. The intruders have the ability to
eavesdrop, modify, delete, re-order, replay, and send spoof
Maintainability signaling. (Lei et al., 2005a)
The ease with which a software system or component
can be modiied to correct faults, improve performance Managed Learning Environment (MLE)
or other attributes, or adapt to a changed environment. 1: Can be considered a enterprise-level, large-scale e-
(Schneidewind, 2005) learning application. Aims to provide the whole range
of information services an educational institution would
Maintenance, Repair, and Operations (MRO) require to enable and support the learning process and
Supplies and services purchased for use internally in the its operation. A key part of the functionality provided by
company, often referred to as indirect or non-production an MLE is connectivity to all elements of an educational
supplies and services (such as ofice supplies, computer institutions information systems. (ODea, 2005) 2: A
equipment and repairs, cleaning supplies, etc.). These collection of learning resourcesincluding support
tend to be low unit cost, low volume, and off-the-shelf materials, activities, and interactionsorganized and
purchases. (Archer, 2005) presented to the user, in a way that relects the users
changing status. The MLE enables the user to engage
Major Project systematically with the learning resources, and to discover,
A multi-million-dollar IT development and implementation organize, relect, communicate, and publish materials to
project often deined as strategic due to its high priority the system. It also contains a range of management and
and organizational impact. (Fernndez, 2005) administration tools to support the learning process.
(Torres-Coronas, 2005)
Mal-Process
A sequence of actions that a system can perform, interacting Management Fraud
with a legal user of the system, resulting in harm for the A situation in which management misrepresents the
organization or stakeholder. (Sundaram & Portougal, inancial condition of their irm. They may do so for
2005a) personal inancial gain or to disguise the inancial results
of their company. (Lenard & Alam, 2005)
Malicious Adversary
An adversary who may arbitrarily deviate from the protocol Management Information
speciication (and so is unlimited in its attack strategy). A term that covers a wide variety of sources and types of
(Lindell, 2005) information that may prove valuable to the decision making,
management, and control of an organization. This term
Malicious Software would include quantitative and qualitative information
1: Generic term for a variety of well-known and less types, internal and externally sourced information, as
well-known means of disrupting or damaging computer well as classifying the information in terms of its quality
systems and users. (Drake, 2006) 2: Harmful software, (e.g., accuracy, detail, relevance, timeliness). (Ritchie &
such as applications that set the users browser homepage Brindley, 2005)
to a Web site (e.g., points to an adult content) without
the users intentions, applications that install viruses Management Information System (MIS)
without the users knowledge, or applications that report 1: A business information system designed to provide
information about the user without permission to do past, present, and future information appropriate for
so (spyware). Some applications can also be known as planning, organizing, and controlling the operations of an
malware. (Owen, 2006d) organization. (Duan & Xu, 2005) 2: A form of software
that provides information needed to make informed
MAML: See Microarray Markup Language. decisions about an organization or entity; a formalized
way of dealing with the information that is required in
MAN: See Metropolitan Area Network. order to manage any organization. (Rahman, 2005e) 3: The

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
426 M a na ge m e nt of DE De live r y M a nufa c t uring M ode

management of information systems and data, including Managerial Inluence


management of the design, development, implementation, Administrative efforts undertaken by an entity that affect
M and maintenance of information systems. Sometimes its conduct of knowledge management. (Holsapple &
referred to as information system. (Scime, 2005a) 4: Joshi, 2006)
System utilized by management-level employees to seek
information pertaining to the operations of their business. Managerial Investment Flexibility
The information gives management insight into potential Flexibility in the timing and the scale of an investment
market or inancial trends, as well as the productivity and provided by a real investment option. (Li, 2005b)
eficiency of their employees and equipment. (Carstens,
2005) Managing by Numbers
A school of thought that sought to demonstrate that irms
Management of DE Delivery could be managed solely based on watching key (mostly
The arrangement, organization, and execution of all inancial) indicators. This is now largely discredited.
distance education activities, including its policies and (Adam & Pomerol, 2005)
processes. (Naidu, 2005b)
Mandatory Access Control (MAC)
Management Style A model expressed with the use of security labels associated
Refers to the way the small business owner delegates with both subjects and objects. (Pallis et al., 2005)
authority and responds to new technologies and innovative
practices. This is demonstrated by work role and by Mandatory (Online) Interaction
patterns of actions that inluence various aspects of the IT The requirement that learners must communicate directly
implementation process. (Winston & Dologite, 2005) and in a prescribed way with other online learners so as
to satisfy the conditions for succeeding in a structured
Management Support course. The learner generally cannot choose his or her
1: Managers can provide degrees of support for IT. For level of participation in, and often has little control over,
example, some managers take the lead role as they are keen the learning environment. (Teghe & Knight, 2005)
to see the organization adopt a new system, for example,
the Internet. Other managers may take a less active role, for Mandatory (Online) Participation
example, by giving approval for inancial expenditure but The requirement that learners must engage with one or
not getting involved in the project. (Cragg & Suraweera, more online learning environments in order to conduct a
2005) 2: Managers can provide support for an innovation set of prescribed activities so as to satisfy the conditions
project. However, this support can be offered in various for succeeding in a structured online course. It may or
ways. For example, some managers take the lead role in a may not involve mandatory online interaction. (Teghe &
project (e.g., as a project champion or project manager), as Knight, 2005)
they are keen to see the organization adopt the innovation.
Other managers may adopt a less direct role, for example, Mandatory Security
by giving approval for inancial expenditure but not getting A form of security in which access to data items is restricted
involved in the project. (Cragg & Mills, 2005) to cleared database users. (Haraty, 2005a)

Management Support System (MSS) MANET: See Mobile Ad Hoc Network.


A system that integrates DSS, EIS, and ES/KBS to offer
full support to the decision maker in all phases of the Manufacturing
decision-making process. (Forgionne et al., 2005) Speciic form of production processes based on mechanical
technologies and activities. (Blecker, 2006a)
Managerial Approach to E-Government
A way to study e-gover nment that emphasizes Manufacturing Mode
administrative processes, eficiency, and effectiveness In manufacturing mode, technocrats standardize
as the most important goals of e-government initiatives. procedures and outputs. (Rada, 2005)
(Almazn & Gil-Garca, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M a nufa c t uring Re sourc e Pla nning (M RP I I ) M a rke t Drive r for Dist a nc e Educ at ion 427

Manufacturing Resource Planning (MRP II) Marginal Utility


1: Closed-loop MRP, enhanced with some inancial The relative satisfaction gained from consuming additional
modules for production costing and creditor management, units of a commodity. For many commodities, marginal
M
usually running on a single integrated technical platform. utility diminishes (for example, a cream bun). (Taylor,
MRP II was the immediate pre-cursor of Enterprise 2005)
Resource Planning systems. (Carton & Adam, 2005) 2:
Extends MRP by addressing all resources in addition to Marginality
inventory. MRP II links material requirements planning A situation resulting from the deinition of a boundary
with capacity requirements planning, avoiding over and over what is to be included in the mainstream of activities
under shop loading typical with MRP. (Bradley, 2005) of a community of practice. Marginality can be deined
in terms of non-participation in a community. (Crdoba,
Map Generalization 2006a)
The process used to convert spatial data from one scale-
dependent representation into another by calculating the Marginalization
geometry of a more abstract object through the union of the The idea that availability of ICTs will serve further to
geometries of lower level objects. (Pourabbas, 2005a) marginalize poor people. (Pryor, 2005)

Mapping Mark-to-Market Accounting


1: The process of locating genes on a chromosome. (Tzanis Whenever companies have outstanding or other derivative
et al., 2005) 2: The relationship between controls and their contracts (either assets or liabilities) on their balance sheets
effects in the world. (Yong, 2005) at the end of a particular quarter, they must adjust them
to fair market value, booking unrealized gains or losses
Mapping Method to the income statement of the period. (Wang, Chen, et
A formal process of transforming a schema level (such as al., 2006)
conceptual schema) to another schema level (such as logical
schema) in a database system. (Taniar et al., 2005) Market Basket
An itemset; this term is sometimes used in the retail
MARC: See Machine-Readable Cataloging Record. data-mining context, where the itemsets are collections
of products that are purchased in a single transaction.
Margin (Butler & Webb, 2005)
A real-valued function. The sign and magnitude of the
margin give insight into the prediction of an instance. Market Basket Analysis
Positive margin indicates correct prediction, whereas The process of looking at the transaction or market basket
negative margin shows incorrect prediction. (Lodhi, data to determine product afinities for each item in the
2005) basket. (Ale & Rossi, 2005)

Marginal Cost Market Channel


Cost of repeating an activity, beyond the ixed costs initially A publicly accessible means such as a newspaper, magazine,
incurred. (Fisher, 2005) trade show, radio, billboard, television, or the Internet,
used to advertise, market, and distribute products. (Braun,
Marginal Cost of E-Learning 2005c)
The actual cost to provide the next unit of learning.
(Norris, 2005) Market Driver for Distance Education
One of the key elements that seem to be driving the diffusion
Marginal Independence and usage of distance education in the marketplace. (Martz
Two sets X and Y of variables are marginally independent, & Reddy, 2005)
if knowledge on Y is irrelevant to guessing the value of
X. (Xiang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
428 Market Eficiency Theory Marketing

Market Eficiency Theory Market Segment


A inancial theory that states that stock market prices The components of the total market. Consumers in the
M relect all available, relevant information. (Hou, Sheng, same segment are with similar attributes in certain aspects.
et al., 2005) Virtual community is like a market segment in that its
members are brought together by certain characteristics
Market Mediation Cost such as areas of interest, demographics, and so on. (Wang,
Cost associated with lost sales and customer dissatisfaction Wei, et al., 2006)
due to stock-outs, as well as lower proits due to product
markdowns on unsold goods. (Setzekorn et al., 2005) Market Segmentation
A central concept in marketing theory and practice; involves
Market of Resources identifying homogeneous sub-groups of buyers within a
An institutionalized organizational framework and service heterogeneous market. It is most commonly conducted
assuring the agile/virtual enterprise (A/VE) dynamic using cluster analysis of the measured demographic or
integration, reconiguration, and business alignment. The psychographic characteristics of consumers. Forming
operational aspect of the market of resources consists groups that are homogenous with respect to these measured
of an Internet-based intermediation service, mediating characteristics segments the market. (Voges, 2005)
offer, and demand of resources to dynamically integrate
in an A/VE, assuring low transaction costs and partners Market Size Within the Network Marketing
knowledge preservation. Brokers act within the market Industry
of resources as the intermediation agents for agility Number of individuals and/or companies that are network
and virtuality. Its implementation is as an independent marketing distributors who could beneit from e-learning.
organization/company, independent from the offer and the (D. Wright, 2005)
demand sides of A/VE integrationthat is, independent
from the market participants, in order to assure impartiality, Market Stratiication
fairness, and trust, being able to monitor the activities of When the market potential for various course materials
all the participants (including brokers) and to enforce the considered and thought is given to how to re-purpose the
accomplishment of contracts between parties. (Cunha & educational material. (Robinson, 2005)
Putnik, 2005)
Market Structure
Market Orientation Governs the trading process and deines the formal rules for
The portion of a companys marketing strategy that market access, traders interactions, price determination,
continuously collects information and knowledge about and trade generations. (Ghenniwa & Huhns, 2005)
customer needs and competitor capabilities. The company
must have the ability to scan the environment and acquire Market Thinness
information related to its business operations. Also, the Also known as market imperfections, it occurs where
internal capability of utilizing this knowledge to create the structure of the market (i.e., low trade volumes, few
superior value for the customer must also exist in the buyers and sellers, scarcity of market information, barriers
form of knowledge-based business processes. (Paquette, to entry) inhibits or prevents prices from attaining the
2006b) relationships that characterize perfect markets. (Rhodes,
2005)
Market Performance Measure
Measure of impact that focuses on event studies, market Marketing
valuation of common equity, and Tobins q as used to assess The set of tasks and business activities with which to ind
impact of investment in information systems technology. and stimulate buyers to consume the irms output through
(Dykman, 2005) the relationship between producers and consumers, and
the central notion of an exchange between participants.
Market Research (Rhodes, 2005)
An activity that is carried out to determine the potential
customers who are willing and able to purchase a irms
products or services. (Singh, 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M a rke t ing Cha nne l M a ss-Spring Syst e m 429

Marketing Channel determines probabilities for the next event, or state, given
The access to the market for product producers and service the result of the previous event. (Guster et al., 2005)
providers. Virtual community is a form of marketing
M
channel in that it provides business with access to reach Markov Random Field (MRF)
and communicate with potential consumers. (Wang, Wei, A set of random variables deined over a graph, where
et al., 2006) dependencies between variables (nodes) are deined by
local cliques. (Caelli, 2005)
Marketing Intelligence
Refers to the act of gathering information about a Markup
speciic audience. Marketing intelligence is an attempt Syntactically delimited characters added to the data of
to quantify potential participants for a speciic program. a document to represent its structure. (Kamthan & Pai,
The information gathered informs program administrators 2006)
as to how they might organize the prospective program,
as well as who they will be trying to sell the program to MAS: See Multi-Agent System.
directly. (Riffee & Sessums, 2005)
Mass Customization
Marketing Optimization 1: Business strategy often applied in e-business that aims at
Delivering the best treatments to the right individuals. satisfying the customers individual needs with near-mass-
(Lo, 2005) production eficiency. In essence, mass customization
describes the ability of a irm that provides customized
Marketing Research goods in high volume for mass markets by deriving a high
An activity carried out among existing customers to number of variants from a single or a few core products.
determine their level of satisfaction with the irms (Blecker, 2006b) 2: Producing basically standardized
products or services. Marketing research is also carried goods, but incorporating some degree of differentiation
out to determine the effectiveness of a irms marketing and customization. (Sarkis & Sundarraj, 2005) 3: The
activities. (Singh, 2006a) customization of products and services for individual
customers, but at a mass-production price. (Anke &
Marketplace Sundaram, 2006)
1: A type of a market that corresponds to a central
location that enables buyers and sellers to rendezvous. Mass Dataveillance
A marketplace is typically implemented as a blackboard Suspicion-less surveillance of large groups of people.
where sellers post information about items being offered. (Cook, 2005)
Buyers make offers to sellers, and sellers respond with
counteroffers. (Dasgupta et al., 2006) 2: Are usually Mass Rebellion
globally organized specifying services or product templates Cyber-identity thieves may use decentralized, mass
that can be offered by different vendors. The marketplace rebellion sites. These peer-to-peer environments (e.g.,
is a matchmaking mechanism that brings potential process Kazaa Media Desktop) allow individuals to share iles over
providers together with potential users of these processes. the Internet. Cyber-identity thieves may use such peer-
(Tahinakis et al., 2006) to-peer networks to install virus software, which records
data such as Web site visitation and any information that
Marketspace is entered to a non-secure site. (Close et al., 2006)
Electronic transaction methods, or electronic markets,
in which businesses and consumers interact. (Dholakia, Mass Value
Zwick, et al., 2005) A positive function of the level of exact belief in the
associated proposition (focal element). (Beynon, 2005a)
Markov Chain
1: A inite state machine with probabilities for each Mass-Spring System
transition, that is, a probability that the next state is sj A set of particles linked by springs. Each particle is
given that the current state is si. (Li, 2005) 2: A model that characterized by a 3D position and a mass, and is linked

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
430 Massiication Materialized View

to its neighbors by springs (with their own physical Material Requirements Planning (MRP)
properties). This method can simulate the different existing MRP, originating in the early 1960s, was a computerized
M mechanical interactions of a deformable object. (Volino approach to the planning of materials acquisition and
et al., 2005) production for more complex manufacturing processes
where interdependencies between components exist.
Massiication The application of computers to MRP was a signiicant
Widespread adoption of technology, bringing with it initial step in the evolution of ERP systems. (Carton &
uniformity. (Laws et al., 2005) Adam, 2005)

Mastery Learning Material Requirements Planning System


A learning philosophy that holds that any learner can learn Processes that use bills of materials, inventory data, and
anything, and that the only difference is the amount of a master productions schedule to time phase material
time that it takes any particular learner to learn. Mastery requirement, releasing inventory purchases in a manner
learning was initially deined by John Carroll in 1963 and that reduces inventory investment yet meets customer
further reined by Benjamin Bloom in 1976, emphasizing a requirements. (Bradley, 2005)
well-structured set of learning activities guided by learning
objectives. (Twigg, 2005) Material Safety Data Sheet (MSDS)
The source of the data to effectively communicate the
Matching hazard potential of different materials to users. Required
The process of inding a it between an organizational by the Hazard Communication Standard. (Jeong et al.,
problem and an innovation to resolve the problem. (Klobas 2006)
& Renzi, 2005a)
Materiality
Matching Mechanism The way in which the manner of material realization of
Part of the well-deined set of rules for determining the an idea on the part of the artist or designer implicates
terms of an exchange of something for money. (Janssen, subsequent experience of it. (Kettley, 2006a)
2005)
Materialized Hypertext
Matchmaking A hypertext dynamically generated from an underlying
1: The problem of providing satisfactory responses to database and physically stored as a marked-up text ile.
requests in an open environment. Responses are searched (Sindoni, 2005a)
among the available offers, searching the most appropriate
to satisfy the request. (Colucci et al., 2006) 2: Web service Materialized Hypertext View
matchmaking is a process by which the parties that are A hypertext containing data coming from a database and
interested in having an exchange of economic value are whose pages are stored in iles. (Sindoni, 2005b)
put in contact with potential counterparts by matching
together the features required by one party and provided Materialized View
by another. (Jain & Ramesh, 2006) 1: A materialized view physically stores data. Data is
extracted from the database source (view domain) at view
Material Acquisition deinition time. Data are thus duplicated in the view, and
A process of material information collection by query evaluation is more eficient. Nevertheless, every
recommendations of users, vendors, colleges, and so forth. database update operation must be reported on materialized
Information explored in databases can be also used. The views to guarantee data consistency. (Cannataro et al.,
collected information is, in general, used in purchasing 2005) 2: A particular form of query whose answer is stored
materials. (Wu & Lee, 2005) in the database to speed up the evaluation of further queries.
(Tininini, 2005a) 3: A view that is computed at deinition
Material Category time and stored on disk as a regular relation. Materialized
A set of library materials with similar subjects. (Wu & views offer the advantage that they can be used to pre-
Lee, 2005) compute part of a query and then reused as many times as

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M at h Anx ie t y M CM C 431

needed. The main challenge about materialized views is to Matrix


keep them updated when the relations on which they were An arrangement of rows and columns to display quantities.
deined change; incremental techniques are used to make A matrix contains quantities arranged in p rows and q
M
this eficient. (Badia, 2005a) 4: A view whose answer is columns (i.e., each row has q quantities, and each column
stored in the date warehouse. (Theodoratos & Simitsis, has p quantities). (Lee, Peterson, et al., 2005)
2005) 5: A view whose values have been pre-computed
from certain base data and stored. (Lu, 2005) MATRIX: See Multi-state Anti-Terrorism Information
Exchange.
Math Anxiety
The psychological fear or anxiety associated with engaging Maturity Level
in mathematical activity. Characteristics of math anxiety A level of the CMM reached by the attainment of a clearly
are an above-average number of negative attitudes (e.g., deined set of capabilities, expressed as Key Process Areas.
nervousness, solitude, uneasiness, and low conidence) (Berztiss, 2006a)
and/or intense emotional reactions to math based on past
experiences. Math anxiety and test anxiety are generally MAV: See Mobile Added Value.
signiicant correlates and somewhat resemble computer
anxiety as a situational manifestation of a general anxiety Maximal Frequent Sequential Pattern
construct. (Kase & Ritter, 2005) A sequential pattern included in at least n data sequences
(with n the minimum support speciied by the user). A
Mathematical Knowledge Management (MKM) sequential pattern is maximal when it is not included in
A new interdisciplinary ield of research in the intersection another frequent sequential pattern. A frequent sequential
of mathematics, computer science, library science, and pattern may represent, for instance, a frequent behavior
scientiic publishing. The objective of MKM is to develop of a set of customers, or a frequent navigation of the users
new and better ways of managing mathematical knowledge of a Web site. (Masseglia et al., 2005)
using sophisticated software tools. (Farmer, 2006)
Maximal-Proit Item Selection (MPIS)
Mathematical Model The problem of item selection, which selects a set of items
A model of certain mathematical aspects of the world. in order to maximize the total proit with the consideration
Mathematical models come in many forms. A common of cross-selling effect. (Wong, & Fu, 2005)
form is a collection of objects together with a collection
of operations on and relationships between the objects. Maximum Likelihood
(Farmer, 2006) Method of point estimation using as an estimate of an
unobservable population parameter the member of the
Mathematical Program parameter space that maximizes the likelihood function.
An optimization problem characterized by an objective (Bashir et al., 2005)
function to be maximized or minimized, and a set of
constraints. (Musicant, 2005) MBone
The virtual Internet backbone for IP multicast. (Fortino,
Mathematical Representation 2005)
Concrete, pictorial, and symbolic models used to represent
mathematical ideas. (Nason & Woodruff, 2005b) MBS: See Mobile Base Station.

Matlab Demographic Surveillance System MC: See Mobile Commerce.


A demographic surveillance system of about a size 200,000
population in a rural area of Bangladesh that has been MCAR: See Data Missing Completely At Random.
maintained since 1966. The surveillance system collects
vital demographic data of the study population on a routine MCMC
basis. (Ali et al., 2005) Markov chain Monte Carlo computational algorithms
for estimating multi-dimensional integrals. (Rippon &
Mengersen, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
432 M CPC M e a sure m e nt Dat a St re a m

MCPC: See Multiple Channel Per Carrier. Measat-1


First East Asia Satellite. New generation satellite for
M MD: See Member Distance. direct users service by television users in homes as well
as institutions. (Lateh & Raman, 2005)
MDA: See Model-Driven Architecture.
Measure
MDDB: See Multi-Dimensional Database. 1: A measure attribute of an entity is an attribute of
interest whose value depends on the dimensions of the
MDF: See Main Distribution Frame. entity. Measure values are aggregated and analyzed in
OLAP. Examples are revenue and cost. (Riedewald et
MDL Principle: See Minimum Description Length al., 2005) 2: A numeric value obtained by applying an
Principle. aggregate function (like count, sum, min, max, or average)
to groups of data in a fact table. (Tininini, 2005c) 3: A
MDS: See Mobile Data Service. numeric value stored in a fact table or cube. Typical
examples include sales value, sales volume, price, stock,
Mean Perceived Quality of Service (MPQoS) and headcount. (Bellatreche & Mohania, 2005) 4: A
The averaged PQoS that corresponds to a multimedia process by which numbers or symbols are assigned to
service. (Koumaras et al., 2005) attributes of entities in the real world in such a way as to
describe them according to clearly deined rules. (Xenos,
Meaning Attribution 2006) 5: Substantially a quantitative tool. It may rely on a
An intellectual activity involving ones body of direct comparison of performance before and subsequent
linked connotations of personal or collective interest, to the initiation and establishment of a KM strategy. The
discrimination, and valuation which we bring to the organization may choose to measure its performance in
exercise of judgment and which tacitly determine what market competitiveness and acceptance, or it may look at
we shall notice, how we shall discriminate situations of the contribution of the KM strategy to inancial beneits
concern from the general confusion of ongoing events, and viability. It can also measure contributions to and
and how we shall regard them. (Vat, 2006a) the growth in the volume of explicit knowledge content
stored and used by staff. Some knowledge managers
Meaning Making may regard the increase in the resources attached to the
The constant goal of humans is to understand the world project as a measure of the acceptance and, hence, the
we ind ourselves in. Meaning is arrived at continuously understanding of the value of KM to their organization.
through social interactions with other individuals. (Kettley, (Zyngier, 2006) 6: The process of determining values
2006b) representing performance, or the results of the process. For
example, the measurement process is now started, or the
Meaningful Outcome measurement was 35 days. (Holstein & Crnkovic, 2005)
Operationally measured in most research as transfer or 7: When measuring some attribute of a set of elements, we
problem solving. More generically, meaningful outcomes can go through the process of assigning numbers or other
refer to outcomes that are typically dificult yet essential symbols to the elements in such a way that relationships
for students to master. (M. Mitchell, 2005c) of the numbers or symbols relect relationships of the
attribute being measured. (Polgar, 2005b) 8: Dynamic,
Means numeric values associated with dimensions found through
Ways and resources to achieve ends. (Kaufman & Lick, drilling down into lower levels of detail within decision
2005) support systems. (DeLorenzo, 2005)

Means-End Theory Measurement Data Stream


A theoretical framework based on the idea that consumers Data stream representing successive state information of
seek out or prefer speciic products and product attributes one or more entities, such as sensor, climate, or network
because they serve as a means to achieve desired end measurements. (Chatziantoniou & Doukidis, 2005)
states. (Porter, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M e a sure m e nt T he or y M e diat e d I nt e ra c t ion 433

Measurement Theory Media Player


A branch of applied mathematics that is useful in A device or software application designed to play a variety
measurement and data analysis. The fundamental idea of of digital communications media such as compressed audio
M
measurement theory is that measurements are not the same iles (e.g., MPEG MP3 iles), digital video iles, and other
as the attribute being measured. (Polgar, 2005b) digital media formats. (Garrett, 2006b)

Mechanical Approach Media Rich


Means a (too) business-process-oriented approach such as Adjective describing the use of non-text media, such as
building knowledge databases in rigid business process images, sound, or video. (Fagan, 2005)
cycles. (Yamazaki, 2006)
Media Richness
Mechanistic Memory 1: The extent to which a communication medium can
Refers to information accessed from mechanical systems. facilitate shared understanding among the communicating
(Goldsmith & Pillai, 2006) partners. (Chan, Tan, et al., 2005) 2: Theory postulating
that media selection depends on the uncertainty of the
Mechanistic Pooling of Knowledge task at hand. The more complex the media format, the
Occurs when each team member works independently on more information can be delivered in a message. (Hsu &
a set of clearly deined tasks or processes with which he or Kulviwat, 2006)
she is familiar and uses his or her existing knowledge to
consider the potential of the new scientiic/technological Media Richness Theory
breakthrough on the particular problem domain. (Newell, 1: Theory on mediated communication that highlights
2006) the extent to which a medium is capable of sending rich
information (i.e., text, smell, pictures, noise, etc.), as well
MedCarib as the proposition that media use is most adequate if the
A database of the health literature of the Caribbean. medium is matched with the complexity of the task at
(Lewis, 2005) hand. (Verburg et al., 2005) 2: Theory that claims that lean
media are not appropriate for knowledge and information
Media communication (i.e., equivocality and uncertainty
1: In a public relations context, these are channels for reduction), and that the adoption of media and the outcomes
delivery of organizational messages to target publics. of their use will usually relect this fact. (Kock, 2006)
(Galloway, 2006) 2: Information is exchanged. The physical
path of the exchange comprises media. (Marcinkiewicz & Media Search Engine
McLean, 2005b) 3: The various means by which messages A Web search engine designed to ind media (usually
are conveyed; for example, face-to-face, audio, written, images) on the Web. (N.C. Rowe, 2005b)
e-mail, video. (Moustafa, 2006)
Media Vocabulary Markup Language (MVML)
Media Encryption An XML-based language that describes a media element.
Any procedure used in cryptography to convert media (Verhaart & Kinshuk 2006)
objects into cipher media objects in order to prevent
any but the intended recipient from reading that data. Mediated Communication
(Fortino, 2005) Human interaction supported by any form of technology,
such as telephone, mass media, or Internet networking.
Media Literacy (Han & Hill, 2006)
Understanding how to use todays technology, that is,
how to operate equipment, use various software, navigate Mediated Interaction
the Internet, discriminate sources, and so forth. (Reilly, Involves the sender of a message being separated in time and
2005) space from the recipient. (Baralou & Stepherd, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
434 M e diat ing St ruc t ure M e doid

Mediating Structure Medical Image Mining


What coordinates the interaction between a user and a Involves extracting the most relevant image features into
M tool providing additional computational resources that a form suitable for data mining for medical knowledge
simplify the task. (Magnani & Bardone, 2006) discovery, or generating image patterns to improve the
accuracy of images retrieved from image databases. (Liu
Mediation et al., 2005)
1: A global service to link local data sources and local
application programs, thus providing the integrated Medical Transactional Database
information on the global level, while letting the component The database created from the billing and required
systems of the federation remain intact. (Balsters, 2005) reporting transactions of a medical practice. Clinical
2: An alternative dispute resolution method. The litigating experience is sometimes required to understand gaps and
parties may voluntarily submit a dispute to a neutral, inadequacies in the collected data. (Breault, 2005)
independent mediator. This latter does not issue a decision,
but supports the parties in inding a mutually agreed upon Medium-Access Control (MAC)
solution. (Cevenini, 2005) 3: The semantics-preserving 1: A protocol layer above the network layer that provides
transformation of a message in one message format into controlled access to several subscribers that request
a message of a different message format that represents simultaneous access. (Louvros, Karaboulas, et al., 2005) 2:
the same information. (Bussler, 2005a) The lower sub-layer of the OSI data-link layer: the interface
between a nodes logical link control and the networks
Mediator physical layer. The MAC sub-layer is primarily concerned
1: A software component providing a uniform integrated with breaking data up into data frames, transmitting the
interface to process and execute queries over data stored frames sequentially, processing the acknowledgment
in multiple, heterogeneous data sources. (De Antonellis frames sent back by the receiver, handling address
et al., 2005) 2: Systems that ilter information from one or recognition, and controlling access to the medium. (Dhar,
more data sources that are usually accessed using wrappers. 2005) 3: According to the OSI terminology, an interface
The main goal of these systems is to allow users to make between the physical layer and LLC sub-layers. (Markhasin
complex queries over heterogeneous sources, as if it was et al., 2005)
a single one, using an integration schema. Mediators
offer user interfaces for querying the system, based on Medium Access Control Protocol
the integration schema. They transform user queries into A set of rules, algorithms, and interfaces that deine and
a set of sub-queries that other software components (the control access to a common medium. (Markhasin et al.,
wrappers), which encapsulate data sources capabilities, 2005)
will solve. (Aldana Montes et al., 2005)
Medium Business
Medical Data Term used to describe businesses that are too large to be
Frequently demonstrate increased complexity (e.g., considered as being small and too small to be considered as
uncertainty) and occurrence in large volumes, possibly being large. This somewhat vague description is matched
distributed over many sources. There may be images by the varying deinitions of medium-sized businesses
involved and a high frequency of non-standardization that are around. In relation to use of IT, medium-sized
(especially in the context of electronic medical records) in businesses usually exhibit more of the characteristics of
coding schemes and other medical concepts utilized. Data larger businesses than smaller ones. (Burgess, 2005)
security, accuracy, and privacy are particular issues with
medical data, as are the ethical issues involved in what is MEDLINE
done with the data. (George, 2005a) A CD-ROM database of medical literature in journals
produced by the National Library of Medicine, United
Medical Data Mining States. (Lewis, 2005)
The application of data-mining methods to medical data,
typically for clinical or administrative and medical research Medoid
investigation use, particularly in epidemiological studies. The most centrally located object in a cluster. (Fung et
(George, 2005a) al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M e ga -U nive rsit y M e nt oring/Tut oring 435

Mega-University Mental Model


A large distance education program, often known as an 1: The collection of concepts and relationships about the
open university, with total enrollment exceeding 100,000. image of the real-world things we carry in our heads. For
M
(Laws et al., 2005) example, one does not have a house, city, or gadget in his
or her head, but a mental model about these items. (Qudrat-
Member Ullah, 2006) 2: A mental recreation of the states of the
1: Anyone with formal membership to a community, world reproduced cognitively in order to offer itself as a
according to community-consented criteria. (Porto Bellini basis for reasoning. (Alkhalifa, 2005b) 3: A model stored
& Vargas, 2006) 2: Every criterion in a dimension is and processed in a persons mind. (Maceield, 2006) 4:
materialized through a member. (Schneider, 2005) The content and structure of an individuals knowledge.
(Shapiro, 2006)
Member Distance (MD)
Relects overall differences in approach among the Mental Scheme
members due to objective factors (e.g., members The set of concepts, and dependencies among them, that
experience, etc.) and subjective factors (e.g., members individuals carry out for facing the problem of interpreting
values, etc.). (Choudhary, 2005) phenomena, without any reference to scientiic knowledge
or disciplinary paradigms. (Cartelli, 2005a)
Member Support Function of VC
One of three functions of a virtual community that draws Mentee
people to the community and meets their needs. (Chuang, 1: A person beneiting from the experience and knowledge
2006) of another person. (Switzer, 2005) 2: Participant of a
mentoring program; student or equivalent; being advised.
Membership (Hkkil & Beekhuyzen, 2006)
Feelings of belonging in a virtual community. (Signoret,
2006) Mentor
1: A person providing knowledge, guidance, and support
Membership Lifecycle to a less experienced person. (Switzer, 2005) 2: Participant
Stages in a virtual community membership lifecycle of a mentoring program; the advisor. (Hkkil &
visitor, novice, lurker, participant, elder, and dropout. Beekhuyzen, 2006) 3: Someone who guides another to
(Shan et al., 2006a) excel. (Gangeness, 2005)

Membranophones Mentoring at a Distance


Category of musical instruments; skin drums. Examples: Using computer technologies to participate in the act of
daraboukka, tambourine. (Wieczorkowska, 2005) mentoring. Also referred to as telementoring or virtual
mentoring. (Switzer, 2005)
Memorability
How easy it is to remember how to use a system, once Mentoring/Tutoring
learned. (Yong, 2005) 1: The task of providing formal or informal advice,
support, and knowledge to another person by someone
Memory Footprint of substantial experience who nurtures the career of a
The memory usage during the execution of an application. protg. (Ribire & Romn, 2006) 2: A mentor and student
It depends on what kind of processor you intend to use relationship where the mentor serves as a role model and
and what components of the system you include. (Yow & trusted individual for the student to model and learn from
Moertiyoso, 2005) during the learning process. (Ally, 2005d) 3: A method
of teaching that has been used for hundreds of years; this
Memory Ownership design is incorporated into learning networks to develop
The proprietorship of memory faculties or the possession more effective learning practices and provide additional
of a set of memories. (Atkinson & Burstein 2006) support to the learner. (Neville & Powell, 2005) 4: One-
on-one training, in this case for the purpose of developing
MEMS: See Micro-Electromechanical System. effective online instructors. (Baker & Schihl, 2005) 5: The

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
436 M e nt oring Progra m M e ssa ging Syst e m

act of providing knowledge, guidance, and support by a Message


more experienced person to a less experienced person. 1: Any content (audio/written/visual) an organization
M (Switzer, 2005) wishes to deliver to a public in order either to inform or
to motivate them to a desired response. (Galloway, 2006)
Mentoring Program 2: Software objects interact and communicate with each
A process where a mentee is given a personal guide, a other using messages. (Wong & Chan, 2006) 3: What the
mentor, who has professional or otherwise advanced source produces (e.g., the spoken word, a written memo,
experience and can advise the mentee on the speciics a physical motion). It is assumed that meaning is encoded
about the particular ield of study and work in the industry. in the message and that the receiver is able to decode that
(Hkkil & Beekhuyzen, 2006) meaning. (Jacobson, 2006)

Menu Message Standard


A list of commands or options that appear on the computer Deines the attributes as well as possible values that a
screen and from which the user makes a selection. Most business has to use in order to support interoperable
software applications now have a menu-driven component electronic message exchange. (Bussler, 2005a)
in contrast to a command-driven systemthat is, where
explicit commands must be entered as opposed to selecting Message Store
items from a menu. (Henley & Noyes, 2006) The physical location where messages are held until a
mail client retrieves them. The type of ile or iles varies
Mercers Condition by software package. Some are monolithic database
A kernel function is said to obey Mercers condition for structures; some may be encrypted. Others are plain text
kernel validity iff the kernel matrix comprising pairwise iles. (Horiuchi, 2005b)
kernel evaluations over any given subset of the feature
space is guaranteed to be positive semideinite. (Aradhye Message-Based Service
& Dorai, 2005) Providing users real-time message services (e.g., short
message service (SMS), e-mail, and multimedia service).
Merchant Reputation System (Lee & Pai, 2005)
A system that collects, distributes, and aggregates
feedback about merchants past behavior from customers. Message-Oriented Middleware (MOM)
Though few consumers of the ratings know one another, Asynchronous by nature. MOM sends messages from
these systems help people decide whom to trust and also one application to another using a queue as a temporary
encourage trustworthy behavior. (M. Wang, 2006) storage area, like e-mail. (Wan et al., 2006)

Mereology Messaging
An ontology that examines part-whole relationships and the 1: In the context of an enterprise integration environment,
composition of various levels of matter itself. Mereologies messaging represents a communications system whereby
employ part-of relationships in examining essence, process, important packets of information or messages are sent to
occurrence, and the like. (Buchholz, 2006) and from queues by a software-based system known as a
messaging server. (Karakostas, 2005) 2: The general means
Merge/Purge of unidirectional data transmission. Messages may contain
The process of identifying duplicate records during the requests, responses, or notiications. (Fiege, 2005)
integration of data sources. Related data sources often
contain overlapping information extents, which have Messaging System
to be reconciled to improve the quality of an integrated A system enabling and facilitating communication among
database. (Koeller, 2005) team members. Communication among team members can
be one-to-one, one-to-many, and synchronous (IM and
Merise Approach chat) or asynchronous (e-mail, bulletin boards, discussion
Another way to calculate cardinality constraints. It limits lists). (Ferris & Minielli, 2005)
the participation of an entity in the relationship. (Cuadra
et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ETA Re fre sh M e t a bonom ic s 437

META Refresh are knowledge about ways in which knowledge is used


A special HTML tag that redirects the visitor to a new page. (e.g.,in these circumstances, it is useful to use Pythagorus
The result is that the inal destination of the navigation is theorem). (Fortier & Kassel, 2006)
M
different from the initial target. (Westin, 2005)
Meta-Learner: See Meta-Combiner.
META Tag
A type of HTML tag with a word, META. Web spiders Meta-Learning
read the information contained within META tags to index 1: Higher-order learning by adapting the parameters of a
Web pages. The information consists of keywords and a machine-learning algorithm or the algorithm deinition
description of its Web site. (Suh & Kim, 2005) itself, in response to data. An example of this approach
is the search-based wrapper of inductive learning, which
Meta-Analysis wraps a search algorithm around an inducer to ind locally
The statistical analysis of a group of relevantly similar optimal parameter values such as the relevant feature subset
experimental studies, in order to summarize their results for a given classiication target and data set. Validation set
considered as a whole. (Fisher, 2005) accuracy typically is used as itness. Genetic algorithms
have been used to implement such wrappers for decision
Meta-Combiner (Meta-Learner) tree and Bayesian network inducers. (Hsu, 2005a) 2:
Multi-level structure improving the learning process by Learning to predict the most appropriate algorithm for a
dynamic accumulation of knowledge about learning. Its particular task. (Muslea, 2005)
common topology involves base learners and classiiers at
the irst level, and meta-learner and meta-classiier at the Meta-Medium
second level; the meta-classiier combines the decisions A channel of channels, such as the Internet. This term
of all the base classiiers. (Bruha, 2005) conveys the sense of rich and complex media transmission
across a multiplexed channel of conveyance. Numerous
Meta-Governance motivations for use could arise related to such a complex
A new way to govern independent policy networks. The media venue. (Stafford, 2005)
politicians have to create the frames that make it possible
for other actors to participate in the policy process. They Meta-Model
have to specify the competence of the various actors and to 1: A model whose instances are the models of the class.
create meaning via a common understanding of the goals Models of a given meta-model are called similar. (Diskin
for the performance of the network. (Jaeger, 2005) & Kadish, 2005) 2: A model of model. (Fettke, 2005) 3:
An abstraction which deines the structure for a UML
Meta-Knowledge model. A model is an instance of a meta-model. Deines
1: General background knowledge that possesses a language to describe an information domain. (Riesco
a signiicant tacit component. It can be used in the et al., 2005)
performance of a range of organizational activitiessocial
and technical. Examples of meta-knowledge are individual Meta-Recommender
literacy, knowledge of a foreign language, and so on. Provides users with personalized control over the
This type of knowledge also is generally available within generation of a single recommendation list formed from
the irm and the industry as a whole; nevertheless, the the combination of rich recommendation data from multiple
widespread possession of such knowledge by individual information sources and recommendation techniques.
actors is important for an organizations general stock of (Schafer, 2005)
knowledge. (Butler & Murphy, 2006) 2: Knowledge which,
instead of relating to objects or events, is about knowledge. Metabonomics
There are several categories of meta-knowledge: some are The evaluation of tissues and biological luids for changes
knowledge properties (e.g., Pythagorus theorem was in metabolite levels that result from toxicant-induced
known to the Babylonians), others are knowledge about exposure. (Ge & Liu, 2005)
the state of knowledge of an individual (e.g., Mr. Brown
does not know Pythagorus theorem), and lastly others

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
438 M e t a busine ss M e t a m orphosis

Metabusiness relationships to other data items, location, scope, and other


A quasi-irm created through digital links among several features of the data item. (Pinheiro, 2005)
M companies, in such a way that it is almost impossible to
know exactly its boundaries. (Joia, 2005) Metadata Framework
A series of guidelines describing potential components
Metaclass required to deine, describe, publish, and maintain
A class whose instances are classes. (D. Brandon, Jr., metadata. (Yoon et al., 2005)
2005a)
Metadata Manager
Metacognition Manages the organization of the metadata store, which
1: Cognition about cognition. It includes monitoring the is a database containing meta information on the assets.
progress of learning, checking the status of self-knowledge, (Subramanian, 2005)
correcting self-errors, analyzing the effectiveness of
the learning strategies, controlling and changing self- Metadata Repository
learning strategies, and so on. (Seta, 2006) 2: If students An information store containing information about each
can develop metacognition, they can self-execute or self- data asset. Repositories act as catalogs and include technical
govern their thinking processes, resulting in effective information about data assets, their structures, how they
and eficient learning outcomes. (Kwok Lai-yin & Tan are used, and who is responsible for them. (Schwartz &
Yew-Gee, 2005) Schreiber, 2005)

Metacognitive Learning Skill Metadata Store


One of a set of active, self-regulated learning skills Contains information about the digital assets, typically in
involving knowing how to monitor ones learning, knowing an XML DTD format. (Subramanian, 2005)
how to learn, and knowing how to solve ill-deined
problems. (Aworuwa & Owen, 2005) Metadata Tagging Standard
Standard format of keywords used while self-archiving
Metacognitive Skill to identify, classify, and retrieve the archived works.
One of a set of learners individual skills to assess whether (Rennard, 2005)
the strategies they are using are effective. Learners use their
metacognitive skills to assess their level of achievement, Metaheuristic
determine alternate strategies, select the most appropriate A master strategy that guides and modiies other heuristics
strategy, and then reassess the level of achievement. (Ally, to produce solutions beyond those that are normally
2005a) generated in a quest for local optimality. (Mart, 2005)

Metadata Metaheuristic Technique


1: Data about data created with the purpose of enabling Also known as modern heuristics, this refers to methods
some speciic function or functions. For example, a for the solution of complex optimization problems that
cost metadata element is obviously oriented to enabling seek good (i.e., near optimal) solutions at a reasonable
commerce functions. (Sicilia & Garca-Barriocanal, computational cost. Generally this type of method is based
2006) 2: A data format that may contain numerous on the imitation of some natural process in the context
information, including information obtained indirectly of optimization. The best-known modern heuristics are
from the image, as well as information related to the genetic algorithms, simulated annealing, and tabu search.
actual description of the image content. At the highest (Richards & de la Iglesia, 2005)
level, images are often accompanied and associated by
metadata. (Y.-J. Zhang, 2005a) Metamorphosis
In application to economies of companies, it is a process
Metadata Description of change from an existing but obsolete way of doing
Abstract data description used to describe concrete data business to a new form but non-predestined state. (Richards
items. Usually contains descriptions of data structures, et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M e t a se a rch Engine M e t hod Sche m a 439

Metasearch Engine the case for various statistical ways of data handling, or
1: Conducts a search using several other search engines qualitative, which may be exempliied by grounded
simultaneously and then presents the results in some sort theory. A method (and thus a method schema) consists
M
of integrated format. This lets users see at a glance which of the following three parts: (1) a problem statement or
particular search engine returned the best results for a domain modeling the phenomenon under study; (2) a
query without having to search each one individually. procedure for collecting and analyzing data to understand
(Hu, Yang, Yeh, et al., 2005) 2: A search engine that sends the phenomenon; and (3) a justiication, for example, by
search keywords to different search engines and blends showing its ability to solve designated problems of the
together the search results from these search engines as domain. (Pharo & Jrvelin, 2005) 5: In object-oriented
one resultant list. (Kasi & Jain, 2006) programming, methods are the actions or behaviors that
an object can perform. At the coding level, a method is
Metaskill created by including a procedure (function or sub) within
Skill involved in academic literacy, as well as metacognitive the class. (Westin, 2005)
skill related to planning, monitoring, and regulating
comprehension-related activities. (Muukkonen et al., Method Bias
2005) Refers to when subjects across cultures do not respond
to measurement scales in the same manner. Bias in the
Metateam scores on an instrument can arise due to characteristics
A temporar y group composed of two or more of the instrument or its administration. (Karahanna et
geographically and inter-organizationally dispersed teams, al., 2005)
commercially linked by project-speciic agreements and
primarily enabled by electronic means of communication. Method Breadth
(Fernndez, 2005) Extent to which a usability-evaluation method is capable
of detecting all of a systems usability deiciencies.
Metavante Corporation (Danielson, 2006a)
A inancial service bureau and wholly owned subsidiary
of Marshall and Ilsley Corporation. (Panton, 2005) Method of Explanation-Oriented Data Mining
This method consists of two main steps and uses two data
Metcalfs Law tables. One table is used to learn a pattern. The other table,
1: Developed by Robert Metcalf, states that the value of an explanation table, is used to explain one desired pattern.
a network scales as 2n, where n is the number of persons In the irst step, an unsupervised learning algorithm is used
connected. (Mew, 2006) 2: The value or power of a to discover a pattern of interest. In the second step, by
network increases in proportion to the square of the number treating objects satisfying the pattern as positive instances,
of nodes on the network. (Rollier & Niederman, 2005) 3: and treating the rest as negative instances, one can search
States that the utility of a network rises in proportion to for conditions that explain the pattern by a supervised
the square of the number of its users. This means that as learning algorithm. (Yao & Zhao, 2005)
more users get connected into a network, the marginal
utility perceived by new users increases dramatically. Method Schema
(Kochikar & Suresh, 2005) Any representation deined for one or more methods,
where one or more aspects of the method have been left
Method uninterpreted and represented only through their plain
1: Actions performed by objects. (Lucas, 2005) 2: As name, and where some aspects of the methods may have
information is exchanged, it is manipulated typically been left out (even lacking their naming). Method schemas
by presenting it directly or partially with the intention take the format of a method, but it contains unspeciied
of the learner hypothesizing about the information and components that need to be speciied if it is to reach the
verifying the hypotheses. (Marcinkiewicz & McLean, level of a method. In other words a method schema is an
2005b) 3: A function deined inside of a class, a processing abstract representation of one or more methodsa generic
speciication for an operation. (D. Brandon, Jr., 2005a) 4: model. The difference between a method and a method
A procedure for handling a set of problems. Methods can schema can be said to be a continuum of generality. (Pharo
be categorized as quantitative, which is, for example, & Jrvelin, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
440 M e t hod Se nsit ivit y M ic ro-Busine ss

Method Sensitivity given attribute. (Schneidewind, 2005) 4: An empirical


Extent to which a usability-evaluation method is capable assignment of a value in an entity aiming to describe a
M of detecting a particular type of usability deiciency. speciic characteristic of this entity. (Xenos, 2006)
(Danielson, 2006a)
Metric-Driven Design
Method-Level Operator A data warehouse design that begins with the deinition of
Partial operation of induction/knowledge transformation metrics that can be used to track key business processes.
level of speciic induction method. (Leni et al., 2005) (Artz, 2005b)

Methodology Metropolis Algorithm


A consistent and suited set of modeling methods providing Proposed in 1953 by Metropolis for studying statistical
procedures to apply the constructs of a modeling language. physics. Since then it has become a powerful tool for
(Fettke, 2005) investigating thermodynamics, solid state physics,
biological systems, and so forth. The algorithm is known
Methods of Computer-Mediated as the most successful and inluential Monte Carlo method.
Communication (Hou, Guo, et al., 2005)
The communications options made available to the faculty
and students by the software features of the online course Metropolitan Area Network (MAN)
management system (e.g., eCollege). (Gold, 2005) Refers to a network of devices spanning the size of a city.
(Shuaib, 2005)
Metric Database
A database that provides access to a set of objects based MFU
on similarity to a query object, using the metric space Most frequently used characters in a character set with
model. (Chvez & Navarro, 2005) enormous members. (Chan, Ho, et al., 2005)

Metric Range Query MH: See Mobile Host.


A similarity query that retrieves all elements within some
distance to a query object. (Chvez & Navarro, 2005) MI: See Mutual Information.

Metric Relation MIAME: See Minimal Information about a Microarray


Measures the distance between salient objects. For instance, Experiment.
the metric relation far between two objects A and B
indicates that each pair of points Ai and Bj has a distance MICI: See Microeconomic Competitiveness Index.
greater than a certain value d. (Chbeir & Yetongnon,
2005) Micro/Macro Payment
1: A mobile payment of approximately $10 or less (often
Metric Space for mobile content such as video downloads or gaming) is
A set of elements together with a distance function deined called a micro payment, while a macro payment refers to a
among pairs of elements. (Chvez & Navarro, 2005) larger-value payment. (Lee, Kou, et al., 2005) 2: The lowest
values, typically under $2. Micro payments are expected
Metric/Measure to boost mobile commerce as well as pay-per-view/click
1: A value that represents a certain fact that is being charging schemas. (Karnouskos & Vilmos, 2006)
recorded in the transaction. (Deshpande & Ramasamy,
2005) 2: A predetermined measure that will be used as the Micro-Business
basis for a measurement process. For example, percentage 1: A term used to describe very small businesses. Many of
of customer calls answered within one minute. (Holstein & these operate as family businesses. They form the majority
Crnkovic, 2005) 3: A quantitative measure of the degree of businesses. (Burgess, 2005) 2: An organization that
to which a system, component, or process possesses a employs less than 10 employees. (Vrazalic et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ic ro-Ec ology of I nfor m at ion M ic roe c onom ic Com pe t ti ive ne ss I ndex (M I CI ) 441

Micro-Ecology of Information Microarray Informatics


The study of information (cognition) at the individual level The study of the use of microarray databases to obtain
of decision making in professional, social, and personal information about experimental data. (Segall, 2005)
M
undertakings. (Targowski, 2005)
Microarray Markup Language (MAML)
Micro-Electromechanical System (MEMS) An XML-based format for communicating information
The set of chips that combine the capabilities of an RFID about data from microarray experiments. (Segall, 2005)
tag with small, embedded mechanical devices such as
sensors. (Galanxhi-Janaqi & Nah, 2005) Microbrowser
1: A Web browser designed for a small device. (N.C.
Micro-Mobility Rowe, 2005a) 2: Client software (Web browser) designed
Refers to the way an artifact is mobilized and manipulated to operate within the constraints of a handheld mobile
around a relatively circumscribed domain. (Mkinen, device: low memory, small screen, relatively low
2006) bandwidth. (Petrova, 2006) 3: A miniaturized version
of a desktop browser such as Netscape Navigator or
Micro-Theory Internet Explorer. Microbrowsers, due to the limited
One of a set of beliefs that need to be tested during the resources of handheld devices, are different from the
data-mining process. (Amaravadi, 2005) traditional desktop browsers in the following features:
(1) smaller windows, (2) smaller footprints, and (3) less
Microarray functions and multimedia features. (Hu, Yang, et al.,
1: A chip on which numerous probes are placed for 2006) 4: Browsers for mobile devices. These browsers are
hybridization with a tissue sample to analyze its gene capable of interpreting WML instructions and executing
expression. (Fu, 2005) 2: Also called a gene chip or a WMLScript code. (Chen, Sockel, et al., 2005)
DNA chip. A new biotechnology that allows biomedical
researchers to monitor thousands of genes simultaneously. Microcomputer Ease of Use
(Chu & Wang, 2005) 3: Tool for studying how large User perception on how simple and easy it is to understand
numbers of genes interact with each other and how and use a microcomputer; degree to which an individual
a cells regulatory networks control vast batteries of believes that using a particular computer system would be
genes simultaneously. Uses a robot to precisely apply free of physical or mental effort. (de Souza Dias, 2005)
tiny droplets containing functional DNA to glass slides.
Researchers then attach luorescent labels to DNA from Microcomputer Enjoyment
the cell they are studying. The labeled probes are allowed The extent to which the activity of using a microcomputer
to bind to cDNA strands on the slides. The slides are put is perceived as being enjoyable in its own right, apart
into a scanning microscope to measure how much of a from any performance consequences. It encompasses
speciic DNA fragment is present. (Galitsky, 2005a) 4: A the feelings of joy, elation, or pleasure associated by an
high-throughput technology that allows the simultaneous individual to a particular act. (de Souza Dias, 2005)
determination of mRNA abundance for many thousands
of genes in a single experiment. (Chen & Liu, 2005) 5: A Microcomputer Usefulness
chip where thousands of gene expressions may be obtained The degree to which an individual believes that using a
from the same biological cell material. (Liberati, 2005) 6: particular computer system would enhance his or her job
The technology for biological exploration which allows performance. (de Souza Dias, 2005)
one to simultaneously measure the amount of mRNA in
up to tens of thousands of genes in a single experiment. Microdesign
(Fung & Ng, 2005) The process of designing how a user will be able to interact
with a small artifact. (Roibs, 2006a)
Microarray Database
Stores large amounts of complex data as generated by Microeconomic Competitiveness Index (MICI)
microarray experiments (e.g., DNA). (Segall, 2005) Aims to assemble textured measures of the competitive
environment of a nation. (Neumann, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
442 M ic roproc e ssor M inim a l Oc c ure nc e

Microprocessor wide range of services layered between the applications


A collection of microscopic devices on a single and operating systems that provide specialized services
M semiconductor chip that performs all the basic operations and interoperability between distributed applications.
of a computers CPU (Central Processing Unit). (Strauss, The services consist of transaction-processing monitors,
2005) remote procedure calls, message-oriented middleware, and
object request brokers. (Wan et al., 2006) 8: This software
Microsoft Producer manages the communication between a client program
A program available to Microsoft PowerPoint users that and a database. For example, a Web server connected
allows the production of audio iles. It also allows the use to a database can be considered middleware as the Web
of PowerPoint presentations or captured screen shots to server sits between the client program (a Web browser)
accompany audio explanations. (Microsoft Producer can be and a database. The middleware allows the database to
downloaded from www.microsoft.com). (Cooper, 2005) be changed without necessarily affecting the client and
vice versa. (Bose et al., 2005)
Microsoft Ofice Live Meeting
A hosted Web-conferencing service, previously known Migratory Knowledge
as PlaceWare. (Panton, 2005) Knowledge that can travel directly from teacher to learner
without changing in form or substance. (Frank et al.,
Microsoft .NET 2005)
A product suite that enables companies to build smart,
enterprise-class Web services. Microsoft.NET is a product Military Intelligence
strategy that serves as a platform for developing Web A discipline that focuses on gathering, analyzing, and
services. (Chen, 2006) disseminating information about adversaries, present and
future, and conlict conditions (like the area of operations),
Middleman both for tactical and strategical purposes. (Badia, 2006)
A dealer or agent intermediate between the producer of
goods and the consumer or retailer. (Mendes-Filho & Mimetic Adoption Pattern
Ramos, 2005) A pattern of IT adoption among a population of irms
in which further adoptions are a function of previous
Middleware adoptions rather than strategic considerations. (Grifin,
1: A server-side scripting technology used to facilitate data 2005)
transfer and communication between a client and a data
source. (Barone, 2005) 2: An enabling layer of software that Minable View
resides between the application program and the networked The view constructed from the data repository that is
layer of heterogeneous platforms and protocols. It decouples passed to the data-mining algorithm. This minable view
applications from any dependencies on the plumbing layer must include all the relevant features for constructing the
that consists of heterogeneous operating systems, hardware model. (Hernandez-Orallo, 2005b)
platforms, and communication protocols. (Kunz & Gaddah,
2005) 3: Software that connects different applications Minimal Information about a Microarray
to allow data sharing. (Hwang, 2005) 4: Software that Experiment (MIAME)
connects two or more separate applications across the 1: Deines what information at least should be stored.
Web for enabling data exchange, integration, and/or (Segall, 2005) 2: A standard for data from a microarray
support. (Littman, 2005) 5: Software that sits between experiment. (Ge & Liu, 2005)
two or more types of software and translates information
between them. Middleware can cover a broad spectrum Minimal Occurrence
of software and generally sits between an application A minimal occurrence of an episode a in an event sequence
and an operating system, a network operating system, or , is a window w=[ts, te], such that: (1) a occurs in the
a database-management system. (Mockler et al., 2006) window w, (2) a does not occur in any proper subwindow
6: Technology enabling the exchange of information of w, and (3) the width of window w is less than the user-
between information systems and encapsulating speciied maximum window width parameter. Timestamps
implementation details. (Verbraeck et al., 2006) 7: The

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M inim a l Suppor t M ission Obje c t ive 443

ts and te records the starting and ending time of the episode, business customers to improve the organization of retrieved
respectively, and ts te. (Harms, 2005) results and to increase the precision of information retrieval.
(Nayak, 2005c)
M
Minimal Support
A user-given number that speciies the minimal number Mining of Secondary Web Data
of transactions in which an interested pattern should be Assists in capturing the buying and traversing habits of
contained. (Zou & Chu, 2005) customers in an e-business environment. Output of this
mining process can help e-business to predict customer
Minimalist Design behavior in the future, to personalize Web sites, and to
Refers to providing simple and easy-to-read screen designs. promote campaigns by cross-marketing strategies across
When Web designs are not minimalist, they may cause products. (Nayak, 2005c)
cognitive overload, or the presence of too much information
for users to process. Keeping pages uncluttered and Mining Question-Answer Pair
chunking information into categories are examples of ways Analytical method for automatically answering question
to provide a minimalist design. (Chalmers, 2006) e-mails using knowledge that is discovered in question-
answer pairs of past e-mail communication. (Bickel &
Minimization of Energy Expenditure Scheffer, 2005)
A principle of ecology in which a species uses the least
possible amount of energy to achieve its purpose. (Tatnall Mining Sentence
& Davey, 2005) Analytical method for interactively completing incomplete
sentences using knowledge that is discovered in a document
Minimum Description Length (MDL) Principle collection. (Bickel & Scheffer, 2005)
Principle stating that the best theory describing a set of
data is the one minimizing the description length of the Minute Margin Squeeze
theory plus the description length of the data described (or Unit price/unit cost model. (Nugent, 2005)
compressed) by the theory. (Holder & Cook, 2005)
MIPv6: See Mobile IPv6.
Mining
The application of statistical techniques to infer implicit Mirroring
patterns or rules in a collection of data, in order to discover Replication method where all updates to a logical disk
new and useful knowledge. (Loh et al., 2005) volume are copied by the operating system to two or more
physical disk volumes. (Frank, 2005a)
Mining E-Mail
The application of analytical methods and tools to e-mail MIS: See Management Information System.
data for: (1) support of communication by iling e-mails into
folders, iltering spam, answering e-mails automatically, Misconception/Preconception
or proposing completions to sentence fragments; or (2) A wrong idea people manifest while explaining phenomena,
discovery of hidden properties of communication networks with respect to scientiic paradigms (i.e., peoples ideas
by e-mail graph analysis. (Bickel & Scheffer, 2005) are evaluated with respect to scientiic ones). The term
preconception is adopted when the wrong idea appears
Mining Historical XML before people meet curricular disciplines. The term
The process of knowledge discovery from the historical misconception is used to mark the students mistakes in
changes to versions of XML documents. It is the integration phenomena interpretation. (Cartelli, 2005a)
of XML change detection systems and XML data-mining
techniques. (Zhao & Bhowmick, 2005) Mission Objective
States where the organization is headed and how to measure
Mining of Primary Web Data when it has arrivedthat is, what part or parts of the ideal
Assists in effectively interpreting the searched Web vision the organization commits to deliver and move ever
documents. Output of this mining process can help e- closer toward. (Kaufman & Lick, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
444 M isuse De t e c t ion M obile Advise r

Misuse Detection MMO: See Multimedia Object.


Analysis strategy that looks for events or sets of events that
M match a predeined pattern of a known attack. (Lazarevic, MMS: See Multimedia Message Service.
2005)
MMSC
Mix Shift Multimedia message service center; a special server to
Shift in the market between major components usually implement the offerings on a Multimedia Message Service
requiring different technology or solutions. (Nugent, (MMS) system. (Roibs, 2006b)
2005)
MMSE
Mixed Media Minimum mean squared error. (Iossiides et al., 2005)
The combination of text, graphics, audio, and video with
links and tools that allow the user to navigate, create, MMT: See Multimedia Technology.
and communicate the content or his or her own ideas, but
lacks the component that provides interactivity. (Bradley MMTE: See Multimedia Telediagnostic Environment.
et al., 2005)
MNE: See Multi-National Enterprise.
Mixed-Mode Distance Teaching University
A university that provides both traditional face-to-face Mobile Ad Hoc Network (MANET)
study frameworks and online courses for their on-campus 1: A network of wireless mobile nodes formed dynamically,
students, and also teaches distant students. (Guri-Rosenblit, self-organizing and without any central administration.
2005a) (Erbas, 2005) 2: A system of wireless mobile nodes that
dynamically self-organize in arbitrary and temporary
Mixed-Mode Learning topologies. (Dhar, 2005) 3: A local network with wireless or
Study that combines traditional face-to-face learning temporary plug-in connection, in which mobile or portable
with learning at a distance in a structured program. The devices are part of the network only while they are in close
Web may be used to enhance learning during study by proximity. (Katsaros et al., 2005) 4: A wireless network
one or both of these modes. Mixed mode is also known that does not have a centralized unit. (Hu, 2005)
as Blended Learning and Distributed Learning. (Klobas
& Renzi, 2005b) Mobile Added Value (MAV)
One of the properties (ubiquity, context-sensitivity,
Mixture of Distributions identifying functions, and command and control functions)
A combination of two or more distributions in which of mobile technology and its utilization which are
observations are generated from distribution i with responsible for gaining supplementary IAV in comparison
probability pi and Spi =1. (Burr, 2005b) to e-commerce solutions. (Derballa & Pousttchi, 2006a)

MKM: See Mathematical Knowledge Management. Mobile Advertisement


Advertisement sent to mobile and wireless devices. (Salo
MLE: See Managed Learning Environment. & Thtinen, 2006)

MLS: See Multi-Level Security, Mobile Location Mobile Advertising


Service. All advertising activities conducted via mobile and wireless
devices. (Salo & Thtinen, 2006)
MLSE
Maximum-likelihood sequence estimation. (Iossiides Mobile Adviser
et al., 2005) The highly skilled expert, voluntary or on a contractual
basis, maintains the regional network of the telecenters
MM-DBMS: See Mobile Multimedia Database and helps the personnel by providing advice and necessary
Management System. programs. (Melkonyan, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M obile Age nt M obile Com m e rc e (M C) 445

Mobile Agent Mobile Business Intelligence


1: A piece of code capable of migrating to different sites Refers to the access of processed enterprise data using
for execution, making use of local resources, and acting mobile devices. Involves different technologies (e.g., data
M
on behalf of its launching site. The agent will carry along mining and data warehouses). (Derballa & Pousttchi,
with its execution state and data upon migration.a crash 2006a)
failure and for consistent database broadcast. (Leong,
2005b) 2: A program that represents a user in a computer Mobile Client
network and can migrate autonomously from node to node, A portable device that is augmented with a wireless
to perform a computation on behalf of the user. (Fortino communication interface. (Xu, 2006)
et al., 2006) 3: An agent that has the property of moving
from one computer to another in a computer network, Mobile Client-Site Multimedia Data Processing
while preserving its state information. (Camarinha-Matos Capability
& Ferrada, 2006) 4: An intelligent agent who performs its To study and extend the standard QoS mechanism in the
tasks with some level of mobility, cooperation, proactivity, context of wireless mobile environments for multimedia
and/or reactiveness. (Karoui, 2005) 5: Software code applications, the client-site multimedia data processing
that can migrate host-to-host autonomously to perform capabilities can be considered. The related elements such
operations. (Quah, Leow, & Ong, 2006) as hardware facilities, user preference, mobility coverage,
and critical quality acceptance should be included in the
Mobile Application extended QoS framework. (Zhang & Chen, 2005)
1: Any application that can be used on the move. It may or
may not be wireless. It must be tailored to the characteristics Mobile Commerce (MC)
of the device that it runs on. Limited resources, low network 1: Using wireless technology such as telephony and
bandwidth, and intermittent connectivity are all important computing for commerce. (Brace & Berge, 2006) 2: Using
factors that affect the design of these applications. (Bose mobile devices (e.g., cell phones and PDAs) to conduct
et al., 2005) 2: A broad range of applications and services business transactions. (Tian & Stewart, 2006) 3: The ability
accessible through a mobile handheld device. Examples to browse, interact with, and make payment for goods and
include banking, news, betting, games, travel directions. services directly from mobile terminals such as cell phones,
(Petrova, 2006) personal digital assistants (PDAs), and portable computers.
(Tan & Teo, 2005) 4: A technological approach to reach
Mobile Banking customers, suppliers, and employees regardless of where
A client-server system that enables banking customers to they are located, and to deliver the right information to
use handheld devices to access their accounts, pay bills, the right person(s) at the right time. (Krogstie, 2005b) 5:
authorize funds transfers, or perform other activities. (Lee A wireless application that involves the change of money.
& Warkentin, 2006) This could be through the use of a mobile device to pay for
services. (K.J. MacGregor, 2005) 6: Electronic commerce
Mobile Base Station (MBS) made through mobile devices. (Guan, 2006f) 7: Mobile
Fixed host that has wireless interface for communicating access to and use of information which, unlike e-commerce,
with mobile clients. (Waluyo et al., 2005) is not necessarily of a transactional nature. (Lumsden,
2005) 8: The transaction of goods and services through
Mobile Business (M-Business) wireless handheld devices, such as cellular telephones and
Using any mobile device to make business practice more personal digital assistants (PDAs). (Sofokleous et al., 2005)
eficient, easier, and proitable. (Sofokleous et al., 2005) 9: Transactions on mobile phones. Examples includein
addition to voice communicationsSMS messages, game
Mobile Business Data downloads, stock market quotes, and the like. (Dholakia,
Data generating from mobile business activities such as Zwick et al., 2005) 10: Commerce with wireless access
accessing information, performing transactions, and other to the Web. (Craig, 2005) 11: Using mobile technology
operations from anywhere anytime via wireless networks. to access the Internet through a wireless device, such as
(Nayak, 2005a) a cell phone or a PDA, in order to sell or buy items (i.e.,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
446 M obile Com m e rc e Course M obile Devic e

products or services), conduct a transaction, or perform both networking and software applications, that permits
supply chain or demand chain functions. (Lalopoulos et networked devices to be moved freely within the
M al., 2005a) 12: The ability to purchase goods anywhere broadcast coverage area, contacting others and conducting
through a wireless Internet-enabled device (e.g., cellular computations. (Bozanis, 2006) 7: An environment made
phone, pager, PDA, etc.). Mobile commerce refers to any up of a set of devices that interact to give the user the
transaction with monetary value that is conducted via possibility of staying connected while moving from one
a mobile network. (Clarke & Flaherty, 2005) 13: The location to another. (Coratella et al., 2005)
process of buying, selling, or exchanging products and
services wirelessly over mobile communication networks. Mobile Data Service (MDS)
(Chen & Yang, 2006) 14: The use of mobile devices to Delivery of content, for example, music to MP3 players
improve performance, create value, and enable eficient or games to consoles, over wireless networks. (Gilbert,
transactions among businesses, customers, and employees. 2005b)
(Lawson-Body, 2005)
Mobile Database
Mobile Commerce Course 1: A database accessible to mobile clients. There are
Bandwidth, platforms, form factors, mobile data services, appropriate mechanisms to take into account the limitation
and security and transaction models. Web synchronization. of the wireless bandwidth, the use of downlink broadcast
Server-side content management. Wireless Application channel, and the effect of client mobility. (Leong, 2005a)
Protocol (WAP). Wireless Markup Language (WML). 2: Mobile users connected to the wireless network and
Handheld Device Markup Language (HDML). Wireless equipped with database application to conduct activity
user interface design. Wireless Web development tools. like transaction and information retrieval from a central
(Knight & Chan, 2005) database server. (Waluyo et al., 2005)

Mobile Commerce Security Mobile Device


The technological and managerial procedures applied 1: A device that can be used to access information and
to mobile commerce to provide security services for learning materials from anywhere and at anytime. The
mobile commerce information and systems. (Lee, Kou, device consists of an input mechanism, processing
et al., 2005) capability, storage medium, and display mechanism. (Ally,
2005c) 2: Anything that can be used on the move, ranging
Mobile Communication Technology from laptops to mobile phones. As long as the location
A medium to communicate via mobile devices. (Hkkil is not ixed, it is considered mobile. Areas that are not
& Beekhuyzen, 2006) included in the deinition of mobile include remote ofices,
home ofices, or home appliances. (Bose et al., 2005) 3:
Mobile Computing Can include a range of portable devices, including mobile
1: A computing infrastructure that facilitates the conduct phones and PDAs, but also can include wearable devices,
of work anywhere/anytime via the integration of portable such as HMDs and smart clothing, that incorporate sensors
devices and wireless connectivity. (Roldan, 2005) 2: and location tracking devices. (de Freitas & Levene, 2006b)
Computing using a portable device that allows full network 4: Computing and communication device such as a cell
connectivity via wireless connections. (Strauss, 2005) 3: phone, PDA, or PC equipped with a cellular modem,
Encompasses a number of technologies and devices, such which is light enough to be carried by humans and has
as wireless LANs, notebook computers, cell and smart wireless connectivity that allows users to move freely.
phones, tablet PCs, and PDAs, helping the organization (Melliar-Smith & Moser, 2005) 5: Gadget not needed to
of our life, communication with coworkers or friends, be attached to a certain place, mostly subject to certain
or the accomplishment of our jobs more eficiently. limitations. (Rosenbaum et al., 2006) 6: Information and
(Sofokleous et al., 2005) 4: The ability of mobile users to communication device developed for mobile use and
keep connected to the wireless network while traveling, which can be employed in the context of mobile knowledge
and to access information such as news, weather forecast, management. A wide variety of devices is relevant: mobile
e-mail, and query to a central database server. (Waluyo et phones, smartphones, PDAs, tablet PCs, and wearable
al., 2005) 5: The capability to physically move computing computing. (Derballa & Pousttchi, 2006b)
services with us. (Krogstie, 2005b) 6: The infrastructure,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M obile E-Work M obile Le a r ning (M -Le a r ning) 447

Mobile E-Work: See Mobile Electronic Work. organization to retrieve data or information (e.g., sales
igures or market data). (Derballa & Pousttchi, 2006a)
Mobile Electronic Commerce Transaction
M
An e-commerce transaction that is conducted using a Mobile Information System
mobile terminal (e.g., a PTD) and a wireless network or An information system that includes end-user terminals
link. (Veijalainen & Weske, 2005) that are easily movable in space, is operable independent of
location, and typically has wireless access to information
Mobile Electronic Work (Mobile E-Work) resources and services. (Krogstie, 2005b)
Concept referring to e-working in a mobile mode. The
term mobile e-work can be deined as e-work being done Mobile Internet
while commuting or e-working while commuting. To A part of the Internet whose contents are speciically
be precise, the overall concept of mobile e-work covers designed for mobile users who use Internet-enabled mobile
e-working on other trips as well, not just while commuting handheld devices such as a smart cellular phone to access
to and from the regular workplace. For example, e-working the mobile Internet contents. (Hu, Yang, & Yeh, 2006)
can be done on a persons way to meet clients, to attend
conferences, and so forth, whenever on the move outside Mobile IPv6 (MIPv6)
the regular ofice. The most general case of mobile e-work A protocol developed as a subset of the Internet protocol,
refers to a commuters e-working. To make matters more Version 6 (IPv6), to support mobile connections. MIPv6 is
complicated, mobile e-work also refers to situations that an update of the Internet Engineering Task Force (IETF)
are stationarysuch as sitting on a bench in an airport mobile IP standard designed to authenticate mobile devices
and tele-working with ones laptop. Mobility here means using IPv6 addresses. (Olla, 2005a)
that you have moved away from your ofice, you are on the
move outside the ofice, even if not moving in any vehicle Mobile Knowledge Management
at the moment of e-working. (Heinonen, 2005) The management process in a course of which mobile
communication techniques in conjunction with mobile
Mobile Government (M-Government) devices are employed for the creation, validation,
A subset of e-government that utilizes mobile and wireless presentation, distribution, or application of knowledge. An
technologies like mobile phones, and laptops and PDAs important issue is the integration of knowledge lows and
(personal digital assistants) connected to wireless local mobile business processes to ensure knowledge support
area networks. It makes public information and government for mobile workers. (Derballa & Pousttchi, 2006a)
services available anytime, anywhere to citizens and
oficials. (Yigitcanlar & Baum, 2006b) Mobile Learning (M-Learning)
1: Learning that has emerged to be associated with the
Mobile Handheld Device use of mobile devices and wireless communication in
A small general-purpose, programmable, battery-powered e-learning. In fact, mobility is a most interesting aspect
computer that can be held in one hand by a mobile user. It from an educational viewpoint, which means having
is different from a desktop or notebook computer due to access to learning services independently of location,
the following features: (1) mobility, (2) low communication time, or space. (Esmahi, 2005) 2: Integrating mobile
bandwidth, and (3) limited computing power and resources devices such as PDAs, laptops, and tablet PCs into the
such as memory and batteries. There are two major kinds of learning environment, in order to communicate through
handheld devices: (1) smart cellular phones and (2) personal the wireless network. Mobile learning has a great potential
digital assistants. (Hu, Yeh, Yang, et al., 2006) to provide effective collaborative or individual learning
experiences. (Yang, 2005) 3: The use of mobile devices
Mobile Host (MH) as tools in the computer science discipline of electronic
A mobile computer or device. (Coratella et al., 2005) learning. (Mohamedally et al., 2005) 4: The use of mobile
technology to provide anyone-anytime-anywhere
Mobile Information Exchange learning. (Salter, 2005a) 5: Electronic learning materials
Includes the transfer of data and information using e-mail, with built-in learning strategies for delivery on mobile
as well as the access to operational systems used in an computing devices to allow access from anywhere and
at anytime. (Ally, 2005c)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
448 M obile Loc at ion Se r vic e (M LS) M obile Se r vic e

Mobile Location Service (MLS) database, individual objects of very large size have to
Application provided over a mobile network that utilizes be handled eficiently. Furthermore, the crucial point
M information related to the geographical position of users is that mobile MM-DBMSs should have the QoS-based
to provide added value to them. (Giaglis, 2005) capabilities to eficiently and effectively process the
multimedia data in wireless mobile environments. (Zhang
Mobile Location-Based Service & Chen, 2005) 2: DBMS with enhanced functionalities to
Application that leverages positioning technologies and eficiently organize, store, and retrieve multimedia objects.
location information tools to deliver consumer applications (Chang et al., 2005)
on a mobile device. (Fraunholz et al., 2005)
Mobile Network
Mobile Marketing A system that allows wireless devices to seamlessly interact
All marketing activities conducted via mobile and wireless with traditional telecommunications and other wireless
devices. (Salo & Thtinen, 2006) devices. (Clarke & Flaherty, 2005)

Mobile Mentoring Mobile Payment


Mentoring which uses mobile communication technology 1: Any payment where a mobile device is used in
as an integrated part of the communication between mentor order to initiate, activate, and/or conirm this payment.
and mentee. (Hkkil & Beekhuyzen, 2006) (Karnouskos & Vilmos, 2006) 2: The transfer of inancial
value and corresponding services or items between
Mobile Middleware different participants in mobile commerce systems. (Lee,
1: A functional layer of software provided by application Kou, et al., 2005)
developers to link their e-commerce applications to an
operating system and various mobile networks to allow Mobile Phone
their applications to bypass certain mobility issues. (Pierre, 1: Originally a portable wireless telephone, but now
2006a) 2: The software layer between the operating extended to a wireless Internet device supporting Web,
system and the distributed applications that interact via mail, and other features in addition to voice. (Houser &
the mobile networks. Its primary mission is to hide the Thornton, 2005) 2: Mobile communication system that
underlying mobile, networked environments complexity use radio communication and conventional telephone
by insulating applications from explicit protocols. (Hu, switching to allow communication to and from mobile
Yang, & Yeh, 2006) users. (Akhtar, 2005)

Mobile Multimedia Mobile PR: See Mobile Public Relations.


Use of audio and/or video in addition to text and image
pages. The low bandwidth and high cost of mobile cellular Mobile Public Relations (Mobile PR)
connections discourage the use of video. Spoken natural The application of public relations strategies and tactics in
language input and output is a promising but dificult cyberspace accessed through mobile devices. (Galloway,
approach for improving the ease of use of mobile devices 2006)
for commercial transactions. (Melliar-Smith & Moser,
2005) Mobile Security (M-Security)
The technologies and methods used for securing wireless
Mobile Multimedia Database Management System communication between the mobile device and the other
(MM-DBMS) point of communication, such as another mobile client or
1: Since a traditional DBMS does not support QoS-based a PC. (Sofokleous et al., 2005)
objects, it only concentrates on tables that contain a large
number of tuples, each of which is of relatively small size. Mobile Service
However, an MM-DBMS should support QoS-sensitive Service provided by a mobile operator that enables
multimedia data types in addition to providing all the individual customers to access information and applications
facilities for DBMS functions. Once multimedia objects anytime-anywhere. (Lee & Warkentin, 2006)
such as images, sound clips, and videos are stored in a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M obile Suppor t St at ion (M SS) M oda lit y Fusion 449

Mobile Support Station (MSS) distinct categories are relevant: traveling, visiting, and
1: Equipment that manages mobile devices in terms of wandering. (Derballa & Pousttchi, 2006b)
identifying their physical location and handling their
M
incoming and outgoing messages/calls. A mobile support Mobility Management
station always communicates with mobile users within its A technique that maintains wireless communications of
radio coverage area. (Maamar, 2005) 2: A computer with mobile users. (W. Wang, 2006)
a wireless interface that offers information and services
support to mobile hosts. (Coratella et al., 2005) Mobility Model
To describe user movement in wireless networks. (W.
Mobile Switching Center (MSC) Wang, 2006)
The switching facility of the mobile network performing
the routing function using the information provided by Mobility-Related Exclusion
the different database of the PLMN. (Hackbarth et al., An aspect of social exclusion which derives from lack of
2005) physical access. (Kenyon, 2005)

Mobile Technique Mod


An implementation technique used to support mobile A modiication to elements in a computer game designed
transactional models, for example, techniques relating to and built by members of the gaming community, and made
geographic data usage, caching, concurrency handling, available to other gamers. The mod can be a new weapon,
dissemination of information, and so forth. (Coratella et an entire environment, a new texture, or even a new story
al., 2005) line. (Champion, 2006b)

Mobile User Modal Property


1: A user who needs an access to unstructured data anytime Natural frequency, mode shapes, and mode curvatures
and anywhere. (Abramowicz et al., 2006) 2: Customer who constitute modal properties. (Kanapady & Lazarevic,
uses a wireless device. (W. Wang, 2006) 2005)

Mobile Virtual Network Operator (MVNO) Modal User Interface


A company that does not own or control radio spectrum or A user interface is said to be modal (or to have modes)
associated radio infrastructure, but does own and control when the same user action will be interpreted by the system
its own subscriber base with the freedom to set tariffs and differently depending on the systems state, and/or the
to provide enhanced value-added services under its own output of the system means different things depending
brand. (Lalopoulos et al., 2005a) on system state. (Campos & Harrison, 2006)

Mobile Work Modality


1: Work that is carried out while moving. The work of bus 1: The medium used, the mode of representation to present
drivers and pilots, as well as other personnel in various the required message. (Uden, 2005) 2: The pairing of a
vehicles, is mobile work. Mobile work can also be conducted representational system (or mode) and a physical input or
by passengers. Mobile work is the opposite of work carried output device. (Lumsden, 2005)
out as ixed on a given location. (Heinonen, 2005) 2: The
ability to carry out work while geographically moving Modality Fission
around. (Wiberg, 2005) The partition of information sets across several modality
outputs for the generation of efficient multimodal
Mobility presentations. (Bourguet, 2006)
1: The ability to move or to be moved easily from one place
to another. (Sofokleous et al., 2005) 2: Traditionally refers Modality Fusion
to the aspect of being geographically independent. Different Integration of several modality inputs in the multimodal
types of mobility can be discerned: spatial, temporal, and architecture to reconstruct a users command. (Bourguet,
contextual mobility. Regarding spatial mobility, three 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
450 M ode M ode l Che cke r

Mode the dynamic behavior of a system. (Kontos & Malagardi,


The style or nature of the interaction between the user and 2006) 5: A simpliied abstraction that shows properties
M the computer. (Lumsden, 2005) of some subject matter relevant to a particular purpose,
context, or perspective. (Maceield, 2006) 6: A simpliied
Mode Characteristic representation of reality that concentrates on predicting
A characteristic of a mode of instruction. May include: how a factor or a series of related factors would evolve based
usefulness, challenge, attractiveness, clarity. (Chan, Tan, on the variation of a set of parameters. Also, a simpliied
et al., 2005) representation of reality. (Adam & Pomerol, 2005) 7: An
abstraction of reality that is structured as a set of rules and
Mode Error procedures to derive new information that can be analyzed
Occurs when the user misinterprets the mode the system to aid in problem solving and planning. Analytical tools
is in. For instance, actions by the user may be interpreted in a geographic information system are used for building
by the system in a way which will not be what the user is spatial models. Models can include a combination of
expecting, and/or the user will interpret the information logical expressions, mathematical procedures, and criteria,
provided by the system erroneously. Mode error typically which are applied for the purpose of simulating a process,
leads to the user being confounded by the behavior of the predicting an outcome, or characterizing a phenomenon.
system. (Campos & Harrison, 2006) (Al-Hanbali & Sadoun, 2006) 8: An abstraction represented
in a modeling language. (Krogstie, 2005a) 9: Represents the
Mode 1 Research system from a set of concerns. A model can be informal,
Research conducted by those belonging to a single semi-formal, and formal. A system is typically represented
discipline, aiming to solve questions within this discipline. by a set of models, each addressing some particular area
The outcomes will be used by the discipline and may not of concern. (Stojanovic & Dahanayake, 2005)
transcend a particular context of application. (Crdoba
& Robson, 2006) Model and Schema
In the database realm, a model M is a formal system
Mode Shape comprising a closed set of abstract object categories and
One of the eigenvectors associated with the natural a set of assembly rules that states which arrangements
frequencies of the structure. (Kanapady & Lazarevic, of objects are valid. Since M is supposed to describe the
2005) structure, the properties, and the behavior of a class S
of external systems, the semantics of M is speciied by
Mode 2 Research a mapping of M onto S. Any arrangement m of objects
Research developed with the participation of different which is valid according to M describes a speciic
disciplines, with the aim of solving a problem that has system s of class S. m is called a schema, while s is the
a particular context and requires the use of a variety of application domain or the universe of discourse. Among
methods and sources of knowledge. The outcomes of the most popular conceptual models, we can mention the
this research will be used in other contexts as reference. entity-relationship, object-role, relational, and UML class
(Crdoba & Robson, 2006) models. Among DBMS models, the SQL, CODASYL,
IMS, object-relational, and XML models are currently
Model the most widely used. (Hainaut et al., 2005)
1: A metadata artifact such as relational or XML schema,
interface deinition, or Web site layout. (Diskin & Kadish, Model Checker
2005) 2: A particular product of conceptual modeling. It A tool that automatically checks a temporal logic formula
is a description of a domain using a particular language. against a state machine. In the case of symbolic model
(Fettke, 2005) 3: A representation of a data set or stream checking, the tool does not handle the states in the state
that one can use for prediction or for better understanding machine directly. Instead, it handles terms that deine
the data from which it was derived. Also called hypothesis sets of states. In this way, it is possible to work with much
or concept description. Models include probabilities, linear larger state machines since it is not necessary to explicitly
equations, decision trees, decision rules, and the like. build it. (Campos & Harrison, 2006)
(Maloof, 2005) 4: A set of causal relations that specify

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Model Checking Model-Oriented Formal Speciication Language 451

Model Checking Model Validation


1: A method for formally verifying inite-state concurrent Iterative testing and reinement of computational models
systems. Speciications about the system are expressed as to ensure the behaviors of such models mirror faithfully
M
temporal logic formulas, and eficient symbolic algorithms those of the operational organizations in practice that they
are used to traverse the model deined by the system and represent. (Nissen & Levitt, 2006)
check whether the speciication holds. (Tan & Zhao, 2005a)
2: A formal veriication technique that determines whether Model-Based Clustering
given properties of a system are satisied by a model. A 1: A clustering method with relatively lexible assumptions
model checker takes a model and a property as inputs, regarding the volume, shape, and orientation of each cluster.
and outputs either a claim that the property is true or a (Burr, 2005b) 2: A mixture of simpler distributions is used
counter-example falsifying the property. (Kefalas et al., to it the data, which deines the clusters of the data. EM
2005) 3: Technique for the formal veriication of temporal- with linear mixing of Gaussian density functions is the
logics properties on inite-state, concurrent systems using best example, but K-Means and K-Harmonic Means are
eficient algorithms. (Fisteus & Kloos, 2006) the same type. Regression clustering algorithms are also
model-based clustering algorithms with mixing of more
Model Discovery complex distributions as its model. (B. Zhang, 2005)
The discovery of a set of causal relations that predict the
behavior of a system. (Kontos & Malagardi, 2006) Model-Based Gesture Analysis
Gestures are modeled as usually inite states of hand shape
Model Identiication or position. This approach captures both the spatial and
Definition of the structure and computation of its the temporal nature of the gestures which is essential
parameters best suited to mathematically describe the for analysis and recognition purposes. (Karpouzis et al.,
process underlying the data. (Liberati, 2005) 2005)

Model Mapping/Morphism Model-Driven Architecture (MDA)


Informally, a correspondence between models. Formally, 1: An approach under construction within the OMG trying
it is a function (arrow) sending elements of the source to deine and standardize model-driven software system
model to elements of the target model. The graph of this development. (Solberg et al., 2005) 2: A framework based
function can be reiied as a special model, often also on UML and other industry standards for visualizing,
called model mapping in the literature. We prefer the term storing, and exchanging software design and models.
correspondence model for reiied mappings and use model (Favre et al., 2005)
mapping in the narrow sense of mappings-as-functions.
(Diskin & Kadish, 2005) Model-Driven System Development
A software system development approach where the output
Model Quality of the development activities is a set of models. The code
Similar to rule quality, but characterizes the decision itself is seen as a model that is speciied using programming
power, predictability, and reliability of the entire model language. The process is driven by the development of the
(knowledge base) as a unit. (Bruha, 2005) set of prescribed models. (Solberg et al., 2005)

Model/Shaping Filter Model-Driven Transformation


The ilter G(z) in the IFIR structure which has M times A goal-oriented chain of transformations made up of
higher both the pass-band and the stop-band frequencies predicate-driven operators. It is designed to transform any
than the prototype ilter. Since both the stop-band and the schema expressed in model M into an equivalent schema
pass-band increase M fold, so does their differencethat in model M. (Hainaut, 2005)
is, the transition band. As a consequence of increased
transition band, the order of the ilter decreases, and in Model-Oriented Formal Speciication Language
turn the overall complexity decreases as well. (Jovanovic- Based on mathematical domains, for example, numbers,
Dolecek & Daz-Carmona, 2005) functions, sets, and so forth. Concrete. (Dasso & Funes,
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
452 M ode ling M OM

Modeling Modern Battleield


The act of representing something (usually on a smaller A holistic concept implementing network-centric
M scale). (Guan, 2005d) operations that allows the real-time connectivity of
ighting units, with the availability of combat-supportive
Modeling Language information and knowledge on demand of friendly forces
A language (i.e., a set of symbols, and rules for how to and of the enemy. (Ariely, 2006b)
combine these symbols) to represent knowledge relevant
in information systems development. (Krogstie, 2005a) Modern Parametric Option Pricing Model
A model that extends the BlackScholes work and relaxes
Modellens some of their assumptions in the hope of eliminating bias.
The constructed model, which may consist of different (Lajbcygier, 2005)
kinds of representation, such as sentences, igures, or
letters. (Marjomaa, 2005) Modiication
A change in what a student is expected to learn and
Modem demonstrate. The use of a modiication for a student changes
1: Most common method of connecting to the Internet the standard, the instructional level, or the content to be
requiring connectivity to the Plain Old Telephone Service learned by the student. (T. Cavanaugh, 2005)
(POTS) or Public Switched Telephone Network (PSTN).
(Latchem, 2005) 2: A data communications device standing Modular System Design
for modulator-demodulator. It receives digital signals An ERP system can be broken down by functional area (e.g.,
or information over a telephone line, and translates them sales, accounting, inventory, purchasing, etc.). It increases
into analog ones and/or vice versa. It enables a computer lexibility in terms of implementing multi-module (from
to communicate with other computers over telephone one or many vendors) or single-module ERP functionality.
lines. (Magagula, 2005) 3: A device used to transmit and (Sammon & Adam, 2005)
receive digital data over a telecommunications line. (Hin
& Subramaniam, 2005a) Modularity
Most ERP packages decompose their functionality
Modem (Modulator/Demodulator) in modules, grouping typical business functions such
An electronic device for converting between serial as inance, sales, and manufacturing, among others.
data from a computer and an audio signal suitable for (Framinan, 2005)
transmission over a telephone line or cable TV wiring
connected to another modem. (Vician & Buche, 2005) Module
A discrete educational item that covers a topic such as
Moderated Discussion Statistics. It would typically consist of a set number of
Discussion that is supervised, partly directed, and evaluated weeks of learning material delivered through lectures and
by a program tutor. (Grasso & Leng, 2005) seminars. (Coakes & Willis, 2005)

Moderation of Assessment MOEA: See Multi-Objective Evolutionary Algorithm.


External oversight of an assessment process to ensure
that appropriate standards are maintained. (Grasso & MOFN Expression
Leng, 2005) A Boolean expression consisting of an integer threshold m
and n Boolean antecedents which is ired when at least m
Moderator/Mediator antecedents are ired. For example, the MOFN expression
In the social sciences, moderators and mediators have 2-of-{ a, b, c } is logically equivalent to (a b) (a
been identiied as two functions of third variables. These c) (b c). (Zhou, 2005)
are sub-groups of independent variables that affect given
dependent variables via a mediator function. (Chou et MOLAP: See
al., 2005)
MOM: See Message-Oriented Middleware.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M om e nt M e a sure M ot ion Pic t ure Ex pe r t Group (M PEG) 453

Moment Measure but operational copies of itself. A simple-minded, scan


Skewness and kurtosis are moment measures calculated string-based virus scanner would not be able to reliably
using the horizontal and vertical projections and coordinates identify all variants of this sort of virus. One of the most
M
of center of gravity of the signature. (Chakravarty et al., sophisticated forms of polymorphism used so far is the
2005a) Mutation Engine, which comes in the form of an object
module. With the mutation engine, any virus can be made
Monitor polymorphic by adding certain calls to its assembler source
A person who is monitoring the good functioning of a code, and linking to the mutation-engine and random-
Public Discussion Forum. It is usually a volunteer who number generator modules. The advent of polymorphic
is specialized and interested in the speciic topic of the viruses has rendered virus scanning an ever more dificult
forum. (Gur u, 2006) and expensive endeavor; adding more and more scan
strings to simple scanners will not adequately deal with
Monitoring or Integrative Evaluation these viruses. (Luo & Warkentin, 2005)
The gathering of data from stakeholders on an innovation
for an extended period following initial implementation. Morphological Box
(Naidu, 2005a) Eficient tool for creativity and the structuring of ideas irst
introduced by Zwicky in 1966. The main advantage of it
Monolithic Solution is being able to present in a straightforward manner all of
A large software development project typically costing the possible solution alternatives for a speciic problem.
vast amounts of money and usually time to develop. (Blecker, 2006b)
Typically start out well, meeting users needs, but may
have considerable trouble coping with changing needs. Mosaic Effect
(Salter, 2005b) Occurs when learning objects are developed using HTML
and the style presentation is tagged within the HTML
Monothetic Process document, rendering content with different presentation
In a classiication tree, when data at each node are split on styles, thereby causing the appearance of a mosaic effect
just one variable rather than several variables. (Breault, when aggregating learning objects from disparate sources.
2005) (Stavredes, 2005b)

Monte Carlo Method Motif


The heart of this method is a random number generator. Combines a few secondary structure elements with a
The term Monte Carlo Method now stands for any sort speciic geometric arrangement. (Tsunoda et al., 2005)
of stochastic modeling. (Hou, Guo, et al., 2005)
Motion
MOO: See Multi-User Dimension Object Oriented; The physical or motoric element of navigation. (Sadeghian
Multi-User Domain Object Oriented. et al., 2006)

Moores Law Motion Capture


The prediction by Intel cofounder Gordon E. Moore that Technique that measures complex motions. One type of
the number of transistors on a microprocessor would double motion-capture technique places markers on the target
approximately every 24 months. To date, Moores law has object and tracks the motions of these markers. (Wen et
proven remarkably accurate. (Van Dyke et al., 2006) al., 2005)

Morphing Virus/Polymorphic Virus Motion Picture Expert Group (MPEG)


Viruses that are undetectable by virus detectors because 1: Marketing name of the ISOIEC SC29 WG11
they change their own code each time they infect a new standardization committee, affiliated with the ISO
computer, and some of them change their code every few (International Standardization Ofice) and creator of the
hours. A polymorphic virus is one that produces varied multimedia standards: MPEG-1, MPEG-2, MPEG-4,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
454 M ot ion Pic t ure Ex pe r t Group Com pre ssion M PEG Com pre ssion

MPEG-7, and MPEG-21. (Prteux & Preda, 2005) 2: A in performing public services. Lack of information content
working group of ISO/IEC in charge of the development is another subfactor. (Kalvet, 2005)
M of standards for coded representation of digital audio
and video. Since 1988, the group has designed MPEG-1 Mouse
(used for video CDs and MP3s), MPEG-2 (used in digital In computer terms, this is a hand-operated electronic device
television set-top boxes and DVDs), MPEG-4 (used for that moves the cursor on a computer screen. A mouse is
mobile use cases and networking), MPEG-7 (for the essentially an upside-down trackball, although the former
description of digital content), and MPEG-21 (which needs more room during operation as it moves around a
mainly addresses rights management, digital items, and horizontal surface. (Henley & Noyes, 2006)
adaptation of content). (Di Giacomo et al., 2005) 3: A
group developing standards for coding digital audio and Movement in Transportation Networks
video, as used for example in video CDs, DVDs, and digital Movement (of a moving object) that is conined on
television. This term is often used to refer to media that is a transportation network (such as rails or roads).
stored in the MPEG-1 format. (Sappa et al., 2005) (Vassilakopoulos & Corral, 2005)

Motion Picture Expert Group Compression Moving Object


Video/audio compression standard established by the 1: A data element that is characterized by its position in
Motion Picture Experts Group. MPEG compression space that varies in the course of time (this is a kind of spatio-
algorithms use psychoacoustic modeling of audio and temporal datum). (Vassilakopoulos & Corral, 2005) 2: Any
motion analysis, as well as DCT of video data, for eficient object (e.g., automobile, vessel, pedestrian) equipped with
multimedia compression. (Aradhye & Dorai, 2005) a location-detection device. (Bozanis, 2006)

Motion Unit (MU) Model Moving Object Database


Facial deformation model based on measurement of real 1: A database that maintains eficiently the location
facial motions. MUs are a set of vectors whose linear information about moving objects with proper indexing
combinations can be used to approximate arbitrary facial on the object location to support advanced queries such
shapes. (Wen et al., 2005) as location-dependent queries and continuous queries.
(Leong, 2005b) 2: A spatiotemporal database that
Motivation to E-Learn represents the dynamic attributes of continuously moving
An individual variable denoting an internal set of processes objects, including their past, current, and anticipated future
(both cognitive and behavioral) by which human energy location information. (Tzouramanis, 2005)
becomes focused on learning particular work-related
content (whether by actively interacting with courseware, Moving Point: See Moving Object.
participating in a virtual class, self-studying, doing e-
homework alone or in group) to achieve speciic learning Mozilla Project
goals. (Rentroia-Bonito & Jorge, 2005) A project formed in 1998 when Netscape released its
Internet tools suite for open source development. Released
Motivation-Related Antecedent Factor its lagship Firefox Web browser and Thunderbird e-mail
One of the set of intrinsic and extrinsic motivational client at the end of 2004. The Sunbird calendar component
factors that have been studied as antecedent factors for is currently under development. (Carillo & Okoli, 2006)
effective knowledge transfer. Other factors such as a lack
of incentives, a lack of conidence, and the not-invented- MPCC: See Multi-Purpose Community Center.
here syndrome have been widely discussed, but not widely
studied. (King, 2006b) MPCP: See Multi-Point Control Protocol.

Motivational Barrier MPEG: See Motion Picture Expert Group.


The main factor contributing to the digital divide in Estonia.
There is a perception that the possibilities offered by the MPEG Compression: See Motion Picture Expert
Internet are not associated with personal needs. Distrust of Group Compression.
e-services exists, as no time gain is perceived, especially

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M PEG-4 M ult i-Age nt Syst e m (M AS) 455

MPEG-4 MRO: See Maintenance, Repair, and Operations.


Standard speciied by the Moving Picture Experts Group
(MPEG) to transmit video and images over a narrower MRP: See Material Requirements Planning.
M
bandwidth and can mix video with text, graphics, and 2D
and 3D animation layers. (Hentea, 2005a) MRP II: See Manufacturing Resource Planning.

MPEG-4 AFX MSC: See Mobile Switching Center.


MPEG-4 extension with the aim to deine high-level
components and a framework to describe realistic MSDS: See Material Safety Data Sheet.
animations and 2D/3D objects. (Sappa et al., 2005)
MSO: See Multiple Service Operator.
MPEG-1
Standard for the coding of moving pictures and associated MSS: See Mobile Support Station; Management Support
audio for digital storage media at up to about 1.5 Mbit/s. System.
MPEG-1 is the standard on which video CD and MP3 are
based. (Cavallaro, 2005) MT: See Machine Translation.

MPEG-7 MU: See Motion Unit Model.


A standard formulated by the ISO Motion Picture Experts
Group (MPEG). Unlike MPEG-2 and MPEG-4, which deal MUD: See Multi-User Domain.
with compressing multimedia contents within speciic
applications, it speciies the structure and features of the Multi-Access
compressed multimedia content produced by the different Interacting with a computer using more than one input or
standards, for instance to be used in search engines. (Sappa output channel at a time, usually suggesting drastically
et al., 2005) different input channels being used simultaneously (e.g.,
voice, typing, scanning, photo, etc.). (Roibs, 2006a)
MPEG-2
Standard for the generic coding of moving pictures and Multi-Agent System (MAS)
associated audio information. MPEG-2 is the standard on 1: In a distributed universe, the systems that shelter
which digital television set-top boxes and DVD are based. agents are called multi-agent systems. An agent is a
(Cavallaro, 2005) hardware or software entity able to act on itself and on
its environment. (Faz & Mahmoudi, 2005) 2: A system
MPEG-21 in which many intelligent agents interact with each other.
Multimedia framework initiative that enables the The agents are considered to be autonomous entities,
transparent and augmented use of multimedia resources such as software programs or robots. Their interactions
across a wide range of networks and devices. (Cavallaro, can be either cooperative or selish. (Cardoso & Freire,
2005) 2005) 3: A system composed of several agents, capable of
mutual interaction. This interaction can be in the form of
MPIS: See Maximal-Proit Item Selection. message passing or producing exchanges in their common
environment. An MAS often manifests self-organization
MPLS: See Multi-Protocol Label Switching. and very complex behaviors even when the individual
strategies of all member agents are simple. (Camarinha-
MPQoS: See Mean Perceived Quality of Service. Matos & Ferrada, 2006) 4: A loosely coupled network of
software agents that interact to solve problems that are
MPS: beyond the individual capacities or knowledge of each of
Measure of the computational complexity of a digital them. An MAS distributes computational resources and
ilter expressed in terms of multipliers per output sample. capabilities across a network of interconnected agents.
(Jovanovic-Dolecek & Daz-Carmona, 2005) The agent cooperation is handled by means of an agent
communication language. (De Meo, Quattrone, et al.,
MRF: See Markov Random Field. 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
456 M ult i-Cha nne l M ult i-Dim e nsiona l Sc a ling

Multi-Channel Multi-Dimensional Data Model


Different interfaces that can be available to the user for A direct relection of the manner in which a business process
M data entry in a multi-platform system (iTV, PC, mobile is viewed. It captures the measurements of importance to
phone, smart phone, pocket PC, etc.). (Roibs, 2006a) a business and the parameters by which the measurements
are broken out. The measurements are referred to as fact or
Multi-Channel Delivery measures. The parameters by which a fact can be viewed
Provision of the same or similar services on different are referred to as dimensions. Multi-dimensional data
platforms, such as computer, PDA, mobile phone, and in models are used to design data warehouses. (Serrano et
person. (Knepper & Chen, 2006) al., 2005)

Multi-Channel Identity Multi-Dimensional Database (MDDB)


A perceived communicational coherence for each service 1: A virtual database where data is organized according
provided through the whole system of interfaces. (Roibs, to dimensions or aspects of the datasuch as product,
2006a) location, and time for sales datato facilitate queries,
such as: How many shoes were sold by Store #4 in
Multi-Channel Information System January? (Amaravadi, 2005) 2: Database based on a
Information system to be used by different types of end- multi-dimensional model. (Barca et al., 2005)
user equipment such as traditional PC, PDA, and a mobile
phone in an integrated manner. (Krogstie, 2005b) Multi-Dimensional Modeling
A modeling technique used in data warehouses, multi-
Multi-Channel Marketing dimensional databases, and OLAP applications, based on
Using more than one channel of distribution to reach the deining the facts of interest in terms of their dimension
customer; for example, a bricks-and-mortar retailer who hierarchies. (Barca et al., 2005)
also has a Web site and perhaps also a paper catalog.
(Roberts & Schwaab, 2006) Multi-Dimensional OLAP (MOLAP)
1: Implementation of a data warehouse and associated
Multi-Channel Retailing OLAP tools over specific multi-dimensional data
Also called bricks and clicks. It is the simultaneous structures. This approach has a more direct mapping
application of more than one channel of distribution in between the multi-dimensional conceptual schema and the
retailing. A multi-channel retailer operates at least one multi-dimensional physical schema. (Hernandez-Orallo,
electronic and one non-electronic (physical stores, catalog, 2005a) 2: A method of implementing a date warehouse that
etc.) channel of distribution. (Madlberger, 2006) relies on a multi-dimensional view of data. Information
is seen as a cube in n-dimensions; tailored structures
Multi-Database Mining are used to store it, and tailored query languages are
The mining of potentially useful patterns in multi- used to access it. (Badia, 2005c) 3: MOLAP architecture
databases. (Zhang & Zhang, 2005) that is based on a multi-dimensional database server. It
typically maintains data cubes in compressed array-like
Multi-Dimensional Aggregate Data data structures. (Riedewald et al., 2005) 4: Extends OLAP
Data in which a given fact is quantiied by a set of measures, functionality to multi-dimensional database management
obtained applying one more or less complex aggregative systems. (Tan, 2005b)
function (count, sum, average, percent, etc.) to row data.
(Rafanelli, 2005) Multi-Dimensional Query
A query on a collection of multi-dimensional data which
Multi-Dimensional Context produces a collection of measures classiied according to
The context where database transactions, and thus some speciied dimensions. (Tininini, 2005b)
the association relationships, happen. (Feng & Dillon,
2005) Multi-Dimensional Scaling
A way to visualize Euclidean distances. Networks
are often visualized by two-dimensional scaling in a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult i-Fa c e t e d Eva luat ion M ult i-N at iona l Corporat ion 457

graphical way with (x,y) coordinates, presenting a map each network layer. (Castro & Braga, 2006) 2: A layered
of geometrical Euclidean distances among actors in a neural network in which each layer only receives inputs
network. (Assimakopoulos & Yan, 2006) from previous layers. (Yeo, 2005)
M
Multi-Faceted Evaluation Multi-Layered Software Framework
Evaluation that includes a mixed-model approach to A layer-based software environment where each layer is
quantitative and qualitative data collection and analysis. a group of entities dedicated to perform a particular task.
(Neale et al., 2005) (Perrizo, Ding, Serazi, et al., 2005)

Multi-Faceted Evaluation Record Multi-Level Governance


Evaluation data record collating and synchronizing multiple A governance system comprising various institutional
types of data, for example, video recordings, user session levels: local, regional, national, macro-regional, and
logs, and ield observations. (Carroll et al., 2005) international or global levels. For example, the European
Union forms a multi-level governance system with
Multi-Factorial Disease municipalities, regions, member states, and the EU-level
Disease caused by several factors. Often, multi-factorial institutions, as does any federal system of government,
diseases are due to two kinds of causality that interact like those in the United States or Germany. (Anttiroiko,
one is genetic (and often polygenetic) and the other is 2005a)
environmental. (Jourdan et al., 2005)
Multi-Level Secure Database Management
Multi-Hop System
The mobile nodes are cooperating to forward data on A system whereby database users are assigned classiication
behalf of one other node to reach distant stations that levels, and data items are assigned sensitivity levels. Also
would otherwise have been out of range of sending node. called a Multi-Level Secure Transaction-Processing
(Erbas, 2005) System. (Haraty, 2005a)

Multi-Hop Hotspot Multi-Level Secure Transaction-Processing


One of a number of hotspots through which users could System: See Multi-Level Secure Database Management
roam seamlessly. (Cremonini et al., 2006) System.

Multi-Lateral Agreement on Investment Multi-Level Security (MLS)


A draft agreement designed to protect foreign investors Security in which the data are associated with classiication
by limiting host state regulation. The 30 members of the levels and the users are associated with clearance levels.
Organization for Economic Cooperation and Development Accesses to data are granted by comparing classiications
failed to reach agreement in 1998 after three years, and and clearances. (Gabillon, 2005)
negotiations ceased. (Smith & Smythe, 2005)
Multi-Method Approach
Multi-Layer Perceptron Investigation of a research question using a variety of
A simple type of artiicial neural network where the inputs research methods, each of which may contain inherent
are fed through several layers of neurons to generate an limitations, with the expectation that combining multiple
output value. Multi-layer perceptrons can be trained to methods may produce convergent evidence. (Leni et al.,
solve problems that are not linearly separable. (Kushnir, 2005)
2006)
Multi-National Corporation
Multi-Layer Perceptron Feedforward Network 1: A company that owns or controls production or
1: Type of neural network topology. Set of sensorial input service facilities in more than one country, and therefore
units, one or more hidden (intermediate) layers, and an conducts business globally. (M. Rowe, 2005b) 2: A irm
output layer of computational elements (neurons). The entry that has operations in multiple countries. (Karahanna et
signal propagates from the inputs to the outputs through al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
458 M ult i-N at iona l Ent e rprise (M N E) M ult i-Sit e Soft w a re Te a m

Multi-National Enterprise (MNE) Multi-Protocol Label Switching (MPLS)


A irm that is engaged in Foreign Direct Investment (FDI) 1: Associates labels to lows in an IP network. Each
M in several countries outside its home country. (Brock & router on the end-to-end path makes scheduling and
Zhou, 2006) routing decisions for a packet based on the contents of
its label. (DaSilva, 2005) 2: Assigns a short ixed-size
Multi-Objective Evolutionary Algorithm label to an IP packet. A streamlined version of an IP
An evolutionary algorithm in which there are multiple packet header, this label supports fast and dependable
objectives to be optimized simultaneously. (Richards & multimedia transmissions via label-switched paths over
de la Iglesia, 2005) packet networks. (Littman, 2005)

Multi-Objective Optimization Multi-Purpose Community Center (MPCC)


The problem of inding a vector of decision variables A telecenter that has a political motivation to aid in the
that satisies constraints and optimizes a vector function upliftment of a disadvantaged group. Implemented by
whose elements represent the objective functions. There the United States, it aims to provide one-stop access
is often some conlict between the objectives to be to government and other digital information. There
optimized; hence the solution to such a problem tends to is no standard coniguration since, in principle, the
be a compromise solution that satisies to some extent the MPCC is conigured in response to community-deined
objectives. (Richards & de la Iglesia, 2005) requirements. Although the initial MPCC setup is funded
by a consortium of national and local governments and
Multi-Path Fading the private sector, the MPCC is supposed to be fairly
The propagation phenomenon that results in radio self-sustaining in the longer terma dificult challenge
signals reaching the receiving antenna by two or more in most cases. In early 2004, more than 50 MPCCs had
paths. Causes of multi-path include atmospheric ducting, been established throughout South Africa. (Trusler &
ionospheric relection and refraction, and relection from Van Belle, 2005)
terrestrial objects, such as mountains and buildings. (Kao
& Rerrer, 2006) Multi-Relational Data Mining
1: Mining patterns that involve multiple tables in a relational
Multi-Path Propagation database. (Holder & Cook, 2005) 2: The process of
The situation where the transmitted signal reaches the knowledge discovery from relational databases consisting
receiver through multiple electromagnetic waves (paths) of multiple tables. (Perrizo et al., 2005a)
scattered at various surfaces or objects. (Iossiides et al.,
2005) Multi-Relational Vertical Mining
The process of knowledge discovery from relational
Multi-Perspectival Space databases consisting of multiple tables using vertical
A spatial ield viewed simultaneously from different data-mining approaches. (Perrizo et al., 2005a)
vantage points. (Murphy, 2005b)
Multi-Resolution Analysis
Multi-Plex A process to treat a function (i.e., an image) at various
Within digital mobile radio networks, three different levels of resolutions and/or approximations. In such a
multi-plexing techniques can be applied: Time Division way, a complicated function could be divided into several
Multiple Access (TDMA), Frequency Division Multiple simpler ones that can be studied separately. (Y.-J. Zhang,
Access (FDMA), and Code Division Multiple Access 2005b)
(CDMA). (Kaspar & Hagenhoff, 2005)
Multi-Site Software Team
Multi-Point Control Protocol (MPCP) Software teams located in different cities and/or in different
Medium access control protocol used in EPONs to avoid countries collaborate as a single team for a clear objective
collisions in the upstream direction. (Freire et al., 2005) project. (Lui & Chan, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult i-St a ge Filt e ring M ult ic a st Prot oc ol 459

Multi-Stage Filtering oriented. (Ridings, 2006a) 3: Synchronous text-based


Cascade of ilters and decimators (interpolators and ilters). virtual environment that can be accessed by geographically
(Mili, 2005) dispersed individuals simultaneously. MOOs are a
M
type of multi-user dimension based on object-oriented
Multi-State Anti-Terrorism Information Exchange programming, enabling users to create and manipulate
(MATRIX) objects. (Roberts et al., 2006b). Also called Multi-User
A consortium of states attempting to create a database of Dimension Object Oriented.
public and private information on individuals to allow for
advanced searches to uncover suspicious criminal and/or Multi-User Dungeon: See Multi-User Domain.
terrorist activity. (Holland, 2005)
Multi-User Environment
Multi-Threaded System An Internet-based virtual environment in which multiple
System where many concurrent sequences of executing users communicate and interact. (Ketelhut et al., 2005)
instructions (called threads) may coexist and share data.
(Curti, 2005) Multicast
1: Transmitting a single message to a select group of
Multi-Threading recipients. A simple example of multicasting is sending
Programs written to execute in a parallel manner, rather an e-mail message to a mailing list. (Yang et al., 2005a)
than a serial or purely sequential one, in order to take 2: A one-to-many client/server connection in which
advantage of multiple processors. (Yow & Moertiyoso, multiple clients receive the same stream from a server.
2005) To receive a multicast, a client listens to a speciic IP
address on a multicast-enabled network, like tuning a
Multi-User Dimension Object Oriented (MOO): television to a speciic channel. In contrast, a unicast is
See Multi-User Domain Object Oriented. a one-to-one connection in which each client receives a
separate stream from a server. Multicasting is a technique
Multi-User Domain (MUD) whereby information is transmitted to a well-deined and
1: Network-based text application initially developed for controlled group of users on your network. (Cosemans,
role-playing games in which players interact with each 2005b) 3: A technology that allows delivery of data, sent
other in a computer-created fantasy environment. (Hwang once, to multiple destinations, hence reducing bandwidth
& Stewart, 2005) 2: Combines online chatting abilities and requirement. Applications that could beneit from multicast
a role-playing game. A MUD built with object-oriented are multimedia broadcasts, like video and audio broadcasts,
principles in mind is called a multi-user dimension object distribution of news, software, and others. (Papagiannidis
oriented or MOO. The main distinction is that in a MOO, et al., 2005)
users can design and program new objects that can be
used by other participants, while in a MUD the user can Multicast Group Communication Protocol
experience the environment, but not change it. (Paoletti, Provides reliable totally ordered delivery of messages that
2005) 3: Originally a multi-user dungeon, a virtual world are multicast to all replicas of a component, process, or
where people would role play in a fantasy world. Later to object. (Zhao et al., 2006)
expand to all manner of virtual worlds. (Ajiferuke &
Markus, 2005) 4: Multi-User Dungeon; a virtual space Multicast Island
where subjects play a game similar to an arcade, interacting Multicast-capable network where all routers have multicast
through textual and visual tools. In a MUD it is usual to routing protocols and the IP multicast is available. One of
experience a hierarchy. (Pace, 2005) the main problems of the IP multicast is connecting the
multicast islands into an Internet-wide network. (Hossz,
Multi-User Domain Object Oriented (MOO) 2006)
1: One of the many MUD spin-offs created to diversify
the realm of interactive, text-based gaming. A MOO is Multicast Protocol
similar to a MUSH in that the users themselves can create Delivers messages reliably and in the same order to all of
objects, rooms, and code to add to the environment. (Vician the replicas within a group. (Zhao et al., 2005)
& Buche, 2005) 2: MUD which is programmed object-

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
460 M ult ic a st Rout ing M ult im e dia

Multicast Routing Team members will disband upon the completion of the
For the service of delivering one message to multiple project. (Fong, 2006b)
M destinations over the computer networks. One such
application is the newsgroup. (Hu, 2005) Multilingual Content Management
Process of organizing, categorizing, and structuring
Multicast Routing Protocol information resources for multilingual storage, publishing,
In order to forward the multicast packets, the routers have and reuse. (He, 2006)
to create multicast routing tables using multicast routing
protocols. (Hosszu, 2005a) Multilingual Interface
Interface written in multiple languages. These interfaces
Multicast Transport Protocol may be identical to each other or vary based on differential
To improve the reliability of the multicast delivery, needs. (Gangopadhyay & Huang, 2005)
special transport protocols are used in addition to the
widely used unreliable User Datagram Protocol (UDP). Multilinguality
(Hossz, 2005a) Term used to address the measures now being taken
to provide graphical user interfaces with features for
Multicultural Team internationalizationthat is, support of the character sets
A team composed of members who have spent their and encodings used to represent the information being
formative years in different countries and thus have learned manipulated, and presentation of the data meaningfully.
different values, demeanors, and languages. (Cagiltay et (Valenti, 2005)
al., 2005)
Multimedia
Multiculturality 1: More than one concurrent presentation medium (i.e.,
The term used to address the measures now being taken CD-ROM or a Web site). Although still images are a
to provide graphical user interfaces with ad hoc icons different medium than text, multimedia is typically used
and texts according to the cultural heritage of the user. to mean the combination of text, sound, and/or motion
(Valenti, 2005) video. (Rahman, 2005c) 2: A combination of two or
more media to present information to users. (Ally, 2005c)
Multidatabase 3: A term that originated in the audiovisual industry
1: A distributed database system that allows integrated to describe a computer-controlled, multiple-projector
access to heterogeneous, distributed, and pre-existing slideshow with a sound track. Multimedia is now viewed
databases. (Unal et al., 2006) 2: Integrated database in computer terms as a blending of media types: text,
managed by a local database management system without audio, visual, and data in one convenient computer-based
distributed ACID properties. (Frank, 2005b) delivery system. (Reisman, 2006) 4: A term used to relect
diverse platforms for communicating ideas and meaning
Multidisciplinary Design through a mix of media information that may include text,
A collaborative approach to design that shares research audio, video, and still pictures. (Theng, 2005) 5: Broadly
and design activities among a range of disciplines. (Knight deined, multimedia is the blending of sound, music,
& Jefsioutine, 2006) images, and other media into a synchronized whole. Such
a deinition is perhaps too wide, for it may be taken to
Multidisciplinary Project Team include artistic works, audiovisual presentations, cinema,
1: A group of team members with diverse educational theater, analog television, and other such media forms.
backgrounds, training, skill sets, experience, and A more precise term is digital multimedia, meaning
professional identities working together in a team situation the computer-controlled integration of text, graphics,
in order to tackle a task or project. They will be disbanded still and moving images, animation, sounds, and any
upon the completion of the temporary assignment. They other medium where every type of information can be
can come from different functional departments or represented, stored, transmitted, and processed digitally.
organizations. (Fong, 2006a) 2: A team of people who See also Interactive Digital Multimedia. (M. Lang, 2005)
possess diverse skills, knowledge, and experience, who join 6: Combined use of several media, such as text, audio,
together to work on a project which has a limited duration. and images. The Internet provides the ability to use one,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult im e dia Asse t M ult im e dia Doc um e nt 461

some, or all of them to deliver content. (Daz-Andrade, search them by keywords can be regarded as a multimedia
2005) 7: Communications media that combine multiple database. An electronic encyclopedia such as Microsoft
formats such as text, graphics, sound, and video (e.g., Encarta Encyclopedia, which consists of tens of thousands
M
a video incorporating sound and subtitles or with text of multimedia documents with text descriptions, photos,
attached that is concurrently displayed). (Garrett, 2006b) video clips, and animations, is another typical example
8: Data combining several different media, such as text, of a multimedia database. (Li et al., 2005) 2: A high-
images, sound, and video. (Denoyer & Gallinari, 2005) performance database management system and a database
9: Integration of several media, such as text, audio, video, with a large storage capacity that supports and manages, in
animation, and so forth. (Sharma & Mishra, 2005) addition to alphanumerical data types, multimedia objects
regarding storage, querying, and searching. (Bretschneider
Multimedia Asset & Kao, 2005) 3: A particular challenge for a multimedia
One of the digitized text, audio, video, images, and other database is the ability to deal with multimedia data types.
multimedia materials that can be stored and used. (Leath, Retrieval of structured data from databases is typically
2005) handled by a Database Management System (DBMS),
while retrieval of unstructured data from databases
Multimedia Communication requires techniques developed for Information Retrieval
A new, advanced way of communication that allows (IR). Yet the rigid resource requirement demands more
any of the traditional information forms (including their advanced techniques in dealing with multimedia objects
integration) to be employed in the communication process. in a mobile computing environment. (Parker & Chen,
(Hulicki, 2005) 2005) 4: A repository of different data objects such as text,
graphical images, video clips, and audio. (Hentea, 2005c)
Multimedia Content Adaptation 5: Database storage and retrieval capabilities developed
The process of adapting a multimedia resource to the with respect to multimedia requirements for high-quality,
usage environment. The following factors make up this rapid, queried usage by applications. (Vitolo et al., 2005) 6:
usage environment: users preferences, device, network, Non-conventional databases that store various media such
natural environment, session mobility, adaptation QoS, as images and audio and video streams. (Farag, 2005a)
and resource adaptability. (Knight & Angelides, 2005)
Multimedia Database Object Property
Multimedia Data The properties of a multimedia object refer to the objects
Data that represent continuous objects of the real world QoS-sensitive characteristics. They can be categorized into
(e.g., images, audio), in which searching by exact equality several attributes. The nature of object can be described by
is usually meaningless. (Chvez & Navarro, 2005) frame size, frame rate, color depth, compression, and so
forth; the quality of object presentation can be determined
Multimedia Data Mining by delay variation and loss or error rate. (Zhang & Chen,
1: Extracting interesting knowledge out of correlated 2005)
data contained in audio, video, speech, and images.
(Swierzowicz, 2005) 2: The application of data mining Multimedia Document
to data sets consisting of multimedia data, such as 2D 1: A natural extension of a conventional textual document
images, 3D objects, video, and audio. Multimedia data in the multimedia area. It is deined as a digital document
can be viewed as integral data records, which consist of composed of one or multiple media elements of different
relational data together with diverse multimedia content. types (text, image, video, etc.) as a logically coherent
(Viktor & Paquet, 2005) unit. A multimedia document can be a single picture or a
single MPEG video ile, but more often it is a complicated
Multimedia Database document, such as a Web page, consisting of both text
1: A database system dedicated to the storage, management, and images. (Li et al., 2005) 2: Represents a document
and access of one or more media types, such as text, image, containing not only textual data, but also multimedia
video, sound, diagram, and so forth. For example, an image ones such as images, videos, songs, and so forth. (Chbeir
database such as Corel Image Gallery that stores a large & Yetongnon, 2005)
number of pictures and allows users to browse them or

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
462 M ult im e dia Engine e ring M ult im e dia Se r vic e

Multimedia Engineering order as one singular message. MMS does not support
The employment of a systematic, disciplined, quantiiable attachments as e-mail does. (Roibs, 2006b) 2: Similar
M approach to the development, operation, and maintenance to text messaging (SMS), but allows the transmission of
of multimedia applications. (Uden, 2005) graphics, sound iles, video clips, and text. It is based on
WAP and can be used to send e-mail. (Petrova, 2006) 3:
Multimedia Information Retrieval (System) A service giving the capability to a mobile-phone user to
Storage, indexing, search, and delivery of multimedia send a message containing any combination of images,
data such as images, videos, sounds, 3D graphics, or video clips, text, and audio to another user. (Ververidis &
their combination. By deinition, it includes works on, Polyzos, 2006) 4: A cellular phone service allowing the
for example, extracting descriptive features from images, transmission of multiple media in a single message. As
reducing high-dimensional indexes into low-dimensional such, it can be seen as an evolution of SMS, with MMS
ones, deining new similarity metrics, eficient delivery supporting the transmission of text, pictures, audio, and
of the retrieved data, and so forth. Systems that provide video. (Garrett, 2006b) 5: A form of mobile communication
all or part of the above functionalities are multimedia where each message can contain picture, audio, video,
retrieval systems. The Google image search engine is a and text material with certain data size limitations. A
typical example of such a system. A video-on-demand multimedia message is typically sent from one camera
site that allows people to search movies by their titles is phone to another. (Hkkil & Beekhuyzen, 2006)
another example. (Li et al., 2005)
Multimedia Mining
Multimedia Instruction A new ield of knowledge discovery in multimedia
A presentation using both words and pictures that is documents dealing with non-structured information such
intended to promote learning. (M. Mitchell, 2005c) as texts, images, videos, audio, and virtual data. (Chen
& Liu, 2005)
Multimedia Internetworking
Refers to network infrastructures, protocols, models, Multimedia Normal Form
applications, and techniques that are being currently One of the rules for testing multimedia database schemes
deployed over the Internet to support multimedia in order to prevent possible manipulation anomalies.
applications such as videoconferencing, video on demand, (Chang et al., 2005)
shared workspaces, and so forth. (Fortino, 2005)
Multimedia Object (MMO)
Multimedia Learning System A self-describing manifest of iles used to encapsulate
A system where content is delivered digitally using text, an electronic media element. Consists of media iles
graphics, animation, sound, and video. (Lateh & Raman, conforming to a deined naming standard and an associated
2005) MVML ile. (Verhaart & Kinshuk 2006)

Multimedia Message Service (MMS) Multimedia Repository


1: A store-and-forward method of transmitting graphics, Specialized database that makes different types of
video clips, sound iles, and short text messages over media, such as text, sound, video, computer graphics,
wireless networks using the WAP protocol. Carriers and animation, available to users across an enterprise
deploy special servers, dubbed MMS centers (MMSCs), to promote reuse and reduce redundancy. (Ribire &
to implement the offerings on their systems. An MMS also Romn, 2006)
supports e-mail addressing so the device can send e-mails
directly to an e-mail address. The most common use of Multimedia Service
MMS is for communication between mobile phones. MMS, Refers to a type of service, which includes more than
however, is not the same as e-mail. MMS is based on the one type of information (text, audio, pictures, and video)
concept of multimedia messaging. The presentation of transmitted through the same mechanism and allowing
the message is coded into the presentation ile so that the the user to interact or modify the information provided.
images, sounds, and text are displayed in a predetermined (Pagani, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult im e dia St re a m M ult iple Cha nne l Pe r Ca rrie r (MCPC) 463

Multimedia Stream Multimodal Interaction


Progressively transmitted/received data corresponding to Uses more than one mode of interaction and often uses
a multimedia presentation, as opposed to a ile containing visual, auditory, and tactile perceptual channels of
M
all the data. (Arya, 2005) interaction. (de Freitas & Levene, 2006b)

Multimedia Super Corridor Multimodal Interface


Malaysia Governments Information Technology 1: An interface that communicates with users through
Infrastructure plan. (Lateh & Raman, 2005) multiple modes. (Chan & Fang, 2005) 2: Human-computer
interface able to exploit different user sensorial channels,
Multimedia Synchronization to provide/gather information. For instance, the user can
Multimedia systems usually integrate different types of vocally ask for a service and then read the results on the
data streams, including continuous media (e.g., audio and display. (Costagliola et al., 2006)
video) and discrete media (e.g., text and still images). The
information (e.g., temporal, spatial, and content relations) Multimodal (Natural) HCI
for displaying these data streams is often interrelated. Thus Human-computer interaction in which command and
multimedia systems must guarantee such relationships information low exchanges via multiple natural sensory
between streams against partial loss, or being non- modes of sight, sound, and touch. The user commands
functional when the streams are transmitted after capture are issued by means of speech, hand gestures, gaze
and presented to end users. (Liu & Chen, 2005) direction, facial expressions, and so forth, and the requested
information or the computers feedback is provided by
Multimedia System means of animated characters and appropriate media.
1: Any computer-delivered electronic system that presents (Pantic, 2005a)
information through different media that may include text,
sound, video computer graphics, and animation. (Alkhalifa, Multimodality
2005a) 2: Text, graphics, sound, video, animations Multiple types of media data, or multiple aspects of a
presented in an integrated way (electronically). (Sieber data item. Its emphasis is on the existence of more than
& Andrew, 2005) one type (aspects) of data. For example, a clip of digital
broadcast news video has multiple modalities, including
Multimedia Technology (MMT) audio, video frames, closed-caption (text), and so forth.
All technological tools that make us able to transmit (Li et al., 2005)
information in a very large meaning, leveraging the
learning power of human senses and transforming Multimodality of Feature Data
information into knowledge stimulating the cognitive Feature data is said to be multimodal if the features can be
schemes of learners. (Cirrincione, 2005) characterized as a mixture of real-valued, discrete, ordinal,
or nominal values. (Aradhye & Dorai, 2005)
Multimedia Telediagnostic Environment
(MMTE) Multimode
Permits users to work remotely on common shared resources Service that can be accessed and used with different
and applications, and simultaneously communicate both interfaces in a multi-platform system (e.g., a chat that is
visually and through audio. (Murthy & Krishnamurthy, available across handhelds and PCs). (Roibs, 2006b)
2005d)
Multiple Channel Per Carrier (MCPC)
Multimedia Transmission This technology refers to the multiplexing of a number
Transmission that combines media of communication (text, of digital channels (video programs, audio programs, and
graphics, sound, etc.) (Barolli & Koyama, 2005a) data services) into a common digital bit stream, which are
then used to modulate a single carrier that conveys all of
Multimodal the services to the end user. (Rahman, 2005d)
The use of different modalities within a single user
interface. (Lumsden, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
464 M ult iple Conc e pt -Leve l Assoc iat ion Rule M ult irat e Filt e r

Multiple Concept-Level Association Rule seven primary forms are: linguistic, musical, logical-
Extends association rules from single level to multiple mathematical, spatial, body-kinesthetic, intrapersonal
M levels. Database contents are associated together to the (e.g., insight, metacognition), and interpersonal (e.g., social
concepts, creating different abstraction levels. (Yeo, skills). (Burrage & Pelton, 2005)
2005)
Multiple Regression
Multiple Data Sales A statistical technique that predicts values of one variable
Process in which a client organization asks an outsourcing on the basis of two or more other variables. (Yeo, 2005)
employee to compile personal data on behalf of that
organization; the individual compiling this data then Multiple Service Operator (MSO)
proceeds not only to provide the client organization with Synonymous with cable provider. A cable company that
that information, but to sell copies of that data to as many operates more than one TV cable system. (Raisinghani
interested parties as possible. (St.Amant, 2006b) & Ghanem, 2005)

Multiple Data Source Mining Multiple Sourcing


The process of identifying potentially useful patterns from Service recipients that have outsourced the responsibility
different data sources. (Zhang & Zhang, 2005) to execute the services to more than one service provider.
(Beulen, 2005)
Multiple Discriminant Analysis
1: A multivariate technique that can be used if the single Multiple Spatial Representation
dependent variable is dichotomous or multi-chotomous, Multiple representation levels encompass changes in
and therefore non-metric. The goal of this technique is to geometric and topological structure of a digital object that
understand the difference between groups and to predict occur with the changing resolution at which the object is
the likelihood that an entity will belong to a particular encoded. (Rodrguez-Tastets, 2005a)
group based on several metric independent variables.
(Wilson et al., 2006a) 2: Discriminant analysis is one of Multiple Views
the available technologies for identifying the variables Visualization technique consisting of showing several
that discriminant best between groups. Furthermore, aspects or views of a program, where any view typically
that we can use the identiied variables to develop a rule shows few aspects and must be comprehensible by itself.
to classify future observations into one of the groups. Typical views are code vs. data, several levels of abstraction,
(Shih & Fang, 2006) logic vs. performance, history, and several simultaneous
algorithms. (Pareja-Flores & Iturbide, 2005)
Multiple Hypothesis Test
A formal statistical procedure used to account for the effects Multiple-Access (MA)
of multiplicity in a hypothesis test. (Mukherjee, 2005) Procedures regulating the simultaneous use of a common
transmission medium by multiple users. (Markhasin et
Multiple Inheritance al., 2005)
The capability of a class of objects to inherit attributes
and behavior from more than one superclass. (Alhajj & Multiple-Resource Theory
Polat, 2005) A model of attention that assumes many specialized
preprocessors (e.g., visual system, auditory system) that
Multiple Intelligence can function in parallel. (Owen, 2006b)
1: A theory developed by Howard Gardner stating
that every individual has a different set of developed Multiple-Site Link Structure Analysis
intelligences or languages that one speaks, cutting A technique for identifying the alternative document model
through cultural, educational, and ability differences. that best its a collection of Web pages. (Thelwall, 2005)
(Chambel & Guimares, 2005) 2: A theory that suggests
there are a number of distinct forms of intelligence Multirate Filter
that each individual possesses in varying degrees. The A digital ilter that changes the input data rate in one or more
intermediate points in the ilter itself. (Mili, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult irat e Syst e m M ut ua l Disa m biguat ion 465

Multirate System is the responsibility of the lessee, not the municipality.


Discrete-time systems with unequal sampling rates at (Chochliouros et al., 2005a)
various parts of the system. (Jovanovic-Dolecek, 2005b)
M
Municipal Information Society
Multivalued Dependency A term used to describe a society and an economy that
One of the relations between three attributes. In a table R makes best possible use of information and communication
with columns A, B, and C, B is multi-valued dependent on technology (ICT). Citizens and business organizations in a
A if there is more than one value of B for a single value municipality receive the full beneits of ICT in all aspects
of A. Multi-valued dependences must be eliminated to of their lives. (Averweg, 2006)
produce Fourth Normal Form. (Schultz, 2005)
Music Content Analysis
Multiversion Concurrency Control The analysis of an audio signal in terms of higher-level
Method used in relational databases to achieve (cognitive) properties such as melody, harmony, and
serializability of transactions. MCC ensures a transaction rhythm, or in terms of a description of the signals
never has to wait for a database object by maintaining component sounds and the sound sources which generated
several versions of an object. Each version would have them. (Dixon, 2005)
a write time-stamp, and it would let a transaction read
the most recent version of an object which precedes the Music Information Retrieval
transactions time-stamp. (Curti, 2005) The research ield concerning the automation of access to
music information through the use of digital computers.
Multiview Learning (Dixon, 2005)
1: A family of semi-supervised or unsupervised learning
algorithms that can be applied when instances are Mutation
represented by two sets of features, provided that these 1: In biology, a permanent, heritable change to the genetic
sets are conditionally independent given the class, and material of an organism. Mutation in genetic algorithms
that either set sufices to learn the target concept. By (GAs) involves string-based modiications to the elements
minimizing the disagreement between two independent of a candidate solution. These include bit-reversal in bit-
classiiers, multiview algorithms minimize an upper bound string Gas, and shufle and swap operators in permutation
on the error rate that can be determined without reference GAs. (Hsu, 2005a) 2: In genetic algorithms, a change in
to labeled data. (Scheffer, 2005) 2: Explicitly exploiting form or qualities of chromosomes. (Guan, 2005e) 3: A
several disjoint sets of features, each of which is suficient cubegrade is a mutation if the target, and source cells
to learn the target concept. (Muslea, 2005) have the same set of attributes but differ on the values.
(Abdulghani, 2005b)
Municipal Consulting
The system (institution) and type of management Mutation Engine: See Morphing Virus/Polymorphic
consulting, the objects of which are the subjects of Virus.
municipal scope of activity. A separate form of municipal
consulting is giving consultations regarding issues of local Mutation Transformation
and regional development. In the Ukraine, municipal A schema transformation that changes the nature (entity
consulting as a social institution is at the formation stage. type, relationship type, attribute) of a schema construct. For
(Molodtsov, 2005) instance, an entity type is transformed into a relationship
type and conversely. (Hainaut, 2005)
Municipal Fiber Network
A network of a speciic nature and architecture owned Mutual Disambiguation
by a municipality (or a community). Its basic feature is The phenomenon in which an input signal in one modality
that it has been installed as a kind of public infrastructure allows recovery from recognition error or ambiguity in
with the intention of leasing it to any potential users a second signal in a different modality is called mutual
(under certain well-deined conditions and terms). Again, disambiguation of input modes. (Bourguet, 2006)
lighting the iber to deploy private network connections

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
466 M ut ua l I nfor m at ion (M I ) M ySQL

Mutual Information (MI)


1: (MI = log2(f(a,b)/(f(a)2f(b)). (Ahmad & Al-Sayed, 2006)
M 2: Shows the amount of information that one random
variable x contains about another y. In other words, it
compares the probability of observing x and y together,
with the probabilities of observing x and y independently.
(Ito, 2005)

Mutual Innovation
The process of two organizations striving for product
innovations from the end users of the product, created
from their product knowledge derived from use and
their own needs. This goes beyond just asking for future
requirements, but constructing knowledge that comes
from closely integrated innovation practices. (Paquette,
2006b)

Mutual Knowledge
The common ground or knowledge that a team possesses
and knows that it possesses. (King, 2006a)

MVML: See Media Vocabulary Markup Language.

MVNO: See Mobile Virtual Network Operator.

Myers-Briggs Personality System


Identiies 16 personality types largely based on the
psychology of C.G. Jung and involving four dimensions:
introvert/extravert, intuitive/sensing, thinking/feeling, and
judging/perceiving. (Kaluzniacky, 2006)

MySpace(.com)
Online social networking application. (Mew, 2006)

MySQL
Open source database that organizes information through
tables, and enables interactions between the user and the
Web through the creation of dynamic Web pages. (Boateng
& Boateng, 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N -Dim e nsiona l Cube N a rrat ive K now le dge Re pre se nt ati on La ngua ge (N K RL) 467

N
N-Dimensional Cube Narrative Convention
A group of k-dimensional (k<=n) cuboids arranged by the One of the standard ways and techniques of telling stories
dimension of the data. (Abdulghani, 2005a) expected by readers, viewers, and computer users. (Berg,
2005e)
N-Safe Design
Replication method where all n copies are consistent and Narrative Document or Narrative
up-to-date. (Frank, 2005a) Multimedia document (very often an unstructured, natural
language documents like a memo, policy statement, report,
Naive Bayes minutes, news story, normative and legal text, etc.) that
An extremely simple classiication algorithm based on the constitutes a huge underutilized component of corporate
use of the posterior probability as the deining criterion knowledge. In such narratives, the main part of the
to choose among a set of hypotheses (classes). The Naive information content consists of the description of events
Bayes classiier simpliies calculations by assuming that relate the real or intended behavior of some actors
conditional independence among the dataset attributes, (characters, personages, etc.); these try to attain a speciic
given the class. (Laura, 2005) result, experience particular situations, manipulate some
(concrete or abstract) materials, send or receive messages,
Named Entity buy, sell, deliver, and so forth. Classical ontologies
Lexical phrase that falls into one of the three semantic are inadequate for representing and exploiting narrative
categories: TIMEX, NUMEX, and ENAMEX. TIMEX knowledge in a non-trivial way. (Zarri, 2006c)
includes temporal expressions, for example, March 1st,
noon EST. NUMEX consists of numeric expressions, Narrative Engineering
for example, 7.5%. ENAMEX includes: proper names, The deliberate use of stories and storytelling to bring about
for example, Peter the Great; locations, for example, some organizational outcome. (Connell, 2006)
St. Petersburg; and organizations, for example, Russian
Orthodox Church. (Kulyukin & Nicholson, 2005) Narrative Inquiry
An approach to documenting a research participants story
Namespace about an area of interest. (Hunter, 2006a)
A simple mechanism for creating globally unique names
in domain-speciic vocabularies. It is used to distinguish Narrative Knowledge Representation Language
identical names in different markup languages, allowing (NKRL)
domain-speciic names to be mixed together without Classical ontologies are largely suficient to provide
ambiguity. Each namespace is identiied by a URI reference a static, a priori deinition of the concepts and of their
and easily can be used in XML documents. (Pereira & properties. This is no more true when we consider the
Freire, 2005) dynamic behavior of the conceptsthat is, we want
to describe their mutual relationships when they take
Narrative part in some concrete action, situation, and so forth
A social exchange, within an organizational context, in (events). NKRL deals with this problem by adding to
which events, either actual or imagined, unfold over time. the usual ontology of concept and ontology of events,
(Connell, 2006) a new sort of hierarchical organization where the nodes,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
468 N a rrat ive Re a soning N at iona l I nfor m at ion Te chnology Policy

called templates, represent general classes of events teaching, and together, the coalition represents over three
like move a physical object, be present in a place, million individuals. The U.S. Department of Education and
N produce a service, send/receive a message, and so the Council for Higher Education Accreditation recognize
forth. (Zarri, 2005a) NCATE as a professional accrediting body for teacher
preparation. (Rhoten, 2006b)
Narrative Reasoning
Speciic, context-dependent reasoning that is open to National Crime Information Center (NCIC)
subjective interpretation, and potentially leads to multiple A national center housed at the FBI that provides 24-
conclusions. (Artz, 2005a) hour-a-day, seven-day-a-week, real-time access to law
enforcement for warrants, stolen vehicles, and other
Narrowband articles. (Holland, 2005)
A transmission path that is capable of 64 kbps transmission
and voice-grade service. (Kelic, 2005) National Digital Government Strategy
A plan for digital government development at the national
Narrowband Speech Signal level which may include infrastructure, training, security
Speech signal with a frequency band equal to that of the and privacy, digital divide, service provision, access, and
telephone channelthat is, with a bandwidth of 300 to publication initiatives. Examples include UK Online, e-
3300 kHz. (Perez-Meana & Nakano-Miyatake, 2005) Japan, and e-Korea. (Knepper & Chen, 2006)

Narrowcasting National E-Government Infrastructure (NeI)


Sending data to a speciic list of recipients as opposed to, Refers to the basic foundation, in both hardware and
for example, network TV, which uses a broadcast model in software, on which an e-government system can be built
which the signals are transmitted everywhere and anyone and developed. It generally consists of 4N factors:
with an antenna can receive them. Most Web sites use a network access, network learning, network economy, and
broadcast model since anyone with Internet access can network policy. (Huang et al., 2006)
view the sites. However, sites that require login before
viewing content are based more on the narrowcast model. National Grid for Learning (NGfL)
(Papagiannidis et al., 2005) An environment created to integrate information and
communications technology. (Signoret, 2006)
NASSCOM
National Association of Software and Service Companies. National Information Infrastructure (NII)
(Raisinghani & Rahman, 2005) A futuristic network of high-speed data communications
links that eventually will connect virtually every facet of
National Competition Policy our society. (Inoue & Bell, 2005)
A policy introduced by the Australian Commonwealth
Government in 1995 with the aim of promoting competitive National Information Policy
service provision in Australia. It did this through The aggregate of basic trends and methods of the state
restructuring of public utility monopolies, allowing for activities, involving information collection, storage, usage,
private businesses to gain access to certain state-owned and dissemination. (Molodtsov, 2005)
infrastructure facilities, and the implementation the
principle of competitive neutrality between government National Institute of Standards and Technology
businesses and private-sector competitors. (Cameron, (NIST)
2005) A federal government standards-setting body housed in
the U.S. Department of Commerce. (Holland, 2005)
National Council for Accreditation of Teacher
Education (NCATE) National Information Technology Policy
A coalition of 33 specialty professional associations of One of several technology policies that inluence the
teachers, teacher educators, content specialists, and local development and diffusion of information systems in a
and state policymakers. All are committed to quality country. (Petter et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N at iona l La w Enforc e m e nt Te le c om m unic at ions Syst e m (N LET S) N CAT E 469

National Law Enforcement Telecommunications Natural Language Search


System (NLETS) Search in which one can ask a question in natural English
A state-managed national network that provides state-to- (such as, Where can I ind information on William
N
state communications, as well as links to the FBI and other Shakespeare?) as opposed to formulating a search statement
large-scale criminal justice entities. (Holland, 2005) (such as, su:Shakespeare, William). (Galitsky, 2005c)

National Performance Review (NPR) Natural Language Understanding


A management reform initiative established by the national A problem of conversion of a natural language expression
administration to identify ways to make the government into its formal representation. (Galitsky, 2005c)
work better and cost less. (Inoue & Bell, 2005)
Natural Monopoly
National Research Foundation (NRF) Simply stated, economists refer to a natural monopoly when
A government national agency that is responsible for very high ixed costs are such that it would be ineficient
promoting and supporting basic, applied research as well for more than one irm to supply the market because of
as innovation in South Africa. (Singh, 2006) the duplication in ixed costs involved. More formally,
this means that long-run marginal costs are always below
Native XML Database long-run average costs. (Arbore, 2005)
A database that deines a model for an XML document
(as opposed to the data in that document), and stores Navigation
and retrieves documents according to that model. At a 1: Means of accessing data in a hypermedia environment,
minimum, the model must include elements, attributes, by moving from node to node along the links. (Lemahieu,
PCDATA, and document order. Examples of such models 2005) 2: Movement from WAP page to WAP page (suring).
are the XPath data model, the XML Infoset, and the models (Quah & Seet, 2006) 3: The aggregate of motion and
implied by the DOM and the events in SAX. (Pallis et wayinding. (Sadeghian et al., 2006) 4: The process by
al., 2005) which a user explores all the levels of interactivity, moving
forward, backward, and through the content and interface
Natural Frequency screens. (Liu & Tucker, 2005)
Eigenvalues of the mass and stiffness matrix system of
the structure. (Kanapady & Lazarevic, 2005) Navigation Event
An event, such as pen stroke, tele-pointer, document
Natural Language Processing (NLP) scrolling, annotation, highlights, and the like, invoked by
1: A subield of artiicial intelligence and linguistics. the teacher during the recording stage will be captured as
It studies the problems inherent in the processing and guided media, and thus can be presented dynamically to
manipulation of natural language. (Song et al., 2005) 2: the end users. (Liu & Chen, 2005)
Computer understanding, analysis, manipulation, and/or
generation of natural language. This can refer to simple Navigation of Information Space
string-manipulation like stemming, or to higher-level (1) The movement through and between information
tasks such as processing user queries in natural language. artifacts, agents, and devices; (2) the activities designed to
(Fernndez & Layos, 2005) 3: A discipline that deals assist in the movement through and between information
with various aspects of automatically processing written artifacts, agents, and devices. (Benyon, 2006)
and spoken language. (Cunningham & Hu, 2005) 4:
Using various computing technologies to process natural Navigational Pattern
languages used by human beings (as opposed to machine A collection of page views or Web resources that are
or artiicial languages) in order to understand or produce frequently accessed together by users during one or
the languages. For instance, parsing as a typical type of more sessions (usually in a particular order). (Mobasher,
processing is to analyze an English sentence in order to 2005c)
group words into a subject (doer of an action) and verb
phrase (the action). (Liou, 2005) NCATE: See National Council for Accreditation of
Teacher Education.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
470 N CI C N e gat ive Assoc iat ion Rule

NCIC: See National Crime Information Center. Need for Cognition (NFC)
A measure of a persons internal motivation to pursue and
N Near-Far Effect enjoy cognitive tasks and activities. (Crossland, 2005)
The situation where the received power difference between
two CDMA users is so great that discrimination of the low- Need-to-Know Access Policy
power user is impossible even with low cross-correlation Security access policy based on supplying to individual
between the codes. (Iossiides et al., 2005) employees only information necessary to perform their
duties. (Janczewski & Portougal, 2005)
Near-Line Storage
Siloed tape storage where siloed cartridges of tape are Needs
archived, accessed, and managed robotically. (Yao et 1: Essential or required elements which students require
al., 2005) to meet an educational objective. (Hawkins & Baker,
2005) 2: Gaps in results, not gaps in means and resources.
Nearest-Neighbor Algorithm (Kaufman & Lick, 2005) 3: The requirements consumers
1: A recommendation algorithm that calculates the distance have to survive and thrive. (Waterson, 2006)
between users based on the degree of correlations between
scores in the users preference histories. Predictions of Needs Assessment
how much a user will like an item are computed by taking 1: Identifying gaps in results (best at all three levels of
the weighted average of the opinions of a set of nearest results) and placing the needs in priority order on the basis
neighbors for that item. (Schafer, 2005) 2: An algorithm of meeting the needs as compared to the costs of ignoring
that determines and ranks the distance between a target them. (Kaufman & Lick, 2005) 2: Problem identiication
object and any other available object. (Chen & McLeod, process that looks at the difference between what is and
2006) what should be for a particular situation. It is an analysis
that studies the needs of a speciic group, such as employees
Nearest-Neighbor Method or learners, and presents the results detailing those needs,
Simple approach to the classiication problem. It inds for example, training needs and resources needs. Needs
the nearest neighbors of the query in the training set assessment also identiies the actions required to fulill
and then predicts the class label of the query as the most these needs, for the purpose of program development and
frequent one occurring in the neighbors. (Domeniconi & implementation. (Kinuthia, 2005)
Gunopulos, 2005)
Needs Identiication
Nearest-Neighbor Query The process of determining which topics an organization
A similarity query that retrieves the closest elements to must monitor in order to attain or maintain a competitive
some query object. (Chvez & Navarro, 2005) advantage. (Parker & Nitse, 2006)

Necessary Test Negation


Veriies that an update operation leads a consistent database Logical negation speciies that an atom is deinitely false;
state to an inconsistent database state. (Ibrahim, 2005) default negation permits the conclusion, based on some
default rule, that an atom is false. (Grant & Minker,
Need Context 2006)
The conceptual part of a consumer context composed of
stimuli that can inluence the consumers needs. A subset Negative (g, Ci)
of need context that can be utilized by need context- Set of features possessed by g which are global-frequent
aware applications is emergency context, from which the but not cluster-frequent. (Saquer, 2005)
applications can infer the physiological and safety needs
of consumers, and provide services accordingly. (Sun & Negative Association Rule
Poole, 2005) 1: An implication of the form X=>~Y, ~X=>Y, ~X=>~Y,
where X and Y are database items, and ~X, ~Y are negations

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N e gat ive At t it ude N e t Pre se nt Va lue (N PV ) 471

of database items. (Daly & Taniar, 2005a) 2: Rules of a Negotiation Strategy


kind AB, where A and B are frequent negative itemsets. Speciication of the sequence of actions the agent intends
(Daly & Taniar, 2005b) to make during the negotiation. (Polgar, 2005a)
N
Negative Attitude NeI: See National E-Government Infrastructure.
A perception about IT that results in behavior that displays
discomfort around IT, hesitation to invest in IT, and Neighborhood
the implementation of IT out of necessity. (Winston & A list of like-minded customers that are discovered by
Dologite, 2005) looking into the ratings database and by using a similarity
measure such as correlation. (Sarwar et al., 2005)
Negative Border
The collection of all sequences that are not frequent but Neoliberalism
both of whose generating sub-sequences are frequent. The promotion of free enterprise in competitive global
(Masseglia et al., 2005) markets, including the free movement of goods and services
with little burden from taxes and tariffs. Government plays
Negative Itemset a regulatory role, rather than a role of service provider.
An itemset that contains both items and their negations. Small government and low tax environments are seen as
(Daly & Taniar, 2005a) attractive to global capital investment. (Cameron, 2005)

Negligence Nering
A tort theory that applies to conduct that falls below the Changes to game mechanics that are perceived as
standard established by law for the protection of others detrimental from the players perspective. For example,
against unreasonable risk of harm. An action for negligence changes to a spell or weapon effect so that it is effective at
must establish that: one party (the irst party) owed a duty causing damage to an opponent. (Grifiths et al., 2006)
of care to a second party; the irst partys lack of care
(negligence) breached that duty of care; and the irst partys Net Beneit
breach of the duty of care proximately caused the damages A beneit that remains after costs are subtracted. (OLooney,
suffered by the second party. (Sprague, 2005) 2006)

Negotiation Net Community


An interactive process among a number of agents that A virtual meeting place accessible through the Internet.
results in varying degrees of cooperation, competition. and To get a picture of what a Net community is, one can
ultimately to commitment that leads to a total agreement, imagine a mixture of the school yearbook, a showroom,
consensus governed by a voting policy, or a disagreement. a trendy caf, a telephone, mail, and walking down High
(Murthy & Krishnamurthy, 2005a) Street on a Saturday afternoon. It is a virtual place for
communication, providing tools for presenting yourself and
Negotiation Mechanism observing others. Most Net communities are Web based,
1: The actual implementation of negotiation strategy and that is, you can access them via a Web site. As a member
negotiation protocol. (Polgar, 2005a) 2: The means of you login and get admittance to your personal space, where
a WCDSS to enable e-shoppers to interact directly and you can publish information about yourself, true or untrue,
interactively with representatives or other parties and as much as you choose. All members can view each others
adjust their shopping actions before they have committed information and communicate. (Dunkels, 2005)
to an erroneous result. (F. Wang, 2006)
Net Present Value (NPV)
Negotiation Protocol The present value of an investments future net cash lows
A set of public rules that dictate the conduct of an agent minus the initial investment. (Li, 2005b)
with other agents to achieve a desired inal outcome.
(Murthy & Krishnamurthy, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
472 N e t ique t t e N e t w ork I nfra st ruc t ure

Netiquette share ideas and pass on information to other members.


1: Informal policies for behavior in a virtual community, (Pease & Rowe, 2005) 6: A telecommunication system
N analogous to etiquette. (Rowe, 2006a) 2: Standard that permits the sharing of resources such as computing
rules of courtesy and correct behavior on the Internet. power, software, input/output devices, and data. (Singh,
(Link & Wagner, 2006) 3: The etiquette, or social rules, 2005) 7: An independently formed entity that has a
associated with communicating online. Netiquette may deined set of shared values, roles, responsibilities, and
vary across virtual environments. (Roberts et al., 2005) governance, and is characterized by lateral connections,
4: A combination of the words etiquette and Internet mutuality, and reciprocity between the network members.
(Net, for short). Netiquette is rules of courtesy expected (Vrazalic et al., 2005) 8: An interconnection of three
in virtual communications to support constructive or more communicating entities. (Melkonyan, 2005) 9:
interpersonal relationships in a virtual environment. Hardware and software data-communication systems
(Wong-MingJi, 2005) 5: Method of online research that permit communication among computers and the
developed by Robert Kozinets (Kellogg Graduate School of sharing of peripheral devices (e.g., printers). (Vician &
Business, Northwestern University, Evanston). It consists Buche, 2005)
in ethnography adapted to the study of online communities.
The researcher assumes the role of a regular member of Network Architecture
the community (but, for ethical reasons, she/he should Deines the structure and the behavior of the real subsystem
disclose her/his role). (Pace, 2005) that is visible for other interconnected systems, while they
are involved in the processing and transfer of information
Netnography sets. (Rodrigues et al., 2005)
Using ethnographic techniques to study virtual
communities. (A. Roy, 2005) Network Bandwidth
The data capacity through a network. (K.J. MacGregor,
Network 2005)
1: A community of practice of N organizations, where N is
more than 2. Network types may be deined through three Network Community
primary characteristicsthe degree of centralization of A community of praxis that is digitally connected through
authority, competition, and commonality of operations. a computer network. (Matta, 2005)
An inter-organizational network is considered to be
analogous to an inter-organizational community of Network Delay
practice. (Priestley, 2006) 2: Two or more devices with Time needed for the transmission of a data packet from
processors functioning in such a way that the devices can the source to the destination over the underlying transport
communicate and share resources. (Maris, 2005) 3: A new network. (Roccetti & Ferretti, 2005)
form of organization. Networks are loose sets of actors
who work together in order to promote their interests Network Effect
within a common operational framework that is held 1: Consumption effect in which the utility of a
together by some shared interests, reciprocity, and trust. communication product increases with the number of
In their most characteristic form, networks are lexible other users of the same or a compatible product. (Voeth
ways of organizing activities that require the competences & Liehr, 2005) 2: Products or services whose value to an
of several independent actors. (Anttiroiko, 2005a) 4: A individual buyer increases when many other people also
system of lines or channels that cross or interconnect; an consume the same products or services. (Lee et al., 2006)
extended group of people with similar interests or concerns 3: One of the additional beneits generated when networks
who interact and remain in informal contact for mutual of any kind start to achieve positive feedback. The value
assistance or support. Networks provide methods and of the network grows exponentially with the number of
mechanisms enabling communication between sender and members. (Geiselhart & Jamieson, 2005)
receiver. (Croasdell & Wang, 2006) 5: A system which
links together equipment, organizations, or people. In Network Infrastructure
the context of small and medium enterprises (SMEs): a This comprises the Internet as well as all forms of
coming together of irms, either formally or informally, to telecommunications and broadcasting infrastructure

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N e t w ork I nfra st ruc t ure Ope rat or N e t w ork T im e Proto c ol (N T P) 473

including television, cable TV, wireless, and satellite but who do not necessarily know one another. (Teigland
networks. (Sharma, 2006a) & Wasko, 2006) 2: People who are not directly connected
to each other but still engage in similar kinds of activities
N
Network Infrastructure Operator are said to belong to a network of practice. NoPs link local
One of the network-facing elements of wireless networks communities whose members have similar interests and
which provide the software and hardware that enable give a minimal coherence to the network. (Kimble &
online communications. (Rlke et al., 2005) Hildreth, 2005)

Network Interface Card (NIC) Network Operating System


The device that enables a workstation to connect to the An operating system for a computer designated as a server
network and communicate with other computers. NICs in a LAN. Manages network resources available to network
are manufactured by several different companies and clients such as printers, iles, and databases. Responsible for
come with a variety of speciications that are tailored to maintaining a database of names and addresses of clients
the workstation and networks requirements. (Lawson- attached to the network. (Ruppel & Ruppel, 2005)
Body, 2005)
Network Organization
Network Intrusion Relatively loose organization form, which does not
Broadly used to indicate stealing, destroying, or altering predeine all possible work relationships, but establishes
information, or obstructing information availability. (Syed, these when needed. (Hendriks, 2006)
Nur, et al., 2005)
Network Service Provider (NSP)
Network Intrusion Detection 1: Also known as network carriers, NSPs provide the
A system that detects inappropriate, incorrect, or anomalous infrastructure that enables mobile communication. Cell
activity in the private network. (Ashrai et al., 2005) phone users pay for using the infrastructure. (Singh, 2006b)
2: A company that provides backbone services to an Internet
Network Latency service provider, the company that most Web users use
The time for a message to travel over the network from the for access to the Internet. Typically, an ISP connects, at
sender to the receiver. In cellular networks, this includes the a point called Internet Exchange, to a regional Internet
time from the device over the network to the base station, service provider that in turn connects to a network service
over a landline to the service provider, and out to the provider backbone. (Morabito & Provera, 2005)
application. It could possibly include satellite transmission
time from the earth station to the satellite and down to Network Sniffer
another earth station. (K.J. MacGregor, 2005) A hardware or software mechanism that monitors, and
possibly records, data trafic on a network. (Westin,
Network Layer 2005)
Layer 3 of the OSI model. Responsible for routing data
through a communication network. (Ngoh & Shankar, Network Society
2005) A society in which the members are connected by a
computer network. (Matta, 2005)
Network Marketing
The marketing of goods and services by marketers/ Network Structure
distributors selling to people within their own circle The overall coniguration of the network, as relected in
of acquaintances, and then recruiting new marketers, the patterns of ties among nodes. (Dekker, & Hendriks,
whom they manage. Also known as referral marketing, 2006)
direct marketing, conversational marketing, or multi-level
marketing. (D. Wright, 2005) Network Time Protocol (NTP)
A standard Internet protocol used to synchronize the
Network of Practice (NoP) clocks of computers to some time reference. (Yang et
1: An emergent social network linking similar individuals al., 2005b)
across organizations who are engaged in a shared practice,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
474 Network Trafic Management Neural Model

Network Trafic Management Networked Mobile Digital Device (NMD)


Monitoring a variety of continuous network data streams Network-enabled laptop computers, personal digital
N at real-time, such as packet traces, packet lows, and assistants, wireless home networks, cell phones, and
performance measurements in order to compute statistics, wireless portable music players and game consoles.
detect anomalies, and adjust routing. (Chatziantoniou & (Gilbert, 2005b)
Doukidis, 2005)
Networked Readiness Index (NRI)
Network Training Measures the degree of preparation of a nation to participate
The process of inding the values of the network weights in and beneit from ICT developments. (Neumann,
that minimize the error across a set of input/output pairs 2005)
(patterns) called the training set. (Mart, 2005)
Networked University
Network-Based Virtual Community An organization of independent universities building a
A specialized, geographically dispersed virtual community network for study programs to their own and other students;
based on a structured, relatively sparse, and dynamic following a set of regulations and rules for rights, duties, and
pattern of relationships among participants sharing a responsibilities; and having a business plan and a strategy
common focus. (Bagozzi & Dholakia, 2005) for daily routines and further development. Each institution
may be dual mode, that is, offering both on-campus and
Network-Centric Operation Net-based studies. (Haugen & Ask, 2005)
Military focus on system integration and interoperability to
provide a common infrastructure for data, information, and Networking
knowledge applications, including the realization of those 1: A business practice that allows owner-managers to join
applications in operational settings. (Maule, 2006) associations and groups composed of at least three irms
that pool their strengths to realize projects at the regional,
Network-Centric Warfare national, or global level that could not be achieved by a irm
Combat based on network-centric operations and GIG- working alone. For example, irms that work together are
type infrastructures to provide just-in-time information, able to take advantage of group access to resources, skills,
knowledge, situational assessment, and understanding. and competencies. (Moreau et al., 2005) 2: Activities that
(Maule, 2006) enable individuals, groups, or organizations to interact
with each other in social formations which enhance
Network-Type Digital Cash communication and create new opportunities. (Walker,
Maintained on the personal computer or the host computer. 2006)
(Kurihara, 2006)
Networking/Internetworking
Networked Governance Model A technology of interconnecting more than one network.
Each and every part is essential to build up the network, In most cases, those networks are different in terms of
where unions, SMEs, civil and cultural organizations, hardware and software characteristics. (Hu, 2005)
universities, and ICT enterprises can be found. Some
networks work interconnected with others. The government Networks of Practice
works as a strong coordinator, although it is not the only Members of a community who are likely to be relatively
one. (Kaufman, 2005) unknown to one another. Links between the members
of such networks are usually more indirect than direct,
Networked Information System and include online newsletters, bulletin boards, and list
An IS that is strongly integrated in a global network. From servers. (Waterson, 2006)
the technological point of view, the difference between
the IS and the global network is blurred; however, it exists Neural Model
from the administrative point of view. (Trcek, 2005) Specifying a neural network model involves declaring
the architecture and activation function types. (Smith,
2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N e ura l N e t w ork N e w Public M a na ge m e nt (N PM ) 475

Neural Network Neurolinguistic Programming (NP) Language


1: A complex, nonlinear modeling technique based Pattern
on a model of the human neuron. (Kumar, 2005) 2: A The use of the words, or similar constructs, See for
N
connectionist model that can be trained in supervised or iconic, Hear for auditory, and Feel for kinesthetic
unsupervised mode for learning patterns in data. (Bala subjects both in language and text at the relevant times.
et al., 2005) 3: A member of a class of software that is (Janvier & Ghaoui, 2006)
trained by presenting it with examples of input and
the corresponding desired output. Training might be Neuron
conducted using synthetic data, iterating on the examples 1: The basic processing element of a neural network. (Yeo,
until satisfactory depth estimates are obtained. Neural 2005) 2: The smallest processing unit in a neural network.
networks are general-purpose programs, which have (Fischer, 2005)
applications outside potential ields, including almost any
problem that can be regarded as pattern recognition in Neuronal Network
some form. (R., 2005) 4: A method that applies learning Computing device designed in such a way that it simulates
and re-learning through a series of trials and errors to nervous systems, with a great number of calculation
get the best performance. (Chen, Chen, Ma, et al., 2005) elements that carry out no linear analogous functions.
5: A nonlinear model derived through analogy with the In computing, can be used for forecasts, classiication,
human brain. It consists of a collection of elements that detection of connections, or groupings. (Xodo & Nigro,
linearly combine their inputs and pass the result through 2005)
a nonlinear transfer function. (Oza, 2005) 6: A set of
computer hardware and/or software that attempt to emulate New Economy
the information processing patterns of the biological brain. 1: Encompasses the many changes that are reshaping
A neural network consists of four main components: (1) the economy in which the irm/business operates. These
processing units (or neurons), and each of them has a include factors such as globalization, technological
certain output level at any point in time; (2) weighted advances, structural change, and entrepreneurship. (Pease
interconnections between the various processing units & Rowe, 2005) 2: Refers to inancial and economic
which determine how the output of one unit leads to input infrastructure characterized by reliance on information
for another unit; (3) an activation rule which acts on the technologies. (Hwang & Stewart, 2006) 3: Describes
set of input at a processing unit to produce a new output; aspects or sectors of an economy that are producing, or
and (4) A learning rule that speciies how to adjust the using, innovative or new technologies. It therefore also
weights for a given input/output pair. (H. Wang & Wang, captures the impact of these changes. The Internet and
2005) 7: A system of processing elements, called neurons, associated technologies typiies the essence of the new
connected together to form a network. The fundamental economy. (Pease et al., 2005)
and essential characteristic of an artiicial neural network
is the ability to learn; they are not programmed, but learn New Product Development (NPD)
from examples through repeated adjustments of their The development of a new product, such as a car or a
weights. (Wilson et al., 2006a) facility, in order to fulill the needs of its customers. It
involves the whole product lifecycle, from initial design
Neural Network Architecture to the production of the product. (Fong, 2006a)
A description of the number of layers in a neural network,
each layers transfer function, the number of neurons per New Public Management (NPM)
layer, and the connections between layers. (Yeo, 2005) 1: Neoliberally oriented public management doctrine
based on a market-oriented view stating that, instead
Neural Network Weight of direct political control and hierarchies, public
One of the free parameters of the neural model. (Alippi organizations should rely on indirect controlthat is,
& Vanini, 2005) market-based coordinationin the interaction between
public organizations and their environments. It emphasizes

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
476 N e w sgroup N ode

the eficiency and effectiveness of public organizations, NIC: See Network Interface Card.
customer focus in provision of public services, and market-
N based conditioning frameworks, such as privatization, Niche Product
competition, and contracting out. (Anttiroiko, 2005a) 2: Specialized offering with a limited customer base. (Ortega
Includes initiatives which relate to management of the Egea & Menndez, 2006)
public administration, like management by objectives,
clear standards, and evaluation of the quality of service. It Nick
also includes initiatives that deal with the introduction of The nickname an individual chooses to be known by on
economic incentive structures, like outsourcing of public Internet relay chat. The command /NICK is used to set a
tasks and establishing quasi-markets for public services. nickname and can be used to change the nickname at any
(Jaeger, 2005) 3: A stream of thoughts aiming at applying time. (Roberts et al., 2006a)
a business management concept to public administrations.
(Becker et al., 2006) NII: See National Information Infrastructure.

Newsgroup NIMSAD: See Normative Information Model-based


1: An online forum that allows the public to post and read Systems Analysis and Design.
messages on a particular topic. Similar to bulletin board
systems, the difference is that newsgroups are maintained NIQ
by Usenet and use specialized newsreader software. National informatization quotient. (Tarnanas & Kikis,
(Paoletti, 2005) 2: Bulletin-board-like location on the 2005)
Internet where users post and reply to messages. (Ridings,
2006a) 3: Electronic bulletin boards where individuals NIST: See National Institute of Standards and
can post messages, and read and reply to the messages of Technology.
others. Responses to an original message appear together
as threads. Newsgroups may be publicly accessible or NKRL: See Narrative Knowledge Representation
have membership requirements, and may be moderated Language.
or unmoderated. (Roberts et al., 2006c)
N L ET S : S e e N a t i o n a l L a w E n f o r c e m e n t
Next-Generation Internet (NGI) Telecommunications System.
1: Currently known as Abilene, the next-generation
Internet refers to the next level of protocols developed NLP: See Natural Language Processing.
for bandwidth capacity, quality of service (QOS), and
resource utilization. (Burke et al., 2005) 2: The use of NMD: See Networked Mobile Digital Device.
third-generation technologies such as advanced multimedia
wireless communication via the Internet. (M. Rowe, Nodal Connection
2005b) One of the connections between nodes in an artiicial
neural network. They are communication channels that
Nexus carry numeric data. They simulate the axons and dendrites
The general concept of some connection or link to the used to carry electrical impulses between neurons in a
taxing jurisdiction. In the United States, jurisdiction for biological neural network. (Kitchens, 2005)
levying taxes has a Constitutional basis. (Raisinghani &
Petty, 2005) Node
1: A junction point in a decision tree which describes
NFC: See Need for Cognition. a condition in an if-then rule. (Beynon, 2005b) 2: A
mathematical representation of a biological neuron.
NGI: See Next-Generation Internet. Multiple layers of nodes are used in artiicial neural
networks to form models of biological neural networks.
NGO: See Non-Governmental Organization. (Kitchens, 2005) 3: Mobile terminal. (Erbas, 2005) 4:
One of the points where devices (computers, servers, or
NGfL: See National Grid for Learning. other digital devices) are connected to the Internet; more

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N ode Type N on-Em be dde d Suppor t Devic e 477

often called a host. (Clayton, 2006a) 5: Unit of data (and Nomadic Computing
navigation) in a hypermedia environment. (Lemahieu, The use of computers while on the move. (Krogstie,
2005) 2005b)
N
Node Type Nomadic Lifestyle
Type-level deinition of properties (layout template, link A mobile lifestyle where a person has adopted a high
types, aspect descriptors) for a group of similar nodes. degree of mobility in his or her life. The person moves
(Lemahieu, 2005) a lot and frequently between various places of housing,
work, errands, hobbies, recreation, and socializing.
NOE: See (Heinonen, 2005)

Noise Nominal Data


1: An undesired disturbance within the frequency band of Data classiied into mutually exclusive (non-overlapping),
interest; the summation of unwanted or disturbing energy exhaustive categories in which no meaningful order or
introduced into a communications system from manmade ranking can be imposed on the data. An example is the blood
and natural sources. A disturbance that affects a signal type of a person: A, B, AB, O. (Yang & Webb, 2005)
and that may distort the information carried by the signal.
(Ragazzi, 2005) 2: A statistical concept that represents Nominal Group Technique
some form of variation in a database. In the context of A consensus-planning technique that helps prioritize
using a perturbation approach to protect conidential issues. (Janes, 2005)
data, noise is added to mask the conidential data item.
From the perspective of using a knowledge discovery Nominalism
tool, noise represents the ease or dificulty in classifying An ontological position that things are what they are
individual records correctly (i.e., relative ease in deining because we have named them that way, and classes are
or inding the knowledge). The noisier a database is, the formed of objects with similar names. (Artz, 2005c)
more dificult it is to gain insight into knowledge present.
(Wilson et al., 2006a) Nominalization
The rendering in discourse of a goings-on, happening,
Noise Clustering or process as a noun. (Zappavigna, 2006)
An additional noise cluster is induced in objective function-
based clustering to collect the noise data or outliers. All Nomothetic
data objects are assumed to have a ixed (large) distance The nomothetic approach permits the comparison of
to the noise cluster, so that only data far away from all RepGrids of individuals or groups of individuals. It
other clusters will be assigned to the cluster. (Klawonn necessitates the use of a common set of elements and/or
& Georgevia, 2005) constructs to permit comparisons to be made between
RepGrids. (Tan & Hunter, 2005)
Noisy Data
1: Errors in the data due to the nature of data collection, Non-Compliance
measurement, or sensing procedures. (Chen & Liu, 2005) In a peer-to-peer network, non-compliance is the inability
2: Real-world data often contain errors due to the nature of for two or more peers, with the same protocol or different
data collection, measurement, or sensing procedures. They protocols, to effectively communicate without any problem.
can be incomplete, inaccurate, out of date, or inconsistent. (Kwok et al., 2006)
(Liu, 2005) 3: Term generally used to describe data and
data sets in which there is a low signal-to-noise ratio. Non-Embedded Support Device
Any algorithm attempting to ilter out the signal has to Support device at the disposal of learners. Learners decide
be capable of identifying and dealing appropriately with themselves when and how to use these tools. (Clarebout
noise. In this sense, noise is that element of the data that et al., 2005b)
obscures the true signal. (Vanstone & Tan, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
478 N on-Excluda bilit y N on-Spat ia l Ac c e ssibilit y

Non-Excludability Non-Monotonic
One characteristic of a public good: the inability to exclude A type of system where the addition of new information
N non-contributors from the consumption of the public good. may change old information. (Grant & Minker, 2006)
(Teigland & Wasko, 2006)
Non-Parametric Option Pricing Model
Non-Governmental Organization (NGO) One of several pricing options using inductive or
1: A voluntary, not-for-proit organization, and hence statistically oriented techniques. (Lajbcygier, 2005)
sometimes referred to as a private voluntary organization
(PVO). Although it does not have to have a formal statute, Non-Player Character (NPC)
it should be autonomous from the government. Generally, it A character in a game that is controlled by artiicial
obtains most if not all of its funding from private sources. intelligence or a gamemaster (human controllable character
(Trusler & Van Belle, 2005) 2: An organization that is often employed for guidance and help within the game;
not a part of a government. Although the deinition can i.e., customer services). (Grifiths et al., 2006)
technically include for-proit corporations, the term is
generally restricted to social and cultural groups, whose Non-Precise Data
primary goal is not commercial. Generally, although Data which are not precise numbers or not precise vectors.
not always, these are nonproit organizations that gain (Viertl, 2005)
at least a portion of their funding from private sources.
(Y.-W. Lin, 2005) 3: A private nonproit making body, Non-Repudiation
which operates independently of government. NGOs 1: Guarantees that participants in a transaction cannot deny
normally provide various forms of social services or that they participated in the transaction. (Lowry, Stephens,
community development. (Toland, Purcell, et al., 2005) et al., 2005) 2: Makes sure that the business transactions
4: An association of like-minded people serving society, the parties engaged in are legally binding. (Pierre, 2006b)
especially the downtrodden and vulnerable sections on 3: Service that provides proof of the integrity, origin of
their own or supplementing the organized effort. (Borbora data, and the identity of a person, all in an unforgeable
& Dutta, 2005) 5: A nonproit organization which is not relationship, which can be veriied by any third party at
fully funded or controlled by government, and which is any time. Hence, it determines whether or not a particular
promoting human well-being on a not-for-proit basis. The event occurred or a particular action happened. (Oermann
organization should have a legally established constitution, & Dittmann, 2006) 4: The inability of an individual to
a clear purpose, and visible activities with a governing disavow some action or his or her presence at a particular
body, which has the authority to speak for its members. location at some speciic time. Biometric security systems
(Arkhypska et al., 2005) 6: A nonproit, self-governing have the potential to offer a high degree of non-repudiation
organization with voluntary membership. (Smith & due to the intimately personal nature of biometric data.
Smythe, 2005) (Fleming, 2005a)

Non-Ignorable Missing Data Non-Reputability


Arise due to the data missingness pattern being explainable, A signature may indicate that the signer has agreed to
non-random, and possibly predictable from other variables. be bound by the terms set out in the document or that he
(Brown & Kros, 2005) has approved the transaction that it relects. (Escalante,
2005)
Non-Instrumental Need
Goes beyond the mere achievement of behavioral goals, Non-Rival
such as self-expression or personal growth. Product One characteristic of a public good: non-rival goods are
attributes related to the fulillment of non-instrumental those that are not used up or depleted in their consumption.
needs are often referred to as hedonic. A more speciic (Teigland & Wasko, 2006)
use of the term hedonic stresses the products affective
quality, for example, its ability to evoke positive affective Non-Spatial Accessibility
reactions (mood, emotions; see Affect). (Hassenzahl, Non-geographic barriers or facilitators such as social class,
2006) income, ethnicity, age, sex, and so forth, that affect ones
accessibility to a service. (Wang & Lou, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N on-Spat ia l (At t ribut e ) Dat a N or m a lize d Cla ss Algebra Ex pre ssion 479

Non-Spatial (Attribute) Data Nonproit Organization


Data that relate to a speciic, precisely deined location. An organization, group, or association that exists to meet
The data are often statistical, but may be text, images, or a social, spiritual, political, or educational need in society.
N
multimedia. These are linked in the GIS to spatial data The organization conducts its business so as to manage
that deine the location. (Velibeyoglu, 2005) its income and expenses directly in support of its mission
without returning a proit to an ownership or investment
Non-Starter group. (Baim, 2006a)
1: A student who registers for a course, but never
completes a lesson or attends a class. Such students make NoP: See Network of Practice.
the calculation of completion rates dificult. (Lindsay,
Howell, et al., 2005) 2: A student who was admitted to a Normal Form
degree program, but has not enrolled in any courses yet. One of the canonical patterns for table design that enable
(Chyung, 2005) designers to avoid anomalies. Occasionally, tables are
denormalized to improve database performance.
Non-Syncategorematic Term (Schultz, 2005)
These linguistic terms (also known as categorematic
terms) are capable of being employed by themselves as Normal (Online) Participation
terms as opposed to syncategorematic terms. (Andrade, Interaction with other learners and the online platform on
Ares, Garca, Rodrguez, &Silva, 2006) the learners own terms. (Teghe & Knight, 2005)

Non-Traditional Course Normality


A course that typically operates differently than on-campus A statistical assumption for linear regression models.
courses. For example, non-traditional courses may have It requires that the errors around the regression line be
students meet electronically rather than face to face. normally distributed for each value of input variable. (Lee,
They may also meet on weekends instead of weekdays. Peterson, et al., 2005)
Non-traditional courses can also be non-credit courses or
certiicate courses offered by a college or university that Normalization
are aimed at students who are not seeking a bachelors, 1: A technique for producing a set of relations with desirable
masters, or doctoral degree. (Riffee & Sessums, 2005) properties, given the data requirements of an enterprise.
(Kontio, 2005) 2: A process to remove systematic variation
Non-Traditional Student in microarray experiment. Examples of such systematic
A student who is mature, probably works, and has signiicant variation include between array variation, dye bias, and
post-secondary experience. (Taylor et al., 2005) so forth. (Ge & Liu, 2005) 3: In terms of gene expression
data, it is a pre-processing to minimize systematic bias
Nonlinear Output Error Model (NOE) and remove the impact of non-biological inluences before
The dynamic model receives past input and predicted data analysis is performed. (Fung & Ng, 2005) 4: The
output values to estimate the current output. (Alippi & process developed by E.C. Codd whereby each attribute
Vanini, 2005) in each table of a relational database depends entirely on
the key(s) of that table. As a result, relational databases
Nonlinear Learning comprise many tables, each containing data relating to
A system in which learners are provided with a variety of one entity. (Delve, 2005)
options, they choose their own path, different learners can
follow different paths, and the outcomes are emergent and Normalized Class Algebra Expression
cannot be foretold. (Burrage & Pelton, 2005) A Boolean expression involving the basic class algebra
predicates. The sorted leaf nodes of the non-subsumed
Nonlinearity proof trees basically form a Karnough map, which covers
Exists between a cause (decision) and effect (consequence), all assignments that could make the query true. (Buehrer,
if the effect is not proportional to cause. (Qudrat-Ullah, 2005)
2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
480 N or m a lize d Ex t e nde d I t e m se t N yquist T he ore m

Normalized Extended Itemset NPM: See New Public Management.


A set of extended items whose contextual positions have
N been positioned with respect to the smallest reference NPR: See National Performance Review.
position of the set. (Feng & Dillon, 2005)
NPV: See Net Present Value.
Normalized Extended Transaction Set
A set of extended transactions whose contextual positions NRF: See National Research Foundation.
have been positioned with respect to the largest reference
position of the set. (Feng & Dillon, 2005) NRI: See Networked Readiness Index.

Normative Information Model-based Systems NSP: See Network Service Provider.


Analysis and Design (NIMSAD)
A systemic framework created for understanding and NTP: See Network Time Protocol.
evaluation of methodologies. (Tauber & Schwartz,
2006) Nugget Discovery
The search for strong partial classiication rules that are
Normative Trust simple, understandable, novel, and ultimately useful.
Refers to common values that give a frame of reference to (Richards & de la Iglesia, 2005)
social norms creating predictability and trustworthiness.
(Huotari & Iivonen, 2005) Null Hypothesis
The hypothesis that an object is irrelevant. In general
Norm terms, it is the hypothesis we wish to falsify on the basis
1: A norm represents acceptable attitudes and behaviors by of data. (Mukherjee, 2005)
consensus among members of a community. (Kankanhalli
et al., 2006) 2: Shared expectations that constrain and drive Null Value
the action of group members. (Graham & Misanchuk, The representation of null values emerges as a strategy
2005) for the enumeration of cases, for which one intends
to distinguish between real facts of life and doubts or
North American Council for Online Learning uncertainties. (Analide et al., 2006)
Founded in 2002 by the William and Flora Hewlett
Foundation to assist virtual high schools in policy and Number of Intervals
research. (S.M. Johnstone, 2005) Corresponds to the different values of a discrete attribute
resulting from the discretization process. The number of
Notiication Mechanism intervals is equal to the number of cut-points plus 1. The
The means of a WCDSS to provide e-shoppers immediate minimum number of intervals of an attribute is equal
and continuous alerts to tailored merchandising to 1, and the maximum number of intervals is equal to
information, sales promotions and advertising, and other the number of instances. (Muhlenbach & Rakotomalala,
purchase-related information. (Wang, 2006) 2005)

NP-Hard Problem Numerical Attribute


Optimization problem for which a solution can be veriied Attribute that takes values from a continuous domain.
in polynomial time, but no polynomial solution algorithm (Gehrke, 2005)
is known, even though no one so far has been able to
demonstrate that none exists. (Calvo et al., 2005) Nyquist Theorem
An equation to determine appropriate resolution when
NPC: See Non-Player Character. scanning an image digitally for graphic reproduction. The
equation multiplies the desired printed halftone dot lines
NPD: See New Product Development. per inch (LPI) by 1.5 to 2 times, and then multiplies that
value by the percentage of magniication of the reproduction
from the original size of the artwork. (Snyder, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
OAI -PM H Obje c t Pa r t it ioning 481

O
OAI-PMH: See Open Archives Initiative Protocol for Object Identiier (OID)
Metadata Harvesting. 1: In the object-oriented data model, each object is given
an object identiier. The importance of an OID is that it
OAN: See Optical-Access Network. makes the model work by reference and not by value (i.e.,
if an object changes the values of all its attributes, it still
ObCS: See Object Control Structure. is the same object because of its OID). In the relational
world, an object that changes the value of one attribute
Object is a different object. Unlike keys, OIDs are immutable.
1: A data structure that encapsulates behavior (operations) (Badia, 2005d) 2: An unchangeable value that uniquely
and data (state). (Alhajj & Polat, 2005) 2: An abstraction of a identiies that object and distinguishes it from all other
set of real-world things that has state, behavior, and identity. objects. It is separate from the state and invisible to the
An instance of its class where the values of the attributes user. OIDs can be used to represent associations between
determine the state, and the operations the behavior. objects. (Polese et al., 2005)
(Rittgen, 2005) 3: An entity (e.g., person) or a value
(e.g., phone number). In object-oriented models, it is the Object Modeling of Relational Applications
instance of a class. (Galatescu, 2005) 4: A software bundle (OMAR)
of related variables and methods. Generally, something A software engineering methodology for the object
is an object if it has a name, properties associated with modeling of applications to be implemented over an
it, and messages that it can understand. Object-oriented RDBMS. (Polese et al., 2005)
programming involves modeling the software system
as a set of interacting (conceptual) objects in object- Object Orientation
oriented design, then implementing (coding) the design A view of the world based on the notion that it is made up
using an object-oriented programming language with of objects classiied by a hierarchical superclass-subclass
(programming-language) objects. (Wong & Chan, 2006) structure under the most generic superclass (or root)
5: Something conceivable or perceivable. This subsumes known as an object. For example, a car is a (subclass of)
the object-oriented notion of object. (Gillman, 2006) vehicle, a vehicle is a moving object, and a moving object
is an object. Hence, a car is an object as the relationship is
Object Constraint Language (OCL) transitive and, accordingly, a subclass must at least have
1: A notational language for analysis and design of the attributes and functionality of its superclass(es). Thus,
software systems. It is a subset of the industry standard if we provide a generic user-presentation object with a
UML that allows software developers to write constraints standard interface, then any of its subclasses will conform
and queries over object models. (Riesco et al., 2005) 2: to that standard interface. This enables the plug and play
A language used to express side-effect-free constraints. of any desired subclass according to the users encoding
(Favre et al., 2005) and decoding needs. (Polovina & Pearson, 2006)

Object Control Structure (ObCS) Object Partitioning


A behavioral description of objects and classes. (Bastide The method to divide an object into smaller segments.
et al., 2006) (Tse, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
482 Obje c t Re c ognit ion Obje c t ive Func t ion

Object Recognition Object-Oriented DFD


A supervised labeling problem based on models of known A variant of Data Flow Diagram (DFD) introduced in
O objects. (Swierzowicz, 2005) FOOM methodology which includes object (data) classes
rather than data stores. (Shoval & Kabeli, 2005)
Object Resolution
The amount of detail of a digital image or object. This is Object-Oriented Knowledge Model
usually speciied as the number of pixels and number of The knowledge model for knowledge representation which
frames per second. (Tse, 2006) applies powerful object-oriented modeling technologies
such as class, methods, inheritance, envelopment, and so
Object Type forth. (Ma, 2006)
1: A speciication of a type of entity; both structure
(attributes) and operations (functions) are speciied for Object-Oriented Programming (OOP)
object types. The notion of object type is a design notion Emphasizes the hiding or encapsulation of the inner state
being implemented as a class. (D. Brandon, Jr., 2005a) of objects and the speciication of these objects by an
2: In ORM, an object is either an entity (non-lexical interface. OOP languages support objects, classes, and
thing) or a value (lexical constant, such as a character inheritance. (Fettke, 2005)
string), and an object type is a kind of object (e.g., Person,
CountryCode). In UML, the term object is restricted to Object-Relational Data Model
entities (instances of classes), while the term data value Extends the relational data model by providing a richer
is used for instances of data types. (Halpin, 2005) type system, including complex data types and object
orientation. (Zendulka, 2005b)
Object Wrapping
Adding code to convert an existing set of software Object-Relational Database
procedures into an object class. The procedures can 1: A database system where the relational model is extended
then be used as methods in an object-oriented software with object-oriented concepts. Data are still stored in
environment. (Westin, 2005) relational structures. (Darmont, 2005) 2: Database that
is developed using the object-oriented concept and is
Object-Oriented Analysis (OOA) implemented in a relational environment. This database
Software engineering approach to constructing software was introduced in the 1990s and since then has been widely
systems by building object-oriented models that abstract used for database applications. (Taniar et al., 2005)
key aspects of the target system. (Fettke, 2005)
Object-Relational Modeling
Object-Oriented Database Modeling of an object-relational database schema. It
1: A database in which the operations carried out on requires using model elements that are available in
information items (data objects) are considered part of neither classic data models nor object models. (Zendulka,
their deinition. (Alhajj & Polat, 2005a) 2: A database 2005b)
system offering DBMS facilities in an object-oriented
programming environment. Data are natively stored as Object-Role Modeling (ORM)
objects. (Darmont, 2005) A fact-oriented approach for modeling information at a
conceptual level, using language that is easily understood
Object-Oriented Design (OOD) by non-technical domain experts. ORM includes rich
A design method in which a system is modeled as a graphical and textual languages for modeling facts and
collection of cooperating objects and individual objects are business rules, and provides procedures for creating
treated as instances of a class within a class hierarchy. Four conceptual models and transforming them to lower-level
stages can be discerned: identify the classes and objects, models for implementation. (Halpin, 2005)
identify their semantics, identify their relationships, and
specify class and object interfaces and implementation. Objective Function
Object-oriented design is one of the stages of object- A positive function of the difference between predictions
oriented programming. (Singh & Kotze, 2006) and data estimates that are chosen so as to optimize the
function or criterion. (Beynon, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Obje c t ive Func t ion-Ba se d Clust e ring Off-Ca le nda r Progra m m ing 483

Objective Function-Based Clustering that it may depend upon many things, like the observer
Cluster analysis is carried on minimizing an objective education or his state of mind, for example. (Analide et
function that indicates a itting error of the clusters to the al., 2006)
O
data. (Klawonn & Georgevia, 2005)
Observed Time Difference of Arrival (OTDOA)
Objective Measurement of PQoS An alternative for the Time of Arrival (TOA) method in
A category of assessment methods that evaluate the which the mobile phone measures the time differences
Perceived Quality of Service (PQoS) level based on between signals from three or more base stations.
metrics that can be measured objectively. (Koumaras et (Ververidis & Polyzos, 2006)
al., 2005)
Occlusion
Objective Measure of Interestingness When one object is in front of another object in the direction
A measure that is data driven and has some element of of observation, a portion of the object that is behind cannot
domain independence. It measures interestingness of a be seen. Then, the second object is occluded by the irst
pattern in terms of its structure and the underlying data one. (Aifanti et al., 2005)
used in the discovery process. Typical examples of such
objective measures of interestingness are support and OCL: See Object Constraint Language.
conidence. Many objective measures of interestingness
trace their origin to traditional statistical, artiicial OCR: See Optical Character Recognition.
intelligence, machine learning, and allied literature.
Objective measures do not capture all the complexities of OCTAVE: See Operationally Critical Threat Asset and
the pattern discovery process and might sometimes bring Vulnerability Evaluation.
out contradictory results. (Natarajan & Shekar, 2006)
OD: See Optimum Distance.
Objective Reality
Essentially, the view that there exists, independently of ODL: See Open and Distance Learning.
human perception, an objective world, and we are able to
gain knowledge of that world by reference to these objects. ODM: See Organizational Data Mining.
(Clarke, 2006)
ODMRP: See On-Demand Multicast Routing Protocol
Objective Social Reality for Mobile Ad Hoc Networks.
An independent existence from any account of it. (Ramos
& Carvalho, 2005) ODS: See Operational Data Store.

Objectivism OECD: See Organization for Economic Cooperation


A set of theories that views true knowledge about external and Development.
realities, and the process of its creation, as neutral and
independent of the knowledge creator. (Ramos & Carvalho, OELE: See Open-Ended Learning Environment.
2005)
OEM: See Organizational Elements Model; Original
Objects with Indeterminate Boundaries Equipment Manufacturer.
These are objects that lay in one of two categories: objects
with sharp boundaries but whose position and shape are OER Pattern: See Order-Execution-Result Pattern.
unknown or cannot be measured exactly, or objects with
not well-deined boundaries or for which it is useless to Off-Calendar Programming
ix boundaries. (Rodrguez-Tastets, 2005a) Courses or programs that typically do not follow the
normal school calendar; that is, courses that have different
Observed Knowledge start/stop times than traditional face-to-face university
The knowledge that is acquired by the experience and/or courses or programs. (Riffee & Sessums, 2005)
by the interaction with the system. It must be noticed

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
484 Off-Ca m pus Course One vs. All

Off-Campus Course organization speciic. An example philosophy is to consider


A course offered at a business location, satellite center, or the OMIS as a meaning attribution system in which people
O other site other than the main campus of an educational select certain resource items out of the mass potentially
institution. (Simon et al., 2005) available and get them processed to make them meaningful
in a particular context in order to support their purposeful
Oficial Organizational Data actions. (Vat, 2005b)
A selected version of dynamic data released for both
internal and external usage to maintain consistency in OMR: See Optical Music Recognition.
communication. (Law, 2005)
OMS: See Organizational Memory System.
Offshore Outsourcing
Service providers execute the IT services out of a low-cost On-Campus Course
country to their customer, the service recipient, which is A course offered wholly or in part on the main campus of an
located in a high-cost country. (Beulen, 2005) educational institution. An on-campus course is typically
offered in a traditional lecture/discussion environment, but
OID: See Object Identiier. may include procedures and methodology associated with
a hybrid online course. (Simon et al., 2005)
OKBC: See Open Knowledge Base Connectivity
Protocol. On-Campus Degree Program
A prescribed program of study leading to a degree conferred
OKI: See Open Knowledge Initiative. by an educational institution wherein the majority of
courses are on-campus courses. See On-Campus Course.
OL: See Open Learning. (Simon et al., 2005)

OLAP: See Online Analytical Processing. On-Demand Delivery Service


Express delivery of products made with highly eficient
Old Economy transportation systems after an online order is received.
1: Based on the production of physical goods and unrelated (I. Lee, 2005)
to telecommunications or the Internet, old economy
companies have little investment or involvement in the On-Demand Help
technology industry. (Hwang & Stewart, 2006) 2: The An expanded support system that enables students to
economy from before, or not using the Internet and related receive assistance from a variety of support staff, such
technologies to exchange information or value. (Foley & as graduate teaching assistants (GTAs) and/or peer
Samson, 2006) tutors, often within a 24/7 structure. The structure often
includes capabilities for students to help each other.
OLE: See Online Learning Environment. (Twigg, 2005)

OLT: See Optical Line Terminal. On-Demand Multicast Routing Protocol for Mobile
Ad Hoc Networks (ODMRP)
OLTP: See Online Transaction Processing. A mesh-based, rather than conventional tree-based,
multicast scheme that uses a forwarding group concept.
OM: See Organizational Memory. (Chakraborty et al., 2005)

OM A R: See Object Modeling of Relational One vs. All


Application. A multi-class approach that constructs, for each class,
a classiier that separates that class from the rest of the
OMIS classes of data. A test datum x will be classiied in the
An information system supporting the development of class that maximizes. (Awad & Khan, 2005)
organizational memory, whose design philosophy is often

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
One vs. One Online Ana lyt ic a l Proc e ssing (OLAP) 485

One vs. One One-Way Reservation Scheme


A multi-class approach that constructs, for each pair of A scheme that may be classiied, regarding the way in
classes, a classiier that separates those classes. A test which output wavelengths are reserved for bursts, as
O
datum is classiied by all the classiiers and will belong to immediate and delayed reservation. JIT and JIT+ are
the class with the largest number of positive outputs from examples of immediate wavelength reservations, while
these pairs of classiiers. (Awad & Khan, 2005) JET and Horizon are examples of delayed reservation
schemes. (Rodrigues et al., 2005)
1G: See First Generation.
One-Way Satellite Service
One-Number Forecast An Internet service that provides data transfer to the
A forecast that provides an objective and uniied view of the customer via satellite, but return path transmission from
future evolution of the enterprise, with buy-in from multiple the customer via a standard telephone network. (Dyson,
stakeholders representing the internal organizations of 2005)
an enterprise as well as its trading partners, and utilized
for planning tactical, operational, and strategic planning Ongoing Trust
endeavors. (Khan et al., 2006) Trust after the trusting party knows the trusted party.
(Paravastu & Gefen, 2006)
1-Safe Design
Replication method where one primary copy is consistent Online
and up to date. (Frank, 2005a) 1: Accessible via computer. (Rada, 2005) 2: Related to or
involving the use of the Internet or the World Wide Web.
One-Stop (St.Amant, 2005e)
A model allowing students the convenience of talking
with one person at one location to ind all the services Online Action Research
and answers needed. Staff who work at one-stop call, Uses the Internet for extending the features of traditional
e-mail, or chat centers have a very broad knowledge of action research and its cyclical structure, based for many
the services and are able to address a high percentage authors on ive different phases: diagnosing, action-
of student questions and service requests. (Howell & planning, action-taking, evaluating, and specifying
Wilcken, 2005) learning. The Internet allows the continuous monitoring of
action-research events, and gives the researcher a further
One-Stop-Shop E-Government Solution instrument to study phenomena and intervene on them.
An Internet portal of a public authority offering to citizens (Cartelli, 2005a)
and enterprises the life-event-resp. business-episode-
structured access to a group of coherent public services Online Analytical Processing (OLAP)
via a single-user interface. All services within this group 1: Various types of online query-driven analyses for
can be triggered by one interaction (one click). (Werth, examining stored data. OLAP enables a user to easily and
2005) selectively extract and view data from different points
of view. (Dholakia, Bang, et al., 2005) 2: A category of
One-to-One-Marketing software technology that allows users to transform raw
The direct dialogue between a producer and an individual data according to predeined or user-deined functions, and
consumer or a group of consumers with similar needs. quickly and interactively performs slice, dice, and roll-up
(Seitz, 2005) operations in various dimensions. (Pourabbas, 2005b) 3:
A category of software tools for collecting, presenting,
One-to-One Tutoring delivering, processing, and managing multi-dimensional
Unlike a classroom setting with one instructor and many data (i.e., data that has been aggregated into various
students, this is tuition (teaching-learning interaction) categories or dimensions) in order to provide analytical
between one tutor and one student. (Chan, Tan, et al., insights for business management. (Lin et al., 2005) 4: A
2005) category of tools and techniques that allows online analysis

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
486 Online Archit e c t ure Online Com m unit y

of data, usually by means of multi-dimensional views of intellectual project. (Lam et al., 2006) 2: Through the use
data. (Barca et al., 2005) 5: A data-mining technology that of online learning tools, participants interact and work
O uses software tools to interactively and simultaneously together to solve a problem or create a product. Facilitating
analyze different dimensions of multi-dimensional data. successful online collaborative activities is very important
(Nemati & Barko, 2005) 6: Front-end tool that allows for establishing a strong sense of community. (S.-K.
the analysis of multi-dimensional data. It is commonly Wang, 2005)
used in business intelligence systems. (de Carvalho, &
Ferreira, 2006) 7: The process of analyzing a database Online Collaborative Tool
or data warehouse, which consists of heavy queries One of a series of online tools such as e-mail, forum, chat
for constructing reports or showing the information in a room, and whiteboard that allow users to communicate
highly aggregated or complex way. This kind of processing and collaborate with one another. (Gillani, 2005b)
supports information retrieval and data analysis in the form
of complex queries and reports. (Hernandez-Orallo, 2005a) Online Communication Regulation Law
8: A particular form of information system speciically A law to enhance application in the administration, which is
designed for processing, managing, and reporting multi- decided by laws exceeding 50,000, and cover all these laws
dimensional data. (Tininini, 2005b) 9: OLAP tools allow for conducting an application electronically. It is considered
users to analyze different dimensions of multi-dimensional that this communication regulation law has completed the
data. (Athappilly & Rea, 2005) 10: Describes a technology basic legal frameworks necessary for the e-government
that uses a multi-dimensional view of aggregate data such as electronic signature law. (Kitagaki, 2005)
to provide quick access to strategic information for the
purposes of advanced analysis. (Tan, 2005a) 11: Usually Online Communication Strategy
distinguished from Online Transaction Processing One of the strategies and protocols established by learners
(OTP), which is the model associated with transaction- and teachers to make effective use of online communication
oriented databases. (Artz, 2005d) 12: An analysis of data tools. (Bennett, 2005)
characterized by complex queries that aim at uncovering
important patterns and trends in the data in order to answer Online Communication Tool
business questions. (Badia, 2005c) Tool that allows communication through Internet-based
technologies. Communication may be synchronous, in
Online Architecture which communication occurs in real time; or asynchronous,
An organizations online architecture demonstrates the in which there is a gap in time between the sending and
range of functions they perform, or intend to perform, using receipt of a message. (Bennett, 2005)
online or other information technologies. Functions may
pertain to communication, research, promotion, product Online Community
distribution, or enterprise management. (Carson, 2005) 1: Community comprising four important elements: the
people who interact socially as they strive to satisfy their
Online Class own needs or perform special roles, such as leading or
A class offered to students using mostly computing and moderating; a shared purpose such as an interest, need,
Internet-based resources, where a large amount of the information exchange, or service that provides a reason for
interaction with the professor and other students takes the community; policies in the form of tacit assumptions,
place via computer and telecommunication technologies. rituals, protocols, rules, and laws that guide peoples
(Dick, 2005) interactions; and computer systems to support and mediate
social interaction and facilitate a sense of togetherness.
Online Class Component (Vat, 2006b) 2: Consists of members connected by
A resource delivered online that is used as part of the means of ICT, typically the Internet. (Leath, 2005) 3: A
content or activities of a class. (Ryan, 2005) collective group of entities (individual or organizations)
who come together through an electronic medium for a
Online Collaboration common purpose and who are governed by norms and
1: The use of Internet-based communication tools to policies. (Bolisani et al., 2006) 4: A meeting place on
cooperate or work with someone else, especially on an the Internet for people who share common interests and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Online Com m unit y of I nt e re st Online Dat a ba se 487

needs. Online communities can be open to all or be by course does not require any face-to-face meetings in a
membership only, and may or may not be moderated. physical location. Web-centric courses (also called hybrid
(Petska & Berge, 2005) 5: A system of Internet users or blended courses) are similar to online courses, but
O
sharing interests and interacting frequently in the same require regular-scheduled face-to-face classes or meetings.
areas, such as forums and chat Web sites. (Magnani (Boettcher, 2005a) 2: A Web-based instructional program
et al., 2006) 6: A voluntary group of active users that that organizes the learning of a student in a particular
partake actively in a certain computer-mediated service. subject. Not all learning materials need be online, and
(Kindmller et al., 2005) 7: People who interact through much of an online course involves dynamic interactions
an ICT-based communication environment, recognize a with other participants. (Duchastel, 2005) 3: Delivery of
minimum common goal that holds them together, share class via the World Wide Web. (Witta, 2005) 4: An online
one or more domains of knowledge and shared practices, course may be either a fully online course or a hybrid online
and deine implicit or explicit policies for regulating their course. A fully online course is offered in a format where
interactions. (Ripamonti, 2005) its content, orientation, and assessments are delivered
via the Internet, and students interact with faculty and
Online Community of Interest possibly with one another while using the Web, e-mail,
An online group that grows from a common interest in discussion boards, and other similar aids. A hybrid online
a subject. These groups develop norms based on shared course meets one or more of the following requirements
values and meanings. (Rowe, 2006d) for students: (1) access to the Web to interact with the
course content; (2) access to the Web to communicate
Online Community of Learners with faculty and/or other students in the course; (3) on
A term used to describe a group of individuals that engage campus for orientation and exams, with other aspects of
with, and collaborate in, similar online learning activities the course meeting the requirements for a fully online
over a set period of time. (Teghe & Knight, 2005) course. (Simon et al., 2005)

Online Conferencing Online Course Design


Online discussion that allows students and teachers to Setting goals and learning objectives, selecting technology
post, read, and reply to each others messages. (Lazarus, tools, preparing instructional strategies, and planning
2005b) evaluation for courses to be delivered online. (Baylen &
Zhu, 2005)
Online Conferencing and Bulletin Board
Web-based conversation spaces known as bulletin boards, Online Customer Relationship Management
online forums, or conferences are very popular and form The methodologies, software, and Internet capabilities
the most visible nucleus for online communities. These that help a company manage customer relationships in an
spaces rely on a variety of software applications that eficient and organized manner. (Gur u, 2006b)
provide linear or threaded asynchronous communications
capabilities. Most applications are text based. However, Online Customer Value
with some applications, one is allowed to insert or link A customers perceived preference for and evaluation of
to images, audio and video iles, and also allow a wider those Web site features and functions that facilitate (or
range of communications options. (Kardaras & Karakostas, block) the performance of the tasks that are instrumental
2006) in achieving the customers goals associated with the Web
site visit. (Porter, 2006)
Online Cooperative Learning
Occurs when students are allocated to and learn in small Online Database
groups, and communicate within those groups and with 1: A special Web site interfaced with a database (usually
the instructor via the Internet. (McInnerney & Roberts, relational). Special languages have been developed to
2005) make easier for programmers the creation of updating and
querying Web pages. (Cartelli, 2006b) 2: Online assessment
Online Course management system. (Wieseman, 2005a)
1: A set of instructional experiences using the digital
network for interaction, learning, and dialogue. An online

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
488 Online De gre e Progra m Online Le a r ning

Online Degree Program Online Game


A prescribed program of studies leading to a degree Originally included the Internet-based computer games
O conferred by an educational institution wherein the in which multiple users log onto host computers and play
majority of courses are online courses. See Online Course. with other users on a real-time basis. However, currently
(Simon et al., 2005) many people employ the term for indicating MMORPGs
(Massively Multi-player Online Role-Playing Games)
Online Discussion Board such as Ultima Online, Lineage, and EverQuest. (Park &
Often called a forum, it is a technology which allows Lepawsky, 2006)
students to interact by posting messages to one another at
a particular URL on the Internet. (Benrud, 2005) Online Group Interaction
The use of computer-mediated communication such
Online Discussion System as e-mail, chat, or a threaded discussion by a group to
The technical system that supports an online group. The communicate for the purposes of carrying out a task.
irst patient online discussion system used e-mail list (Frank et al., 2005)
servers. Web-based discussion systems give users access
to a Web-based archive of messages and incorporate the Online Instruction
features of a list server. (Rada, 2006) A method of teaching that employs networked technologies
to deliver instruction. (Gillani, 2005b)
Online Dispute Resolution
The application of information communication technology Online Journal
to support alternative dispute resolution. (Zeleznikow, An electronic notebook or diary where an individual
2006) can write personal stories, thoughts, reactions, and
correspondence to be shared with others over the Internet.
Online Distance Education (Baim, 2006b)
Software that supports courses for students who are not
present and an in-person class. (Novitzki, 2005) Online Learning
1: Use of the Internet to deliver instructions to students
Online Education using a variety of instructional strategies to meet
Instruction conducted on a network, usually the Internet, individual students needs. (Ally, 2005b) 2: A program of
for students separated geographically. Sometimes called education that is carried out wholly or primarily through
Distance Education. (Rollier & Niederman, 2005) the medium of the Internet. (Grasso & Leng, 2005) 3:
An all-encompassing term that refers to any learning
Online Environment with a computer over a network, including a companys
The computer-mediated space in which online distance intranet, the companys local area network, and the
education occurs, often asynchronous and Web based. Internet. (Rugelj, 2005) 4: An inclusive term for any
(Hawkins & Baker, 2005) form of learning supported by computer-based training.
(Dixon et al., 2005) 5: Education that is delivered using a
Online Experiment computer or computer network, often actively connected
An experiment that is running and controlled by a computer to the Internet. (Campbell & Berge, 2005) 6: Educational
terminal. (Ko et al., 2005) program where content is primarily delivered through
the Internet. Communication is typically asynchronous,
Online (Fantasy) Role-Playing Game occurring through e-mail, listservs, discussion postings,
A role-playing activity in which, rather than meeting in real and chat rooms. (Dorniden, 2005) 7: Learning by using
life and using items like pens, pencils, dice, and so forth, an algorithm that only examines the dataset once in
players can beneit from ICT tools and interact with each order. This paradigm is often used in situations when
other by using either asynchronous methods like posting data arrives continually in a stream and when predictions
on boards or sending e-mails, or synchronous ones that must be obtainable at any time. (Oza, 2005) 8: Learning
are evolving from text-based non-graphical into graphical delivered by Web-based or Internet-based technologies.
forms. (Medeni & Medeni, 2006) (Torres-Coronas, 2005) 9: Learning that is solely or partly

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Online Le a r ning Ac t ivit y Online Pa r t ic ipat or y Exerc ise 489

mediated through online technologies. This mode of Online Learning Platform


learning allows learners and teachers to interact regardless Software that allows the teachers and students to deliver
of location and time. (Bennett, 2005) 10: The activity of instruction, interact with each other, and manage the
O
seeking knowledge, skills, and training through interaction course, all over the Internet. (Baxendale, 2005)
with online environments. This may or may not consist
of structured activities. (Teghe & Knight, 2005) 11: The Online Learning Program
learning process is occurring through the Internet. The A piece of software, running on an electronic network,
instructor and students are not constrained by time or that was explicitly designed to support a learning situation.
physical separation. (S.-K. Wang, 2005) 12: The use by (Blandin, 2005)
students of connected (online) computers to participate
in educational activities (learning). (Clayton, 2006b) See Online Learning Resource
also Electronic Learning, Distance Learning, Web-Based Any resource available on the Internet in an online
Learning Environment. educational environment. It might be HTML documents
such as course or chapter objectives, lecture notes,
Online Learning Activity assignments, or answers to chapter questions. It might be
Learning activity in which students interact with resources, audio or video lessons, interactive exercises or exams, or
or other students, or both, using the capabilities of the documents providing links to other Web sites. (Cooper,
Internet or other computer-based communication networks. 2005)
(Klobas & Renzi, 2005b)
Online Learning Support
Online Learning Community An electronic organizational system that helps transfer
A group of individuals who have chosen to enhance their learning from individuals to a group (and vice versa),
learning process, together utilizing an online interaction provides for organizational renewal, keeps an open
method such as newsgroups and/or e-mail correspondence. attitude to the outside world, and supports a commitment
(Day, 2005) to knowledge. (Vat, 2005c)

Online Learning Environment (OLE) Online Media


1: A learning environment that goes beyond the replication Any communication technology that uses the Internet or
of learning events that have traditionally occurred in the World Wide Web as the means for sharing information
the classroom and are now made available through the with others. (St.Amant, 2006a)
Internet. It provides for different ways of learning and the
construction of a potentially richer learning environment Online Mental Training
that provides for fresh approaches to learning, caters to Training for the development of mental skills and the
different learning styles, as well as allowing for greater acquisition of mental training techniques where the mental
diversiication in learning and greater access to learning. training practitioner and athlete/learner are separated by
(Donnelly, 2005) 2: The more or less structured context time, location, or both, and communication and information
that an online learner interacts with through Computer- sharing occurs via Internet. (Stodel et al., 2005)
Mediated Communication (CMC). Usually, it is composed
primarily of (but is not limited to) facilities for synchronous Online Needs and Skills Assessment Survey
and asynchronous online communication, and often (ONSAS)
includes sets of resources such as e-readings and online A survey that online instructors need to develop and
exercises and tests. (Teghe & Knight, 2005) administer prior to the beginning of their online classes.
(Aisami, 2005)
Online Learning Environment Database for Data
Mining Online Participatory Exercise
Microsofts language-based standard API that introduces One of several course-related activities that can be
several SQL-like statements supporting data-mining conducted online such as interactive tutorials, simulations,
operations for building, testing, and applying a data-mining discussion forums, pre- and post-practice quizzes, and
model. (Zendulka, 2005c) real-time chat. (Etter & Byrnes, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
490 Online Plat for m Online Tra nsa c t ion Proc e ssing (OLT P)

Online Platform Online Shopping


A specially developed platform using Internet technology 1: Consumers using virtual storefronts and Internet to
O for the design and development of teaching and learning buy goods and services. (Efendioglu, 2006) 2: Purchases
purposes. (Lammintakanen & Rissanen, 2005b) carried out through the Internet channel. (Ortega Egea &
Menndez, 2006)
Online Professional Community
Group of various business services irms that make private Online Signature Recognition
use of the network to pursue an immediate business The signature is captured through a digitizer or an
purpose, that is, to improve and extend the service provided instrumented pen, and both geometric and temporal
to the inal customer beyond the peculiar competence and information are recorded and later used in the recognition
practice of the single member. (Bolisani et al., 2006) process. (Chakravarty et al., 2005b)

Online Proiling Online Social Networking


The process of collecting and analyzing data from Web Use of online applications to develop a personal social
site visits which can be used to personalize a customers network. See Social Networking. (Mew, 2006)
subsequent experiences on the Web site. Network
advertisers, for example, can use online proiles to track Online Storefront
a users visits and activities across multiple Web sites, A Web site, available on a public network such as the
although such a practice is controversial and may be subject Internet, which offers goods and services for sale. An
to various forms of regulation. (Zhu, 2005) online storefront is the virtual electronic version of a
physical store/place of business that a customer would visit
Online Program to purchase goods and services. (Iacob et al., 2005)
That portion of distance education offered over the
Internet by an accredited educational institution. (Keinath, Online Support Group
2005) A group of people who support one another in discussions
across the Internet. (Rada, 2006)
Online Public Access Catalog (OPAC)
The module of the integrated library system designed Online Syndicate
for use by the public to allow discovery of the librarys Association of irms with a common interest formed to
holdings through the searching of bibliographic surrogates. engage in e-business. Syndication has become an important
As libraries acquire more digital materials, they are e-business strategy of many companies. (Zhao, 2005)
linking those materials to the OPAC entries. (Nicholson
& Stanton, 2005) Online Teaching
Delivers instruction using a computer network, usually
Online Science Application (OSA) the Internet, without requiring face-to-face meetings
Real-time application oriented towards exploratory of students and faculty. Courses may be synchronous,
scientiic analysis of large multivariate datasets. (Shahabi asynchronous, or a combination. Also commonly referred
et al., 2005) to as Online Distance Education, Distance Education,
Online Learning, and Distributed Learning. (Sales,
Online Service 2005)
1: The provision of an intangible value-adding activity
using Internet-based technology. (Clegg & Tan, 2006) Online Transaction Processing (OLTP)
2: A service provided online, such as a personalized 1: A standard, normalized database structure designed for
newsletter, instant messenger, and so forth. (Wang, Ding, transactions in which inserts, updates, and deletes must be
et al., 2006) fast. (Lin et al., 2005) 2: In data warehousing context, this
refers to the traditional transaction processing of data, as
Online Sexual Activity opposed to the analytical processing provided by OLAP.
Using the Internet for any sexual activity (e.g., recreation, (Barca et al., 2005) 3: The usual process in a transactional
entertainment, exploitation, education). (Whitty, 2005) database which consists of frequent queries and updates

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Online Trust Ont ology 491

for serving the applications of an organization. This kind Ontologically Based Information System
of processing supports the daily operations of the software An information system based upon a domain ontology,
applications, it is read-and-write, and generally performed whereby the ontology provides the semantics inherent
O
through SQL queries. (Hernandez-Orallo, 2005a) 4: within the system. These systems facilitate organizational
A type of software and set of tools that facilitate real- productivity and interorganizational communication.
time processing of transactions for transaction-oriented (Dunn & Grabski, 2005)
applications used in many industries including retails,
airlines, and banking. (Khan et al., 2006) Ontology
1: An explicit, formal specification of a shared
Online Trust conceptualization of a domain of interest. This indicates
An Internet users psychological state of risk acceptance that an ontology should be machine readable (which
based upon the positive expectations of the intentions or excludes natural language). It indicates that it captures
behaviors of an online vendor. (Y.D. Wang, 2005) consensual knowledge that is not private to an individual,
but accepted as a group or committee of practice. The
Online Web Course reference to a domain of interest indicates that domain
Provides all citizens, whenever they want and wherever they ontologies do not model the whole world, but rather model
are, access to high-quality knowledge and know-how in just parts that are relevant to the task at hand. (Ishaya, 2005)
an interactive and custom-made manner. It is based on the 2: A formal and explicit deinition of concepts (classes or
technological progresses and allows the virtual classroom categories) and their attributes and relations. (Loh et al.,
to become a reality. (Y.J. Zhang, 2005b) 2005) 3: A formal speciication in a structured format, such
as XML or RDF, of the concepts that exist within a given
ONSAS: See Online Needs and Skills Assessment area of interest and the semantic relationships among those
Survey. concepts. (Banerjee et al., 2005) 4: A branch of philosophy
that attempts to determine the structure of reality. It can
Onset Detection also refer to a classiication system that organizes particular
The process of inding the start times of notes in an audio things or phenomena. (Artz, 2005c) 5: A collection of
signal. (Dixon, 2005) concepts and inter-relationships. (Chung et al., 2005) 6:
A conceptualization and representation of objects and
ONT: See Optical Network Terminal. phenomena, and the relationships among them in a domain.
(Karimi & Peachavanish, 2005) 7: A consensual and formal
Ontogeny description of shared concepts in a domain. Typically, it
The history of structural changes that a system experiences organizes the objects of a domain in classes and includes
without losing its identity. (Abou-Zeid, 2005b) a hierarchy of classes (e.g., printers are hardware devices).
Ontologies are used to aid human communication and
Ontological Changeability shared understanding, and also communication among
The ability of changing some structures of an information software applications. (Antoniou et al., 2005) 8: A logical
source without producing substantial changes in the theory accounting for the intended meaning of a formal
ontological components of the integrated system. (Buccella vocabularythat is, its ontological commitment to a
et al., 2005) particular conceptualization of the world. The intended
models of a logical language using such a vocabulary are
Ontological Engineering constrained by its ontological commitment. An ontology
The activity of creating models of knowledge and possibly indirectly relects this commitment (and the underlying
deploying them in actual engineering objects. (Cristani conceptualization) by approximating these intended
& Cuel, 2006) models. (Aldana Montes et al., 2005) 9: A representation
of knowledge speciic to some universe(s) of discourse. It
Ontological Reusability is an agreement about a shared conceptualization, which
The ability of creating ontologies that can be used in includes conceptual frameworks for modeling domain
different contexts or systems. (Buccella et al., 2005) knowledge and agreements about the representation of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
492 Ont ology Alignm e nt ON U

particular domain theories. (Ghenniwa & Huhns, 2005) Ontology Web Language (OWL)
10: A set of concepts, and a set of relations among those 1: Language (based on description logics) designed
O concepts. (Kulyukin & Nicholson, 2005) to represent ontologies capable of being processed by
machines. (Alonso-Jimnez et al., 2005) 2: Markup
Ontology Alignment language for sharing ontologies in the World Wide Web.
Mapping between concepts deined in a source ontology OWL builds on RDF and was derived from the Defense
and concepts deined in a target ontology in order to Advanced Research Projects Agency (DARPA) Agent
ind the concepts with similar (or the same) meaning. Markup Language (DAML). (Juszczyszyn, 2006) 3:
(Juszczyszyn, 2006) Ontology representation language recommended by W3C,
and intended for publishing and sharing ontologies in the
Ontology Creation (Editor) Tool Web. It comprises three layers: OWL Lite, OWL DL, and
A tool that enables ontology speciication and creation OWL Full. (Dieng-Kuntz, 2006) 4: The Web Ontology
through some collaborative authoring. It usually requires Language deined by W3C. It was designed for use by
users to be trained in knowledge representation and applications that need to process the content of ontology
predicate logic. They are supposed to offer a server-based information instead of just presenting this the information
environment with support for consistency checking of to humans. It uses the description framework provided by
interconnected ontologies, and a collaborative environment RDF. (Sicilia & Garca-Barriocanal, 2006) 5: Designed to
for model review and reinement. (Kapetanios, 2005) meet the need for a Web ontology language. OWL is part of
the growing stack of W3C recommendations related to the
Ontology Distribution Semantic Web. OWL adds more vocabulary for describing
A mode of semi-autonomous maintenance of ontology properties and classes: among others, relations between
data, according to which each public authority maintains classes (e.g., disjointness), cardinality (e.g., exactly one),
speciic portions of an ontology. (Vassilakis & Lepouras, equality, richer typing of properties, characteristics of
2006) properties (e.g., symmetry), and enumerated classes.
(Kapetanios, 2005) 6: The current W3C standard for
Ontology Merging deining Web ontologies. (Antoniou et al., 2005) 7: A
Creating ontology by joining two or more source ontologies. semantic markup language for publishing and sharing
Corresponding concepts are merged and treated as a single ontologies on the World Wide Web. OWL is developed
concept. (Juszczyszyn, 2006) as a vocabulary extension of RDF and is derived from the
DAML+OIL Web Ontology Language. An OWL ontology
Ontology Methodology is an RDF graph, which is in turn a set of RDF triples.
A sequence of steps to be deployed in order to achieve one OWL includes three speciic sub-languages, characterized
possible goal amongst creating, modifying, re-creating, by an increasing level of complexity and expressiveness:
validating, and evaluating a domain ontology. The very OWL Lite, OWL DL (DL stands for Description Logics,
nature of an ontology methodology is more complex a particular, logic-oriented, knowledge representation
in principle, being able to provide the very same goal language introduced to supply a formal foundation for
achievements by means of true worklows. However, these frame-based systems), and OWL Full. (Zarri, 2006b) 8: A
do not actually appear in the current literature. (Cristani W3C recommendation for modeling complex conceptual
& Cuel, 2006) models and background information in a Web-based
setting. The language extends RDF schema with richer
Ontology vs. Taxonomy operators for deining classes of objects. (Stuckenschmidt,
In a taxonomy (and in the most simple types of ontologies), 2005)
the implicit deinition of a concept derives simply by the
fact of being inserted in a network of speciic/generic Ontology-Management System
relationships (IsA) with the other concepts of the hierarchy. System for querying, storing, creating, modifying,
In a real ontology, we must also supply some explicit loading, accessing, and manipulating ontologies. (Youn
deinitions for the conceptsor at least for a majority & McLeod, 2006)
among them. This can be obtained, for example, by
associating a Frame with these concepts. (Zarri, 2005a) ONU: See Optical Network Unit.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
OOA Ope n Educ at ion 493

OOA: See Object-Oriented Analysis. Open Archives Initiative


Initiated by the American physicist P. Grinsparg in 1999,
OoBE: See Out-of-the-Box Experience. the initiative designed metadata tagging standards.
O
(Rennard, 2005)
OOD: See Object-Oriented Design.
Open Archives Initiative Protocol for Metadata
OOP: See Object-Oriented Programming. Harvesting (OAI-PMH)
Provides a standard framework for metadata harvesting.
OPAC: See Online Public Access Catalog. (Rennard, 2006)

Open Access Open Auction


Making resources freely available to all. (Taylor et al., Bids are known to all bidders. (Guan, 2006a)
2005)
Open Catalog of Manuscripts
Open Access Journal An information system made up of ive sections (to be
Freely online available scholarly journal. Some are purely intended in a lexible manner, i.e., depending on the
electronic journals, others are classical ones offering a available resources and the different solutions that a
free electronic version. (Rennard, 2005) library will adopt): (1) the irst section contains documents
illustrating the history of the library and its manuscripts;
Open Access Model (2) the bibliography ordered by shelfmark and, eventually,
Model for collaboration between institutions where all alphabetically and chronologically, is housed in the
courses are made openly available to students, across second section; (3) the descriptions of the manuscripts
institutional limits and regulations. (Haugen & Ask, (i.e., previous printed catalogs or ancient handwritten
2005) catalogs suitably digitized) and new descriptions are in
the third section; (4) the fourth section is devoted to the
Open Admission images reproducing the highest number of manuscripts
1: A policy of admitting students to higher education in the library (potentially all); and (5) the ifth and last
institutions (or any other type of teaching institutes) section is a communication subsystem including electronic
without setting any entry requirements. (Guri-Rosenblit, blackboards, chats, forums, and special Web solutions
2005b) 2: Admission to a university with no formal entry granting the easier acquisition, writing, and editing of
requirements: it is open to everyone without the need for texts. (Cartelli, 2006a)
proof of prior scholastic achievements. (Erlich & Gal-
Ezer, 2005) Open Communication
The foundation of a virtual organization is its
Open and Distance Learning (ODL) communications components that exist in absence of face-
1: Different from correspondence instruction in the to-face exchanges. A virtual organization can only survive
use of multiple media and small-group and individual if its members communicate freely through the provided
student-support systems. (Berg, 2005g) 2: Learning made channels between them, be they based on the Internet or
available at a distance, adopting the traditional expression more traditional telephone technologies. The organization
of distance learning into new technological situations. cannot continue to function unless it is aware of what all
(Haugen & Ask, 2005) 3: Learning where learners have its members are currently completing, and often times,
some lexibility and control as to when, where, and how when communication is more closed, work that is being
they learn, balanced by structure and support from the completed in tandem by more than one member can be
educational provider. (Kung-Ming, 2005) 4: The fusion hindered or brought to a halt. (J. Lee, 2005)
of the Distance Learning and Open Learning instructional
modes. It can be depicted in literally ininite shapes and Open Education
combinations. (Karoulis & Pombortsis, 2005b) 1: Any scheme of education or training that seeks
systematically to remove one or more barriers to learning.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
494 Ope n Educ at iona l Re sourc e Ope n Sourc e

It also means learning in your own time, at your own pace, Open Knowledge Initiative (OKI)
and at your own base, using higher education settings An open source reference system for Web-enabled
O for academic assistance and as a base for facilities and education. It provides a set of resources and an architecture
equipment. Formats include Distance Learning and designed to enable the development of easy-to-use Web-
Online Learning. (Kinuthia, 2005) 2: This is more of a based environments and for assembling, delivering, and
European term, where in the United States it is referred to accessing educational resources. (ODea, 2005)
as Continuing Education. Courses that are being offered
for ones own maintenance of professional currency. Open Learning (OL)
(Kostopoulos, 2005) 1: Denotes a system of education that recognizes prior
learning and permits open entry to its programs. OL
Open Educational Resource programs in general are designed to enable the learner
Term accepted by the international higher education to study at a time, pace, and place to meet the learners
community through UNESCO to refer to such projects as needs and demands. (Taylor et al., 2005) 2: Learning made
MITs OpenCourseWare, Rice Universitys Connexions available, independent of time and place; also open with
Project, and other resources created electronically and respect to methodology and form of presentation. (Haugen
made available worldwide for no cost. (S.M. Johnstone, & Ask, 2005) 3: Learning for all. The central idea is to
2005) grant everybody access to the learning resources. This term
is often confused with lifelong learning or vocational
Open Group training, however, it is broader than those. (Karoulis &
The source does not have to know the members of the Pombortsis, 2005b) 4: A qualitative, value-loaded, and
groups for sending data, and the receivers (members of the highly relative term. Its use is confusing unless the context
group) do not have to know the source. (Hosszu, 2005a) indicates the dimensions of openness that relate to it.
Many scholars attribute to open learning characteristics
Open Hypermedia of extending access to various educational frameworks,
As a more generalized concept addressing interoperability employing lexible schedules, and enhancing self-directed
among hypermedia services, it has the following learning. (Guri-Rosenblit, 2005b)
characteristics: it should be platform independent and
distributed across platforms, and users should be able to Open Loop
ind, update, make links to, and exchange the information, Digital cash issued once can be used for additional
unlike hypermedia titles on CD-ROM. (Suh & Kim, transactions, even if the value does not return to the
2005) issuer. The open loop provides rolling liquidity. (Kurihara,
2006)
Open Knowledge Base Connectivity (OKBC)
Protocol Open Sociotechnical System
A protocol aiming at enforcing interoperability in A complex set of dynamically intertwined and
the construction of knowledge bases. The OKBC interconnected elements, including inputs, processes
knowledge model is very general, in order to include the (throughputs), outputs, feedback loops, and the environment
representational features supported by a majority of frame- in which it operates and interacts. (Cuevas et al., 2005)
based knowledge systems, and concerns general directions
about the representation of constants, frames, slots, facets, Open Source
and so forth. It allows frame-based systems to deine 1: Method and philosophy for software licensing and
their own behavior for many aspects of the knowledge distribution designed to encourage use and improvement
model, for example, with respect to the deinition of the of software written by volunteers by ensuring that anyone
default values for the slots. The most well-known OKBC- can copy the source code and modify it freely. (Lightfoot,
compatible tool for the setup of knowledge bases making 2005) 2: Software that is developed by software engineers
use of the frame model is Protg-2000, developed for many who give users the right to alter the software code in
years at the Medical Informatics Laboratory of Stanford order to develop and improve the software for use and
University, and that represents today a sort of standard in distribution. (Boateng & Boateng, 2006b) 3: Technically,
the ontological domain. (Zarri, 2005a) refers to making the programming instructions used to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ope n Sourc e Com m unit y Ope n Sourc e U se r 495

write computer software available for scrutiny and reuse by Open Source Licensing Model
others. In practice it also describes a political movement that A statement of the rights granted by the owner of some piece
is concerned with how software and computer technology is of open source software to the user. (Fleming, 2005b)
O
owned and controlled. Open source software is commonly
either in the public domain or copyrighted and licensed by Open Source Software (OSS)
the owner in ways that enforce free access to the source 1: Software for which the source code is distributed
of the original and all derived works. (Marshall, 2005) along with the executable program. (Sahraoui, 2006) 2:
4: There is no universally accepted deinition, but the Computer software distributed under some license that
one given by the Open Source Initiative summarized the permits the user to use, modify (including the creation
concept as: free distribution, source code, derived works, of derived works), and distribute the software and any
integrity of the authors source code, no discrimination derived work, free from royalties. (Fleming, 2005b) 3:
against persons or groups, no discrimination against In general, software available to the general public to
ields of endeavor, distribution of license, license must use or modify free of charge is considered open. It is
not be speciic to a product, license must not restrict other also considered open source because it is software that is
software, and license must be technology neutral. (Zhao typically created in a collaborative environment in which
& Deek, 2005) developers contribute and share their programming openly
with others. (St.Amant & Still, 2005) 4: The software one
Open Source Community can have at his/her disposal together with the source code.
Community of developers that interact virtually to write Its main feature is to be submitted to licenses obliging
code collaboratively. (Sahraoui, 2006) those who want to distribute that software, parts of it, or
changes to its structure, to do it together with the source
Open Source Database code. (Cartelli, 2005b) 5: Software whose source code is
A class of relational database developed and distributed liberally made available for use, modiication, creation
by means of the F/OSS development model. (Sowe et al., of derivative works, and redistribution. (Carillo & Okoli,
2005) 2006) 6: Software with its source code available for
users to inspect and modify to build different versions.
Open Source Developer (Kayacik et al., 2005) 7: Software whose license is free
Software developers who are core members of open and allows unrestricted redistribution of source code.
source projects. They either initiated projects or joined (Wang & Gwebu, 2006) 8: Generally, a program in which
in subsequently as major contributors. (Zhao & Deek, the source code is available to the general public for use
2005) and/or modiication from its original design free of charge.
(Wei & Wang, 2006)
Open Source E-Learning System
E-learning systems developed by the Open Source Open Source Software for E-Government
Community and freely distributed with their own license A viable alternative to commercial proprietary software,
or a GPL (General Purpose License) to use, modify, and with potential signiicant value for money beneits for e-
distribute together with the source code. (Fernando, government. It is based on the principle of software products
2005) made available by the OSS developer community licensed
for use with or without a fee. OSS licenses generally give
Open Source Initiative (OSI) the user the freedom to use, copy, distribute, examine,
1: Group of developers who disseminate information change, and improve the software. (Yigitcanlar & Baum,
on the beneits of open source. (Sahraoui, 2006) 2: An 2006a)
organization dedicated to managing and promoting the
open source deinition for the good of the community. Open Source User
(Curti, 2005) An individual interested in open source software
and willing to contribute by different means. Unlike
Open Source License open source developers, open source users are more
Guarantees the freedom to share and change software heterogeneous in background, less committed to projects,
without any permission from its original owner. (Sahraoui, but provide major impetus to software improvement. (Zhao
2006) & Deek, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
496 Ope n Syst e m Ope ra nt Condit ioning

Open System environment with a large amount of learner control and


Any system without strong boundaries, where information different tools. (Clarebout et al., 2005b)
O and other goods low to and from the systems environment.
(Murphy, 2005c) OpenGL ES: See OpenGL for Embedded Systems.

Open Systems Interconnection Reference Model OpenGL for Embedded Systems (OpenGL ES)
Seven-layer architectural model developed by the A low-level, lightweight API for advanced embedded
International Standards Organization (ISO) to describe graphics using well-deined subset proiles of OpenGL. It
standardized network operations. (Littman, 2006) provides a low-level applications programming interface
between software applications and hardware or software
Open University graphics engines. (Di Giacomo et al., 2005)
1: This term is often used interchangeably with distance
teaching university, though a handful of distance education Openness
providers are entitled as open universities. All of the 1: A measure of the freedom to search, collect, and exchange
open universities employ an open-admission policy. governmental information related to public services or to
(Guri-Rosenblit, 2005b) 2: A university that is open to the bureaucratic structure. (Almazn & Gil-Garca, 2006)
people without formal academic qualiications and where 2: The giving employees willingness to transfer their
teaching is done using distance education means. (Shareef knowledge in a collaborative interaction. This stresses the
& Kinshuk, 2005) 3: A university without traditional attitude of giving employees involved in the knowledge
classrooms; teaching and learning is conducted at a transfer of not hiding their knowledge so that potential
distance through means such as the Internet, TV and radio, learning is facilitated. (Chen, Duan, et al., 2006)
printed materials, and tutoring centers. (Reynolds, 2005)
4: A university, typically employing distance education Open-World Assumption (OWA)
technologies, that provides open access and admission to 1: An assumption made while reasoning with incomplete
all within the country or region. (Laws et al., 2005) 5: This knowledge: all facts that are not implied by the knowledge
term is used to refer to a distance teaching university that base are assumed to be unknown. (Babaian, 2005) 2: The
offers courses through distance learning, employing either fact that the frame of discernment might not be exhaustive.
traditional, technology-integrated, and sometimes entirely (Smets, 2005)
online methods. It is also used to refer to a university with
open admissions. The term is not unequivocal. These Operant Conditioning
universities usually allow for lexibility in curriculum 1: Skinner contributed much to the study of operant
and pace of studies. Open University can also be part conditioning, which is a change in the probability of a
of the name of an institution, often combined with the response due to an event that followed the initial response.
name of the country in which it operates, such as the OUI The theory of Skinner is based on the idea that learning
(Open University of Israel), OUUK (Open University of is a function of change in behavior. When a particular
the United Kingdom), OUHK (Open University of Hong S-R pattern is reinforced (rewarded), the individual is
Kong), and AOU (Arab Open University). (Erlich & Gal- conditioned to respond. Changes in behavior are the
Ezer, 2005) result of an individuals response to events (stimuli) that
occur in the environment. Principles and Mechanisms
Open-Ended Learning Environment (OELE) of Skinners Operant Conditioning include: Positive
1: Multimedia learning environments based on Reinforcement or Reward, Negative Reinforcement,
constructivist principles tend to be open-ended learning Punishment, and Extinction or Nonreinforcement. (I. Chen,
environments. OELEs are open-ended in that they allow the 2005) 2: Learning through immediate positive feedback
individual learner some degree of control in establishing (reinforcement) regarding the correctness of an answer;
learning goals and/or pathways chosen to achieve learning. the student learns to respond in a particular way to a
(Torrisi-Steele, 2005) 2: A learning environment that aims particular question or issue (stimulus). Fading can be used
at fostering complex problem-solving skills by confronting by gradually reducing stimulus cues in subsequent frames
learning with a realistic or authentic problem in a learning when material is repeated. (Owen & Aworuwa, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ope rat ion Ope rat or 497

Operation short term; operational goals are derived from the tactical
1: A function or transformation that may be applied to goals. (Brabston, 2005)
or by objects in a class. The class Account, for example,
O
might have the operations Open, Close, PayIn (Amount), Operational Objective
and Withdraw (Amount). (Rittgen, 2005) 2: A process- A short-term objective, such as maximization of working
related notion in UML; operations cause state changes in time, reduction of duplication, stimulation of creativity,
objects. (D. Brandon, Jr., 2005a) and so forth. (Tremblay, 2006a)

Operational Cost Operational Planning


A linear combination of the query evaluation and view Planning that builds on the strategic and tactical objectives,
maintenance cost. (Theodoratos & Simitsis, 2005) and assures that our path and work are on target. (Kaufman
& Lick, 2005)
Operational Data
1: Contains the most recent data about the organization Operational Semantics
and organized for fast retrieval as well as avoiding update The meaning is given in terms of rules that specify how
anomalies. (Owrang O., 2006) 2: Data used to support the the state of a computerreal or formalchanges while
daily processing a company does. (Peter & Greenidge, executing a program. (Dasso & Funes, 2005)
2005b)
Operational-Knowledge Management
Operational Data Store (ODS) Knowledge management processes that directly affect or
1: An integrated repository of transaction-processing relate to core military operations or operational activities.
systems that uses data-warehouse concepts to provide (Ariely, 2006b)
clean data in support of day-to-day operations of
a business. (Hirji, 2005) 2: A system with capability Operationally Critical Threat Asset and Vulner-
of continuous background update that keeps up with ability Evaluation (OCTAVE)
individual transactional changes in operational systems Provides details of accepted best practices for evaluating
vs. a data warehouse that applies a large load of updates security programs. (Tassabehji, 2005b)
on an intermittent basis. (Lin et al., 2005)
Operations Integration
Operational Deinition Creating logical connections of individual operations, or
In order to investigate any aspects of behavior that can steps of a business process, with preceding or succeeding
be interpreted in many ways, it is necessary to provide operations, respectively. (Kurbel, 2005)
speciic deinitions that are concise and measurable for
the investigation. (Chyung, 2005) Operations Management
Distinguishes objects, which are the inputs and outputs of
Operational Dynamics operations, related support tasks, and the setting of goals
Change in an organizations operation, while the and creation of means. (Wijnhoven, 2006)
organizations structure remains unchanged (static),
along the time when time as a parameter is indispensable Operations Research (OR)
for the organizations operations, or some aspect of the Mathematical and constraint programming and other
organizations operations, description, and analysis. In techniques for mathematically or computationally
the case of an agile/virtual enterprise, the operational determining optimal solutions for objective functions in
dynamics refers to inter-enterprise operational dynamics. the presence of constraints. (Ganguly et al., 2005)
(Cunha & Putnik, 2005)
Operator
Operational Goal 1: A person who tends to the workings of network
One of the very speciic targets that represent the desired equipment. (Maris, 2005) 2: In the context of P2PWNC, a
outcomes the organization expects to achieve over the speciic class of Wi-Fi providers that are generally known

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
498 Oppor t unism Opt im ist ic T w o-Pha se Lock ing (O2 PL)

as public hotspot operators or wireless Internet service output wavelength of a given optical iber. (Rodrigues et
providers (WISPs). (Efstathiou & Polyzos, 2006) al., 2005)
O
Opportunism Optical Line Terminal (OLT)
In terms of virtual teams, the characteristic of existing 1: A iber-to-the-home terminating device at the providers
to capitalize on a speciic opportunity or meet a speciic, central ofice or point of presence connected to one or more
temporary need. In terms of Transaction Cost Economics Passive Optical Networks that provides connection to the
(TCE), the characteristic of an entity that indicates the providers network. (Kelic, 2005) 2: An OLT is located at
entity will act in its own best interest even at the expense the central ofice and is responsible for the transmission
of other entities in the market. (Morris et al., 2005) of Ethernet frames to Optical Network Units. (Freire et
al., 2005)
Opportunity Cost
The cost of the next best alternative use of time or resources Optical Music Recognition (OMR)
when one choice is made rather than another. The cost of 1: The recognition of images of music notation in such a
doing something always includes the additional cost of way that the meaning is captured. (George, 2005b) 2:
what could have been done if a different choice was made. Optical recognition of music; transcoding of an image score
(Hartoonian & Johnson, 2005) to a symbolic score format by using a speciic algorithm.
(Nesi & Spinu, 2005)
Opt-In/Opt-Out
1: Options for individuals to be included or excluded from Optical Network Terminal (ONT)
a database record. (Dholakia, Zwick, et al., 2005) 2: A A iber-to-the-home terminating device at the customer
strategy that a business may use to set up a default choice premise. (Kelic, 2005)
(opt-in) in a form that forces a customer, for example,
to accept e-mails or give permission to use personal Optical Network Unit (ONU)
information, unless the customer deliberately declines Usually located at the subscriber premises or in a telecom
this option (opt-out). (T. Stern, 2005) 3: Consciously closet and responsible for the transmission of Ethernet
to accept some situation or condition in a contract. For frames to Optical Line Terminal (OLT). (Freire et al.,
example, to opt-in to an e-mail subscription means that 2005)
you want to receive periodic messages, even from third
parties (antonym: opt-out). (Friedman, 2005) Optical Window
A range of wavelengths in which attenuation has the lower
Optical Attenuation value. The criterion to choose the optical source. (Louvros,
The attenuation of transmitted light through optical Iossiides, et al., 2005)
waveguides mostly due to material absorption. (Louvros
et al., 2005a) Optical-Access Network (OAN)
The set of access links sharing the same network-side
Optical Character Recognition (OCR) interfaces and supported by optical-access transmission
1: The electronic identiication and digital encoding of systems. (Chochliouros et al., 2005a)
printed or handwritten characters by means of an optical
scanner and specialized software; the technology involved Optical-Scan Voting System
in this process. (Rhoten, 2006a) 2: The technique of Requires voters to use a pen or pencil to ill in an oval or
automatically translating the content of an image-formatted connect dots on a paper ballot. This is the same system
document into text-formatted materials. (Chan, Ho, et used to record test scores on standardized tests like the
al., 2005) 3: Software that recognizes text and converts SATs. (Gibson & Brown, 2006)
it to a form in which it can be processed by computer.
(McCarthy, 2005a) Optimistic Two-Phase Locking (O2PL)
This is avoidance-based and is more optimistic about the
Optical Cross-Connect (OXC) existence of data contention in the network than Case-Based
Optical device used mainly in long-distance networks Learning (CBL). It defers the write intention declaration
that can shift signals from an incoming wavelength to an until the end of a transactions execution phase. Under the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Opt im izat ion Orga nizat ion 499

ROWA protocol, an interaction with the server is required manages conversations among Web services. (Sethi &
only at client cache-miss or for committing its cache copy Sethi, 2006a)
under the O2PL. As in CBL, all clients must inform the
O
server when they erase a page from their buffer so that the Order Aggregation
server can update its page list. (Parker & Chen, 2005) A group purchase designed to achieve a volume discount
by aggregating orders placed by individual buyers. (I.
Optimization Lee, 2005)
The quantitative study of optima and the methods for
inding them. (Mart, 2005) Order-Execution-Result (OER) Pattern
A basic pattern for business interaction based on order-
Optimization Criterion execution-result phases. (Johannesson, 2005a)
Criterion that gives the quality of a solution of an
optimization problem. (Jourdan et al., 2005) Ordered and Labeled Tree
A tree whose nodes are labeled and in which the left-to-
Optimization Problem right order among siblings is signiicant. (Chen, 2005b)
A computational problem for which an objective function
associates a merit igure with each problem solution, and Ordinal Data
it is asked to identify a feasible solution that minimizes or 1: Data classiied into categories that can be ranked.
maximizes the objective function. (Calvo et al., 2005) However, the differences between the ranks cannot be
calculated by arithmetic. An example is: assignment
Optimization Process evaluation: fail, pass, good, excellent. (Yang & Webb, 2005)
The process used to focus the search (or guide the search) 2: Data that is in order but has no relationship between the
for interesting patterns, as well as to minimize the search values or to an external value. (Morantz, 2005)
efforts on data. (Owrang O., 2006)
Ordit
Optimum Distance (OD) Based on the notions of role, responsibility, and
Appropriate degree of closeness (or distance) among conversations, making it possible to specify, analyze,
the team members achieved through the combination of and validate organizational and information systems
Knowledge Distance (KD) and Professional Distance (PD), supporting organizational change. The Ordit architecture
leading to so-called creative tension. (Choudhary, 2005) can be used to express, explore, and reason about both the
problem and the solution aspects in both the social and
Option technical domains. From the simple building blocks and
1: By deinition, gives the holder the right, but not the modeling language, a set of more complex and structured
obligation, to take ownership of an underlying asset at a models and prefabrications can be constructed and reasoned
future point in time. (Lawson-Body, 2005) 2: The right, about. Alternative models are constructed, allowing the
but not the obligation, to buy or sell an asset by a pre- exploration of possible futures. (Singh & Kotze, 2006)
speciied price on or before a speciied date. (Li, 2005b)
3: A inancial option owes the holder the right, but not Organization
the obligation, to trade in securities at prices ixed earlier. 1: The degree of formal organization of social relationships
Options confer to a irm the rights, but not the obligations, and of a community or network as a whole; low organization
to choose a strategic alternative. (Narayanan, 2005) means informal self-organization. (Meller-Prothmann,
2006a) 2: The deliberate integration of persons in
OR: See Operations Research. order to achieve a goal or outcome. (Murphy, 2005c)
3: The coniguration of relationships among a systems
Orchestration components that deine a system as a unity with distinctive
1: A business uses orchestration in order to deine the identity, and determine the dynamics of interaction and
electronic message interaction with other business transformations that it may undergo as such a unity.
partners in order to fulill its obligations. (Bussler, (Abou-Zeid, 2005b)
2005a) 2: The process that sequences, coordinates, and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
500 Orga nizat ion for Ec onom ic Coope rat ion a nd Deve lopm e nt (OECD) Orga nizat iona l Cult ure

Organization for Economic Cooperation and Organizational Competency in Project


Development (OECD) Management
O 1: International guidelines for protecting an individuals Ensuring that the organization is in a ready state in order
privacy (similar to the FIP). (T. Stern, 2005) 2: An for projects to be able to deliver beneits. (Bryde & Petie,
international organization helping governments tackle 2005)
the economic, social, and governance challenges of a
globalized economy. (Hutchinson, 2005) Organizational Context
1: Context is concerned with the multi-level identiication
Organization Learning of the various systems (e.g., social, political, economic,
Involves encoding inferences from history into routines that technical) and structures (e.g., organizational processes,
guide behavior. It is routine based, history dependent, and policies, individuals roles), as well as informal networks
target oriented. Organization learning may be facilitated by and personal relationships within which the organization
knowledge management, which presumably can decrease/ is located. (Serafeimidis, 2005) 2: The conditions within
eliminate structural and cultural barriers to organization the organization that a team works in that inluence the
learning. (Nelson & Hsu, 2006) successfulness of the teams activities and the involvement
of the team members. Reward systems, level of management
Organization Structure support, resources provided, and organizational culture all
Patterns of work relationships (or task interdependencies). are important organizational factors that potentially affect
Production structure refers to work relationships a teams ability to succeed. (Wong & Staples, 2005)
among production tasks. Control structure refers to the
hierarchical work relationships involved in coordinating Organizational Culture
production work. Informal organization structure concerns 1: The embodiment of shared understanding and common
organically developing work relationships, whereas purpose, which serves to develop and sustain working
formal organization structure concerns predeined work practices within organizations and provide a binding factor
relationships. (Hendriks, 2006) for all employees within the same organization, regardless
of location, distance, time, or local environment. (Huq et
Organization-Driven Web Design al., 2006) 2: A pattern of behavior, such as cross-individual
The structure of the organization is taken as the starting behavioral consistency. For example, when people say that
point for the design of the Web site and is relected in the culture is the way we do things around here, they mean
Web site. (De Troyer, 2005) that there is a consistent way people perform tasks, solve
problems, and resolve conlicts. Organizational culture
Organizational Agility is also deined as the informal values, norms, and beliefs
An organizations ability to respond quickly and that control how individuals and groups in an organization
appropriately to changes in the organizations environment interact with each other and with people outside the
to solve problems and capitalize on opportunities. (Morris organization. (Hanson, 2005) 3: A set of widely shared
et al., 2005) beliefs, values, norms, and practices that describe how
to think, feel, and act within an organizational setting.
Organizational Assimilation (Jacobson, 2006) 4: Embraces two levels: deep-seated
The processes by which individuals become integrated into ideas and beliefs, and espoused values that form part of
the culture of an organization. (Long et al., 2005) the cultural knowledge embedded within organizations.
It is relected in the organizational climate. (Huotari &
Organizational Attention Iivonen, 2005) 5: A pattern of shared basic assumptions
The socially structured pattern of attention by decision that the group learned as it solved its problems of external
makers in an organization guiding how they select from adaptation and internal integration that has worked well
and respond to available stimuli. (Yaniv & Schwartz, enough to be considered valid. Therefore, it is taught to
2006) new members as the correct way to perceive, think, and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Orga nizat iona l Deve lopm e nt Orga nizat iona l Fa c t or 501

feel in relation to those problems. (Zakaria & Yusof, 2005) to innovate, improved coordination of efforts, and reduced
6: Refers to the way people give meaning to their actions redundancy of information/knowledge. (Hsu & Mykytyn,
in an organizational setting. Because of cognitive and 2006)
O
normative diversity within an organization, the attribution
of meaning is complicated and leads to organizational Organizational Elements Model (OEM)
cultural integration as well as fragmentation, and unity A planning framework with three levels of planning
as well as diversity. (Boersma & Kingma, 2006) 7: The and three associated levels of results: (1) mega-level
set of shared values and norms within an organization planningoutcomes: what an organization can deliver
that shape its behaviors, attitudes, and actions. (Jones & for societal value added and impact; (2) macro-level
Gupta, 2005) planningoutputs: what an organization can deliver
outside itself; and (3) micro-level planningproducts: what
Organizational Development an organization produces. (Kaufman & Lick, 2005)
A professional approach to organizational action guided
by careful diagnosis based on social scientiic enquiry. Organizational Encounter
The period between the 1960s and late 1970s was A time for newcomers to learn behaviors, values, and
highly experimental and established the principles of beliefs associated with their jobs and organizations. (Long
organizational development for much of the twentieth et al., 2005)
century. By the end of the twentieth century, new
approaches to organizational development had emerged as a Organizational Environment
result of critiques of functionalist methods and behaviorism Refers to the aims and objectives of the organization in
in particular, and also because of Morgans book, Images the context of the way in which it structures itself and its
of Organization, which gave rise to multiple diagnoses. activities. The structure of the organization is the way in
Increasingly, organizational learning became a focus for which the organization is arranged for the implementation
organizational development activities. (Grieves, 2006b) of authority. Generally, this structure is either a hierarchical
structure, a lat structure, or a management matrix. A
Organizational Data Mining (ODM) hierarchical structure is typically shaped like a pyramid
The process of leveraging data-mining tools and with power or control centralized in a CEO (chief executive
technologies in an organizational setting to enhance oficer) who has managers reporting back. These managers
the decision-making process by transforming data into have subordinates who also exercise delegated authority
valuable and actionable knowledge to gain a competitive over their subordinates. There may be several layers
advantage. (Van Dyke et al., 2006) of authority and delegation depending on the size and
complexity of the organization. Ultimately, power and
Organizational Discourse control lies in the CEO. A management matrix has a series
Collections of organizational texts, such as conversations, of control mechanisms where the workforce may report
stories, dialogues, meetings, and other socially constructed to their direct superior, and additionally to one of a series
exchanges, of which storytelling represents an example of team leaders. This requires a sequence of devolved
of a unit of analysis. (Connell, 2006) authorities and responsibilities. A lat organizational
structure has devolved power and responsibilities without
Organizational Dynamics a cascading series of reporting structures. (Zyngier,
Changing of an organizations structure, where structure 2006)
consists of an organizations (companys) elements and
relations among them along the time parameter, when Organizational Factor
time as a parameter is indispensable for the organizations One of the resources that an organization has available to
structure, or some aspect of the organizations structure, support the adoption of an innovation, such as inancial
description, and analysis. (Cunha & Putnik, 2005) and technological resources, as well as top management
support and top management knowledge. (Cragg & Mills,
Organizational Effectiveness 2005)
Used to evaluate the value-added aspect of organizational
resources. Three concepts are included: improved ability

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
502 Orga nizat iona l I m pa c t Ana lysis Orga nizat iona l M e mor y Syst e m (OM S)

Organizational Impact Analysis learning is descriptive stream, with academics who pursue
A one-off study to determine the ways in which a proposed the question: How does an organization learn? When
O system will affect the organization, in areas such as power, individual and group learning becomes institutionalized,
structure, culture, working practices, and so forth. (Doherty organizational learning occurs. (Xu & Wang, 2006)
& King, 2005)
Organizational Learning Capability
Organizational Intelligence Ability an organization has to learn or the capacity
The collective organizational capacity of achieving goals for increasing its own learning power via the putting
and effectively responding to environmental changes. into practice of the appropriate management activities,
(Tang & Sivaramakrishnan, 2005) structures, and procedures which facilitate and stimulate
the learning. (Real et al., 2006)
Organizational Issue
One of the set of issues that need to be treated during the Organizational Memory (OM)
systems development process to ensure that the individual 1: The processes of storing and retrieving knowledge
human, wider social, and economic impacts of the resultant of the past for present and future use. OM draws from a
computer-based information system are likely to be wide variety of disciplines including organization theory
desirable. (Doherty & King, 2005) and information systems. A better understanding of
OM can assist managers in solving problems regarding
Organizational Learning the retention of knowledge within their organizations.
1: The consistent and constant acquisition and transfer of (Jasimuddin et al., 2006) 2: A learning history that tells
organizational knowledge assets for increased competitive an organization its own story, which should help generate
advantage. (Huq et al., 2006) 2: An organizational process relective conversations among organizational members.
in which the intentional and unintentional processing of Operationally, an organizational memory has come to
knowledge within a variety of structural arrangements be a close partner of knowledge management, denoting
is used to create an enriched knowledge and orientation the actual content that a knowledge management system
base, and a better organizational capacity for the purpose purports to manage. (Vat, 2006) 3: A general term for
of improving organizational action. (Anttiroiko, 2005b) the collection of information and knowledge known to
3: A process of leveraging the collective individual the organization, as well as the knowledge management
learning of an organization to produce a higher-level necessary to acquire, store, and utilize this knowledge.
organization-wide intellectual asset. It is a continuous (Teeni, 2006) 4: Understanding shared by members
process of creating, acquiring, and transferring knowledge, of an organization about its identity, mental maps, and
accompanied by a modiication of behavior to relect routines for thought and action. (Saunders, 2006) 5:
new knowledge and insight, and produce a higher-level When knowledge from the past is brought to bear on
asset. (Vat, 2005b) 4: Dynamic process that is generated present activities, thus affecting the level of organizational
in the heart of the organization via its individuals and effectiveness. (Qayyum, 2005)
the groups they make up, aimed at the generation and
development of knowledge that allows an organization to Organizational Memory Information System
improve its performance and results. (Real et al., 2006) 5: A coherent integration of dispersed know-how from all
Goes beyond individual learning, because it results in the over the organization. (Qayyum, 2005)
development of a knowledge basis which could translate
into a signiicant change within the organization, and not Organizational Memory System (OMS)
only at the individual level. (Tremblay, 2006a) 6: Describes 1: As with the human brain, OMS acts as a repository
an organizations ability to gain insight and understanding for data and accumulated intellectual knowledge. As the
from experience based on experimentation, observation, smart community grows, so does the communitys memory
analysis, and an existing willingness to examine and learn (intelligence). It is expected that the infrastructure will
from both successes and failures. (Zboralski & Gemnden, support self-education long after the formal education
2006) 7: The process of change in individual and shared process has been completed. (Baskin et al., 2005) 2: The
thought and action, which is affected by and embedded system created to capture, store, search, and retrieve
in the institutions of the organization. Organizational knowledge from a repository. (Jennex, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Orga nizat iona l Policy OSI La ye r 7 503

Organizational Policy Organizational Value Chain


One of the openly stated, oficially sanctioned rules The internal value chain of a company. (Jeffcoate, 2005)
for organizational resource usage and other kinds of
O
organization-related conduct. (Oravec, 2005) Organizing
1: Allocating and arranging human and material
Organizational Politics resources in appropriate combinations to implement plans.
Wide range of descriptions of formal and informal Organizing turns plans into action potential by deining
power relationships in organizations. (Land, Amjad, et tasks, assigning personnel, and supporting them with
al., 2006) resources. (Cragg & Suraweera, 2005) 2: The process of
identifying, specifying, and assigning work; grouping work
Organizational Resource and resources into a structure; and establishing a chain of
Includes inancial, physical, human, and organizational command between individuals and groups. (De, 2006)
assets used to produce goods and services. Also included
are competencies or skills and capabilities, which are the Orientation Session
irms ability to put its resources to use to achieve a desired A irst meeting between instructor and students during
end. (Rowe et al., 2006) which students meet the instructor and become familiar
with the hardware and software that they will need and
Organizational Responsibility the level of computing proiciency required for an online
Refers to obligations to operate regularly according to course. This meeting also provides an excellent opportunity
accepted social norms and standards. Those organizations for students to meet the instructor and each other, ask
that comply with basic standards are able to argue that their questions, and become acquainted with course logistics.
behavior is ethical, and that their operations are normative (Cooper, 2005)
and legitimate. (Wang, Chen, et al., 2006)
Orientation to Learning
Organizational Semantic Web Applying what is being learned to real-life applications.
An organizational memorythat is, an information system (Whitield, 2005)
dedicated to the knowledge management of an organization,
which uses Semantic Web technologies for its deployment. Original Equipment Manufacturer (OEM)
The aim of these technologies is to allow software agents A company that manufactures the main equipment or
to exploit the content of the textual resources published product that is used by the inal consumer. An OEM can
on the Web. (Fortier & Kassel, 2006) be considered as the core or focal organization that bridges
the supply side and the demand side of the full supply
Organizational Strategic Vision chain, linking all the way from the raw materials to the
A vision statement that determines where the organization inal consumer. (Aigbedo, 2005)
will go and how it will get there in general; contrasted to
a mission statement, which is more speciic and shorter ORM: See Object-Role Modeling.
in term. (Brabston, 2005)
OSA: See Online Science Application.
Organizational Strategy
An organizations direction, purpose, strategic leadership, OSI: See Open Source Initiative.
and organizational and competitive performance. (Rowe
et al., 2006) OSI Layer 4
The Transport Layer of a network connection which
Organizational Theory (OT) provides service differentiation and connection
A body of research that focuses on studying how management. From the Open Systems Interconnect model.
organizations create and use information in three strategic (Urbaczewski, 2005)
arenassense making, knowledge making, and decision
making. (Nemati & Barko, 2005) OSI Layer 7
The application layer of a network connection. It describes
how applications work with the network operating system.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
504 OSS Out sourc ing Cycle

From the Open Systems Interconnect model. (Urbaczewski, Outlier


2005) 1: Data item that did not come from the assumed population
O of data. (Kumar, 2005) 2: Observations in a sample, so far
OSS: See Open Source Software. separated in value from the remainder as to suggest that
they are generated by another process or are the result of
OT: See Organizational Theory. an error in measurement. (Klawonn & Rehm, 2005)

OTDOA: See Observed Time Difference of Arrival. Outlink


A link from a site to a different Web site. (Thelwall,
O2PL: See Optimistic Two-Phase Locking. 2006)

Out Degree Outside Review


The number of Web pages that a current Web page points A review performed by state universities or colleges for
out. (Chen, Tsai, et al., 2005) the purpose of validating the design and structure of
courseware so that it will meet industry standards expected
Out-of-School Model in online learning products. (G. Lang, 2005)
A virtual schooling model where students learn online
without attending conventional classes in a building with Outsourcing
a teacher. (Russell, 2006) 1: A production practice in which certain tasks or parts
of an overall operation are performed by workers who
Out-of-the-Box Experience (OoBE) are located in different nations. (St.Amant, 2005b) 2:
User perceptions, relative to prior expectations, of Acquiring services or products from an outside supplier or
their early use experience with a new object, including manufacturer in order to cut costs and/or procure outside
acquisition, setup, initial and subsequent use of the object expertise. (Pang, 2005a) 3: IT resources are managed
in a speciic context. (Gilbert, 2005b) by an external provider who delivers IT services to the
end-user organization. (Feuerlicht & Vorisek, 2006) 4:
Outcome The growing practice in distance education of using
High-quality online programs provide outcomes such external organizations to perform functions necessary
as personal advantages for the learner, while achieving to postsecondary institutions or programs. (Lindsay,
learning objectives. (MacDonald et al., 2005) Williams, et al., 2005) 5: The purchasing or contracting
of tasks, goods, or services to an external source by a
Outcomes-Based Evaluation software irm. (Sowe et al., 2005)
A type of evaluation used to determine the extent to which
the program beneits its clients. (Nelson, 2005) Outsourcing Contract
Describes a long-term mutual obligation between the
Outerjoin service provider(s) and the service recipient. The contract
Extension of the regular join operator. Given two relations value is substantial, meaning over 10 million US$ or Euros.
R and S and a condition C involving attributes of R and S, The average duration of outsourcing contracts is over 36
the outerjoin will generate as its output: (a) all the tuples in months. (Beulen, 2005)
the Cartesian product of R and S that respect condition C
(i.e., a regular join); plus (b) all the tuples in R that do not Outsourcing Cycle
have a match in S fulilling C, padded with null values on The stages of an outsourcing project: identiication of a
the attributes of S; plus (c) all the tuples in S that do not need, deinition of project objectives, choice of vendor,
have a match in R fulilling C, padded with null values negotiation of a Service-Level Agreement, implementation,
on the attributes of R. A left outerjoin will output only performance monitoring, incremental modiication of the
(a) and (b), and a right outerjoin will output only (a) and agreement, and renewal or cancellation of the agreement.
(c). (Badia, 2005a) (Beaumont, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ove r Tuit ion Fe e Ove rriding a nd M ult iple I nhe rit anc e 505

Over Tuition Fee important in developing a clearer view of how, when, and
An assessed fee charged for certain classes in addition to why vicarious learning works. (J.R. Lee, 2005)
the current state fees to cover the special expenses such
O
course or program accrued. (Levy & Ramim, 2005a) Overlap Constraint
Constraint that states that the entity types that compose a
Overitting category can (or cannot) have elements in common. (Mani
1: A frequent phenomenon associated to learning, wherein & Badia, 2005)
models do not generalize suficiently. A model can be
overitted to the training data and perform badly on fresh Overlapping
data. This means that the model has internalized not only A particular interschema property. An overlapping exists
the regularities (patterns), but also the irregularities of between two concepts A and B, if they are neither synonyms
the training data (e.g., noise), which are useless for future nor hyponyms of the other, but share a signiicant set of
data. (Hernandez-Orallo, 2005b) 2: Finding a solution to properties; more formally, there exists an overlapping
a supervised learning problem that performs extremely between A and B, if there exist non-empty sets of properties
well on the training set but poorly on the test set. Such a {pA1, pA2, , pAn} of A and {pB1, pB2, , pBn} of B such that,
solution is typically too specialized to the speciic points for 1 i n, pAi is a synonym of pBi. (De Meo, Terracina,
in the training set, and thus misses general relationships. et al., 2005)
(Musicant, 2005) 3: Term referring to the situation where
the discovered rules it too much to the training set Overlay Function
peculiarities. Overitting usually leads to a reduction of The ability to combine multiple layers of information.
the predictive accuracy rate on the test cases. (Parpinelli (Lipton et al., 2005)
et al., 2005) 4: The effect on data analysis, data mining,
and biological learning of training too closely on limited Overlay Network
available data and building models that do not generalize 1: A software-enabled network that operates at the
well to new unseen data. (Huang, 2005) 5: The phenomenon application layer of the TCP/IP (transmission-control
that a learning algorithm adapts so well to a training set that protocol/Internet protocol). (Hughes & Lang, 2005) 2:
the random disturbances in the training set are included A virtual network formed by applications on hosts in the
in the model as being meaningful. Consequently, as these Internet. The applications have one-to-one (unicast) IP
disturbances do not relect the underlying distribution, the connections between them. (Hossz, 2006)
performance on the test set, with its own but deinitively
other disturbances, will suffer from techniques that tend Overriding and Multiple Inheritance
to it well to the training set. (Klawonn & Rehm, 2005) Two among the main theoretical problems that can affect
the construction of well-formed inheritance hierarchies.
Overitting Rule Overriding (or defeasible inheritance, or inheritance
A rule has high performance (e.g., high classiication with exceptions) consists of the possibility of admitting
accuracy) on observed transaction(s) but performs poorly on exceptions to the strict inheritance interpretation of an
future transaction(s). Hence, such rules should be excluded IsA hierarchy. Under the complete overriding hypothesis,
from the decision-making systems (e.g., recommender). the values associated with the different properties of
In many cases overitting rules are generated due to the the concepts, and the properties themselves, must be
noise in data set. (Zhou & Wang, 2005) interpreted simply as defaults, that is, always possible
to modify. An unlimited possibility of overriding can give
Overhearer rise to problems of logical incoherence; Reiters default
In a theoretical position developed by Herbert Clark, logic has been proposed to provide a formal semantics
following among others Erving Goffman, as well as the for inheritance hierarchies with defaults. In a multiple
direct participants in a dialogue situation there may be inheritance situation, a concept can have multiple parents
various kinds of side participants. Overhearers are and can inherit properties along multiple paths. When
technically side participants whose existence is not known overriding and multiple inheritance combine, we can be
to the direct participants. Vicarious learners are often confronted with very tricky situations like that illustrated
overhearers, though in other cases their involvement may by the well-known Nixon diamond. (Zarri, 2005a)
be known to the participants. Theories such as Clarks are

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
506 Ove r t ra ining OXC

Overtraining
When the MFNN performs signiicantly better on the
O training data than an out-of-sample test data, it is considered
to have memorized the training data, and be overtrained.
This can be avoided by following the guidelines presented
above. (Smith, 2005)

OWA: See Open-World Assumption.

OWL: See Ontology Web Language.

Ownership
1: Ownership of a business by the people who work for
it (e.g., partners of a virtual enterprise). (Wong, 2005) 2:
The association of the rights over intellectual property
either with an institution or an individual so as to enable
exploitation of that IP. (Fleming, 2005b)

Ownership by Contract
Transfer or otherwise licensing all or part of copyright
from the owner to one or more other parties covered by
an explicit contract. (Fleming, 2005b)

OXC: See Optical Cross-Connect.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
P_Avg PACS 507

P
P_Avg: See Average Precision. within member and associate member countries. PITA
comprises members (telecommunication entities),
P-Problem associate members (suppliers of telecommunication
Where all of the input variables are always relevant to equipment and services), and partner agencies (regional
the classiication. Decision tree methods are unsuitable and international organizations with vested interest in
for P-problems. (Wilson et al., 2006a) telecommunications and its development). (Hassall,
2005)
p-RA: See Resource Allocator.
Packet
p-RM: See Resource Manager. 1: A inite stream of bits sent in one block with header and
trailer bits to perform routing and management functions.
P-Split Mechanism (Guster et al., 2005) 2: A group of bits that includes data
The process of dividing every resource of a physical node (payload) plus source, destination address, and other
into p-equivalent slices, grouping one slice from each routing information (in the header). (Statica & Deek,
resource to form a portion of resource and use each portion 2006) 3: A package of data found at the network layer, and
as a virtual node. (Jong & Mahatanankoon, 2006) containing source and destination address information as
well as control information. (Lawson-Body et al., 2005)
P-Split Virtual Server
One of a group of smaller virtual servers that can be Packet Switching
generated from a physical server through the p-split 1: The type of network in which relatively small units of
mechanism. (Jong & Mahatanankoon, 2006) data called packets are routed through a network based
on the destination address contained within each packet.
P-Tree: See Predicate Tree. Breaking communication down into packets allows the
same data path to be shared among many users in the
P-Tree Algebra network. (Olla, 2005a) 2: A type of communication in
The set of logical operations, functions, and properties of which packets are individually routed between nodes,
P-trees. Basic logical operations include AND, OR, and without a previously established communication path. (Lee
complement. (Perrizo, Ding, Serazi, et al., 2005) & Warkentin, 2006) 3: Packet-switched networks divide
transmissions into packets before they are sent. Each packet
P-Value can be transmitted individually and is sent by network
The P-value for an object is the probability of obtaining routers following different routes to its destination. Once
a false positive if the threshold is set just high enough to all the packets forming the initial message arrive at the
include the object among the set selected as relevant. More destination, they are recompiled. (Kaspar & Hagenhoff,
generally, it is the false positive rate corresponding to an 2005)
observed test statistic. (Mukherjee, 2005)
PACS: See Picture Archiving and Communication
Paciic Islands Telecommunications Association System.
(PITA)
A non-proit organization formed to improve, promote,
enhance, facilitate, and provide telecommunications services

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
508 Pa ge Sc ore Pa ra digm

Page Score Palmtop


The numeric value that measures how well a single page A portable personal computer that can be operated
P matches a given query. A higher score would imply a comfortably while held in one hand. These devices
better matching. (Caramia & Felici, 2005) usually support a QWERTY keyboard for data input with
a small display screen in an A5-sized footprint. (Garrett,
Page View 2006b)
1: The visual rendering of a Web page in a speciic
environment at a speciic point of time. (Lee-Post & Jin, Pan
2005b) 2: An aggregate representation of a collection of Move an image window with respect to the portion of the
Web objects contributing to the display on a users browser larger image from which it is taken. (N.C. Rowe, 2005a)
resulting from a single user action (such as a clickthrough).
(Mobasher, 2005b) PAN: See Personal Area Network.

PageRank Panopticon
1: A Web graph mining algorithm that uses the probability Jeremy Benthams late 18th-century description of an
that a page is visited by a random surfer on the Web as a architectural structure that depicted a circular-type prison
key factor for ranking search results. (Wen, 2005b) 2: An of individual cells arranged around the perimeter. A
algorithm that Google uses to rank Web pages that match a tower rises in the center of the prison allowing one single
given search string. (Kasi & Jain, 2006) 3: The PageRank warden to see any cell at any time. Foucault popularized
algorithm assigns a quality value to each known Web page the use of Panopticon and panoptic constructs as ways
that is integrated into the ranking of search engine results. of characterizing dataveilled social spaces. (Dholakia,
This quality value is based on the number of links that Zwick, et al., 2005)
point to a page. In an iterative algorithm, the links from
high-quality pages are weighted higher than links from Paper Prototyping
other pages. PageRank was originally developed for the The diagram expressing the user environment design is
Google search engine. (Mandl, 2006) used to create paper prototypes, which are then put before
users during paper prototype interviews to validate the
PageRank Algorithm design of the new system. The sixth step in contextual
A Web search technique for ranking Web pages according design. (Notess, 2005)
to relevance to a particular search term or search phrase.
Based on the random surfer model and Web graph, the Paperless Classroom
index, PageRank, is proposed to rate the importance of A classroom where paper documents (textbooks, homework
each Web page to users. (Li, 2005) submissions, grade reports) are replaced by electronic
documents. (Roldan, 2005)
Paging
A technique to locate mobile users in wireless systems. Paraconsistent Logic
(W. Wang, 2006) A logic system that limits, for example, the power
of classical inference relations to retrieve non-trivial
Palm OS 3.5 information of inconsistent sets of formulas. (Alonso-
An operating system developed to operate on handheld Jimnez et al., 2005)
computers. The 3.5 refers to the version number of the
system used in the reported case study. (Woodruff & Paradigm
Nirula, 2005) A set of practices that deine a particular discipline. The
now-standard usage for this term traces back to Thomas
Palm Pilot Kuhn, who used it to refer to the set of assumptions,
Trademark name for a type of handheld computer. methods, and principles that characterized a particular
(Woodruff & Nirula, 2005) scientiic worldview. The term has now crossed over
into much broader usage, and can refer to many different

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pa ra digm Shift Pa r t ia l REALLOCAT E 509

things: a framework, a mindset, a perspective, a way of Parasite


being. Interestingly, Kuhn himself became frustrated Software that operates in the background and sends details
with the philosophical dificulties that surrounded this of ones computer activity to an interested party. Such
P
term, later adopting the concept of a disciplinary matrix. programs are often installed with demos and freeware
(Aarons, 2006) obtained from the Web. (Friedman, 2005)

Paradigm Shift Paretto Eficient Agreement


1: A basic change in the way we conceptualize some thing, State of things in which no player (in game theory) is worse
process, or way of doing something. (Strauss, 2005) 2: A off than the others. It typically refers to the distribution
widely known model in philosophy of science proposed of resources. The agreement could lead to cooperation of
by Thomas Kuhn. Paradigm shift is regarded as the key players. (Polgar, 2005a)
mechanism that drives science. The core of science is the
domination of a paradigm. Paradigm shift is necessary Parsimony
for a scientiic revolution, which is how science advances. An approach in genetic and evolutionary computation
(Chen, Toprani, et al., 2006) 3: The mechanism of scientiic related to minimum description length, which rewards
revolutions proposed by Kuhn. The cause of a scientiic compact representations by imposing a penalty for
revolution is rooted to the change of a paradigm, or a view individuals in direct proportion to their size (e.g., number
of the world. (Chen & Lobo, 2006) of nodes in a GP tree). The rationale for parsimony is that
it promotes generalization in supervised inductive learning
Paradoxes of Democracy and produces solutions with less code, which can be more
Every conception of democracy is differently weighted in eficient to apply. (Hsu, 2005b)
relation continuums: freedom-equality; majority-minority;
participation-representation (individual-collective Part Query
interests) (Kozeluh, 2005) Query to retrieve the information of part classes with
selection predicates originated at the whole class. (Taniar
Parallel Database System et al., 2005)
Database system supporting the parallel execution of the
individual basic database operations, such as relational Partial Cube
algebra operations and aggregate operations. (Chung & The subset of the cuboids selected for materialization.
Mangamuri, 2005) (Abdulghani, 2005a)

Parallel Trade Partial Order


Occurs when a product is purchased by an intermediary in A partial order on a set is a binary relation that is relexive,
one country (at a low price) and then exported to another anti-symmetric, and transitive. (Pourabbas, 2005b)
(high price) country. (Rosson, 2006)
Partial PI Model
Parameterization A Programmed Instruction (PI) model where some proper
The assignment of parameters to represent processes subsets of variables are not marginally independent. A
that usually are not easily described by equations. partial PI model is also a full PI model, but the converse
(Wieczorkowska, 2005) is not true. Hence, partial PI models are more general than
full PI models. (Xiang, 2005)
Parametric Function
When used in 3D shape modeling, three independent Partial REALLOCATE
explicit functions of parameters u, v, and w x= f1(u,v,w); A heuristic algorithm for computing a new data
y= f2(u,v,w); z= f3(u,v,w) deine either a surface (with allocation, given some number of server and a system
any two parameters used) or a solid object when all three optimization parameter. This heuristic evaluates the
parameters are used. (Sourin, 2006) effect of independently moving each database relation to
the new server joining the distributed database system.
(Chin, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
510 Pa r t ic ipa nt Equa lit y Pa r t ic ipat or y Le a r ning Approa ch

Participant Equality the rationality and justice of their own social practices.
Each individual facet of a virtual organization is expected Conducting participative action research is to cyclically
P to contribute an equal amount of work toward a given goal, plan, act, observe, and relect more carefully, more
if appropriate. While the equality may not be measured best systematically, and more rigorously than is usually the
in quantity, it can be restated as effort and the successful case in day-to-day living. (Rhodes, 2005) 2: A form of
completion of all tasks assigned to it, be they large or action research where the role of researcher and researched
small. Since every task is considered to be essential as a overlaps. This may mean that the researcher takes on
part of the project, the equality comes in the addition of a participatory role within the group, community, or
that piece to a larger puzzle. (J. Lee, 2005) organization being researched, or that the researched
take a role in the design, conduct, and analysis of the
Participant Observation research. Often participatory action research does both.
This qualitative research method, long a cornerstone of (David, 2005)
ethnography in the tradition of Bronislaw Malinowski,
involves learning another culture by immersing oneself in Participatory Democracy
the daily routines of ones host community. Observation is A broadly inclusive term for many kinds of consultative
not conducted from afar, but from within, by taking part decision making in a democracy, as direct or deliberative
(to the extent allowed) in everyday activities, ceremonies, democracy. (Kozeluh, 2005)
rituals, work tasks, and so forth. Actual forms of participant
observation can vary widely and in accordance with the Participatory Design (PD)
speciic interests adhering to a particular research project. 1: A design approach that focuses on the intended user of a
(Forte, 2005) service or product, and advocates the active involvement of
users throughout the design process. (Zaphiris et al., 2005)
Participation 2: Design method in which users (and other stakeholders)
1: Process in which inluence is exercised and shared provide special expertise and play active and autonomous
among stakeholders, regardless of their formal position roles in design work. (Carroll, 2005)
or hierarchical level in the organization. (Peterson, 2005)
2: The act of taking part in or sharing the development Participatory Development
of something. Participation also implies critical thinking A development approach in which members of the
about that which is being shared or developed. (Crdoba, community are actively involved in the planning,
2006b) 3: The most basic requirement of collaboration; implementation, and evaluation of community development
it may be measured by the number of postings made and programs. (Songan et al., 2005)
read, or by the number of statements contributed to a
discussion. (Ingram, 2005) 4: The surface analysis of group Participatory Evaluation
involvement. It is the easiest to measure by time spent on Evaluation methods in which the subjects of the evaluation
the discussion or amount written, but is uninformative actively participate in planning and carrying out
unless the quality of participation is measured. (Ingram observations. (Carroll et al., 2005)
& Hathorn, 2005a)
Participatory Learning and Action (PLA)
Participation in Communities of Practice Umbrella term for a wide range of similar approaches
The key to understanding these organizations, as it is and methodologies to involve communities in self-help
the most important factor if they are to be managed and development projects. The common theme to all of
satisfactorily. With the active participation of all members, these approaches is the full participation of people in the
the working language can be uniied, the goals pursued processes of learning about their needs and opportunities,
clariied, and the achievement of those goals brought and the action required to address them. (Rambaldi,
closer. (Ranguelov & Rodrguez, 2006) 2005)

Participative/Participatory Action Research Participatory Learning Approach


1: A collective, self-relective enquiry undertaken by A pedagogical approach involving students in the entire
participants acting as equals (and not researcher and learning process involving a problem, including authoring,
subject) together in social situations in order to improve

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pa r t ic ipat or y M a na ge m e nt Pa ssba nd 511

solving, and evaluating a problem and its solution. (Bieber Partitioning Clustering
et al., 2005) A clustering method characterized by the division of the
initial dataset in order to ind clusters that maximize the
P
Participatory Management similarity between the objects inside the clusters. (Santos
Management in which the input of employees as well as et al., 2005)
managers is thoughtfully taken into account in setting
organizational policies and developing organizational Partitioning Tree Algorithm
structures. (Oravec, 2005) A recursive algorithm to form disjoint and exhaustive
subgroups of objects from a given group in order to build
Participatory 3D Modeling (P3DM) up a tree structure. (Siciliano & Conversano, 2005)
A participatory mapping method based on the merger of
traditional spatial information (elevation contours) and Partnering Intelligence
peoples spatial knowledge (cognitive maps), the output A measurement of how well we build relationships and
of which are solid terrain models and derived maps. The cultivate trust while accomplishing predetermined tasks
models are used in development and natural resource in an alliance with someone else. A measure of the ability
management contexts, and have proved to be user friendly to succeed in partnership situations. It is measured by how
and relatively accurate data storage and analysis devices well we are able to create and sustain healthy and mutually
and at the same time excellent communication media. beneicial partnerships. (Baer & Duin, 2005)
(Rambaldi, 2005)
Partnership
Partition 1: A relationship between two or more entities involving
1: An image that is divided into blocks for processing. close cooperation where each entity has specific
(Chen, Chen, & Cheng, 2005) 2: Non-empty set of mutually responsibilities. (Baer & Duin, 2005) 2: A group of
exclusive and exhaustive subsets of some other set. The stakeholders that have initiated and contribute to the
number of subsets is not necessarily inite. (Gillman, effective ongoing operations of a smart community,
2006) 3: The Partition of the Indian subcontinent in 1947 including community groups, business, government,
at the end of British rule that resulted in the formation educators, researchers, and students. Shared learning
of India and Pakistan, and displaced six million people. is a fundamental commitment of the total community.
(A.G. Roy, 2005) (Baskin et al., 2005)

Partition-Based Clustering Partnership Portfolio


The data set is partitioned into k clusters, and cluster The development of strategic sets of partnerships which
centers are deined based on the elements of each cluster. results in intentional sets of partners to leverage and
An objective function is deined that measures the quality maximize goal accomplishment. (Baer & Duin, 2005)
of clustering based on the distance of all data points to the
center of the cluster to which they belong. The objective Partnership Working
function is minimized. (Denton, 2005) A network of organizations working together to provide a
total service offering to a targeted group of users. (Wright
Partitional Clustering & Taylor, 2005)
A single partition of the data is iteratively obtained so
that some criterion function is optimized. (Murthy & Partonomy (Part-Of)
Diday, 2005) A realization of mereology that speciies in a subsumption
hierarchy the relationship of parts to the whole. Example:
Partitioning A whole wooden pencil consists of these parts: wooden
The technique of dividing a set of data into fragments shaft, paint, embossed logo, graphite core, eraser, and the
for physical storage purposes. It is intended to improve like. (Buchholz, 2006)
manageability and accessibility of a large amount of data.
(Lu, 2005) Passband
The frequency range allowed to pass through the ilter.
(Jovanovic-Dolecek & Daz-Carmona, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
512 Pa ssba nd Ripple Pat ric ia Trie

Passband Ripple Password Best Practice


The permitted deviation in the Passband. (Jovanovic- One of the set of guidelines to create a safe password that
P Dolecek & Daz-Carmona, 2005) is hard for someone else to guess. (Medlin et al., 2006)

Passive Modality Password Cracking Software


Information that is captured automatically by the A purpose of password cracking software might be to
multimodal interface; for example, to track a users gain unauthorized access to a system, or as a preventive
location via a microphone, a camera, or data sensors. measure by the system administrator to check for easily
(Bourguet, 2006) crackable passwords. (Medlin et al., 2006)

Passive Optical Network (PON) Password Security


A network based on optical iber in which all active Methods or ways to protect a persons password. (Medlin
components and devices between the central ofice and the et al., 2006)
customer premises are eliminated. (Freire et al., 2005)
Patch
Passive Replica A piece of software code intended to correct a malfunction
A replica that does not directly process the transaction. in an established application. (Buche & Vician, 2005)
Instead, it only applies updates received from active
replicas. (Muoz-Esco et al. , 2005) Patent
A limited-term monopoly granted to the inventor of a
Passive RFID Tag new invention that protects the ideas behind the invention
One of the passive or semi-passive tags that identify absolutely. Patents, unlike copyright, are not limited to
themselves when they detect a signal from a compatible particular expressions of ideas or forms of an invention, but
RFID reader. When passing through a radio-frequency ield protect the invention in any form or guise. Patent protection
generated by such a reader, they transmit the data on their requires speciic actions on the part of the inventor to
chips to the reader, thereby giving details on the objects obtain the protection, and in many countries there are
to which they are attached. (Loebbecke, 2006) additional requirements such as non-disclosure prior to
iling for a patent. In the United States a requirement is
Passive Social Resistance that iling occur within one year of disclosure. The absolute
Ambivalence to an introduced technology due to poor monopoly granted by the modern patent is balanced by
technology-life fit, or ontologically unrecognizable the requirement that the invention be fully documented,
technology, evident in the unchanged continuance of so that others can build on it after the monopoly term
everyday actions by intended users. (Gibbs et al., 2005) expires. (Marshall, 2005)

Passive Tag Path-Oriented Query


Receive energy from the RFID reader and then transmit A query based on path expressions including element tags,
its ID to the reader. (Owens et al., 2005) attributes, and keywords. (Chen, 2005b)

Passivity Pathological Internet Use (PIU)


A manifestation of helplessness in which learners do Excessive Internet usage from people who use the Internet
nothing because they have no control over a situation as a means of coping with their personal problems or current
that is not meeting their learning needs. (Pelton & Pelton, personal dificulties. (Mahatanankoon, 2005)
2005)
Patricia Trie
Password A compressed binary trie. The Patricia (Practical Algorithm
A word or string of characters which serves as authentication to Retrieve Information Coded in Alphanumeric) trie is
of a persons identity (personal password), or which may compressed by avoiding one-way branches. This is
be used to grant or deny access to private or shared data accomplished by including in each node the number of bits
(access password). (Medlin et al., 2006) to skip over before making the next branching decision.
(Woon et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pat t e r n Pat t e r n Re pre se nt at ion 513

Pattern classiication error (i.e., supervised pattern detection), or


1: A conjunction of literals that is true for some data with not only locating occurrences of the patterns in the
vectors in T but is false for all data vectors in F, where (T, database, but also deciding whether such an occurrence
P
F) is a given pdBf. A co-pattern is similarly deined by is a pattern (i.e., unsupervised pattern detection). (Y.-J.
exchanging the roles of T and F. (Boros et al., 2005) 2: A Zhang, 2005b)
generic solution to a recurring general problem. (Berztiss,
2006b) 3: A proven solution to a recurring problem in a Pattern Discovery
given context. (Kamthan & Pai, 2006) 4: A structure that The data-mining phase that draws upon methods and
exhibits some form of regularity, able to serve as a model algorithms, such as statistics and association rules, to
representing a concept of what was observed. (Domeniconi characterize usage patterns in wanted forms. (Lee-Post
& Gunopulos, 2005) 5: Describes a recurring problem & Jin, 2005b)
and suggests a general solution to that problem. (Solberg
et al., 2005) 6: Enforces a problem-solving discipline for Pattern Domain
design architecture. It consists of three parts: a context, a The deinition of a language of patterns, a collection of
problem, and a solution. The terms context, problem, and evaluation functions that provide properties of patterns in
solution are deined: Context describes the environment database instances, and the kinds of constraints that can
before the pattern is applied. It outlines the preconditions be used to specify pattern interestingness. (Boulicaut,
under which the problem and its solution appear. Thus the 2005)
context shows where and when the pattern will work. It is
usually introduced with the help of a scenario. Problem Pattern Interestingness
describes the goals and objectives of a situation. Solution A pattern is interesting not only to the degree to which
describes the means to achieve the goals and objectives. it is accurate, but to the degree which it is also useful
(Murthy & Krishnamurthy, 2005b) 7: A software library with respect to the end users knowledge and objectives.
for a common business scenario. A framework may be (Owrang O., 2006)
a design framework (possibly expressed in UML) or an
implementation framework (possibly in C++, Java, or PHP). Pattern Language
(D. Brandon, Jr., 2005a) 8: Software patterns represent A set of interrelated patterns expressed in some notation
proven solutions to recurrent design problems. A pattern that, as a whole, provides a vocabulary for solving problems
names and describes a problem that occurs once and again, arising in some domain. (Kamthan & Pai, 2006)
and presents a good solution (a solution used by many
expert designers) in an abstract way so it can be used in Pattern Processing and Transformation Tool
different occurrences of the same problem. The core of One of the software tools that can access patterns written
the solution is usually expressed using UML diagrams, in XML format and apply arbitrary transformation logic
showing class and object relationships that serve to solve on them to produce desired results. (Gaffar & Seffah,
the recurrent problem. The same concept applies to the 2005)
hypermedia and Web domain when designers recognize
that they constantly face similar problems. Web navigation Pattern Recognition
and interface patterns record and convey problems related 1: Concerned with the classification of individual
to Web applications navigational and interface structures. patterns into pre-speciied classes (i.e., supervised pattern
(Rossi & Schwabe, 2005) recognition), or with the identiication and characterization
of pattern classes (i.e., unsupervised pattern recognition).
Pattern Decomposition (Zhang, 2005b) 2: The ability to take in raw data, such as
A technique that uses known frequent or infrequent images, and take action based on the category of the data.
patterns to reduce the search space of a dataset. (Zou & (Lovell & Chen, 2005)
Chu, 2005)
Pattern Representation
Pattern Detection An expression in some natural or formal language to make
Concerned with locating patterns in the database to the knowledge inherent in a pattern processable for human
maximize/minimize a response variable or minimize some and machine interpretation. (Kamthan & Pai, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
514 Pat t e r n Re c ognit ion Proble m Pe e r

Pattern Recognition Problem Pearsonian Correlation Coeficient


A decision problem where the state of a system (described by Deines how much of the variation in the criterion variable(s)
P a vector of inputs) has to be assigned to one of two possible is caused by the model. Range: 0 to 1. (Morantz, 2005)
output classes, generalizing the information contained in
a set of examples. The same term is also used to denote Pedagogic Function of a Telecenter
classiication problems, where the number of output classes Set of processes that a telecenter as an open social system
is greater than two. (Muselli, 2005) carries out to foster social construction of knowledge, and
the development of cognitive and collaborative skills in ICT
Pattern with Negation users; using ICT as a cognitive partner to empower people
Pattern containing at least one negated item. (Kryszkiewicz, instead of as a vehicle of information. (Santos, 2005)
2005)
Pedagogic Usability of an Online Learning
Pay-Per-Click System
A search engine advertising strategy that allows for Related to how easy and effective it is for a student to learn
companies to bid for a Web site ranking based on the price something using the system. (Furtado, 2005)
they are willing to pay per click-through (when a visitor
clicks on a Web ad as a result of keywords used when Pedagogical Model
performing the search, e.g., on Google.com). The client A model that contains information about the pedagogical
chooses the keywords to appear on his Web site when a strategies which will be followed when making
search is performed. (OBuyonge & Chen, 2006) recommendations. (Gaudioso & Montero, 2006)

Pay-Per-Click (PPC) Advertising Pedagogical Practice


A pricing model in which the advertiser pays for each One of the learning activities that support the unit of
click-through made on an advertising link. Also known content; the instructional approach such as active learning,
as cost-per-click (CPC). (Owen, 2006a) constructivist model, student-to-student engagement;
and teaching to multiple learning styles and a variety of
Payment System assessments. (Blicker, 2005)
A mechanism for enabling payment for Internet
transactions. (Quah et al., 2006a) Pedagogical Reengineering
Teachers relecting on the ways they currently teach and
PBL: See Problem-Based Learning. perhaps adopting improved techniques. Online teaching
is often an impetus for pedagogical reengineering. (Salter,
PBX: See Private Branch Exchange. 2005a)

PC++ Pedagogy
Persistent C++ extends C++ language by providing 1: Refers to how teachers perceive the nature of learning
persistence facilities. (Polese et al., 2005) and what they do to create conditions that motivate students
to learn and become critical thinkers. (G. Lang, 2005) 2:
PCA: See Principal Component Analysis. The activities and theory of education, instructing, or
teaching. (Laghos & Zaphiris, 2005a) 3: The art and science
PD: See Participatory Design; Professional Distance. of helping children learn. (Whitield, 2005) 4: The art
and science of teaching, involving an underlying learning
PDA: See Personal Digital Assistant. philosophy and strategies for carrying out the philosophy
in a given learning setting. (Collis & Moonen, 2005b)
PDDP: See Principal Direction Divisive Partitioning.
Peer
PDF: See Portable Document Format. 1: Another node in a network that is like every other node in
the network. (Yee & Korba, 2006) 2: Persons who are equal
PDU: See Professional Development Unit. in social or occupational standing. (Murphy, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe e r Coa ching Pe e r-t o-Pe e r (P2 P) Te chnology 515

Peer Coaching responsibility for initiating, maintaining, and terminating


Students are paired with a classmate or join a small group, a session. (Dara-Abrams, 2006)
with the aim of getting advice and support, and perhaps
P
some instruction, from these fellow learners. (Kukulska- Peer-to-Peer (P2P) Architecture
Hulme, 2005) An approach to building distributed systems characterized
by an increasing decentralization and autonomy of
Peer Evaluation components. (Chan & Kellen, 2006)
Where peers (such as students) evaluate each others
solutions to problems or other assignments. (Bieber et Peer-to-Peer (P2P) Network
al., 2005) 1: A communication way where each node has the same
authority and communication capability. It creates a virtual
Peer Interactivity network, overlaid on the Internet. Its members organize
For the majority of online courses, the task is to encourage themselves into a topology for data transmission. (Hossz,
a lot of discussion and feedback. This is not a stand-alone 2005b) 2: A distributed, self-organized federation of peer
correspondence course! Learners (usually) need to share entities, where the system entities collaborate by sharing
ideas and work in small teams to solve complex problems resources and performing cooperative tasks for mutual
with others in the online learning environment. (Rogers, beneit. It is often assumed that such a federation lives,
2005b) changes, and expands independent of any distinct service
facility with global authority. (Shahabi & Banaei-Kashani,
Peer Learning 2005) 3: Any network that does not have ixed clients and
1: A learning style that supports the concept of peers servers, but a number of peer nodes that function as both
learning from each other. (Zaphiris & Kurniawan, 2005) clients and servers to the other nodes on the network.
2: The use of other students experiences and knowledge This model of network arrangement is contrasted with the
as a primary resource in learning. (Lam et al., 2006) client-server model. Any node is able to initiate or complete
any supported transaction. Peer nodes may differ in local
Peer Review Method coniguration, processing speed, network bandwidth, and
Peer review is a process used for checking the work storage quantity. (Dhar, 2005)
performed by ones equals (peers) to ensure it meets
speciic criteria. The peer review method uses peer review Peer-to-Peer (P2P) System
to evaluate assignments from student groups. (Moreira & 1: Communities of agents cooperating for mutual beneit
da Silva, 2005) without centralized control. File-sharing communities are
P2P systems, and so is P2PWNC. (Efstathiou & Polyzos,
Peer Review on Project Progress 2006) 2: Distributed system in which each node can be both
A structured walkthrough is a widely used technique to client and server with respect to service and data provision.
provide a test of a proposed system design, and is often (Marchetti et al., 2005) 3: The distributed system in which
implemented as a peer feedback and review process. all nodes are considered to be equal in their capacity for
(Peterson & Kim, 2005) sharing resources (e.g., processing cycles) and information
(e.g., music iles) with each other. In other words, a peer
Peer-to-Peer (P2P) offers client-side functions while performing server-side
1: Denotes the idea of a network of equals (peers) that provide roles. (Kwok et al., 2006)
resources such as CPU time, storage area, bandwidth, or
information to each other so that collaborative processes are Peer-to-Peer (P2P) Technology
enabled avoiding a central coordinating instance. (Maier Often referred to simply as peer-to-peer or abbreviated
& Hdrich, 2006) 2: A communications model in which P2P, a type of network in which each workstation has
each party has the same capabilities and either party can equivalent capabilities and responsibilities. (Parikh &
initiate a communication session. (Yow & Mittal, 2006) Parolia, 2005)
3: A network topology in which devices communicate
directly with each other rather than through a server,
as in a client/server architecture. Each system shares

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
516 Pe e r-t o-Pe e r Wire le ss N e t w ork Confe de rat ion (P2 PWN C) Pe rc e ive d Risk

Peer-to-Peer Wireless Network Confederation Perceived Attribute


(P2PWNC) One of the characteristics of innovation as perceived by
P A fully self-organized infrastructure for low-cost Wi- individuals (relative advantage, compatibility, complexity,
Fi roaming, built using basic P2P principles such as triability, observability). (Askar & Kocak-Usluel, 2005)
reciprocity. (Efstathiou & Polyzos, 2006)
Perceived Beneit
Pen Computing The extent of management recognition of the relative
A computer that uses an electronic pen (or stylus) rather advantage that innovation can provide to firms.
than a keyboard for data input. Pen-based computers often (Lertwongsatien & Wongpinunwatana, 2005)
support handwriting or voice recognition so that users can
write on the screen or vocalize commands/dictate instead Perceived Customer Value
of typing with a keyboard. Many pen computers are A consumers perception of the beneits gained in exchange
handheld devices. Also known as pen-based computing. for the costs incurred to attain his/her goals at a particular
(Garrett, 2006b) point in time. (Yeo & Chiam, 2006)

Pen Name Signature Perceived Ease of Use


One of the names participants choose for online The degree to which a person believes that using a particular
participation which may or may not allow other participants system would be free of effort. (Liu & Tucker, 2005)
to identify them. (Turoff et al., 2005b)
Perceived Information Need
Pentium 386, 486 The type and amount of information perceived to be needed
Series of microprocessors produced by Intel; denotes by members of the community, such as information about
speed of the central processing unit (CPU). (D. Stern, information technology/computers, job opportunities,
2005) government policies, sports, agricultural practices,
medical and health matters, family matters, entertainment,
People-Process-System Fit lifestyles, business matters, religious matters, and
A degree of consistency among learner groups, business educational matters. (Gnaniah, Songan, et al., 2005)
processes, and e-learning systems that: (1) relects the
target constituency requirements, organizational context, Perceived Organizational Support
and stated educational or training goals; (2) applies A construct or measure of the degree to which individuals
the principles and approaches of constructivism, user- perceive that their organization has a strong commitment
centeredness, participatory design, quality management, to them, in which case they are likely to have a strong
and organizational development to instructional design of commitment to it. (King, 2006a)
courseware; and (3) translates into expected performance
levels. (Rentroia-Bonito & Jorge, 2005) Perceived Quality of Service (PQoS)
The perceived quality level that a user experiences from
PeopleAggregator(.com) a multimedia service. (Koumaras et al., 2005)
Open source, online social networking application. (Mew,
2006) Perceived Relevance
Workers who are to use the system perceive the system
Per-Hop Behavior (PHB) as adding value to the work results and being integrated
1: Describes, within the DiffServ framework, how trafic in running work. (Ericsson & Avdic, 2005)
belonging to a particular behavior aggregate should be
treated in each network node. (DaSilva, 2005) 2: Externally Perceived Risk
observable forwarding behavior applied to a behavior The uncertainty that consumers face when they cannot
aggregate at a node. (Gutirrez & Ting, 2005) foresee the consequences of their purchase decisions.
(Scarpi & DallOlmo-Riley, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe rc e ive d U se fulne ss (PU ) Pe rfor m a nc e Suppor t 517

Perceived Usefulness (PU) Percolation Theory


The degree to which a person believes that a particular Assume a grid of nodes where each node is occupied
information system would enhance his or her job with probability p and empty with probability (1-p).
P
performance by reducing the time to accomplish a task or Percolation theory is a quantitative (statistical-theoretical)
providing timely information. (Liu & Tucker, 2005) and conceptual model for understanding and analyzing the
statistical properties (e.g., size, diameter, shape, etc.) of
Percept the clusters of occupied nodes as the value of p changes.
A mental artifact (in the form of a network of connected Many concepts associated with complex systems such
neurons) that allows some mental representation of a as clustering, fractals, diffusion, and particularly phase
directly, or indirectly, experienced thing. Also, it is transitions are modeled as the percolation problem. The
the self mental model of an organism generated by signiicance of the percolation model is that many different
remembrances of experiential perceptions made by the problems can be mapped to the percolation problem; for
organism previously. (Atkinson & Burstein 2006) example, forest-ire spread, oil ield density estimation,
diffusion in disordered media, and so forth. (Shahabi &
Perception Banaei-Kashani, 2005)
1: Contingent upon prior expectations, perceptions have
been used by some as a reality check of expectations, where Performance
an assessment of quality is derived by the disconirmation The quality, with respect to both errors and time, of work.
of the two. Moreover, they have also been proposed as a (Diaper, 2006)
measure of adequacy (perceptions)/importance. (Wilkin,
2005) 2: In human-computer interaction terms, how we Performance Assessment
perceive a product/system to have responded and reacted The measurement of an activity, process, or product to
when we have used it. Ideally, there should be a good match see if it meets an established objective or benchmark.
between expectations and perceptions. (Noyes, 2006) 3: (Hanson et al., 2005)
Students perceptions relate to how they perceive a speciic
environment (c.q., KABISA); they are the results of an Performance Level
interaction between students instructional conceptions The description of the levels of quality attainment within
and a speciic learning environment. (Clarebout et al., each criterion that are incrementally identiied as low,
2005b) good, better, and best. (B.L. MacGregor, 2005)

Perceptual Illusion Performance Measurement


Misperception of the human visual system so that what A management practice that involves specifying and
we apprehend by sensation does not correspond with the managing a set of metrics addressing business performance,
way things really are. (Noyes, 2006) usually in the form of a scorecard. A good performance
measurement system is targeted to implement a coherent
Perceptual Measure set of strategies. (Saha, 2005)
An instrument used to investigate identiied relationships
in learning environments. (Clayton, 2006b) Performance Metric
1: A key measurement of system attributes that is used
Perceptual Organization to determine the success of the process. (Pang, 2005a)
A process to group sensory primitives arising from a 2: Simple or composite metric aimed at expressing the
common underlying cause. Perceptual organization can performance of a system. (Darmont, 2005)
also be deined as the ability to impose structural regularity
on sensory data. (Y.-J. Zhang, 2005c) Performance Support
Conditions and factors that enable excellent performance,
Perceptual User Interface (PUI) including clear expectations for success, feedback,
An invisible graphical user interface that engages appropriate rewards, self-concept, capacity to perform
perceptual starting points. (Mohamed & Ottmann, work, and skills and knowledge appropriate to task
2006) requirements. (Schaffer et al., 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
518 Pe rfor m a nc e Suppor t Tool (PST ) Pe riphe ra lit y

Performance Support Tool (PST) Peripheral Computing


Software that helps students in performing a task or in The interface attempts to provide attentionally peripheral
P self-evaluating. (Cirrincione, 2005) awareness of people and events. Ambient channels provide
a steady low of auditory cues (i.e., a sound like rain) or
Performance Task gradually changing lighting conditions. (Oulasvirta &
University course-speciic project that demonstrates Salovaara, 2006)
learning of course content. (Shaw & Slick, 2005)
Peripheral Cue Complexity
Performance-Based Assessment A term describing the degree to which a multimedia
Assessment (1) that requires a learner to integrate message contains production elements (visual and/or
knowledge, and demonstrate understanding and/or skills auditory effects), which are not directly related to the central
through self-created products or action; and (2) in which the meaning of the message. Peripheral cue complexity is
learner is clearly informed at the onset of the expectations envisioned as a continuum anchored by low peripheral cue
for process and product quality (in the format of a task complexity at one end and high peripheral cue complexity
description and scoring rubric). (Wieseman, 2005a) at the other. (Duthler, 2005)

Performance-Based Evaluation Peripheral Device


Measure of a students performance after receiving One of the gardware devices, separate from the computers
treatment. (Witta, 2005) central processing unit (CPU), which add communication
or other capabilities to the computer. (Becker, 2006)
Performance-Based Instruction
Learning activities centered more on the acquisition of Peripheral in CoPs
skills than on the acquisition of knowledge. (Petska & Does not deine a physical measurement of remoteness
Berge, 2005) from a hypothetical center, since the concepts remaining
on the periphery and full integration indicate irst
Performance-Based Model and foremost degrees of commitment to the community.
Student model that proiles the learners according to their (Ranguelov & Rodrguez, 2006)
performance. (Lin & Kinshuk, 2005)
Peripheral Region
Performance-Based Work Sample Geographical area characterized by a particular territorial
A portfolio that uses a states teacher education standards morphology that causes the isolation from bordering zones
as referents for the creators selection and use of artifacts. inhabited by a linguistic and cultural identity minority.
(Wieseman, 2005a) Areas cut off from economic and cultural development.
(Giorgi & Schrch, 2005)
Performative Agent
Intelligent agent that changes the state of the external Peripheral Route to Persuasion
world through autonomous, deliberate action (e.g., make A term used in the elaboration likelihood model involving
binding market transactions). Performative agents seek a lack of intense thought and analysis concerning a
out and act on information, according to user-prescribed persuasive message. An individual taking the peripheral
criteria. (Gates & Nissen, 2005a) route to persuasion relies on simple cues in the persuasion
context to arrive at an evaluation of the advocated message.
Performing Learner (Duthler, 2005)
Lower-risk, semi-skilled to skilled learner that rationally,
systematically, and capably uses psychological processes, Peripherality
strategies, preferences, and self-regulated learning skills A form of participation in a community of practice by
to achieve learning objectives and tasks. (Raisinghani & which individuals take less intense membership. This can
Hohertz, 2005) be seen as a form of becoming a newcoming member of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe r m a ne nt V ir t ua l Circ uit (PVC) Pe rsona l Disc ussio n Folde r 519

the community. This situation should not be seen as free of Personal Community
conlicts. Instead, it can be an opportunity for a community Individual social network of informal, interpersonal ties
to develop their practice. (Crdoba, 2006a) ranging from a half-dozen intimates to hundreds of weaker
P
ties. (Fryer & Turner, 2006)
Permanent Virtual Circuit (PVC)
A virtual connection between two communicating devices Personal Data
on a network. (Shuaib, 2005) Any information concerning a natural or legal person that
can identify it. (Cevenini, 2005)
Permission Intensity
Composed of two elements, the amount of information an Personal Digital Assistant (PDA)
individual provides an organization and the permission 1: A handheld, pocket-sized computer, typically operated
to use the information to develop personalized by tapping and writing on its screen with a pen-like stylus.
communications. (Moore et al., 2006) Often used to carry personal information such as schedules,
notes, e-mail, and telephone numbers. (Houser & Thornton,
Permission Marketing 2005) 2: A small handheld wireless computer. (M. Wang,
The act of requesting customer approval before sending a 2006) 3: Refers to any small handheld device that provides
marketing communication. (Moore et al., 2006) computing and data-storage abilities. (Fraunholz et al.,
2005) 4: A small, palm-sized mobile device with increased
Permission-Based Mobile Marketing and processing and viewing capabilities. (Ververidis & Polyzos,
Advertising 2006) 5: A handheld device that combines computing,
All marketing activities conducted with permission of telephone/fax, Internet, and networking features. A typical
the consumer via mobile and wireless devices. (Salo & PDA can function as a cellular phone, fax sender, Web
Thtinen, 2006) browser, and personal organizer. (Hazari, 2006) 6: A small
digital device that is used to store information such as phone
Permutation GA numbers, addresses, schedules, calendars, and so on. A
A type of Genetic Algorithm (GA) where individuals PDA may also be referred to as a handheld device or as a
represent a total ordering of elements, such as cities to Palm. The Palm Pilot was one of the original PDAs and
be visited in a minimum-cost graph tour (the Traveling is now joined by others such as Palm Tungsten, HP IPaq,
Salesman Problem). Permutation GAs use specialized Palm Zire, and the Toshiba Pocket PC. (Kontolemakis
crossover and mutation operators compared to the more et al., 2005) 7: A small handheld computing device with
common bit string GAs. (Hsu, 2005a) data input and display facilities, and a range of software
applications. Small keyboards and pen-based input systems
Persistence are commonly used for user input. (Garrett, 2006b) 8: A
1: Generally refers to whether students inish their degrees handheld computing device that may contain network
or programs. (Lindsay et al., 2005a) 2: Relating to the act of facilities, but generally is used for personalized software
continuing toward an educational goal. Many institutions purposes beyond a standard organizer. (Mohamedally et
track this information to determine who completes their al., 2005) 9: A handheld device that integrates computing,
degree or certiicate on time or within a stated period telephone, Internet, and networking technologies. (Becker,
of time. (Adkins & Nitsch, 2005) 2006) 10: A small handheld computing device with
data input and display facilities, and a range of software
Personal Area Network (PAN) applications. Small keyboards and pen-based input systems
A computer network used for communication among are commonly used for user input. (Garrett, 2006a) 11:
personal devices, such as cell phones, headsets, and PDAs. Portable computing device that provides computing and
The reach of a PAN is typically a few meters. (Costagliola, information storage and retrieval capabilities for personal
Di Martino, & Ferrucci, 2006) or business use. Lacking a full keyboard, the PDA its the
palm. (Gilbert, 2005b)
Personal Area Radio Network
Small-sized local area network can also be named as a Personal Discussion Folder
wireless personal area network or wireless close-range One of the gathering places created within Web-based
network. (Kaspar & Hagenhoff, 2005) educational platforms where personalized threaded

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
520 Pe rsona l Em pow e r m e nt Pe rsona lizat ion

discussions between participants in online courses may Personal Web Usage (PWU) in the Workplace
occur. (Woods & Baker, 2005) Voluntary online Web behaviors during work time where
P employees use any of the organizations resources for
Personal Empowerment activities outside current customary job/work requirements.
Ability to speak up and advocate for oneself. (Crichton, (Mahatanankoon, 2005)
2005)
Personal Wireless Emergency Service
Personal Information A system-initiated wireless emergency service (WES)
1: Information that is personal about an individual that may application that uses wearable sensors to monitor the
be linked with the individual or identify the individual, internal contexts (i.e., body conditions) of mobile users.
(e.g., credit card number, birthdate, home address, Social At the detection of abnormal conditions, WES systems
Security number). (Yee & Korba, 2006) 2: Information mobilize local emergency medical services and send
about, or peculiar to, a certain person or individual. help-guidance messages to users mobile phones. (Sun,
(Szewczak, 2005) 2005)

Personal Information Manager (PIM) Personality


A software application (i.e., Microsoft Outlook) that A complex set of relatively stable behavioral and emotional
provides multiple ways to log and organize personal and characteristics of a person. (Kaluzniacky, 2006)
business information such as contacts, events, tasks,
appointments, and notes on a digital device. (Garrett, Personality Type
2006b) Used to explain temperaments that affect behaviors
which create actions. Allows people to understand their
Personal/Mobile Portal personality preferences, particularly with respect to
One of the portals embedded into mobile phones, wireless energy source, information gathering, decision making,
PDAs, appliances, and the like. (Tatnall, 2006) and lifestyle/work patterns. The Myers-Briggs Type
Indicator is a well-known example of an instrument
Personal Privacy Policy used to develop an individuals personality type proile.
A description of personal privacy preferences, stating what (Campbell & Berge, 2005)
personal information may be communicated to others,
to whom such information may be communicated, and Personalization
under what conditions the communications may occur. 1: A set of mechanisms built into a system in order to
(Yee & Korba, 2006) tailor it to a particular user and his or her goal. (Babaian,
2005) 2: A set of techniques and services that aim to
Personal Relationship solve the information overload problems Web users face,
The kind of relationship between people exempliied by by providing them with what they want or need, without
shared understanding, mutual trust, and social bonding. having to ask (or search) for it explicitly. (Markellou et al.,
Communication in personal relationships is initially 2006) 3: Ability of systems to adapt and provide different
directed toward the exchange of personal information and responses to different users, based on knowledge about
later toward the sharing of mutual experiences. (Pauleen, the users. (Gaudioso & Montero, 2006) 4: An approach
2005) to increase the usability of complex information systems
and present the user with a comprehensible interface
Personal Trusted Device (PTD) that is tailored to his or her needs and interests. (Anke &
The PTD has to be personal, always carried by the user, Sundaram, 2006) 5: Can be regarded as services of the use
small, cheap, battery working, common user interface, of technology and user/customer information to customize
and secure as a smart card. Mobile phones can fulill the multimedia content aiming to match with individual needs
role of a PTD, as mobile phones are well placed as identity and ultimately deliver customers or users satisfaction.
tokens, and they have dynamic authentication already (Hsu & Kulviwat, 2006) 6: Customization to individual
proven in GSM, mass market, and secure communications. user preferences and needs. (Quah, Leow, & Yong, 2006)
(Mezgr, 2006a) 7: Developing tailored approaches with relevant material

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe rsona lizat ion Engine Pe r t urbat ion 521

packaged for the particular wireless user. (Clarke & Personalized Networking
Flaherty, 2005) 8: From the service providers viewpoint, A type of networking where a range of technologies are
any service provided to a user should be personalized. used to add value to a human network. (Walker, 2006)
P
Personalization is a process through which the system
utilizes the knowledge about a user to tailor the service Personalized Page
to suit the online user with a lavor of the individuality. Personalized view of content and applications assembled by
An automated personalization may promote the service the portal. A personalized page can, for example, highlight
providers image and improve the effectiveness of the a users deadlines across many collaboration server projects
system functions. (Li, 2005a) 9: Matching categorized or the latest resources added to a knowledge directory topic.
content with special customer characteristics such as The page typically also shows the user key services from
desires and preferences in order to individualize an a wide range of applications, such as call center queues
interaction process. (Blecker, 2006b) 10: The approach from a customer support application or expense report
of providing an overall customized, individualized user requests from an employee services application. Such a
experience by taking into account the needs, preferences, page may also include personal productivity services such
and particular characteristics of a user (or group of users). as the users e-mail or stock quotes. Personalized pages
(Koutrika, 2005) 11: Web-based personalization means are assembled from portlets. (Wojtkowski, 2006)
providing customized content to individual users using
Web sites, e-mails, and push technologies. (Seitz, 2005) Personalized Virtual Document
A virtual document is a document for which no persistent
Personalization Engine state exists and for which some or all instances are
A system component that exploits information regarding generated at runtime. It becomes personalized when
user activities to derive user preferences and interests, and one speciies that the document is composed of both
to tailor the content to be delivered according to these. information and the mechanisms required for generation
(Lepouras & Vassilakis, 2006) of the real documentthat is, that to be consulted by the
reader. Thus, having been introduced with the goal of
Personalization Strategy reusing resources available on the Web, the personalized
The personalization strategy (vs. codiication strategy) virtual document inherits its dynamic generation and
focuses on developing networks for linking people so user adaptation abilities from adaptive hypermedia work.
that tacit knowledge can be shared. (Ribire & Romn, (Fortier & Kassel, 2006)
2006)
Personnel Subsystem
Personalized Database System Sociotechnical system component composed of the
A database system that provides personalized answers organizational units members, including individual
in response to a user request by dynamically considering knowledge, skills, and attitudes, and team size and
relevant user information stored in user proiles. Its basic composition. (Cuevas et al., 2005)
modules include a query personalization module, and a
proile creation module. (Koutrika, 2005) Perspective
The combination of interests, values, and viewpoints
Personalized Information Access Approach relected in a Balanced Scorecard (BSC). The sum of
Information is returned to the user, taking into account the different perspectives in a given BSC should relect
the query issued and particular characteristics of a user. all of the critical stakeholder views of an organization.
(Koutrika, 2005) (Keinath, 2005)

Personalized Navigation Aid Persuasive Communication


Customized WCDSS navigation structure such as the Rely more on persistence, rather than clear and concise
personal shopping gallery that meets individual customer arguments, to attain agreement. (Sipior, 2005)
needs or desires. (F. Wang, 2006)
Perturbation
A behavioral entity affecting the weights of a neural
network. (Alippi & Vanini, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
522 Pe r va sive a nd Cont ex t -Aw a re Com put ing Philosophy

Pervasive and Context-Aware Computing PG: See Process Group.


Allows mobile devices to affect everyday life in a pervasive
P and context-speciic way. (de Freitas & Levene, 2006b) PGM: See Pragmatic General Multicast.

Pervasive Computing PGP: See Pretty Good Privacy.


1: An environment where computers have the capability
to obtain information from the environment in which Phase Model of Access
it is embedded and utilize it dynamically. (Krogstie, According to this model, the digital divide is concerned
2005b) 2: Technology that has moved beyond the personal with the multi-faceted concept of access. Possessing a
computer to everyday devices with embedded technology computer and a network connection is the most common
and connectivity. The goal of pervasive computing is to meaning in the context of digital technology. (Banerji &
create an environment where the connectivity of devices Basu, 2005)
is embedded in such a way that the connectivity is
unobtrusive and always available. (Dixon et al., 2005) 3: Phase Response
Technology that provides easy access to information and 1: Phase of the complex frequency response. (Jovanovic-
other people anytime and anywhere through a mobile and Dolecek, 2005c) 2: The phase of the Fourier transform
scalable information access infrastructure. (Oulasvirta & of the unit sample response. For a real impulse response
Salovaara, 2006) digital ilter, the phase response is an odd function of the
frequency. (Jovanovic-Dolecek, 2005a)
Pervasive Recommendation
Unsolicited information about products or services Phased Approach
related with the one requested. They are usually shown Implementing the modules on an ERP system in sequential
as advertising or secondary recommendations, acting as steps, comprising one or more modules in one or more
illers for the page or as new elements in the interface; they locations or plants, until the system is completely installed.
could be perceived as disturbing elements. The system of Also called roll out. (de Souza & Zwicker, 2005)
inner marketing establishes a policy of publicity for each
product destined to given segments of consumers. This Phenomenology
provides a method to perform cross-sell marketing. (Gil A strand of philosophy that accounts for human action
& Garca, 2006) without mental representation. Martin Heidegger
(1889-1976), currently demanding rereading in the HCI
Petri Net community, is one of the most important thinkers in this
1: A directed, bipartite graph in which nodes are ield. (Kettley, 2006a)
either places (represented by circles) or transitions
(represented by rectangles), invented by Carl Adam Petri. PHB: See Per-Hop Behavior.
A Petri net is marked by placing tokens on places. When
all the places with arcs to a transition (its input places) Phi Coeficient
have a token, the transition ires, removing a token One metric for corpus similarity measured upon the chi
from each input place and adding a token to each place square test. It is an index to calculate the frequencies of
pointed to by the transition (its output places). Petri nets the four parameters of a, b, c, and d in documents based
are used to model concurrent systems, particularly network upon the chi square test with the frequencies expected for
protocols. (Guan, 2005d) 2: Process-modeling technique independence. (Ito, 2005)
based on directed bipartite graphs with two node types
called places and transitions that are connected by arcs. Philosophy
(Fisteus & Kloos, 2006) 1: The study of basic principles including what and how
we know, rules for language and reasoning, and the basis
PetShop (Petri Nets Workshop) for social interaction. (Gilbert, 2005) 2: Two opposing
A CASE tool dedicated to the formal design and interpretations: one more theoretical, contemplative, and
specification of interactive safety-critical software. interior to the human process of thinking; another one,
(Bastide et al., 2006) which interprets philosophy as a doing, as a practice,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Phishing Physc os 523

and as an action. As philosophy is highly complex, both Photovisual Digital Skill


interpretations are possible, though the focus of the One of the skills that describe the ability of users to read
community of practice approach is on philosophy as and understand instructions using visual representations
P
action. (Nobre, 2006b) in digital environments. (Eshet, 2005)

Phishing PHP Project


1: A form of spooing, where users are tricked into providing The project started with the collection of scripts to be
personal identiication information because thieves have executed as cgi-bin scripts from a Web server and soon
stolen the look and feel of a legitimate site. (Sockel & became a real language. PHP is now a widely used general-
Chen, 2005) 2: Inducing people (often by e-mail) to visit purpose scripting language (very close to C for its syntax)
a Web site that steals personal information about them. that is especially suited for Web development. Very
(Rowe, 2006a) 3: Scams use e-mail and Web sites designed valued features of this software are: (1) modularity of the
to look like those of legitimate companies, primarily banks, interpreting language, which can be built as a module for
to trick consumers into divulging personal information, Web servers and especially for the Apache; (2) embedding
such as inancial account numbers, that can be used to features of the language, which can coexist with HTML
perpetrate identity-theft fraud (http://www.antiphishing. code in Web pages; (3) creation on the ly of HTML
org/) (Tassabehji, 2005a) 4: Short for password harvest pages (they can be produced by the server depending on
ishing, it is the process of impersonating another trusted conditions emerging from clients answers or choices);
person or organization in order to obtain sensitive personal and (4) interaction with widely used RDBMSs, including
information, such as credit card details, passwords, or MySQL and PostgreSQL. (Cartelli, 2005b)
access information. (de Freitas & Levene, 2006a) 5: Using
e-mail to entice unsuspecting consumers to Web sites Phrasing
resembling those of trusted banks and credit card issuers The manner in which something is expressed in words.
with a view toward collecting personal information. (Galitsky, 2005c)
(Szewczak, 2006) 6: With phishing, identity thieves
establish a fake Web site designed to look like a companys Phreaking
actual site; unsuspecting customers are drawn to the site The ability to use a phone service without being billed.
and asked to disclose personal information. (Close et al., (Wilsdon & Slay, 2005)
2006)
Phrnsis
Phone Call/Teleconferencing 1: Aristotles term for experiential self-knowledge or
An interactive communications session using the telephone practical wisdom based on experience. The end result,
between two or more users who are geographically or realization of phrnsis, is action or praxis. Phrnsis
separated. (Ribire & Romn, 2006) should determine the correct means to achieve a particular
action. (Schwartz, 2006) 2: Experiential self-knowledge or
Phonetic Encoding practical wisdom. A social actors self-knowledge is a
Use of some speciic pronunciation rules to translate word synthesis of his temporal experience of social phenomena
symbol as phonetic symbol. (Lee, Lin, et al., 2005) and his ability to take or perform practical action in relation
to such phenomena. (Butler & Murphy, 2006)
Photogrammetry
1: Technique permitting the setup of the coordinates of Phylogenetic Tree
points (DEM) of an object surface by processing stereo A representation of the branching order and branch lengths
images of the objects surface. (Zelasco et al., 2005) 2: of a collection of taxa, which, in its most common display
The science or art of obtaining reliable measurements or form, looks like the branches of a tree. (Burr, 2005b)
information from images. (Caelli, 2005)
Physcos
Photonic Network E-fulillment organizations concentrating on physical
A network of computers made up using photonic devices capabilities such as transport, warehousing, and pick-pack
based on optics. The devices include photonic switches, services. They concentrate on improving such services
gateways, and routers. (Akhtar, 2005) to become competitive through eficiency and scope of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
524 Physic a l Ca pit a l Pie zo-Ele c t ric Cr yst a l

such services. The degree of Physco-ness and the range Physical Schema
of capabilities it applies vary for different providers. The technical description of a database; all the physical
P (Alexander & Burn, 2006) constructs (such as indexes) and parameters (such as page
size or buffer management policy) are speciied. The
Physical Capital physical schema of a database is the implementation of
Tangible resources such as tools, transportation vehicles, its logical schema. (Hainaut et al., 2005)
buildings, machines, and equipment that aid in the
production of goods and services. (Ridings, 2006b) Physicalism
The thesis that everything in the universe is physical.
Physical Cost Applied to the mind, physicalism asserts that: (1) all entities
One of the costs associated with production, transportation, in the universe are physical entities and their combinations
and inventory. (Setzekorn et al., 2005) (ontological physicalism); and (2) all properties of any
entity in the universe are physical properties (property
Physical Data physicalism). (Gelepithis, 2005)
Data source for data mining in SQL/MM DM and JDM.
It is mapped to inputs of a data-mining task (referred to PI: See Programmed Instruction.
as logical data). (Zendulka, 2005c)
PIA: See Privacy Impact Assessments.
Physical Dimension
Describes those elements that are necessary in order to PICOLA Project: See Public Informed Citizen On-Line
enable contact between an IT professional and its end Assembly Project.
users. (Leonard, 2005)
Pictorial Query Language
Physical Distribution 1: A general term for a query language, as opposed to a
A transportation service that accepts a shipment from a textual query language. Pictorial languages describe the
shipper, and at destination separates and sorts the packages result to produce characterized by, or composed of, pictures.
and distributes them to many receivers. (Tyan, 2006) (Ferri & Rafanelli, 2005) 2: A specialized query language
devoted to querying a database by a picture. These kinds
Physical Form of languages focus on spatial relationships existing among
The actual physical means by which thoughts, meaning, the elements of the database. (Ferri & Grifoni, 2006)
concepts, and so forth are conveyed. This, therefore, can
take the form of any physical format, such as the writing Picture Archiving and Communication System
or displaying of words, the drawing or displaying of (PACS)
images, spoken utterances or other forms of sounds, the 1: A system for capturing, storing, and distributing medical
carrying out of actions (e.g., bodily gestures), and so forth. images. These systems are fast turning from storing
(Polovina & Pearson, 2006) analog images to storing digital images. (Suomi, 2006)
2: A system used for managing, storing, and retrieving
Physical Interface medical image data. (Tong & Wong, 2005a)
Tangible device for interaction with the game. (Ip &
Jacobs, 2006) Piecemeal Design
A method of designing a system in which each component
Physical Model of a system is developed independently. (Janczewski &
A logical model instantiated in a speciic database Portougal, 2005)
management product in a speciic installation. (Pardede
et al., 2005) Piezo-Electric Crystal
A crystal having the property such that when it is subjected
Physical/Physiological Biometric to mechanical strain (e.g., pressure) it develops electrical
A biometric characterized by a physical characteristic. charge of opposite polarity on opposite faces. Conversely
(Vatsa et al., 2005) when electrical potential of opposite polarity is applied on

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pignist ic Proba bilit y Func t ion Pla usibilit y 525

opposite faces, mechanical strain is induced in the crystal. Plagiarism


(Lahiri & Basu, 2005) The use of the ideas from an existing source directly
and without attribution. A number of different types of
P
Pignistic Probability Function plagiarism are recognized, not all of which are considered
BetP is the probability function used for decision making. inappropriate in all disciplines. Plagiarism by copying
(Smets, 2005) is the most common and occurs when the words from
one source are used without modiication or attribution.
Pillar Rephrasing an expressed idea without citation is plagiarism
As used in the Sloan-C quality framework for online by paraphrasing. Other forms include self-plagiarism,
learning, a pillar is a base on which quality online learning patchwork plagiarism, plagiarism of structure or citation,
rests. The ive pillars are: learning effectiveness, cost and ghostwriting or fraud. Some forms of plagiarism,
effectiveness, access, student satisfaction, and faculty but not all, are also violations of copyright. (Marshall,
satisfaction. (Keinath, 2005) 2005)

PIM: See Personal Information Manager. Planned Impact


One of the anticipated outcomes of a systems development
Piracy project that are identiied at the projects outset, and are
Refers to the illegal or unlicensed use of software. (Sales, typically critical to its ultimate success. (Doherty &
2005) King, 2005)

PITA: See Pacific Islands Telecommunications Planning


Association. Determining what is to be achieved, setting goals, and
identifying appropriate action steps. Planning centers on
PIU: See Pathological Internet Use. determining goals and the process to achieve them. (Cragg
& Suraweera, 2005)
Pivot Domain
The problem or opportunity being addressed. (Abou- Platform
Zeid, 2005a) Speciic computer hardware or a speciic combination of
hardware and operating system. It is also used to refer
Pivot Table to support software for a particular activity, as in This
An interactive table found in most spreadsheet programs program provides a platform for research into routing
that quickly combines and compares typically large protocols. (Arkhypska et al., 2005)
amounts of data. One can rotate its rows and columns to
see different arrangements of the source data, and also Platform for Privacy Preferences (P3P)
display the details for areas of interest. (Pang, 2005a) Offers privacy policies that should improve user trust
signiicantly. (Signoret, 2006)
PKI: See Public Key Infrastructure.
Platform Infrastructure Service
PLA: See Participatory Learning and Action. Entity that owns portfolios of telecommunication towers in
various countries and rents space on the towers to network
Place infrastructure operators. (Rlke et al., 2005)
A recognizable tract of space that in some physical or
conceptual way evokes a sense of social agency (conscious PLATO: See Programmed Logic for Automatic Teaching
or habitual intentions of people), a certain type of behavior, Operations.
or a personal emotional reaction. (Champion, 2006b)
Plausibility
PlaceWare A positive function that represents the extent to which
A hosted Web-conferencing service, now owned by we fail to disbelieve the proposition described by a focal
Microsoft. (Panton, 2005) element. (Beynon, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
526 Pla usibilit y Func t ion Point -Ba se d M ode l of T im e

Plausibility Function PMBOK: See Project Management Bod y of


pl(A) is the total amount of belief that might support that Knowledge.
P the actual world is in A. (Smets, 2005)
PMI: See Project Management Institute.
Play
Activities in which individuals and groups engage that PMMM: See Project Management Maturity Model.
stimulate various aspects of personal and social functioning
without necessarily being related to particular utilitarian PMP: See Project Management Professional.
outcomes. (Oravec, 2005)
POC: See Political Online Community.
Playout Buffer
Buffer used at the receiver side to store received audio Pocket PC
packets in interactive real-time applications in order to A Microsoft Windows-based operating system (OS) for
compensate for variable network delays. (Roccetti & PDAs and handheld digital devices. Versions have included
Ferretti, 2005) Windows CE, Pocket PC, Pocket PC Phone Edition, and
Windows Mobile. The system itself is not a cut-down
Playout Control Mechanism version of the Windows PC OS, but is a separately coded
Adaptive mechanism that fetches audio packets from the product designed to give a similar interface. (Garrett,
playout buffer and sends them to the audio device for 2006a)
immediate playout. (Roccetti & Ferretti, 2005)
Poincar Mapping of the H2
Playout Delay A conformal mapping from the entire H2 into the unit
Total amount of time that is experienced by an audio circle in the lat R2 (disk model). (Walter, 2005)
packet from the time instant it is generated at the source
and the time instant it is played out at the destination. Such Point of Contention
a delay consists of: (1) the collection time needed for the A communication factor that is found to be positive
transmitter to collect an audio sample and to prepare it (contributes to ones credibility) in the research of one ield,
for transmission, (2) the network delay, and inally (3) the but is found to be negative (detracts from ones credibility)
buffering time, which is the amount of time that a packet in the research of another ield. (St.Amant, 2005c)
spends queued in the destination buffer before it is played
out. (Roccetti & Ferretti, 2005) Point Learning
Derives rules by looking at each individual point value
PLM: See Product Lifecycle Management. of the attributes in every instance of the training data set.
(Dai, 2005a)
PLMN: See Public Land Mobile Network.
Point to Point
Plug-In The communication from a single client to a single server.
A program that can easily be installed and used as part (K.J. MacGregor, 2005)
of a Web browser. A plug-in application is recognized
automatically by the browser, and its function is integrated Point Uncertainty
into the main HTML ile that is being presented. (Yow A model of sensor uncertainty where each stored data
& Mittal, 2006) item is assumed to be a correct representation of the entity
being represented. (Cheng & Prabhakar, 2005)
Pluralistic
Of or belonging to a pluralist or to pluralism; recognizing Point-Based Model of Time
more than one ultimate principle in existence or being Temporality is speciied using explicit occurrences of
contrasted to monism. (Rogers & Howell, 2005) an event, observation, or action, which are punctual
occurrences. (Rodrguez-Tastets, 2005b)
PM: See Project Management.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Point -Ba se d Solut ion Polling 527

Point-Based Solution Policy


One of the isolated software solutions typically developed 1: A body of expectations that describe acceptable and
by individuals or small groups. While usually cheaper unacceptable behaviors of employees in the workplace.
P
to develop, they have dificulties related to scaling, (Mattord & Whitman, 2005) 2: A course of action
maintainability, and a lack of interfaces to other systems. developed for the achievement of a set of goals. (Ajiferuke
They tend to suffer greatly when the champion moves & Olatokun, 2005) 3: A public statement of intentions
on to another place of employment or even simply to the and behavioral norms that is usually formalized and
next interesting project. (Salter, 2005b) made explicit by a sovereign government, institution,
corporation, or other organizational entity. (Olatokun &
Point-of-Regard Ajiferuke, 2006) 4: Set of rules specifying the level of
Point in space where a person is looking. Usually used in access to network resources to which a user or application
eye-tracking research to reveal where visual attention is is entitled. (DaSilva, 2005)
directed. (Poole & Ball, 2006)
Policy and Regulation
Point-of-Sale (POS) Policy is a plan of action for handling political issues.
1: Commercial technology connecting remote transactions Regulation is the control of something by rules informed by
to a central database. (Gilbert, 2005a) 2: A location where a the objectives set forth in policies. (M. Mitchell, 2005b)
transaction occurs. This may be a realPOS (e.g., a checkout
counter) or a virtualPOS (e.g., an e-shop on the Internet). Policy Network
(Karnouskos & Vilmos, 2006) Centered on the provision of public services and includes,
beside the public administration, agents from the
Poisson Process business community as well as from civil society, like
A stochastic process for generating observations in which non-governmental organizations, sports clubs, or interest
the number of observations in a region (a region in space organizations. These agents are engaged in interdependent
or time, e.g.) is distributed as a Poisson random variable. relations with the public administration. (Jaeger, 2005)
(Burr, 2005a)
Policy-Based Research
Polarity Research that is designed to investigate issues that are of
A positive or negative sign that denotes the sense of the particular interest to the formulation of practical policy
effect between variables connected by a causal link. rather than more abstract theoretical interests. Policy-based
(Casado, 2005) research is closely related to the notion of research-based
policy, whereby policy is said to be driven by well-gathered
Policies and Procedures of E-Learning Program empirical evidence. Supporters celebrate relevance and
A set of guidelines and requirements for faculty to be able practicality. Critics fear the stiling of research that is not
to teach online and for students to learn online. For faculty practical. (David, 2005)
these may include: teaching requirements, new faculty
hire mentorship, new course development, facilitating an Political Online Community (POC)
online course, and student issues; for students: a minimum An Online Community whose members are interested
technical proiciency, new students orientation, grievance mainly in discussing local and international politics. (Al-
process, and an online student code of conduct. (Levy & Saggaf & Weckert, 2005)
Ramim, 2005a)
Polling
Policing A technology associated with online meetings that allows
Mechanism by which the network determines whether a presenter to a display a multiple-choice or true/false
offered trafic meets the speciications in the service question to the attendees for feedback purposes. (Panton,
agreement; excess trafic may be dropped or marked as 2005)
noncompliant. Policing is typically implemented at the
entry point to a network. (DaSilva, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
528 Poly-T im e Algorit hm Por t a ble Doc um e nt For m at (PDF)

Poly-Time Algorithm often involving splashy colors and loud sound effects.
An algorithm whose complexity evolves polynomially with (Friedman, 2005)
P respect to the envisaged complexity parameter. (Alippi &
Vanini, 2005) Pop-Up Window
A window that suddenly appears (pops up) when a user
Polygraph selects an option. In instant messaging, a pop-up window
Electronic device used for measuring human body signals when a users buddies come online and go
parameters in the hope (never proven) of detecting ofline, while the user is engaged in other computer
deception. (Rowe, 2006b) applications. (Hwang & Stewart, 2005)

Polyline Popularity
Represented by the ordered set of points and the ordered Indicates the importance of a multimedia object. The most
set of lines connecting consecutive points. The direction requested objects are the most popular. As a multimedia
of a polyline is from the start point to the end point. (Ferri object is a set of segments, we distinguish two types of
& Grifoni, 2006) popularity: global popularity and local popularity. (Kacimi
et al., 2005)
Polymorphism
1: One method name can cause different actions to occur, Population Stereotype
depending on the kind of object performing the action. Comprises the well-ingrained knowledge that we have
(Lucas, 2005) 2: The ability of object-oriented programs to about the world, based on our habits and experiences
have multiple implementations of the same method name of living in a particular cultural environment. (Noyes,
in different classes in an inheritance tree. Derived classes 2006)
can override the functionality deined in their base class.
(D. Brandon, 2005a) Population-Level Operator
Unusually parameterized operation that applies method-
Polynomial Range-Aggregate Query level operators (parameter) to a part or whole evolving
A subclass of dot-product queries, where the query is a population. (Leni et al., 2005)
polynomial aggregate query deined over a contiguous
range of data values. (Shahabi et al., 2005) Port
An interface for physically connecting to some other device
Polyphase Decomposition such as a monitor, keyboard, and network connection.
Decomposition of a transfer function in M (L) polyphase (Tassabehji, 2005a)
components that provide sequential processing of the input
signal at the lower sampling rate. (Mili, 2005) Port Scanning
The practice of sending electronic queries to Internet sites in
PON: See Passive Optical Network. order to learn what level of security exists. Often the intent
is to see if it can be compromised. (Friedman, 2005)
POP, POP3: See Post Ofice Protocol.
Portable Device
Pop-Up Computational device that is small and can be carried by
A message or advertisement that shows up on ones its user, such as a smart cell phones, PDAs, and laptops.
computer screen without permission. (Dholakia et al., Unlike stationary devices, the design of portable devices
2005b) typically trades-off CPU speed, memory, I/O facilities,
and so forth for reduced power consumption and size.
Pop-Up Advertisement (Kunz & Gaddah, 2005)
1: A Web-based promotional technique that places a new
window of advertising message or image over an Internet Portable Document Format (PDF)
users current active window. (Gao et al., 2006) 2: A 1: A ile format that is capable of transferring designs across
window that suddenly appears while suring the Web, many different forms of media. PDF iles are universal and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Por t a l Por t folio Te m plat e 529

independent of the computer systems they are on. (Snyder, The user stays inside the portal interface, which provides
2005) 2: Method of document reproduction, generated by access to remote Web sites on the users behalf. (Braun,
Adobe Acrobat Systems, notable for quality reproduction 2005c) 10: A Web-based environment customized to
P
of both text and accompanying images. (McCarthy, provide users information needs. In contrast to the
2005a) 3: According to Adobe Systems Incorporated, a typical Web page, where a large amount of information
PDF is a universal ile format that preserves the fonts, is available to all, portals provide information speciic
images, graphics, and layout of any source document, to the users need and role. The user is able to customize
regardless of the application and platform used to create what information is revealed and what is hidden. (Howell
it. (Nightingale, 2005) & Wilcken, 2005) 11: A WWW gateway or entrance site
for users when they get connected to the Web or that
Portal users tend to visit as an anchor site. (Buchanan, 2005) 12:
1: A computer desktop environment that provides Access gateway to the World Wide Web (WWW) which
organized aggregated access to the applications, systems, integrates various information sources and services, and
and Web sites used by a community member, based on usually allows users to customize the content, layout, and
their role within the community. (Elshaw, 2006b) 2: A navigation to suit their personal needs. (Vrazalic & Hyland,
gateway serving as a starting point for accessing several 2005) 13: Acts as a channel between the content creator
services offered by a CI (or e-commerce or e-government) and end user. It does not typically have a content of its own.
system. (Kirlidog, 2005) 3: A multi-functional Web site (Lammintakanen & Rissanen, 2005a) 14: An electronic
that forms a gateway to a range of services that usually doorway providing a comprehensive array of resources
includes Web directories, search capabilities, and links and services. Portals typically contain newsletters, e-mail
to other Web resources. (Toland, Purcell, et al., 2005) services, search engines, online shopping, chat rooms,
4: A one-stop site on the Web that provides a range of discussion boards, and personalized links to other sites.
information and services for people. (Hin & Subramaniam, (Dotsika, 2006)
2006) 5: A one-stop, cross-department/business unit and
cross-jurisdictional Web site that serves as an aggregation Portal Model of IPFS
of government services in a given functional area or based A model describing companies that provide no direct,
on user needs. (Schelin, 2005) 6: Any Web site considered transactional services of their own but act as portals
an entry point to other Web sites, often by being or through which consumers can manage all of their inancial
providing access to a search engine. (Nightingale, 2005) services. (Gordon & Mulligan, 2005)
7: A self-addressed information package with the ability
to be pushed or pulled among Internet applications. It is Portfolio
self-contained with metadata for its information structure 1: A repository of information about an individual usually
and presentation. Compared with the concept of datagram used in the context of a education or career activity.
on the Internet, portal can be regarded as a kind of (Wasko, 2005) 2: A well-constructed, purposeful, and
information-gram on the Internet for its properties of self- individualized collection of artifacts which captures the
service, personalization, and real-time delivery. Mostly complexities of learning and teaching, and demonstrates
portals are implemented in XML. (Li, 2005a) 8: A virtual the creators abilities, progress, achievement, and effort
meeting space where irms come together to exchange of what he/she can do. (Wieseman, 2005a) 3: The report
information, trade, or collaborate. There are three different collecting documents, scores, interviews, and so forth, and
types of portals: information portals, transactional portals, demonstrating the students skills, achievements, learning,
and cooperative portals. These types can be classiied and competencies, with respect to: (1) previously deined
according to orientation criteria into vertical portals areas of skill, (2) speciic learning outcomes from these
(irms in the same industry or sub-industry, grouped by areas, (3) appropriate learning strategies that have to be
function), horizontal or functional portals (irms grouped developed by the student, and (4) performance indicators.
according to their shared needs, regardless of sector), and (Cartelli, 2005a)
geographical portals (irms grouped geographically by
region or country). (Moreau et al., 2005) 9: A Web site or Portfolio Template
service that provides access to a wide range of services that A pre-designed Web page used to create an electronic
can be either local or remote, structured or unstructured. portfolio. (Shaw & Slick, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
530 Por t le t Post e rior Proba bilit y

Portlet Possibility Distribution


A reusable Web component that displays relevant For a fuzzy set, when the membership degree associated
P information to portal users. (Wojtkowski, 2006) with an element is viewed to be a measure of the possibility
that a variable has the value of the element, the fuzzy set
POS: See Point-of-Sale. becomes a possibility distribution. (Ma, 2005b)

Pos-Cognitivism: See Cognitivism. Possible Consequentialism


Evaluating an ethical position in terms of its possible
Position consequences. (Artz, 2005a)
A group of actors who have similar pattern of relations
to all other actors in a network. People in similar social Possible World
position are more likely to have similar proiles, that is, Corresponds to the statistical notion of an elementary event.
social activities, ties, and interactions, than people in Probabilities over possible worlds, however, have a more
different positions in a network. (Assimakopoulos & epistemic, subjective meaning, in that they are assumed to
Yan, 2006) relect an agents knowledge. (Kern-Isberner, 2005)

Position-Determination Technology Post Ofice Protocol (POP)


Technology, either network based or satellite based, that A process that authorizes a transfer of mail messages to a
enables wireless carriers to pinpoint mobile phone users. users computer, then updates the data store source. This
(Sun, 2005) update may optionally include deleting the stored message.
(Horiuchi, 2005b)
Positive Attitude
A perception about IT that results in behavior that identiies Post-Industrial Society
opportunities for innovative uses of new IT. (Winston & A general term used by many authors after Daniel Bell
Dologite, 2005) (1973) to describe the increasing importance of tertiary
and quaternary sectors of industrialized economies. Often
Positive Information the term is synonymous with white collar or knowledge
The kind of information about which one can afirmatively work. (Lepawsky & Park, 2006)
state that it is true, with no doubt. (Analide et al., 2006)
Post-Secondary Enrollment Option (PSEO)
Positive Pattern 1: Courses offered by colleges and universities that students
Pattern with no negated item. (Kryszkiewicz, 2005) can take while still in high school that count toward college
credits. (Dell, 2005) 2: A school inance model where high
Positivism school students are allowed to take college or university
1: A belief that natural science, based on observation, courses. In many states, the tuition is paid for by the
comprises the whole of human knowledge. (McPherson, state or the school district. (Glick, 2005a) 3: Educational
2005) 2: Asserts that reality is the sum of sense alternative allowing students (usually juniors and seniors)
impressionin large, equating social sciences with natural to take courses at post-secondary institutions, earning both
sciences. Primarily uses deductive logic and quantitative high school and college credit. (Dorniden, 2005)
research methods. (Carlsson, 2005)
Post-Transaction User-Input Error (PTUIE)
Positivist Research An error made by users in an input to a transaction execution
Research premised on the existence of a priori ixed and discovered only after completion of the execution.
relationships among phenomena. (Trauth, 2005b) (Tan & Zhao, 2005a)

Possibilistic Clustering Posterior Probability


The possibilistic c-means (PCM) family of clustering Probability distribution of an unknown characteristic
algorithms is designed to alleviate the noise problem by after combining prior information and data. (Rippon &
relaxing the constraint on memberships used in probabilistic Mengersen, 2005)
fuzzy clustering. (Klawonn & Rehm, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Post ge nom e Era Pow e r La w 531

Postgenome Era Posture Recognition


The time after the complete human genome sequence is Static body coniguration without a dynamic movement.
decoded. (Fu, 2005) (Ozer et al., 2005)
P
PostgreSQL Project Potential Contributor
The project had its beginnings in 1986 inside the University One of the newcomers and the ones who might exhibit a wish
of California at Berkeley as a research prototype and in for contribution in virtual communities. (Lambropoulos,
the 16 years since then has moved to its now globally 2006b)
distributed development model, the PostgreSQL RDBMS
(formerly known as Postgres, then as Postgres95), with Potential Visitor
central servers based in Canada. The PostgreSQL Global Someone who may, in the future, travel to the destination
Development Group is a community of companies for business or pleasure. (Hornby, 2005)
and people cooperating to drive the development of
PostgreSQL. (Cartelli, 2005b) Power
1: The ability to inluence others. (Panteli, 2005) 2: The
Postmodern capability and possibility to inluence and/or direct the
1: The fragmented, open, and evolving nature of the self course of some action. (Land, Amjad, et al., 2006)
and community disclosed in virtual communication.
(Srinivasan, 2006) 2: Theoretical approaches characterized Power Differential
as postmodern have abandoned the belief that rational The existence of imbalanced power relationships. (Panteli,
and universal social theories are desirable or exist. 2005)
Postmodern theories also challenge foundational modernist
assumptions such as the idea of progress or freedom. Power Distance
(Macfadyen, 2006b) 1: A measure of the importance status has in governing
interactions among individuals. (St.Amant, 2005d) 2: The
Postmodernism way authority igures are perceived. In countries with a
A position critical of realism that rejects the view of social high power distance, a leader is an authoritarian igure
sciences as a search for over-arching explanations of the or a benevolent dictator, and their authority will not be
social world. Has a preference for qualitative methods. questioned. In a low power distance country, individuals
(Carlsson, 2005) are prepared to argue with leaders, who must be able to
justify their decisions. (Toland, Frank, et al., 2005) 3:
Postmortem Review The extent to which society accepts the fact that power
A collective learning activity which can be organized for in institutions and organizations is unevenly distributed.
projects either when they end a phase or are terminated. (Limayem, 2005)
The main motivation is to relect on what happened in
the project in order to improve future practicefor the Power Geometry
individuals that have participated in the project and for The idea that shifts in perceptions of space and time occur
the organization as a whole. (Dingsyr, 2006) unevenly for different people or groups depending on their
relative social position. Differences in social power (e.g.,
Postprint based on gender, race, or class) afford greater or lesser
Scientiic work modiied after peer review. (Rennard, degrees of control over how space and time are structured
2006) and experienced for different individuals and groups.
(Lepawsky & Park, 2006)
PostScript
A text-based page description language developed by Adobe Power Law
Systems, Inc. that uses precise methods to communicate Postulates that Internet goods (income, trafic, links, etc.)
text and images to an output device. (Snyder, 2005) will follow Zipf-type distributions. For example, this

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
532 Pow e r La w Dist ribut ion Pra gm at ism

predicts that a second-ranked site will be half as successful produce communicative acts in concrete situations.
as a irst-ranked site, and a 10th-ranked site will be a 10th (Marjomaa, 2005) 3: The study of the contribution of
P as successful as the irst-ranked. (Murphy, 2005a) contextual factors to the meaning of what language users
say. (Galitsky, 2005c)
Power Law Distribution
A probability distribution function, P[X=x]~cx, where Pragmatic General Multicast (PGM)
constants c>0 and >0, and f(x)~g(x) represent that the An extreme example of maintaining state information is
limit of the ratios goes to 1 as x grows large. (Li, 2005) the Pragmatic General Multicast protocol, formerly known
as Pretty Good Multicast, which is implemented by Cisco,
Power Law Model where routers maintain state information on a per-packet
A generalization of the classical Poisson model, allowing basis. (Chakraborty et al., 2005)
for changes in the intensity of the arrivals. (Guster et al.,
2005) Pragmatism
1: Derives from the Greek word pragma which means
Power Spectral Density action. Emphasizes the concept of human beings as agents,
The total power of the signal in the speciied bandwidth and focuses on their practical relation to the world. The
divided by the speciied bandwidth. Note: power spectral principle according to which experience forms the basis
density is usually expressed in watts per hertz. (Ragazzi, of all knowledge is shared by pragmatists and empiricists,
2005) these later including positivists and neo-positivists.
Pragmatists contrast with positivists by the former focusing
PPC: See Pay-Per-Click Advertising. on creative inquiring and the latter on passive observation.
At a deeper level, the contrast is even greater because of
PPGIS: See Public Participation GIS. pragmatisms origin in Peirces critique of Descartes, and
the overcoming of precisely those Cartesian dualisms which
PPP: See Purchasing Power Parity. are presupposed by modern western philosophy, including
positivism. Examples of these dualisms are subject and
PQoS: See Perceived Quality of Service. object, body and mind, perception and conceptualization,
theory and fact, fact and value, deduction and induction,
Practical Relection reality and copy, nature and culture, individual and
Relection about assumptions underpinning classroom society, sign and signiied, and so forth. To overcome
practice, and the purposes and consequences of actions these dualisms, pragmatism rejects some of the basic
in the classroom. (Wieseman, 2005b) guiding ideas which inform not only positivism, but also
interpretative and structuralist traditions. Among these
Practice are the notions such as the subject of knowledge as an
1: Shared historical and social resources and perspectives individual, observation as presuppositionless activity,
that help sustain a community through time. (Crdoba truth as a picture or representation corresponding with
& Robson, 2006) 2: The relational interplay between reality, knowledge as being built up of observation and
humans and artifacts that enables work performance. logical inference, social science as being exclusively
(Munkvold, 2006) concerned with culture (and hence the interpretation
and understanding of symbolic meaning), knowledge
Practitioner-Informant as involving an arbitrary or conventional twofold sign
Users who collaborate with designers as domain experts relation, and so on. Pragmatism, by contrast, stresses the
providing information about work practices are called anchorage of knowledge in real collective problems, and
practitioner-informants. This is the initial stage in the knowledge as being dependent on the mediation of signs,
developmental theory of participatory-design relationships which means that it regards knowledge as being social by
between users and designers. (Carroll, 2005) nature. It focuses on the development of knowledge which
it sees as taking place in different ways and in a variety
Pragmatic of contexts. Pragmatism in centered on abduction, not
1: Of practical consequence. (Aarons, 2006) 2: A subield induction nor deduction, and not only on the individual
of linguistics that studies how people comprehend and creativity, but rather on the cooperative search for truth

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pra nk ing/Posing Pre dic t ion 533

within a community through interpretation, discussion, documents in a given query in the set of documents that
and argumentationthat is, through the creative collective are returned by an information retrieval system. (Meng &
overcoming of action problems. (Nobre, 2006a) 2: Having Chen, 2005) 3: The number of relevant images retrieved
P
a basis in practice, but little explicit or implicit theoretical as a percentage of the total number of images retrieved.
underpinning. (Kisielnicki, 2006) 3: The philosophical (Sural et al., 2005) 4: The ratio of the number of correctly
tradition associated with the work of William James, John illed slots to the total number of slots the system illed.
Dewey, and Charles Saunders Peirce, and more recently (Song et al., 2005)
with Richard Rorty. Pragmatism shares its philosophical
roots with naturalism, in that it holds the natural world Precision and Recall
as the inal arbiter of truth. However, it also insists on Measures of retrieval quality, relating the documents
consequences, utility, and practicality as being vital retrieved with those actually relevant to a query. (Navarro,
components of truth. Despite this general approach, there 2005)
are signiicant differences between the ideas of James,
Dewey, and Peirce. Thus in order to distinguish his Predeined Data Type
philosophical approach, C.S. Peirce labeled his doctrine The primitive data type that is built-in by the software
that concepts are to be understood in terms of their practical products. The examples are INTEGER, CHARACTER,
implications as pragmaticism. (Aarons, 2006) 4: The and so forth. (Pardede et al., 2005)
thoroughly practical view of praxis in which theory is not
separate from action but a component of useful action in Predicate Logic
its application to a certain situation. In human-computer Well-established universal declarative data and knowledge
interaction, this takes into account the hermeneutic nature representation language, with capacities of formalizing and
of product or system development and appropriation. automating deductive and other forms of logical reasoning.
(Kettley, 2006b) Its fundamental role for databases and particularly
integrity constraints is undisputed and indispensable.
Pranking/Posing (Decker, 2005)
Cyber-identity theft may also include seemingly
lighthearted pranksa less sinister form of identity Predicate Tree (P-Tree)
theft. Phony e-dating proiles may be a result of an online A lossless tree that is vertically structured and horizontally
prank, causing false expectations for interested e-daters. processed through fast multi-operand logical operations.
Posing as another on Instant Messenger is another prank (Perrizo, Ding, Serazi, et al., 2005)
where users misidentify themselvesoften to obtain
information not privy to the cyber-identity thief. (Close Predicate-Driven Transformation
et al., 2006) A couple <,p> where is a schema transformation and p
a structural predicate that identiies schema patterns. The
Pre-Computation goal of a predicate-based transformation is to apply to
This refers to pre-computing commonly required the patterns that meet p in the current schema. (Hainaut,
aggregates that are expensive to compute on the ly. 2005)
(Deshpande & Ramasamy, 2005)
Predicative Occurrence
In NKRL, a conceptual structure obtained from the
Preceptorship instantiation of templates and used to represent particular
Teaching or tutoring. (Kabene, Takhar, et al., 2005) elementary events. To take into account the Connectivity
Phenomena, conceptual labels denoting predicative
Precision occurrences can be associated within second-order
1: In terms of repeatability, the ability of the measurement structures making use of operators like CAUSE, GOAL,
process to duplicate the same object measurement and and COORD(ination). (Zarri, 2006c)
produce the same result. The high or low precision
that could be obtained is dependent upon the object of Prediction
interest and in many cases could be controlled by working 1: An output interface of a recommender system. Given
harder. (Y.-J. Zhang, 2005c) 2: The percentage of relevant a customer and a product, the system generates a score

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
534 Pre dic t ion Join Pre sc ript ive Ta xonom y

expressing the predicted liking in a scale the same as the Preference-Identiication Agent
ratings. (Sarwar et al., 2005) 2: Consists of approximating Comparison-shopping agent specializing in collecting
P unknown functions. The nets input is the values of the personal product and service review information, for
function variables, and the output is the estimation of the example, epinion.com. (Wan, 2006)
function image. (Mart, 2005)
Preferred Repair
Prediction Join A repair minimizing the value of the evaluation function
An operation in OLE DB for DM that inds the best f applied to the source database. (Greco et al., 2005)
prediction for a given input case and a given data-mining
model. (Zendulka, 2005c) Prefetching
The technique of deducing future client requests for objects
Predictive Judgment based on the current request, and bringing those objects
An assessment (prior to encountering an information into the cache in the background before an explicit request
object) based on existing knowledge, assumptions, or the is made for them. (Katsaros et al., 2005)
information objects surrogate, independent of assessments
based on characteristics of the object (evaluative Preprint
judgments). (Danielson, 2006c) Scientiic work before peer review. (Rennard, 2006)

Predictive Modeling Preprocessed Data


1: The process through which mathematical or numerical In preparation for data mining, data that have been through
technologies are utilized to understand or reconstruct preprocessing such as data cleaning or edit/imputation.
past behavior and predict expected behavior in the future. (Winkler, 2005)
Commonly utilized tools include statistics, data mining,
and operations research, as well as numerical or analytical Preprocessing
methodologies that rely on domain knowledge. (Ganguly The tasks of preprocessing for Web usage mining include
et al., 2005) 2: Use of statistical or data-mining methods to extraction, cleansing, transformation, sessionization, and
relate attributes (input features) to targets (outputs) using so forth. (Yao & Xiao, 2005)
previously existing data for training in such a manner that
the target can be predicted for new data based on the input Prescriptive Metadata
attributes alone. (Mani et al., 2005) 3: This data-mining Produced by a single expert or group of experts. (Pachet,
task makes predictions based on essential characteristics 2006)
about the data. The classiication task of data mining
builds a model to map (or classify) a data item into one Prescriptive Taxonomy
of several predeined classes. The regression task of data In educational theory and practice, an organizational
mining builds a model to map a data item to a real-valued scheme for specifying the optimal and appropriate
prediction variable. (Nayak, 2005a) approaches, types, events, methods, media, strategies,
techniques, activities, tasks, projects, scope, and sequence
Predictive Modeling Data-Mining Task of instruction to achieve corresponding speciic learning
Makes predictions based on essential characteristics about objectives and desired performance outcomes. While
the data. The classiication task of data mining builds a numerous scholars and practitioners across a wide range
model to map (or classify) a data item into one of several of associated instructional design ields have created a rich
predeined classes. The regression task of data mining variety of effective and eficient prescriptions for obtaining
builds a model to map a data item to a real-valued prediction speciic learning outcomes in speciic situations, to date
variable. (Nayak, 2005c) no single theory-grounded and research-veriied unifying
taxonomic scheme has successfully emerged to address
Predictive Rule all existing and potential educational problems across the
One of the set of standard if-then rules with the consequent phenomena of human learning. (Lasnik, 2005)
expressing some form of prediction about the output
variable. (Muruzbal, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pre se nc e Prim a r y Ta sk 535

Presence Pretty-Printing
1: A psychological phenomenon enabling the mental state of Rudimentary form of program visualization whose goal is
being there in either technologically mediated or imaginary to make source code easier to read by means of spacing,
P
spaces. (Sas, 2006) 2: The subjective sensation that one indentation, and layout. Pretty-printers are programs that
is present in a three-dimensional environment that is systematically indent the source code of a source program
mediated by digital technology. (Champion, 2006b) according to its syntactic structure and given aesthetic
rules. Sophisticated pretty-printers can also highlight
Presence Practice different parts of a program and even generate a program
Work practice that establishes the presence of a worker publication. (Pareja-Flores & Iturbide, 2005)
in the organization as seen by coworkers and managers.
(P.M. Leonardi, 2005) Pricebot
An intelligent agent that is used by an online seller to
Presentation determine a proit-maximizing price for a product that
1: In GIS, the set of properties of a geographic object that it sells. A pricebot encapsulates the pricing algorithm
deine its visual aspect, that is, the way the object is to used by an online seller and enables a seller to maintain
be shown to the user. Involves aspects such as color, line an edge over its competitors in a dynamically changing
type, line thickness, ill pattern, and others. (Davis et al., market scenario. (Dasgupta et al., 2006)
2005) 2: The sharing of information with others via spoken,
written, or online media. (St.Amant, 2005c) Primary Activity in the Knowledge Chain
One of the set of activities that an organizations knowledge
Presentation Environment processors perform via various practices and technologies
An integrated development environment that displays in manipulating knowledge assets within knowledge
selected patterns to the user when retrieved from the management episodes: acquiring, selecting, generating,
database, and offers different pattern processing and assimilating, and emitting knowledge. (Holsapple &
transformation tools. (Gaffar & Seffah, 2005) Jones, 2006)

Presentation Tool Primary Market


Any Web-based tool that enables students to post work for The market for new securities issues. In the primary
viewing by the learning community. (Morphew, 2005) market, the security is purchased directly from the issuer.
Includes IPOs (initial public offerings of shares to the
Preservice Teacher public). (Roofe, 2005)
Individual preparing to be a school teacher who does not
yet have a state teaching certiicate or license. (Wieseman, Primary Surveillance System (PSS)
2005b) Set of processes, methods, or devices that monitor
data, identifying events, their source agents, and their
Presumed Credibility relationships, to draw attention to possible anomalies and
A credibility assessment based upon general underlying potential non-compliance. (Goldschmidt, 2005)
assumptions about a system. (Danielson, 2006c)
Primary Task
Pretty Good Privacy (PGP) The resource consumption task that is of interest in a
1: A well-known application originally proposed by Phil secondary task study. Often (but not necessarily), the
Zimmermann for exchanging electronic mail or iles participant is asked to focus on the performance of this
over the Internet with privacy protection features. It uses task while concurrently performing the secondary task. For
public key cryptography to provide conidentiality and example, the participant could be asked to focus on reading
authentication of personal exchanged information. (Xu a passage of text on successive screens of a computer
& Korba, 2005) 2: An e-mail extension used to encrypt/ display (primary task) while concurrently pressing a
decrypt and cryptographically sign e-mail as well as to handheld button switch whenever a random beep sound
verify e-mail signatures. Veriication of a signature is a is heard (secondary task). (Owen, 2006c)
proof of sender identity and message authenticity. (Pulkkis,
Grahn, & strm, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
536 Prim a r y We b Dat a Princ iple of Good Pra c t ic e

Primary Web Data is equivalent to singular value decomposition on the


Includes actual Web contents. (Nayak, 2005c) covariance matrix of the data. (Denton, 2005)
P
Priming Agent Principal Curve
Refers to any structural feature of a learning environment A smooth, curvilinear summary of p-dimensional data.
that increases the likelihood that active learning will take It is a nonlinear generalization of the irst principal
place. (Mitchell, 2005c) component line that uses a local average of p-dimensional
data. (Burr, 2005a)
Principle
Idea that can assist learners in recognizing and connecting Principal Direction Divisive Partitioning
ideas, and in seeing how new and old ideas relate. (Dexter, (PDDP)
2005) One-shot clustering technique based on principal
component analysis and singular value decomposition
Principal Component Analysis (PCA) of the data, thus partitioning the dataset according to the
1: Computes the eigenvectors for principal components direction of maximum variance of the data. It is used here
and uses them to transform a matrix X into a matrix Y, in order to initialize K-means. (Liberati et al., 2005)
whose columns are aligned with the principal components.
Dimensionality is reduced by discarding columns in Y Principle of Autonomy
with the least variance or energy. (Thomasian, 2005b) 2: Each organizational unit should be granted a high degree
One of the oldest modeling and dimensionality reduction of autonomy to manage its local knowledge. Autonomy
techniques. PCA models observed feature data as a linear can be allowed at different levels, the most important of
combination of a few uncorrelated, Gaussian principal which is the semantic level. Semantic autonomy allows
components and additive Gaussian noise. (Aradhye the unit to choose the most appropriate conceptualization
& Dorai, 2005) 3: Rearrangement of the data matrix of what is locally known (e.g., through the creation of
in new orthogonal transformed variables ordered in personalized knowledge maps, contexts, ontologies, etc.).
decreasing order of variance. (Liberati et al., 2005) 4: (Cuel et al., 2006)
Given a dataset, PCA determines the axes of maximum
variance. For example, if the dataset were shaped like Principle of Coordination
an egg, then the long axis of the egg would be the irst Each unit must be enabled to exchange knowledge with
principal component, because the variance is greatest in other units, not through the adoption of a single common
this direction. All subsequent principal components are interpretation schema (this would be a violation of the
found to be orthogonal to all previous components. (Oza, principle of coordination), but through a mechanism of
2005) 5: A method that can be used to simplify a dataset. It mapping other units contexts onto its context from its own
is a transform that chooses a new coordinate system for the perspective (that is, by projecting what other units know
data set, such that the greatest variance by any projection onto its own interpretation schema). (Cuel et al., 2006)
of the data set comes to lie on the irst axis (then called the
irst principal component), the second greatest variance on Principle of Least Privilege Access Policy
the second axis, and so on. PCA can be used for reducing Equivalent of need-to-know security policy related
dimensionality. PCA is also called the Karhunen-Love to the role-based security access model. (Janczewski &
transform or the Hotelling transform. (Lovell & Chen, Portougal, 2005)
2005) 6: Transforms one vector space into a new space
described by principal components (PCs). All the PCs are Principle of Maximum Entropy
orthogonal to each other, and they are ordered according A method to complete incomplete probabilistic knowledge
to the absolute value of their eigenvalues. By leaving out by minimizing the amount of information added. (Kern-
the vectors with small eigenvalues, the dimension of the Isberner, 2005)
original vector space is reduced. (Chu & Wang, 2005) 7:
A mathematical method based on statistics to extract the Principle of Good Practice
main behaviors of a set of data. (Volino et al., 2005) 8: One of the set of guidelines for institutions, state agencies,
The projection of the data set to a hyper plane that preserves and accreditors on the institutional responsibilities for
the maximum amount of variation. Mathematically, PCA

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Print Disa bilit y Priva cy a ga inst Dat a M ining 537

distance learning support to learners and faculty. (S.M. Prioritization


Johnstone, 2005) Certain packets or data lows may be given higher priority in
accessing the medium or in being queued for transmission.
P
Print Disability (DaSilva, 2005)
Comprises all those disabilities that make it dificult,
or impossible, to read printed text. The term includes Privacy
visual impairment and blindness; cognitive disabilities, 1: Humans claim or desire to control access to themselves
such as dyslexia; and certain motor-control impairments. or information about them; privacy is broader than
(Schmetzke, 2005) conidentiality, and it includes interest in information
protection and control. (Goodman, 2005) 2: Measures or
Prior Art regulations created to protect the individual in relation to
Higher education has a long tradition of valuing ideas, not data collection, unauthorized use of recorded information,
just economic value (as in patent laws). Prior art refers to and improper access and errors in data collection. (Scott et
the intangible ideas (instantiated in the earlier publications) al., 2006) 3: The interest that individuals have in sustaining
prior to the commencement of a project, such as the An@ a personal space, free from interference by other people
tomedia project. It was the basis of these earlier ideas that and organizations. It is the interest an individual has
formed the nucleus of the design philosophy and inluenced in controlling, or at least signiicantly inluencing, the
the manner in which the developers reached agreement on handling of data about themselves. (Sharma, 2006a) 4:
design decisions. (Williamson et al., 2006) The private requirements of individuals. It includes all of
the individuals concerns regarding the collection, control,
Prior Information and use of personal information. (Xu & Korba, 2005) 5:
Existing knowledge about a phenomenon under Process of ensuring that information deemed personal to
investigation. This knowledge can be incorporated into an individual is protected. (Thuraisingham, 2005) 6: Right
a statistical analysis using probability distributions. of the individual to be protected against intrusion into his
For instance, in a hierarchical Bayesian model, prior personal life or affairs, and the individuals right to decide
information is the set of probability distributions of the what personal data of him or herself can be accessed and
parameters in the model. (Vidal-Rodeiro et al., 2005) used publicly by others. (Oermann & Dittmann, 2006)
7: Socially deined ability of an individual to determine
Prior Knowledge whether, when, and to whom personal information is to be
1: An individuals collected store of knowledge prior to released. (Cremonini et al., 2006) 8: The need to secure for
exposure to a hypertext or other body of information. the individual the right to be left alone or as the state or
(Shapiro, 2006) 2: Knowledge, no matter how limited, a condition of limited access to a person. A classic deinition
pupil has at the beginning of a new topic. This knowledge describes privacy as the claim of individuals, groups, or
will have been gathered over time in a variety of ways. institutions to determine for themselves when, how, and
Some prior knowledge may be lawed or inaccurate, which to what extent information about them is communicated
leads to the need for restructuring schemas. (Pritchard, to others. (Signoret, 2006) 9: The right of an individual
2005b) to determine when, how, and to what extent his or her
personal information is communicated to others. (Yee
Prior Learning & Korba, 2006) 10: The right to be left alone and the
Refers to the knowledge, skills, and abilities that students right to control and manage information about oneself.
have acquired prior to enrolling in a college program. (T. Stern, 2005)
(D.B. Johnstone, 2005)
Privacy against Data Mining
Prior Probability Preserving the privacy of individuals against data-mining
Probability distribution of a characteristic prior to tools when disclosed data contain private information that
observing data. Way of formalizing current knowledge could be extracted by data-mining tools. (Saygin, 2005)
about that characteristic. (Rippon & Mengersen, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
538 Priva cy I m pa c t Asse ssm e nt (PI A) PRN

Privacy Impact Assessment (PIA) Private Chat Room


Proactive tool that looks at both the policy and technology A virtual private place for authorized users to communicate
P risks, and attempts to ascertain the effects of initiatives with each other in real time via the computer while
on individual privacy. (Sockel & Chen, 2005) connected to the Internet. (Kung-Ming & Khoon-Seng,
2005)
Privacy Policy
A disclaimer placed on Web sites informing users about Private Key
how the organization handles ones personal information. That key (of a users public-private key pair) known only
(Cannoy & Iyer, 2006) to the user. (Guan, 2005c)

Privacy Protection Private Sector


Guarantees that shared personal information will not be Refers to businesses engaged in commerce for the sole
shared with other parties without prior approval. (Lowry, purpose of making a proit and increasing shareholder
Stephens, et al., 2005) wealth. (Singh, 2005)

Privacy Rule Private Space


Addresses the need for health care organizations to allow Off-line, private space refers to geographical areas that are
patients to choose how their information is disclosed. not for general or public use (e.g., your home). Online, the
(Cannoy & Salam, 2006) term is commonly used to refer to virtual environments,
or parts of virtual environments that have restrictions on
Privacy Seal who may access them. (Roberts et al., 2005)
1: A seal that a business may put on its Web site (i.e.,
VeriSign or TRUSTe) to show that it is a trustworthy Private Workspace
organization that adheres to its privacy policies. (T. Part of the CSCL system, usually represented as a
Stern, 2005) 2: A third-party icon that indicates they designated window in the systems GUI, where a member
have inspected the Web site privacy policies and found of the learning group builds his/her own solution of the
them not to be out of line with the industry. (Sockel & problem the group solves collaboratively, and where he/she
Chen, 2005) can also take notes, consider alternative solutions, and
prepare contributions to the group solution. (Devedi,
Privacy-Preserving Data Mining 2006)
1: Algorithms and methods used to mine rules from a
distributed set of data in which the sites reveal detailed Privatization
information as less as possible. (Jha & Sural, 2005) 2: The transfer of government, public-owned, or controlled
Performing the data-mining task on private data sources institutions and entities to private enterprise. This was
(centralized or distributed). (Saygin, 2005) 3: Data-mining a common public policy in Latin America during the
techniques that extract useful information, but at the same 1990s to generate hard currency and support deregulation.
time ensure the privacy of individuals. (Thuraisingham, (Ochoa-Morales, 2005)
2005)
Privilege
Private Branch Exchange (PBX) In a Project Management Institute (PMI), a privilege can be
A private telephone network used within an enterprise. deined as an electronic right given to users enabling them
(Shuaib, 2005) to access various resources. (Mundy & Otenko, 2005)

Private B2B Exchange Privilege Delegation


An e-marketplace created by a single company to provide The process by which a privilege given to one party can
e-business capabilities to its business units and preferred be transferred to another party either for an indeterminate
trading partners. (Mockler et al., 2006) or deinite period of time. (Mundy & Otenko, 2005)

PRN: See Pseudo Random Noise.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Proa c t ive Com put ing Proble m 539

Proactive Computing probabilistic density function (called uncertain pdf) that


A research agenda of developing interconnected devices describes the distribution of the values within the interval.
and agents, equipped with faster-than-human-speed (Cheng & Prabhakar, 2005)
P
computing capabilities and means to affect real-world
phenomena that a user can monitor and steer without a Probability
need to actively intervene in all decision-making situations. A number between 0 and 1 attached to a logical proposition
By raising the user above the traditional human-computer that represents the degree of truth in that proposition.
interaction loop, eficiency and freedom from distraction (Laura, 2005)
are expected to be enhanced. (Oulasvirta & Salovaara,
2006) Probability Density Function
A function that can be summed (for discrete-valued
Probabilistic Conditional random variables) or integrated (for interval-valued random
A conditional that is assigned a probability. To match variables) to give the probability of observing values in a
the notation of conditional probabilities, a probabilistic speciied set. (Burr, 2005b)
conditional is written as (B|A)[x] with the meaning If A
holds, then B holds with probability x. (Kern-Isberner, Probability Density Function Estimate
2005) An estimate of the probability density function. One
example is the histogram for densities that depend on
Probabilistic Graphical Model one variable (or multivariate histograms for multivariate
A graph with nodes representing stochastic variables densities). However, the histogram has known deiciencies
annotated by probability distributions and representing involving the arbitrary choice of bin width and locations.
assumptions of conditional independence among its Therefore, the preferred density function estimator, which
variables. (Ramoni & Sebastiani, 2005) is a smoother estimator that uses local weighted sums with
weights determined by a smoothing parameter, is free from
Probabilistic Model bin width and location artifacts. (Burr, 2005a)
A classic model of document retrieval based on a
probabilistic interpretation of document relevance (to a Probability Distribution
given user query). (Denoyer & Gallinari, 2005) A function that assigns a probability to each value that a
random variable can take, fulilling Kolmogorovs axioms.
Probabilistic Neural Network (de Campos et al., 2005)
One of the many different kinds of neural networks with
the application area to classify input data into different Probability Value
classes. (Fischer, 2005) A statistical measure that attempts to assess whether an
outcome is due to chance or whether it actually relects
Probabilistic Query a true difference; a value less than 5% means that a
A query which assumes data are characterized by relationship very likely exists and the result probably did
probabilistic uncertainty, and returns query answers not occur by chance. (Benrud, 2005)
augmented with probability values. (Cheng & Prabhakar,
2005) Probe Array
One of a list of labeled, single-stranded DNA or RNA
Probabilistic Threshold Query molecules in speciic nucleotide sequences which are
A probabilistic query with probability threshold , where used to detect the complementary base sequence by
only objects with probability values greater than are hybridization. (Fung & Ng, 2005)
included in the answer. (Cheng & Prabhakar, 2005)
Problem
Probabilistic Uncertainty A situation in which someone wants something and does
A model of sensor uncertainty, where each data value not immediately know what actions to take to get it.
is represented by its uncertain interval, together with a (Andrade et al., 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
540 Proble m Sc e na rio Proble m -Solving Orie nt e d Le a r ning (PSOL)

Problem Scenario involves knowing what we need to know, knowing what


A textual description of a problem observed in a community we know, knowing what we do not know, and devising
P studied, which has the form of a story that illustrates the strategies to bridge these gaps. (Vat, 2005c) 3: PBL was
problem and possible solution alternatives. (Rodrguez- irst used by medical faculty to help medical students
Elias et al., 2006) learn through real-life cases. This method emphasizes
the learning process in which students actively engage in
Problem Solving collecting information and working through a problem.
1: A situation involving an initial state, a goal (or solution) Students are not working alone, as they can build their
state, and a blockage between the initial and goal states that own understanding under the guidance of instructor, but
requires the construction of new knowledge to proceed from the instructor does not do the building for them. (Chu,
the initial to the goal state. (Nason & Woodruff, 2005b) 2005) 4: A pedagogical strategy for posing signiicant,
2: An approach which treats all problems as independent contextualized, real-world situations, and providing
of human viewpoints and, effectively, as solvable using resources, guidance, and instruction to learners as they
scientiic or pseudo-scientiic methods. (Clarke, 2006) 3: develop content knowledge and problem-solving skills.
The application of new knowledge to existing problems, (Donnelly, 2005) 5: A loosely structured instructional
which results in an improvement in eficiency or lowering of approach that allows students to investigate complex
the production cost. Usually, a problem exists that requires problems, and propose and possibly implement solutions.
resolving. Alternatively, we can apply knowledge from (Glick, 2005b) 6: An active learning strategy that may be
another arena to an existing problem, which results in a suitable for better preparing information systems students
different way of doing things. (Fong, 2006a) for professional practice. In the problem-based approach,
complex, real-world problems or cases are used to motivate
Problem Structuring students to identify and research concepts and principles
The recognition that certain problems cannot be solved they need to know in order to progress through the
in the above sense, but need to be made sense of through problems. Students work in small learning teams, bringing
debate. (Clarke, 2006) together collective skill at acquiring, communicating,
and integrating information in a process that resembles
Problem Structuring Method that of inquiry. (Lowry & Turner, 2005) 7: An approach
In workshops run using a problem structuring method to learning based on cognitively based learning theories
approach, instead of the participants talking about the in which teachers encourage students to learn by actively
issues in an unstructured format, the facilitator modeled engaging them in instructional strategies that focus on
the groups knowledge in the form of mind maps. The problem solving, and the knowledge is developed as a
facilitator led the participants through a process enabling consequence of trying to solve the problem. (Gillani,
them to share, synthesize, and learn from structuring group 2005b) 8: Students are confronted with a well-chosen,
knowledge. (Shaw et al., 2006) ill-structured problem that mirrors real-world problems.
Students deine problems, identify what information is
Problem-Based Learning (PBL) needed, and engage in solution generation and decision
1: A concept in which students focus from the beginning making. (Jennings et al., 2005)
of their course on a series of real professional issues,
where the knowledge of the various academic disciplines Problem-Solving Environment
that relate to these issues is integrated. (Lewis, 2005) A computer system that provides all the computational
2: A teaching strategy designed to help students learn facilities needed to solve a target class of problems. (Unal
problem-solving skills and content through using a problem et al., 2006)
(often, a genuine real-life one) as a focal point for student
investigation and inquiry. PBL is often implemented Problem-Solving Oriented Learning (PSOL)
through encouraging students to work cooperatively in Learning not only to build up suficient understanding
teams to experience shared creation and collective problem for planning and performing problem-solving processes,
solving. An important goal of PBL is the development but also to gain the capacity of making eficient problem-
of self-directed learning in students when they become solving processes according to a sophisticated strategy.
aware of and take control of their learning progress. (Seta, 2006)
Self-directed learning is a form of meta-cognition, which

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Procedural Factor Process Gratiication 541

Procedural Factor Process Activity


Inaccurate classification of new data, resulting in One of a series of linked activities that transform inputs
classiication error or omission. (Brown & Kros, 2005) into outputs (operations management deinition). (Blicker,
P
2005)
Procedural Information
Easily codiiable information that depicts the steps or Process Architecture
protocols that are required to conduct a business process Describes the ordering, interfaces, interdependencies,
or perform a service. (McIntosh & Siau, 2005) and other relationships among the process elements in
a standard process. Process architecture also describes
Procedural Knowledge the interfaces, interdependencies, and other relationships
1: A type of spatial knowledge dealing with the navigational between process elements and external processes (CMMI).
actions required in order to follow a particular route to (Gibson, 2005)
a destination. (Sadeghian et al., 2006) 2: The knowledge
to perform tasks. It shares a dimension with declarative Process Consultation
knowledge. The latter may be the result of processing The skills we can identify as characteristic of the ideal OD
(i.e., the application of procedural knowledge), or it may professional result from speciic training in three obvious
exist as stored data, requiring no further processing. skills: process consultation, diagnostic ability, and research
(Ein-Dor, 2006) methods. Process consultation is a method that enables
the OD practitioner to engage organization members in
Procedural Link diagnosis, and by collecting and analyzing information
A link between an object and a process expressing the through a variety of methodological techniques, including
behavior of the system. (Dori, 2006) the use of statistics, survey techniques, and force ield
analysis. (Grieves, 2006b)
Procedural Model
A model seeking to analyze a certain process, business Process Deinition
process reorganization in this context, in order to identify Consists of a network of activities and their relationships,
distinct stages and steps which require the application of criteria to indicate the start and termination of the process,
certain tools and methods. (Becker et al., 2006) and information about the individual activities. (De Lucia
et al., 2006)
Procedural Semantics
A method for the translation of a question by a computer Process Enactment
program into a sequence of actions that retrieve or combine A worklow management system is said to enact the
parts of information necessary for answering the question. real-world process for each process instance. (Pinheiro,
(Kontos & Malagardi, 2006) 2005)

Procedure Process Function of the Management of Online


A rule that governs a formal organizational process. Discussions
(Murphy, 2005c) All tasks that have to do with the discussion process as a
cooperative, purposeful activity. (A.R. Edwards, 2005)
Process
1: A set of linked activities that collectively realize an Process Gratiication
objective or policy goal. (Berztiss, 2006a) 2: A thing Enjoyment of media use, as distinguished from enjoyment
that represents a pattern of object transformation. (Dori, of speciic message content. This is much the same as
2006) 3: Indicates what tasks must be performed and in channel suring or Web browsing, with no goal other
what order to complete a case. (Dustdar, 2005) 4: Set than entertainment through engaging in the activity.
of interrelated activities through which an organization (Stafford, 2005)
transforms inputs into value-added outputs. Inputs and
outputs can be tangible (e.g., materials, parts) or intangible
(e.g., services, information) items. (Kock, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
542 Proc e ss Group (PG) Proc e ss-Leve l M ode l

Process Group (PG) Process Orientation


A grouping of project management processes; for PMI, Recognition of series of functions that carry out an
P there are five process groups: Initiation, Planning, overriding task by providing the customer with a
Executing, Controlling, Closing. (D. Brandon, 2005b) meaningful result. (Framinan, 2005)

Process Improvement Process Redesign


A program of activities designed to improve the 1: A task in which a group selects, analyzes, and
performance and maturity of the organizations processes, conceptually redesigns one or more business processes.
and the results of such a program. (Gibson, 2005) (Kock, 2006) 2: Approach to organizational improvement
through transformation of business processes. The term
Process Integration refers to business process change approaches emphasizing
1: Deining and automating interfaces between different gradual change (e.g., total quality management) or radical
business processes explicitly. (Kurbel, 2005) 2: The degree change (e.g., business process reengineering). (Kock,
of problem-critical information sharing and transmission 2005)
across different departments, and the combination of two
or more stages in producing or distributing a particular Process Redesign Group
product. (Wang & Forgionne, 2006) A temporary group of a certain size engaged in a process
redesign task. In one study, groups had 7 to 13 members
Process Intelligence and took an average of 41 days to be completed. (Kock,
The ability of the business processes to perceive and act in 2006)
the surrounding environments, to respond to the prevailing
circumstances in dynamic business situation, and to learn Process Reengineering
and improve the process with prior experiences. (Wang An exercise by which organizational processes are radically
& Forgionne, 2006) re-designed and changed. Instead of automating existing
processes, organizations are encouraged to question
Process Lifecycle Management existing practices, eliminate unnecessary steps in the
Activities undertaken for the proper management of worklow, streamline activities, and introduce a paradigm
processes such as identiication, analysis, improvement, shift in the organization. (Tarafdar, 2005)
implementation, execution, and monitoring. (Sundaram
& Portougal, 2005a) Process Resource
An object that represents a resource used by a role in
Process Management order to perform a task in isolation from other tasks.
1: Aims at codesigning organizations and information (Daneshgar, 2005)
systems. (Becker et al., 2006) 2: Allows deining speciic
invocation sequences of back-end application systems in Process-Based Evaluation
the context of Enterprise Application Integration (EAI). A type of evaluation used to understand how a program
(Bussler, 2005b) 3: Strong functional orientation does works, as well as its strengths and weaknesses. (Nelson,
not nowadays meet customer needs. The aim of process 2005)
management is to overcome functional barriers and to
deliver the results customers desire. (Hofer, 2006) Process-Based Role
The combination of a set of expected work-related
Process Modeling behaviors, responsibilities, and the associated set of
Collection of techniques used to model systems behavior. required competencies to perform within business settings
These models help in analyzing the current state of in order to achieve organizational goals. (Rentroia-Bonito
organizations as facilitators of organizational learning. & Jorge, 2005)
(Rodrguez-Elias et al., 2006)
Process-Level Model
A second-level model in the REA ontology that documents
the semantic components of all the business process events.
(Dunn & Grabski, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Proc e ssor Pe r Tra ck /H e a d/Disk Produc t ion 543

Processor Per Track/Head/Disk product should be located in at least one product group,
The last organization corresponds to active disks. and product groups are often compared to classiication
(Thomasian, 2005a) systems because of their similar nature. Both offer a set of
P
categories to arrange items. Product groups are dependent
Procurement on the catalog creator. Normally, each catalog has its own
Arranging for the supply and purchase of goods or services. taxonomy and terminology, and therefore deines its own
(Foley & Samson, 2006) set of groups. Contrary to this, classiication systems are
standardized and do not change from catalog to catalog.
Product (Abels & Hahn, 2006)
A combination of tangible goods, intangible services, and
information that satisies consumers needs and wants. Product Lifecycle
(Waterson, 2006) The evolution of a product from conception onward.
(Knight, 2006a)
Product Brokering
In commerce, a product broker is a party that mediates Product Lifecycle Management (PLM)
between a buyer and a seller. A broker who also acts as a 1: Including Product Data Management (PDM), enables
seller or as a buyer becomes a principal party to the deal. enterprises to bring innovative and proitable products
(Guan, 2006d) to market more effectively, especially in the evolving e-
business environment. PLM enables enterprises to harness
Product Conigurator their innovation process through effective management
Information system that supports customers during (online) of the full product deinition lifecycle in their extended
product customization and the order-taking process, enterprises. (Mller, 2005) 2: An approach whereby
especially in e-business. It has the logic capabilities to engineers and product designers are integrated into
create, maintain, and apply electronic product models in the sales process at one end of the cycle, to allow better
order to deine all of the possible variants of a product and translation of customer requirements, and to manufacturing
to display them to the customer. (Blecker, 2006b) at the other end of the cycle, to facilitate the development
of eficient production processes. The lifecycle is derived
Product Curve from the notion of managing product design from inception
This tool takes a micro view of transitioning requirements through to execution and eventually retirement. (Carton
or attributes that successive solutions must adhere to in & Adam, 2005)
order to win in the future marketplace. (Nugent, 2005)
Product Localization
Product Design Optimization of a product for a speciic target culture; could
An overall term that covers the study and execution also be the development of a product only and alone for
of design pertaining to physical products. (Knight & this speciic target culture (not so often). (Rse, 2006a)
Jefsioutine, 2006)
Product Modularity
Product Evaluation An attribute of the product that characterizes the ability to
The emphasis at this level is on the technical product, mix and match independent and interchangeable product
software, IT solution, or information system. The concern building blocks with standardized interfaces in order to
at this level is to measure to what extent the IT solution create product variants. (Blecker & Abdelkai, 2006)
meets its technical objectives. The emphasis here is on
eficacy: Does the chosen tool work? Does it deliver? Product/Service Quality
(Abu-Samaha, 2005) The totality of features and characteristics of a product or
service that bear on its ability to satisfy stated or implied
Product Group needs. (Shan et al., 2006a)
A group containing several products. Furthermore, it can
contain a set of sub-groups and can therefore be connected Production
to a parent group. Typically, each electronic product Function of (industrial) irms consisting of creating a
catalog contains at least one set of product groups. Each transformation system and combining internal and external

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
544 Produc t ion Conc e pt Profe ssiona l Deve lopm e nt U nit (PDU )

resources by applying technological and conceptual worklows often deal with known items. (Subramanian,
procedures in order to generate goods and services for 2005)
P further possessing and/or as a marketable output for serving
the customer. (Blecker, 2006a) Productivity
A measure of the performance of the production process
Production Concept in transformation of the input of resources to the output
In theory, a well-founded guiding idea based on empirical of goods and services. (Mitchell, 2005b)
knowledge, where it is appropriate, on the organization,
planning, control, and evolution of production systems Productivity Paradox
with the main objective of enhancing the competitiveness 1: Despite large investments in IS/IT over many years,
of the irm. (Blecker, 2006a) there have been conlicting reports as to whether or not
the IS/IT beneits have actually occurred. (Lin & Pervan,
Production Function of Value Chain 2005) 2: Major information technology investments with
One of three functions of a value chain that produce the negative or zero documented returns. (Dykman, 2005)
result that contributes to the accomplishment of its mission. 3: The discussion about the lack of evidence about the
(Chuang, 2006) return of investments on IT in the economy productivity
indicators. (Barbin Laurindo et al., 2005)
Production Portal
The linking of all available information systems into Professional Association
one standardized screen. Production portals aggregate A formal or informal grouping of individuals, for-
heterogeneous systems in manufacturing and provide proit businesses, governmental agencies, or non-proit
secure, structured, and personalized information for organizations that all possess similar levels of skill and
individual users (e.g., based on job functions). (Blecker knowledge regarding one or more topics of mutual interest.
& Graf, 2006) Interactions among members generally serve not only to
enhance individual members skills or knowledge, but
Production Rule also to further the cause of the association as a whole.
A tree path characterized by a sequence of predictor (Baim, 2006c)
interactions yielding to a speciic label class/value of the
response variable. (Siciliano & Conversano, 2005) Professional Community
Collaborative activities among a schools faculty members
Production System that focus on meaningful, shared issues in a school and
Subsystem of the enterprise for the transformation of also emphasize how each individual staff member can take
input factors (e.g., goods and services) into output factors responsibility for its achievement. (Dexter, 2005)
(e.g., tangible goods and services), in order to satisfy a
customer need. The production system itself consists of Professional Development
two basic subsystems: the management subsystem and the 1: A planned, comprehensive, and systemic program of
operation subsystem. These subsystems are interconnected goals-driven, competency-based training activities that
and interwoven by an information system. The operation promotes productive change in individuals and school
subsystem deals with the original transformation processes structures. The activities are interrelated and cumulative,
and includes all facilities, machines, logistical equipment, complement the schools and districts vision/strategic
and employees (blue-collar workers). The management mission, and relect all key constituencies. (Bober, 2005)
subsystem is responsible for the short-run (operational) 2: The National Staff Development Council deines this
design, planning, and control of the entire operation as the term that educators use to describe the continuing
subsystem. (Blecker, 2006a) education of teachers, administrators, and other school
employees. (Dexter, 2005)
Production Worklow
The ability for metadata to be added throughout the lifecycle Professional Development Unit (PDU)
of digital asset handling (captioning, or cataloging), A unit of continuing education for certiied project
with appropriate knowledge management capabilities managers. (D. Brandon, 2005b)
to establish standardization and consistency. Production

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Profe ssiona l Dist a nc e (PD) Progra m Ana lysis 545

Professional Distance (PD) Proile


Comprises behavioral differences among managers from 1: An organized data set of information on users or items.
different departments. (Choudhary, 2005) (Chen & McLeod, 2006) 2: Describes the users interests
P
and preferences in terms of themes (sports, cinema, news,
Professional/Intellectual Value Chain etc.). (Kacimi et al., 2005)
Value chains in this category are mainly for members
engaged in intellectual activities and are usually established Proile Database
by companies or associations in knowledge-intensive Collection of customer preference data, possibly along
industries as their knowledge network. (Chuang, 2006) with the customers demographic information. (Sarwar
et al., 2005)
Professional Knowledge
Knowledge or intellect applied by people employed in Proile/User Proile
professional services irms in their endeavor to meet the A set of keywords or concepts describing a user or
demands of their clients. Professional knowledge develops organizations intelligence needs through which proile-
through statesknow-what, know-how, know-why, and based intelligence-gathering tools ilter information.
care-why. Value of the application of such knowledge to the (Parker & Nitse, 2006)
professional irm and client increases in later knowledge
states. (Fink & Disterer, 2006) Proiling
Capturing an individual users interests and needs. (Quah,
Professional Mode Leow, & Yong, 2006)
In professional mode, professionals in the operating core
(e.g., doctors, professors) rely on roles and skills learned Proit Mining
from years of schooling and indoctrination to coordinate 1: In a general sense, proit mining refers to data mining
their work. (Rada, 2005) aimed at maximizing a given objective function over
decision making for a targeted population (Wang, Zhou,
Professional Service & Han, 2002). 2: Finding a set of rules that pass a given
A company delivering business consulting services, threshold on some interestingness measure (such as
including computer and related activities, research and association rule mining or its variation) is not proit mining
development, and other business activities such as legal, because of the lack of a speciic objective function to be
accounting, marketing, advertising, and engineering. maximized. Classiication is a special case of proit mining
(Bolisani et al., 2006) where the objective function is the accuracy, and the
targeted population consists of future cases. One example of
Professional Service Firm a speciic problem of proit mining is building a model for
Firm formed to meet the demands of clients, such as recommending target products and prices with the objective
lawyers, public accountants, inancial advisers, and so of maximizing net proit. (Zhou & Wang, 2005)
forth. They can be of different sizes ranging from sole
professional to multi-national irms. They can be run by a Program
sole professional or in partnership with other professionals. 1: A set of academic courses required for the award of
(Fink & Disterer, 2006) an academic degree; for example, MBA. (Murray &
Efendioglu, 2005) 2: A social endeavor to reach some
Professional State Forum (PSF) predeined goals and objectives. A program draws on
Involves the public executives who focus on speciic personal, social, and material resources to alter or preserve
practices within the state. These PSFs can cut across the context in which it takes place. (Nash et al., 2005a)
agencies or function at an internal level. (Falivene &
Kaufman, 2006) Program Analysis
Offers static compile-time techniques for predicting safe
Professor Interactivity and computable approximations to the set of values or
For real learning to occur in this environment, the instructor behaviors arising dynamically at run-time when executing
must be as engaged as the learner. (Rogers, 2005b) a program on a computer. (Tan & Zhao, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
546 Progra m Exe c ut ion Progre ssive I nquir y

Program Execution execution paths, and complex queries. (Raisinghani,


To make a computer follow the instructions stated in the 2005)
P program. It is also known as running a program. (Pareja-
Flores & Iturbide, 2005) Programmed Branching
A method whereby the student is taken to one of several
Program Evaluation possible explanations or discussions depending on the
The concern at this level is to measure whether the program qualities of an answer that is given to a question. Gating
aims have been met and whether the correct aims have is a simple skip of frames which repeat prior information
been identiied. (Abu-Samaha, 2005) when a students answers suggest that the material has
been adequately learned. (Owen & Aworuwa, 2005)
Program Quality
The success of an online course/program/training is Programmed Instruction (PI)
closely connected with the attention to detail in the design 1: Instruction that involves the identiication of precise
process of that course/program. This includes a needs behavioral objectives, the step-by-step sequencing of
assessment to understand the speciic needs of the learners tasks in order to achieve these objectives, and evaluation
and the assimilation of relevant content. (MacDonald et and feedback at each step. (Lazarus, 2005a) 2: Sometimes
al., 2005) called programmed learning, programmed instruction is
a book or workbook that employs the principles proposed
Program Testing by Skinner in his design of the teaching machine, with a
To execute a program in order to check whether it is correct special emphasis on task analysis and reinforcement for
with respect to its speciication. Testing requires a previous correct responses. (I. Chen, 2005)
planning to design input data that cover all or almost all
of the cases. (Pareja-Flores & Iturbide, 2005) Programmed Logic for Automatic Teaching
Operations (PLATO)
Program Theory A Computer-Assisted Instruction (CAI) system produced
A set of assumptions underlying a program that explains by the University of Illinois, the Control Data Corporation,
why the planned activities should lead to the predeined and the National Science Foundation. Courses authored
goals and objectives. The program theory includes in the TUTOR scripting language ran on a time-
activities directly implemented by the program, as well shared mainframe servicing hundreds of concurrent
as the activities that are generated as a response to the plasma-display-based terminals. PLATOs user-to-user
program by the context in which it takes place. (Nash et communications tools were predecessors to synchronous
al., 2005a) communications tools prevalent in todays learning
management systems. (Reisman, 2006)
Program Tracing
To follow the execution of a program under control of Programming Language
the programmer. It is usually carried out with incorrect A formal language in which computer programs are written.
programs in order to debug and ix them. Typically, there are The deinition of a particular language consists of both
different operations that allow the programmer to control syntax (which refers to how the various symbols of the
the pace of program execution and to watch the state of language may be combined) and semantics (which refers to
different structures. (Pareja-Flores & Iturbide, 2005) the meaning of the language constructs). (Prata, 2005)

Program Visualization Progressive Encoding


Visualization of a piece of software so that the representation Video format that downloads the entire media ile to the
has a close relationship to the source code. (Pareja-Flores client before any displaying occurs. (Vitolo et al., 2005)
& Iturbide, 2005)
Progressive Inquiry
Program-Level Analysis A pedagogical model for structuring and supporting a
Enables the structure and interrelationships within group of learners in a deepening question-explanation
programs to be revealed. The program focuses on variable process. (Muukkonen et al., 2005)
usage, paragraph calls diagrams, GO TO diagrams,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Proje c t Proje c t M a na ge m e nt M at urit y M ode l (PM M M ) 547

Project students gain subject-speciic knowledge and also enhance


1: A temporary sequence of related activities that produces their metacognitive caliber. (Kwok Lai-yin & Tan Yew-
a unique product or service. (Brewer, 2005) 2: A unique Gee, 2005)
P
set of coordinated, goal-oriented activities that brings
about change. A project has deinite starting and inishing Project Management (PM)
points, and is undertaken by an individual or team within 1: The process of planning for organizing and controlling
deined parameters of time, cost, and quality. (Ragsdell, projects. The multidisciplinary team approach in project
2006) 3: An assignment or task that needs to be tackled management means that there are different levels of
by a group of people. Projects usually have clearly set teams: the executive steering team, the project steering
objectives, a ixed timescale, and limited resources. team, and the project work team. Different teams have
(Fong, 2006b) 4: A temporary endeavor in which human, their own tasks. (Hyrinen & Saranto, 2005) 2: The
material, and inancial resources are organized in a novel application of knowledge, skills, tools, and techniques to
way, to undertake a unique scope of work for a given project activities in order to meet or exceed stakeholder
speciication, within constraints of cost and time, so as needs and expectations of a project. (Brewer, 2005) 3: The
to achieve beneicial changes deined by quantitative and application of knowledge, skills, tools, and techniques to
qualitative objectives. (Oshri, 2006) project activities in order to meet or exceed stakeholder
needs and expectations of that project. (D. Brandon, 2005b)
Project Critical Success Factor 4: The ensemble of activities concerned with successfully
One of the inluences on the success, or otherwise, of a achieving a set of goals. This includes planning, scheduling,
project. A distinction can be made between the underlying and maintaining progress of the activities that comprise
factors, or causes of success or failure, and the symptoms the project. (Colmenares & Otieno, 2005)
of an ineffective project management process. The lack
of top management support is a typical project critical Project Management Body of Knowledge
success factor, which can lead to a variety of symptoms, (PMBOK)
such as adequate resources not being made available to 1: A consolidation and organization of information
the project. (Bryde & Petie, 2005) about project management including best practices.
(D. Brandon, 2005b) 2: Provides a framework to manage
Project Environment project eficiency, balancing scope expectations and the
A cluster of projects within a irm, in which a set of products available resources. This model proposes the following
is developed. (Oshri, 2006) nine key areas: (1) integration, (2) scope, (3) time, (4) cost,
(5) quality, (6) human resources, (7) communication, (8)
Project Evaluation risk, and (9) procurement. (Monteiro de Carvalho et al.,
The emphasis at this level is on the project, which represents 2005)
the chosen objective(s) to achieve the aims of the program.
The concern at this level is to measure whether the project Project Management Institute (PMI)
meets these objectives and to what extent it matches user 1: The largest of the professional organizations which
expectations. The emphasis here is on eficiency. Does foster the discipline of project management. (D. Brandon,
the project meet its objectives using minimal resources? 2005b) 2: International professional society promoting
(Abu-Samaha, 2005) good project management practices. (Brewer, 2005)

Project Framework Project Management Maturity Model (PMMM)


Negotiation of a model within the project to ensure that the 1: A framework that introduces benchmarking instruments
contributions of all individuals (and their IC) are able to be for measuring an organizations progress along the
appropriately recognized. (Williamson et al., 2006) maturity model, detailing ive levels of development for
achieving maturity: Level 1Common Language; Level
Project Learning or Project Works 2Common Processes; Level 3Singular Methodology;
An iterative process of building knowledge, identifying Level 4 Benchmarking; Level 5 Continuous
important issues, solving problems, sharing results, Improvement. (Monteiro de Carvalho et al., 2005) 2:
discussing ideas, and making reinements. Through A framework for helping organizations improve their
articulation, construction, collaboration, and relection, practices and processes. (Brewer, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
548 Proje c t M a na ge m e nt M e t hodology Prope r t y

Project Management Methodology Project Team


A deined repeatable process to aid in the successful 1: A group of individuals who have been brought together
P completion of projects. (Brewer, 2005) to form a cohesive whole in order to successfully complete
a project. The team is mutually accountable for meeting
Project Management Practice for Reuse predeined project objectives, and the team members may
Project coordination mechanism that ensures an overlap be characterized by their diverse backgrounds, skills, and
in development time between two projects to ensure that personalities. (Ragsdell, 2006) 2: All individuals who
designs developed in one project will be reused by other have made a signiicant contribution to the successful
projects. (Oshri, 2006) achievement of the project. (McPherson, 2005)

Project Management Professional (PMP) Project-Based Learning


The highest level of professional certiication of project 1: Learning that centers on an individual or group project
managers by PMI. (D. Brandon, 2005b) as the main activity. Projects are open-ended tasks that
allow learners to make choices about focus and/or direction.
Project Manager (Bennett, 2005) 2: An active learning approach that focuses
1: An individual with the responsibility of ensuring the on developing a product or creation. The project may or may
project objectives are delivered. (Bryde & Petie, 2005) 2: not be student centered, problem based, or inquiry based.
The individual who will complete the design and creation Project-based learning uses open-ended assignments that
of the inal virtual school proposal, acquire approval provide students with a degree of choice, and extend over
of competent staff, and then administer the futuristic a considerable period of time. Teachers act as facilitators,
method of education delivery for the virtual school. (G. designing activities and providing resources and advice
Lang, 2005) to students. Instruction and facilitation are guided by
a broad range of teaching goals. Students collect and
Project Performance analyze information, make discoveries, and report their
The degree to which the project meets its overall objectives. results. Projects are often interdisciplinary. (Lowry &
This compares with project management performance, Turner, 2005)
which is the degree to which the traditional objectives
of cost, time, and quality are met. (Bryde & Petie, 2005) Proof
A mathematical proof of a statement S in an axiomatic
Project Sponsor theory T is an argument that shows that S is a logical
An individual or group with the responsibility and authority consequence of the axioms of T. Proofs are used to discover,
to ensure that the project beneits are realized. (Bryde & certify, and communicate mathematical knowledge.
Petie, 2005) (Farmer, 2006)

Project Stakeholder Propaganda


Any person or group that has an interest in the project. The Methodical propagation of a doctrine or the material spread
interest could be in the project outcome, outputs, or the by the advocates of a doctrine. (De, 2006)
project management process. (Bryde & Petie, 2005)
Proper Project Scope
Project Success Criteria/Key Performance The scope of the project deines the boundary of the project
Indicator or which aspects of the system will be included in the
The measure of success. The terms project success project. (Peterson & Kim, 2005)
criteria and project key performance indicators are used
interchangeably. Traditional measures are meeting cost, Property
time, and quality objectives. Other measures are linked to 1: Attribute used to describe or distinguish an object.
the attributes used by a stakeholder to judge whether their (Gillman, 2006) 2: Properties are used to establish links
expectations have been met. (Bryde & Petie, 2005) between classes. For example, books are published by

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Prope r t y H ie ra rchy Prot ot ype 549

publishers. The property publishes relates a publisher data set (one table) with derived attribute-value features,
with a particular book. (Antoniou et al., 2005) describing the structural properties of the example. (Perlich
& Provost, 2005)
P
Property Hierarchy
As with classes, properties can be organized in Proprietary Software
generalization/specialization taxonomies. For example, Software, including the source code that is privately owned
the property is CEO of relating persons to companies is and controlled. (St.Amant & Still, 2005)
a more speciic property than the sub-property of works
for. (Antoniou et al., 2005) Prosumerism
The name for an arrangement where a customer ills the
Property-Oriented Formal Speciication dual role of both consumer and producer. Knowledge co-
Language production is generated from role patterns and interactivity,
Based on axiomatic deinitions. Abstract. (Dasso & with both parties sharing the traditional responsibilities
Funes, 2005) of a producer and consumer. (Paquette, 2006b)

Proportion Failing Protocol


Proportion computed as the ratio of the number of cases 1: A set of rules that dictate the behavior of objects for
failing in the respective interval divided by the number communication and interaction. (Murthy & Krishnamurthy,
of cases at risk in the interval. (Chen, Oppenheim, et al., 2005c) 2: A convention or standard that controls or enables
2005) the connection, communication, and data transfer between
two computing endpoints. Protocols may be implemented
Proposal by hardware, software, or a combination of the two. At
A document written in response to an RFP. In the context of the lowest level, a protocol deines a hardware connection.
e-learning, it is a document that explains how the proposing (Guan, 2006g) 3: A set of formal rules deining how to
organization will design, develop, and deliver an e-learning transmit data. (Clayton, 2006a) 4: Rules governing the
solution to the funding organization. (Kapp, 2005) communication and exchange of data across a network
or inter-networks. (Lawson-Body et al., 2005) 5: An
Proposal Measure organization structure of the communication system,
An index to measure the concurrence frequency of the which comprises constituent protocols and the relationships
correlated pair words in documents, based upon the among them. (Yang et al., 2005a)
frequency of two implicit words that appear. It will have
high value when the two implicit words in a large corpus or Protocol Data Unit
labels in a large database occur with each other frequently. A set of data speciied in a protocol of a given layer,
(Ito, 2005) consisting of protocol control information and possibly
user data of that layer. (Ngoh & Shankar, 2005)
Proposition
A statement, assertion, or declaration formulated in such Prototype
a manner that it can be judged to be true or false. (Alpert, 1: A preliminary type, form, or instance of a system that
2006) serves as a model for later stages or for the inal, complete
version of the system. (Sethi & Sethi, 2006b) 2: A simpliied
Propositional Logic and smaller model system that still demonstrates the
A system of symbolic logic based on the symbols and, essence of the system. (Peterson & Kim, 2005) 3: An
or, not, to stand for whole propositions and logical effective way of representing a concept is to retain only
connectives. It only considers whether a proposition is its most important properties or the most typical element
true or false. (Felici & Truemper, 2005) of a category, which serves as a cognitive reference point
with respect to a cultural community. This group of most
Propositionalization important properties or most typical elements of a concept
The process of transforming a multi-relational dataset, is called prototype. The idea of prototype makes possible
containing structured examples, into a propositional that the subject has a mental construction, identifying the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
550 Prot ot ype Se le c t ion Prox y Ca che

typical features of several categories. Prototype is deined Provider Privacy Policy


as the object that is a categorys best model. (Amoretti, A description of provider privacy preferences, stating
P 2005) 4: Built to test some aspects of a system before its what personal information or PII the provider requires
inal design and implementation. During requirements from the consumer, and the conditions under which the
elicitation, a prototype of the user interface is developed, information is required, in order for the provider to carry
that is, to give stakeholders ideas about its functionality or out its service. (Yee & Korba, 2006)
interaction. Prototypes are either high idelity, that is, built
to be very similar to the product, or low idelity with very Providing for Recognition Rather than Recall
primitive tools, even only pencil and paper. Prototypes can Recognition is easier than recall, as evidenced in most
be thrown away, where they are discarded, or incremental, multiple-choice questions compared to ill-in-the-
where they are developed into an operational software blank questions. For example, when users return to a
system. (Hvannberg et al., 2006) 5: Representation of all Web site, they may not recall where certain information
or part of a product or system that, although limited in occurred, although they may recognize it when they see
some way, can be used for evaluation (ISO 13407). (Bevan, it. Examples of ways to provide for recognition rather than
2006) 6: A concrete envisionment of a design. (Zaphiris recall include providing drop-down menus, providing
& Zacharia, 2005) for bookmarking, and providing a search engine. When
providing a search engine, most experts recommend
Prototype Selection explaining its use as well as providing for advanced
The process of selecting a few representative samples searching. This accommodates the needs of novice users
from the given training set suitable for the given task. as well as advanced users. (Chalmers, 2006)
(Viswanath et al., 2005)
Proximal Development
Prototypic Expertise The distance between the actual developmental level as
The concept of prototypic expertise views people neither determined by independent problem solving and the level
as perfect experts nor as non-experts, but somewhere in of potential development as determined through problem
between both extremes. (Qudrat-Ullah, 2006) solving under guidance or in collaboration with more
capable peers. (Pemberton & Stalker, 2006)
Prototyping
1: A tool used in system development methodology that Proximate Context
lets users iteratively work with a small-scale mock-up The physical scope of a consumer context that is external
of an information system, experience how it might to the body of the consumer, but close enough to be directly
function in production, and request changes until it sensible to the consumer. Mobile consumers can describe
meets their requirements. (Steinbach & Knight, 2005) and even record the information about their proximate
2: The development approach in which prototypes are contexts and share it with others. (Sun & Poole, 2005)
produced. It is an iterative approach to the developing of the
information system. The distinctions of the different phases Proxy
of development of the information systemfor example, A server that sits between the client and the real server.
analysis, design, implementation, and evaluationare not It intercepts all queries sent to the real server to see if it
clear. (Hyrinen & Saranto, 2005) can fulill them itself. If not, it forwards the query to the
real server. (Kacimi et al., 2005)
Provider
1: In the context of P2PWNC, any autonomous entity Proxy Cache
that has Wi-Fi hotspots set up and can potentially join 1: A machine dedicated to serving client requests for Web
P2PWNC. (Efstathiou & Polyzos, 2006) 2: If an e-service documents. Usually it is installed at the edge of local or
is a business that operates the e-service and offers it to wide area networks to provide fast responses to the users
consumers, possibly earning fees for the use of the service and reduce the trafic exiting the network. (Danalis, 2005)
by consumers. (Yee & Korba, 2006) 2: A proxy having a cache. (Kacimi et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Prox y Se r ve r Psychodyna m ic s 551

Proxy Server PSI: See Public Services Infrastructure.


A virtual server that serves the requests of a client. It
usually stores copies of accessed data objects so that it PSOL: See Problem-Solving Oriented Learning.
P
may deliver the same objects immediately to repeated
requests. (Tse, 2006) PSS: See Primary Surveillance System.

Proxy-Based Model PST: See Performance Support Tool.


A communication in which proxy servers and other
computers participate. The proxy servers are deployed PSTN: See Public-Switched Telephone Network.
around the Internet, and they create an overlay network,
applying usually the P2P communication model. The other Psych-Factors CoP
participating computers as local clients connect to any of A worldwide collection of IT professionals who
the proxy servers using the client-server communication communicate regularly regarding growth in psychological
model. (Hossz, 2006) awareness and how such growth explicitly enhances various
facets of IT work. (Kaluzniacky, 2006)
Prudence
Concept that expenditure should be written off in the period Psychoacoustic Model
in which it arises, unless its relationship to the revenue of Model of human aural perception, especially with regard to
the future period can be assessed with reasonable certainty. the ability or inability to perceive signals that are masked
(Tahinakis et al., 2006) by other signals. (Kieler & West, 2005)

Pruning Psychoanalysis
A top-down or bottom-up selective algorithm to reduce the A term created by Freud in 1896 to name a speciic method
dimensionality of a tree structure in terms of the number of psychotherapy, which was inspired in the cathartic
of its terminal nodes. (Siciliano & Conversano, 2005) process, or treatment through speech, and was based in the
exploration of the unconscious, through free association
PSAP: See Public-Safety Answer Point. and interpretation. Catharses was already used by Aristotle,
who was the son of a physician and thus was inluenced by
PSEO: See Post-Secondary Enrollment Option. Hypocrites thought. The idea was of a therapeutic process
able to free individuals from oppressive experiences and
Pseudo Random Noise (PRN) to let the constraining element emerge. Freud developed a
A noise-like series of bits. Because GNSS depends upon theory, a technique, and a school in order to formalize and
multiple inputs, each satellite produces a predetermined, perpetuate his approach. Freud also developed work on
unique PRN on both the L1 and the L2 carrier signal for the unconsciousness of groups in the early 1920s. Though
use by civil and military receivers. The L2 carrier signal psychoanalysis started as an individual therapy, its insights,
is restricted to military use. (Freeman & Auld, 2005) technique, and concepts have been extended to the domain
of group analysis, family therapy, and organizational
Pseudo-Intent consulting. Its depth and breadth enable a high potential
The set X is a pseudo-intent if X c(X), where c is a for application to the complex ield of community life
closure operator and for all pseudo-intents QX, c(Q)X. within organizational settings. (Nobre, 2006b)
(Dumitriu, 2005)
Psychodynamics
Pseudonym The highly dynamic unconscious forces within individuals
The ictitious name adopted for use within a virtual and between individuals that form and motivate outward
environment. An individual may consistently use the same behavioral manifestations in group life. The group-as-a-
pseudonym or adopt several pseudonyms for use within and whole may develop a collective psychology that mirrors the
between virtual environments. (Roberts et al., 2005) psychological processes of an individual in many respects,
but not that of any one of its members. (Cargill, 2006a)
PSF: See Professional State Forum.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
552 Psychologic a l Type Public Goods

Psychological Type Service (SMS) to coordinate times and places of protests


Pattern of behavior resulting from differences in mental with other activists. (Galloway, 2006)
P functions preferred, used, and developed by an individual.
A theory developed by Carl Jung. (Chambel & Guimares, Public Access Point
2005) Any public facility at which people can have access to the
Internet, or even other ICTs. Internet cafs, community
Psychotherapy telecenters, phone kiosks, and public phone booths
A specialized formal interaction between a mental health are typical examples in developing countries. In more
practitioner and a client in which a therapeutic relationship industrialized countries, public libraries that offer Internet
is established to help to resolve symptoms of mental access also constitute public access points. (Mwesige,
disorder, psychosocial stress, relationship problems, and 2005)
dificulties in coping in the social environment. Some
speciic types of psychotherapy may include, but are Public Access Technology
not limited to, psychoanalysis, family therapy, group One of the computer-based technologies that are designed
psychotherapy, supportive treatment, gestalt therapy, to be used by the general public. This has implications
experiential therapy, primal therapy, psychosocial therapy, for their design, since they will be used by a diverse and
psychodrama, behavioral therapy, and cognitive therapy. unknown user group drawn from the human population.
(Blackmore et al., 2006) (Henley & Noyes, 2006)

PTD: See Personal Trusted Device. Public Cabin


In Peru, a cabina pblica is a privately owned small
P3DM: See Participatory 3D Modeling. business where people can access the Internet for a small
fee, lower than $0.30 an hour in 2004. (Barrera, 2005)
P3P: See Platform for Privacy Preferences.
Public Discussion Forum
P2P: See Peer-to-Peer. Internet-based application which that permits an open
exchange of opinions and ideas among various Internet
P2P Architecture: See Peer-to-Peer Architecture. users on a speciic topic of interest, and that can be easily
accessed by interested individuals. (Gur u, 2006)
P2P Network: See Peer-to-Peer Network.
Public Domain
P2P System: See Peer-to-Peer System. 1: Owned by the public at large. (Fleming, 2005b) 2:
Describes the body of works that, for whatever reason,
P2P Technology: See Peer-to-Peer Technology. are not covered by copyright or other legal controls
over their use. Unlike open source works, there are no
P2PWNC: See Peer-to-Peer Wireless Network conditions imposed upon works in the public domain, with
Confederation. the exception of where the European droits moraux are
applicable, the moral rights of the author must be respected.
PTUIE: See Post-Transaction User-Input Error. Under United States law, unless the owner explicitly states
the contrary, any work created after 1923 must be assumed
PU: See Perceived Usefulness. to not be in the public domain. Unless a work is very old,
determining that it is in the public domain can be very
Public dificult and depends on the particular details of the country
Any group of people an organization wishes to reach in which the use is occurring. (Marshall, 2005)
because their interest or inluence is relevant to the
organization in some way. People may belong to more than Public Goods
one public and shift between them quickly, depending on 1: Resources from which all individuals in the collective
the issue in question. For example, an Internet user who may beneit regardless of whether they have contributed
is also an environmental activist who uses Short Message to providing the good. (Teigland & Wasko, 2005) 2:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Public Goods T he or y Public Ke y I nfra st ruc t ure (PKI ) 553

Something that is shared by all members of a community Public Key Infrastructure (PKI)
whether or not they have contributed to the constitution or 1: A system for using public key technology. It provides
maintenance of the good. (King, 2006a) 3: Goods deined a framework to store, sign, validate, and revoke digital
P
by two characteristics: non-rivalry and non-excludability. certiicates. A general PKI consists of a certiication
Typical examples of public goods include tangible goods authority, a registration authority, one or more directories
such as public parks and lighthouses, as well as intangible where the digital certiicates are stored, and a certiicate
or information goods such as public television and radio. management system. (Xu & Korba, 2005) 2: The
(Teigland & Wasko, 2006) 4: Resources that generally are combination of software, encryption technologies, and
(or are perceived to be) of some public value or use, and services that enable enterprises to protect the security of
whose consumption by one member of society does not their communications and business transactions on the
preclude its consumption by others, for example, renewable Internet. (Chim, 2006) 3: A system of digital certiicates,
natural resources such as air, or services such public radio certiicate authorities, and other registration authorities
or TV. (Ekbia & Hara, 2006) that verify and authenticate the validity of each party
involved in an Internet transaction. PKIs are currently
Public Goods Theory evolving, and there is no single PKI. (Pulkkis, Grahn,
A good or service is said to have public characteristics & Karlsson, 2005) 4: A system of computers, software,
if private producers cannot capture all of the beneits and data that relies on certain sophisticated cryptographic
associated with its consumption. Once such a good is techniques to secure online messages or transactions.
produced, people can enjoy the beneits that it provides (Mullen, 2005) 5: A system that enables users of a public
without having to pay for them. Consequently, it is argued network to exchange data securely and privately through
that public goods will either be underproduced in the free the use of a public and private cryptographic key pair,
market or not produced at all. (Kankanhalli et al., 2006) which is obtained and shared through a trusted authority.
It provides for a digital certiicate that can identify an
Public Individual Certiication Law individual or an organization, and director services that
A law to prepare a system to provide individual certiication can store and, when necessary, revoke the certiicates. The
and authorization services in order to process online the comprehensive architecture includes key management, the
public application and notiication online. (Kitagaki, registration authority, certiicate authority, and various
2005) administrative tool sets. (Bose et al., 2005) 6: An Internet
trust model based on public key cryptography (encryption
Public Informed Citizen On-Line Assembly is conducted with a dual key system: a public key known to
(PICOLA) Project everyone and a private key known only to the recipient of
An initiative spearheaded by Carnegie Mellon University the message). PKI offers the advantages of authentication
to develop and implement, through online tools, a virtual and non-repudiation, which SSL lacks. (Lei et al., 2005b)
agora for public consultation regarding public policy issues. 7: Security mechanism based on public key cryptography
(Magnani et al., 2006) used to provide end-to-end security required for the
information, services, and means of access. The core
Public Key Certiicate component of a PKI is the certiication authority. This
The public key of a user, together with some other authority is trusted by the end entities in its administrative
information, rendered unforgeable by encipherment with domain and is responsible for the status of the certiicate it
the private key of the certiication authority that issued issues. (Pierre, 2006b) 8: The architecture, organization,
it. (Trcek, 2005) techniques, practices, and procedures that collectively
support the implementation and operation of a certiicate-
Public Key Cryptography based public key cryptographic system. (Mitrakas, 2005)
Allows the exchange of encrypted messages without prior 9: The public infrastructure that administers, distributes,
key agreement. The receiver of an encrypted message has and certiies electronic keys and certiicates that are
a secret private key and a published public key. The public used to authenticate identity and encrypt information.
key is used by anyone who wishes to send a message to Generally speaking, PKI is a system of digital certiicates,
the receiver. Only by means of the private key of the certiication authorities, and registration authorities that
receiver can the original message be retrieved by decoding. authenticate and verify the validity of the parties involved
(Stickel, 2005) in electronic transactions. (Richter & Roth, 2006) 10: The

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
554 Public La nd M obile N e t w ork (PLM N ) Public Va lue

infrastructure capable of supporting the management of back-end programs) or be oriented towards invocation by
public keys able to support authentication, encryption, information systems (e.g., a Web service). (Vassilakis &
P integrity, or non-repudiation services. (Trcek, 2005) 11: Lepouras, 2006) 2: Information and services provided
The publicly distributed key that, if combined with a by government agencies and other organizations working
private key (derived mathematically from the public key), within the public sphere. (Gil-Garca & Luna-Reyes, 2006)
can be used to effectively encrypt messages and digital 3: Social infrastructure services, delivered wholly or partly
signatures. (Guan, 2005c) with the beneit of public funds and strategically driven
through national or regional administrations. (Wright &
Public Land Mobile Network (PLMN) Taylor, 2005)
Usually the whole network of a GSM operator. (Hackbarth
et al., 2005) Public Services Infrastructure (PSI)
An integrated Web services framework that allows for
Public Library of Science rapid development, deployment, and ease of management
Organization founded in October 2000 committed to make of online services. (Hin & Subramaniam, 2006)
scientiic literature a freely available resource. Nobel Prize
recipient Harold E. Varmus is co-founder and chairman Public Space
of the board. (Rennard, 2005) Off-line, public space refers to geographical areas that are
accessible to the general public (e.g., streets). Online, the
Public Participation GIS (PPGIS) term public space is commonly used to refer to virtual
A spontaneous merger of participatory development environments that do not have restrictions on access.
methods with geo-spatial technologies (P-mapping, P3DM, (Roberts et al., 2005)
GIS, GPS, and remote sensing). PPGIS is usually geared
towards community empowerment through measured, Public Sphere
demand-driven, and user-friendly applications of Jrgen Habermas, an inluential proponent, deines it as
geographic information technologies and systems. PPGIS the sphere of common concern where there is rational
is an integrated practice which has multiple dimensions, debate and universal access. Coffeehouses, salons, and
builds on diverse tools, and highlights the integration of newspapers, which shape public opinion and dissent, are
outsiders with socially differentiated local knowledge, included, while state, economy, and church are excluded.
and builds essentially on high levels of participation at all (Srinivasan, 2006)
stages of project implementation. (Rambaldi, 2005)
Public Switched Telephone Network (PSTN)
Public Printer 1: A regular voice telephone network. (Akhtar, 2005) 2:
The head of the Government Printing Ofice (GPO). (Inoue The well-known classical telephone network. (Shuaib,
& Bell, 2005) 2005) 3: Consists of analog local loops that connect
subscribers to the local central ofice, and digital facilities
Public Relations that link central ofices together via various regional, long-
The planned and sustained effort to build mutually distance, and international backbone. (Phala, 2005) 4: The
beneicial relationships between an organization and those complete network of interconnections between telephone
individuals or groups whose interest or inluence makes subscribers. (Chochliouros et al., 2005c)
them relevant to the organization. (Galloway, 2006)
Public Use Data File
Public Sector One of many electronic computer iles containing the
This refers to the government and its various departments results of federal research and statistical programs that
that serve the citizens of a country. These departments are are made available for public use, often on agency Web
nonproit-making organs of the State. (Singh, 2005) pages. (Mullen, 2005)

Public Service Public Value


1: A means offered to the public for conducting business Any form of value created by governments though the
with the government. The service may be directly targeted provision of services, the passing of laws and regulations,
to be used by humans (e.g., Web forms and the associated and other actions. It also involves all the short-term and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Public Wire le ss Em e rge ncy Se r vic e Pure -Pla y ASP 555

long-term contributions made by public administrations PubMed


to society and the economy. Furthermore, it includes An online database of over 14 million citations of biomedical
eficiency gains by better internal performance and, most articles from 1950 to the present time. This database is
P
importantly, the multiplier social and economic effects available free over the Internet. (Lewis, 2005)
such as: (1) social development and inclusion, (2) enabling
companies to lower their administrative costs and become PUI: See Perceptual User Interface.
more competitive, and (3) strengthening innovation
across the economy. (Chochliouros & Spiliopoulou- Pull
Chochliourou, 2006) Mechanisms that depend on the individual to go to the
location where it is stored to retrieve it. Web pages and
Public Wireless Emergency Service many discussion boards boards relect this method of
A system-initiated wireless emergency service (WES) interaction. Historically, the term comes from marketing
application that uses large-scale sensor networks to programs, where advertising is used to pull persons
monitor the external contexts (i.e., public environments) into the store where the actual transactions take place.
of mobile users. At the detection of natural and human (Contrast with Push.) (Isaak, 2006)
disasters, WES systems determine who is (likely to be)
involved and tailor informational services with user Pull-Down Menu
location information. (Sun, 2005) When the user points at a word with either a keystroke or
a mouse, a full menu appears (i.e., is pulled down, usually
Public-Private Partnership from the top of the display screen), and the user then
A more or less stable cooperation between the private can select the required option. A cascading menu (i.e., a
and the public sector. All partners bring along speciic submenu) may open when you select a choice from the
resources. Based on the division of labor, they aim at the pull-down menu. (Henley & Noyes, 2006)
same goal for a particular period of time. A public-private
partnership can generally be deined by three elements: Punch-Card Voting System
the partnership, the inter-sectorial, and the performance- Operated by punching holes in cards that lock into holder
enhancing element. (Knust & Hagenhoff, 2005) devices. Holes in the card correspond to the appropriate
candidate or issue in the device holder book. (Gibson &
Public-Safety Answer Point (PSAP) Brown, 2006)
A regional ofice where operators receive and screen
emergency calls from the public (e.g., 911 in the USA, Purchase Card
112 in Europe) and mobilize various dispatch agencies Credit card used in the federal government by an authorized
as needed, such as police, ireighters, and ambulance. government oficial for small purchases, usually under
(Sun, 2005) $2,500. (Pang, 2005b)

Publicly Available Purchasing Power Parity (PPP)


Obtainable for free or minimum cost of materials. (Fleming, A rate of exchange that accounts for price differences
2005b) across countries, allowing international comparisons of
real output and incomes. (Dholakia & Kshetri, 2005)
Publish and Subscribe
1: Distributed communication paradigm according to Pure-Play
which subscribers are notiied about events that have been An e-commerce company that only has online presence,
published by publishers and that are of interest to them. but no physical store. (Wang, Ding, et al., 2006)
(Marchetti et al., 2005) 2: A method of communication
by which clients register to be notiied when some event Pure-Play ASP
occurs. When the event happens, the server checks though Those with non-speciic industry-required product or
the list of subscribed clients and broadcasts to them the service, except Internet/Web-enabled software applications
event data. This is often used in wireless applications for (e-mail/security/disaster recovery). Firms offering this
information on stock price changes, sports results, and so service suffer from the sales of unproitable commodity
forth. (K.J. MacGregor, 2005) applications and therefore have greater reliance on venture

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
556 Pure ly V ir t ua l M e dia PVC

capitalist funding as they operate in a rather unstable,


volatile, and dynamic market. (Guah & Currie, 2005)
P
Purely Virtual Media
Those media that do not have any presence in the physical
world, neither printed nor broadcasted. (Daz-Andrade,
2005)

Push
Mechanisms that deliver information to participants. E-
mail is an obvious example, but notiication via instant
messaging, beeper, fax, or telephone are also in this
category. RSS is a recent expansion of this into Web services
and blogs. (Contrast with Pull.) (Isaak, 2006)

Push/Pull
Distinguishes who initiates data transmission, the producer
or the consumer of data. (Fiege, 2005)

Push Technology
1: A data distribution technology in which selected data
are automatically delivered into the users computer at
prescribed intervals or based on some event that occurs.
(Parikh & Parolia, 2005) 2: Enables people to subscribe to
and have news and information delivered directly to their
e-mail, releasing them from having to search the Internet.
(Nightingale, 2005)

Push-Caching
The technique of pushing data closer to consumers by
making an informed guess as to what the clients may
access in the near future. The concept of push-caching is
closely related to prefetching, but prefetches are always
initiated in response to an on-demand request. (Katsaros
et al., 2005)

Put Option
The right but not the obligation to sell a stock (or inancial
instrument) at a pre-determined price at some time in the
future. (Lajbcygier, 2005)

PVC: See Permanent Virtual Circuit.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
QAM Qua lit at ive Dat a 557

Q
QAM: See Quadrature Amplitude Modulation. multimedia query result can be displayed on the client site
no matter what the queried object characteristics are and
QBE: See Query by Example/Sketch/Humming. no matter what available network resources have. (Zhang
& Chen, 2005)
QFD: See Quality Function Deployment.
QoS Management: See Qualit y of Ser vice
QIM Watermarking: See Quantization Index Management.
Modulation Watermarking.
QPSK: See Quadrature Phase-Shift Keying.
QoS: See Quality of Service.
QQPPM: See QoS-Based Query Processing Precision
QoS-Based Multimedia Query Processing and Matrix.
Data Retrieval
The current multimedia query processing mechanism QSA R: See Q ua nt ita t ive S t r uct u re -Act ivit y
provides the three procedures in practice. They are: (1) Relationship.
search, (2) browsing, and (3) query reinement. There are
four considerations regarding multimedia data retrieval. Quadratic Program
First, the queried objects are successfully presented in the A mathematical program where the objective is quadratic
client site under the QoS support; second, since the result and the constraints are linear equations or inequalities.
queries may contain long audio segments, large images, or (Musicant, 2005)
long videos, eficient extracting and presenting essential
information for clients to browse and select are required; Quadrature Amplitude Modulation (QAM)
third, the response time that is determined by both the 1: A method of modulating digital signals onto a radio-
network and database search should be eficiently short; frequency carrier signal involving both amplitude and
and fourth, the query reinements are possible to itinerate. phase coding. (Chochliouros et al., 2005b) 2: It is a
(Zhang & Chen, 2005) modulation technique in which two sinusoidal carriers that
have a phase difference of 90 degrees are used to transmit
QoS-Based Query Processing Precision Matrix data over a channel, thus doubling its bandwidth. (Hin &
(QQPPM) Subramaniam, 2005a)
The QQPPM solution covers the speciication of client-
site QoS preferences and their quantitative relationship to Quadrature Phase-Shift Keying (QPSK)
wireless network QoS conditions, and also the speciication A method of modulating digital signals onto a radio-
of the server-site QoS proile and their quantitative frequency carrier signal using four phase states to code
relationship to the real-time wireless network QoS two digital bits. (Chochliouros et al., 2005b)
conditions. QQPPM will be one of the functions in MM-
DBMSs. The objective of QQPPM is to create a smallest Qualitative Data
element as a criterion to reduce queried object quality Also often referred to as categorical data, they are data
between the servers original data quality and actual that can be placed into distinct categories. Qualitative data
quality that the client can access. With the QQPPM, the sometimes can be arrayed in a meaningful order, but no

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
558 Qua lit at ive M e t hod Qua lit y of Se r vic e (QoS)

arithmetic operations can be applied to them. Quantitative Quality E-Store


data can be further classiied into two groups, nominal or An online store whose qualities include fast Web page
Q ordinal. (Yang & Webb, 2005) download, store size, promotions, ease of use, and so on.
(Shih & Fang, 2006)
Qualitative Method
Method for data collection and analysis that focuses on Quality Framework
understanding of text and observation rather than numeric A work in progress that assesses educational success in
calculation. (Trauth, 2005b) terms of continuous quality improvement. (Moore et al.,
2005)
Quality
1: An encompassing term comprising utility, objectivity, Quality Function Deployment (QFD)
integrity, and value. (Hoxmeier, 2005) 2: A degree of A tool for converting user requirements into functional
excellence or a level of expectation. (Ryan, 2005) 3: The requirements that facilitates trade-off analysis,
ability of a set of inherent characteristics of a product, benchmarking, and deployment of requirements from
product component, or process to fulill requirements of a high level down to a detailed speciication. It attempts
customers. (Gibson, 2005) 4: The degree to which a system, to build in quality from the initial stages of any systems
component, or process meets speciied requirements. development project. (Clegg & Tan, 2006)
(Schneidewind, 2005) 5: Usually deined in relation to a
set of guidelines or criteria. The same broad approach is Quality Manual
currently being applied to information provided over the A manual used by the software developing company that
Internet. (Zaharias, 2005) includes the metrics, the measurement techniques, the
guidelines for the application of metrics data analysis, and
Quality Assurance the corrective actions required for improving the software
1: System for ensuring student experiences in online developing process. (Xenos, 2006)
learning are valid. There are two approaches to quality
assurance. One is regulatory through accrediting and Quality of Education
governmental agencies. The other is through consumer Refers to the effectiveness of the program in promoting
protection, which requires educating potential students student learning and achievement, in relation to its expected
about their options and responsibilities. (S.M. Johnstone, outcomes and standards. (Grasso & Leng, 2005)
2005) 2: Those processes that assess the relative strength
of academic programs and associated student and faculty Quality of Knowledge
support programs, and offer strategies for both program The quality of knowledge presented by an intelligent
and institutional improvements recognizable by both system is determined by an analysis of its knowledge body,
internal and external constituencies. (Garten & Thompson, by means of deciding about what kind of certainties and
2005) doubts it represents. (Analide et al., 2006)

Quality Assurance of E-Learning Program Quality of Service (QoS)


The inspection and maintenance of a high-quality program 1: A collection of performance parameters for network
that is based on two major components: (1) the pedagogy service including bandwidth, average delay, jitter, packet
aspect and the effectiveness of the learning experience; loss probability, among many others. (Markhasin et al.,
and (2) the technology aspect and the quality of the online 2005) 2: Refers to the quality of an application when
course. (Levy & Ramim, 2005a) transported over a network. (Shuaib, 2005) 3: The ability
of a service provider (network operator) to support the
Quality Degradation application requirements with regard to four services
The drop of the PQoS to a lower level. (Koumaras et al., categories: bandwidth, delay, jitter, and trafic loss. (Barolli
2005) & Koyama, 2005a) 4: A measurable level of service
delivered to network users which can be characterized

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Qua lit y of Se r vic e (QoS) M a na ge m e nt Qua nt it at ive St ruc t ure -Ac t ivit y Re lat ionship (QSAR) 559

by packet loss probability, available bandwidth, and end- Quality of Work Life (QWL)
to-end delay. (Gutirrez & Ting, 2005) 5: A method of 1: A measure of employee satisfaction with their working
marking certain packets for special handling to ensure environment; can include fairly subjective measures such
Q
high reliability or low delay. (Guster et al., 2005) 6: A as self-empowerment, enjoyment, self-satisicing indices.
networking term that speciies a guaranteed throughput (Burn & Ash, 2006) 2: Workplace hygiene factors that
level. One of the biggest advantages of ATM over competing support the well-being and job satisfaction of employees.
technologies such as Frame Relay and Fast Ethernet is (Mahatanankoon, 2005)
that it supports QoS levels. This allows ATM providers to
guarantee to their customers that end-to-end latency will Quality Plan
not exceed a speciied level. (Wong, 2006) 7: An indicator A plan developed particularly for each software project
of availability and speciies the transmission rates, error that includes all the metrics, measurement guidelines, and
rates, and other network performance metrics which can goals applicable for this project only. (Xenos, 2006)
be measured, improved, and to some extent, guaranteed in
advance. (Wilsdon & Slay, 2005) 8: Guarantees in advance Quality Seal
a speciied level of throughput capacity for multimedia A virtual seal placed on a government Web site or form
transmissions via ATM networks. (Littman, 2005) 9: which allows citizens to know that the item in question
A mixture of several parameters, such as the ratio of is legitimate and not a phishing site designed to gather
server/lost calls, the quality of the service (typically voice information for use in identity theft. (Knepper & Chen,
service) in terms of noise, blur, and so on. In the end, it is 2006)
an objective measure of the satisfaction level of the user.
(Hackbarth et al., 2005) 10: A set of service requirements Quality Standard
that the provider must meet in order to guarantee an A framework, tool, or instrument used to guide the design,
adequate level of service provision. (Jain & Ramesh, 2006) delivery, and evaluation of the online course/program/
11: Represents a guarantee or a commitment not only to a training. This may be a learning model and/or tested
particular quality of network service, but also a particular evaluation instrument/tool that ensures attention to detail
rate or minimum rate of data delivery, as well as maximum in the design process and that provides feedback to the
transmission times among packets. (Rodrigues et al., 2005) course designers and facilitators for redesign and continual
12: The collective term for all demands on the recording improvement of the program. (MacDonald et al., 2005)
and the replaying procedures, which refer to generating
and maintaining a continuous data stream. (Geisler & Kao, Quantitative Association Rule
2005) 13: Allocation of resources to provide a speciied 1: An implication rule containing items of quantitative
level of service. (Swierzowicz, 2005) 14: Parameters to and/or categorical values that shows in a given database.
describe system performance. (W. Wang, 2006) (Shen & Horiguchi, 2005) 2: Shows associations with
numeric and categorical data. Quantitative rules would
Quality of Service (QoS) Management express associations such as: Age: 30 to 39 and Owns
Refers to a set of speciic requirements for a particular car = yes -> Median Income = 40,000. (Imberman &
service provided by a network to users. In general, QoS Tansel, 2006)
requirements are in accordance with the perceived QoS
based on data transmission and application type. These Quantitative Data
requirements are usually described by quantitative igures Are numeric in nature. They can be ranked in order.
that are more or less related to the technology behind the They also admit to meaningful arithmetic operations.
network service, and thus a user will ind limited lexibility Quantitative data can be further classiied into two groups,
in changing the proile after subscription to the service. discrete or continuous. (Yang & Webb, 2005)
In the context of the wireless mobile environment, these
requirements can be categorized mainly into four attributed Quantitative Structure-Activity Relationship
types: (1) bandwidth, (2) timeliness, (3) mobility, and (4) (QSAR)
reliability. (Zhang & Chen, 2005) Illustrates quantitative relationships between chemical
structures and the biological and pharmacological activity
of chemical compounds. (Lodhi, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
560 Qua nt izat ion I ndex M odulat ion Que r y by Ske t ch/Pa int ing

Quantization Index Modulation Query by Example/Sketch/Humming (QBE)


Refers to embedding information by irst modulating 1: A graphical query and update language for relational
Q the sequence of indices with the embedded information databases introduced by IBM and popularized by Paradox
and then quantizing the host signal with the associated RDBMS. (Dadashzadeh, 2005) 2: A method of searching
sequence of the quantizers, which are a predeined class a database using example media as search criteria. This
of discontinuous, approximate-identity functions. (Si & mode allows the users to select predeined examples
Li, 2006) requiring the users to learn the use of query languages.
(Wei & Li, 2005) 3: A technique to query multimedia
Quantization Index Modulation (QIM) databases in which the user submits a sample query and
Watermarking asks the system to retrieve similar items. (Farag, 2005a)
Given a set of watermarks and a set of quantizers with 4: The image retrieval system where a sample image
their codebooks predeined according to the watermarks, or sketch can be provided as a query. (Chan & Chang,
QIM watermarking is a method of embedding a watermark 2005) 5: A method of forming queries that contains one
in which a set of features are extracted from the host or more media object(s) as examples with the intention of
media and quantized to the nearest code of the quantizer inding similar objects. A typical example of QBE is the
corresponding to the watermark. The security resides in function of See Similar Pages provided in the Google
the secrecy of the codebooks. (C.-T. Li, 2005) search engine, which supports inding Web pages similar
to a given page. Using an image to search for visually
Query similar images is another good example. (Li et al., 2005)
1: Retrieving instances of both concepts and relationships 6: Method to formulate queries in multimedia databases.
between concepts that satisfy certain restrictions or The user provides an example media ile, and the result
qualiications and hence are interesting for a user. Querying of the database system is a set of similar media iles. If no
instances of ontologies involves making use of reasoning example is available, the user can draw a sketch or hum
(both Abox and Tbox) mechanisms in order to obtain a melody. (Geisler & Kao, 2005)
the corrected and completed results. (Roldn-Garca et
al., 2005) 2: A request to retrieve data from a database. Query by Icon
(Bozanis, 2006) 3: Formal expression of an information An approach that allows users to construct queries by
need. (Venters et al., 2005) selecting an icon that represents a high-level concept of a
category or idea. (Venters et al., 2005)
Query Answer
The result of a query Q = <G,P> on an input database D Query by Image
is deined in terms of the stable models of PD by taking An approach that allows users to provide an example
either the union (possible inference) or the intersection image as a representation of their query. The example can
(certain inference) of all models. Thus, given a program P be either an image selected externally or internally from
and a database D, a ground atom G is true under possible the system. (Venters et al., 2005)
(brave) semantics if there exists a stable model M for
PD such that GM. Analogously, G is true under certain Query by Pictorial Example
(cautious) semantics if G is true in every stable model for The query is formulated by using a user-provided example
PD. (Greco & Zumpano, 2005b) for the desired retrieval. Both the query and stored media
objects are analyzed in the same way. (Bretschneider &
Query Answering Kao, 2005)
Process by which the (possibly approximate) answer to a
given query is obtained by exploiting the stored answers Query by Sketch/Painting
and deinitions of a collection of materialized views 1: An approach that allows users to draw a sketch of the
(Tininini, 2005a) desired image by combining several features commonly
found in computer graphic applications. The sketch
Query by Browsing represents a template of either a completed object or scene.
Approach that permits users to browse the database by three (Venters et al., 2005) 2: A widespread query type where
methods: unstructured, semi-structured, and structured the user is not able to present a similar sample image.
browsing. (Venters et al., 2005) Therefore the user sketches the looked-for image with a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Que r y by V isua l Ex a m ple Que r y Re w rit ing 561

few drawing tools. It is not necessary to do this correctly Query Model


in all aspects. (Kao & Tendresse, 2005) 3: An approach An abstraction model for image querying in the context
that allows users to manually specify the percentage or the of CBIR. In this model, a submitted query would specify
Q
distribution of color values from a color picker or wheel, both a ilter condition and a ranking expression, while
such as RGB (red, green, blue) or HIS (hue, intensity, the query result will be a rank of the images that satisies
saturation). (Venters et al., 2005) the ilter condition, according to grade of match for the
ranking expression. (Y.-J. Zhang, 2005a)
Query by Visual Example
General term used to describe how users provide or create Query Monotonicity
a visual example or representation of their query image ( ) is monotonic at a cell X if the condition Q(X) is
Qn as the basis of the search from the image archive I. FALSE implies that Q(X) is FALSE for any cell X`X.
(Venters et al., 2005) (Abdulghani, 2005b)

Query Equivalence Query on Views


Two queries Q1 = <G1,P1> and Q2 = <G2,P2> are said to be A query on a view is deined using a view query language.
equivalent under semantics s (Q1 s Q2) if for every database Usually such a query language is the same as the one used
D (on a ixed schema) Anss(Q1,D) = Anss(Q2,D). Two for data sources. For instance, to query relational views
programs P1 and P2 are equivalent under a given semantics deined on a relational database, the view query language
s: P1 s P2 if for every atom g <g, P1> s <g, P2>. Finally, is SQL. (Cannataro et al., 2005)
if Q1 p Q2 and Q1 c Q2 (the two queries or programs are
equivalent under both brave and cautious semantics), we Query Optimization
simply write Q1 Q2. (Greco & Zumpano, 2005b) A problem that can be stated as follows: given a query,
the set of all execution plans that compute it, and a cost
Query Evaluation Cost function that is deined on the before set, ind a execution
The sum of the cost of evaluating each input query plan that is of minimum cost using some search strategy.
rewritten over the materialized views. (Theodoratos & (Aldana Montes et al., 2005)
Simitsis, 2005)
Query Performance
Query Language A measure of how fast a system processes queries, which
Set of formally deined operators that allow queries to involves reading data from disk and if necessary computing
be expressed to a database. The execution of the query the results in memory. The shorter it takes to process a
produces a set of results that are extracted from the data. query, the better the performance is. (Lu, 2005)
(Venters et al., 2005)
Query Personalization
Query Log The process of dynamically enhancing a query with
A type of ile keeping track of the activities of the users relevant preferences stored in a user proile with the
who are utilizing a search engine. (Wen, 2005a) intention of focusing a search and providing individualized
answers. (Koutrika, 2005)
Query Log Mining
An application of data-mining techniques to discover Query Response Time
interesting knowledge from Web query logs. The mined The total elapsed time while waiting for the data of interest
knowledge is usually used to enhance Web search. (Wen, to arrive in the channel and downloading the data. (Waluyo
2005a) et al., 2005)

Query Matching Query Rewriting


A query Q matches a group query G if and only if Q can 1: An approach to query optimization that rewrites the
be computed from the result of G, or G can be computed original SQL query into another equivalent SQL query
from the result of Q. (Khan, 2005) (or a sequence of several SQL queries) that offer the
possibility of yielding better performing query plans once

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
562 Que r y Se m a nt ic s QWL

they are processed by the query optimizer. (Badia, 2005a) QuickTime Virtual Reality
2: Process by which a source query is transformed into an 1: Apple software that allows users to merge photos that
Q equivalent one referring (almost exclusively) to a collection were precisely taken for a landscape and create a rich
of materialized views. In multi-dimensional databases, panoramic scene from one static viewpoint. It also permits
query rewriting is fundamental to obtain acceptable users to navigate, for example, to rotate and/or to zoom in
(online) response times. (Tininini, 2005c) and out in such a created pseudo 3D space. (Y.J. Zhang,
2005a) 2: An enhanced version of the standard developed
Query Semantics for displaying content (animation, audio) on computers.
The meaning of a query with an information system as This enhanced version adds the ability to display and
its domain of interpretation. Application of knowledge rotate objects in three dimensions. (Dez-Higuera &
discovery and Chase in query evaluation makes semantics Daz-Pernas, 2005)
operational. (Ras & Dardzinska, 2005)
QWL: See Quality of Work Life.
Query Session
A query submitted to a search engine, together with the
Web pages the user visits in response to the query. Query
session is the basic unit of many query log mining tasks.
(Wen, 2005a)

Query Tool
Structured query language that supports the examination
of the relevancy, usefulness, interestingness, and novelty
of extracted knowledge for interactive data mining. (Wang
& Wang, 2005)

Query-Based Information Access Approach


Information is returned to the user, taking into account
only the query issued. (Koutrika, 2005)

Question Answering System


A computer system that can answer a question posed to
it by a human being using prestored information from a
database, a text collection, or a knowledge base. (Kontos
& Malagardi, 2006)

Question Driven
In question-driven or hypothesis-driven approaches, the
analysis is preceded by an identiication of questions of
interest. (Amaravadi, 2005)

Queuing Theory
Mathematical study of waiting lines (queues and
networks of queues) normally applied for designing
telecommunications networks and transports. (Fisteus
& Kloos, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
R-Tree Radio Frequency Identiication (RFID) 563

R
R-Tree Radio Frequency Identiication (RFID)
A spatial indexing method for fast comparison and 1: Devices that transmit identification numbers on
retrieval of spatial objects. It is a spatial object hierarchy request from a compatible reader using radio frequencies.
that is formed by aggregating minimum bounding boxes (Szewczak, 2006) 2: The electromagnetic or electrostatic
of the spatial objects and storing the aggregates in a tree coupling in the RF portion of the electromagnetic spectrum
structure. (Sayal, 2005) is used to transmit signals. An RFID system consists of an
antenna and a transceiver, which read the radio frequency
RA: See Registration Authority. and transfer the information to a processing device, and a
transponder or tag, which is an integrated circuit containing
RAD: See Rapid Application Development. the RF circuitry and information to be transmitted.
(Galanxhi-Janaqi & Nah, 2005) 3: Automatic identiication
Radial Basis Function (RBF) Neural Network system transmitting product data automatically by radio
A kind of artiicial neural network. It usually has three signals (non-contact). RFID systems operate in the free
layersan input layer, a hidden layer, and an output layer. air areas of the wireless communications spectrum (radio
The hidden layer of an RBF neural network contains frequency spectrum) across the regulatory boundaries
some radial basis functions, such as Gaussian functions of countries. (Loebbecke, 2006) 4: Form of automated-
or polynomial functions, to transform input vector space radio-frequency-based identiication of objects. RFID
into a new nonlinear space. An RBF neural network has the systems consist of an antenna, a transceiver for reading
universal approximation ability, that is, it can approximate radio frequency and to transfer information, a processing
any function to any accuracy, as long as there are enough device, and a transponder. (Kotzab, 2005) 5: Small chip
hidden neurons. (Chu & Wang, 2005) used to identify hardware (such as exhibits in a museum or
products in a retail store) by a radio in a PDA. Competes
Radical Innovation with printed barcodes. (Houser & Thornton, 2005) 6: Chips
The generation of new ideas (new knowledge) that leads to can broadcast information presently 3 to 10 meters away
the development of radically new products or services that after being scanned by a special device using ordinary radio
lead to transformations in practices. (Newell, 2006) waves. (Friedman, 2005) 7: A technology used to uniquely
identify objects, often in transit. (M. Rowe, 2005a) 8: Uses
Radio Channel low-powered radio transmitters to read data stored in a
An assigned band of frequencies suficient for radio transponder (tag) at distances ranging from 1 inch to 100
communication. A channel is usually assigned for a feet. RFID tags are used to track assets, manage inventory,
speciied radio service to be provided by a speciied and authorize payments, and they increasingly serve as
transmitter. (Ragazzi, 2005) electronic keys for everything from automobiles to secure
facilities. (Dholakia, Zwick, et al., 2005) 9: The use of
Radio Frequency (RF) radio frequencies to read information on a small device
Refers to the use of radio carrier waves to transmit a known as a tag. (Owens et al., 2005) 10: A technology
broadcast signal. RF is essential in wireless communication, that uses radio frequency waves to communicate data
such as broadcast TV and GPS (Global Positioning System). between a moveable item with a small digital tag and a
(Yang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
564 Radio Frequency Identiication (RFID) Item-Level Tag Random Walk

reader to identify, track, or locate that item. (Mohamedally RAID: See Redundant Array of Inexpensive Disk.
et al., 2005) 11: This technology uses the electromagnetic
R spectrum radio signals to transmit information from a RAM: See Random Access Memory.
transponder (tag) to a receiver for purposes of identifying
items. This technology has been in development for a Random Access Memory (RAM)
standard to replace the Universal Product Code (UPC) A collection of fast semiconductor elements that store
symbol with the Electronic Product Code (ePC) symbol information transiently for use by a microprocessor.
through the Auto ID Center, formerly of MIT. (Morris- (Strauss, 2005)
Jones & Carter, 2005)
Random Access Instruction
Radio Frequency Identiication (RFID) The principled use of lexible features inherent in computers
Item-Level Tag to produce nonlinear learning environments. (Burrage &
An RFID tag with a unique electronic product codes (ePC) Pelton, 2005)
on each individual item; every jacket has its own ePC.
(Loebbecke, 2006) Random Forest
An ensemble of unpruned trees obtained by introducing
Radio Frequency Identiication (RFID) two bootstrap resampling schema, one on the objects and
Pallet-Level and Case-Level Tag another one on the predictors, such that an out-of-bag
An RFID tag with one electronic product code per pallet or sample provides the estimation of the test set error, and
case integrated into the packaging material or sometimes suitable measures of predictor importance are derived for
attached during the production or logistics process, for the inal interpretation. (Siciliano & Conversano, 2005)
example, as part of a printed label. (Loebbecke, 2006)
Random Forgery
Radio Frequency Identiication (RFID) Reader Forgery in which the forged signature has a totally different
(Interrogator) semantic meaning and overall shape in comparison to the
Device communicating with RFID tags and passing the genuine signature. (Chakravarty et al., 2005b)
tag data in digital form to a computer system. (Loebbecke,
2006) Random Variable
A variable characterized by random behavior in assuming
Radio Frequency Identiication (RFID) Tag its different possible values. (Mukherjee, 2005)
(Transponder)
Key component of RFID technology consisting of a minute Random Visible Scrolling
computer chip with an antenna attached to transport or If a media player and a data format support real-time random
product packages. Tags can be updated and reprogrammed. access to any position within a respective continuous,
(Loebbecke, 2006) time-dependent document, such as a video recording, a
common slider interface can be used to visually browse
Radio Network Controller (RNC) the iles content in a similar way, as a scroll bar is used
The network element that manages the radio part of UMTS to navigate and browse static information, such as text
controlling several Node-Bs. (Iossiides et al., 2005) iles. (Hrst, 2006)

Radio Resource Management (RRM) Random Walk


The algorithms used by the system (radio network A sequence of random steps in an n-dimensional space,
controller) to distribute the radio resources (such as where each step is of ixed or randomly chosen length. In
codes or power in UMTS) among the users. (Iossiides a random walk time series, time is advanced for each step
et al., 2005) and the time series element is derived using the prescription
of a one-dimensional random walk of randomly chosen
Radius step length. (Denton, 2005)
An authentication method that allows remote users to access
a server, or a network or computing resource. (Knight &
Labruyere, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ra ndom ize d Algorit hm Rat ing 565

Randomized Algorithm high-quality systems quickly, primarily by using iterative


A probabilistic sampling technique for exploring a space prototyping, active user involvement, and computerized
combining learning theories and Monte Carlo approaches. development tools. (Steinbach & Knight, 2005) 6: A
R
(Alippi & Vanini, 2005) software-development process that allows usable systems
to be built in as little as 90 to 120 days, often with some
Randomized Sample compromises. (Lacaze et al., 2006)
A group of subjects (participants) in a study selected
without regard to any particular characteristics, to help Rapid Economic Justiication Model
ensure that measured effects of the experimental treatment A Microsoft model that attempts to align information
on members of that group are not brought about by some technology investments with the success of the underlying
shared characteristic other than the treatment. (Fisher, business through deining corporate strategy, critical
2005) success factors, project risks, and impacts. Based loosely
of the total cost of ownership approach to information
Range Query technology investment evaluation. (Dykman, 2005)
A query returning an aggregate information (i.e., sum,
average) about data belonging to a given interval of the Rasmussens Ladder Model
domain. (Buccafurri & Lax, 2005) A cognitive model that models human decision-making
processes. This model is often used for human error
Ranking analysis. (Seta, 2006)
List of the most similar images extracted from the database
according to the querying sketch/image or other user- Raster Analysis
deined criteria. The ranking displays the retrieval results Implements its spatial relationships mainly on the location
to the user. (Kao & Tendresse, 2005) of the cell. Raster operations performed on multiple input
raster data sets usually output cell values that are the result
Ranking Function of calculations on a cell-by-cell foundation. The value of
A function that matches the information in documents with the output for one cell is usually independent on the value
that in the user query to assign a score for each document or location of other input or output cells. (Sadoun, 2006)
in the collection. (Fan & Pathak, 2005)
Raster Data
Rapid Application Development (RAD) The information category of arrays, also called MDD.
1: A methodology that consists of techniques to accelerate (Baumann, 2005)
application development. It features prototyping, aimed
at achieving demonstrable results quickly; iteration, an Raster Database Management System
approach that commits to incremental development of the A database management system that offers support for
prototype; and a time-box concept that focuses on delivery, storage and retrieval of raster data. (Baumann, 2005)
not scope. (Asprey, 2005) 2: An iterative prototyping
development approach where requirements and analyses Raster Graphics
are continuously reined throughout the lifecycle of a Approach for the description of graphical content by color
project. (Sethi & Sethi, 2006b) 3: A software development points arranged on a regular pixel grid. (Rosenbaum et
approach that aims to enable speedier development, al., 2006)
improve the quality of software, and decrease the cost of
development. It emphasizes the use of Computer-Aided Rate of Adoption
Software Engineering (CASE) tools and fourth-generation The relative speed with which an innovation is adopted by
programming languages by highly trained developers, and members of a social system. (Askar & Halici, 2005)
uses intensive workshops to assist requirements deinition
and systems design. (M. Lang, 2005) 4: The use of a team Rating
of experts in a concentrated session to develop a product An opinion of a customer about a product used by
that meets the user requirements. (Ally, 2005b) 5: A recommendation algorithms. This is usually expressed in
system development methodology that aims to produce a Likert scale (e.g., from 1 to 5). (Sarwar et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
566 Ratio Data Real Domain (Particular or Speciic)

Ratio Data RDFS: See Resource Description Framework Schema.


Data that is in order and has ixed spacing; a relationship
R between the points that is relative to a ixed external point. RDL: See Rule Deinition Language.
(Morantz, 2005)
RDP: See Reconstruction and Development Program.
Ratio of Change
A ratio of actual change (absolute difference) to the RDVA
maximum potential change. (Yao & Zhao, 2005) Rural Development Volunteer Association. (Chand &
Leeming, 2005)
Rational Instrumental Meaning (RIM)
Meaning useful for something else. (Boyd & Zhang, Re-Buy
2005) The business-to-business buying process may vary in
complexity from a new task buying situation, to a modiied
Rational Justiication re-buy where the irm shops for a new vendor of a current
Analyze how the project advances goals and objectives, product, to a straight re-buy, which is a periodic, perhaps
and upholds values of the organization. (Sipior, 2005) automated repurchase situation. (Bridges et al., 2006)

Rationalism Re-Enacted Affiliative Symbolic Meaning


The concept that we may gain knowledge purely through (REASM)
the operation of thought and rational analysis. (Clarke, Life-world identity-centered learning that produces a deep
2006) understanding of who we are (e.g., a Cambridge woman
or an MIT man). (Boyd & Zhang, 2005)
Rationality
The ability to infer with relative certainty from existing Re-Identiication
or past behavior and statements future behavior and The risk that publicly released data could allow public
statements. (Murphy, 2005c) identiication of a survey respondents information or could
be used in a way harmful to them. Federal agency data
RBAC: See Role-Based Access Control. releases must comply with statistical disclosure limitation
methods to guard against this risk. (Mullen, 2005)
RBF: See Radial Basis Function Neural Network.
Re-Purposeable Learning Object
RBOC: See Regional Bell Operating Company. Learning object designed as a template that can be
reconstructed to serve new learning objectives. (Kaur
RDBMS: See Relational Database Management et al., 2005)
System.
Reaction Time (RT) Probe
RDF: See Resource Description Framework. A commonly used secondary task in which changes in
reaction time performance of the secondary task are of
RDF Graph interest. (Owen, 2006c)
An RDF model can be seen as a graph structure build-up by
triples. The nodes of the graph are all resources and atomic Read Performance
values mentioned in the model. Nodes are linked by edges The maximum number of read operations per time unit.
if they occur as subject and object in a triple contained in Replication will normally increase read performance.
the corresponding RDF model. (Stuckenschmidt, 2005) (Frank, 2005a)

RDF Model Theory Real Domain (Particular or Speciic)


Theory that formally deines the interpretation of an One of the different application areas that can require
RDF model using the notion of logical implication. The modeling with UML. Examples: Web applications, real-
speciication also deines a set of inference rules for time systems, XML, business modeling, frameworks,
computing implied statements. (Stuckenschmidt, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re a l M ode l Re c a ll 567

communication protocols, workflows, geographical Real-Time System


information systems, and so forth. (Riesco et al., 2005) A system that processes and updates information always
within a given time. (Aifanti et al., 2005)
R
Real Model
The setting where a real protocol is run (without any Realism
trusted help). (Lindell, 2005) 1: A position acknowledging a reality independent of
actors (including researchers) thoughts and beliefs.
Real Option Method (Carlsson, 2005) 2: The belief that there is a reality
An evaluation approach that focuses on the notion of independent of our perceptions of it. (Dobson, 2005) 3:
uncertainty and probability of risk. The theory is that a The theory that particular things exist independently of
irm should invest today only if the net present value of our perception. Scientiic realism is the view that an object
the project is high enough to compensate for giving up the mind-independent reality exists, and that our scientiic
value of the option to delay the project. (Dykman, 2005) theories aim to inform us of the nature of this reality.
(Aarons, 2006)
Real Options Theory
Financial valuation tool that helps in calculating the value of Realist IS Evaluation
managerial lexibility under uncertainties. (Li, 2005b) Evaluation (research) based on critical realism aiming at
producing ever more detailed answers to the question of
Real Simple Syndication (RSS) why an IS initiative works (better), for whom, and in what
An XML-based mechanism for incorporating current circumstances (contexts). (Carlsson, 2005)
content from a serving site into an independent Web page. A
community on stock trading might incorporate an RSS feed REASM: See Re-Enacted Aff iliative Symbolic
for the stocks they are tracking, or even more sophisticated Meaning.
graphs if those feeds are available. (Isaak, 2006)
Reasoning
Real Time 1: The ability of a system to ind implicit consequences
1: In the context of e-commerce, a real-time commission of its explicitly represented knowledge. Such systems
reporting system refers to a system in which a commission are therefore characterized as knowledge-based systems.
request is processed within milliseconds so that a (Roldn-Garca et al., 2005) 2: The extraction of
commission report is available virtually immediately to information not directly available, mainly through the
an online salesperson. (Zhao, 2005) 2: Processing must application of rules on the given facts. This procedure is
respond within a bounded time to an event. (Swierzowicz, driven by the reasoning engine. (Vassilakis & Lepouras,
2005) 3: Communication that is simultaneous. (Burke et 2006)
al., 2005)
Reasoning About Patterns
Real-Time Animation Deriving supports of patterns without accessing a database.
Frames created at a minimum rate of 20 per second to (Kryszkiewicz, 2005)
avoid licker. (Cottingham, 2005)
Reasoning Engine
Real-Time Application A computer program that enables agents to negotiate
One class of applications needs the data in each packet by with other agents and that involves negotiation strategy.
a certain time, and if the data has not arrived by then, the (Polgar, 2005a)
data is essentially worthless. (Yang et al., 2005a)
Recall
Real-Time Streaming Protocol (RTSP) 1: A form of cognitive retrieval in which the individual must
The Internet standard for controlling delivery of streaming generate a list of possible options. (Corral et al., 2006) 2:
of multimedia data. (Yang et al., 2005a) Denotes the ratio of the number of slots the system found

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
568 Re c e ive r Re c om m e nde r Syst e m

correctly to the number of slots in the answer key. (Song themselves and their lifestyle, and to feel recognized by
et al., 2005) 3: The percentage of relevant documents their experiences with them. (Pryor, 2005)
R in a given query in a collection that are returned by an
information retrieval system. (Meng & Chen, 2005) 4: The Recognition Technology
number of relevant images retrieved as a percentage of the One of several technologies such as bar code recognition,
total number of relevant images in the database. (Sural et optical character recognition (OCR), intelligent character
al., 2005) 5: The ratio of the number of relevant documents recognition (ICR), and optical mark recognition (OMR)
retrieved to the total number of relevant documents in the that facilitate document registration and retrieval. (Asprey
document collection. (Fan & Pathak, 2005) et al., 2005)

Receiver Recommendation
The destination of the message or the person who decodes 1: A iltered list of alternatives (items of interest) that
the message. This requires skills, for example, in listening support a decision-making process. (Parmar & Angelides,
or reading. (Jacobson, 2006) 2005) 2: An output interface of a recommender system.
Given a customer, the system recommends a list of products
Reciprocal Communication the customer will be interested in (e.g., top-10 products).
Communication that involves two or more (human or non- (Sarwar et al., 2005) 3: Results of the process of providing
human) participants. The direction of communication may useful resources to a user, like products, services, or
be two way or more. However, this type of communication information. (Loh et al., 2005)
does not necessarily suggest that participants communicate
in any preset order. (El-Gayar et al., 2005) Recommendation System
1: A system that retrieves information based on users
Reciprocity preferences. (Chen & McLeod, 2006) 2: Software that,
Returning favors, which is a major way of building trust. given preferences expressed by a user, select those choices,
(Ridings & Gefen, 2005) from a range of them, that better satisfy these users
preferences. (de Campos et al., 2005)
Reclassiication Process
The reclassiication process has to be performed whenever Recommender System
a product was classiied based on a classiication system A, 1: A computer program that aids people to ind information
but is needed to be classiied based on another classiication by giving recommendations on the searched subject. It is up
system B. The difference between reclassifying and to the user to select useful data among the recommended
classifying a product is the fact that in the reclassiication ones. (Nabuco et al., 2006) 2: A computer program that
process, the existing information of classiication system recommends some sort of resource based on algorithms
A is used to determine the class of classiication system that rely on some sort of user model, some sort of content
B. (Abels & Hahn, 2006) model, and some means of matching the two. (Dron, 2005)
3: A software system that makes recommendations to a
Recognition user, usually analyzing the users interest or need. (Loh et
1: A form of cognitive retrieval in which an individual al., 2005) 4: A system that recommends certain information
is given a list of viable options from which to select. or suggests strategies users might follow to achieve certain
Recognition-based search mechanisms have been found goals. (Nasraoui, 2005) 5: An information-iltering
to outperform those that are based on recall. (Corral et technique based on machine learning and/or statistical
al., 2006) 2: Different professional groups look for and methods. Widely used in Internet commerce nowadays.
require different forms of recognition for their professional (Sarwar et al., 2005) 6: A special type of decision-support
development. Where academic staff focus on publication, system that gives recommendations for further actions or
designers need to develop a portfolio of work, and software related items. (Anke & Sundaram, 2006) 7: Any system
developers receive kudos and build a reputation based on that provides a recommendation, prediction, opinion,
a product that has been developed and the code therein. or user-conigured list of items that assists the user in
(Williamson et al., 2006) 3: The extent to which digital evaluating items. (Schafer, 2005) 8: Assists and augments
media should both enable marginalized people to recognize the transfer of recommendations between members of a
community. (Parmar & Angelides, 2005) 9: System that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re c om m e nde r Syst e m in E-Com m e rc e Re duc t 569

helps the user to choose products, taking into account backward recovery, the state of the application that has been
his/her preferences. (Lorenzi & Ricci, 2005) modiied by a set of uninished operations is reversed by
restoring it to a previous consistent value. With roll-forward
R
Recommender System in E-Commerce recovery, critical components, processes, or objects are
Set of tools implanted in EC sites for suggesting services replicated on multiple computers so that if one of the replicas
and in order to provide consumers with the needed fails, the other replicas continue to provide service, which
information to decide about services to acquire. They are enables the system to advance despite faults. (Zhao et al.,
usually domain-specialized tools. (Gil & Garca, 2006) 2006) 2: The task of recovery is to return the database to
a consistent state after a crash: the effects of committed
Reconciliation Procedure transactions must be guaranteed to be persistent, and effects
When, in lazy protocols, two conlicting transactions have of not committed transactions must be undone. Recovery
been committed before conlict detection, this procedure requires that all modiications are written to some stable
is needed to adequately reconcile and merge the respective storage as part of a commit, or else these modiications
updates. (Muoz-Esco et al., 2005) would be lost in a crash. (Meixner, 2005)

Reconstruction and Development Program Recursive


(RDP) A recursive procedure is one that has the ability to call
The irst democratic governments socioeconomic policy itself. (Millet, 2005)
framework designed to narrow the infrastructural gap
between the poor and the rich. This includes ambitious Recursive Partitioning
goals for the provision of houses, services, education, and 1: Learning paradigm that employs local averaging to
health care. This was only partially successful and was estimate the class posterior probabilities for a classiication
followed up in 1997 by GEAR (Growth, Employment, problem. (Domeniconi & Gunopulos, 2005) 2: The method
And Redistribution strategy), a more comprehensive used to divide data at each node of a classiication tree. At
macro-economic policy aimed at creating a sustainable the top node, every variable is examined at every possible
overall economic growth and employment opportunities. value to determine which variable split will produce the
(Arellano et al., 2005) maximum and minimum amounts of the target variable
in the daughter nodes. This is recursively done for each
Record additional node. (Breault, 2005)
A set of ields that contain facts about something, such as
an item sold. Records are stored in iles. (Maris, 2005) Red Tape
Pointless bureaucratic procedures that citizens have to
Record Linkage endure while dealing with government agencies. (De,
A computer-based process that combines sources of 2005)
existing personal information with additional information
that refers to the same person, or to his or her family, Redeinition
friends, schools, employer, area of residence, or geographic The process by which an innovation is redeined to it
environment. (Mullen, 2005) the organization during its implementation. See also
Restructuration. (Klobas & Renzi, 2005a)
Recovery and Repair
Recovery is the restoration of the state of a component on Redirection
the same or a different processor, so that the component Sending a visitor to a Web site address that is different
can continue to execute operations and provide service. from what was typed into the browser URL window or a
Repair involves identiication of the primary cause of the link. (Owen, 2006d)
fault and re-initialization or replacement of the faulty
component. (Zhao et al., 2005) Reduct
Is minimal with respect to inclusion subset C of B
Recovery (Roll-Backward, Roll-Forward) preserving a given indiscernibility (discernibility)
1: Recovery includes incorporating a new replica into constraint, for example, IND(C)=IND(B). Many different
the system and restarting a replica that failed. With roll- kinds of reducts with respect to different discernibility

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
570 Re dunda nt Arra y of I nex pe nsive Disk s (RAI D) Re fe re nt ia l I nt e grit y Re st ric t ion

criteria have been investigated and used in searching for systems. It is a conceptual framework or blueprint for
relevant patterns in data. (Pawlak et al., 2005) systems development. (Fettke, 2005)
R
Redundant Array of Inexpensive Disks (RAID) Reference Model of Open Distributed Processing
1: Uses the server processor to perform RAID calculations. (RM-ODP)
Host CPU cycles that read and write data from and to disk An ISO and ITU standard for system modeling designed
are taken away from applications. Software RAID is less to model open distributed systems. (Naumenko, 2005)
costly than dedicated hardware RAID storage processors,
but its data protection is less eficient and reliable. (Rahman, Referenceable Table
2005e) 2: A method of accessing multiple individual disks A table row which can be referenced by REF type values.
as if the array were one larger disk, spreading data access The table is based on a structured user-deined type and
out over these multiple disks, thereby reducing the risk comprises one extra column containing row (or object)
of losing all data if one drive fails and improving access identiiers generated automatically when a new row is
time. (Tong & Wong, 2005b) inserted into the table. In Oracle, such a table is called an
object table. (Zendulka, 2005b)
Redundant Association Rule
An association rule is redundant if it can be explained Referendum
based entirely on one or more other rules. (Denton & A public opinion poll, where local, regional, or national
Besemann, 2005) authorities offer citizens the possibility to vote on a speciic
issue, generally on two alternativesyes or no. The
Reeds Law multi-phase referendum uses deliberative agenda setting,
Developed by David P. Reed, states that the utility of large feedback processes, and multiple choices. (Keskinen &
social networks increases exponentially with the size of Kuosa, 2005)
the network. (Mew, 2006)
Referential Action
Reengineering Specialized rule used to automatically maintain referential
1: Activities that seek to radically change business integrity. Defines specific reactions to compensate
processes and support systems in an organization. (Sarkis referential integrity violations. They may be Cascade,
& Sundarraj, 2005) 2: The examination and alteration of Restrict, No Action, Set Default, or Set Null. (Rivero,
a subject system to reconstitute it in a new form and the 2005)
subsequent implementation of the new form. (Aversano
et al., 2005) 3: The redesign of a corporations business Referential Integrity
processes (or part of them) to take place over the Internet. 1: A concept developed as part of relational database
The main goals are reduced costs, lower product cycle management systems. A connecting construct or key
times, faster customer response, and improved service allows a database designer to optimally develop a set
quality. (Scupola, 2005) of tables while retaining links between related data.
With referential integrity, records cannot be updated in
REF isolation in an inconsistent manner. (Horiuchi, 2005a) 2:
A data type value which references a row in a referenceable In hypertext, a measure of the reliability of a reference to
table (or object, in Oracle). (Zendulka, 2005b) its endpoints. A reference has the property of referential
integrity if it is always possible to resolve it. When
Refactoring references are represented as links, it is called link integrity.
A change to a system that leaves its behavior unchanged, (Martnez-Gonzlez, 2005)
but enhances some non-functional quality factors such as
simplicity, lexibility, understanding, and performance. Referential Integrity Restriction
(Favre et al., 2005) A special case of an inclusion dependency, when Z is the
primary key K of S. In this case, X constitutes a foreign key
Reference Model FK for R. This restriction can be stated as R[FK]<<S[K].
A model representing a class of domains, for example, (Rivero, 2005)
a reference model for production planning and control

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Reineable Regional Development 571

Reineable Relexive Modernization (Risk Society)


A generalization of part, feature, specialization, and The theory that we now live in an age of intensifying
instance. (Dori, 2006) relection at both the personal and the institutional levels,
R
in a society in which tradition and other previously widely
Relective Practice accepted elements of social life and nature are increasingly
1: Refers to the notion that educators need to think being undermined and lost. This theory is bound up with the
continuously about and evaluate the effectiveness of the view that information liberates, and that we are no longer
strategies and learning environment designs they are constrained by the shackles of gender, class, and other
using. (Torrisi-Steele, 2005) 2: Analyzing events that have sources of location and identiication. (David, 2005)
happened, usually in a group setting, so that events are
seen from different perspectives. (Dingsyr, 2006) Refresh Cycle
The frequency with which the data warehouse is updated
Relective Practicum (e.g., once a week). (Peter & Greenidge, 2005b)
A process in which students relect while performing a
real-world task; also involves an ongoing dialogue with a Refusal of Response
coach. (Berg, 2005h) Respondents outward omission of a response due to
personal choice, conlict, or inexperience. (Brown &
Relective Society Kros, 2005)
One that takes a critical stance to information received
and beliefs held. (Baralou & Stepherd, 2005) Regional Area
A geographical area located outside major metropolitan
Relective Software centers. (Vrazalic et al., 2005)
Computational process that reasons about itself, comprising
an ingredient process (interpreter) formally manipulating Regional Bell Operating Company (RBOC)
representations of its own operations and structures. (Kunz One of the seven Bell operating companies formed during
& Gaddah, 2005) the divestiture of AT&T. An RBOC is responsible for local
telephone services within a region of the United States.
Relective Teaching (Raisinghani & Ghanem, 2005)
Teaching based on problem solving and examination, and
questioning of assumptions, thoughts, and understandings Regional Cluster
brought to teaching and other aspects of the work of Geographic concentration of organizations, predominately
a professional teacher, in light of prior knowledge, SMEs, in the same or related industries that share
experiences, personal practical theories, and values. resources and have access to other institutions important
(Wieseman, 2005b) to competition, for example educational and training
facilities. This close proximity creates a network of
Relexive Learner alliances that enables more productive operation, facilitates
This type of learner is someone who explores his or her innovation, and lowers barriers to new entrants. (Mason
experiences of learning to better understand how he or et al., 2006)
she learns and improve his or her learning, and thus
becomes a lifelong learner. This kind of student is more Regional Development
self-aware and self-critical, honest about him or herself, 1: The act, process, or result of actions to grow, expand,
open to criticism and feedback, curious and prepared to or bring a regional place to a more advanced or effective
try different approaches, motivated to improve, and more state. (Thompson, 2005) 2: The notion of development
able to carry through independent learning. Strategies that has been recently better deined with the concept
that may help to improve and encourage relection include of learning region (regionalit apprendente) that
self- and peer assessment, learning logs, critical incident suggests the existence of a dynamic net of relationships
and ieldwork diaries, relective commentaries, and action among different activity sectors (economic, administrative,
research. (Correia & Sarmento, 2005) educational, and cultural) of a region. It is thought that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
572 Re giona l E-Forum Re ha bilit at ion Ac t

education and training represent the central device of such in the center-based clustering algorithms are replaced by
development. (Giorgi & Schrch, 2005) regression models. (B. Zhang, 2005)
R
Regional E-Forum Regression Model
A community and citizen engagement process linking A pattern or set of patterns that allows a new instance to
government agencies and community, using ICT as the be mapped to one numerical value. Regression models are
means of communication, and extending across and learned from data where a special attribute is selected as
involving a region. (Sutcliffe, 2005) the output or dependent value. For instance, a model that
predicts the sales of the forthcoming year from the sales
Regional Identity of the preceding years is a regression model. Regression
A linguistic and cultural concept linked to the feeling of models can be learned by many different techniques:
belonging shown by the inhabitants. (Giorgi & Schrch, linear regression, local linear regression, parametric and
2005) nonparametric regression, neural networks, and so forth.
(Hernandez-Orallo, 2005b)
Regional Tourism System (RTS)
1: In the Australian context, a sectoral network of Regression Tree
organizations and institutions that interact or are 1: A decision tree where the dependent attribute is
interdependent, where the hub of such interactions is located numerical. (Gehrke, 2005) 2: An oriented tree structure
outside of major cities. (Taylor, 2005) 2: The combination obtained by a recursive partitioning of a sample on the
of organizations and institutions with an interest in the basis of a sequential partitioning of the predictor space
management of tourism in a given destination. Regions may such to obtain internally homogenous groups and externally
be deined by administrative boundaries or by communities heterogeneous groups of cases with respect to a numerical
of interest. (Carson, 2005) response variable. (Siciliano & Conversano, 2005)

Registration Authority (RA) Regression-Type Neural Network


An authority in a network that veriies users requests for A neural network with one hidden layer and a unique
a digital certiicate before a digital certiicate is issued. linear output neuron used to approximate a mathematical
It is a part of a Public Key Infrastructure. (Xu & Korba, function. (Alippi & Vanini, 2005)
2005)
Regular Two-Way Audio and One-Way Video
Regression Teleconferencing
1: A regressive saccade. A saccade that moves back in Two-way interactive telecounseling, teleteaching,
the direction of text that has already been read. (Poole & teletraining, telediscussion, and extended contact program.
Ball, 2006) 2: A statistical method of estimating the exact (Sharma, 2005)
amount a variable of interest will change in reaction to
another variable. (Benrud, 2005) 3: A statistical method Regulatory Framework
of learning the relationship between two sets of variables A sphere of concern; organizational level that is required
from data. One set is the independent variables or the to control the interoperable technical domain or legislation
predictors, and the other set is the response variables. pertinent in m-commerce. Most important current concrete
(B. Zhang, 2005) entities within this sphere of concern are governments
and intergovernmental organizations (EU, OECD, UN,
Regression Analysis etc.), industry associations (OMA, W3C, etc.), and
A statistical technique used to ind relationships between proper standardization bodies (ISO, ETSI, ANSI, etc.).
variables for the purpose of predicting future variables. (Veijalainen & Weske, 2005)
(Yeo, 2005)
Rehabilitation Act
Regression Clustering A federal law that was created to empower individuals
Combining the regression methods with center-based with disabilities to maximize employment, economic self-
clustering methods. The simple geometric-point centers suficiency, independence, and inclusion and integration

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Reiication Relational Data 573

into society. It also was enacted to ensure that the federal Unique Names Principle, the Domain Closure Axiom,
government plays a leadership role in promoting the the Completion Axioms, and Equality Axioms. This
employment of individuals with disabilities. (Bursa et formalization permits identiication of the answering with
R
al., 2005) logical consequences. (Alonso-Jimnez et al., 2005)

Reiication Relapse
The use of various ideological strategies for the purpose The tendency for repeated reversions to earlier patterns
of maintaining a particular (social/organizational) order. of the particular activity to recur and for even the most
(Land et al., 2006b) extreme patterns typical of the height of the addiction
to be quickly restored after many years of abstinence or
Reimbursement control. (Grifiths, 2005)
Accepting telemedicine encounters by health insurance
companies as one of the different medical outlets and Relation
accordingly reimbursing doctors and physicians for their 1: A mathematical structure similar to a table in which
encounters with, for example, rural patients, could assist every row is unique, and neither rows nor columns have a
in increasing telemedicine success and diffusion. (Al- meaningful order. (Denton & Besemann, 2005) 2: From a
Qirim, 2005) type point of view, a relation is simply a set of tuples. In most
implementations of the relational model, however, multi-
Reinforcing Ethical Behavior sets (sets with repetitions) are used. (Badia, 2005d)
The frequency of reinforcement is seen as a crucial factor
in maintaining standards. Rewarding ethical conduct and Relational Algebra
punishing unethical behavior is critical to the success of A collection of unary and binary operators that take one
ethical practice. (Grieves, 2006a) or two tables as input and produce a table as output. The
relational algebra operators of Cartesian Product, Selection,
Reinforcing Feedback Projection, set Difference, and Union are considered to be
Visual, auditory, or tactile indications that the student necessary and suficient for extracting any desired subset
stated the correct response. This type of feedback includes of data from a relational database. (Dadashzadeh, 2005)
some form of praise for the correct response. (Lazarus,
2005a) Relational Calculus
A notation founded on predicate calculus dealing
Reinforcing (Positive) Feedback with descriptive expressions that are equivalent to the
A systemic pattern that represents growth and self-feeding operations of relational algebra. Two forms of the relational
processes. It explains the dynamics underlying vicious calculus exist: the tuple calculus and the domain calculus.
and virtuous cycles with downward and upward spiral (Dadashzadeh, 2005)
effects. (Maani, 2005)
Relational Community
Reintermediation A community that forms through the relationships of its
The process of using ICT technologies to identify and members based on common interests or issues, rather
exploit new intermediary roles in the supply chain. than on the basis of a shared physical location. (Roberts
Reintermediation strategies are often based on providing et al., 2006c)
superior service or convenience to buyers. New
intermediaries that have taken advantage of the Internet Relational Completeness
to build large organizations include Amazon.com, eBay, A relational query language is said to be relationally
and iTunes.com. Reintermediation is often seen as the complete if it can express each of the ive principal
opposite of disintermediation. (Fraser, 2005) operations of relational algebra. (Dadashzadeh, 2005)

Reiters Formalization of Database Theory Relational Data


A set of axioms that, when added to a relational database, Data where the original information cannot be represented
formalize the reasoning with them. They are the in a single table, but requires two or more tables in a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
574 Re lat iona l Dat a M ode l Re lat iona l Trust

relational database. Every table can either capture the called a database engine. (Rahman, 2005e) 2: A software
characteristics of entities of a particular type (e.g., person application for managing databases utilizing the relational
R or product) or relationships between entities (e.g., person data model. (Dadashzadeh, 2005)
bought product). (Perlich & Provost, 2005)
Relational Database Structure
Relational Data Model Information is organized into tables; tables are composed
1: A data model that represents entities in the form of of records; and records are made up of ields (also known
data tables. (Artz, 2005b) 2: A logical way of organizing a as data items or attributes). (Schultz, 2005)
database as a collection of interrelated tables. The logical
relationship between tables representing related data is Relational Learning
accomplished through shared columns, where the primary Learning in relational domains that include information
key column of one table appears as a foreign key column from multiple tables, not based on manual feature
in another. (Dadashzadeh, 2005) construction. (Perlich & Provost, 2005)

Relational Database Relational OLAP (ROLAP)


1: A collection of data items organized as a set of formally 1: Provides OLAP functionality by using relational
described tables from which data can be accessed or databases and familiar relational query tools to store
reassembled in many different ways without having to and analyze multi-dimensional data. (Tan, 2005b) 2:
reorganize the database tables. (Alhajj & Polat, 2005a) Implementation of a data warehouse and associated
2: A database that has relations and relational algebra OLAP tools over a relational database and RDBMS.
operations as underlying mathematical concepts. All This approach must be based on an appropriate mapping
relational algebra operations result in relations as output. A between the multi-dimensional conceptual schema and the
join operation is used to combine relations. The concept of relational logical/physical schema. The great advantage
a relational database was introduced by E. F. Codd at IBM of this approach is that it inherits the existing technology
in 1970. (Denton & Besemann, 2005) 3: A database that and knowledge on classical relational database systems.
stores data in tables, which are sets of tuples (rows). A set (Hernandez-Orallo, 2005a) 3: Architecture for OLAP
of corresponding values across all rows of a table is called systems that uses a relational system as the storage
an attribute, ield, or column. (Koeller, 2005) 4: A method mechanism for the data. (Deshpande & Ramasamy, 2005)
of storing data in tables and columns, and operating on 4: OLAP architecture that is based on a relational database
that data through a set-oriented query language (SQL) and engine. Data cubes are maintained in relational tables.
specialized software the takes care of the procedural and (Riedewald et al., 2005) 5: Method of implementing a data
physical aspects of data storage and manipulations. (Millet, warehouse that relies on relational technology. In ROLAP,
2005) 5: Database management system (DBMS) type in the warehouse is implemented as a relational database,
which relations between tables are implemented only by using tables to deposit the information and relational
means of connections in the data, rather than hard-coded technology (SQL) to access it. (Badia, 2005c)
in the database. Its main advantages are lexibility and
maintainability. Current popular examples include Oracle Relational Practice
and SQL Server. Increased system performance made it Work practice related to communication with others,
the preferred DBMS starting in the 1990s. (Schultz, 2005) including formal and informal interaction. (P.M. Leonardi,
6: Widely used variety of databases based on the relation 2005)
algebra by Codd. (Schmidt et al., 2005)
Relational Privacy
Relational Database Management System The control over ones person and ones personal
(RDBMS) environment. (Cook, 2005)
1: Database management system that maintains data
records and indices in tables. Relationships may be created Relational Trust
and maintained across and among the data and tables. It Trust that develops over time after repeated interactions.
is a software package that manages a relational database, (Ridings, 2006b)
optimized for rapid and lexible retrieval of data; also

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re lat ionship Re leva nc e 575

Relationship Relationship-Based Virtual Community


1: A connection concept between object types. There An online community where users (sometimes
are several types of relationships including: aggregation, anonymously) share certain personal life experiences
R
composition, association, and inheritance (generalization/ with support of other users in the community. (Jong &
specialization). (D. Brandon, Jr., 2005a) 2: The basic Mahatanankoon, 2006)
element in one conceptual model. It is deined as an
association among entities. (Cuadra et al., 2005) Relative Advantage
1: Degree to which an innovation is seen as being superior to
Relationship Capital its predecessor. (Green et al., 2005) 2: The degree to which
The relationships with the irms customers, but also with an innovation or process is perceived as being superior to
suppliers and the environment in whole (also referred to that which preceded it. (Jones & Gupta, 2005)
as customer capital). (Ariely, 2006a)
Relative Advantage of Innovation
Relationship Commitment The degree to which an innovation seems to be better than
The degree to which either party of a commercial the idea, object, practice, or process that it is replacing.
relationship (irm or customer) is likely to remain in the (Askarany, 2005)
relationship. (Moore et al., 2006)
Relative Difference
Relationship Equity Matrix A measure that represents the difference between an
Analytical model developed by Conway and Fitzpatrick association and a conditional association relative to the
(1999) that allows a representation of various consumer association based on a given measure. (Yao & Zhao,
categories and of the associated CRM operations performed 2005)
by the company. (Gur u, 2006b)
Relative Risk
Relationship Marketing Measure that compares the incidence of a disease in a
1: Marketing activities and strategies related to the creation, group of interest with the incidence in a control group.
maintenance, and development of successful relationships. (Vidal-Rodeiro et al., 2005)
(Flavin & Guinalu, 2006) 2: The process of creating a
long-term beneicial commercial relationship between a Relative Time Period
irm and a customer through the use of individualized Informationbase parameter that deines relative time
interactive communications and offerings. (Moore, period for which the report is to be produced, for
Warkentin, et al., 2006) 3: The process of maintaining example, yesterday, today, previous month, and so forth.
and enhancing relationships with customers; focusing Informationbase driver translates this into actual dates
on customers needs, this strategy considers customers as for data processing. (Dragan, 2005)
important long-term assets. (Hwang & Stewart, 2006)
Relaxation Labeling
Relationship Risk A parallel method for updating beliefs or probabilities of
Risk derived from imbalance of power among trading states of random variables in a Bayesian network. Node
partners who exercise opportunistic behaviors that, in turn, probabilities are updated in terms of their consistencies
lead to poor reputations and lack of business continuity. with neighboring nodes and the current evidence. (Caelli,
(Ratnasingam, 2005) 2005)

Relationship Trust Relevance


The subjective probability with which organizational A score assigned to a search result, representing how
members collectively assess that a particular transaction well the result matches the search query. In many cases, a
will occur according to their conident expectations. results relevance determines the order in which the result
(Ratnasingam, 2006) is presented to the user. (Guan, 2006d)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
576 Re leva nc e Fe e dba ck Re m ot e Proc e dure Ca ll (RPC)

Relevance Feedback Reliable Multicast Transport Protocol II


1: A technique in which the user associates a score to (RMTP II)
R each of the returned hits, then these scores are used to A transport protocol for IP multicast, designed to reliably
direct the following search phase and improve its results. and eficiently send data from a few senders to large groups
(Farag, 2005a) 2: A technique that requires users to identify of simultaneous recipients. (Chakraborty et al., 2005)
positive results by labeling those that are relevant to the
query, and subsequently analyzes the users feedback Religious Institution
using a learning algorithm. (Wei & Li, 2005) 3: A score An organization, including some universities and
assigned to a search result, representing how well the colleges, that is afiliated with or sponsored by a religious
result matches the search query. In many cases, a results organization. (Rogers & Howell, 2005)
relevance determines the order in which the result is
presented to the user. (Guan, 2006f) 4: The information Relying Party
that is judged by a user and provided to an information A recipient who acts by relying on a certiicate and an
system. (Meng & Chen, 2005) 5: The user evaluates the electronic signature. (Mitrakas, 2005)
quality of the individual items in the ranking based on
the subjective expectations/speciication of the sought Remote
item. Subsequently, the user supplies the system with the Geographically distant from a center with technology
evaluation results (positive/negative instances, weights, support. (Brady, 2005)
etc.) and re-starts the query. The system considers the
user-knowledge while computing the similarity. (Kao & Remote Access
Tendresse, 2005) The ability to control instruments or systems and retrieve
relevant information at a distance. (Ko et al., 2005)
Reliability
1: The ability of a system or component to perform its Remote Collaboration
required functions under stated conditions for a speciied They come together as their avatars through the
period of time. (Schneidewind, 2005) 2: The improved communication networks as if they were gathered at the
quality of data transmission. Different types of reliability same place. (Terashima, 2005)
exist, including data accuracy or real-time delivery.
(Hosszu, 2005a) 3: Measure of the consistency of responses Remote Indigenous Community
to questions. (Witta & Lee, 2005) 4: Reliable assessment A community inhabited largely by indigenous people,
means that independent of who marks your work, it is located some distance from the nearest population center
expected you will receive the same mark. (Diamadis & and isolated from telecommunications and other services.
Polyzos, 2005) (Dyson, 2005)

Reliability, Repairability, Availability Remote Interaction


Reliability is a measure of the uptime of a system in the Information-technology-mediated human-to-human
absence of failure, and is given by the Mean Time Between communication over a distance. (Wiberg, 2005)
Failure (MTBF). Reparability is a measure of how quickly a
failed system can be restored to service, and is given by the Remote Method Invocation (RMI)
Mean Time To Repair (MTTR). Availability is a measure Enables the creation of Java-to-Java applications in which
of the uptime of a system, and is given by: Availability = the methods of remote Java objects can be invoked from
MTBF/(MTBF + MTTR). (Zhao et al., 2005) other Java virtual machines. (Kasi & Young, 2006)

Reliable Broadcast Remote Mobility


Requires that each correct process delivers the same set of Refers to remote users interacting with each other using
messages and that the set includes each message broadcast technology. (Mkinen, 2006)
by correct processes, but no spurious messages. (Muoz-
Esco et al., 2005) Remote Procedure Call (RPC)
1: Implements the classic request/reply communication
paradigm. Clients directly communicate with speciic

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re m ot e Worke r Re posit or y 577

servers and ask for data or functionality. (Fiege, 2005) 2: Repertory Grid (RepGrid)
One way of communicating in a client server model. The A cognitive mapping technique that can be used to
client and the server are located in different computers in a describe how people think about a phenomenon in their
R
network. An RPC is a synchronous operation requiring the world. The RepGrid technique, for IS, entails a set
requesting (client) to pass by value all the needed parameters of procedures for uncovering the personal constructs
to the server, then the client is suspended until the server individuals use to structure and interpret events relating
returns back the associated results. (Karoui, 2005) to the development, implementation, use, and management
of IT in organizations. The RepGrid contains three
Remote Worker componentselements, constructs and links. (Tan &
An individual who works at a different location than his/ Hunter, 2005)
her co-workers and/or manager. That person is remote,
in terms of physical presence from his/her colleagues. RepGrid: See Repertory Grid.
(Staples et al., 2005)
Replacement Model of Course Redesign
Rendering This model generally features a reduction in class-meeting
1: A process in which the layout and typography for time, replacing face-to-face time with online, interactive
content is created for a speciic human viewer, program, learning activities for students. (Twigg, 2005)
or output device. (Honkaranta & Tyrvinen, 2005) 2: A
process of producing realistic 3D images. There are four Replicated Database
main rendering methods used in visualization, that is, A regular database in which tables, queries, and reports
ray tracing, volume rendering, radiosity, and polygon cannot be modiied in design. (Parikh & Parolia, 2005)
rendering. (Ozer et al., 2005)
Replication Method
Rendezvous Node A method for managing redundant data in such a way that
A well-known host that simpliies the meeting of a new a system can be optimized in some way. (Frank, 2005a)
candidate with existing members of a multi-party session.
(Hossz, 2006) Replication (Passive, Active, Active with Voting,
Semi-Active)
Rendezvous Point (RP) 1: Multiple copies of an application program execute
PIM-SM constructs a multicast distribution tree around typically as multiple processes on different processors. In
a router called a rendezvous point. This rendezvous point passive replication, only one replica, the primary replica,
plays the same role as the core in the CBT protocol; executes the operations, and one or more backups stand
receivers meet new sources at this rendezvous point. ready to perform the operations if the primary fails. In
(Chakraborty et al., 2005) active replication, all of the replicas execute the operations
and communicate their results. In active replication with
Reorganization voting, all of the replicas execute the operations, and the
Aims at changing the structure, the processes, and the result produced by the majority of the replicas is taken as
policy of an organization. (Becker et al., 2006) the result of the operation. In semi-active replication, both
the primary and the backup replicas execute the operations,
Repair but the backups follow the directives of the primary, and
Minimal set of insert and delete operations which make only the primary outputs the results. (Zhao et al., 2005)
the database consistent. (Greco et al., 2005) 2: The process of creating read-only copies of any data.
Replication is supported by the security, directory, and
Repatriation ile services in a distributed computing environment.
Taking work that had been outsourced back in-house. Replication can improve availability and load balancing.
(Beaumont, 2005) (Bose et al., 2005)

Repeated Measure Repository


One of a multiple ANOVA of variables over time performed 1: A database in which the speciication and the description
in SPSS. (Molinari et al., 2005a) of the various artifacts of a software system are stored. As

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
578 Re pre se nt at ion Re put at ion Effe c t

far as database engineering is concerned, the repository that is being studied. Computer simulation is a form of
includes the schemas of the project database at all the representational decision support system. (McHaney,
R abstraction levels, as well as the correspondence between 2005)
them. All CASE tools rely on some sort of repository.
(Hainaut et al., 2005) 2: A centralized database where Representational Dimension
metadata about database structure, applications, Web The number of coordinates a vector space has. (Chvez
pages, users, and other application components are & Navarro, 2005)
stored and maintained. It provides a set of mechanisms
and structures to achieve seamless data-to-tool and data- Representational Diversity
to-data integration. (Lee, Suh, et al., 2005) 3: Database The practice according to which real-world entities
where researchers self-archive their works, either pre-prints are represented through totally independent and
or post-prints. The Open Archives Initiative proposes unsynchronized models in different information systems,
standards to allow access to different repositories. leading to inconsistencies and maintenance problems.
(Rennard, 2006) 4: In information technology, a central (Lepouras et al., 2006)
place in which an aggregation of data is kept and maintained
in an organized way, usually in computer storage. (Oshri, Representative Region
2006) Area with the most notable characteristics of a multimedia
object. (Hurson & Yang, 2005)
Representation
In GIS, a way to code the location, geometric shape, and Representative Sample
topological behavior of objects. Involves the deinition of A sample whose distribution is the same as that of the
aspects such as resolution, level of detail, spatial dimension. underlying population. (Hou, Guo, et al., 2005)
(Davis et al., 2005)
Represented Knowledge
Representation Language The knowledge that must be represented and understood.
A knowledge representation language is a set of structures It may be relevant, with respect to a certain objective, to
expressed by means of symbols, that is, sequences of represent a given set of data or not to represent another
symbols obeying structural formation rules. Some symbols collection of information. (Analide et al., 2006)
are interpreted as logical operators, whereas others are
treated like objects in a world model. (Fortier & Kassel, Reproductive Digital Skill
2006) The ability of users to assign new meaning to digital works
by reproducing existing pieces of digital information.
Representation Level (Eshet, 2005)
Degree to which the problems faced by managers are well
formalized in their own minds and can be represented Reputation
for the purpose of DSS development. (Pomerol & Adam, 1: The estimated trustworthiness in an agent as derived
2005) from the communicated opinions of other parts (directly or
indirectly received); the resulting and emergent common
Representation Space opinion about the agents trustworthiness. (Falcone &
The representation space is formed with all the attributes Castelfranchi, 2005) 2: The extent to which buyers believe
of a learning problem. In supervised learning, it consists that the selling organization is honest and concerned about
of the representation of the labeled instances in a multi- its customers. (Peszynski, 2005)
dimensional space, where all predictive attributes play
the role of a dimension. (Muhlenbach & Rakotomalala, Reputation Effect
2005) The extent of association of a speciic information
technology with perceived business beneits among a
Representational Decision Support System population of irms over a period of time, fuelling increased
Computer-based information system that combines models visibility and sustaining a mimetic diffusion pattern.
with data in a fashion that closely resembles the system (Grifin, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re put e d Cre dibilit y Re se a rch Pa r t ne rship 579

Reputed Credibility Requirements Model


A credibility assessment based upon third-party reports A model to represent the external requirement to a system
or endorsements. (Danielson, 2006c) without taking into account how the system looks inside.
R
(Krogstie, 2005a)
Request for Comments (RFC)
1: The Internet Engineering Task Force (IETF) publishes Requirements Gathering
these as de facto standards of the Internet. (Hosszu, The process of eliciting the overall requirements of a
2005a) 2: Internet standards are proposed and described product from the customer. (Singh & Dix, 2006)
in the form of RFCs. They are maintained by the Internet
Engineering Task Force. (Hnisch, 2005) 3: The process Requisite Expertise
and rules by which distributed computing standards are Having an adequate understanding of the task that helps
designed. The RFC process and the Internets protocols to manage the task successfully. (Qudrat-Ullah, 2006)
are developed and managed by the Internet Engineering
Task Force. (Horiuchi, 2005b) Resampling
Validation technique employed to assess the sensitivity
Request for Information (RFI) of the classiication method with respect to the choice of
An invitation sent to suppliers that seeks information modeling data. (Galvo et al., 2005)
about products or services and requests initial pricing
estimates. (Asprey, 2005) Research
Systematic endeavor to ind answers to a problem, with
Request for Proposal (RFP) the help of scientiic methods or critical investigation.
1: A request sent to suppliers that seeks proposals (Crdoba & Robson, 2006)
for products or services and requests detailed pricing
information. (Asprey, 2005) 2: A written document Research Front
requesting a description, timeline, and budget for an A transient collection of highly cited scientiic publications
e-learning solution. It typically describes, in some level by the latest publications. Clusters of highly co-cited
of detail, the needs (or perceived needs) of the client and articles are regarded as a representation of a research
provides a minimal description of a desired solution. front. (Chen & Lobo, 2006)
(Kapp, 2005)
Research Limitation
Request To Send/Clear To Send (RTS/CTS) An area of concern that impacts the generalizability
Control packets between the transmitting and receiving of the research indings. All research projects have
nodes before initiating the transmission of a data packet. limitations, and readers must be aware of those limitations
(Erbas, 2005) when applying the indings of the research. (Martz &
Shepherd, 2005)
Required Level of Awareness
A property of a task. It represents the expected awareness Research Method
from any actor who performs the task. Its value also ranges A unique and coherent approach to the study of certain
from 0 to 4. (Daneshgar, 2005) phenomena. Principal among these methods are: case
studies, correlation studies, experimental studies,
Requirement phenomenological studies, and research synthesis. (Naidu,
1: A condition or capability needed by a user to solve a 2005b)
problem or achieve an objective. (Schneidewind, 2005) 2:
Speciics based on deined criterion used as the basis for Research Partnership
information systems design. (DeLorenzo, 2005) Industry-university partnership involving collaboration in
applied irm-speciic research. In this type of partnership,
Requirements Engineering funding from the industry partner is received in exchange
1: The human acts of identifying and understanding what for intellectual horsepower in the form of research
people want from an IS. (Furtado, 2005) 2: The systematic services and technology transfer. (Kock, 2005)
handling of requirements. (Ferre et al., 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
580 Re se a rch Pra c t ic e /Re se a rch De sign Re sourc e De sc ript ion Fra m e w ork (RDF)

Research Practice/Research Design Any information resource like HTML-document, book,


Research is conducted to acquire knowledge about a video, and so forth. (Hnisch, 2005) 3: Asset or means
R topic. Research design deines the way that knowledge that fulills a requirement. (Yoon et al., 2005) 4: The entity
is to be acquired. Hence research involves knowledge (individual or organization) that can contribute or add
management. (Land et al., 2006b) value to a product, providing either a product (component,
assembly) or an operation. A resource is (a view of)
Research University an enterprise object used to perform (or to support the
A university in which the primary objective is to produce execution of) one or more processes, and it is a subject of
research. (Rada, 2005) control. A resource can be primitive or complex. In the
case of A/VE (see Agile/virtual enterprise), a person or
Reservation Bandwidth enterprise (company), partner in A/VE. (Cunha & Putnik,
Reserving a portion of the available bandwidth for a given 2005) 5: Also known as asset; comes in many forms,
protocol or application, which ensures its network access from common factor inputs that are widely available
will not be adversely affected by massive network trafic and easily purchased in arms-length transactions, to
generated by other protocols or applications. (Guster et highly differentiated resources, like brand names, that
al., 2005) are developed over many years and are very dificult to
replicate. Resources come in two main forms: Tangible
Reserve Auction resources are the easiest to value and often are the only
In this case the seller sets a reserve price, or the lowest price resources that appear on a companys balance sheet. They
the seller is willing to transact on. (Lei et al., 2005b) include real estate, production facilities, and raw materials,
among others. Although tangible resources may be essential
Reservoir Sampling to a companys strategy, because of their standard nature
A database sampling method that implements uniform they rarely constitute a source of competitive advantage.
random sampling on a database table of unknown size, or Intangible resources include such things as company
a query result set of unknown size. (Lutu, 2005) reputations, brand names, cultures, technological
knowledge, know-how shared among employees, patented
Residency Requirement process and design, trademarks, accumulated learning
Requirement to be on campus for a certain amount of time, and/or knowledge, as well as experience. These resources
continuously or accumulated, during the undertaking of a often play important roles in competitive advantage (or
course or program at a particular institution of learning. disadvantage) and company value. Intangible resources
(Kung-Ming, 2005) also have the important property of not being consumed
in usage. (Potgieter et al., 2005) 6: Anything that is not the
Residual application itself, but is changed or used by the application to
Part of a variable that is not explained by the model. It determine its behavior. Examples are iles, registry entries,
can be deined as the difference of actual and predicted or the system time. (Trossen & Molenaar, 2005)
values. (Cho, 2005)
Resource Allocator (p-RA)
Resistor A process in which the main tasks are to separate and
One who is hesitant about change, often with good cause, group resources into logically equivalent p units, and assign
and is the least likely to adopt technological innovations each unit to a virtual system. (Jong & Mahatanankoon,
quickly. May include the categories termed late majority 2006)
and laggards. (Salter, 2005c)
Resource Description Framework (RDF)
Resource 1: Language recommended by W3C for creating metadata
1: An enterprise object used to perform (or to support for describing Web resources. (Dieng-Kuntz, 2006) 2: A
the execution of) one or more processes, and a subject of recommendation from the World Wide Web Consortium for
control. A resource can be primitive or complex. In the creating metadata structures that deine data on the Web.
case of an agile/virtual enterprise (A/VE), a person or It is designed to provide a method for classiication of data
enterprise (company) partner. (Cunha & Putnik, 2005) 2: on Web sites in order to improve searching and navigation.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re sourc e De sc ript ion Fra m e w ork Sche m a (RDFS) Re sourc e M a na ge m e nt I nit iat ive (RM I ) 581

(Dotsika, 2006) 3: A speciication developed in 2000 by A set of such triples is called an RDF graph. This can be
the World Wide Web Consortium as a foundation for illustrated by a node and directed-arc diagram, in which
processing machine-understandable metadata regarding each triple is represented as a node-arc-node link (hence
R
resources on the Internet, including the World Wide Web. the term, graph). (Kapetanios, 2005)
It uses XML. (Raisinghani & Sahoo, 2006) 4: An example
of metadata language (metadata = data about data) used Resource Description Framework Schema
to describe generic things (resources, according to the (RDFS)
RDF jargon) on the Web. An RDF document is a list of 1: Provides a mechanism for constructing specialized RDF
statements under the form of triples having the classical vocabularies through the description of domain-speciic
format <object, property, value>, where the elements of properties. This is obtained mainly by describing the
the triples can be URIs (universal resource identiiers), properties in terms of the classes of resource to which
literals (mainly, free text), and variables. RDF statements they apply: For example, we could deine the creator
are normally written into XML format (the so-called property saying that it has the resource document as
RDF/XML syntax). (Zarri, 2005b) 5: The basic language domain (document is the value or object of this
of the Semantic Web. It is used for describing Web property) and the resource person as range (this property
resources. (Antoniou et al., 2005) 6: Part of the Semantic must always be associated with a resource person, its
Web, and a way to uniquely identify a resource whether subject). Other basic modeling primitives of RDFS
electronic or not. (Verhaart & Kinshuk 2006) 7: RDF allow setting up hierarchies (taxonomies), both hierarchies
provides means for adding semantics to a document. It of concepts, thanks to the use of class and subclass-
is an infrastructure that enables the encoding, exchange, of statements, and hierarchies of properties, thanks to
and reuse of information-structured metadata. RDF allows the use of property and subproperty-of statements.
multiple metadata schemas to be read by humans as well as Instances of a speciic class (concept) can be declared
machines, providing interoperability between applications making use of the type statement. (Zarri, 2005b) 2:
that exchange machine-understandable information on the Provides the most basic primitives for ontology modeling.
Web. (Ishaya, 2005) 8: RDF provides the foundation for (Dieng-Kuntz, 2006) 3: An explicit representation of the
the processing and exchange of machine-understandable conceptual model underlying an RDF model. The schema
information on the Web. RDF can be used for cataloging, is represented in RDF using a set of properties with a
for resource discovery, and by intelligent software agents standardized interpretation and effect on the interpretation
in content rating. (Hassan & Hietanen, 2006) 9: An XML- of the model. (Stuckenschmidt, 2005) 4: A primitive
based language for deining metadata for Web resources ontology language that is integrated with RDF. Its basic
and relations between them. It is a W3C recommendation operations are the deinition of classes and properties,
and serves as a basis for representing information and their organization in hierarchies, and domain and range
knowledge on the Semantic Web. (Stuckenschmidt, restrictions on properties. (Antoniou et al., 2005)
2005) 10: A language for representing information about
resources in the World Wide Web. (Goh & Kinshuk, 2005) Resource Inluence
11: A mechanism to describe data as a list of triples: One of an entitys resources deployed to execute and
an object (a resource), an attribute (a property), and a affect its conduct of knowledge management. (Holsapple
value (a resource or free text). (Vardaki, 2005) 12: A & Joshi, 2006)
framework deined by W3C for representing information
in the Web that integrates a variety of applications, from Resource Management
library catalogs to syndication and aggregation of news, Set of mechanisms to eficiently control and allocate scarce
software, and content, to personal collections of music, network resources (often bandwidth) to users and trafic
photos, and events, using XML as an interchange syntax. lows. (DaSilva, 2005)
The RDF speciications provide a lightweight ontology
system to support the exchange of knowledge on the Web. Resource Management Initiative (RMI)
(Sicilia & Garca-Barriocanal, 2006) 13: A framework A UK initiative providing clinicians and other hospital
for representing information in the Web. The underlying managers with information required to use resources to
structure of any expression in RDF is a collection of triples, maximum effect, generally by the introduction of new IT.
each consisting of a subject, a predicate, and an object. This was aimed at encouraging clinicians to take more

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
582 Re sourc e M a na ge r (p-RM ) Re t roduc t ion

interest and involvement in the management of hospital and Restructuring


community units, making them responsible for operational 1: Replacing query terms using synonyms so that
R and strategic decisions. (Barnes, 2005) logical operators and numerical constraints can be
restructured. (Guan, 2005e) 2: The transformation from
Resource Manager (p-RM) one representation form to another at the same relative
A process that helps applications to manage their resources, abstraction level, while preserving the subject systems
which are allocated by the Resource Allocator (p-RA). external behavior. (Aversano et al., 2005)
(Jong & Mahatanankoon, 2006)
Result Demonstrability
Resource Poverty Degree to which the results of using an innovation are
The lack of time, inances, and human resources. (Hunter, perceived to be tangible. (Green et al., 2005)
2005)
Retail Format
Resource Reservation Protocol (RSVP) The sum of different retail marketing instrumentssuch
A tool for prevention of congestion through reservation of as assortment size, price level, service policy, and access
network resources. (Gutirrez & Ting, 2005) points to the customerthat describe a type of retail policy.
In practice, a wide range of different retail formats exists
Resource Semantic Annotation that are in many cases industry speciic. (Madlberger,
The act of annotating a resource with one or more terms 2006)
of an ontology that describe it. The resulting annotations
enable more accurate resource search procedures. (Sicilia Retention
& Garca-Barriocanal, 2006) 1: Similar to persistence, this term typically refers to
whether students inish their degrees or programs. (Lindsay
Resource-Dependency Theory et al., 2005a) 2: The number of learners or students who
Refers to outsourcing of a irms IT operations to external progress from one part of an educational program to the
vendors to ill resource gaps within the irm for the purpose next. (Adkins & Nitsch, 2005)
of providing the irm with strategic competitive advantage.
(Gupta & Iyer, 2005) Retribalization Marshal McLuhan in
The Constellation of Marconi
Resource-Event-Agent Enterprise Ontology Electronic media-starting with the electronic telegraph
A domain ontology that deines constructs common to so, strictly speaking, it should be the Constellation of
all enterprises and demonstrates how those constructs Morseare helping us to retribalize in a global village,
may be used to design a semantically modeled enterprise where our senses become fully involved once again (and
database. (Dunn & Grabski, 2005) the written word loses its old prominence and power over
us). (A.G. Roy, 2005)
Response Modeling
Predicting a response given individual characteristics by Retrieval
using data from a previous campaign. (Lo, 2005) Accessing stored information from a database. (Geisler
& Kao, 2005)
Responsibility
The moral construct or concept of taking ownership of Retrieval Stage
acts and the consequences in social situations. (Skovira, The last stage in a content-based retrieval system where
2005) the extracted features from the query are compared to
those stored in the metadata and matches are returned to
Restructuration the user. (Farag, 2005b)
The process of structural change associated with an
organizations implementation of an innovation. (Klobas Retroduction
& Renzi, 2005a) The central mode of inference (explanation) in critical
realism research. Enables a researcher to investigate the
potential causal mechanisms and the conditions under

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re t ur n on I nve st m e nt (ROI ) Reve rse Engine e ring 583

which certain outcomes will or will not be realized. the concept of returns to scale is extended to multiple
(Carlsson, 2005) input and multiple output situations. (Chen, Motiwalla,
et al., 2005)
R
Return on Investment (ROI)
1: A technique for measuring the return on investment. Reusable Component
It is calculated by the earnings produced by the assets The aim of reusable components is to provide services
compared to the money invested in the asset. This technique to other components and to require services from others.
is used in ERP contexts to justify ERP adoptions and also There are three concepts associated with them: their
to measure how well an ERP was implemented. (Esteves interfaces, their architectures, and their realizations.
& Pastor, 2005) 2: A technique used for measuring the (Felice & Riesco, 2005)
return on an investment; it is often used in the justiication
of new ERP systems, to measure how well an ERP Reusable Learning Object (RLO)
system has been implemented, or for implementing new 1: Another term for a learning object. (Stavredes, 2005b)
or additional functionality. (Sammon & Adam, 2005) 2: Resources that can be used for facilitating intended
3: An assessment of the value and beneits realized learning outcomes, and can be extracted and reused in
from the training program, traditionally conceived as other learning environments. (Etter & Byrnes, 2005)
[(beneits-cost/cost)]. (Waddington et al., 2005) 4: An
estimate expressed as a ratio comparing the net beneits Reuse
(the return) to its total cost (the investment) for 1: Making use of a (digital) learning resource in a situation
measuring operating performance and eficiency in different from that in which it was originally created or
utilizing the assets of the company. (Rashid, 2005) 5: used. (Collis & Moonen, 2005a) 2: A process where a
Commonly used as an accounting term to indicate how technology asset (such as a function or class) is designed
well an organization has used its investment in resources. and developed following speciic standards, and with the
In a knowledge-management context, ROI describes the intent of being used again. (D. Brandon, Jr., 2005a)
return on both the human and inancial capital invested
in that strategy. Some measures may include sustainable Reuse Process
growth, calculable eficiencies in product development A method having the following steps: the decomposition
cycles, improved decision making, better ability to initiate of the goal speciication, the identiication for each
and integrate new employees, lower rates of staff turnover speciication, the adaptation step using the appropriate
relecting improved employee morale, and better ability to operators, and the composition of the sub-speciications.
retain customers relecting trust in employees expertise. (Felice & Riesco, 2005)
(Zyngier, 2006) 6: Net present value of savings divided
by capital investment expressed as a percentage. (D. Reversal Pattern
Wright, 2005) 7: The revenue generated by a program or A pattern in technical analysis that suggests, on the balance
programs compared to the resources necessary to initiate of probabilities, that price trend will change direction.
and sustain the program. (Robinson, 2005) 8: Traditionally (Vanstone & Tan, 2005)
deined as the increase in inancial value provided by a
new investment. However, this deinition does not work Reverse Auction
well for intangibles, such as e-learning and the effective A ixed-duration auction hosted by a single buyer in which
management of human capital. (Brace & Berge, 2006) 9: multiple sellers compete for business. (I. Lee, 2005)
Typically, a simple calculation based on costs of systems
development and implementation measured against returns Reverse Engineering
on investment. Problems with this include a measure 1: The extraction of higher-level software artifacts,
related to the dificulties of quantifying intangible costs including design, documentation, and so forth, from the
and beneits. (Burn & Ash, 2006) source or binary codes of a software system. (Tan & Zhao,
2005b) 2: The process of analyzing a subject system to: (1)
Returns to Scale (RTS) identify system components and their interrelationships,
Considered to be increasing if a proportional increase in and (2) create representations of the system in another form
all the inputs results in a more than proportional increase or at a higher level of abstraction. (Aversano et al., 2005)
in the single output. In Data Envelopment Analysis (DEA), 3: The process of transforming code into a model through

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
584 Reve rse -Pat h Forw a rding (RPF) Ripping

a mapping from a speciic implementation language. RFID Reader (Interrogator): See Radio Frequency
(Favre et al., 2005) Identiication Reader (Interrogator).
R
Reverse-Path Forwarding (RPF) RFID Tag (Transponder): See Radio Frequency
In multicast, the router forwards the packet away from the Identiication Tag (Transponder).
source to make progress along the distribution tree and
prevent routing loops. The routers multicast forwarding RFP: See Request for Proposal.
state runs more logically by organizing tables based on
the reverse path, from the receiver back to the root of the Rhetoric
distribution tree. (Chakraborty et al., 2005) The process of presenting information in a way that
persuades others to do or to believe something. (St.
Reversible Action Amant, 2006a)
Any action that can be undone. Reversibility is a design
principle that says people should be able to recover from Rich Learning Environment
their inevitable mistakes. (Roibs, 2006a) Learning environment in which the learner is empowered
to create a strong connection with the reality of interest
Reversible Watermarking by directly experiencing it in order to develop mental
A watermarking method that allows the original host media constructs that are deep, complex, pluralist, and
to be perfectly recovered after the marked media passes emotionally rich. (Ramos & Carvalho, 2005)
the authentication process. (C.-T. Li, 2005)
Rich Media
Revolution Ellipsoid Media with greater capacity to carry information, with
Three-dimensional solid obtained from revolving an ellipse face-to-face communication being considered the standard
about one of its axes. (Zelasco et al., 2005) by which others are judged. The more closely a media
can replicate face-to-face communication, the richer it is
Revolutionary Innovation considered to be. (Newberry, 2005)
A type of innovation that provides solutions outside the
conines of contemporary scientiic knowledge and best Rich Site Summary (RSS) Networking
practice in an area, and represents pioneering work. A tool enabling end users to receive instantaneous updates
(Paukert et al., 2006) from Web sites and Weblogs. (Brown, 2006)

Rewrite System Rights and Duties


Consists of a set of conigurations and a relation xy, The philosophical view that the moral act is the one that
denoting that the coniguration x follows the coniguration recognizes the rights of others and the duties that those
y with the help of a rule application. (Fischer, 2005) rights impose on the actor. (Gilbert, 2005)

RF: See Radio Frequency. Rigorous Process


A mathematically based technique for describing and
RFC: See Request for Comments. reasoning about system properties. It provides frameworks
within which people specify, develop, and verify systems
RFI: See Request for Information. in a systematic manner. (Felice & Riesco, 2005)

RFID: See Radio Frequency Identiication. RIM: See Rational Instrumental Meaning.

RFID Item-Level Tag: See Radio Frequency Ripping


Identiication Item-Level Tag. Converting an existing digital ile to a compressed format
suitable for exchange over P2P ile-sharing networks,
RFID Pallet-Level and Case-Level Tag: See Radio for example, converting Redbook audio to MP3 format.
Frequency Identiication Pallet-Level and Case-Level (Hughes & Lang, 2005)
Tag.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Risk RN C 585

Risk Risk Evaluation


1: A possibility of incurring inancial loss. (Wong, 2005) The process used to determine risk management priorities
2: An individual or organizations exposure to a chance of by comparing the level of risk against predetermined
R
loss or damage. (Kitchens, 2005) 3: In a limited manner, standards, target risk levels, or other criteria. (den Braber
the decision situation in which the full range of possible et al., 2005)
outcomes are known with certainty and the probability
of their occurrence can be assessed accurately, usually by Risk Handling
some objective means (e.g., rolling the dice is a classic risk The process in which potential risks to a business are
decision situation). More usually, the probabilities must be identiied in advance, analyzed, mitigated, prevented, and
assessed subjectively, often based on previous experiences the cost of protection is balanced with the cost of exposure
or intuition, and the outcomes themselves may not be fully to the risk. (Kyobe, 2006)
identiiable. The term risk is used commonly to generally
deine decision situations that are really a combination Risk Management
of classical risk and uncertainty, that is, the more normal The range of activities that may be taken to avoid the
decision situation in organizations. (Ritchie & Brindley, occurrence of an undesirable event or to modify, minimize,
2005) 4: The probability that a vulnerability is exploited or eliminate the consequences should the event occur
and results in a damage. (Weippl, 2006) 5: The chance (e.g., an insurance policy against particular risks would
of something happening that will have an impact upon not prevent the occurrence, but would compensate for the
objectives. It is measured in terms of consequence and inancial and other consequences of the outcome). (Ritchie
likelihood. (den Braber et al., 2005) 6: The consumers & Brindley, 2005)
perceptions of the uncertainty and adverse consequences
of engaging in an activity. (Peszynski, 2005) Risk Perception
The term used to express how a situation is viewed or
Risk Analysis seen by the decision maker(s). Individual characteristics,
1: A systematic use of available information to determine experiences, and beliefs may inluence the way in which
how often speciied events may occur and the magnitude we might view a given situation as being either more or
of their consequences. (den Braber et al., 2005) 2: To what less risky. Usually this is measured on a subjective and
extent particular data could be a subject of unauthorized relative scale (i.e., Situation A is perceived as riskier than
access or alterations. (Janczewski & Portougal, 2005) 3: B) rather than on an objectively measurable scale. (Ritchie
Technique for providing a means of forecasting critical & Brindley, 2005)
events. Risk analysis enables the identiication of necessary
controls that must be incorporated in a secure information Risk Treatment
system. (Butcher-Powell, 2005) Selection and implementation of appropriate options for
dealing with risk. (den Braber et al., 2005)
Risk Assessment
1: A procedure undertaken to determine the vulnerability RLO: See Reusable Learning Object.
of a system. (Buche & Vician, 2005) 2: A set of procedures
whose purpose is to identify, analyze, and manage the RM-ODP: See Reference Model of Open Distributed
possibility that data quality has been degraded due to events Processing.
and circumstances such as a breakdown in internal controls,
system restructuring, changes in organizational culture, RMI: See Remote Method Invocation; Resource
or alterations in the external environment. (Chengalur- Management Initiative.
Smith et al., 2005) 3: Determined by measuring two
quantities of risk, the magnitude of the potential loss and RMTP II: See Reliable Multicast Transport Protocol
the probability that the loss will occur. (Mitrakas, 2006) II.
4: The overall process of risk analysis and risk evaluation.
(den Braber et al., 2005) RNC: See Radio Network Controller.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
586 Roa m ing Role Pla ying

Roaming more robust. (Hosszu, 2005a) 3: The resistant ability of a


1: A signaling procedure in cellular networks to allow the hidden message against various attacks; that is, a message
R provision of services in different networks. (Louvros et al., that is hidden in a carrier can be reliably detected after
2006) 2: Traditionally, wandering around an area. Now, the carrier has been attacked. (Lou et al., 2006) 4: The
synonymous with accessing wireless services when visiting robustness of watermarking schemes can be evaluated
a provider that is not ones home provider. (Efstathiou & by applying attacks that are relevant for the application
Polyzos, 2006) scenario under consideration. (Sattar & Yu, 2006)

ROANS Robustness Analysis


A PC software package for 3D simulation and programming A form of what-if analysis that seeks the maximum
of automated work cell, robots, and other peripheral variation of a parameter that keeps a decision within
devices. After designing work cell subsystems and their acceptable values. (Pomerol & Adam, 2005)
locations, it is able to create control programs for all
devices that are working in multi-tasking mode. (Modrk ROI: See Return on Investment.
& Marcn, 2006)
ROLAP: See Relational OLAP.
Robust
An image that can be successfully restored after suffering Role
attacks from normal image processing or attacks of intent. 1: A concept that individuals stand in relation to other
The restored image must be visually acceptable. (Chen, individuals, and that they can enter and leave the extent
Chen, Ma, et al., 2005) of the concept without losing their identity. (Stamoulis
et al., 2005) 2: The actions and activities assigned to or
Robust Clustering required or expected of a person. (Rada, 2005) 3: A set
Refers to clustering techniques that behave robustly with of norms expressed in terms of obligations, privileges,
respect to noise, that is, adding some noise to the data in and rights assigned to an actor. (Daneshgar, 2005) 4: A
the form changing the values of the data objects slightly as situation- or context-speciic aspect of a real-world entity. A
well as adding some outliers will not drastically inluence role may be dynamically associated and removed from an
the clustering result. (Klawonn & Georgevia, 2005) atoma construct when either the real-world entity evolves
accordingly (e.g., a person becomes an employee or loses
Robust Copyright Marking this property) or when the behavior modeled by the role
A term used for the techniques that assure a watermark becomes/ceases to be pertinent to the current context.
persistence after the original document was changed in (Lepouras et al., 2006) 5: In ORM, a part played in a
different ways (in the case of the images: cropping, resizing, fact type (relationship type). In UML, this is known as
brightness modiication, etc.). (Nesi & Spinu, 2005) an association-end. For example, in the fact type Person
works for Company, Person plays the role of employee, and
Robust Watermarking Company plays the role of employer. (Halpin, 2005)
A method for embedding a secret message/watermark that
is intended to be detectable even after signiicant malicious Role Incompatibility
or non-malicious manipulations on the host media in which A situation in which each party perceives its concerns or
it is embedded. (C.-T. Li, 2005) needs to be mutually exclusive (or antagonistic) to the other
partys concerns or needs; that is, role incompatibility exists
Robustness when one perceives his or her needs cannot be met if the
1: A property possessed by a system. A system is robust other partys needs are met. A situational factor proposed
with respect to a perturbation when the perturbation to contribute to the occurrence of Limited-Perspective
effect on the system performance is tolerable according Bias (LPB). (Moore & Burke, 2005)
to a predeined threshold. (Alippi & Vanini, 2005) 2: In
case of the ALM, the hosts are responsible to maintain the Role Playing
tree; in case of the IP-multicast, the routers deine the tree. An element in gaming which requires the student to assume
Since the routers operate safely, non-stop, but the user can the role of another. (Pendegraft, 2005)
switch off a host anytime, in such a way the IP-multicast is

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Role -Ba se d Ac c e ss Cont rol (RBAC) Rough Se t 587

Role-Based Access Control (RBAC) Rotational Latency


An access control model where subjects are organized The waiting time for the beginning of the desired data
into roles deining their duties in an organization or block to rotate under the disk head before the actual data
R
environment. (Pallis et al., 2005) transfer can begin. (Lu, 2005)

Role-Playing Game (RPG) Rough Classiication


A game in which the player interactively goes through Finds mappings from the partitions induced by the
a story with other players (real or computer generated). equivalence relations in the condition attributes to the
Examples include Dungeons and Dragons, and Zork. partitions induced by the equivalence relations in the
(Paoletti, 2005) decision attribute(s). These mappings are usually expressed
in terms of decision rules. It performs the same type of
Roll-Up classiication function as discriminant analysis or logistic
1: A cube operation that allows users to aggregate from regression, where there is a known sub-grouping in the
detailed cells to summarized cells. (Abdulghani, 2005b) data set, which is identiied by the decision attribute.
2: Operation consisting of going in a hierarchy at a more (Voges, 2005)
aggregated level. (Schneider, 2005)
Rough Clustering
Rollback A simple extension of rough sets theory and analogous to
Restoring the database (a temporal relation) to a state that traditional cluster analysis. The information table has no
is recorded as of a given time point, interval, or temporal pre-existing subgroups, and clusters of objects are formed
element in a database that supports transaction time. based on a distance measure. Clusters are deined by a
(Tansel, 2005) lower approximation (objects exclusive to that cluster)
and an upper approximation (all objects in the cluster
Rolling Window Weighting which are also members of other clusters), in a similar
Optimal weights are estimated in each period by manner to rough sets. An object can belong to more than
minimizing the errors over the preceding m periods, where one cluster. (Voges, 2005)
m is the length in periods of the rolling window. The
weights are then used to combine forecasts for the present Rough Decision Table
period. (C.K. Chan, 2005) Collection of disjoint decision rules of identical format.
(Grzymala-Busse & Ziarko, 2005)
Root Cause Analysis
Also called Ishikawa or ishbone diagrams; used to Rough Set
structure discussions on the causes of important issues 1: A method of modeling impreciseness and vagueness
by drawing a line for an issue, and arrows for causes and in data through two sets representing the upper bound
sub-causes. (Dingsyr, 2006) and lower bound of the data set. (Bala et al., 2005) 2:
An undeinable set. (Grzymala-Busse & Ziarko, 2005)
RosettaNet 3: A subset (concept) of the universe of objects U in
Open e-business standards, encompassing data an information system (U,A) that cannot be expressed
dictionaries, implementation framework, and XML-based (deined) as a union of indiscernibility classes; otherwise,
business message schemas and process speciications. the set is called exact. (Pawlak et al., 2005) 4: The concept
(Hawk & Zheng, 2006) of rough, or approximation, sets was introduced by Pawlak,
and is based on the single assumption that information is
Rotation Matrix associated with every object in an information system. This
A linear operator rotating a vector in a given space. A information is expressed through attributes that describe
rotation matrix has only three degrees of freedom in 3D the objects, and objects that cannot be distinguished
and one in 2D. It can be parameterized in various ways, on the basis of a selected attribute are referred to as
usually through Euler angles, yaw-pitch-roll angles, indiscernible. A rough set is deined by two sets, the lower
rotation angles around the coordinate axes, and so forth. approximation and the upper approximation. (Voges, 2005)
(Sappa et al., 2005) 5: A mathematical approach to extract knowledge from

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
588 Rough Se t Dat a Ana lysis RSS N e t w ork ing

imprecise and uncertain data. (Zhu, 2005) 6: A method Routing


of representation of uncertainty in the membership of The determination of a path that a data packet will traverse
R a set. It is related to fuzzy sets, and is a popular data- from source to destination. (Hu, 2005)
mining technique in medicine and inance. (Bose, 2005)
7: Mathematical algorithms that interpret uncertain, vague, Routing Protocol
or imprecise information. (Yeo, 2005) 8: A special types Facilitates the exchange of routing information between
of interval set created by using equivalence relations. networks, allowing routers to build routing tables
(Lingras et al., 2005) dynamically. (Dhar, 2005)

Rough Set Data Analysis Routing Table by Proile (RTP)


A method for modeling uncertain information in data by Contains a list of couples (treatment proxy, proile) that
forming lower and upper approximations of a class. It can allow a proxy cache to choose, in function of a proile, the
be used to reduce the feature set and to generate decision treatment proxy to which queries will be sent. (Kacimi
rules. (An, 2005) et al., 2005)

Rough Set Theory Routinizing


A new mathematical tool to deal with vagueness The inal stage in the innovation process; the innovation
and uncertainty. Any vague concept is replaced by becomes part of the organizational routine. (Klobas &
a pair of precise conceptscalled the lower and the Renzi, 2005a)
upper approximation of the vague concept. The lower
approximation consists of all objects that surely belong Row Type
to the concept, and the upper approximation contains Constructed data type that contains a sequence of attribute
all objects that possibly belong to the concept. (Lazar, names and their data types. (Taniar et al., 2005)
2005)
RP: See Rendezvous Point.
Roulette-Wheel Selection
A roulette wheel selects the chromosomes used in RPC: See Remote Procedure Call.
reproduction. The wheel is the itness array, and the
marble is a random unsigned integer less than the sum RPF: See Reverse-Path Forwarding.
of all itness in the population. To ind the chromosome
associated with the marbles landing place, the algorithm RPG: See Role Playing Game.
iterates through the itness array; if the marble value is
less than the current itness element, the corresponding RRM: See Radio Resource Management.
chromosome becomes a parent. Otherwise, the algorithm
subtracts the current itness value from the marble and then RRS Filter
repeats the process with the next element in the itness A recursive running-sum ilter is an FIR ilter with all
array. (Guan, 2005e) coeficients equal to 1 presented in a recursive form.
(Jovanovic-Dolecek, 2005c)
Router
1: A device that forwards packets (messages) between RS-Tree
networks. (Vician & Buche, 2005) 2: A device used to link A binary tree which describes the rhetorical structure of
two or more networks. The router makes use of an Internet every coherent discourse. (Faz & Mahmoudi, 2005)
protocol, which is a connectionless protocol operating
at layer 3 of the OSI model. (Ngoh & Shankar, 2005) 3: RSS: See Real Simple Syndication.
An Internet working device that connects two computer
networks. It does the job of resolving difference between R SS Net work i ng: See Rich Site S ummar y
two interconnected computer networks. (Hu, 2005) Networking.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
RSV P Rule List 589

RSVP: See Resource Reservation Protocol. Rule Deinition Language (RDL)


Set of constructs for the deinition of rules, events,
RT Probe: See Reaction Time Probe. conditions, and actions. (Cilia, 2005)
R
RTP: See Routing Table by Proile. Rule Discovery
The process of inding rules that then can be used to predict
RTS: See Regional Tourism System; Returns to Scale. some outcome (e.g., IF 13 <= age <= 19 THEN teenager).
(Butler & Webb, 2005)
RTS/CTS: See Request To Send/Clear To Send.
Rule Evaluation
RTSP: See Real-Time Streaming Protocol. An activity determining condition satisfaction. (Ale &
Espil, 2005)
Rubber-Band Metaphor
A metaphor that is often used to describe the behavior Rule Execution
of two objects that are connected by a straight line, the An activity running the corresponding action of an
rubber band, in which one object is used to pull the other instantiated rule. (Ale & Espil, 2005)
one toward a target position. The moving speed of the
pulled object depends on the length of the line between Rule Extraction
the two objects, that is, the tension on the rubber band: Given a complicated model such as an artiicial neural
longer distances result in faster movements, and shorter network and the data used to train it, produce a symbolic
distances in slower movements. (Hrst, 2006) description of the model. (Zhou, 2005)

Rubric Rule Generation


1: A detailed set of expectations and associated scoring used 1: An automatic way of performing inductive reasoning
to evaluate an assessment task. (Hawkins & Baker, 2005) through the generation of understandable rules underlying
2: A document that identiies the instructional goals criteria the physical system at hand. (Muselli, 2005) 2: The
of the activity plus the levels of potential performance; the extraction from the data of the embedded synthetic logical
rubric is distributed with the activity directions so that: description of their relationships. (Liberati, 2005)
(1) students can monitor their own progress, process, and
product quality; and (2) instructors can evaluate against Rule Induction
the rubrics information. (B.L. MacGregor, 2005) 1: Process of learning from cases or instances the if-then
rule relationships consisting of an antecedent (i.e., if-
Rule part, deining the preconditions or coverage of the rule)
A typical and useful way for representing knowledge. and a consequent (i.e., then-part, stating a classiication,
Can be of many forms, but typically are IF <conditions> prediction, or other expression of a property that holds for
THEN <conclusions>. Conditions also are referred to as cases deined in the antecedent). (Agresti, 2005) 2: The
antecedents, and conclusions as consequents. (Fuller & extraction of valid and useful if-then-else rules from data
Wilson, 2006) based on their statistical signiicance levels, which are
integrated with commercial data warehouse and OLAP
Rule Activation Time platforms. (Zhu, 2005)
A concept that ixes the position of the signaling phase with
respect to the event occurrence. (Ale & Espil, 2005) Rule List
An ordered list of IF-THEN rules discovered by the
Rule Base algorithm during training. When the rules are applied to
A set of ECA rules. Once this set is deined, the a DBMS classify cases in the test set, they are applied in order. That
monitors for relevant events. The rule base can be modiied is, a case is matched with each of the rules in the list in
(new rules can be added, or existent rules can be modiied turn. The irst rule whose antecedent (conditions in the IF
or deleted) over time. (Cilia, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
590 Rule M ining Russe lls T he or y of Type s

part) matches the attribute values of the case is then used Rule Transition Granularity
to classify the case; that is, the case is assigned the same A concept used in analyzing the relationship between event
R class as the class predicted by the irst matching rule found occurrences in rule instantiation. (Ale & Espil, 2005)
in the discovered rule list. (Parpinelli et al., 2005)
Rule Triggering
Rule Mining Rule instantiation. (Ale & Espil, 2005)
A computer-intensive task whereby data sets are extensively
probed for useful predictive rules. (Muruzbal, 2005) Rule-Based Expert System
An expert system that applies a knowledge base consisting
Rule Model of if-then statements that can be combined to make more
Describes the structure of a rule (i.e., its event, condition, complex inferences. (Svensson, 2005)
and action parts). (Vargas-Solar, 2005)
Rule-Based Knowledge Representation
Rule Propagation A (symbolic) way of representing knowledge under the
A property that determines how the condition of one rule is form of rules of the type: If B Then A, where B, the
affected by the action of any other. (Ale & Espil, 2005) antecedent or condition, is a conjunction of literals B1
B2 Bn , and A, the consequent or the conclusion,
Rule Quality also can be a disjunction of literals, A1 A2 A n. The
A numerical factor that characterizes a measure of belief in meaning of the rule is then: if the different conditions Bi
the given decision rule, its power, predictability, reliability, are all veriied (TRUE), they imply the conclusion A, or a
and likelihood. (Bruha, 2005) set of alternative conclusions which are expressed by the
different Ai. This type of representation can be reduced to
Rule Scheduling irst-order logic (resolution principle). (Zarri, 2006a)
An activity that determines the order of execution within a
set of rule instances whenever they are ired simultaneously. Rules Repository
(Ale & Espil, 2005) WCDSS information and knowledge base that contains
directions and instructions to help e-shoppers make
Rule Set Conluence informed decisions online. (F. Wang, 2006)
A property that indicates whether the inal database
state after rule processing is independent of the order of Russells Theory of Types
execution. (Ale & Espil, 2005) A theory proposed by British logician Bertrand Russell to
resolve Russells paradox, which appears when the set of
Rule Set Consumption Mode all sets that are not members of themselves is considered
Feature indicating how a set of rule instantiations is reduced in naive set theory. The paradox is that such a set appears
as a consequence of execution. (Ale & Espil, 2005) to be a member of itself if and only if it is not a member
of itself. (Naumenko, 2005)
Rule Set Cycle Policy
Feature indicating whether recursion must be applied when
triggering a rule, or rules must be instantiated only once.
(Ale & Espil, 2005)

Rule Set Net Effect Policy


Feature that indicates the relationship among event
occurrences, rule instantiation, and consumption modes.
(Ale & Espil, 2005)

Rule Signaling
An activity occurring when some source causes an event.
(Ale & Espil, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
S-Com m e rc e Sa lie nc e 591

S
S-Commerce: See Silent Commerce. Safety
1: Protecting the user from dangerous conditions and
S-Problem undesirable situations. It can mean safety of users, safety
Where the relevance of a particular input variable depends of data, or both. (Yong, 2005) 2: Quality, state, or condition
on the values of other input variables. Back-propagation of being prevented of and/or protected against danger, risk,
neural networks will require inordinate amounts of learning or injury, caused by accidental and unintentional effects
time for these types of problems, so they are unsuitable or actions. Safety further includes the recovery from such
for S-problems. (Wilson et al., 2006a) accidental and unintentional effects or actions. (Oermann
& Dittmann, 2006)
S-Tree
A height-balanced multi-way tree. Each internal node Sales and Operations Planning
corresponds to a page, which contains a set of signatures, The process that facilitates integrated demand and supply
and each leaf node contains a set of entries of the form management among internal departments such as sales,
<s, oid>, where the object is accessed by the oid and s is marketing, and manufacturing through effective and
its signature. (Chen & Shi, 2005) eficient sharing of information across the supply chain to
enhance business performance. (Khan et al., 2006)
S/MIME: See Secure Multi-Purpose Internet Mail
Extension. Sales/Revenue
Receipt of income for the exchange of goods or services.
Saccade (Hunter, 2005)
An eye movement occurring between ixations, typically
lasting for 20 to 35 milliseconds. The purpose of most Sales Tax
saccades is to move the eyes to the next viewing position. An excise tax imposed on the transfer of goods, typically
Visual processing is automatically suppressed during at retail. States vary as to whether the tax is imposed on
saccades to avoid blurring of the visual image. (Poole & the seller of goods or on the buyer; however, sales taxes
Ball, 2006) are almost universally collected from the purchaser at the
time of sale. (Raisinghani & Petty, 2005)
SAD: See Systems Analysis and Design Course.
Salience
Safe Enclave Occurs when the particular activity becomes the most
A social area or community that shelters individuals important activity in the persons life and dominates
from organizational social-political pressures to their thinking (preoccupations and cognitive distortions),
encourage knowledge sharing. They sometimes alter feelings (cravings), and behavior (deterioration of socialized
the organizational climate to provide a safe or desirable behavior). For instance, even if the person is not actually
forum to share knowledge. Often they encompass shared engaged in the behavior, they will be thinking about the
electronic and non-electronic social spaces that allow for next time they will be. (Grifiths, 2005)
underlying or contrary views to be expressed. (Paquette,
2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
592 Sa lie nt Obje c t Sc a ffolding

Salient Object Produkte in der Datenverarbeitung (systems, applications,


Interesting or signiicant object in an image (sun, mountain, products in data processing). (Kurbel, 2005)
S boat, etc.). Its computing changes in function of the
application domain. (Chbeir, 2005) Sarbanes-Oxley Act
Requires compliance with a comprehensive reform of
Salient Variable accounting procedures for publicly held corporations
One of the real players among the many apparently involved to promote and improve the quality and transparency
in the true core of a complex business. (Liberati, 2005) of inancial reporting by both internal and external
independent auditors. (Saha, 2005)
Sametime
An IBM Lotus instant messaging client now known as Satellite Communication
IBM Lotus Instant Messaging. (Panton, 2005) The ampliication and transmission of signals between
ground stations and satellites to permit communication
SAML: See Security-Assertion Markup Language. between any two points in the world. (Luppicini, 2006)

Sample Satisfaction Constructs for Distance Education


A set of elements drawn from a population. (Hou, Guo, Five constructs identiied that seem to help identify
et al., 2005) satisfaction in distance education programs. (Martz &
Reddy, 2005)
Sampling
1: A procedure that draws a sample, Si, by a random process Satisiability
in which each Si receives its appropriate probability, Pi, Standard reasoning service provided by digital libraries. It
of being selected. (Liu & Yu, 2005) 2: A technique for checks the consistency of an expression w.r.t. the knowledge
selecting units from a population so that by studying the elicited for a given domain. More formally, given a TBox
sample, you may fairly generalize your results back to T and a concept C, C is satisiable w.r.t. T if there exists at
the population. (Thomasian, 2005b) 3: Part of the data least one interpretation satisfying inclusions and deinitions
selected to represent the whole population. (Kumar, 2005) of T in which the set of individuals belonging to C may
4: The generation of a discrete-time signal x(n) from a be non-empty. (Colucci et al., 2006)
continuous signal xc(t) is called sampling, where x(n)=
xc(nT). T is called the sampling period, and its inverse 1/T SBC: See Akaike Information Criterion and Schwartz
is the sampling frequency or the sampling rate. (Jovanovic- Bayesian Criterion.
Dolecek, 2005b)
SBC Filter Bank: See Subband Coding Filter Bank.
Sampling Distribution
The distribution of values obtained by applying a function SBL: See Scenario-Based Learning.
to random data. (Mukherjee, 2005)
SCA DA: See Super visor y Cont rol and Data
SAN: See Storage-Area Network. Acquisition.

Sanctioning Scaffolding
Punishment adopted upon violation detection. The form 1: A pedagogical structure designed to facilitate the
of sanctioning can vary on the basis of the community increase in knowledge and understanding by students
type and the type of violation committed by the guilty in an educational experience. (Woods & Baker, 2005)
member. (Bertino et al., 2006) 2: A teaching method that provides the learner with
supports or assistance (e.g., hinting, elaborating, nudging,
SAP commenting, simplifying, suggesting, etc.) to complete
Software company based in Walldorf, Germany; market a task or problem when needed, and then removing that
leader in ERP software worldwide. SAP is an abbreviation support as the learner takes more control over the learning
of the companys German name Systeme, Anwendungen, event or situation. (Bonk et al., 2005) 3: An instructional

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sc a la bilit y Sc e na rio 593

technique that chunks out a larger learner project over a Scam within a Scam
timeline or allows a gradual introduction of skills that will Final mention of methods of cyber-identity theft involves a
lead the learner to a more complex learning level or project scam within a scam. For instance, a cyber thief may pose as
S
completion. (Bedard-Voorhees, 2005) 4: Cognitive and an attorney or a governmental employee and mass e-mail a
instructional supports for learning built into course design. database of past identity theft victims, requesting personal
(C. Cavanaugh, 2005) 5: Providing support that enables information for evidence to assist them in a potential court
a learner to carry out a task that would not be possible case. In this way, some theft victims may be victimized
without that support, and enabling the learner gradually in more ways than one. (Close et al., 2006)
to master that task without support. (Muukkonen et al.,
2005) 6: Supporting student learning with assistance at Scanner
the level of learning where it is needed. (Lerch et al., 2005) Electronic device that converts bar-code information into
7: The process by which learners are gradually guided digitized electronic images. (Kotzab, 2005)
from less-effective to more-effective learning strategies.
(OLooney, 2006) Scanning
The activity/performance launched by antivirus software to
Scalability examine iles and to inspect any malicious codes residing
1: The degree to which a protocol or algorithm can be inside the iles according to the softwares deinition iles.
extended to an increasing number of users or network (Luo & Warkentin, 2005)
nodes and continue to function properly. (DaSilva, 2005)
2: The ability to increase enrollment while still remaining Scanpath
proitable, or at least inancially self-sustaining, without An eye-tracking metric, usually a complete sequence of
adversely affecting course and program quality. (Laws ixations and interconnecting saccades. (Poole & Ball,
et al., 2005) 2006)

Scalar Equivalence Scatter Plot


Refers to whether the construct is measured on the same One of the most common types of plots, also known as an
metric across cultures. This occurs if the instrument has x-y plot, in which the irst component of a two-dimensional
achieved all prior levels of equivalence, and the construct is observation is displayed in the horizontal dimension and the
measured on the same metric. (Karahanna et al., 2005) second component is displayed in the vertical dimension.
(Burr, 2005a)
Scale of Impact
General size of the target audience and its geographical Scatter Search
spread. (Kaufman, 2005) A metaheuristic that belongs to the evolutionary methods.
(Mart, 2005)
Scale-Free Network
The characteristic of the majority of the e-mail discussion Scavenging
lists where a small minority of the members post the Attacking the physical access to a computer. (Butcher-
majority of the messages. (Kirlidog, 2005) Powell, 2005)

Scaling Problem SCC: See Strongly Connected Component.


A term that can be used to describe the problem of scroll
bars and sliders not scaling to large document sizes. If Scenario
a document is very long, the smallest unit to move the 1: Similar to a use case or script that describes interactions
scroll bar or slider thumb on the screen, that is, one pixel, at a technical level. Scenarios are more informal and capture
already represents a large jump in the ile, thus resulting customers requirements in a natural fashion. (Lee, Suh, et
in jerky visual feedback that is often considered irritating al., 2005) 2: A use case is described by a set of scenarios,
and disturbing, and in the worst case leads to a signiicant each of them being a sequence of interactions that yields
loss of information. (Hrst, 2006) a measurable result for the primary actor. The collection

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
594 Sc e na rio-Ba se d I nst ruc t iona l De sign Sche m a I nt e grat ion

of use-case descriptions describes the systems complete reinforcement depends on time, the schedule is called an
functionality. (Rolland & Kaabi, 2006) 3: A narrative interval schedule. (I. Chen, 2005)
S description of a sequence of (inter-)actions performed by
one or more persons in a particular context. Scenarios Scheduling
include information about goals, plans, interpretations, A research ield in which we aim to program the execution
values, and contextual conditions and events. (Nash et al., of a set of tasks on a set of resources. The schedule obtained
2005a) 4: Developed options for action used to consider should respect some constraints and optimize one or many
the implications of one or more choices. (Shambaugh, criteria. (Kacem, 2005)
2005)
Schema
Scenario-Based Instructional Design 1: A deinition of the data available for use by an application
An iterative approach to instructional design where ones or system of applications. (Fulton, 2005) 2: A diagram,
envisioned and designed intent is continually critiqued. outline, or model. (Nightingale, 2005) 3: A diagrammatic
Opportunities and constraints are considered in revised representation; an outline, model, or pattern imposed
and detailed versions of the scenario. The goal is to couple on complex reality or experience to assist in explaining
design-and-relect activity so that ongoing dialogue it. (Askar & Kocak-Usluel, 2005) 4: A notional mental
is maintained between the design team, keeping the structure that houses the knowledge and understanding
needs of the learner forefront in the instructional design. that an individual has of a particular topic. Schemas can
(Shambaugh, 2005) become very large, and are linked through meaning and
experience to many other schemas. (Pritchard, 2005a)
Scenario-Based Learning (SBL) 5: Mental constructs that aid learners in categorizing
The simulation of a scenario that is close to the students problems or situations and selecting appropriate courses
learning or future working environment. Using up-to-date of action for their effective resolution. (Dexter, 2005) 6:
information and multimedia technology, it can simulate An abstract building block of a GA-generated solution,
issues and conditions similar to those encountered in the corresponding to a set of individuals. Schemata typically
real world. For example, students can virtually experience are denoted by bit strings with dont-care symbols # (e.g.,
how the actual computers working environment should be. 1#01#00# is a schema with 23 = 8 possible instances, one
They can also take this opportunity to study how different for each instantiation of the # symbols to 0 or 1). Schemata
accessories of a computer interconnect together and how are important in GA research, because they form the
signals low between different units. Students can use this basis of an analytical approach called schema theory,
virtual environment to better understand the operation and for characterizing building blocks and predicting their
the theory behind it. Further explanation will be displayed proliferation and survival probability across generations,
in hierarchical ways to suit the different backgrounds of thereby describing the expected relative fitness of
students. (Chu, 2005) individuals in the GA. (Hsu, 2005a)

Skepticism Schema Abstraction


The view that genuine human knowledge is impossible. The activity that clusters objects belonging to a schema into
Cartesian skepticism follows from reasoning presented by homogeneous groups and produces an abstracted schema
Descartes, who showed it is possible to doubt (almost) any obtained by substituting each group with one single object
particular knowledge claim, and thus those claims cannot representing it. (De Meo, Terracina, et al., 2005)
be genuine knowledge. (Aarons, 2006)
Schema Evolution
Schedule of Reinforcement Ability of the database schema to change over time without
Can govern the contingency between responses and the loss of existing information. (Bounif, 2005)
reinforcement, and their effects on establishing and
maintaining behavior. Schedules that depend on the number Schema Integration
of responses made are called ratio schedules. The ratio 1: Ability of the database schema to be created from the
of the schedule is the number of responses required per merging of several other schemas. (Bounif, 2005) 2: The
reinforcement. If the contingency between responses and activity by which different input source schemas are

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sche m a M at ching Sc re e n N a m e 595

merged into a global structure representing all of them. innovative, high-growth, technology-based businesses
(De Meo, Terracina, et al., 2005) through the provision of infrastructure and support
services, including: (1) collaborative links with economic
S
Schema Matching development agencies; (2) formal and operational links
The process of identifying an appropriate mapping from with centers of excellence such as universities, higher
the schema of an input data source to the schema of an education institutions, and research establishments; and
integrated database. (Koeller, 2005) (3) management support actively engaged in the transfer
of technology and business skills to small- and medium-
Schema Modiication sized enterprises. (Moodley, 2005)
Ability to make changes in the database schema. The data
corresponding to the past schema are lost or recreated Scientiic and Statistical Data Mining
according the new schema. (Bounif, 2005) The use of data and image analyses to investigate knowledge
discovery of patterns in the data. (Segall, 2005)
Schematic Knowledge Resource
A knowledge resource whose existence depends on the Scientiic Research Process
existence of the organization. (Holsapple & Joshi, 2006) A general model consists of the following phases:
idea generation, problem deinition, procedure design/
Schema/Script planning, observation/experimentation, data analysis,
Mental structure that organizes our knowledge of the results interpretation, and communication. It is possible
world around speciic themes or subjects, and guides our to combine several phases, or to divide one phase into
behavior so that we act appropriately and according to more detailed steps. The division between phases is not
expectation in particular situations. (Noyes, 2006) clear-cut. Iteration of different phrases may be necessary.
(Yao & Zhao, 2005)
Schema Transformation
A transformation is a rewriting rule through which the Scientiic Web Intelligence
instances of some pattern of an abstract or concrete A research ield that combines techniques from data
speciication are replaced with instances of another mining, Web intelligence, and Webometrics to extract
pattern. The concept also applies to database schemas useful information from the links and text of academic-
where the rewriting rule replaces a set of constructs of a related Web pages, principally concerning the impact of
database schema with another set of constructs. Such a information and the relationships among different kinds
transformation comprises two partsa schema rewriting of information. (Thelwall, 2005)
rule (structural mapping) and a data conversion rule
(instance mapping)that transform the data according Scientometrics
to the source schema into data complying with the target The quantitative study of science and scientists, particularly
schema. (Hainaut, 2005) the documentary outputs of science. (Thelwall, 2005)

Schema Versioning SCM: See Supply Chain Management.


Ability of the database schema to be replaced by a new
version created with one of the several existing versioning SCMC: See Synchronous Computer-Mediated
methods. (Bounif, 2005) Communication.

Science Center Screen Name


An institution for the popularization and promotion of 1: Can be an individuals real name, a variation of an
science and technology to students and the public. (Hin individuals name, or a totally made-up pseudonym.
& Subramaniam, 2005b) Screen names are especially required on the Internet for
applications such as instant messaging. (Whitty, 2005) 2:
Science Park An IM user name that serves as the address for sending
A business support initiative whose main aim is to and receiving messages. One can change his or her screen
encourage and support the start-up and incubation of name at any time, and most IM programs also allow users

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
596 Sc re e n Re a de r Se a rch Engine /I nfor m at ion Re t rieva l Syst e m

to search for a screen name by e-mail address, name, or SDBS: See Spatial Database System.
area of interest. (Hwang & Stewart, 2005)
S SDK: See Software Development Kit.
Screen Reader
Software that interprets the signals sent to the computer SDLC: See System Development Lifecycle.
screen and reads aloud the displayed text with the help of
a speech synthesizer. (Schmetzke, 2005) SDP: See Session-Description Protocol.

Screen Sharing SDSS: See Spatial Decision Support System.


A technology associated with online meetings that allows
multiple individuals in different physical locations to view SE: See Software Engineering.
and transfer control of a computer screen used during a
Web conference or online meeting. (Panton, 2005) Sealed-Bid Auction
Each bidder submits a bid without the knowledge of the
Script other bids. (Guan, 2006a)
1: A condition-event structure that describes a stereotyped
sequence of events in a particular context. Scripts are SEAM: See Systemic Enterprise Architecture
useful because, in the real world, there are patterns in the Methodology.
occurrence of events. Events described in a script form a
causal chain. (Murthy & Krishnamurthy, 2005b) 2: Where Seamless Education
all the stories in an organization follow a certain form Learning where boundaries between educational levels
with common messages, this indicates that the members dissolve. For example, the transition between high school
of that organization are in effect reading a script. A certain and college is becoming less distinct. (Lindsay et al.,
type of story is the only legitimate one, and anyone telling 2005b)
stories that contradict the script will be eliminated. Expert
communities are prone to rejecting new or novel stories that Seamless Education Services Project
do not conirm with the establishment. (Snowden, 2006) Directly supports the needs of students enrolled in
more than one institution. It provides campus staff
Script Kiddie serving students with appropriate policies, process, and
Derisive term for an amateur hacker who illegally invades information. (Olson & Langer, 2005)
a system using the path of least resistance. (Friedman,
2005) Seamless Web-Based Education
A Web-based system that supports internal stakeholders
Scripting Style from inquiry to graduation. (Aggarwal, 2005)
In the Middle Ages, and especially from the eighth to
ifteenth centuries (before Gutenbergs invention of Search Engine/Information Retrieval System
printing), different writing styles were used from copyists 1: A program that searches documents for speciied
for the reproduction of ancient manuscripts. Beneventan, keywords or phrases and returns a list of the documents
Caroline, Gothic, and Humanistic are four of the most where the keywords were found. (Ribire & Romn,
important and widely used scripts in that period. (Cartelli, 2006) 2: A program that searches the Web, indexing and
2006a) cataloging the pages that it inds. (Murphy, 2005a) 3: A
program that indexes Web documents, then attempts to
SCO: See Shareable Content Object. match documents relevant to a users query requests. (T.S.
Chan, 2005) 4: A software system such as Google and Alta
SCORM: See Sharable Content Object Reference Vista that searches documents on the World Wide Web and
Model. Usenet newsgroups for speciied keywords, and returns a
list of the documents which are relevant to the keywords.
SCPC: See Single Channel Per Carrier. (Hu, Yang, Yeh, et al., 2005) 5: A tool that allows a person
to enter a word or phrase and then lists Web pages or items
SCU: See Switch Control Unit. in a database that contains that phrase. The success of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se a rch Group, I nc Se c ond-Ge ne rat ion K now le dge M a nage m e nt M ove m e nt 597

such a search depends on a variety of factors, including Search Tree Pruning


the number of Web sites that are searchable (or scope of Cutting of certain branches of the (conceptual) search tree
the database), the syntax that a user enters a query in, and that is built during the mining process; pruning criteria
S
the algorithm for determining the relevance of a result, may be the size of the graphs, the support of the graphs, or
which is some measure of how well a given page matches algorithm-speciic constraints. (Fischer & Meinl, 2005)
the query. A typical problem is a user retrieving too few
or too many results, and having dificulty broadening or Seasonal and Cyclic Variations
narrowing the query appropriately. (Singh, 2005a) 6: A Web Similar patterns that are repeated in time series data
service that allows a user to ind Web pages matching the throughout regular periods, or calendar time units. (Sayal,
users selection of keywords. (Scime, 2005b) 7: Software 2005)
that builds a database of Web pages, applies queries to
it, and returns results. (Caramia & Felici, 2005) 8: Web Seasonality
service that helps search through Internet addresses for 1: Periodic pattern that typically occurs within a year
user-deined terms or topics. (Chen & Liu, 2005) 9: Method and repeats itself year after year. Most retail data exhibit
that facilitates content-based searching of digital iles. seasonal variations that repeat year after year. (G.P.
(Subramanian, 2005) Zhang, 2005) 2: Used in a generalized term to indicate
the dependence of a quantity on speciic times of the day,
Search Group, Inc week, or year. (Kushnir, 2006)
A state-managed consortium that represents the states as
a body on criminal justice information systems issues at Seat Time
the national level. (Holland, 2005) Time spent in a traditional classroom. (Witta, 2005)

Search Server SEC: See Securities and Exchange Commission.


Indexes and searches all the documents, information,
applications, communities, Web sites, and other content Second Generation (2G)
accessible through the portal. (Wojtkowski, 2006) 1: Based on circuit-switched technology where each call
requires its own cell channel, which makes transmission
Search Situation of data quite slow. 2G services include Code Division
The period of a search process during which the searcher Multiple Access (CDMA), Time Division Multiple Access
interacts with sources potentially containing information (TDMA), and Global System for Mobile Communication
related to his/her search task. (Pharo & Jrvelin, 2005) (GSM). (Lei et al., 2005a) 2: Second-generation voice-
centric mobile phones and services with limited data rates
Search Space ranging from 9.6 kbps to 19.2 kbps. (Akhtar, 2005)
1: Set of all possible situations of the problem that we want
to solve could ever be in. (Rabual Dopico et al., 2005) Second-Generation Company (SGC)
2: The union of the search space of every transaction in F/OSS company (e.g., MySQL, Sleepycat Software)
a dataset. (Zou & Chu, 2005) employing a dual-licensing-based business model that
supports F/OSS philosophy and methodology in a proitable
Search Space of a Transaction N=X:Y and sustainable software development environment. (Sowe
The set of unknown frequent itemsets contained by N. et al., 2005)
Its size is decided by the number of items in the tail of N
(i.e., Y). (Zou & Chu, 2005) Second-Generation Knowledge Management
Movement
Search Transition Understood to have taken the emphasis away from
The period of a search process during which the searcher discussion of technological issues related to knowledge
interacts with sources containing meta-information. (Pharo management and to have placed it onto discussion of human
& Jrvelin, 2005) and social factors, with particular interest in the creation
of new knowledge. (Ragsdell, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
598 Se c ond-Orde r Effe c t Se c ure Ele c t ronic Tra nsa c t ion (SET )

Second-Order Effect queries, cookies, product correlation, and feedback from


Indirect and long-term impacts of e-government systems the customer companies. (Nayak, 2005c)
S on the economy. (De, 2005)
Section 508
Secondary Activity in the Knowledge Chain 1: A part of the Rehabilitation Act. Under Section 508,
One of several activities that support and guide agencies must give employees with disabilities and members
performance of the primary activities via various practices of the public access to information that is comparable to
and technologies: leading, coordinating, controlling, and the access available to others. The law applies to all
measuring knowledge management initiatives. (Holsapple federal agencies when they develop, procure, maintain,
& Jones, 2006) or use electronic and information technology. (Bursa et
al., 2005) 2: A provision within the Rehabilitation Act of
Secondary Market 1973, as amended by Congress in 1998, that mandates
A market in which an investor purchases a security from that the electronic and information technology developed,
another investor rather than the issuer, subsequent to the maintained, procured, or used by the U.S. government must
original issuance in the primary market, also called the be accessible to people with disabilities. (Schmetzke, 2005)
aftermarket. (Roofe, 2005) 3: Section 508 of the Rehabilitation Act is U.S. legislation
that establishes requirements for electronic and information
Secondary Monitoring technology developed, maintained, procured, or used by
Supports agents with verifying and assuring data and the federal government. (Yu, 2005a)
information compliance by assisting in analyzing and
categorizing exceptions, or results, generated by a Section 508 Compliance
Primary Surveillance System (PSS). This assists in Part of the Workforce Investment Act of 1998. Section
assuring the fulillment of the necessary and suficient 508 of the Act, Electronic and Information Technology,
evidence supporting (true positive/negative) or refuting speciies that electronic information available to people
(false positive) hypotheses of non-compliance. The input with disabilities must be comparable to the information
is the result of the organizations domain-speciic PSS, available to people without disabilities. (Kapp, 2005)
plus related information and human judgment from either
human agents or machine agents encoded with heuristics. Section 255
(Goldschmidt, 2005) A part of the Communications Act. Section 255 requires
telecommunications manufacturers and providers of
Secondary Task telecommunications services to make their products and
The task that is used as a probe in a secondary task study. services accessible to and usable by individuals with
Changes in the performance of the secondary task are taken disabilities, if readily achievable. (Bursa et al., 2005)
to suggest changes in the processing of the primary task
or the detection of processing system overload. (Owen, Secure Content-Delivery Space
2006c) Content that enterprises once closely guarded in private
databases is now being placed on the Internet to save
Secondary Task Technique distribution costs. Hence, content has to be delivered
A dual-task study in which one task is designated as securely. The mechanisms that allow this form the secure
the primary task of interest, while a secondary task is content-delivery space. (Upadhyaya et al., 2006)
concurrently performed as a probe to test the consumption
of processing resources by the primary task. Changes in Secure Electronic Transaction (SET)
secondary task performance are taken to indicate changes 1: A system for ensuring the security of inancial
in resource consumption by the primary task. (Owen, transactions. Secure Socket Layer (SSL) is used more than
2006c) SET. It is a simpler standard than SET. (Kurihara, 2006)
2: A technical standard designed to provide security for
Secondary Web Data payment transactions among cardholders, merchants,
Includes Web transaction data extracted from Web logs. payment gateways, and certiication authorities on the
Examples: Web server access logs, proxy server logs, Internet. (Lee, Hu, et al., 2005) 3: Despite SSLs popularity,
browser logs, registration data if any, user sessions, user MasterCard, Visa, and several other companies developed

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se c ure K now le dge M a na ge m e nt Se c urit y 599

SET. Released in 1997, SET v1.0 established a standard Internet. It is one of a few competing security standards.
speciically for handling electronic payments, describing (Bose et al., 2005) 3: A commonly used security protocol
ield formats, message types, protocol handshaking, and designed by Netscape Communications to enable secure
S
encryption mechanisms. The key difference between Internet communications. It provides communication
SET and SSL is that SET has digital certiicates for all encryption, authentication, and message integrity. (Xu
involved parties as an integral part of its design. (Lei et & Korba, 2005) 4: A protocol developed by Netscape for
al., 2005b) transmitting private documents via Internet. SSL works
by using a private key to encrypt data that is transferred
Secure Knowledge Management over the SSL connection. (Chim, 2006)
The management of knowledge while adhering to principles
of security and privacy. Enterprises must ind cost-effective Securities and Exchange Commission (SEC)
solutions to ensure the privacy of electronic customers, The primary federal regulatory agency for the securities
reliably deliver important information only to designated industry, whose responsibility is to promote full disclosure,
recipients, and offer revenue-generating services based on and to protect investors against fraudulent and manipulative
access proiles. (Upadhyaya et al., 2006) practices in the securities markets. (Saha, 2006b)

Secure Knowledge-Management Trend Security


The trend has been to centralize identity management 1: A concept that contains the elements of conidentiality,
and documents in secure server repositories and portals integrity, and availability. It can also include the extended
accessed by browsers. (Upadhyaya et al., 2006) requirements of authentication, authorization, and non-
repudiation. (Xu & Korba, 2005) 2: A set of processes
Secure Multi-Party Computation aimed at minimizing the vulnerability of assets and
1: Computation of an overall result based on the data resources. (Trcek, 2005) 3: An investment instrument,
from a number of users in which only the inal result is other than an insurance policy or ixed annuity, issued
known to the individual user at the end of computation by an enterprise, government, or other organization that
and nothing else. (Jha & Sural, 2005) 2: Computing the offers evidence of debt or equity. (Saha, 2006b) 4: The
result of an operation (i.e., sum, min, max) on private data combination of processes, procedures, and systems used
(e.g., inding the richest person among a group of people to attain the conidentiality, accountability, integrity, and
without revealing the wealth of the individuals). (Saygin, availability of the needed information. (Wang, Cheng, et al,
2005) 3: The problem of computing any distributed task 2006) 5: Encompasses the primary aspects of availability,
so that security is preserved in the face of adversarial integrity, and conidentiality. (Weippl, 2006) 6: Quality,
attacks. (Lindell, 2005) state, or condition of being prevented of and/or protected
against danger, risk, or injury, caused by intentional effects
Secure Multi-Purpose Internet Mail Extension or actions such as access to information by unauthorized
(S/MIME) recipients and the intentional but unauthorized destruction
A secure e-mail standard based on MIME. S/MIME, being or modiication of that information. Security further
further developed by an IETF Security Area Working includes the recovery from such unauthorized destructions
Group, accomplishes privacy and authentication by using or modiications. (Oermann & Dittmann, 2006) 7: System
encryption/decryption, digital signatures, and X.509 of user names and passwords to control access to programs
certiicates. (Pulkkis, Grahn, & strm, 2005) and information on the computer and network. (Brady,
2005) 8: The capability to be reliable in delivering goods
Secure Socket Layer (SSL) and information, and to keep conidential and safe that
1: SSL protocol provides secure links over the Internet information and resources. (Samuel & Samson, 2006) 9:
between a Web browser and a server. SSL was developed The combination of integrity, availability, and secrecy.
by Netscape Communications in 1995 and is embedded in (Cremonini et al., 2006) 10: The effort to create a secure
Web browsers. Its adoption has been widespread as it is computing platform, designed so that agents (users or
relatively inexpensive. (Lei et al., 2005b) 2: A transaction programs) can only perform actions that have been allowed.
security standard developed by Netscape Communications (Guan, 2006g)
to enable commercial transactions to take place over the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
600 Se c urit y Ana lysis Se gm e nt at ion Eva luat ion

Security Analysis Security Management


Thorough analysis of a system in order to get a complete In network management, the task of deining and enforcing
S picture of its security level. Vulnerabilities, risks, rules and regulations regarding the use of the resources.
treatments, and their costs are identiied. (den Braber et (Kayacik et al., 2005)
al., 2005)
Security Mechanism
Security Category A basis for a security serviceusing a particular security
Limitation of circulation imposed on a document or a ile. mechanism (e.g., cryptographic algorithm), the security
(Janczewski & Portougal, 2005) service is implemented. (Trcek, 2005)

Security Clearance Security Policy


A set of privileges individually granted to an employee 1: Guidelines for security of the information, computer
related to dealing with confidential information. systems, and network equipment. (Hentea, 2005b) 2: A
(Janczewski & Portougal, 2005) document that lays out the rules for network information
access, determines the process to enforce policies, and
Security Concern lays out the architecture of the security environment of an
Such as availability of secure modes for transmitting organization. (Mitrakas, 2006) 3: Documented procedures
information, provisions made for alternatives, overall that focus on the organizations management of security;
concern about security of transactions over the Internet, it is about information conidentiality, integrity, and
gathering of personal information, and so on. (Shih & availability of resources. (Trcek, 2005)
Fang, 2006)
Security Service
Security Evaluation A service provided by an entity to ensure adequate security
A systematic examination of an organizations technology of data or systems. (Trcek, 2005)
base, including information systems, practices and
procedures, administrative and internal controls, and Security-Assertion Markup Language (SAML)
physical layouts. Security evaluations identify security An XML-based framework for exchanging security
deficiencies such as outdated virus definitions and information. This security information is expressed in
unauthorized access to information. (Butcher-Powell, the form of assertions about subjects (either human or
2005) computer) that have an identity in some security domain.
Assertions can convey information about authentication
Security Event Management (SEM) acts and authorization decisions about whether subjects
An approach for the event detection, correlation, and are allowed to access certain resources. (Upadhyaya et
prevention of attacks, including automatic and automated al., 2006)
enforcement of security policies. (Hentea, 2005b)
Seed Financing
Security Laboratory Initial inancing for a start-up venture; used for proof-of-
A controlled environment used by technical professionals concept, market research, and/or initial product/service
to test the effectiveness of different hardware, software, and development. (Craig, 2006a)
network conigurations in warding off attacks, as well as to
experiment with and learn about various security devices, Seek Time
tools, and attack methods. (Knight & Labruyere, 2005) The data on a computer disk is arranged in concentric
circles called tracks. Seek time is the time needed to move
Security Lattice the disk head from its current position to the track that the
A partial (or total) order of security classes, where there is desired data is on. (Lu, 2005)
a least upper bound that dominates all the other security
classes and a greatest lower bound that is dominated by Segmentation Evaluation
all security classes. (Haraty, 2005b) A process to judge the performance of segmentation
algorithms based on some deined quality criteria and/or

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Segmented Network (SN) Self-Eficacy Theory 601

ground truth in view to assess or reveal the property of Self-Checkout System


algorithms in use. The inter-algorithm evaluation is also Can occur at the end or during shopping processes whenever
called segmentation comparison, while the intra-algorithm cash-desk operations are outsourced to consumers. In
S
evaluation can be called segmentation characterization. that case, consumers self-register their items with speciic
(Zhang, 2005c) scanning devices. (Kotzab, 2005)

Segmented Network (SN) Self-Determination Theory


Inter-sector teams with high KD and low PD, leading to A motivation theory, developed by Deci and Ryan, which
conditions for the so-called optimum distance. (Choudhary, suggests that individuals have three innate psychological
2005) needs: autonomy, competence, and relatedness. It
distinguishes between intrinsically motivated, or
Selection autonomous, self-determined activity, and extrinsically
1: In biology, a mechanism by which the ittest individuals motivated activity, which is more controlled (i.e., less
survive to reproduce, and the basis of speciation, according autonomous). (Hendriks & Sousa, 2006)
to the Darwinian theory of evolution. Selection in GP
involves evaluation of a quantitative criterion over a Self-Directed Approach
inite set of itness cases, with the combined evaluation Students have control over their progression, or pacing,
measures being compared in order to choose individuals. in a course or program. (Laws et al., 2005)
(Hsu, 2005b) 2: The choice of which stimuli should be
considered and which issues should be addressed when Self-Directed Learning
presented with a set of stimuli and issues beyond the 1: Learning that occurs when learners explore, question,
available capacity. (Yaniv & Schwartz, 2006) react, and respond to learning material relevant to
their needs. (Eberle & Childress, 2005) 2: Students are
Selective Attention empowered to learn at their own pace, catering to the
The idea that a person can actively choose to attend to different learning speeds and styles of individuals. (Knight
one of multiple stimuli that are present, while ignoring et al., 2005)
others. (Owen, 2006b)
Self-Directedness
Selective List Focuses upon the process of engaging in self-taught
A set of courses, grouped together for the purpose of illing learning experiences. Key characteristics of self-
an educational skill gap. (Slazinski, 2005) directedness include motivation, self-responsibility, ability
to self-assess, ability to transfer knowledge/skills, and
Selectivity comfort with autonomy. (McCracken, 2005)
The ratio of the number of output tuples of a query to
the total number of tuples in the relation. (Hou, Guo, et Self-Direction
al., 2005) The ability to carry out a learning activity without being
directed or managed by another person, and speciically,
Self-Adaptive a teacher. The term can also refer to the ability to set ones
Ability of a Web portal to automatically adjust its own learning goals. (Kukulska-Hulme, 2005)
presentations to perceived user preferences. (Quah, Leow,
& Yong, 2006) Self-Eficacy
1: Measure of a persons belief and conidence that he or
Self-Archiving she can perform a certain task. (Blignaut et al., 2005) 2:
Consists of depositing researcher works in a repository. The belief in ones ability to successfully complete a task
The researcher is generally responsible for the format of or execute a behavior. (Jawahar, 2005)
the deposit and particularly for its conformance to the
archive standards. (Rennard, 2006) Self-Eficacy Theory
This motivation theory, developed by Bandura, posits
that motivation is the combined product of beliefs about

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
602 Se lf-Eva luat ion Se lf-Re por t

whether one is capable of performing (or learning) some Self-Organized Learning


task, and beliefs about whether such performance will lead Learning theory that emphasizes autonomy and
S to desirable outcomes. (Hendriks & Sousa, 2006) responsibility of learners. (Beuschel et al., 2005)

Self-Evaluation Self-Organizing Group


1: An activity where the student compares the rubric to A subset of a community where individuals decide for
his or her alternative assessment activity prior to inal themselves how work structures, study activity, and so
submission to the instructor; assisting students to evaluate forth are coordinated. Such structures make use of social
their own work offers opportunities for editing/correcting interactions and commonality to be sustained for as long
prior to teacher grading and for self-relection on the as they are needed. (Fleming, 2005c)
learning process. (B.L. MacGregor, 2005) 2: Where a
person evaluates his or her own solution to a problem or Self-Organizing Map (SOM)
other assignment. (Bieber et al., 2005) 1: Two-layer neural network that maps the high-
dimensional data onto a low-dimensional grid of neurons
Self-Maintainable View through unsupervised learning or competitive learning
A materialized view that can be maintained, for any process. It allows the data miner to view the clusters on
instance of the source relations, and for all source relation the output maps. (H. Wang & Wang, 2005) 2: A neural
changes, using only these changes, the view deinition, network model developed by Teuvo Kohonen that has been
and the view materialization. (Theodoratos & Simitsis, recognized as one of the most successful models. The
2005) model uses an unsupervised learning process to cluster
high-dimensional data and map them into a one- or two-
Self-Managed Work Team (SMWT) dimensional feature map. The relationships among data
Autonomous teams that are responsible for managing and can be relected by the geometrical distance between their
performing various tasks. (Hantula & DeRosa, 2005) mapped neurons. (Yang & Lee, 2005)

Self-Modeling Self-Paced E-Learning


The process whereby an unaided user develops his or her Students access computer-based (CBT) or Web-based
own mental model of a system to explain its behavior, (WBT) training materials at their own pace, and so select
achieved through exploration or trial-and-error learning. what they wish to learn and decide when they will learn
(Maceield, 2006) it. (Cirrincione, 2005)

Self-Occlusion Self-Paced Training


When a part of an object is occluded by another part of Training taken at a time and pace determined by the user.
itself. For example, when a person is walking, one leg may Used historically for text or audio/video self-study courses,
occlude the other leg or the torso may occlude one arm. the term is used by some organizations now to include
(Aifanti et al., 2005) computer-based, Web-based, and multimedia training.
(Galitsky, 2005b)
Self-Organization
A system structure that often appears without explicit Self-Regulated Learning
pressure or involvement from outside the system. (Lingras Individual students rather than teachers set educational
et al., 2005) goals; involves active, goal-directed self-control of
behavior and cognition. (Berg, 2005d)
Self-Organized Critical State or Emergence
A group of interconnected communicating, interacting, Self-Report
and negotiating agents reach a state of self-organization Surveys where people provide their opinions and reactions.
resulting in an unpredictable decisionsuch as a share- (Molinari, Anderberg, et al., 2005)
market crash, a stagnation, or a speculation bubble. (Murthy
& Krishnamurthy, 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se lf-Se r vic e Se m a nt ic Ga p (SG) 603

Self-Service Semantic Annotation


1: One of the major differences between a traditional Ontology-based metadata on a Web resource. These may
business information system and current Web-enabled either correspond to the semantics underlying the resource
S
business information systems is that the user does not or to information not contained in the resource. Semantic
need to be trained and is assumed to have sophisticated annotations can correspond to instances of concepts or of
prerequisite knowledge to be able to use the system. A relations of an ontology. The process of semantic annotation
self-service system is a new trend of business systems aims to transform a human-understandable content into a
that is Web enabled and has a user-conigurable interface. machine-understandable content. (Dieng-Kuntz, 2006)
A system is deployed on the Web with a generic user
interface. Self-service allows online users to select system Semantic Context
functions to construct a Web information system in a way The speciication of the concepts particular to a domain
that is best suited for the users information needs. (Li, that help to determine the interpretation of a document.
2005a) 2: Online students register, request and pay for (Banerjee et al., 2005)
services, receive basic academic advising, and so forth,
without accessing student support personnel. Under this Semantic Data Mining
model, students are no longer bound by the ofice hours of A method of data mining which is used to ind novel, useful,
the provider. They can individually access their services and understandable patterns in data, and incorporates
anytime from anywhere. (Howell & Wilcken, 2005) semantic information from a ield into the mining process.
(Banerjee et al., 2005)
Self-Sustainability
The ability to maintain an entity over an extended period Semantic Dimension
of time without depleting the resources available to it. Concept or entity of the studied domain that is being
(Vrazalic & Hyland, 2005) observed in terms of other concepts or entities. (Meo &
Psaila, 2005)
Self-Usability
Sort of mechanisms set by users (e.g., use of acronyms in Semantic E-Mail
a SMS) in order to make more usable the interaction with E-mail framework in which the semantics of e-mails
complex human artifacts. (Roibs, 2006a) is understandable by both human and machine. A
standardized deinition of semantic e-mail processes is
Sellink required. (Bickel & Scheffer, 2005)
A link from a site to a page within the same Web site.
(Thelwall, 2006) Semantic Gap (SG)
1: The discrepancy between the perceptual property and
Sell-Side Forward Auction semantic meaning of images in the context of CBIR. As the
An auction where a seller announces the items for quick perceptual properties are usually described by low-level
sale and buyers bid on them. (I. Lee, 2005) visual features that can be easily treated by computers,
and the semantic meanings are commonly related to high-
Seller-Driven Value Chain level object-based descriptions that are familiar to human
The seller presumes to know what the market might want beings, the semantic gap is also considered a gap between
to buy. (Jeffcoate, 2005) current techniques and human requirements. (Y.-J. Zhang,
2005a) 2: The difference between the high-level user
Sellers Production Cost perception of the data and the lower-level representation of
The production cost of an item for a seller includes the the data used by computers. As high-level user perception
manufacturing and procurement costs for the item, and involves semantics that cannot be translated directly into
corresponds to the minimum price that the seller can logic context, bridging the semantic gap is considered a
charge for the item. (Dasgupta et al., 2006) challenging research problem. (Wei & Li, 2005) 3: The
lack of coincidence between the information that one can
SEM: See Security Event Management. extract from the data and the interpretation that the same
data has for a user in a given situation. (Windhouwer &
Kersten, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
604 Se m a nt ic H e t e roge ne it y Se m a nt ic Que r y Opt im izat ion

Semantic Heterogeneity data with classes of an ontologythat is, the use of ontology
Each information source has a speciic vocabulary for describing data. (Aleman-Meza et al., 2005)
S according to its understanding of the world. The
different interpretations of the terms within each of these Semantic Model
vocabularies cause the semantic heterogeneity. (Buccella The conceptual representation of the problem domain.
et al., 2005) (Hoxmeier, 2005)

Semantic Information Architecture Semantic Network


An architecture consisting of three core parts: metadata, 1: A knowledge-representation formalism from the
an information model, and data semantics. The metadata cognitive-science community (understood by cognitive
facilitates a basic understanding of the organizations psychologists to represent actual cognitive structures
data; the information model provides a conceptualization and mechanisms, and used in artiicial-intelligence
and representation of the business, based on ontology, to applications) consisting primarily of textually labeled
provide a formal speciication of the real world; and the data nodes representing objects, concepts, events, actions,
semantics map the data sources to the information model and so forth, and textually labeled links between nodes
to capture meaning, as result of which we can understand representing the semantic relationships between those
the data. (Schwartz & Schreiber, 2005) nodes. (Alpert, 2006) 2: Basically, directed graphs
(digraphs) where the nodes represent concepts, and the arcs
Semantic Integrity represent different kinds of associative links, not only the
The adjective in semantic integrity is often added to classical IsA and property-value links, but also ternary
distinguish a set of explicitly deined integrity constraints, relationships derived from Case Grammar in Linguistics
either from structural constraints that are implicitly given and labeled as Actor, Object, Recipient, Instrument, and
by the used data model (e.g., data types in relational so forth. Representational solutions that can be reduced
databases must be scalar) or from integrity as required in some way to a semantic network framework include,
for the sake of security. (Decker, 2005) among (many) other things, Ceccatos Correlational
Grammar which dates back to the 1950s, Quillians
Semantic Integrity Constraint Semantic Memory, Schanks Conceptual Dependency
In GIS, a constraint concerned with the meaning of Theory, Sowas Conceptual Graphs, Lenats CYC, and
geographic features. Semantic integrity constraints apply Zarris NKRL (Narrative Knowledge Representation
to database states that are valid by virtue of the properties Language). Semantic network solutions have been often
of the objects that need to be stored. (Davis et al., 2005) used/proposed to represent different kinds of narrative
phenomena. (Zarri, 2006c)
Semantic Learning Object
A learning resource that is wrapped with a set of Semantic Primitive
standardized metadata and can be used in the instructional A symbol that has interpretation, but the interpretation is
design process. (Garca et al., 2006) not implemented in the system. So in automated computing,
semantic primitive is treated as symbols. However, in
Semantic Matching interactive computing, it may be treated as a word (not
Compares the speciications dynamic behavior. (Felice necessary). (T.Y. Lin, 2005)
& Riesco, 2005)
Semantic Proile
Semantic Metadata A part of a users proile that deines what kinds of
1: Metadata that describes the content of a document information (topics) he/she is interested in. (Abramowicz
within the context of a particular domain of knowledge. For et al., 2006)
example, for documents relating to the homeland security
domain, semantic metadata may include terrorist names, Semantic Query Optimization
group afiliations, and so forth. (Banerjee et al., 2005) 2: 1: A query optimization process based on knowledge. The
Data about data that describes the content of the data. A knowledge used is usually represented as, but is not limited
representative example of semantic metadata is relating to, integrity constraints. (Aldana Montes et al., 2005) 2:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se m a nt ic Se a rch Se m a nt ic We b Rule 605

The use of integrity constraints to constrain search in that allows data to be shared and reused across application,
answering queries. (Grant & Minker, 2006) enterprise, and community boundaries. It is a collaborative
effort led by W3C with participation from a large number
S
Semantic Search of researchers and industrial partners. It is based on the
A search in natural language text, based on the meaning Resource Description Framework (RDF) and other Web
rather than the syntax of the text. (Navarro, 2005) ontology description languages (OWLs), which integrate a
variety of applications using XML for syntax and Uniform
Semantic Technology Resource Identiiers (URIs) for naming. (Kapetanios,
A software technology that allows the meaning of and 2005) 8: An environment in which human and machine
associations between information to be known and agents will communicate on a semantic basis. It is to be
processed at execution time. For a semantic technology to achieved via semantic markup and metadata annotations
be truly at work within a system, there must be a knowledge that describe content and functions. (Ishaya, 2005) 9:
model of some part of the world that is used by one or more A mesh of information linked up in such a way as to be
applications at execution time. (Kapetanios, 2005) easily processable by machines, on a global scale. You can
think of it as being an eficient way of representing data
Semantic Web on the World Wide Web, or as a globally linked database.
1: A vision of how the World Wide Web could be more (Roldn-Garca et al., 2005) 10: Provides a common
intelligent, based on meta-tagging the content, together framework that allows data to be shared and reused across
with the ability to inference automatically how different application, enterprise, and community boundaries. It is
Web objects are related to one another. (Woods et al., a collaborative effort led by W3C with participation from
2006) 2: A Web that includes documents or portions a large number of researchers and industrial partners. It
of documents describing explicit relationships among is based on the Resource Description Framework, which
things and containing semantic information intended for integrates a variety of applications using XML for syntax
automatic processing by our machines. (Garca et al., 2006) and URIs for naming. (Raisinghani & Sahoo, 2006) 11:
3: An extension of the current Web in which information The vision for a World Wide Web in which resources are
is given well-deined meaning, better enabling computers described with metadata expressed in languages oriented
and people to work in cooperation. Berners-Lee said that to machine- processing, thus enabling advanced services
in the context of the Semantic Web, the word semantic based on those descriptions. (Sicilia & Garca-Barriocanal,
meant machine processable. He explicitly ruled out 2006)
the sense of natural language semantics. For data, the
semantics convey what a machine can do with that data. Semantic Web Architecture
(Aldana Montes et al., 2005) 4: An extension of the current A layered architecture proposed by Berners-Lee for the
Web where information resources are attached with Semantic Web applications. In this architecture, ontologies
metadata to support people and computers as they work occupy a central place: they are built on the top of the
in cooperation. The metadata are intended to give well- Resource Description Framework (RDF) layer, which is
deined meaning to resources and to support automated in turn built on the top of the XML layer. The XML/RDF
reasoning about the meaning and trustworthiness of base constraints the particular format ontologies assume
resources. (Lyytikinen et al., 2005) 5: An extension of the in a Semantic Web context, inheriting, for example, all the
current World Wide Web, proposed by Tim Berners-Lee, well-known XML verbosity. (Zarri, 2006b)
in which information is given a well-deined meaning.
The Semantic Web would allow software agents, as well Semantic Web Rule
as humans, to access and process information content. Still a hot topic in a Semantic Web context. The present
(Banerjee et al., 2005) 6: An extension to the Web where proposals (like RuleML, TRIPLE, or SWRL) are based
information has well-deined meaning. Semantic Web on an expansion of the classical logic programming
services describe Web services capabilities and content paradigm where the inferential properties of Prolog/
in a computer interpretable language, and improve the Datalog are extended to deal with RDF/OWL knowledge
quality of the existing tasks, including Web services bases. Examples of Semantic Web rules in RuleML are the
discovery, invocation, composition, monitoring, and derivation rules (i.e., rules used to automatically deining
recovery. (Zhang, 2006) 7: Provides a common framework derived concepts), the reaction rules (for specifying the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
606 Se m a nt ic We b Se r vic e Se m i-Fra gile Wat e r m a rk ing

reactive behavior of a given system in response to speciic Semantically Modeled Enterprise Database
events), the transformation rules (used to implement A database that is a relection of the reality of the activities in
S translators between different versions of RuleML, and which an enterprise engages, and the resources and people
between RuleML and other rule languages like Jess), and involved in those activities. The semantics are present in
so forth. (Zarri, 2006b) the conceptual model, but might not be readily apparent
in the implemented database. (Dunn & Grabski, 2005)
Semantic Web Service
1: A Web service is a Web site that does not simply Semantics
supply static information, but that also allows automatic 1: In a language, it is the meaning of a string, as opposed
execution of some actions (services), like the sale of a to syntax, which describes how the symbols of the
product or the control of a physical device. To do this, Web language are combined. Most programming languages
services make use of XML-based standards like WSDL, have their syntax deined formally (traditionally in
a description protocol, and SOAP, a messaging protocol, BNF), while formal speciication languages have also
characterized by a low level of semantic expressiveness. their semantics deined formally. (Dasso & Funes, 2005)
For example, WSDL can describe the interface of the 2: Information should be in a form which is intelligible
different services, and how these services are deployed via to those receiving it. (Kisielnicki, 2006) 3: Property that
SOAP, but it is very limited in its ability to express what collects UD speciications and that should be preserved
the overall competences of this service are. Semantic Web in the transformation schemata for all methodology
services are Web services that can specify not only their phases. (Cuadra et al., 2005) 4: Study of meaning. Data
interfaces, but also describe in full, under the form of OWL- semantics is the meaning denoted by some data. (Gillman,
based ontologies, their capabilities and the prerequisites 2006) 5: The branch of linguistics that studies meaning
and consequences of their use. For example, OWL-S is in language. One can distinguish between the study of
a speciication, in the form of an ontology, intended to the meanings of words (lexical semantics) and the study
describe different Semantic Web service features, enabling of how the meanings of larger constituents come about
Web users and software agents to automatically discover, (structural semantics). In the study of language, semantics
invoke, select, compose, and monitor Web-based services. is concerned with the meaning of words, expressions,
(Zarri, 2006b) 2: Web service that incorporates semantic and sentences, often in relation to reference and truth.
metadata that describe Web services and how to use them Meta-semantic theories study key semantic notions such
in a standard way in order to achieve the automation of as meaning and truth, and how these notions are related.
Web services. (Moser & Melliar-Smith, 2006) (Galitsky, 2005c) 6: The meaning of expressions written in
some language, as opposed to their syntax, which describes
Semantic-Based Image Retrieval how symbols may be combined independently of their
A branch of CBIR based on descriptions with semantic meaning. (Ras & Dardzinska, 2005) 7: The purpose of
meaning and considered at a high abstraction level. semantics is to assign a meaning to syntactical elements.
Semantic descriptions are more closely related to the For Web services, it is the agreed-upon meaning of data,
human interpretation and understanding of images. (Y.-J. functions, QoS, and so forth exchanged between two or
Zhang, 2005a) more services. (Cardoso, 2006)

Semantic-Based Representation Semantics-Preserving Transformation


Describing multimedia content using semantic terms. A schema transformation that does not change the
(Hurson & Yang, 2005) information contents of the source schema. Both schemas
describe the same universe of discourse. (Hainaut,
Semantic-Level Architecture 2005)
In semantic level architectures, modalities are integrated
at higher levels of processing. Speech and gestures, for Semi-Fragile Watermarking
example, are recognized in parallel and independently. A method for embedding a secret message that is intended
The results are stored in meaning representations that to be undetectable only after malicious manipulations of
then are fused by the multimodal integration component. the host media in which it is embedded and detectable after
(Bourguet, 2006) non-malicious manipulations. (C.-T. Li, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se m i-H one st Adve rsa r y Se m iot ic Le a r ning 607

Semi-Honest Adversary Semi-Supervised Learning


An adversary who follows the protocol speciication but 1: A variant of supervised learning that uses both labeled
may try to learn private information by analyzing the data and unlabeled data for training. Semi-supervised
S
messages that it receives during the protocol execution. learning attempts to provide a more precisely learned
This models the inadvertent leakage of information even classiication model by augmenting labeled training
during legitimate protocol executions. (Lindell, 2005) examples with information exploited from unlabeled data.
(Kim, 2005) 2: Learning from both labeled and unlabeled
Semi-Structured Data data. (Muslea, 2005)
1: Data that does not adjust to a predeined schema or that
has a very lexible, possibly dynamic, schema. (Mani & Semijoin
Badia, 2005) 2: Data whose structure may not match, Variant of the regular join operator. The (left) semijoin
or may only partially match, the structure prescribed by of relations R and S on condition C involving attributes
the data schema. (Denoyer & Gallinari, 2005) 3: Data of R and S will generate as its output all the tuples in R
with a structure not as rigid, regular, or complete as that that have at least one matching tuple in S that fulills C
required by traditional database management systems. (i.e., the tuples in R that would participate in a regular
(Sindoni, 2005a) join) without repetitions (the right semijoin is deined
similar). Algebraically, the (left) semijoin is deined as
Semi-Structured Data Mining the projection on the schema of relation R of the join of R
A sub-ield of data mining, where the data collections and S. (Badia, 2005a)
are semi-structured, such as Web data, chemical data,
biological data, network data, and so forth. (Zhao & Seminary
Bhowmick, 2005) School or college created to educate persons for the
practice of ministry and/or for teaching and research in
Semi-Structured Document the theological disciplines. (Rogers & Howell, 2005)
A semi-structured (or template-based) document refers
to a document that is formatted between structured and Semiotic Hand Gesture
unstructured documents. (Chang & Hsu, 2005) Gesture used to communicate meaningful information or
serving as an indication; such gestures convey speciic
Semi-Structured Information emotions in a more expressive manner than vague hand
The type of information that is a combination of structured movement. (Karpouzis et al., 2005)
and unstructured information. An example of semi-
structured information is an HTML (hypertext markup Semiotic Learning
language) page. It is structured because it uses tags to A dynamic-practice approach to facilitate organizational
describe the content of a Web page, but it is unstructured learning. It focuses on improving and developing the quality
because there is free text between two tags. (Gangopadhyay of organizational community life. The semiotic learning
& Huang, 2005) approach is directed to recovering the balance between
the necessary mechanistic, utilitarian, transactional,
Semi-Supervised Classiication and functionalistic procedures present in all kinds of
The task of learning a mapping from instances to one organizations, and the less visible, implicit, subtle,
of initely many class labels, coming from labeled data yet powerful issues related to the meaning-creation
consisting of a sequence of instance-class pairs and process which constitutively sustains any organization
unlabeled data consisting of just a sequence of instances. and forms the bedrock of its community. The semiotic
(Scheffer, 2005) learning approach is supported and informed by social
semiotics, critical realism, and action theory. It mediates
Semi-Supervised Clustering philosophical forms of inquiry and adapts them to
A variant of unsupervised clustering techniques without organizational contexts. Organizational learning promotes
requiring external knowledge. Semi-supervised clustering environments and establishes an organizational design that
performs clustering process under various kinds of user is conducive to knowledge creation and sharing, as well
constraints or domain knowledge. (Kim, 2005) as to collaborative forms of work and learning. Semiotic

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
608 Se m iot ic s Se nsor a nd Ac t uat or N e t w ork

learning goes beyond traditional organizational learning SeniorComp


and knowledge management approaches by capturing The name given to the project designed to provide
S the dynamism, innovation, and creativity spontaneously computers and training in their use for seniors with limited
present in every organizational context, and turning incomes. (Mizell & Sugarman, 2005)
this potential into effective and meaningful action at the
organizational level. Therefore this approach is action SeniorNet
based and action driven. (Nobre, 2006a) An international non-proit organization headquartered
in California that has established senior learning centers
Semiotics for technology throughout the U.S. and in some foreign
1: A theory of signs and the use of signs in languages. countries. A Web site is maintained with technology
Semiotics posits the arbitrary nature of the sign and looks news for seniors, chat rooms, resources for the volunteer
at how human languages encode and transmit messages. instructors, and so forth. (Mizell & Sugarman, 2005)
(Kieler & West, 2005) 2: The science of signs. It covers
the analysis of signs and the study of sign systems. A sign Sense of Community
is something that stands for something else. So semiotics 1: An individuals feeling of belonging to and contributing
can also be understood as the study of meaning-making to a group that meets the needs of its members through
or semiosis. A culture is the system of daily living that mutual commitment. (Roberts et al., 2006c) 2: The level
is held together by a signifying order, including signs, of interpersonal connection that a group of people in a
codes, texts, and connective forms. Semiotics is not just speciic community feel. In the online learning community,
a theory, but it is a common and unavoidable practice members of the community do not have to be bonded
present in all forms of communication. Thus the study geographically. (S.-K. Wang, 2005) 3: The trust and
of semiotics in human communication may be a form feeling of personal attachment that causes individuals to
of studying cultural anthropology. Semiotics can have a feel safe to socially exchange information for the purpose
positivist application when focusing solely on the formal, of beneiting the group. (Fryer & Turner, 2006)
explicit, and visible structures of language or other sign
systems, or else it may take a more interpretative approach Sense of Virtual Community
when focusing on the dynamic and transformative nature 1: The individuals affective bonds toward the virtual
of the same sign systems. (Nobre, 2006a) 3: The science community that differentiate between virtual communities
that analyzes signs and sign systems, and puts them in and other online Web sites. (Shan et al., 2006b) 2: The
correspondence with particular meanings. It provides individuals feelings of membership, inluence, and
formal tools for image knowledge acquisition, generation, immersion toward a virtual community. (Signoret,
representation, organization, and utilization in the context 2006)
of CBIR. (Y.-J. Zhang, 2005a) 4: The study of signs and
symbols, both visual and linguistic, and their function Sensitivity Analysis
in communication. (Macfadyen & Doff, 2006) 5: The A form of what-if analysis that seeks the largest variation
theory of signs; the assignment of meaning to data and the of an input value into a model input that leaves the outcome
effectiveness of use of an information system are semiotic of the decision unchanged. (Pomerol & Adam, 2005)
concerns. (Berztiss, 2006b)
Sensitivity to Initialization
Sender-Warranted E-Mail A center-based clustering algorithm is an iterative
This method allows the sender to use a special header to algorithm that minimizes the value of its performance
certify that the e-mail is genuine. The process could help function. Such an algorithm converges to only a local
to prevent spam scams. (de Freitas & Levene, 2006a) optimum of its performance function. The converged
position of the center depends on the initial position of the
Senior-Centered Design center where the algorithm starts. (B. Zhang, 2005)
A methodology that involves older users in the process
of designing products that are targeted toward the aging Sensor and Actuator Network
population. (Zaphiris & Kurniawan, 2005) An ad-hoc, mobile, wireless network consisting of nodes of
very small size either embedded in objects or freestanding.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se nsor Dat a ba se Se que nt ia l Signat ure File 609

Some nodes have sensing capabilities, which frequently Separation


include environmental conditions, existence of speciic The separation of what a method does (interface) from
chemicals, motion characteristics, and location. Other how the method does it (implementation). (D. Brandon,
S
nodes have actuation capabilities; for example, they may 2005a)
provide local control of mechanical, electrical, or biological
actuators and optical long-range communications. Sequence Alignment
(Roussos & Zoumboulakis, 2005) The process to test for similarities between a sequence of
an unknown target protein and a single (or a family of)
Sensor Database known protein(s). (Tzanis et al., 2005)
The total of stored sensor data in a sensor and actuator
networked is called a sensor database. The data contain Sequencing
metadata about the nodes themselves, for example, a list 1: As a knowledge integration mechanism, sequencing
of nodes and their related attributes, such as their location refers to the assignment of tasks to those organization
and sensed data. The types and the quantity of sensed data members who have the relevant knowledge for it. When
depend on the particular types of sensors that participate creating routines of sequenced tasks, individuals only
in the network. (Roussos & Zoumboulakis, 2005) need to know their part of the routine in order to realize
a coordinated application of knowledge. (Berends et al.,
Sensor Network 2006) 2: The process of determining the order of nucleotides
1: A large network of devices measuring (remote) sensor in a DNA or RNA molecule, or the order of amino acids
data, with frequently changing topology where broadcast in a protein. (Tzanis et al., 2005)
is usually the means of communication. The sensors
typically have limited processing ability and restricted Sequential Pattern
power. (Shahabi et al., 2005) 2: A network of low-power, 1: A sequence included in a data sequence such that each
small form-factor sensing devices that are embedded in a item in the sequential pattern appears in this data sequence
physical environment and coordinate amongst themselves with respect to the order between the itemsets in both
to achieve a larger sensing task. (Shahabi & Banaei- sequences. (Masseglia et al., 2005) 2: Frequently occurring
Kashani, 2005) subsequence in a collection of sequences. (Manolopoulos
et al., 2005)
Sensor Query Processing
The design of algorithms and their implementations Sequential Pattern Generation
used to run queries over sensor databases. Due to the The problem of discovering sequential patterns consists of
limited resources of sensor and actuator nodes, query inding intertransaction patterns such that the presence of a
processing must employ in-network processing and storage set of items is followed by another item in the time-stamp-
mechanisms. (Roussos & Zoumboulakis, 2005) ordered transaction set. (Hu, Yang, Lee, & Yeh, 2005)

Sensor Uncertainty Sequential Random Sampling


An inherent property of a sensor-based application, where A database sampling method that implements uniform
each recorded data item in the database is only an older, random sampling on a database table whose size is known.
approximate version of the entity being monitored in the (Lutu, 2005)
external environment. (Cheng & Prabhakar, 2005)
Sequential Searching
Sensory Memory Searching without preprocessing the text. (Navarro,
A system, independent of memory in the beginning, that 2005)
consists of a series of stages where sensory signals are
transformed into sensory percepts. (Atkinson & Burstein Sequential Signature File
2006) A set of signatures stored in a ile in a sequential way.
(Dunn & Grabski, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
610 Se que nt ia l Z e roing of We ight s Se r vic e

Sequential Zeroing of Weights Server Accelerator


A sensitivity analysis method that involves sequential A machine dedicated to improving the performance of a
S zeroing of weights of the connection between the input Web server by caching popular Web objects. Usually it is
variables and the irst hidden layer of the neural network. installed in front of a single or a farm of Web servers in
(Yeo, 2005) order to improve their performance and load the balance
among them. (Danalis, 2005)
Serial Entrepreneurship
Starting a new venture, after having done so at least once Server Log
previously; serial entrepreneurs have start-up experience. 1: A ile that a Web server keeps about requests on its
(Craig, 2006b) pages from users. It is usually in a standard format such
as common log format. (Fu, 2005) 2: An audit ile that
Serializability provides a record of all requests for iles on a particular
1: An execution is said to be serializable if its effect is Web server, also known as an access log ile. (Lee-Post
the same as if the transactions were executed in serial & Jin, 2005b)
order. (Coratella et al., 2005) 2: Requires that a schedule
for executing concurrent transactions in a DBMS is Server Session
equivalent to one that executes the transactions serially in A collection of user clicks to a single Web server during
a certain order. (Parker & Chen, 2005) 3: The generally a user session. (Yao & Xiao, 2005)
accepted correctness criterion for concurrent execution
of transactions. The concurrent execution should produce Server Side
the same effect and lead to the same database state as Activities that occur on an organizations Web server which
one possible sequential execution of the same set of may interact with multiple clients. (Moore, Warkentin, et
transactions. (Leong, 2005b) al., 2006)

Serializable Server-Based Computing/Thin-Client


Produces the same output and has the same effect as that Technology
of a serial execution. (Haraty, 2005a) Evolution of client-server systems in which all applications
and data are deployed, managed, and supported on the
Servant server. All of the applications are executed at the server.
A node in a P2P ile-sharing network that transfers a ile to (Morabito & Provera, 2005)
a user in response to a request. (Hughes & Lang, 2005)
Server-Based Two-Phase Locking (S2PL)
Server The S2PL uses a detection-based algorithm and supports
1: A powerful machine that hosts various software, iles, inter-transaction caching. It validates cached pages
and information to computers that connect to it. Game synchronously on a transactions initial access to the page.
servers will hold the gaming worlds data and all details Before a transaction is allowed to commit, it must irst
of characters/players connected to it that will provide access the primary copies from the server on each data
feedback to all the computers (clients) around the world. item that it has read at the client. The new value must be
(Grifiths et al., 2006) 2: A computer that processes installed at the client if the clients cache version is outdated.
requests for HTML and other documents or components The server is aware of a list of clients who requested locks
of Web pages from clients. (Hantula, 2005) 3: A computer only, and no broadcast is used by the server to communicate
or application that provides services to a client. (Maris, with clients. (Parker & Chen, 2005)
2005) 4: Powerful computer or processor dedicated to
managing iles, data, or network trafic. (Guan, 2006h) 5: Service
The computer on a network that is dedicated to a particular 1: A facility provided to the public in general to ensure
purpose, and stores all information and performs the critical their wealth and care. (Crdoba, 2006b) 2: A technological
functions for that purpose. For example, a Web server would component of an Internet system, Web site, or other
store all iles related to a Web site and perform all work information system that plays a speciic role relevant to
necessary for hosting the Web site. (Vaast, 2005) content. It may include publication of posts, search, poll

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se r vic e Ac c e ss Point Se r vic e -Leve l Agre e m e nt (SLA) 611

conducts, forum management, and so forth. Traditionally, Service Model


service uses one type of information and has typical Consists of a set of service commitments. In response to
functions. (Arkhypska et al., 2005) 3: High-quality online a service request, the network commits to deliver some
S
service is supported by skilled and empathic learning service. (Yang et al. 2005a)
facilitators/professors and technical support persons who
are experienced, credible, qualiied, accessible, responsive, Service Orchestration
understanding, and who encourage learners to be relective Describes the interactions that two or more services have
and aware of their own thinking and learning processes. with each other to achieve a common goal, and the relation
(MacDonald et al., 2005) 4: Software modules that are between these interactions. (Rolland & Kaabi, 2006)
accessed by name via an interface typically in a request-
reply mode. (Protogeros, 2006) Service Provider
1: Responsible for the execution of the IT services to the
Service Access Point service recipient in IT outsourcing relationships. (Beulen,
A means of identifying a user of the services of a protocol 2005) 2: This organization hosts the Web service that any
entity. A protocol entity provides one or more SAPs for application can consume. (Sethi & Sethi, 2006a)
use of higher-level entities. (Ngoh & Shankar, 2005)
Service Provisioning, Billing, and Support
Service Composition Various individual elements of customer service which
1: The ability of one business to provide value-added may be outsourced by wireless service providers. (Rlke
services through the composition of basic Web services, et al., 2005)
possibly offered by different companies. (Rolland & Kaabi,
2006) 2: The combination of simple services to achieve a Service Quality
value-added result and fully service the needs of a service 1: A global judgment or attitude relating to an assessment
consumer (citizen or enterprise) in a particular point in of the level of superiority or excellence of service provided
time. (Vassilakis & Lepouras, 2006) by the IS department and support personnel. (Wilkin, 2005)
2: A measure of end-user opinions on the overall support
Service Consumer provided to them by top management, the IS department,
Software that embeds a service interface proxy (the client and others. (Shayo & Guthrie, 2005)
representation of the interface). (Protogeros, 2006)
Service Recipient
Service Learning Hands over the responsibility for the execution of the IT
1: Educational projects structured to take students out services to one or more service providers, but remains the
of the traditional lecture-based classroom and involve responsibility for managing the IT outsourcing partnership.
them in real-world problem-solving opportunities of (Beulen, 2005)
importance to their communities. Students apply theories
learned in their classroom studies in a practical manner Service-Level Agreement (SLA)
that generates a completed work product for one or more 1: Contract between a network service provider and a
clients, while helping to cement in students minds the customer that speciies, usually in measurable terms,
usefulness of the theoretical concepts under study. (Baim, what services the network service provider will furnish.
2005) 2: A form of experiential education in which students (Morabito & Provera, 2005) 2: Service contract between
engage in activities that address human and community a service provider and its customer that deines provider
needs, together with structured opportunities intentionally responsibilities in terms of network levels (throughput,
designed to promote student learning and development. loss rate, delays, and jitter) and times of availability,
(Ruppel & Ruppel, 2005) method of measurement, consequences if service levels
are not met or the deined trafic levels are exceeded by
Service Management the customer, and all costs involved. (Gutirrez & Ting,
The strategic discipline for identifying, establishing, and 2005) 3: A contract deining the services to be provided
maintaining IT services to support the organizations by a vendor and service levels; procedures for measuring
business goal at an appropriate cost. (Lin et al., 2005) performance; payments and penalties and procedures for

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
612 Se r vic e -Orie nt e d Archit e c t ure (SOA) Se ssion La ye r

renegotiation. (Beaumont, 2005) 4: A formal agreement management. (Nichols & Chen, 2006) 8: A service is an
(between a service provider and its customers) describing information technology function that is well deined, self-
S the level of service quality (e.g., availability, performance, contained, and does not depend on the context or state
timeliness) that will be provided. (Nichols & Chen, of other services. A service-oriented architecture is an
2006) 5: A contract between a supplier and a customer approach to building information technology systems as a
that identiies: (1) services supported at each of three collection of services which communicate with each other.
layersapplication, host (system), and network; (2) The communication may involve either simple data passing
service parameters for each service; (3) levels of service between services, or it could involve infrastructure services
quality; and (4) liabilities on the part of the supplier and which coordinate service interaction. SOA is seen as a
the customer when service quality levels are not met. (D. core component of ubiquitous computing infrastructures.
Kim, 2005) 6: An agreement between an Internet service (Roussos & Zoumboulakis, 2005) 9: A design pattern for
provide and a customer regarding the type and quality of the construction of information systems. Its value lies in
the provided services. (Shuaib, 2005) the fact that it can abstract enterprise architectures using
the concept of the so-called Service Busthat is, a shared
Service-Oriented Architecture (SOA) communications medium on which services may connect
1: A component model that integrates the different to and use in a plug-and-play manner. This is the equivalent
functional units of an application (services) through well- of a bus in a computer architecture, which provides the
deined interfaces and contracts between those services. foundation for core and peripheral components to connect
The interface is independent of the hardware, operating and communicate transparently with each other. Different
system, and programming language. (Chan & Kellen, internal and external systems may connect to the bus
2006) 2: Allows the designing of software systems that transparently. (Tsekouras & Roussos, 2006)
provide services to other applications through published
and discoverable interfaces, and in which the services Session
can be invoked over a network. (Jain & Ramesh, 2006) 1: A delimited sequence of page views attributed to a single
3: An architectural style, according to which application user during a single visit to a site. (Mobasher, 2005b) 2: A
functionality is not provided by one large monolithic single visit of a user to a Web server. A session consists of
application, but is provided by services that can be all log records of the visit. (Fu, 2005) 3: Flow of IP data
combined to get the required functionality. (Verbraeck packets between the end user and the network. (Louvros
et al., 2006) 4: An abstract pattern that applies to a et al., 2006)
wide variety of Web services situations. SOA deines an
architecture consisting of three roles (service provider, Session-Initiation Protocol (SIP)
service registry, and service requestor) that can be A signaling protocol for Internet conferencing, telephony,
fulilled or implemented by a variety of techniques. SOA presence, events notiication, and instant messaging. (Yang
also deines the contracts between these roles in terms of et al., 2005a)
three operations: publish, ind, and bind. (Zhang, 2006)
5: A software architecture that starts with an interface Session Key
deinition and builds the entire application topology Crypto key intended to encrypt data for a limited period of
as a topology of interfaces, interface implementations, time, typically only for a single communications session
and interface calls. (Protogeros, 2006) 6: Essentially a between a pair of entities. Once the session is over, the
collection of services. These services communicate with key will be discarded and a new one established when
each other. The communication can involve either simple a new session takes place. For performance reasons, a
data passing or it could involve two or more services random session key is generated for use with a symmetric
coordinating some activity. Some means of connecting algorithm to encode the bulk of the data, and only the
services to each other is needed. (Wan et al., 2006) 7: session key itself is communicated using public key
Represents a computational paradigm wherein services encryption. (Chim, 2006)
(commonly Web services) become the basic building blocks
for service compositions that address speciic business Session Layer
process needs. The service-oriented paradigm consists Layer 5 of the OSI model. Manages a logical connection
of three layers of technology, addressing requirements (session) between two communicating processes or
from low-level technical speciication to high-level service applications. (Ngoh & Shankar, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se ssion Obje c t Sha pe Fe at ure 613

Session Object Set Intersection Join


Information items that capture characteristics and activities A set intersection join between relations R(a, {b}) and
of a user during a Web session. (Quah, Leow, & Yong, S(c, {d}) pairs tuples in relation such that {b}{d} .
S
2006) (Ramasamy & Deshpande, 2005)

Session-Description Protocol (SDP) Set-Based Analysis


Internet standard used for general real-time multimedia A recent method that uses groups of sets. It facilitates
session-description purposes and is purely a format for the examination and comparison of data. (Raisinghani
session description. (Yang et al., 2005a) & Nugent, 2005)

Sessionization Set-Top Box (STB)


1: Identifying the sessions (server sessions) from the Web 1: A decoder for demodulating the digital signals to be
logs, called sessionization; not a trivial task. It has two displayed on a TV receiver screen. (Hulicki, 2005) 2:
subtasks: user identiication and session identiication. A Device used in order to convert digital information received
common way is to use the IP address to identify the user, via interactive television. (Prata, 2005) 3: The physical
that is, all entries with the same IP address belong to the box that is connected to the TV set, and the modem/cable
same user. (Yao & Xiao, 2005) 2: The preprocessing task return path. It decodes the incoming digital signal, veriies
of partitioning the clickstream Web log data into sessions access rights and security levels, displays cinema-quality
(i.e., delimited sequence of page views attributed to a single pictures on the TV set, outputs digital surround sound,
user during a single visit to a site). (Mobasher, 2005c) and processes and renders the interactive TV services.
(Pagani, 2005a)
Set
From a type point of view, a set is a collection construct Settlement
that is homogeneous (i.e., it contains objects of the same The inalizing of the sale of securities as the title is
type) and unbounded (i.e., it has no maximum or ixed transferred from the seller to the buyer (also called closing).
size). Sets can only be handled as relations in the relational A settlement marks the completion of all aspects of the
model, but the set constructor in the object-oriented data trading instance. The average price at which a contract
model means that a much higher degree of lexibility is trades, calculated at both the open and close of each trading
needed in organizing information. (Badia, 2005d) day, is called the settlement price. (Saha, 2006b)

SET: See Secure Electronic Transaction. Setup Message: See Control Packet.

Set Comparison Query SG: See Semantic Gap.


A database query in which the desired records must be
found based on a comparison of sets of values using set SGC: See Second-Generation Company.
comparison operations such as inclusion, containment,
and equality. (Dadashzadeh, 2005) SGM: See Student-Generated Multimedia.

Set Containment Join SGML: See Standard Generalized Markup Language.


A set containment join between relations R(a, {b}) and
S(c, {d}) pairs tuples in relation such that {b} is a subset Shadowing
of {d}. (Ramasamy & Deshpande, 2005) The phenomenon that cuts off radio signals because
obstacles are in the line of sight between signal source
Set Equality Join and receiver. (Kao & Rerrer, 2006)
A set equality join between relations R(a, {b}) and S(c,
{d}) pairs tuples in relation such that {b} is equal to {d}. Shape Feature
(Ramasamy & Deshpande, 2005) Characterizing the contour of an object that identiies the
object in a meaningful form. (Chan & Chang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
614 Sha pe -Ba se d Sim ila rit y Se a rch Sha re d Re pe r t oire

Shape-Based Similarity Search application programming interface, a content-to-LMS data


The search operation in 3D structures that matches only model, a content launch speciication, and a speciication
S the surfaces of the structures without referring to the for metadata information for all components of a system.
points inside the surfaces. (X. Wang, 2005) (Ishaya, 2005)

Shape-From-X Shared Accountability


The process of inferring surface depth information from All team members are responsible for achieving team
image features such as stereo, motion, shading, and outcomes, not just the team leader or manager. (Schoenfeld
perspective. (Caelli, 2005) & Berge, 2005)

Shaping Shared Domain Knowledge


Users or applications may shape trafic to comply with Refers to IT and HR executives understanding of the
prespeciied parameters such as maximum data rate or business and of the knowledge in HR of the IT strategies
maximum burst length. Leaky bucket and token bucket and vice versa. (Dery & Samson, 2005)
algorithms are often used for trafic shaping. (DaSilva,
2005) Shared Everything/Nothing/Disks System
The main memory and disks are shared by the (multiple)
Share of Wallet processors in the irst case, nothing is shared in the
The inancial services industry deines share of wallet second case (i.e., stand-alone computers connected
as the percentage of a customers investable assets that via an interconnection network), and disks are shared
are held by the provider. IPFS enables an organization to by processor memory combinations in the third case.
maximize its share of customer wallet by expanding the (Thomasian, 2005a)
breadth of product and service offerings available. (Gordon
& Mulligan, 2005) Shared Goal
One of the goals that articulate what the teams stand for
Shareable Content Object (SCO) and their shared vision. (Panteli, 2005)
A standard form of a learning object used in a learning
management system. (Stavredes, 2005b) Shared Knowledge
The collective knowledge of a team that emerges as a
Shareable Content Object Reference Model function of team dynamics and problem solving. (Schaffer
(SCORM) et al., 2006)
1: A standard for categorizing and assembling learning
objects to create e-learning courses. By specifying key Shared Learning
information in a standardized way, SCORM makes The co-creation of mutual understanding by members
learning objects sharable and reusable in different courses of organizational sub-units of each others goals and
that are interoperable and compatible with different objectives. (Peterson, 2005)
learning content management systems. (Ng, 2006) 2:
Incorporates many of the standards for Web-based learning Shared Practice
systems into a single model for sharing content across The importance of sharing practice between the members
different learning management systems. SCORM consists of a community or a network; low shared practice means
of a content aggregation model, a run-time environment that the members do not (or rarely) work together. (Meller-
specification, and most recently a sequencing and Prothmann, 2006a)
navigation speciication. (Stavredes, 2005b) 3: An XML-
based framework used to deine and access information Shared Repertoire
about learning objects so they can be easily shared among Refers to the fact that there is a pool of resources that
different learning management systems. The SCORM members share, contribute to, and renew. These resources
speciications, which are distributed through the Advanced can be physical (e-mail, word processors, common
Distributed Learning (ADL) Initiative Network, deine an textbook, etc.) or intangible (common discourse, common
XML-based means of representing course structures, an means, or methodology for accomplishing tasks). (Louis,
2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sha re d Whit e boa rd Shor t M e ssa ge Se r vic e (SM S) 615

Shared Whiteboard Shopping Bot


A whiteboard is the name for any plastic glossy surface, 1: Also called shopping agent; a program that searches
most commonly colored white, where markings can be the Web and inds items for sale that meet a buyers
S
made. A shared whiteboard is an electronic version of the speciications. Shopping bots take a query from an online
real one, open to multiple users. (Kao & Rerrer, 2006) customer, search online stores, and then report back on the
availability and pricing range in a consolidated and compact
Shared Workspace format that allows comparison shopping at a glance. Not
Part of the computer-supported collaborative learning only do these shopping bots bring comparative product
system, usually represented as a designated window in the and price information from individual merchants Web
systems graphical user interface, where the members of sites, but they also provide the online merchants ratings.
the learning group build the joint solution to the problem (M. Wang, 2006) 2: Computer program that searches the
they solve collaboratively. (Devedi, 2006) Internet for products on behalf of consumers. (Waterson,
2006) 3: An intelligent agent that enables online buyers
Shared-Window System to determine and compare prices and other attributes of
System that allows a single-user application to be shared products from different online sellers. (Dasgupta et al.,
among multiple users without modifying the original 2006)
application. Such a system shows identical views of the
application to the users, and combines the input from the Shortcut
users or allows only one user to input at a time. (Roibs, Direct access mechanism for accessing a particular WAP
2006b) page. (Quah & Seet, 2006)

Shareware Short Message Service (SMS)


Software available to users only on payment of a nominal 1: A form of mobile communication, where a mobile
fee. (Fleming, 2005b) phone user is able to send and receive text messages,
typically limited to 160 characters. A short message is
Sharing of Knowledge typically sent from one mobile phone to another. (Hkkil
Members of a virtual organization collaborate to share & Beekhuyzen, 2006) 2: Has grown very rapidly and
their knowledge gained from individual activities is very popular in Europe. SMS messages are two-way
performed. Since collaboration is facilitated through the alphanumeric paging messages up to 160 characters that
communications channels that are afforded through the can be sent to and from mobile phones. (Lei et al., 2005a)
virtual organization, it is common to ind knowledge 3: The transmission of short text messages to and from
bases or other database systems that contain information mobile devices, including cellular phones and PDAs.
and documents pertaining to past experience. (J. Lee, (Chen & Yang, 2006) 4: Text-messaging service over
2005) GSM networks. (Gilbert, 2005b) 5: Facility that allows
short text messages to be sent to GSM (global systems
Sharpening for mobile communications) mobile phones. (Latchem
The procedure for improving both the passband and & Maru, 2005) 6: Text messaging function in a mobile
the stopband of a symmetrical FIR ilter by repetition phone network. (Gilbert, 2005a) 7: E-mail for cell phones.
of the original ilter according to a chosen polynomial. Now largely compatible with computer e-mail. (Houser
(Jovanovic-Dolecek, 2005c) & Thornton, 2005) 8: A text-message service offered by
the GSM digital cellular-telephone system. Using SMS, a
ShockWave Flash (SWF) short alphanumeric message can be sent to a mobile phone
Program used to create animation, movies, and interactive to be displayed there, much like in an alphanumeric pager
graphical programs such as quizzes and games. Playable on system. The message is buffered by the GSM network until
some cell phones, many PDAs, and all desktop computers. the phone becomes active. Messages must be no longer
(Houser & Thornton, 2005) than 160 alphanumeric characters and contain no images
or graphics. (Roibs, 2006b) 9: A wireless service for
SHOE: See Simple HTML Ontology Extension. bidirectional transfer of alphanumeric messages among
mobile terminals in digital cellular networks. (Tan &

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
616 Shor t Te r m Signat ure , Ele c t ronic

Teo, 2005) 10: Similar to paging, SMS is a service for Shrinkwrap Agreement
sending short text messages to mobile phones. (Patrick Derives its name from software contained in a box wrapped
S et al., 2006) 11: Allows the sending of short messages to in plastic (shrinkwrapped). The agreement pertaining
and from mobile phones, and by Internet. (D. Stern, 2005) to the software is either printed on the box and readable
12: A text message service that enables users to send short through the plastic, or there is a notice that the agreement is
messages (160 characters) to other users and has the ability contained within the box. In either event, opening the box
to send a message to multiple recipients. This is known and installing and using the enclosed software is considered
as texting. It is a popular service among young people. acceptance of the terms of the agreement. The shrinkwrap
There were 400 billion SMS messages sent worldwide agreement has evolved into the Clickwrap Agreement, as
in 2002 (Garrett, 2006b) 13: Mobile phone text message well as the Browsewrap Agreement. (Sprague, 2005)
protocol. (Whateley et al., 2005) 14: A service giving the
capability to a mobile-phone user to send a text message Signal
to another user. (Ververidis & Polyzos, 2006) 1: Detectable transmitted energy that can be used to carry
information. A time-dependent variation of a characteristic
Short Term of a physical phenomenon, used to convey information.
Timeframe of a year to accomplish recommendations. Since the works of the French mathematician Jean Baptiste
(Raisinghani & Rahman, 2005) Fourier (1768-1830), we know that each signal can be
represented equally well as a time-varying function or as
Short-Term Memory a sum of sinusoids of different frequencies. Therefore, to
1: The place where information is processed before the each signal can be associated a frequency bandthat is,
information is transferred to long-term memory. The the portion of the spectrum comprising all the frequencies
duration of short-term memory is very short, so information of the sinusoidal components of the signal. (Ragazzi, 2005)
must be processed eficiently to maximize transfer to 2: Any physical quantity that varies with changes of one
long-term memory. (Ally, 2005c) 2: A type of memory or more independent variables, which can be any physical
store where conscious mental processing occurs, that is, value, such as time, distance, position, temperature, and
thinking. Short-term memory has a limited capacity and pressure. (Jovanovic-Dolecek, 2005a)
can be overwhelmed by too much information. Also called
Working Memory. (Boechler, 2006b) Signal Compression
Signal coding that allows a reduction of the total number of
Shot bits required to represent a given signal without distortion
A sequence of images in which there is no change of or with negligible distortion. (Perez-Meana & Nakano-
camera. (Swierzowicz, 2005) Miyatake, 2005)

Shot Boundary Detection Signal-to-Noise Ratio (SNR)


A process with the objective of partitioning a video stream A measure of signal integrity with respect to the
into a set of meaningful and manageable segments. (Farag, background noise in a communication channel. (Hin &
2005b) Subramaniam, 2005a)

Shoulder Suring Signature


The practice of observing persons while entering secret 1: A bit string generated for a keyword by using a hash
authentication information in order to obtain illegal access function. (Dunn & Grabski, 2005) 2: A ixed length bit
to money or services. This often occurs in the context of vector that is computed by applying a function M iteratively
PIN numbers and banking transactions, where shoulder to every element e in the set and setting the bit determined
suring occurs together with the stealthy duplication of by M(e). (Ramasamy & Deshpande, 2005) 3: A hash-coded
credit or banking cards. (Richter & Roth, 2006) bit string assigned to keywords used as indexes to speed
up information retrieval. (Chen, 2005b)
Shouting
Posting a message written entirely or partially in capital Signature, Electronic
letters. (Gur u, 2006) A code someone supplies electronically that conirms his
or her identity. (Rowe, 2006a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Signature Identiier Similarity Relation 617

Signature Identiier center) to be specialized by discipline or expertise, thus


For a signature in a signature ile, a positioned bit string duplicating resources and requiring speciic skills training
which can be used to identify it from others. (Chen & for users of such systems. (Schaffer et al., 2006)
S
Shi, 2005)
SIM: See Subscriber Identity Module.
Signature Index
A database index that uses signatures to represent values of Similarity
the indexed data objects. Signatures are typically encoded 1: Correspondence of two data objects of the same
as bit strings. (Manolopoulos et al., 2005) medium. The similarity is determined by comparing
the corresponding feature vectors, for example, by a
Signature Matching metric or distance function. (Bretschneider & Kao,
Signature matching enables a syntactic comparison of a 2005) 2: Correspondence of two images. The similarity
query speciication with speciications existing in a model. is determined by comparing the extracted feature vectors,
(Felice & Riesco, 2005) for example by a metric or distance function. (Kao &
Tendresse, 2005) 3: Maximum degree of match between
Signature Policy two aligned sequences as indicated by some (arbitrarily
A set of rules for the creation and validation of an electronic chosen) scoring function, for example, percent identity.
signature, under which the signature can be determined (Tsunoda et al., 2005)
to be valid. (Mitrakas, 2005)
Similarity Matching
Signature Tree The process of comparing extracted features from the query
An index structure in which each path represents a signature with those stored in the metadata. (Farag, 2005a)
identiier for the signature pointed to by the corresponding
leaf node. (Chen & Shi, 2005) Similarity Measure
A measure that compares the similarity of any two
Signature-Based Intrusion Detection objects represented in the multi-dimensional space. The
Analysis strategy where monitored events are matched general approach is to represent the data features as multi-
against a database of attack signatures to detect intrusions. dimensional points and then to calculate the distances
(Lazarevic, 2005) between the corresponding multi-dimensional points.
(Wei & Li, 2005)
Signiicative Learning
Type of learning in which contents are related in a Similarity Model
substantial and not arbitrary fashion with what the pupil A set of schematic descriptions that specify the
already knows. (Andrade, Ares, Garca, Rodrguez, measurement standard for the degrees of being similar.
Seoane, et al., 2006) (Chen & McLeod, 2006)

Silent Commerce (S-Commerce) Similarity Query


The conduct of machine-to-machine transactions in real A query that retrieves objects which are similar to a
time without human involvement. (Galanxhi-Janaqi & query object. There are three basic similarity query types,
Nah, 2005) namely, similarity range, similarity nearest-neighbor, and
similarity join. (Kontaki et al., 2005)
Silo
1: Used to describe the situation where a section of Similarity Relation
an organization has become insular, and does not Used to describe fuzzy data, whereby the fuzziness
share information with the rest of the organization. comes from the similarity relations between two values
Communication tends to move up and down within the silo, in a universe of discourse, not from the status of an object
rather than horizontally across silo boundaries. (Toland, itself. So similarity relations are used to represent the
Purcell, et al., 2005) 2: The tendency for structures and degree similarity of two values from the same universe
processes within an organization (school system, plant, call of discourse. (Ma, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
618 Sim ila rit y Tra nsfor m at ion Sim ple Ra ndom Sa m pling

Similarity Transformation includes two main software entity types: managers and
A group of transformations that will preserve the angles agents. (Pulkkis, Grahn, & strm, 2005)
S between any two curves at their intersecting points. It is
also called equi-form transformation, because it preserves Simple Object Access Protocol (SOAP)
the form of curves. A planar similarity transformation 1: A lightweight protocol for exchange of information
has four degrees of freedom and can be computed from a in a distributed computing environment. It is an XML-
two-point correspondence. (Y.-J. Zhang, 2005b) based protocol that consists of three parts: an envelope
that deines a framework for describing what is in a
Simple Average Weighting message and how to process it, a set of encoding rules for
A simple linear average of the forecasts, implying equal expressing instances of application-deined data types,
weights for combination of forecasts. (C.K. Chan, 2005) and a convention for representing remote procedure
calls and responses. SOAP can potentially be used in
Simple Data combination with a variety of other protocols, such as
Data consisting of its identiier and a ield describing a HTTP. (Zhang, 2006) 2: A standard protocol that deines
single attribute (parameter, property, etc.) of an object. the way in which information is formatted and packaged
(Kulikowski, 2005) before it is exchanged. (Moser & Melliar-Smith, 2006) 3:
The communication protocol that satisies the required
Simple Environment characteristics used in Web services. It is based on XML,
Monitoring environments in which the threshold levels and has the GET and POST capabilities of HTTP. (Kasi
either seldom change or only change over the longer term; & Young, 2006) 4: The current industry standard for
the identiication of the variance fulills the conditions XML-based messaging in Web services. SOAP consists
of necessary and suficient evidence to determine an of three parts: an envelope that deines a framework for
instance of non-compliance; and the decisions, needed to describing the contents of a message, a set of encoding
determine if events comply, lie on the structured to highly rules for expressing instances of application-deined
structured portion of the decision-making continuum. data types, and a convention for representing remote
Decision making in this environment is ex-ante, made of procedure calls. (Chan & Kellen, 2006) 5: Describes
a single step, and the constraints are all predetermined. how an application talks to a Web service, and asks it
(Goldschmidt, 2005) to perform a task and return an answer. (Hwang, 2005)
6: A protocol that applications use to communicate in a
Simple Forgery distributed environment. SOAP can be used to exchange
Forgery in which the semantics of the signature are the data between applications created using any programming
same as that of the genuine signature, but the overall shape language and deployed on a computer running on different
differs to a great extent, since the forger has no idea about platforms. (Sethi & Sethi, 2006a) 7: An XML-based
how the signature is done. (Chakravarty et al., 2005b) message protocol used to encode information in Web
service requests and response messages before sending
Simple HTML Ontology Extension (SHOE) them over a network. SOAP messages are independent of
A knowledge representation language that allows Web any operating system or protocol and may be transported
pages to be annotated with semantics. (Kapetanios, using Internet protocols (SMTP, MIME, and HTTP).
2005) (Nicolle et al., 2005) 8: The messaging protocol that
facilitates Web services to invoke a software method in
Simple Mail-Transfer Protocol (SMTP) remote systems. (Nichols & Chen, 2006)
A protocol for sending e-mail messages between servers.
Most e-mail systems that send mail over the Internet use Simple Random Sampling
SMTP to send messages from one server to another. In Selecting at random elements of the population to be
addition, SMTP is generally used to send messages from studied. The sample S is obtained by selecting at random
a mail client to a mail server. (Yang et al., 2005a) single elements of the population P. (Lutu, 2005)

Simple Network Management Protocol (SNMP)


An application layer TCP/IP protocol for management
information exchange between network devices. SNMP

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sim ple Ra ndom Sa m pling Wit h Re pla c e m e nt (SRSWR) Sim ulat ion Tool 619

Simple Random Sampling With Replacement natural computers. (de Castro, 2005) 5: The process of
(SRSWR) imitating a real phenomenon with sets of mathematical
A method of simple random sampling where an element formulae representing the key determining factors using
S
stands a chance of being selected more than once. (Lutu, a computer. With reference to learning technology, the
2005) user (student) is presented with a range of variables; the
output (usually a graphical display) represents the effect
Simpliication of Integrity Constraints on the underlying formula of altering one or more of these
Steps taken in order to reduce complexity and costs of variables. (Sieber & Andrew, 2005)
integrity checking. (Decker, 2005)
Simulation Environment
Simulacrum A computing environment for realizing and executing a
A Latin word originally meaning a material object simulation model, giving output values corresponding to
that represents or signiies a thing. In Simulacra and states of behavior in the physical, real system. (Vitolo &
Simulations, Jean Baudrillard (1983) used the term to Coulston, 2005)
designate the image that originally signiies a basic
reality, but eventually detaches itself from it and creates Simulation Game
hyperreality. (Park & Lepawsky, 2006) 1: An organized procedure involving particular building
blocks allowing participants to improve communication
Simulated System about complex problems by providing a safe and controlled
A simpliied, computer simulation-based construction environment to experiment with different interventions
(model) of some real-world phenomenon (or the problem under varying circumstances by means of models
task). (Qudrat-Ullah, 2006) representing these complex problems. (Achterbergh,
2005a) 2: Games in which important aspects of a system are
Simulation modeled so that game participants can engage in activities
1: An analysis technique capturing the behavior of a and deal with events that are comparable to those that
system as mathematical and logical algorithms into system participants would encounter. (Oravec, 2005)
a model. The model is represented and realized in
an environment where the resultant behavior of the Simulation in Education
model can be captured, analyzed, and used to further Simulation is an application used to imitate real-life events.
the understanding of the system. Simulation is not an Real-life events are very complex; the more sophisticated
optimization technique, but can be used with sensitivity the simulation application, the more representative the
analysis to probe the parameter space of the underlying simulation. The leaner can use the application to manage
system. The computational execution of a simulation model the event by manipulating factors and observing the
in a simulation environment according to an experimental results of simulation, thus realizing the impact of each
design. (Vitolo & Coulston, 2005) 2: A dynamic model factor on the simulation. It is dificult for the teacher to
of a system focusing on selected aspects of that system. show learners real-life events, and simulation application
(Pendegraft, 2005) 3: Imitation of the behavior of some provides the best opportunity for learners to understand
existing or intended system, or some aspect of that abstract scientiic concepts, such as virus reproduction or
behavior. (Yong & Choo, 2005) 4: Metaphorical model organization management. (Yang, 2005)
that stands for something else and may cover different
levels of idelity or abstraction, which can be performed Simulation Model
by physical modeling, by writing a special-purpose The representation of a system in terms of the fundamental
computer program, or by using a more general simulation components, relationships, and interactions of its behavior,
package that is probably still aimed at a particular kind of captured as mathematical and logical algorithms. (Vitolo
simulation. Computer simulation is pervasive in natural & Coulston, 2005)
computing. It has been used to design problem-solving
techniques that mimic the behavior of several biological Simulation Tool
phenomena; it has served to drive synthetic environments Technology designed to support the modeling of
and virtual worlds, and it has been used to simulate qualitative and quantitative information. The key feature

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
620 Single Cha nne l Pe r Ca rrie r (SCPC) Sit uat iona l Asse ssm e nt

includes the capability to identify potential scenarios and a matrix of eigenvectorsthe same as those obtained
and effectively communicate complex ideas through by PCA. (Thomasian, 2005b) 2: Algorithm able to compute
S graphical representations, animations, and low charts. the eigenvalues and eigenvectors of a matrix; also used
(Chua, 2006) to make principal components analysis. (Liberati et al.,
2005)
Single Channel Per Carrier (SCPC)
In SCPC systems, each communication signal is Sink
individually modulated onto its own carrier, which is A representation of a stock into which lows are leaving
used to convey that signal to the end user. It is a type the boundary of the system. (Casado, 2005)
of Frequency Division Multiplexing/Frequency Time
Division Multiplexing (FDM/FTDM) transmission where SIP: See Session-Initiation Protocol.
each carrier contains only one communications channel.
(Rahman, 2005d) Site Map
1: An electronic representation of the documents in a
Single Instance hypertext and sometimes the links connecting them. Site
A one-time full-ledged company-wide initial operation maps may appear as simple overviews or as interactive
of a system, as opposed to incremental (functionally or tools in which each entry serves as a link to the page
organizationally) or modular implementations. (Sarkis & it represents. (Shapiro, 2006) 2: An overview of all
Sundarraj, 2005) information on the site to help users ind information
faster. (Falk & Sockel, 2005)
Single Nucleotide Polymorphism (SNP)
The same sequence from two individuals can often be Site Organization
single base pair changes. Such change can be useful genetic The structure and navigational ease of a Web site. (Gao,
markers and might explain why certain individuals respond 2005a)
to certain drug while others do not. (Ge & Liu, 2005)
Site Speciication
Single-Channel Hypothesis A design document for a Web site specifying its objectives
A model of attention that assumes that some mechanisms and functionality. (T.S. Chan, 2005)
can process only one task at a time in a serial fashion.
Some mechanisms have structural limitations (e.g., eyes Situated Learning
can only point to one place). Multiple tasks are processed 1: Learning that results from activities taking place in a real-
within some timeframe by attention switching between life particular context. It is a synonym for apprenticeship
tasks. (Owen, 2006b) and emphasizes the real-life learning aspects of knowledge
generation. (von Wartburg et al., 2006) 2: Situated learning
Single-Hop is involved when learning instructions are offered in
Direct communication between two nodes or entities genuine living contexts with actual learning performance
without any intermediate station or network entity. (Erbas, and effective learning outcomes. (Kwok Lai-yin & Tan
2005) Yew-Gee, 2005) 3: The creation of an environment where
groups of students can, and do, explore and analyze, think
Single-Loop Learning: See Double-Loop Learning. and relect, propose and act in the context of everyday
situations. (Askar et al., 2005)
Single-Mode Distance Teaching University
One of several universities that were founded solely for Situation Model
teaching distant students. Most of these universities were The mental representation of text created by readers. It is
established in the early 1970s and have followed the model based on information in the text as well as prior knowledge
of the British Open University. (Guri-Rosenblit, 2005a) and experience. (Ingram & Hathorn, 2005b)

Singular Value Decomposition (SVD) Situational Assessment


1: Attains the same goal as PCA by decomposing the X Important military concept referencing a common
matrix into a U matrix, a diagonal matrix of eigenvalues, operational picture that provides current conditions with

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sit uat iona l Cont ex t Sla nt 621

supporting context, knowledge, information, and data. and memory problems involved and the poor opportunities
(Maule, 2006) for practicing, which in turn breeds the dread that either
the expensive hardware or its user may get damaged in
S
Situational Context one way or another (for instance, money can be transferred
The details that make the situation unique for the user. inadvertently to a wrong account). (Kalvet, 2005)
(Albers, 2006)
Skin Color Estimation
Size A breakthrough in face detection and segmentation was
1: Indicated by counting the members of a community the representation of skin color with a Gaussian model in
or a network; size is always used as a relative measure to a subset of the CrCb space, irrespectively of the actual
compare different social entities and not as an absolute skin color of the subject. (Karpouzis et al., 2005)
one. (Meller-Prothmann, 2006a) 2: The size of a network
is indexed by counting its members (nodes). (Meller- Skinner Box
Prothmann, 2006b) Most of Skinners research was centered around the
Skinner box. A Skinner box is an experimental space
Skeleton, Muscle, and Skin (SMS) that contains one or more operands such as a lever that
An animation framework based on Bone-Based Animation may be pressed by a rat. The box also contained various
(BBA). (Prteux & Preda, 2005) sources of stimuli. Skinner contributed much to the
study of operant conditioning, which is a change in the
Sketch probability of a response due to an event that followed
A basic construct of categorical logic. Roughly, it is a the initial response. Changes in behavior are the result of
directed graph in which some diagrams are marked with an individuals response to events (stimuli) that occur in
predicate symbols taken from a predeined signature. the environment. In his early career, Skinner started with
A sketch morphism is a mapping of the underlying experimenting with animals such as pigeons and rats. He
graphs compatible with marked diagrams. A fact of later turned his research interests from animals to humans,
fundamental importance for generic MMt is that any especially his own daughters. (I. Chen, 2005)
meta-model (relational, XML schema, a speciic sort of
ER or UML diagram) can be speciied by a sketch. Then Skip-Out
the corresponding universe of models (relational schemas, A student who has not enrolled in a course for a small
XML DTDs, ER diagrams) can be presented as the category number of semesters (usually one or two semesters) after
of instances of the corresponding sketch. It allows applying successfully completing at least one course. (Chyung,
many CT ideas and results to MMt. (Diskin, 2005) 2005)

Skew Correction Skolem Noise


The technology detects and compensates for the inclination A kind of anomalous answer obtained by resolution-
angle of a document image. (Chan et al., 2005) oriented theorem provers when it works on non-clausal
theories. The classical method of skolemization leads to
Skill new function symbols with no intended meaning. If these
Practical application of teacher knowledge. (Shaw & symbols appear in the output, the answer may not be
Slick, 2005) consistently interpreted. (Alonso-Jimnez et al., 2005)

Skilled Forgery Skunk Work


The forger has a prior knowledge about how the signature New venture unit with a role to explore beyond the perceived
is written and practices it well, before the inal attempt of boundaries of the organization. (Whateley et al., 2005)
duplicating it. (Chakravarty et al., 2005b)
SLA: See Service Level Agreement.
Skills Barrier
A factor contributing to the digital divide in Estonia. The Slant
Internet appears to be complicated, because the computer Either it is deined as the angle at which the image has
and the Internet are hard to master, in view of the language maximum horizontal projection value on rotation, or it is

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
622 Slat e Sm a ll Fir m

calculated using the total number of positive, negative, of assets or turnover. (Iacob et al., 2005) 3: A business
horizontally, or vertically slanted pixels. (Chakravarty enterprise independently owned by contributing most
S et al., 2005a) of the operating capital and managed by the owners or
managers, having fewer than 250 employees and a small-
Slate to-medium market share. (Rashid, 2005) 4: Small and
A tablet PC coniguration where the entire device lays lat medium-sized enterprises are socially and economically
on a table or can be held by a user in the same manner that important, since they represent 99% of all enterprises
a clipboard or notebook would be held. (Roldan, 2005) worldwide and contribute to entrepreneurship; innovation;
and economic, social, and cultural development. Precise
Slice deinitions that separate SMEs from large enterprises
Restricting the area of interest to a single value along a differ between countries and rely on variables such as
given dimension. (Deshpande & Ramasamy, 2005) headcount, turnover, and balance sheet size. (Demediuk,
2005) 5: A company which employs a limited number of
Slice and Dice people and which has a certain turnover, with the numbers
1: Another term for multi-dimensional analysis. When varying among countries. (Hin & Subramaniam, 2005c)
data has three (or more) dimensions, it can be thought 6: Enterprise with a speciic number of staff. A small
of as being arranged in a cube (or hypercube), with each size enterprise generally refers to irms with less than 20
side representing a dimension. When the data is analyzed, employees. (Braun, 2006)
part of the cube can be sliced off or diced to get to an
individual cell. (Raisinghani & Nugent, 2005) 2: Typical Small Business
OLAP operation by which speciic subparts (slices) of 1: Can be measured by number of employees, annual
the data cube are selected and arranged for visualization. turnover, and/or assets. It usually represents those
(Tininini, 2005c) businesses with up to 20, 50, or 100 employees (depending
upon the region being investigated). This term encompasses
Sliding Window micro-businesses. (Burgess, 2005) 2: The commonly
A time series of length n has (n-w+1) subsequences of adopted deinition of a small business is that the irm
length w. An algorithm that operates on all subsequences size should be less than 500 employees. However, there
sequentially is referred to as a sliding window algorithm. are other interpretations of how small a business should
(Denton, 2005) be to be considered a small business, including irm sizes
of less than 100 (The Netherlands), 50 (Ireland), or even
Slope Analysis 20 (Australia). Business turnover, management, and
The plotting and visualization of certain operating organizational structure, as well as other supplementary
functions in order to discern trends, often before others see criteria, are also used by some authors. (Poon, 2005) 3:
them, thereby permitting alteration of strategies in order Various categories may be employed to deine this term.
to gain competitive advantage. (Nugent, 2005) Some examples are as follows: Employees: micro-business:
0-10 employees; small business: 10-50 employees; medium
Small and Medium Enterprise (SME) business: 50-250 employees. (Hunter, 2005)
1: The deinition of small and medium enterprises varies
from country to country. If the deinition is based on Small Firm
number of employees, SMEs in the U.S. have from 1 to There is no universal deinition for this term. Most
499 employees. The dividing line between a small and deinitions are based on the number of employees, but
medium business is variously deined as being either 50 some deinitions include sales revenue. For example, 20
or 100 employees. (Archer, 2005) 2: A heterogeneous employees is the oficial deinition in New Zealand, while
group, including a wide variety of enterprises, having very in North America, a irm with 500 could be deined as
different levels of sophistication (in terms of products and a small irm. Another important aspect of any deinition
services offered, and skills of the workers), and operating of small irm is the irms independence: a small irm
in various markets and institutional environments. The is typically considered to be independent, that is, not a
quantitative deinition of SMEs varies by country and is subsidiary of another irm. (Cragg & Suraweera, 2005)
usually based on the number of employees and the value

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sm a ll For m Fa c t or Sm a r t Phone 623

Small Form Factor Smart Card


Mobile devices are designed for portability and mobility, 1: Looks like a plastic credit card and has a microprocessor
so the physical size is limited actually. This phase is called or memory chip embedded in it. The chip stores electronic
S
small form factors. (Hua et al., 2006) data and programs that are protected by security measures
enabling controlled access by appropriate users. Smart
Small Perturbation Hypothesis cards provide data portability, security, convenience,
The strength of the envisaged perturbations is small enough and transparency of inancial records and transactions.
to guarantee effectiveness for a linearized sensitivity (Cecchini, 2005) 2: Used in token-authentication systems.
analysis. (Alippi & Vanini, 2005) It can be either a hardware-based card or smart IDs the size
of about a credit card, with or without a numeric keypad.
Small-Group Instructional Diagnosis (Wang, Cheng, et al, 2006) 3: Card system that allows
A process organized to elicit student feedback about visitors to prepurchase products or product credits,
instruction. Feedback is collected by small-group and to use the card at venues and attractions (such as
consensus, then large-group prioritization. (Marcinkiewicz hotels, theme parks, tours, etc.) in lieu of direct payment.
& McLean, 2005b) (Carson, 2005)

Small-Group-Based Virtual Community Smart Community


A handful or so of persons with a dense web of relationships, The result of the ongoing development and maintenance
interacting together online in order to accomplish a wide of innovative joint ventures between a diverse range of
range of jointly conceived goals and to maintain the regional stakeholders, including community organizations,
functioning of the group. (Bagozzi & Dholakia, 2005) government, business, educators, researchers, and students,
where the exponential sum of all of the parts is ultimately
Small-World Model of greater value than the previous outcomes. The electronic
It is believed that almost any pair of people in the world community network creates value and transforms the
can be connected to one another by a short chain of way a community lives, works, and grows. (Baskin et
intermediate acquaintances, of typical length about six. al., 2005)
This phenomenon is colloquially referred to as the six
degrees of separation, or equivalently, the small world Smart House
effect. Sociologists propose a number of topological House equipped with self-monitoring assistive devices
network models, the small-world models, for the social of many types. Smart houses are popular with old people.
network to explain this phenomenon. (Shahabi & Banaei- (Abhishek & Basu, 2006)
Kashani, 2005)
Smart Label
Small-World Phenomenon RFID tag that looks like a printed label. (Loebbecke,
A fact in some networks: most pairs of vertices are 2006)
connected by a short path through the network, and most
neighbors of each vertex are connected. (Li et al., 2006) Smart Organization
A further evolution of value networks and virtual
Smallest-Parent corporations through use of more advanced business
In terms of either closest parent group-by or size of the models, taking account of human ICT symbiosis and
parent group-by. (Tan, 2005a) utilizing more intelligent applications and tools for
collaborative work and holistic development of both product
Smart Agent and service engineering. (Richards et al., 2005)
A program or collection of programs that lives for some
purpose in a dynamic environment and can make decisions Smart Phone
to perform actions to achieve its goals. Individual agents 1: An enhanced handheld device which combines the
may be conceptualized as having beliefs, desires, and functions of a mobile phone and a handheld computer.
intentions that can communicate with other agents to (Petrova, 2006) 2: Mobile phone with the capabilities of
satisfy their goals. (Durrett et al., 2005) a PDA plus wireless access to cellular networks. (Gilbert,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
624 Sm a r t Se nsor SOAP

2005b) 3: A term used for the combination of a mobile SMWT: See Self-Managed Work Team.
cellular telephone and PDA in one small portable device.
S These devices usually use a small thumb keyboard or an SN: See Segmented Network.
electronic pen (or stylus) and a touch-sensitive screen for
data input. (Garrett, 2006b) SNCE: See Suspected Non-Compliance Event.

Smart Sensor SNHC: See Synthetic and Natural Hybrid Coding.


Transducer that converts some physical parameters into
an electrical signal and is equipped with some level of Sniplet
computing power for signal processing. (Vargas, 2005) A piece of knowledge or information that could be
represented by one overhead transparency. (Verhaart &
Smart Structure Kinshuk 2006)
A structure with a structurally integrated iber optic sensing
system. (Kanapady & Lazarevic, 2005) SNMP: See Simple Network Management Protocol.

SmartSTOR Snooper
A scheme where the disk array controller for multiple An entity within the organization (vs. a hacker who is
disks assists the host in processing database applications. from the outside) that gains or attempts to gain access to a
(Thomasian, 2005a) system or system resource without having the authorization
to do so. (Wilson et al., 2006b)
SMC
Computes a function f (x1, x2 , x3 xn) that holds inputs Snowlake Model
from several parties, and at the end, all parties know about A variant of the star schema in which dimension tables do
the result of the function f (x1, x2 , x3 xn) and nothing not contain denormalized data. (Kontio, 2005)
else. (Ashrai et al., 2005)
Snowlake Schema
SME: See Small and Medium-Sized Enterprise. 1: A database schema with a fact table and a set of dimension
tables. There are multiple tables per dimension, with
SM IL: See Synchronized Media Integ ration each table storing one level in the dimension hierarchy.
Language. (Deshpande & Ramasamy, 2005) 2: A dimensional
model having some or all of the dimension tables
Smooth-Shading Technique normalized. (Delve, 2005) 3: A schema for organizing
Interpolative technique that restores the smoothness of multi-dimensional data, where we have many levels in
solids whose surfaces are represented by planar polygons. each dimension and there can be alternative paths for
(Cottingham, 2005) aggregation. This schema is the most usual for designing
data marts. (Hernandez-Orallo, 2005a) 4: Star schema in
Smoothing which the dimension tables have been normalized, possibly
Adjustment of mortality rates using a combination of the leading to the creation of several tables per dimension.
knowledge about the rate in each area and the knowledge (Badia, 2005c)
about the rates in surrounding areas. The smoothing
removes the noise in disease maps and allows the SNP: See Single Nucleotide Polymorphism.
assessment of speciic hypotheses concerning incidence
or mortality. (Vidal-Rodeiro et al., 2005) SNR: See Signal-to-Noise Ratio.

SMR: See Standardized Mortality Ratio. SO Provider: See Specialist E-Fulillment Provider.

SMS: See Short Message Service; Skeleton, Muscle, SOA: See Service-Oriented Architecture.
Skin.
SOAP: See Simple Object Access Protocol.
SMTP: See Simple Mail-Transfer Protocol.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soc ia l Ac c e ss Soc ia l Com plex Re sourc e Com binat ion (SRC) 625

Social Access is managed equally by all members; property of the


1: Refers to a mix of professional knowledge, economic community. (Raja et al., 2006) 5: The collective value of all
resources, and technical skills to use technologies in social networks and the inclinations that arise from these
S
ways that enhance professional practices and social life. networks to do things for each other. (Li et al., 2006) 6:
(Kvasny & Payton, 2005) 2: The possession of the know- Social closeness, mutual knowledge, and cohesion that are
how required to utilize information and communication products of a wide assortment of different kinds of informal,
technologies optimally. Such know-how is mainly volunteer, and partially structured social interactions.
engendered by and related to education and training. It (Oravec, 2005) 7: The set of resources, tangible or virtual,
is not enough to have physical access to ICTs when large that accrue to a corporate player through the players social
sections of potential users do not have the knowledge and relationships, facilitating the attainment of goals. (Smith,
awareness or cognitive wherewithal that would enable them 2006b) 8: The social networks and the assets that can
to exploit the opportunities offered by these technologies. be mobilized through these networks that enable social
(Mwesige, 2005) action generally and knowledge sharing more speciically.
(Newell, 2006) 9: The sum of actual and potential resources
Social Agency embedded within, available through, and derived from the
The idea that social cues can prime the conversation network of relationships possessed by an individual or
schema. The beneit is that the learners will expend social unit. The value of a cohesive group in organizational
greater cognitive effort when they feel they are part of a learning is emphasized. It is composed of three dimensions
conversation than when they are listening to a more formal which include the structural dimension, the relational
narration. (Mitchell, 2005c) dimension, and the cognitive dimension. (Paquette, 2006a)
10: A common deinition of social community has usually
Social Agent of Local and Regional included three ingredients: (1) interpersonal networks that
Development provide sociability, social support, and social capital to
The corporate professional structure working in the their members; (2) residence in a common locality, such
ield of local and regional development. The meaning of as a village or neighborhood; and (3) solidarity sentiments
the notion of agent indicates the fact of independent and activities. (Kwok Lai-yin & Tan Yew-Gee, 2005) 11:
determination by this structure of the strategy of its Goodwill available to individuals which results from the
activity. (Molodtsov, 2005) structure (coniguration) and the relational content of the
actors social relations in a virtual community of practice.
Social Alignment The goodwill can be valuable in different respects, that is,
Describes a state where IT and HR business executives can bring about information advantages, solidarity, and
understand and are committed to each others plans. (Dery inluence. (von Wartburg et al., 2006)
& Samson, 2005)
Social Capital Theory
Social Aspect of Communication Emphasizes the resources (social capital) embedded
A social process using language as a means of transferring within networks of human relationships. The theory posits
information from one person to another, generating that social capital provides the conditions necessary for
knowledge among individuals or groups, and creating knowledge transfer to occur. (Kankanhalli et al., 2006)
relationships among persons. (Burke et al., 2005)
Social Complexity
Social Capital Is when the source of advantage is known, but the method
1: A resource that facilitates social affairs and actions of replicating the advantage is unclear, for example,
of individuals. (Ridings, 2006b) 2: An organizations corporate culture, the interpersonal relations among
social capital can be deined as the collective value of the managers in a company, or trust between management
network of relationships and the beneits that arise from and labor. (Potgieter et al., 2005)
these networks. (Zboralski & Gemnden, 2006) 3: Human
relationships that make organizations work effectively. Social Complex Resource Combination (SRC)
(Ali, Warne, et al. 2006) 4: Resides in the structure of Depends upon large numbers of people or teams engaged
relationships between members of a community, and in coordinated action such that few individuals, if any

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
626 Soc ia l Conne c t ion T he or y Soc ia l Excha nge T he or y

(both outside the company, as well as inside the company), Social Contract
have suficient breadth of knowledge to grasp the overall Tacit and assumed set of conventions about human social
S phenomenon. (Potgieter et al., 2005) involvement that frames all communal associations.
(Skovira, 2005)
Social Connection Theory
Social process theory positing that individuals in online Social Data Mining
problem-solving groups use revealing, tying, and etiquette Analysis and redistribution of information from records
strategies to overcome emotional distance. (Molinari, of social activity such as newsgroup postings, hyperlinks,
2005) or system usage history. (Schafer, 2005)

Social Construct Theory Social Digital Divide


Considers reality about a particular phenomenon as the The social stratiication created by the digital divide within
individual construction of individual realities and that a country. (Trujillo, 2005)
these realities are inluenced by individuals society,
culture, language, and social environment. (Al-Saggaf Social Dilemma
& Weckert, 2005) A situation where individual rationality (in the sense of
maximizing personal gain) leads to social irrationality
Social Construction Perspective/Social (in the sense of generating a suboptimal outcome for the
Construction/Social Constructionism social group). (Ekbia & Hara, 2006)
1: Knowledge is a set of shared beliefs, constructed
through social interactions and embedded within the social Social Dimension of an IT/End-User
contexts in which knowledge is created. (Fong, 2006b) 2: Relationship
In this model of learning, knowledge, cognition, action, Refers to all the elements in the abstract dimensions. Each of
and communication are seen as inseparable. (Frank et these elements plays a speciic social role in an IT/end-user
al., 2005) 3: Theory that develops the idea that learning relationship environment, which impacts on the soundness
does not only occur as a result of the instructor-student of such a relationship as well as the success of alignment
interaction, but rather through the collaboration of all between IT and the business. (Leonard, 2005)
individuals involved in the learning process. (Day, 2005) 4:
External and sharable concepts, associations, artifacts, and Social Engineering
practices that people actively develop and maintain in their 1: The technique of exploiting the weakness of users rather
social settings. An organization is an example of a social than software by convincing users to disclose secrets or
construction that interconnects its members in a speciic passwords by pretending to be authorized staff, the network
social setting, in which many other social constructions administrator, or the like. (Richter & Roth, 2006) 2: Using
are continuously being developed and maintained. (Ramos deception to steal information such as passwords from
& Carvalho, 2005) 5: Shares most of Piagets views, but people. (Rowe, 2006d)
puts more emphasis on the impact of the social context
of learning. Lev Vygotsky, the proponent of social Social Environment
constructivist theory, stresses that social environment plays The environment created by human beings with their
a crucial role in childrens development and acquisition knowledge, attitude, and behavior in a close neighborhood.
of knowledge. (Bodomo, 2005a) (Ali, Ashley, et al., 2005)

Social Contagion Social Exchange Theory


The process through which new community members are 1: According to social exchange theory, people engage
socialized and as such transform their personal identities, in social exchange when the beneits outweigh the costs
adapting their attitudes, behaviors, and values to those of of exchange. The costs and beneits can be tangible or
the community. (Teigland & Wasko, 2006) intangible, physical or psychological. (Kankanhalli et al.,
2006) 2: Used to explain the close partnership style of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Social Exclusion Social Loaing 627

outsourcing relationship between the irm and vendor by Social Interaction Possibility
taking into account prior relationships, trust, and culture, One of the possible ways to interact with the community,
and their effect on ongoing outsourcing relationships. that is, the vendor and/or other consumers. (Shan et al.,
S
(Gupta & Iyer, 2005) 3: The theory that people contribute 2006a)
to the welfare of others, either individuals, groups, or
organizations, to a degree that is commensurate with their Social Knowledge
perceptions of the contributions that are made by others Knowledge that is available to members of a social entity or
to them (over the long run). (King, 2006a) organization. Thus, it is in contradistinction to individual
knowledge, which is known only to a particular person.
Social Exclusion Thus, individual and social knowledge are opposite poles
1: A shorthand term for the complex process of exclusion of a single dimension. (Ein-Dor, 2006)
from the cultural, economic, political, and social life of the
community in which one lives. (Kenyon, 2005) 2: Term Social Learning
used to refer to all positions of social disadvantage. The 1: Learning arising from social participation, involving
term has come to replace talk of class in much government four components: learning by doing, by participation, by
discussion of social disadvantage. The weak conception of becoming, and by experience. (Wenn, 2006a) 2: Learning
social exclusion suggests that there is a need to include the based on attention, perception, and memory capacities is
excluded. Stronger conceptions of social exclusion seek signiicantly inluenced by the socialization and education
to identify the forms of oppressive inclusion by which context, and particularly by language so as to create
some are excluded from advantageous conditions. human knowledge. (Xodo, 2005) 3: Learning occurring
(David, 2005) in or by a cultural cluster, and including procedures for
transmitting knowledge and practices across different work
Social Identity situations/settings and time. (Ali et al., 2006) 4: Learning
A conception of the self consisting of: (1) self-awareness of through social interaction with other people. (Klobas &
membership in a speciic group, (2) emotional attachment Renzi, 2005b) 5: Process of constructing knowledge by
or involvement with the group, and (3) a positive or negative individuals working in groups. A shared understanding
value connotation attached to this group membership emerges from individual understanding coupled with
(i.e., group-based or collective self-esteem). These are communication or collaborative exploration of an area
sometimes referred to, respectively, as the cognitive, of interest. This style of learning generates intellectual
affective, and evaluative components of social identity. capital (knowledge that is jointly held) and social capital
(Bagozzi & Dholakia, 2005) (trust, mutual respect). (Fleming, 2005c)

Social Inclusion Social Learning Enabler


1: Providing connectivity, access, and education to those One of the set of organizational processes and strategies
who are without knowledge and use of technology. (Reilly, that, if present and effectively applied in an enterprise,
2005) 2: Refers to the extent that individuals, families, and can facilitate social learning. (Ali et al., 2006)
communities are able to fully participate in society and
control their own destinies, taking into account a variety Social Learning Theory
of factors related to economic resources, employment, The combination of learning and problem-solving activities
health, education, housing, recreation, culture, and civic that take place within participatory systems such as
engagement. (Kvasny & Payton, 2005) groups, social networks, movements, and collectives
operating within real-life contexts, and thereby raising
Social Interaction issues of social responsibility. It combines learning,
A chain of interrelated messages that include a social problem solving, sociability, and responsibility. (Correia
and fun element, and contribute to increasing familiarity & Sarmento, 2005)
among participants. (Panteli, 2005)
Social Loaing
1: The tendency for some members of a group to do less work
than others in a team task in which they are not individually

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
628 Soc ia l M a rke t ing Soc ia l Policy

accountable for the product. (Ingram & Hathorn, 2005b) Social Network Analysis
2: The tendency of members of groups to put in less effort 1: Data acquisition methods and computerized (typically)
S in group activities when group performance is measured techniques that enable visualization of social networks and
than when individual performance is measured. (Lam et articulation of their properties. (Smith, 2006b) 2: Depicts
al., 2006) the communication and relationships between people and/
or groups through diagrams based on social relationships
Social Marketing between a set of actors. (Lambropoulos, 2006a) 3: The
The design, implementation, and control of communication study of uncovering the patterning of peoples interaction.
programs calculated to inluence the acceptability of social (Li et al., 2006) 4: The social network perspective views
ideas and innovations. (Weber & Lim, 2005) organizations as consisting of social units with relatively
stable patterns of relationships over time. There are two
Social Message fundamental dimensions of social networks: transactional
Created to both entertain and educate so that listeners will content and coniguration. (Nelson & Hsu, 2006) 5:
increase their knowledge on educational issues, develop The systematic analysis of empirical data describing
favorable attitudes to the messages, and change their social networks, guided by formal, mathematical, and
behavior. (Craddock & Duncan, 2005) statistical theory. (Dekker, & Hendriks, 2006) 6: Tools
and techniques for identifying the patterns of connections
Social Network among individuals in exchange relations. (Smatt & Wasko,
1: A set of nodes (persons, organizations, etc.) linked 2006)
by a set of social relationships of a speciied type (e.g.,
friendship). (Smith, 2006b) 2: A set of nodes (that represent Social Network Analysis Tool
actors, groups, etc.) and the ties that connect these nodes. One of the software tools that are capable of uncovering
(Dekker, & Hendriks, 2006) 3: Interconnected people the pattern of interaction among a group of users. (Chua,
who directly or indirectly interact with or inluence one 2006)
another. (Smatt & Wasko, 2006) 4: A group of peers,
subordinates, and interconnected people who provide Social Networking
general information about what is going on within the 1: Describes the process of connecting individuals via a
organization, ask speciic advice on how to accomplish personal network such as friends and acquaintances. In QP
assignments, and obtain feedback about the consequences Corporation, social networking has been promoted for the
of different strategies. (Rahman, 2006) 5: A set of social foundation of knowledge exchange on its intranet. Social
entities (or persons) and social relationships which connect networking nurtures a trusting atmosphere for knowledge
them. (Chen, Duan, et al., 2006) 6: A set of people or groups communities on an intranet. (Yamazaki, 2006) 2: The
of people with some pattern of contacts or interactions process of connecting individuals via friends, relatives,
between them. These patterns can be friendships between and acquaintances. These networks can then branch out
individuals, business relationships between companies, and allow friends to connect with people inside their
and intermarriages between families. (Li et al., 2006) accepted social circle. (Y.-W. Lin, 2005) 3: The process
7: Group of people formed through the establishment of connecting individuals via friends, relatives and
and fruition of common interests, as opposed to skill acquaintances to develop a personal social network. See
and practice. (Huq, 2006) 8: The decision to act on any Online Social Networking. (Mew, 2006)
form of knowledge involves an intervention. Thus, to
implement any change through a community of practice Social Network for Reuse
is a micro-political process that operates through internal Organizational mechanism that emphasizes interpersonal
and external social networks. This may be geographical interactions as a source for knowledge reuse between
and/or spatial communities. (Grieves, 2006b) 9: The tight individuals and teams. (Oshri, 2006)
or loose connections between people (family, community,
associations, work, etc.) that are key to sustaining regional Social Policy
connectivity. (Jain & Lyons, 2005) The policies which governments use for welfare and social
protection. (Kenyon, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soc ia l Pre se nc e Soc ia lizat ion 629

Social Presence Social Semiotics


1: The extent to which a communication medium projects Explicitly takes a non-positivist approach as it focuses on
the physical presence of the communicating partners. the contexts, prerequisites, and conditions of possibility
S
(Chan, Tan, et al., 2005) 2: The ability of learners to project for a meaning creation process to occur. All meanings are
themselves socially and affectively into a community made within a community. The analysis of sign systems
of inquiry. (Molinari, 2005) 3: The degree to which a and of sense-making processes cannot be separated from
knowledge-sharing medium, such as a network, facilitates the social, historical, cultural, and political dimensions
an awareness of other people and the development of of these communities. Social semiotics also takes a non-
interpersonal relationships. (King, 2006a) 4: The degree cognitivist approach: instead of referring solely to meaning-
to which a person experiencing a virtual environment feels making as the result of minds and of brain processes, it
part of potential or actual social interaction, with at least points to the role of social practices within communities.
one other being also capable of social interaction and/or Communities are thus interpreted not as a collection of
the degree to which they see social interaction (mutually interacting individuals, but as a system of interdependent
perceived and understood) between two or more intelligent social practices. Social semiotics may be understood as a
beings. One may argue whether social presence is social discourse on meaning-making where the aim is to examine
presence only when perceived to be so by one or all of the the functions and the effects of the meanings we make in
participants, or perceived to be so by external observers, everyday life, within communities, organizations, and
or perceived to be so by all parties. (Champion, 2006a) 5: society. (Nobre, 2006a)
The extent to which a person is perceived as a real person
in computer-mediated communication. (Xu et al., 2006b) 6: Social Structure (Collective)
The feeling of immediacy or presence that one feels when Members in virtual communities of practice are
in proximity to another. This presence can also be felt in considered a system organized by a characteristic pattern
electronic-based communications based on the frequency of relationships. The pattern is characterized by a speciic
of communications along with other factors. (Day, 2005) coniguration of coordination dimensions. (von Wartburg
7: The perceived presence or salience of others in online et al., 2006)
discussion. (Swan, 2005) 8: The perception of physical and
psychological access to another. Social presence theory Social Subsystem
often focuses on the aspects of communication media that The internal climate and culture of an organization,
permit people to connect or be present with others, and the usually seen as several continua focusing on dimensions
theory sees some degree of social connectedness as crucial such as structure, randomness, stress, empowerment of
to work relationships. (Connaughton, 2005) 9: Theoretical individuals, knowledge sharing, and so forth. (Dykman,
construct created to help understand the effects of media 2005)
on communications experiences. Social presence has been
used to understand interactions between people in online Sociability
communications experiences. (Newberry, 2005) The relative tendency or disposition to be sociable or
associate with ones fellows. (Xu et al., 2006b)
Social Realism
An ontological position that entity classes exist in the Socialization
shared meanings of a social group. (Artz, 2005c) 1: The process by which students internalize the norms
and values necessary for living in a civilized community.
Social Resistance (Russell, 2005a) 2: A knowledge transfer mode that
An organized struggle against a political ideology or involves new tacit knowledge being derived from existing
process. (De, 2006) tacit knowledge. (Wickramasinghe, 2005) 3: One of four
knowledge transmission mechanisms according to Nonaka.
Social Responsibility Socialization is about tacit-to-tacit knowledge transfers
The moral obligation of business organizations to seek via observation, imitation, and practice. (Brock & Zhou,
goals that will provide common good for the communities 2006) 4: The acquisition of the knowledge, behavior, and
that are beyond those required by business itself. (Ochoa- attitude needed to participate fully as a member of a team.
Morales, 2005) (Long et al., 2005) 5: The adoption of the behavior patterns

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
630 Soc ia lizat ion Cue Soc iot e chnic a l N e t w ork

of the surrounding culture. (Adkins & Nitsch, 2005) 6: Socioemotional Digital Skill
The process by which students internalize the norms and A term describing the ability of cyberspace users to
S values necessary for living in a civilized community. function properly in this communication platform by
(Russell, 2005b) understanding the unwritten rules of knowledge sharing
in this medium. (Eshet, 2005)
Socialization Cue
One of the behaviors and actions that people may recognize Sociology of Translations
in others. Positively, they may make others seem more Another term used to refer to Actor-Network Theory.
sociable or friendly; and negatively, they may make (Tatnall, 2005b)
others seem less friendly. The potential impact for the
distance education environment is the lack of these cues. Sociology of Uses
(Martz & Shepherd, 2005) A domain of Sociology that studies how a given population
uses technical objects. Initiated by telecom operators in
Socially Constructed Process the second part of the 20th century, the ield of research
Socially organized activities undertaken by people in has been enlarged to encompass the use of any type of
organizations. Socially constructed processes may be technical object. (Blandin, 2005)
examined to achieve a greater understanding of social
phenomena by exploring the situated experiences of the Sociotechnical
persons involved in the social situations. Organizational 1: Derives from SociusLatin for associate or
management can be viewed as a socially constructed companionhere meaning society and technicalthat is,
process. (Jasimuddin et al., 2006) a solution produced by technological means, which derives
from TechnologiaGreek for systematic treatment.
Socially Constructed Reality (Coakes & Clarke, 2006b) 2: The integration of social
Created through purposeful human action and interaction, and technological systems to ensure optimal utilization
this reality is shaped by the individuals subjective of information and knowledge-based resources. (Ng &
conceptual structures of meaning. It is reconstructed Pemberton, 2006) 3: The interactive interplay between
by the human interactions that support continuous humans and artifacts in work performances. (Munkvold,
reinterpretations and change of meanings. The social 2006)
institutions are the means through which meanings are
stabilized and the social reality assumes an objective Sociotechnical Approach
appearance. (Ramos & Carvalho, 2005) 1: A paradigm in which both social and technical elements
are integrated to give a holistic view of a phenomenon.
Socialware There is a strong argument for an integrated sociotechnical
Aims to support various social activities on a network. approach to knowledge management (particularly
Rules of interpersonal communication are used and organizational management) which recognizes the active
transferred into community software. (Kindmller et participation of each organizational member in line
al., 2005) with the use of technology. (Jasimuddin et al., 2006) 2:
Sociotechnical approach means that the work practices in
Society for Worldwide Interbank Financial which information systems will be used are the starting
Telecommunications (SWIFT) points for design and implementation of the information
An international body that sets protocols and standards for systems. (Hyrinen & Saranto, 2005)
international payment systems, such as electronic money
transfers. (Saha, 2006b) Sociotechnical Method
Development method that attempts to produce systems
Socio-Organizational Function of a Telecenter that are both technically eficient and organizationally
Set of processes that a telecenter as an open social system sensitive. (Doherty & King, 2005)
carries out to strengthen and support the natural social
groups and organizations that exist in its local community. Sociotechnical Network
(Santos, 2005) The network of associations formed between human and
non-human actants. The actants are persuaded or enrolled

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soc iot e chnic a l Re se a rch Soft Syst e m s M e t hodology (SSM ) 631

into the network through a variety of socially mediated Socratic Dialogue


actions. (Wenn, 2006b) A learning technology which requires the participants
to answer a series of questions to discover an answer
S
Sociotechnical Research or truth concerning a certain topic; the questions are
Involving both social and technical interactions, occurring typically generated spontaneously from previous answers.
in such a way that it is not easily possible to disentangle (Benrud, 2005)
them. (Tatnall, 2005a)
Soft Computing
Sociotechnical System Collection of methods and techniques like fuzzy set, neural
1: One that focuses on the interaction between the technical network, rough set, and genetic algorithm for solving
and social subsystems that exist in any work situation. As complex real-world problems. (Bala et al., 2005)
there is always a social system operating along with any
technological system, we need to jointly design these two Soft Data
interrelated systems to get the best results from any work Judgmental, qualitative data, often from external sources.
system. (de Souza Dias, 2005) 2: The relationship between Any data involving the future. (Holstein & Crnkovic,
technical and social variables in a system. Changes in 2005)
one part, technical or social, will affect the other parts,
and thus the whole system. (Willis, 2005) 3: Such as Soft Factor
computer-supported learning projects that create interplay This concept comprises an ill-deined group of factors that
between technical decisions of tool development and social are related to people, organizations, and environments
interactions that occur as a result of users using the tool. like motivation, morale, organizational culture, power,
(Nash et al., 2005b) 4: A system comprising people and politics, feelings, perceptions of environment, and so
their interactions with technology (e.g., the World Wide forth. (Chroust, 2006)
Web). (Sharples, 2006)
Soft Knowledge
Sociotechnical System Design Approach Soft knowledge is implicit and unstructured, cannot be
System design approach that focuses on a sociological articulated, can be understood without being openly
understanding of the complex practices in which a computer expressed, is associated with action and cannot be
system is to function. (Jaspers, 2006) possessed, is about what we do, and is acquired through
experience. (Kimble & Hildreth, 2005)
Sociotechnical Thinking
A part of social theory and of philosophy. Its original Soft Skill
emphasis was on organizational design and change One of the cultivated elements of professionalism that
management. The term sociotechnical means a task derive from example, relection, imitation, and reinement
design approach that is intended to optimize both the of attitudes, personal capabilities, work habits, and
application and development of technology, and the interpersonal skills, and are expressed in consistent
application and development of human knowledge and and superior performance, characterized by a customer
skill. The underlying philosophy of sociotechnical service and team orientation. Current MIS curriculum
approaches is based essentially on two ideas focusing examples include ability to work as a member of a team,
on the individual and the organization. The irst is the well-developed oral and written presentation skills, and the
humanistic welfare paradigm, involving the redesign of ability to work independently. (Lowry & Turner, 2005)
work for autonomy, self-actualization, the use of self-
regulating teams, individual empowerment, and thus Soft Systems Methodology (SSM)
stress reduction. In this view the design of work systems is 1: A methodology that aims to bring about improvement
performed to improve the welfare of employees. The second in areas of social concern by activating in the people
(and perhaps contradictory philosophy) is the managerial involved in the situation a learning cycle that ideally is
paradigm, focusing on improving the performance of the never-ending. The learning takes place through the iterative
organization. (Coakes & Clarke, 2006b) process of using systems concepts to relect upon and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
632 Soft Te chnology Soft w a re Com pone nt

debate perceptions of the real world, taking action in the environment such as operating systems, computer
real world and again relecting on the happenings using applications, databases, networks, and virtual domains.
S systems concepts. The relection and debate is structured (Chang & Hsu, 2005) 5: Computer program characterized
by a number of systemic models of purposeful activities. by reactivity, autonomy, and proactivity. Therefore, the
These are conceived as holistic ideal types of certain software agent interacts with its environment. (Seitz,
aspects of the problem situation rather than as accounts of 2005) 6: Personalized, continuously running, and semi-
it. It is also taken as given that no objective and complete autonomous object. They can play an important role in
account of a problem situation can be provided. (Vat, cooperative telemedicine. Such agents can be programmed
2005c) 2: A general problem-solving tool that provides us for supporting medical diagnostic intelligence, and keep
with the ability to cope with multiple, possibly conlicting a watchful eye to discover patterns and react to pattern
viewpoints based on systems theory, which attempts to changes that usually occur in epidemics, and biological and
study the wider picture; the relation of component parts chemical terrorism. (Murthy & Krishnamurthy, 2005d) 7:
to each other. It uses systems as epistemological devices Piece of code that presents some unique characteristics like
to provoke thinking about the real world. (Abu-Samaha, autonomy, collaboration, and learning. (Protogeros, 2006)
2005) 3: An approach developed by Peter Checkland to 8: Software program that assists humans by automatically
analyze complex problem situations containing social, gathering information from the Internet or exchanging data
organizational, and political activities. (Sharples, 2006) with other agents based on the query provided by users.
(M. Wang, 2006) 9: A computer program that carries out
Soft Technology tasks on behalf of another entity. (Xu et al., 2006c)
Set of instructional innovations, methods, strategies, and
so forth. (Graham et al., 2005) Software Analysis
An analysis of the software in a software warehouse for
Soft Threshold software decision making (Dai, 2005b).
A fuzzy approach to decide the importance of a feature.
This is in contrast to a hard threshold where a yes/no Software Architecture
decision is made. (Sural et al., 2005) Rather like the architecture of a building, software
architecture describes the principled, structural design of
Software computer software. Contemporary software architectures
A computer program that provides instructions that tell a are multi-tier (or n-tier) in nature. Essentially, these stem
computer what to do. (Magagula, 2005) from a two-tier architecture in which user-presentation
components are separated from the information-content
Software Agent components, hence the two overall tiers. Communication
1: A self-contained piece of software that runs on an agent occurs through a standard interface between the tiers.
framework with an intended function to accomplish a This enables the easy swapping in and out of presentation
simple goal. (Zwitserloot & Pantic, 2005) 2: A piece of components, thus enabling information to be encoded into
software that autonomously acts to carry out tasks on a the most appropriate physical form for a given user at any
users behalf. In agent-based applications, it is accepted given time. (Polovina & Pearson, 2006)
that users only need to specify high-level goals instead
of issuing explicit instructions, leaving the decisions Software Capability Maturity Model
of how and when to their respective agent. A software (SW-CMM)
agent exhibits a number of features that make it different Describes a framework that software organizations can
from other traditional components including autonomy, use to determine their ability to develop and maintain
goal-orientation, collaboration, lexibility, self-starting, software. Its use can lead to organizational improvement.
temporal continuity, character, communication, adaptation, SW-CMM can be applied by acquisition organizations to
and mobility. It should be noted that not all these features select a software contractor. (Leung, 2005)
have to embody an agent. (Maamar, 2005) 3: A piece of
autonomous or semi-autonomous, proactive and reactive Software Component
computer software. Many individual communicative A minimum manageable unit of a software warehouse that
software agents may form a multi-agent system. (Guan, can be a class or a sub-routine. (Dai, 2005b)
2006d) 4: An artiicial agent that operates in a software

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soft w a re Cont ra c t Soft w a re Proc e ss 633

Software Contract Software Integration


A means of negotiating obligations to which a service Connecting different programs so that they can run
donator and client may agree. This may include information together and use each others data and operations. (Kurbel,
S
about several levels, from the technical (available 2005)
communications protocol) to the non-functional (quality
of service). (Gaedke et al., 2005) Software Interoperability
Permits different software to run on different platforms with
Software Cube different operating systems. (Murthy & Krishnamurthy,
The control part of a software warehouse system. (Dai, 2005d)
2005b)
Software License
Software Design Contract between a producer and a user of computer
A process of taking a set of requirements and forming a software, sometimes called an End-User License
concrete model of a system of components that satisies Agreement (EULA), which speciies the perimeters of
those requirements in which it uses software design the permission granted by the owner to the user. (Curti,
methodologies. It is a collective process among its 2005)
participantsthat is, developers and customers where
social, cultural, and psychological factors can inluence Software Metric
the design process. (Aurum & Demirbilek, 2006) The term metric or software metric has, for many years,
been accepted as the standard term used to refer to the
Software Development Kit (SDK) instrument of measurement in the ield of software. The
A set of development tools that allows a developer to create term software measure was introduced in the 1980s. This
applications for a certain software package, hardware new term was introduced because, in general, a metric
platform, or operating system. (Barone, 2005) captures two arguments and brings the distance between
them, so from that point of view, a software metric cannot
Software Engineering (SE) really be deined as a metric. This last term emphasizes the
1: The engineering of software for embedded, large, and fact that software metrics should be deined in accordance
critical systems. (Scime, 2005a) 2: Concerned with the with the measurement theory. However, today both terms
development of software systems using sound engineering continue to be used. (Serrano et al., 2005)
principles for both technical and non-technical aspects.
Over and above the use of speciication, design and Software Mining
implementation techniques, human factors, and software 1: A process to derive software patterns/regularities from
management should also be addressed. (Singh & Dix, a given software warehouse or a software set. (Dai, 2005b)
2006) 3: The application of a systematic, disciplined, 2: A special kind of knowledge discovery in which the
quantiiable approach to the development, operation, source data is already in the form of rules or program
and maintenance of software. (Ferre et al., 2006) 4: The code. (Raisinghani, 2005)
software engineering discipline covers the development of
software systems. Software engineers focus on applying Software Package
systematic, disciplined, and quantiiable approaches to Written programs, procedures, or rules and associated
the development, operation, and maintenance of software. documentation that pertain to the operation of a computer
(Gibson, 2005) system and that are stored in read/write memory.
(Colmenares & Otieno, 2005)
Software Industry
Focuses on the needs of the software development industry Software Process
in terms of infrastructure, know-how, capacities, and 1: Methodologies offering guidelines for improving
development. (Kamel, 2005a) software engineering performance by requiring
developers to adopt a disciplined, structured approach to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
634 Soft w a re Proje c t Sound Ca rd

building software systems. (Zhao & Deek, 2005) 2: The Software Team
development roadmap followed by an organization to Group of agents which has tasks that are tightly interrelated;
S produce software systems, that is, the series of activities these teams roughly parallel a department of employees.
undertaken to develop and maintain software systems. (Durrett et al., 2005)
(Ferre et al., 2006)
Software Tool
Software Project This term generally refers to a computer program or
An educational activity in which students are required to software package. (Sarkar, 2005)
develop or specify a program following guidelines and
requirements that were previously established. (Moreira Software Warehouse
& da Silva, 2005) The repository of software components that can be in
different languages, collected from multiple sources,
Software Quality stored under a uniform schema, managed using particular
A quality model (ISO/IEC 9126-1, 2001) categorizes strategies, and can provide well-organized services for
software quality attributes into the following six software reuse, thus facilitating automatic software
characteristics that are again subdivided into sub- engineering. (Dai, 2005b)
characteristics. The characteristics are speciied for certain
conditions of the software product: (a) functionality: the Software Warehouse Application Management
software product provides functions which meet needs; (b) System
reliability: the software product maintains performance; A component of a software warehouse system for the
(c) usability: the software product should be understood, management of the application of the software in the
learned, used, and attractive to user; (d) eficiency: the software warehouse. (Dai, 2005b)
software product provides appropriate performance relative
to the amount of resources used; (e) maintainability: the Software Warehouse Architecture
software product should be modiiablemodiications The organization and components of a software warehouse.
include corrections, improvements, or adaptations; and (f) (Dai, 2005b)
portability: the software product can be transferred from
one environment to another. (Hvannberg et al., 2006) Software Warehouse Management System
A component of a software warehouse system for the
Software Quality Assurance management of software in the warehouse. (Dai, 2005b)
Methods and approaches to ensure that a software system
meets speciied requirements, and customer or user needs Solenoid
or expectations. (Zhao & Deek, 2005) A coiled length of wire such that when an electric current
is passed through it, a magnetic ield is developed along
Software Requirement the axis of the coil. This magnetic ield may in turn be
An expression of the needs and constraints that are placed used to attract or repel other magnets or ferro-magnetic
upon a software product that contribute to the satisfaction materials. (Lahiri & Basu, 2005)
of some real-world application. (Ferre et al., 2006)
SOM: See Self-Organizing Map.
Software Requirements Speciication
A document that contains all requirements, for example SONET: See Synchronous Optical Network.
functional and non-functional requirements and project
issues, of the system as agreed upon by customers and SOTrieIT: See Support-Ordered Trie Itemset.
software developers. (Aurum, 2005)
Sound Card
Software System Development Methodology A device that can be attached to a computer in order to
Deines techniques and mechanisms, as well as the process obtain audible sound (e.g., voice or music) other than the
steps to go about developing software systems. (Solberg beeps emitted from the PC speaker. The sound card may
et al., 2005) in turn be connected to external ampliiers and speakers.
(Lahiri & Basu, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soundsc a pe Spa m 635

Soundscape Source Map


The design of audio cues and their mapping to application A matrix linking data classes to sources. In the cells of
objects or user actions. (Lumsden, 2005) the matrix, the sources are valued according to different
S
criteria (e.g., accessibility, costs, timeliness of the data,
Source etc.). (Vriens, 2005b)
1: A representation of a stock from which lows are
originated outside the boundary of the system. (Casado, Source System
2005) 2: An originator of a message or the person who An operational system of record whose function is to
encodes the message. This requires skills, for example, capture the transactions of the business. A source system is
in speaking or writing. This person may have a variety often called a legacy system in a mainframe environment.
of purposes in mind (e.g., to persuade someone, to be (Simitsis et al., 2005)
friendly, to provide information). In this model, we focus
on the purpose of sharing knowledge. (Jacobson, 2006) 3: Source-Source/Text-Source Material
Something or someone containing data and from which the Original material designed for a speciic cultural group.
data can be retrieved. Many distinctions regarding sources (St.Amant, 2005a)
are given in the competitive intelligence literature, for
instance, open vs. closed sources, primary vs. secondary Source of Trust-Building
sources, internal vs. external sources, and a distinction One of the factors, elements, or relevant concepts to
referring to the carrier of the data (human, electronic, or support trust-building during mutual communication
paper). (Vriens, 2005b) and interactions of participants in virtual communities.
(Park, 2006)
Source Code
1: Programmers write software in source code, which Sourcing Decision
are instructions for the computer to tell it how to use the Decision whether to buy goods/services from the market
software. But computers need a machine language to or to make them. Sourcing decision can be made as an
understand, so the source code of the software must be independent decision unit or as a part of a bigger group.
compiled into an understandable object code that computers (Suomi, 2005)
can use to carry out the software instructions or source
code. Without source code, a softwares instructions or Space Constraint
functionality cannot be modiied. Source code that can be One of many kinds of obstacles that arise with the costs
accessed by the general public is considered open (open of transferring from one place to another. (Cirrincione,
source software). If it cannot be accessed, it is considered 2005)
closed (proprietary software). (St.Amant & Still, 2005) 2:
Programming code prior to execution. (Sahraoui, 2006) Space Element
One of the halls, corridors, shelves, and other items
Source Evaluation representing physical shopping mall components, which
The process of assessing the eficiency and effectiveness are used together with the multimedia representation of the
of a source or several sources, given certain criteria. The merchandise to formulate the virtual reality-mall worlds.
result of this process can be: (1) a judgment about the (Lepouras & Vassilakis, 2006)
usefulness of a particular source for collecting data, and/or
(2) an insight into the relative usefulness of all available Space Model
sources. See also Source Map. (Vriens, 2005b) A geometry of the geographic space obtained by the
identiication of geographic regions with similar behavior
Source Identiication looking at a speciic metric. (Santos et al., 2005)
Identifying suitable sources (i.e., eficient and containing
the relevant data) given a certain data need. See also Source Spam
Map. (Vriens, 2005b) 1: Otherwise termed unsolicited e-mail, unsolicited
commercial e-mail, junk mail, or unwanted mail, it has

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
636 Spa m Ele c t ronic M a il Spat ia l Dat a M ode l

been used in opposition to the term ham, which is wanted Spatial Analysis
e-mail. The term was developed from a Monty Python Using geographic data to mathematically model the
S comedy sketch depicting spam as useless and ham as lovely, relationship between measures such those mentioned
albeit in ironic terms. (de Freitas & Levene, 2006a) 2: above, that is, alcohol outlets and violence. (Lipton et
Unsolicited e-mail that is sent to large numbers of people al., 2005)
to promote products or services. (Rosson, 2006)
Spatial Autocorrelation
Spam Electronic Mail The measure of similarity between values (for a given
Unsolicited and unwanted bulk e-mail. Identifying spam variable, e.g., income) located in space. Similarity of
e-mail is a text classiication task. (Bickel & Scheffer, values in spatial proximity may indicate some underlying
2005) mechanism that is spatial in nature and contributes to the
spatial pattern of the predictor variable. Controlling for
Spamdexing spatial autocorrelation reduces statistical bias in parametric
The promotion of irrelevant commercial pages by taking modeling. (Lipton et al., 2005)
advantage of the search algorithms used by search engines.
(Kasi & Jain, 2006) Spatial Cluster
A greater-than-expected geographically close group of
Spanning Tree (ST) occurrences or events (e.g., deaths, crashes, alcohol outlets).
A virtual path from the source to every receiver, also called (Lipton et al., 2005)
multicast distribution tree. (Hossz, 2006)
Spatial Clustering
Sparse Cube Storage techniques to place data items which have spatio-
A cube is sparse if a high ratio of the cubes possible temporal proximity at neighbored storage locations. Based
cells does not contain any measure value. (Abdulghani, on the assumption that data access patterns convey some
2005a) locality behavior, access performance can be improved.
(Baumann, 2005)
Sparse Data
Data that has metric values for a very small percentage Spatial Consistency
of all possible combinations of the dimension values. Refers to the agreement between data representation and
(Deshpande & Ramasamy, 2005) a model of space. (Rodrguez-Tastets, 2005a)

Sparse Data Cube Spatial Data


The vast majority (e.g., 99%) of the data cube cells are 1: Any information about the location and shape of, and
empty. (Riedewald et al., 2005) relationships among, geographic features, usually stored
as coordinates and topology. (Velibeyoglu, 2005) 2:
Spatial Information related to a real system involving geometric
Of or concerning space. (Hunter & Carr, 2005) (dimension, shape) and topological (relative position)
aspects of it. (Zelasco et al., 2005) 3: Represents tangible
Spatial Ability or located features, such as a river, a 1,000 by 1,000
A persons ability to perceive, retain, and mentally meter lot in a grid, a campus, a lake, a river, or a road.
manipulate different kinds of spatial information. There (Sadoun, 2006)
are numerous types of spatial ability (e.g., scanning ability,
visualization) that can be measured by standardized tests Spatial Data Mining
to detect ability differences between learners. (Boechler, The process of extracting interesting and implicit
2006a) knowledge and spatial relationships, which are not explicitly
stored into geographical databases. (Faz, 2005)
Spatial Accessibility
Consumers ability to overcome geographic barriers Spatial Data Model
(distance or time) in order to gain access to service Set of principles and concepts for describing spatial objects
providers. (Wang & Lou, 2005) and associated characteristics in a formal, univocal way,

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Spat ia l Dat a Type Spat ia l Que r y 637

at the conceptual, logical, or physical level. (Hendricks, Spatial Integrity Constraint


2005) 1: One of the rules that deine a valid state of a spatial
database. As with regular integrity constraints, spatial
S
Spatial Data Type integrity constraints must be observed across updating
Provides a fundamental abstraction for modeling the operations in order to ensure that the state of the database
structure of geometric entities in space (geometry) as is always valid. This includes rules on the valid behavior
well as their relationships (topology), for example, points, of the geometric and positional aspects of geographic
lines, polygons, regions, and so forth. A spatial object is data. (Davis et al., 2005) 2: Constraint that addresses
an object with at least one attribute of a spatial data type. properties with respect to a model of the space. These are
(Corral & Vassilakopoulos, 2005) usually classiied into topological integrity constraints,
semantic integrity constraints, and user-deined integrity
Spatial Database constraints. (Rodrguez-Tastets, 2005a)
A database that represents, stores, and manipulates
static spatial data types, such as points, lines, surfaces, Spatial Locality
volumes, and hyper-volumes in multi-dimensional space. Describes the effect that when an object is referenced,
(Tzouramanis, 2005) its nearby objects will tend to be referenced soon. The
notion of nearness can include the minimum number
Spatial Database System (SDBS) of hyperlinks that link the two objects, or it can describe
A database system that offers spatial data types in its semantic nearness. (Katsaros & Manolopoulos, 2005a)
data model and query language, and supports spatial data
types in its implementation, providing at least spatial Spatial OLAP
indexing and eficient spatial query processing. (Corral A visual platform built especially to support rapid and easy
& Vassilakopoulos, 2005) spatio-temporal analysis and exploration of data following
a multi-dimensional approach. (Faz, 2005)
Spatial Decision Support System (SDSS)
1: A computer-based system composed of a user-dialogue Spatial Operator
subsystem, a geographic/spatial database subsystem, a Represents one of the spatial relationships between spatial
decision model subsystem, and a set of analytical tools, objects. The most representative spatial relationships
which enables decision makers to analyze situations are: (1) topological relationships, such as adjacent,
involving spatial (geographic) data. (Forgionne et al., 2005) inside, disjoint, and so forth, which are invariant under
2: Typically, a geographic information system (GIS) that has topological transformations like translation, scaling, and
been extended to provide knowledge workers with decision- rotation; (2) direction relationships, for example, above,
making tools and support data. (Crossland, 2005) 3: System below, north_of, southwest_of, and so forth; and (3) metric
built on the integration of spatial database management relationships, for example, distance < 100. (Corral &
systems, geo-analytical models, geovisualization models, Vassilakopoulos, 2005)
and the expert knowledge of individuals and organizations
facing spatial decision problems. (Hendricks, 2005) Spatial Partition
The subdivision of the 2D plane into pairs of disjoint
Spatial Feature regions where each region is associated with an attribute
Symbolizing the arrangement of objects within the image. that can have a simple or complex geometric structure.
(Chan & Chang, 2005) (Pourabbas, 2005a)

Spatial Filtering Spatial Query


Commonly used to enhance satellite imagery for visual A set of spatial conditions characterized by spatial
interpretation. It involves applying a mathematical formula operators that form the basis for the retrieval of spatial
such as a mean or median to a group of pixels in a raster information from a spatial database system. (Corral &
image using a moving window. It is also being used to Vassilakopoulos, 2005)
create smoothed maps. The method can also be used to
remove random noise caused by inaccurate records or
mislocated cases. (Ali, Ashley, et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
638 Spat ia l Que r y Proc e ssing Spe a ke r Cor ne r

Spatial Query Processing the current and past states, and the support of spatial
Focuses on extracting information from a large amount of queries that refer to present and past time-points as well.
S spatial data without actually changing the spatial database. (Tzouramanis, 2005) 2: A spatio-temporal element is a
It is different than the concept of query optimization that inite union of spatio-temporal intervals. Spatio-temporal
focuses on inding the best query evaluation plan that elements are closed under the set theoretic operations of
minimizes the most relevant performance measure (e.g., union, intersection, and complementation. Databases
CPU, I/O, etc.). (Corral & Vassilakopoulos, 2005) that support spatial objects with continuously changing
position and extent. The graphical user interfaces for spatio-
Spatial Regression temporal information, query processing in spatio-temporal
A spatial analytic technique modeling the relationship of databases, and storage structures and indexing techniques
various factors to the geographical distribution of some for spatio-temporal databases could have a strategic
attribute measured on a continuous scale. (Garb & Wait, impact on business applications such as data mining and
2005a) knowledge discovery. (Raisinghani & Klassen, 2005)

Spatial Risk Spatio-Temporal Database Management System


The risk that is linked to locations in geographic space, A database management system that offers spatio-temporal
usually from physical or social environment. (Ali et al., data types and is able to store, index, and query spatio-
2005) temporal data. (Vassilakopoulos & Corral, 2005)

Spatial Scan Statistic Spatio-Temporal (Join) Query


A cluster detection statistic that uses a moving window to 1: A query that asks for data that satisfy a spatial relation
compare the number of events or case locations inside vs. and a temporal window. For example: Find all cars within
outside the window. This statistic can identify geographic 10 miles of each other during a given hour (or at 1:00
clustering of disease cases or geographic areas with p.m.). (Rodrguez-Tastets, 2005b) 2: A query that speciies
unusually high or low rates of disease. (Garb & Wait, spatial/temporal predicates and retrieves all objects that
2005b) satisfy them. A spatial predicate is deined in terms of a
point or an extent, while a temporal predicate can involve
Spatial-Temporal Activity Level a time instant or a time interval. For example, the query
The dynamics of the video content in respect to its spatial Find all vehicles that will intersect the polygon S within
and temporal characteristics. (Koumaras et al., 2005) the next 5 minutes is a spatiotemporal range query. The
spatial range is the polygon S, and the temporal range is
Spatially Referenced Data the time interval between now and 5 minutes from now.
Entities, typically recorded as records in a database, (Tzouramanis, 2005) 3: A set of conditions embedding
which have some notion of a deinite location in space. spatial and temporal relationships that deine the set of
(Crossland, 2005) spatio-temporal data to be retrieved. (Vassilakopoulos
& Corral, 2005)
Spatio-Temporal Data
1: Multi-dimensional data with spatial (two- or three- Spatio-Temporal Relation
dimensional) and time dimensions. (Bozanis, 2006) A combination of two spatial and temporal relations into
2: Multi-dimensional data, like points, line segments, one relation used to index video documents and objects
regions, polygons, volumes, or other kinds of geometric evolution between two images (e.g., tumor evolution).
entities, that vary in the course of time. (Vassilakopoulos (Chbeir & Yetongnon, 2005)
& Corral, 2005)
SPE: See Special Purposes Entity.
Spatio-Temporal Database
1: A database that manipulates spatial data, the geometry of Speaker Corner
which changes dynamically. It provides the chronological The main intranet Web site in PDO. (Al-Gharbi & Khalfan,
framework for the eficient storage and retrieval of all 2005)
the states of a spatial database over time. This includes

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Speaker Veriication Speech Recognition 639

Speaker Veriication on the basis of some distinguishing characteristics of the


Signal processing required for verifying the speaker entities in the superclass. (Bagui, 2005)
identity by using his/her speech features. (Perez-Meana
S
& Nakano-Miyatake, 2005) Specialized/Niche Portal
Portal designed to satisfy specific niche markets.
Speaking the Users Language Sometimes they provide detailed industry information,
Refers to speaking the language of the intended Web often available only for a fee. (Tatnall, 2006)
audience. It means avoiding jargon, acronyms, or system
terms that some of the intended audience may not Speciic Knowledge
understand. If you must use jargon, acronyms, or system The contextual knowledge of one speciic individual,
terms, provide a glossary and/or an acronym inder. group, society, time, or location. It can be tacit or explicit.
Another way to speak the users language is to ensure (Medeni, 2006a)
your search engine recognizes naturalistic language.
(Chalmers, 2006) Speciication
A document describing what a system should do, what
Special Interest-Based Virtual Community a problem is, or what a domain is all about. In formal
An online community where users interact considerably methods this document is written in a formal language.
with one another to discuss and share knowledge regarding (Dasso & Funes, 2005)
speciic topics. (Jong & Mahatanankoon, 2006)
Speciication Matching
Special Purposes Entity (SPE) The process to determine if two software components are
An SPE, dubbed the Raptors, is a trust, corporation, limited related. It allows us to distinguish when two component
partnership, or other legal vehicle authorized to carry out speciications match; we know that certain guarantees
speciic activities as enumerated in its establishing legal about the behavior of the system will hold if we substitute
document. (Wang, Chen, et al., 2006) one component for the other. (Felice & Riesco, 2005)

Special-Needs Population Spectral Clustering


These populations include special education students with The collection of techniques that perform clustering tasks
emotional disorders, learning disabilities, limited English using eigenvectors of matrices derived from the data. (Ma
language skills, or other mental or physical health problems & Li, 2005)
that prevent full participation in school. (Glick, 2005a)
Spectral Graph Theory
Specialist E-Fulillment (SO) Provider A theory on the study of the eigenvalue properties of a
Third-party e-fulillment providers may choose to offer a Laplacian matrix of a graph. (Li, 2005)
subset of e-fulillment capabilities. These may be either
Physco or Knowco in nature, though a greater proportion Spectrum
of SO providers tend to concentrate on Physco capabilities. The distribution of component frequencies of the sound,
SOs appear to be driven by needs of dominant customers each being a sine wave, with its amplitudes and phases
who dictate the services they need. Such providers are (time locations of these components). These frequencies can
sensitive to such customers needs, and will modify and be determined through Fourier analysis. (Wieczorkowska,
add capabilities that address them. (Alexander & Burn, 2005)
2006)
Speech Enhancement
Specialization Signal processing performed in a given speech signal to
1: A cubegrade is a specialization if the set of attribute- improve its intelligibility and signal-to-noise ratio. (Perez-
value pairs of the target cell is a superset of the set of Meana & Nakano-Miyatake, 2005)
attribute-value pairs of the source cell. (Abdulghani, 2005b)
2: A process of conceptual reinement to form specialized Speech Recognition
subclasses for entity sets. An entity type can have several Enables the identiication of an individual based on
specializations or categories of specializations deined the analysis of a voiceprint derived from the digital

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
640 Speech Recognition Software Spooing

acquisition of unique patterns found in individual speech Spiral Model


patterns. (Scott et al., 2006) A system development methodology that utilizes an
S iterative process that is focused on minimizing project
Speech Recognition Software risk. (Steinbach & Knight, 2005)
Software that converts spoken language to text within a
word processor. (Anderson, 2005) Split-Point: See Cut-Point.

Speech Skimmer Splitter


A system developed by Barry Arons at the beginning A device used to separate the telephony signals from
of the 1990s with the aim of making speech skimming the data stream in a communications link. (Hin &
as easy as scanning printed text. For this, its interface Subramaniam, 2005a)
offers various options to modify replay speed, especially
by applying time-stretching and content-compression Splitting Predicate
techniques. (Hrst & Lauer, 2006) Predicate at an internal node of the tree; it decides which
branch a record traverses on its way from the root to a leaf
Speech Skimming node. (Gehrke, 2005)
A term, sometimes also referred to as speech browsing or
scanning, that describes the actions involved in skimming Sponsor
through a speech recording with the aim of classifying the Organization delivering e-learning on behalf of the
overall topic of the content or localizing some particular manufacturer of the products being marketed. (D. Wright,
information within it. (Hrst & Lauer, 2006) 2005)

Speech-Text Alignment Sponsored Link


A dynamic program scheme to explore the correlations A link that is returned on a search engine search for which
between speech and text. (Lee, Lin, et al., 2005) an advertiser has paid a fee in exchange for prominent
ranking. (Owen, 2006a)
Speed of Delivery
The application-layer multicast (ALM) theoretically cannot Spooing
be more optimal than the IP-multicast tree, in such a way 1: An activity where a malicious individual aims to
that the delivery of the ALM has higher delay than the compromise the security of a biometric system by
IP-multicast. (Hosszu, 2005a) substituting fake biometric data in some form or another.
Anti-spooing techniques are measures designed to
Sphere of Concern counteract spooing activities. (Fleming, 2005a) 2: In P2P
A set of issues and entities relevant for a particular ile-sharing networks, the practice of introducing dummy
modeling process, in this case modeling of m-commerce. iles that have the name of a popular song attached, but
See Universe of Discourse (UoD). (Veijalainen & Weske, not the actual music, in order to degrade the network.
2005) (Hughes & Lang, 2005) 3: The act to deceive. In the
Internet world, it is the act of pretending to be someone or
Spider System something else by fooling hardware, software, or human
A document management system which acts as a users. (Sockel & Chen, 2005) 4: The technique of obtaining
spidereach leg of the spider represents a dimension or or mimicking a fake identity in the network. This can be
category that serves to classify documents. (Ahmad & used for pretending to be a trustworthy Web site and for
Al-Sayed, 2006) motivating users (e.g., entering banking information),
pretending to be an authorized instance that requests the
Spin-Out users password, or making users accept information that
A new company formed by an organization, often a is believed to come from a trusted instance. (Richter &
university, to develop and market a new technology or Roth, 2006)
process invented within the host organization, usually
(but not always) involving the inventor in a management
capacity. (Warren, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Spot Sourc ing St a ble M ode l 641

Spot Sourcing SRC: See Social Complex Resource Combination.


Buying based on incidental and last-minute opportunities.
Spot sourcing is transaction oriented and often involves SRM: See Supplier Relationship Management.
S
short-term and incidental relationships. (Janssen, 2005)
SRSWR: See Simple Random Sampling With
Spread Spectrum Replacement.
A form of wireless communication in which the frequency
of the transmitted signal is deliberately varied over a wide S S Water mark i ng: Se e S pre a d S pe ct r u m
range. This results in a higher bandwidth of the signal than Watermarking.
one without varied frequency. (Akhtar, 2005)
SSA: See Structured System Analysis.
Spread Spectrum (SS) Watermarking
1: A method of embedding a watermark, a narrowband SSD: See Structured System Design.
signal, by spreading each bit of the watermark over several
samples of the host media, a wideband signal. The security SSL: See Secure Socket Layer.
resides in the secrecy of the spreading function. (C.-T.
Li, 2005) 2: The technique of spreading the watermark SSM: See Soft Systems Methodology.
(narrowband signal) using a multiple of pseudo-random
noise sequences (wideband signal) before being mixed into SST Method Schema
the host media (wideband signal). This concept could be A method schema developed to analyze search processes
adopted in all kinds of media, and make the idea of robust by identifying what external and internal factors interplay
watermarking practical. (Si & Li, 2006) with the search process during, before, and after the process.
(Pharo & Jrvelin, 2005)
Spreadsheet Program
1: A software program that creates a worksheet of rows and ST: See Spanning Tree.
columns to enter and manipulate data. (Judd, 2005) 2: The
most common standard package next to word processors, ST-II
suitable for user systems development. (Avdic, 2005) The Internet stream protocol, version 2, an IP-layer protocol
that provides end-to-end guaranteed service across the
SPS: See Standard Positioning Service. Internet. (Yang et al., 2005a)

Spyware Stable Attribute


1: Personal information is sometimes collected via spyware. An attribute is called stable for the set U if its values
Spyware is a group of programs that are (sometimes assigned to objects from U cannot change in time. (Ras
inadvertently) downloaded along with legitimate or free et al., 2005)
programs (e.g., Weatherbug, Gator). Spyware then runs in
the background and functions whenever the Internet user Stable Filter
is online for market research purposes. (Close et al., 2006) A ilter for which a bounded input always results in a
2: Software that can be rapidly and unobtrusively installed bounded output. (Jovanovic-Dolecek, 2005a)
on a computer, and that subsequently passes information
about ones Internet suring habits to a designated Web Stable Model
site. (Friedman, 2005) 3: Software that installs itself on An interpretation M is a stable model for a disjunctive
computers when programs are downloaded and that tracks Datalog program P, if and only if M is a minimal program
each user click, usually without the users knowledge or for the program PM , denoting the ground positive program
permission. (Szewczak, 2005) derived from ground(P) by: (1) removing all rules that
contain a negative literal a in the body and aM, and (2)
SQL: See Structured Query Language. removing all negative literals from the remaining rules.
(Greco & Zumpano, 2005b)
SQL:1999: See Structured Query Language (SQL): 1999
(SQL: 1999)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
642 St a ble St at e St a nda rd Se t t ing

Stable State Standard


A stable state of the shared application is given if the 1: A level of performance set by agreement among experts
S execution behavior of all instances is equivalent. For in the ield. (Brady, 2005) 2: An agreed-upon set of
example, if a menu entry is selected, the same action concepts, terminologies, and methodologies by a given
belonging to the corresponding menu entry should be community. (Karimi & Peachavanish, 2005) 3: Benchmark
performed on all machines. Other terms are consistent or for quality performance. (C. Cavanaugh, 2005) 4: Detailed
equivalent state. (Trossen & Molenaar, 2005) statement of action that complies with policy. (Mattord
& Whitman, 2005) 5: Documented agreement containing
Staff Augmentation technical speciications or other precise criteria that are
When an employee of an outsourcing irm is lent to a used as guidelines to ensure that materials, products,
client company for work. Normally a staff augmentation processes, and services suit their intended purpose.
employee works at the clients worksite with the technical (Lawson-Body, 2005)
direction coming from the client company. (Hawk &
Kaiser, 2005) Standard Error
The standard deviation of the sampling distribution of
Stages of Growth Model a statistic. In the case of approximate query answering,
Model that attempts to explain evolutionary stages in the it measures the expected value of the error in the
maturity of systems or organizations. (Mackey, 2005) approximation of aggregation queries. (Das, 2005)

Stages of the Virtual Community Lifecycle Standard Generalized Markup Language


Virtual community members go through four relationship (SGML)
stages (i.e., awareness, exploration/expansion, commitment, 1: A general language for representing documents. SGML
and dissolution). (A. Roy, 2005) is deined in ISO 8879:1986. (Chang, 2005) 2: Document
standard from ISO (reference ISO 8897). It is a meta-
Stakeholder language that can deine document logical structure by
1: A party with signiicant importance to the success of using Document Type Deinition (DTD) component. An
the destination marketing system. (Hornby, 2005) 2: An example of document types deined using the DTD of
independent party who may have the ability to impact SGML is HTML. (Suh & Kim, 2005)
another party. (Hunter, 2005) 3: Any individual, group,
or organization that will have an impact on or will be Standard Knowledge
signiicantly impacted by the quality of the product or A document that records what the employees learned or
service an organization or institution provides. For example, discovered in the standard or required format. (Shen &
stakeholders in a distance learning program can include: Tsai, 2006)
a college dean, department chairperson, instructors,
students, the inancial aid ofice, the institutions registrar, Standard Positioning Service (SPS)
the student services support team, and the information The signal that is available to civil users worldwide without
technology staff. Each of these individuals has a stake in charge or restrictions and is available/usable with most
the program and can have a profound or limited impact on receivers. The U.S. Department of Defense is responsible
the programs perceived quality. (Riffee & Sessums, 2005) for the transmission of this data. U.S. government agencies
4: A person or organization with a stake in a particular have access to Precise Positioning Service (PPS), which
issue or resource. Stakeholders can be deined as faculty, uses equipment with cryptographic equipment and keys,
staff, and administrators who work in systems of higher and specially equipped receivers that have the capability of
education. (Proctor, 2005) 5: Those individuals or groups using the exclusive L2 frequency for enhanced information.
who have ownership and derive beneit from the training The PPS gives the most accurate dynamic positioning
system. (Jeffery & Bratton-Jeffery, 2005) possible. (Freeman & Auld, 2005)

Stand-Alone Program Standard Setting


Foreign language instructional program operated by an Source code under such a license may be used only in
individual computer in a classroom. (Switala, 2005) activity that deines an industry standard. (Fleming,
2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St a nda rd Te chnic a l K now le dge St at e m e nt 643

Standard Technical Knowledge measures of interest are stored in the fact table (e.g., sales,
Standard technical knowledge is task speciic, industry and inventory). For each dimension of the multi-dimensional
irm non-speciic, and involves a wide range of technical, model, there exists a dimensional table (e.g., product, time)
S
operationally oriented knowledge that is generally available that stores the information about the dimension. (Serrano et
to all actors. Examples are knowledge of inancial and al., 2005) 3: A simple database design in which dimensional
management accounting practices, knowledge of computer data are separated from fact or event data. A dimensional
programming and standard software packages, and model is another name for star schema. (Bellatreche &
knowledge of craft and engineering principles and methods. Mohania, 2005) 4: A dimensional model that is composed
(Butler & Murphy, 2006) of a central fact table and a set of constituent dimension
tables. (Pourabbas, 2005b) 5: Relational database schema
Standard User Interface that results from ROLAP; facts and dimensions are stored in
Even as implementation technology changes at any given tables. The fact table is considered the core of the resulting
time, usability is improved by following standards and database, connected to each and every dimension table.
conforming to user expectations, but over time, these When visualized with the fact table in the center and the
standards and expectations have to evolve as the technology dimension tables surrounding it, they create the igure
improves and new interface ideas are invented. (Liu & under which the schema is named. (Badia, 2005c) 6: The
Tucker, 2005) typical logical topology of a data warehouse, where a
fact table occupies the center of the data warehouse and
Standardized Data dimension tables are related to most fact table attributes.
A collection of numeric data is standardized by subtracting (Scime, 2005b)
a measure of central location (mean) and by dividing by
some measure of spread (standard deviation). (Beynon, Star Structure
2005a) Structure of a warehouse for which a fact is directly
connected to several dimensions and can be so analyzed
Standardized Mortality Ratio (SMR) according to these dimensions. It is the most simple and
Ratio of the observed mortality in a group of interest the most used structure. (Schneider, 2005)
to the expected mortality in that group, based on some
standard population. It gives information about regions State Gap and Trend Analysis
with unusually high or low numbers compared to the A tool used to present in a structured format current market
expected numbers. (Vidal-Rodeiro et al., 2005) or technology states as well as future states. This analysis
requires a one for one transitiona this to that view.
Stanford Temporal Prover (STeP) This model calls for no ambiguities. The perilous part of
A tool to support the formal veriication of reactive, real- this tool is determining how to transition the gapwhere
time, and hybrid systems. SteP combines model checking one has to be by when with what. (Nugent, 2005)
with deductive methods to allow for the veriication of a
broader class of systems. (Campos & Harrison, 2006) State Information
Information that describes the state or condition of a
Star Model physical product or information good (i.e., a stock price
A logical structure that has a fact table containing factual or the number of SKUs in inventory). (McIntosh & Siau,
data in the center, surrounded by dimension tables 2005)
containing reference data. (Kontio, 2005)
State Portal
Star Schema Vertical Web site where information refers mostly to the
1: A database schema that consists of a single fact table information of a national, state, or local entity. (Almazn
and a single table per dimension. The dimension table & Gil-Garca, 2006)
stores the entire hierarchy for that dimension. (Deshpande
& Ramasamy, 2005) 2: A relational schema whose design Statement
represents a multi-dimensional data model. A star schema The basic structure found in an RDF speciication. It
consists of one central table and several dimensional The consists of a subject, which is a Web resource represented

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
644 St at e m e nt of Applic a bilit y St e a lt h M a rke t ing

by a unique identiier, and a predicate, which is a property Static-Oriented Formal Speciication Language
that links the subject to an object which is either also a Web Does not include provisions for handling time. (Dasso &
S resource or an atomic value. (Stuckenschmidt, 2005) Funes, 2005)

Statement of Applicability Statistical Database


Describes the control objectives and controls that are Type of database system that is designed to support
relevant and applicable to the organizations information statistical operations, while preventing operations that
security management system scope, based on the results could lead to the association of individuals with conidential
and conclusions of the risk assessment and treatment data. (Saygin, 2005)
process. (Tong & Wong, 2005a)
Statistical Independence
Static Digital Deliberation Let X and Y be two disjoint sets of random variables; then
Digital deliberation that is not dialogical in nature. It X is said to be independent of Y, if and only if p(x)=p(x|y)
typically includes online polls offering instant results for all possible values x and y of X and Y. (Ramoni &
and bulletin boards for recommendations or complaints. Sebastiani, 2005)
(Holzer & Schweste, 2005)
Statistical Information System
Static Graphic The information system oriented toward the collection,
A graphic with no animation or interactivity. The computer- storage, transformation, and distribution of statistical
image equivalent of a photograph or a painting. (Szabados information. (Vardaki, 2005)
& Sonwalkar, 2005)
Statistical Machine Learning
Static Sampling 1: An approach to machine intelligence that is based on
A method of sampling where the whole sample is obtained statistical modeling of data. (Yeo, 2005) 2: The process
before processing begins. The user must specify the sample of deriving the parameters that characterize a statistical
size. (Lutu, 2005) model from a set of observations. (Laura, 2005)

Static Virtual Enterprise Statistical Metadata


A set of business partners are linked together in a static Data about statistical data. Metadata provide information
and ixed way, for example, the shared business processes on data and about processes of producing and using data.
are tightly integrated. The business relationships and Metadata describe statistical data and, to some extent,
the process interfaces are predeined, tightly coupled, processes and tools involved in the production and usage
ixed, well integrated, and customized among partners. of statistical data. (Vardaki, 2005)
(Tahinakis et al., 2006)
Statistical Method
Static vs. Dynamic Integrity Constraint Method that relies on collecting numerical data on texts, and
By default, integrity constraints correspond to static applying statistical techniques to analyze the data and/or
properties that are independent of particular database to make statistical inferences about the texts. (Kulyukin
states. As opposed to that, dynamic integrity constraints & Nicholson, 2005)
refer explicitly to several states, mostly consecutive ones, or
to their transitions, involving temporal or other procedural STB: See Set-Top Box.
integrity constraint constructs. A typical example of a
genuine dynamic integrity constraint is salaries must Stealth Marketing
never decrease. (Decker, 2005) Also called undercover marketing; occurs when
marketers direct promotion strategies to consumers without
Static Web Page revealing their identity, so consumers do not know they
The same page content is presented to the users regardless are being marketed to. (Waterson, 2006)
of who they are. (Falk & Sockel, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St e a lt h M ode St e re o V ision Syst e m 645

Stealth Mode trusting parties. As a result, steganographic methods


Operating a start-up venture quietly, so competitors and are usually not robustthat is, the hidden information
the general business community are unaware of it. (Craig, cannot be recovered after data manipulation. (Nesi &
S
2006b) Spinu, 2005)

Stealth Virus Stego-Image


A virus that hides the modiications it has made in the ile An image that has important data hidden within. (Chen,
or boot record, usually by monitoring the system functions Chen, & Cheng, 2005)
used by programs to read iles or physical blocks from
storage media, and forging the results of such system Stego-Medium
functions so that programs which try to read these areas see The medium after hiding a secret message into a cover
the original uninfected form of the ile instead of the actual medium. (Lou et al., 2006)
infected form. Thus the virus modiications go undetected
by antivirus programs. However, in order to do this, the Stego-Object
virus must be resident in memory when the antivirus The cover work with a watermark inserted or embedded.
program is executed. (Luo & Warkentin, 2005) (K. Chen, 2005)

Steganalysis Stemming
Discovering the existence of hidden information. Hence, 1: Finding the root form of related words, for example
its major intent is to discover hidden information and break singular and plural nouns, or present- and past-tense verbs,
the security of the carrier. (Lou et al., 2006) to be used as key terms for calculating occurrences in texts.
(Kroeze, 2005) 2: For text mining purposes, morphological
Steganography variants of words that have the same or similar semantic
1: Covered writing. It is a study of concealing the interpretations can be considered as equivalent. For
existence of a message. (K. Chen, 2005) 2: Hiding the example, the words computation and compute can be
existence of a message by hiding information into various stemmed into comput. (Fung et al., 2005)
carriers. The major intent is to prevent the detection of
hidden information. (Lou et al., 2006) 3: Steganography STeP: See Stanford Temporal Prover.
(literally meaning covered writing) dates back to ancient
Greece. It includes a vast array of methods of secret Step-Wise Regression
communications that conceal the very existence of the An automated procedure on statistical programs that adds
message. In todays computer security, steganography one predictor variable at a time, and if it is not statistically
is the science of hiding information by embedding signiicant, it removes it from the model. Some work in
messages within other seemingly harmless messages. both directions either by adding or removing from the
Steganography works by replacing bits of useless or unused model, one at a time. (Morantz, 2005)
data in regular computer iles (such as graphics, sound,
text, HTML) with bits of different, invisible information. Stereo Images
This hidden information can be plaintext, ciphertext, or Two or more images of a real objects surface obtained
even images. Unlike encryption, steganography cannot be from different points of view. (Zelasco et al., 2005)
detected. Therefore, steganography is used to supplement
encryption. An encrypted ile may still hide information Stereo Vision System
using steganography, so even if the encrypted ile is System devised to extract 3D information of a given scene.
deciphered, the hidden message is not seen. (Mezgr, 2005) Allows recovering a 3D property such as surface shape,
4: Technique that allows secret communication, usually orientation, or curvature. In binocular stereo systems, two
by embedding or hiding the secret information (called images are taken from different viewpoints, allowing the
embedded data) in other, unsuspected data. Steganographic computation of 3D structure. In trifocal, trinocular, and
methods are based on the assumption that the existence of multiple-view stereo, three or more images are available.
the covert communication is unknown, and they are mainly (Aifanti et al., 2005)
used in secret point-to-point communication between

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
646 St e re ot ype St oplist

Stereotype Stigmergy
1: Allows the creation of new types of elements of modeling, The process that mediates the interaction between animals,
S based on the elements that form the goal-pattern UML, and animals through the environment, and provides those
extending its semantics. (Riesco et al., 2005) 2: This is clues from which any agent is able to infer what to do next.
used in contrast to an archetype in that a stereotype is a (Magnani & Bardone, 2006)
way of labeling someone or something and may be positive
or negative. Stereotypes are frequently stock characters or Stochastic Screening
are clichd and lack depth or sympathy. Racial and culture A method to reproduce photographic images in printed
stereotypes are common and nearly always negative. In media by creating a random placement of very small dots
organizational work, stereotypes often occur in respect that change in frequency to create the perception of lighter
to employees, bosses, competition, and/or the customer. and darker tones. (Snyder, 2005)
(Snowden, 2006) 3: Extensions to the UML vocabulary,
allowing additional text descriptions to be applied to Stock and Flow Diagram
the notation. The stereotype is shown between chevron Consists of a set of stocks and lows, stocks representing
brackets <<>>. (Gur u, 2005) resources that either accumulate or deplete over time
through inlows and outlows. Stock and low diagrams
Stereotyping are largely used in system dynamics and rarely in systems
An evaluator bias in analytic methods in which a system is thinking approaches. (Saha, 2005)
evaluated with respect to a homogenous catch-all user not
accounting for a wide-enough range of user characteristics. Stock Ramping
(Danielson, 2006a) Also known as a pump and dump, usually involves an
organized campaign aimed at increasing (decreasing) the
Stewardship price of a particular stock by the rapid dissemination of
Management of anothers property, affairs, or data. For false or excessively optimistic (pessimistic) information
agencies, stewardship includes functions of oficials and through a variety of communication media, including
staff, such as privacy oficers and advocates, disclosure Internet discussion sites. Typically companies with
oficials, and survey managers. Stewardship carries low capitalization are targeted for this type of activity.
responsibility for data subjects personal privacy, as well (Campbell, 2006)
as data conidentiality and security. (Mullen, 2005)
Stop Words Removal
S3 Model A preprocessing step for text mining. Stop words, like
A conceptual framework for measuring the maturity level the and this which rarely help the mining process,
of a community portal. (Vrazalic & Hyland, 2005) are removed from input data. (Fung et al., 2005)

Stickiness Stopband
1: Refers to the likelihood that visitors will stay on the The frequency band that is blocked by the ilter and therefore
site for a while and be inclined to return again and again. eliminated from the output signal. (Jovanovic-Dolecek &
(Liu & Tucker, 2005) 2: The ability of a Web site to create Daz-Carmona, 2005)
both customer attraction and customer retention for the
purpose of maximizing revenue or proit. (Forgionne & Stopband Attenuation
Ingsriswang, 2005) The desired minimum attenuation in the stopband.
(Jovanovic-Dolecek & Daz-Carmona, 2005)
Stickiness of Knowledge
A characteristic of some types of knowledge is to only Stoplist
make sense in a particular or speciic context; attempts Speciic collection of so-called noise words, which tend
to disentangle or isolate such knowledge are thought to to appear frequently in documents. (Fernndez & Layos,
be made more dificult because the knowledge sticks 2005)
to its context, making its transfer more challenging.
(Connell, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St ora ge Bin St rat e gic Func t ion of t he M a na ge m e nt of Online Disc ussions 647

Storage Bin interaction among business strategy, structure, information


A generic knowledge retention device in which memory technology, and environment, while taking into account
is stored. The storage bin concept as generally presented the most important contingencies like: the age, the size,
S
implies a static conceptualization of organizational the culture, and so forth. (Theodorou, 2005)
memory. The memorys retention facility can be structured
in terms of ive internal retention bins (individuals, Strategic Alliance
culture, transformations, structures, ecology) and one 1: An agreement between two or more to engage in
external bin (external archives). (Jasimuddin et al., business transactions, shared resources, or ventures to their
2006) mutual beneit. (Samuel & Samson, 2006) 2: Agreement
to share costs, risks, and beneits emanating from business
Storage/Retrieval opportunities that arise. Such agreements can take many
Focuses on issues relating to organizational memory, both formsfor example, joint ventures or long-term contracts.
tacit and explicit. (Lindsey, 2006) (Pease & Rowe, 2005) 3: Business alliances among
organizations that provide strategic advantages to the
Storage-Area Network (SAN) partner organizations. (Marshall & Gregor, 2005)
A networked storage infrastructure (also known as a fabric)
that provides the any-to-any connectivity between servers Strategic Architecture
and storage devices, such as RAID disk systems and tape Refers to a companys capabilities, when applied in the
libraries. (Tong & Wong, 2005b) marketplace. (Potgieter et al., 2005)

Stovepipe Strategic Choice


The traditional orientation of government departments or The choices that executives make which impact on the
business units, in which each department or business unit strategic direction of the organization. These choices exist
acts independently and autonomously. Lack of integration as the intended strategies of the organization. (Baker &
and interoperability, and issues of duplication of efforts, Coltman, 2005)
characterize stovepipe organizations. (Schelin, 2005)
Strategic Connection
Stovepipe System The relationship between the strategy formulation process
A system where all the components are hard-wired only and the deployment of resources to achieve it. (Wright &
to work together. (Pereira & Freire, 2005) Taylor, 2005)

Straight-Through Processing Strategic Decision Making


An industry-wide initiative to streamline, transform, and The process of making important decisions (usually made
automate processes in the inancial securities industry by the top management team) to put executive choices into
in order to achieve lower settlement times and quicker action by implementing strategies. (Baker & Coltman,
trading. (Saha, 2005) 2005)

Strategic Strategic Experimentation


A tactical plan of action that is essential to the strategy of A form of strategic management in which irms continually
an organization, such as the use of communication to gain start, select, pursue, and drop strategic initiatives before
a competitive advantage. (McManus & Carr, 2005) launching aggressively those initiatives whose values are
inally revealed. (Narayanan, 2005)
Strategic Alignment
The appropriate use of IT in the integration and Strategic Function of the Management of Online
development of business strategies and corporate goals. Discussions
(Lubbe, 2005) Establishes the boundaries of the discussion, and embeds
it in the political and organizational environment. (A.R.
Strategic Alignment Model Edwards, 2005)
A model to help appropriate selection of strategic
priorities and structural variables. Incorporates a dynamic

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
648 St rat e gic Goa l St rat e gic V ision for I nfor m at ion Te chnology

Strategic Goal changing environment or entailed unhealthy dependence


One of the broad targets that represent the desired outcomes on the vendor. (Beaumont, 2005)
S the organization expects to achieve over the long term.
(Brabston, 2005) Strategic Plan
1: A document that outlines the goals of an organization
Strategic Information System and the steps that will be taken to ensure the successful
1: As opposed to operational system, the information accomplishment of those goals. (Baker & Schihl, 2005)
system that supports and promotes the long-term goals 2: A formulation of an organization or institutions
of an organization, generally in terms of its competitive scheme or program for the accomplishment, enactment, or
advantage in the business environment. (Mendonca, 2005) attainment of essential goals within a speciied period of
2: Information system that increases competitive advantage time. (Poda & Brescia, 2005) 3: A process by which quality
in a long-term horizon, with more than operational beneits, will be improved and maintained in meeting the goals of
such as better positioning and increase in market share. the organization. (C. Cavanaugh, 2005) 4: A carefully
(Theodorou, 2005) devised plan of action (or methodology)featuring
multiple activities, tasks, and interventionsto achieve
Strategic Information Technology a long-term goal. (Bober, 2005) 5: Corporate long-term
Computer-based technology that speciically supports and planning that ensures the existence of an organization.
promotes the long-term objectives of an organization, both (Mandal et al., 2005) 6: The process of developing and
inancial and otherwise. (Mendonca, 2005) maintaining a strategic it between the organizations goals
and capabilities, and its changing marketing opportunities.
Strategic IT Investment Decision (Brace & Berge, 2006) 7: Planning that identiies and
Signiicant, long-term decision to invest in projects that justiies where your organization should be headed and
have substantial information systems or information why it should get there in terms of societal value added.
technology components. Forms part of corporate strategic (Kaufman & Lick, 2005)
investment decisions. (Chou et al., 2005)
Strategic Relevance
Strategic Justiication A measure of the degree to which information systems
The process of evaluating and selecting systems based directly facilitate the attainment of the organizations
on tangible (inancial) and intangible factors that have strategic goals. (Dykman, 2005)
implications for long-term and broad management of the
organization. (Sarkis & Sundarraj, 2005) Strategic Resource
Anything to which an organization has access to that may
Strategic Management be strategically useful to it. (Saha, 2005)
The process of strategy creation and implementation.
The concept of strategy is one of marketplace strategy Strategic (Supply Chain) Role
(i.e., winning in the marketplace against competitors, A situation in which supply chain management is the
entrenched or incipient). Strategy creation involves most important corporate function and thus dominates the
both goal formulationdeined in terms of external deinition of corporate strategy. (Hanebeck, 2005)
stakeholders rather than operational milestonesand
crafting of the strategic means by which to accomplish these Strategic Thinking
goals. Implementation refers to the means of executing the The way in which everyone in an organization, as well
created strategy. (Narayanan, 2005) as its external stakeholders, focus irst on value added
for external clients and society, and then (and only then)
Strategic Objective deine what the organization should deliver, produce, do,
Long-term objective, such as innovation, rationalization, and use. (Kaufman & Lick, 2005)
eficiency, quality, and so forth. (Tremblay, 2006a)
Strategic Vision for Information Technology
Strategic Outsourcing A vision statement of how the organization will use
An arrangement attractive on purely cost grounds might be information technology to achieve its organizational
rejected because it reduced the clients ability to react to a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St rat e gic V ision for t he I T Func t ion St re a m ing M edia 649

vision. Like the organizations strategic vision, it is not Strategy Map


as speciic as is the strategic vision for the information A depiction of strategic objectives with linkages with the
technology function. (Brabston, 2005) aim of showing transformation of various organizational
S
resources into desired outcomes. (Saha, 2005)
Strategic Vision for the IT Function
A vision statement that articulates the organizational role Stratiied Sampling
of the IT function as well as the dominating values applied 1: A speciic procedure for biased sampling, where the
in carrying out these roles; affects the function of the IT database is partitioned into different strata, and each
department, but not necessarily the rest of the organization stratum is uniformly sampled at different sampling rates.
directly. (Brabston, 2005) Tuples that are more important for aggregation purposes,
such as outliers, are put into strata that are then sampled
Strategy at a higher rate. (Das, 2005) 2: For this method, before
1: A business plan of action. (Hunter, 2005) 2: A detailed the samples are drawn, the population P is divided into
plan for achieving success in situations such as war, politics, several strata, p1, p2,.. pk, and the sample S is composed of
business, industry, or sport, or the skill of planning for k partial samples s1, s2,.., sk, each drawn randomly, with
such situations. (Lubbe, 2005) 3: A plan or method for replacement or not, from one of the strata. (Lutu, 2005)
obtaining a speciic result. (Ajiferuke & Olatokun, 2005)
4: A planning, rational process through which the company Stream
chooses a certain mode of development, from among all 1: An aggregate of one or more lows, treated as one
of the possible ones, and maintains that direction through aggregate for the purpose of forwarding in layer-2 or layer-
a well-deined period (design view). In the process view, 3 nodes (e.g., may be described using a single label). In
strategy is a process that might change on the way, giving many cases, a stream may be the aggregate of a very large
rise to an emergent strategy. The realized strategy might number of lows. (Gutirrez & Ting, 2005) 2: This technique
be different than the original intended strategy. (Scupola, is for transferring data such that it can be processed as
2005) 5: A systematic plan of action for deliberately a steady and continuous stream. Streaming technologies
using an organizations resources in ways that fulill that are becoming increasingly important with the growth of
organizations purpose. (Holsapple & Jones, 2006) 6: The the Internet because most users do not have fast-enough
determination of the basic long-term goals and objectives of access to download large multimedia iles quickly. If the
an organization, and the adoption of courses of action and stream is for transferring multimedia data, it is called a
allocation of resources necessary for achieving these goals; multimedia stream. (Yang et al., 2005b)
major components of strategy include: goals, product/
market focus, business system focus, and competitive Stream Window
premise. (Craig, 2005) A mechanism to extract a inite set of records from an
ininite stream. This mechanism selects stream items based
Strategy Formulation on time periods, counting, or explicit starting and ending
The process by means of which the desired portfolio conditions. (Chatziantoniou & Doukidis, 2005)
of product-market-technology combinations is deined
and updated. This process can be modeled using the Streaming
viable system model consisting of four steps: deining Sending multimedia data to a client device at a rate the
proposals for innovation, reviewing these proposals, enables it to be played without having to store it. (N.C.
inalizing proposals, and consolidating inalized proposals. Rowe, 2005a)
(Achterbergh, 2005b)
Streaming Media
Strategy Framework The process by which multimedia iles (e.g., audio iles,
Strategy drives the deinition of processes, which in video iles, and music iles) are delivered through the
turn rely on technologies for their lawless execution. Internet. Such iles are often very large, tens or hundreds
(Hanebeck, 2005) of megabytes in size. (Shea & Davis, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
650 St re a m ing T im e Se rie s St ruc t ura l M ode l

Streaming Time Series Structural Determination


A sequence of values, where each value corresponds to a The principle that the actual course of change in an
S time instance. The length changes, since new values are autopoietic system is controlled by its structure rather than
appended. (Kontaki et al., 2005) direct inluence of its environment. (Abou-Zeid, 2005b)

Streaming Video Structural Equivalence


A technique for transferring data as a steady and continuous 1: The extent to which the tie patterns of two or more
stream. A browser or plug-in can start displaying the data nodes of the network are equal. (Dekker, & Hendriks,
before the entire ile has been transmitted. (Burke et al., 2006) 2: Two actors are structurally equivalent if they
2005) have mathematically identical connections (structural
similarity) to and from all other actors in a network. The
Strength of Weak Ties actors who occupy same social positions are said to be
In knowledge management, it means ideas can be shared, structurally equivalent. (Assimakopoulos & Yan, 2006)
not with intimate colleagues, but with slight acquaintances.
(Yamazaki, 2006) Structural Hole
1: A gap or lack of a connection in a social network.
Strength, Weakness, Opportunity, and Effect (Smatt & Wasko, 2006) 2: A gap in a network, which
(SWOT) Analysis isolates one set of actors from another. Individuals whose
A popular way to conduct e-commerce business plan personal ties bridge such gaps can exercise a brokerage
evaluation with business environmental scanning based on role, which beneits them personally and facilitates the
internal environmental factors (strengths and weaknesses) low of information and resources through the network.
and external environmental factors (opportunities and (Nelson & Hsu, 2006)
threats). (Chen, Li, Kong, et al., 2006)
Structural Link
String Edit Distance A link between two objects expressing the structure of
The edit distance between two strings is deined as the system. (Dori, 2006)
the minimum number of edit operationsinsertions,
deletions, and substitutionsneeded to transform the Structural Mechanism
irst string into the second (matches are not counted). In order to ensure that ethical decisions are practiced
(Katsaros et al., 2005) routinely, it is important to create positions and structural
mechanisms that reinforce ethical behavior. Without
Strong Rule structural mechanisms, a code of ethics will be forgotten.
An association rule whose support (of the union of itemsets) An example of such a mechanism is the social or ethical
and conidence are greater than user-speciied minimum audit designed to assess whether the organization is
support and conidence, respectively. (Shen, 2005) practicing what it states in its formal guideline. (Grieves,
2006a)
Strongly Connected Component (SCC)
A subgraph of a directed graph, in which between each Structural Mining of Texts
pair of nodes there exists a path. (Chen, 2005a) The process of partitioning texts into components and
inding relations among the found components. (Kulyukin
Structural Coupling & Nicholson, 2005)
The ongoing mutual co-adaptation between a system and
its environment. (Abou-Zeid, 2005b) Structural Model
1: A model concerned primarily with the internal workings
Structural Design and architecture of the system, and on what principles
Forms of structure derived by optimal combinations of it operates and how a system achieves its functionality.
structural variables with information technology and (Maceield, 2006) 2: A UML model describing static
business strategy in a way that increase competitive structure (relationships and properties). (D. Brandon,
advantage. (Theodorou, 2005) Jr., 2005a)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St ruc t ura l Re st ric t ion St ruc t ure d Que r y La ngua ge (SQL) 651

Structural Restriction Structure-Based Retrieval


Condition that relates one attribute or variable value with Retrieval based on document structure. This includes
respect to other possible values of the same attribute or retrieval based on element units, as well as logical inclusion
S
variable, or to the value of others attributes. In database relationships among elements, because an element is a
terminology, a structural restriction is a kind of integrity basic unit of XML documents. (Chang, 2005)
constraint. Some examples of structural restrictions are:
uniqueness of an attribute value, key for attribute, and Structured Document
foreign key for attribute. (Aldana Montes et al., 2005) 1: A textual representation of any object, whose content
could be organized around a well-deined structure. (de
Structural Variable Campos et al., 2005) 2: Document made by composing well-
One of the most important elements of structure (variables) delimited pieces of content that can present an inclusion
that characterize and form the structural design (span of hierarchy between them. (Martnez-Gonzlez, 2005)
control, levels of hierarchy, level of standardization, etc.).
(Theodorou, 2005) Structured Information
Information that is speciic. An example is the price of a
Structuration Theory product. (Gangopadhyay & Huang, 2005)
A theory of societal processes on a high abstraction level.
Adaptive structuration theory focuses on the analysis of Structured Query Language (SQL)
the way existing technologies are taken up by groups and 1: A standard language for querying and updating a
evolve in their role during the appropriation process (i.e., relational database. (Shoval & Kabeli, 2005) 2: A standard
the process of adaptation to new technical tools, which interactive programming language used to communicate
changes the original situation). (Verburg et al., 2005) with relational databases in order to retrieve, update, and
manage data. (Lin et al., 2005) 3: A language for sending
Structure queries to databases. SQL was developed by IBM in the
1: Characteristic of a decision situation that determines mid-1970s as a way to get information into and out of
whether the problem it involves can be programmed relational database management systems (RDBMSs).
or described in speciic terms (i.e., for the purpose of A fundamental difference between SQL and standard
developing a relevant DSS). (Pomerol & Adam, 2005) 2: programming languages is that SQL is declarative. You
The physical embodiment of a systems organization in a specify what kind of data you want from the database, and
certain physical domain. (Abou-Zeid, 2005b) the RDBMS is responsible for iguring out how to retrieve
it. (Raisinghani & Sahoo, 2006) 4: A widely accepted
Structure and Structural System standard for retrieving information from and updating
Structure can be referred to as the continuum material, relational databases. (Millet, 2005) 5: The standard
whereas the structural system consists of structures that language for deinition and manipulation of relational
are connected at joints. (Kanapady & Lazarevic, 2005) databases. (Dadashzadeh, 2005) 6: Widely used standard
language for the declarative description, querying, and
Structure Capital updating of stored data. SQL also allows expression of
The knowledge embedded within the routines of an database schemata including integrity constraints. By an
organization involves organizational structure, culture, extension with procedural constructs, it also allows the
and technology. Structure capital includes a technological expression and execution of triggers. (Decker, 2005) 7:
component and architectural competencies. (Hsu & A standard interactive and programming language for
Mykytyn, Jr., 2006) getting information from and updating a database. It was
developed by IBM in the mid-1970s for relational database
Structure of Academic-Industry Collaboration management systems. (Pardede et al., 2005) 8: A standard
The representation of social practices among the interactive and programming language for accessing and
stakeholders affecting academic-industry collaboration manipulating a database. Its commands include selection,
that result in the establishment of rules of practice and the insertion, update, deletion, inding out the location of data,
provision of resources. (LeRouge & Webb, 2005) and so forth. (Hu, Yang, Yeh, et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
652 St ruc t ure d Que r y La ngua ge (SQL): 1 9 9 9 (SQL: 1 9 9 9 ) Subcla ss

Structured Query Language (SQL): 1999 (SQL: Student-Generated Multimedia (SGM)


1999) The speciic case when students create multimedia
S The most recent of the SQL standard, published in 1999, products rather than the instructor or outside developer.
which is based on an object-relational model. Thus, it is a The purpose of SGM is to serve as a conduit for enhancing
standard database language for object-relational databases. student learning of conceptually challenging material.
(Zendulka, 2005b) (Mitchell, 2005c)

Structured System Analysis (SSA) Student-Generated Multimedia Learning


A traditional, functional-oriented methodology for Challenge
analyzing information systems which utilized data low The purpose of using an SGM learning challenge is to
diagrams. (Shoval & Kabeli, 2005) encourage key priming agents to be activated. The purpose
of the structure of such a challenge is to maximize the
Structured System Design (SSD) likelihood that students will achieve meaningful outcomes
A traditional methodology for designing information through the creation of student-generated multimedia
systems which utilized structure charts. (Shoval & Kabeli, products. (Mitchell, 2005c)
2005)
Study Unit
Structured UDT: See Structured User Deined Type. Composed of a number of components that have embedded
the teachers teaching experience. The form of these
Structured User Deined Type (UDT) components can be text notes and examples (with formulas,
A database schema object in SQL:1999 that allows types tables, drawings, and pictures), interactive or animated
of objects, which encapsulate both attributes and methods, demonstrations, quick quizzes or self-tests, and so forth.
to be speciied. SQL/MM DM is based on this feature of For Web courses, the Web page is often the physical unit for
SQL:1999. (Zendulka, 2005c) study, that is, each study unit corresponds to an individual
Web page. (Y.J. Zhang, 2005)
Student Support
All activities and arrangements that are put in place S2PL: See Server-Based Two-Phase Locking.
to facilitate the achievement of the intended learning
outcomes. (Naidu, 2005b) Sub-Sequence Matching
Identiication of similar sub-sequences (segments) from
Student Support Service multiple time series. Sub-sequence matching is used for
One of the services provided by the distance education satisfying queries that look for a particular pattern in one
provider to the students (prospective and matriculated) to of more time series, or identifying the similarities among
facilitate their success at the learning institution. (Howell multiple time series by comparing pieces of those time
& Wilcken, 2005) series. (Sayal, 2005)

Student-Centered/Active Learning Subband Coding (SBC) Filter Bank


Places the student into active, self-directed learning, Consists of an analysis ilter bank followed by a synthesis
learning by enquiry, and ownership of the learning goals. ilter bank. This type of ilter bank is used for partitioning
Active learning strategies include problem-based learning, signals into subbands for coding purposes, and vice versa.
project-based learning, inquiry-based learning, and work- (Jovanovic-Dolecek, 2005b)
integrated learning. (Lowry & Turner, 2005)
Subclass
Student-Centered Learning Environment 1: A class that is derived from at least one other class.
An environment in which the instructor incorporates to (Alhajj & Polat, 2005) 2: Same as specialization; a
a great extent the use of active learning strategies and meaningful subgrouping of entity sets that needs to be
student experiences. (Blicker, 2005) represented explicitly. These subgroups are a subset of
the entities that belong to the entity set from which they
are derived. (Bagui, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Subgraph Suficient Test 653

Subgraph taxonomy. The subsumed entity inherits the characteristics


A graph G whose vertices and edges form subsets of the of the classes above it. Example: The term dog exists in
vertices and edges of a given graph G. If G is a subgraph a subsumption relationship to the family Canidae, and
S
of G, then G is said to be a supergraph of G. (Fischer & inherits canine characteristics; dog does not, however,
Meinl, 2005) exist in a subsumption relationship to the family Felidae, so
logically it cannot inherit feline or cat-like characteristics.
Subgraph Isomorphism (Buchholz, 2006) 2: For clauses in conjunctive normal
Decision whether a graph G is isomorphic to a subgraph form, a clause C subsumes (i.e., contains) a clause D if
another graph G. This problem is known to be NP-complete. there exists a substitution s such that the set of predicates
(Fischer & Meinl, 2005) of Cs are a subset of the predicates in D. The subsumed
clause D may be safely deleted, as it adds nothing to
Subschema Similarity the logical meaning of the conjunctive normal form in
A particular interschema property. It represents a similitude a Boolean logic. (Buehrer, 2005) 3: Standard reasoning
between fragments of different schemas. (De Meo, service provided by digital libraries (DLs). It is used to
Terracina, et al., 2005) check if an expression, formalized in DL, is more speciic
than another one w.r.t. the knowledge elicited for a given
Subscriber Identity Module (SIM) domain. More formally, given a TBox T and two concepts
1: A device in the GSM that contains the subscribers C and D, C subsumes D if C is more general than D in
authentication information, such as cryptographic any interpretation satisfying inclusions and deinitions of
keys, and a unique identiier called international mobile T. (Colucci et al., 2006)
subscriber identity. (Lee, Kou, et al., 2005) 2: Smart card
deployed in the mobile terminal, used by the GSM network Subsystem
to identify the subscriber. (Gilbert, 2005b) Any immediate inner system that is subsumed to the
system. (Gelman et al., 2005)
Subscription Fee
Payment by a visitor in exchange for access to content or Success of a Community of Practice
services on the Web site. (Shan et al., 2006b) Can be measured in different ways, either in terms of
speciic objectives (innovation, rationalization, etc.) or
Subsidiary Awareness in terms of organizational learning, and professional and
Polanyis term for perception to which an individual does personal enrichment. (Tremblay, 2006a)
not have direct access, as it is not part of his or her focal
awareness. Contrasts with focal awareness. (Zappavigna- Success Surrogate
Lee & Patrick, 2005) A proxy for information systems success that takes the form
of measurable values. A success surrogate is a dependent
Subspace Clustering variable. (McHaney, 2005)
1: An extension of traditional clustering techniques that
seeks to ind clusters in different subspaces within a given Successive Approximation
dataset. (Ma & Li, 2005) 2: Simultaneous clustering of Correct performance of the subskills that lead to a speciic
both row and column sets in a data matrix. (Domeniconi target behavior. (Lazarus, 2005a)
& Gunopulos, 2005)
Suck Sites
Substitution Probability Matrix Hate or revenge sites. Web sites that focus on consumer
A matrix whose i, j entry is the probability of substituting complaints and dissatisfaction with speciic companies.
DNA character j (C, G, T, or A) for character i over a (Goldsmith, 2006)
speciied time period. (Burr, 2005b)
Suficient Test
Subsumption Veriies that an update operation leads a consistent database
1: An entity exists in a subsumption relationship to state to a new consistent database state. (Ibrahim, 2005)
another entity when it falls in a directly lower class in the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
654 Sufix Trees and Arrays Supervised Learning

Sufix Trees and Arrays Superclass


Text indexes that permit fast access to any text substring. 1: The main set (entity) from which subsets (subclasses)
S (Navarro, 2005) are deined based on meaningful criteria needed for a
particular database. (Bagui, 2005) 2: A class that is used
Summary Attribute to derive other classes. A superclass is also called a parent
The numerical result of the application of aggregative class or base class. The classes that are derived from a
functions to row data. It is described by the set of category superclass are known as child classes or derived classes.
attributes that form the multi-dimensional aggregate data A superclass allows for a generic interface to specialize
structure (table or data cube). (Rafanelli, 2005) functionality through the use of virtual functions. (Wong
& Chan, 2006)
Summary-Schemas Model
A content-aware organization prototype that enables Superimposition
imprecise queries on distributed heterogeneous data The process of matching two 3D structures by alignment
sources. (Hurson & Yang, 2005) through rigid translations and rotations. (X. Wang,
2005)
Summative Evaluation
1: An evaluation designed to present conclusions about the Superior Structure
merit of a program and recommendations about its future. When superior structure is present, the online program has
(Nelson, 2005) 2: Evaluation that is usually performed met the DDLM-deined standard for consumer demands
at the end of the design process. Summative evaluation of high-quality content, high-quality delivery, and high-
indicates that the evaluation outcomes are used to describe quality service. (MacDonald et al., 2005)
and portray any given object of the evaluation, with no
intent to use the evaluation results for improvement and Supervised Classiication
change. (Zaphiris & Zacharia, 2005) 3: The collection Given a collection of labeled patterns, the problem in
of usability data to evaluate a completed system in use. supervised classiication is to label a newly encountered
(Danielson, 2006b) 4: The elicitation of information that but unlabeled pattern. Typically, the given labeled patterns
can be used to determine if a program should be continued are used to learn the descriptions of classes that in turn
or terminated. (Nash et al., 2005a) 5: The gathering of are used to label a new pattern. (Huang, 2005)
data from stakeholders on an innovation following its
implementation. (Naidu, 2005a) Supervised Graph
Graph in which each vertex and edge can belong to multiple
Summative Evaluation of Learning categories to varying degrees. Such a graph complicates the
Used with the intention of assigning a rating or grade. ability to clearly deine transactions on which to perform
(Diamadis & Polyzos, 2005) data mining. (Holder & Cook, 2005)

Sunk Cost Supervised Learning


The initial investment in a project or program that will not 1: A learning process in which the exemplar set consists
be recouped. Can include ofice space, supplies, hardware, of pairs of inputs and desired outputs. The process learns
software, and training. (G. Lang, 2005) to produce the desired outputs from the given inputs.
(Lingras et al., 2005) 2: A machine learning technique
Super-Imposed Object for creating a function from training data; the task of the
Super-imposition is an image processing problem that supervised learner is to predict the value of the function
occurs in music notation as music symbols are placed for any valid input object after having seen only a small
upon the stave lines. Separating the symbol from the number of training data. (Bashir et al., 2005) 3: A machine
lines becomes an important task in most approaches to learning technique for creating a function from training
recognition. Approaches either attempt to remove the stave data. The training data consists of pairs of input objects
lines or segment the music symbols. (George, 2005b) and desired outputs. (Fernndez & Layos, 2005) 4:
Learning how to label each data point in a dataset through

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Supervised Learning (Classiication) Supply Chain 655

consideration of repeated examples (training set) where the managers of utilities to operate the equipment and deliver
labels are known. The goal is to induce a labeling for data services to customers. (Jeong et al., 2006)
points where the labels are unknown (test set). (Musicant,
S
2005) 5: This is performed with feedforward nets, where Supplantive Method
training patterns are composed of an input vector and Explicitly provides a linear approach to learning by
an output vector that are associated with the input and directing the learner speciically in the learning process.
output nodes, respectively. An input vector is presented The purpose is to limit the effort necessary for structuring
at the inputs together with a set of desired responses, one the learning. (Stavredes, 2005a)
for each node. A forward pass is done, and the errors or
discrepancies between the desired and actual response for Supplemental Model of Course Redesign
each node in the output layer are found. These are then This model retains the basic structure of the traditional
used to determine weight changes in the net according to course, usually simply adding technology-based, out-of-
the prevailing learning rule. (R., 2005) class activities. (Twigg, 2005)

Supervised Learning (Classiication) Supplier


In supervised learning, the learning machine is given a 1: Individual or irm that conducts business within the
training set of examples (or inputs) with associated labels boundaries of a communitys place. (Porto Bellini &
(or output values). Usually, the examples are in the form Vargas, 2006) 2: Refers to the entity which provides wanted
of attribute vectors, so the input space is a subset of Rn. or needed goods and services. (Barima, 2006a)
When the attribute vectors are available, a number of sets
of hypotheses could be chosen for the problem. (Awad & Supplier Relationship Management (SRM)
Khan, 2005) 1: The vendor side analogy to CRM aimed at the effective
management of the supplier base. SRM facilitates
Supervised Training the management of the supplier relations in its entire
Learning process of artiicial neural networks where each lifecycle. (Mller, 2005) 2: Assuming one has a supply
desired response (target) for each input pattern (example) chain to manage, then supplier relationship management
is available in the training data. (Castro & Braga, 2006) is a higher level view of how eficient and proitable any
given supply chain is. SRM products help to highlight
Supervised/Unsupervised which parts are often in short supply or bought on spot-
A supervised learning algorithm searches a functional markets at high prices; which suppliers are often late or
link between a class-attribute (or dependent attribute or have quality problems; and conversely, which suppliers
attribute to be predicted) and predictive attributes (the are reliable, lexible, comprehensive, and cost-effective.
descriptors). The supervised learning process aims to SRM products help management decide how to ine-tune
produce a predictive model that is as accurate as possible. the supply chain and recommend to engineering and
In an unsupervised learning process, all attributes play manufacturing which vendors and parts to avoid when
the same role; the unsupervised learning method tries to possible. (Rahman, 2005e)
group instances in clusters, where instances in the same
cluster are similar, and instances in different clusters are Supplier-Buyer Power Relationship
dissimilar. (Muhlenbach & Rakotomalala, 2005) The perceived or real ability of an organization to use
its connection, association, or involvement with another
Supervisory Control organization to assert inluence on the transaction of goods,
Formal actions by management to enhance the likelihood services, or information. (Turner, 2006)
that employees will act in ways that management wishes
them to act or in ways that are beneicial to the organization. Supply Chain
(King, 2006a) 1: A distribution channel of a product, from its sourcing,
to its delivery to the end consumer (also known as the
Supervisory Control and Data Acquisition value chain). (Verbraeck et al., 2006) 2: A network of
(SCADA) companies interacting among themselves with the ultimate
Systems used to control the operations of utilities. These aim of providing needed goods and/or services to the inal
are typically computer-based applications that enable consumer. Three main items that low among the entities

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
656 Supply Cha in M a na ge m e nt (SCM ) Suppor t

are goods/services, information, and funds. (Aigbedo, Supply Chain Performance


2005) 3: A network of organizations that provide goods Often measured by the supply chains proitability, which
S or services to each other. (Brindley, 2006) 4: Network is the difference between the revenue generated from the
of suppliers, storage facilities, distributors, transporters, customer and the total cost incurred across all stages of
and retailers that participate in the sale, delivery, and the supply chain. Supply chains that perform competitively
production of a particular product. (Braun, 2005c) 5: A provide a high level of product availability to the customer
series of activities that are involved in the transformation while keeping costs low. (Abraham & Leon, 2006)
of raw materials into a inal product that is purchased
by a customer. (Mathieu & Levary, 2005) 6: In its basic Supply Chain Strategy
form, a buyer-centric chain or network of independent The choice and performance of unique activities within
companies that are loosely inter-linked by activity along supply and demand management to ultimately achieve
a manufacturing, servicing, and distribution channel of corporate strategy. (Hanebeck, 2005)
a product service specialty, from sources of raw material
to delivery to an end customer. Supplementary to this Supply Chain System
supply chain management is a set of approaches utilized One type of network of business organizations who work
to integrate suppliers, manufacturers, warehouses, retail together to produce, distribute, and sell products. They
stores, and so on. Consequently, merchandise is produced typically consist of suppliers of raw materials as well
and distributed in right quantities, and to right locations as parts or components, manufacturers and assemblers,
at the right time, to minimize system-wide costs, while distribution companies, original equipment manufacturers,
at the same time satisfying service-level requirements. wholesalers, and retailers. (Abraham & Leon, 2006)
(Richards et al., 2005)
Supply Context
Supply Chain Management (SCM) The conceptual part of a consumer context composed of
1: Software system for procurement of materials, resources that can potentially supply what the consumer
transformation of the materials into products, and needs. Supply context-aware applications mainly help
distribution of products to customers, allowing the consumers obtain interesting and useful supply context
enterprise to anticipate demand and deliver the right information regarding their consumption needs. (Sun &
product to the right place at the right time at the lowest Poole, 2005)
possible cost to satisfy its customers. (Rashid, 2005) 2:
Deined as process or processes involved for the supply Supply Web
of items and services from vendor through to customer. An elaborated web of supply chains intersecting each
(Sharma, 2006c) 3: Systems provide information that other. A small business can be on one or more of the supply
assist in planning and managing the production of goods. chains within this web. Supply chains within this web may
For instance, SCM assists in answering questions such as or may not be in the same industry. (Poon, 2005)
where the good is to be produced, from which the parts
are to be procured, and by when it is to be delivered. Supply-Driven View of Knowledge
(Mller, 2005) 4: The integration of all activities in the A view of knowledge stemming from the knowledge itself
value chain that provide products, services, and value to rather than its uses. Often related to a continuum of data-
customers. These activities include purchasing, materials information-knowledge. (J.S. Edwards, 2005)
management, production planning and control, inventory
control and distribution, and delivery. (Tarafdar, 2005) 5: Supply-Side Stakeholder
Automates the relationship between businesses and their A person or agency that is responsible for offering e-
suppliers to optimize shared processes. An example of government services, and who will have an impact on its
this relationship is suppliers through the Internet viewing design and functioning in a practical sense. (De, 2005)
supply levels of a company and responding automatically
through sending more supplies, without the company Support
directing the supplier to do so. (Carstens, 2005) 1: The use of synchronous and asynchronous technology by
a tutor to interact with learners at a distance. (Ally, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Suppor t Count of a n I t e m se t Suppor t Ve c t or M a chine (SV M ) 657

2: A parameter used in the association-rules method for Support Set


determining the percent of data cases that support both A set of variables S for a data set (T, F) such that projections
the antecedent of the rule X and the consequent of the of T and F on S still have an extension. (Boros et al.,
S
rule Y in the set of data cases D. (Swierzowicz, 2005) 3: 2005)
Given an association rule XY, the support of the rule
is the number of transactions that satisfy or match XY, Support System
divided by the total number of transactions. Support is an Set of people, policies, and resources that are offered
indication of a rules statistical signiicance. (Imberman & in service of organizational members; in some cases,
Tansel, 2006) 4: The percentage of the tuples in which that structures put in place to assist faculty in the development
subtuple occurs (T.Y. Lin, 2005) 5: The count of records and delivery of online instruction. (Baker & Schihl,
that satisfy a particular predicate in classiication rules. 2005)
(Richards & de la Iglesia, 2005) 6: The number of graphs
in the analyses database in which a subgraph occurs. Support Threshold
(Fischer & Meinl, 2005) 7: The rule AB has support s, A threshold value that is used to decide if an itemset is
if s% of all transactions contains both A and B. (Daly & interesting/frequent. It is deined by the user, and generally,
Taniar, 2005b) an association rule mining algorithm has to be executed
many times before this value can be well adjusted to yield
Support Count of an Itemset the desired results. (Woon et al., 2005)
1: The number of transactions that contain a particular
itemset. (Woon et al., 2005) 2: The fraction of transactions Support Vector
that have all items in that item set. (Denton & Besemann, A data point in a support vector machine classiication
2005) problem that lies on the wrong side of its corresponding
bounding plane. (Musicant, 2005)
Support of a Pattern
The number of database transactions in which the pattern Support Vector Machine (SVM)
occurs. (Kryszkiewicz, 2005) 1: A learning machine that can perform binary classiication
(pattern recognition), as well as multi-category
Support of a Rule classiication and real valued function approximation
The fraction of the rows of the database that contain both (regression estimation) tasks. (Song et al., 2005) 2: A
the antecedent and the consequent of the rule. The support particular optimization problem that determines the best
of a rule tells us in how many instances (rows) the rule surface for separating two classes of data. This separating
can be observed. (Ale & Rossi, 2005) surface is one that best satisies two possibly contradictory
goals: minimizing the number of misclassiied points, but
Support of Itemset X also reducing the effect of overitting. (Musicant, 2005) 3:
The fraction of the database that contains X, which is the Learning machine that can perform dificult classiication
ratio of the number of records containing X to the total and regression estimation tasks. SVMs nonlinearly map
number of records in the database. (Shen, 2005) their n-dimensional input space into a high-dimensional
feature space. In this high-dimensional feature space,
Support or Global-Support of Feature F a linear classiier is constructed. (Liu, 2005) 4: SVMs
Percentage of object transactions in the whole context (implicitly) map input examples into a higher dimensional
(or whole database) that possess f. (Saquer, 2005) feature space via a kernel function and construct a linear
function in this space. (Lodhi, 2005) 5: A system for
Support Rule eficiently training linear learning machines in kernel-
The support of a rule XIj, where X is a set of items and Ij induced feature spaces while respecting the insights of
is a single item not in X, is the fraction of the transactions generalization theory and exploiting optimization theory.
containing all items in set X that also contain item Ij. (Awad & Khan, 2005) 6: One of the most effective types
(Wong, & Fu, 2005) of learners for text categorization. They attempt to build
a classiier that maximizes the margin (i.e., the minimum

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
658 Suppor t -Orde re d Trie I t e m se t (SOTrie I T ) Sust a ina bil it y of VC

distance between the hyperplane that represents the than the bare minimum. Surface learners do not fully
classiier and the vectors that represent the documents). understand the subject matter. At best, they are able to
S Different functions for measuring this distance (kernels) recite facts. (Pritchard, 2005a)
can be plugged in and out; when nonlinear kernels are used,
this corresponds to mapping the original vector space into Surface Map
a higher dimensional vector space in which the separation A three-dimensional portrait of the earth surface. Here,
between the examples belonging to different categories the third dimension is the spatial processes of the social
may be accounted for more easily. (Sebastiani, 2005) environment of the study area. (Ali, Ashley, et al.,
2005)
Support-Ordered Trie Itemset (SOTrieIT)
A dual-level trie whose nodes represent itemsets. The Suring
position of a node is ordered by the support count of To navigate the Internet searching for topics of interest,
the itemset it represents; the most frequent itemsets are usually considered an undirected form of browsing.
found on the leftmost branches of the SOTrieIT. (Woon (Hwang & Stewart, 2005)
et al., 2005)
Survey
Supporting Compliance Monitoring Assurance Measurement procedure under the form of questions asked
A process or method supporting human or machine agents by respondents. The questions can be addressed through a
in verifying and assuring the validity of a generated written questionnaire that the respondent has to ill in or
suspected non-compliant event by assuring the necessary through a personal interview (following or not a written
and suficient evidence supporting the hypothesis of non- guideline). The items of the questionnaire can be open or
compliance. (Goldschmidt, 2005) multiple choice. (Pace, 2005)

Supporting (Supply Chain) Role Survey Knowledge


A situation in which supply chain management is driven by A type of spatial knowledge dealing with information
other, more important corporate functions and subsequently about location, orientation, and size of regional features.
translates corporate strategy into speciic requirements for (Sadeghian et al., 2006)
supply chain management. (Hanebeck, 2005)
Survival Time
Suprafunctional Use Quality The time to the occurrence of a given event. (Chen,
Quality experienced in interacting with a product or Oppenheim, et al., 2005)
service that does not have an immediate instrumental
value. Supra-functional user qualities include aesthetics Suspected Non-Compliance Event (SNCE)
and semantics that inluence the user experience but are An event triggering an exception by the primary monitoring
not the primary goal of use. (Knight, 2006a) facility that indicates instances of possible non-compliance.
The exception still requires veriication. (Goldschmidt,
Suprasystem 2005)
The immediate outer system that subsumes any system.
(Gelman et al., 2005) Sustainability
A situation in which a particular mechanism is viable for
Surface Credibility a longer period. (Borbora & Dutta, 2005)
A credibility assessment based upon features observable
via simple inspection. (Danielson, 2006c) Sustainability Failure
An initiative that succeeds initially, but then fails after a
Surface Learning year or so. (Velibeyoglu, 2005)
1: A concentration on lower-order cognitive skills, such
as recall of facts; rather than higher-order skills, such as Sustainability of VC
analysis, synthesis, and evaluation (associated with deep The extent to which the VC continues to attract and retain
learning). (Salter, 2005a) 2: Learning that goes no further its target members who identify with the mission of the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sust a ina ble Com pe t it ive Adva nt a ge Sym bolic Propa gat ion in Ba ye sia n N e t w ork s 659

community by taking part in the activities sponsored by Switching


the VC. (Chuang, 2006) The switching principle is a fundamental advantage that
a virtual organization has over a traditional one. Because
S
Sustainable Competitive Advantage the links between organizational functions are largely
1: Achieving and maintaining an advantage over other electronic and non-physical, it is easy to replace a weak
competing irms. (Jawahar, 2005) 2: Those factors which component with a stronger one. Where this activity could
enable an organization to maintain an advantage over be considerably expensive if the item in question was a
competitors in the long term. Typically, it is contended that physical supply chain, it may only be a change of suppliers
such advantage may be gained by the use of technology, for the virtual organization and can be made with a phone
but cannot be sustained from this source. (Green & call and database edit, as opposed to a building project.
Hurley, 2006) (J. Lee, 2005)

Sustainable Consumption Switching Cost


A recent movement in product design and consumer 1: Refers to how much cost it takes to switch from one
research on the need for a change in our patterns of vendor to another. (Liu & Tucker, 2005) 2: Refers to
consumption. The work cited here focuses particularly costs incurred by buyers when they switch to a different
on the meaningfulness of the products and services we supplier. (Lee, Chen, et al., 2006) 3: Refers to the hidden
consume as integral to this shift in attitude. (Kettley, costs consumers face when switching from one product or
2006b) technology to another in the marketplace. (Li, 2005b)

Sustainable Development SWOT Analysis: See Strength, Weakness, Opportunity,


Connected to the ideal of improvement achieved through and Effect Analysis.
self-reliant human scale development that lows from the
individual level to the local, regional, and national levels, Syllabus
and that is horizontally interdependent and vertically A detailed description of the topics, objectives, content, and
complementary. (Rhodes, 2005) assessment tasks for a course. (Hawkins & Baker, 2005)

SW-CMM: See Software Capability Maturity Model. Symbiotic Data Miner


An individual trained in business, information technology,
SVM: See Support Vector Machine. and statistics. The symbiotic data miner is able to implement
data-mining solutions, interpret the results, and then apply
SVD: See Singular Value Decomposition. them to business challenges. (Athappilly & Rea, 2005)

SWF: See ShockWave Flash. Symbolic Image


Consists of a set of objects; each object stands for an entity
SWIFT: See Society for Worldwide Interbank Financial in a real image. (Chan & Chang, 2005)
Telecommunications.
Symbolic Incentive
Swift Trust Incentive that does not have material value, but is culturally
1: Coincides with risk and uncertainty. It is needed in signiicant, for example, reputation and recognition. (Ekbia
circumstances where the history of working together is & Hara, 2006)
limited to learn trust. (Huotari & Iivonen, 2005) 2: A
type of trust that develops quickly on the basis of shared Symbolic Object
tasks rather than on the basis of similar demographics or A description of a concept that provides a way of obtaining
physical proximity. (Long et al., 2005) the extent or the set of individuals associated with the
concept. (Murthy & Diday, 2005)
Switch Control Unit
Implements the OBS signaling protocol, creates and Symbolic Propagation in Bayesian Networks
maintains the forwarding table, and conigures the optical A method that reduces the number of operations required
cross connect. (Rodrigues et al., 2005) to compute a query in a Bayesian network by factorizing

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
660 Sym bolic Rule Synchronous

the order of operations in the joint probability distribution. an integrated soundtrack, a separate video and sound ile
(Vargas, 2005) can be used and synchronized via SMIL. This allows
S users to choose difference combinations, for example,
Symbolic Rule to get a different language soundtrack, and permits text
A pattern explicitly comprising an antecedent and a transcripts to be optionally presented; both options have
consequent, usually in the form of IFTHEN. (Zhou, accessibility beneits. (Lin & Chen, 2005)
2005)
Synchronized Multimedia Document
Symbolic Score Multimedia systems usually integrate different types of
A representation of the music notation in symbolic, data streams, including continuous media (e.g., audio and
including a description of music symbols and their video) and discrete media (e.g., text and still images). Media
relationships. (Nesi & Spinu, 2005) data must be presented at precise time instants deined by
the rate of presentation. A media data stream schedules
Symmetric Graphical Model presentation of samples within a given time base. In this
The graph contains only undirected links. They are used way, objects in the same time base are synchronized. (Lin
to model symmetric relations among the variables. They & Chen, 2005)
give rise to the symmetric graphical models. (Giudici &
Cerchiello, 2005) Synchronous
1: A form of online discussion among students, workers,
Symmetric-Key Cryptography or instructors that is scheduled for a speciic time. It may
Sender and receiver agree on a common secret key. This be referred to as a live chat where all participants are
key is used to exchange encrypted messages. (Stickel, online at the same time in a virtual chat room. (Iannarelli,
2005) 2005) 2: At the same time. Live conversation. (Coakes,
2006b) 3: Communication in which interaction between
Syncategorematic Term participants is simultaneous. (Danenberg & Chen, 2005)
A linguistic term that cannot stand as the subject or the 4: Communication that requires both students and faculty
predicate of a proposition. It must be used in conjunction to interact online at the same time, such as in a real-time
with other terms, as it has meaning only in such combination. chat. (Etter & Byrnes, 2005) 5: Occurring at the same
(Andrade Ares, Garca, Rodrguez, & Silva, 2006) time. In the context of communications technologies,
synchronous technologies have communicators engaging
Synchronization in the communication experience or event at the same
1: In multimedia, synchronization is the act of coordinating time or in real time. For example instant messaging or
different media to occur or recur at the same time. chat rooms. (Newberry, 2005) 6: Occurring at the same
(Guan, 2005d) 2: Connects handheld devices to desktop time; typically used to refer to technologies such as chat.
computers, notebooks, and peripherals in order to transfer (Ordonez, 2005) 7: Online communication that is carried
or synchronize data. Other than using serial cables to out with all parties at the same time. For example, a
connect handheld devices and other computing equipment, Webcast and a chat-room discussion are both forms of
many handheld devices use either an infrared port or synchronous communication. (Paoletti, 2005) 8: Refers
Bluetooth technology to send information to other devices. to the ability for members of a learning community to
(Hu, Yeh, Yang, et al., 2006) 3: The harmonization of data complete a task at the same time. Computer whiteboards
on two (or more) digital devices so that both (all) contain and chat tools are examples of synchronous tools used
the same data. Data commonly are synchronized on the in the Web-based environment. (Morphew, 2005) 9: To
basis of the date they were last altered, with synchronization make event/meeting/discussion happen at the scheduled
software facilitating the process and preventing duplication time at different locations for different groups of people.
or loss of data. (Garrett, 2006b) It is basically used to create face-to-face environments.
(Nandavadekar, 2005) 10: Transmission in which the data
Synchronized Media Integration Language character and bits are transmitted at a ixed rate with the
(SMIL) transmitter and receiver being synchronized. (Calzonetti
A markup language designed to present multiple media & deChambeau, 2006)
iles together. For instance, instead of using a video with

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Synchronous a nd Asynchronous Com m unic at ion Synchronous Dist a nc e De live r y 661

Synchronous and Asynchronous 10: Communication that occurs between two or more
Communication people in which the communication is done in sync or at
1: Synchronous communication via the Web is immediate the same time (e.g., instant messaging, phone contact, or
S
communication, such as in chat or instant messaging. videoconferencing). (Day, 2005)
Asynchronous communication is delayed communication
via the Web, such as threaded discussions, forums, or e- Synchronous Communication Channel
mail messages, where each participant does not have to be Communication channel that allows real-time interaction.
online at the same time. (Marold, 2005) 2: Synchronous Includes telephone, videoconferencing, chat, and of course,
communication is when messages are exchanged during face-to-face communication. (Pauleen, 2005)
the same time interval. (Burke et al., 2005)
Synchronous Communication Tool
Synchronous and Asynchronous Learning 1: Communication occurs real time. Conferencing tools
Activity are synchronous. Participants must be together at the same
Event, either in real time or delayed time, in which a time for the communication event to occur. (Schoenfeld &
learner increases his or her skills and knowledge. (Brace Berge, 2005) 2: Tool that facilitatse communication at the
& Berge, 2006) same time. The best example is the telephoneif nobody
answers, no communication channel can be established.
Synchronous Collaboration (Karoulis & Pombortsis, 2005b)
Collaborative interactions, for example, over the Internet,
carried out in real time, such as chat, video/audio Synchronous Computer-Mediated
conferencing, and shared applications. (Carroll et al., Communication (SCMC)
2005) The tools available include chat, desktop videoconferencing,
and GroupWare. Synchronous computer-mediated
Synchronous Communication communication techniques allow participants to contribute
1: Real-time communication requiring all communication from different locations at the same time, although
partners to be present at the same time. Many types GroupWare tools are typically used in a single location.
of chat environments offer synchronous computer- (Salter, 2005a)
mediated communication. (Roberts et al., 2006b) 2:
Communication that occurs in real time. For two or more Synchronous Cooperation
people to communicate synchronously, they need to be Members are present at the same time within the
available at the same time. Synchronous communication cooperation group (co-presence). The communications
utilizes such tools as chats and videoconferencing. (Erlich, among them are interactive and made with live media,
2005). 3: Communication where the relay of information such as videoconferences or application sharing spaces.
is simultaneous and therefore occurs in real time (e.g., (Villemur & Drira, 2006)
chat, audio and videoconferencing). (Stodel et al., 2005)
4: Computer-based communication in which interaction Synchronous Discussion
between parties takes place simultaneously. (Ketelhut et al., 1: Occur when all participants are online and actively
2005) 5: Information exchanges taking place in the same involved in the discussion at the same time. (Ingram, 2005)
space and time, often face-to-face. (Wong-MingJi, 2005) 6: 2: The immediate exchange of messages in real time. It is
Interaction between individuals where information is sent best used for sharing ideas and brainstorming. (Ingram
and received at the same time, as in audio conferencing & Hathorn, 2005b)
or online chat. (Ally, 2005d) 7: Online interactive or real-
time communication between the student and instructor Synchronous Distance Delivery
or among students. (Gold, 2005) 8: Real-time exchange Requires that all involvedstudents, teachers, and
of messages. (Han & Hill, 2006) 9: Tools that enable real- facilitatorsbe connected and participating at the same
time communication in the online environment, such as time with the ability to interact and to transmit messages
chat rooms and videoconferencing. (S.-K. Wang, 2005) and responses simultaneously. (C. Wright, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
662 Synchronous Dist a nc e Le a r ning Synt a c t ic M e t a dat a

Synchronous Distance Learning Synchronous Optical Network (SONET)


The mode of distance learning where provider and recipient Enables synchronous real-time multimedia transmission
S are communicating in real time, that is, talking to each via optical iber at rates ranging from 51.84 Mbps (OC-1) to
other or seeing each other while geographically apart. 13.21 Gbps (OC-255). SDH is the international equivalent
(Kostopoulos, 2005) of SONET. (Littman, 2005)

Synchronous Electronic Learning Synchronous Replication


Communication occurs at the same time between Eager replicationthat is, transaction updates are
individuals, and information is accessed instantly. propagated before the transaction is committed. (Muoz-
Examples of synchronous e-learning include real-time chat Esco et al., 2005)
and video/audio conferencing. Synchronous e-learning can
provide instant feedback on a students performance and Synchronous System
allows the training to be adjusted immediately if needed. Requires the simultaneous participation of students with
The disadvantages of synchronous e-learning are that the faculty in real time, that is, the modeling of a virtual
training is not self-paced, and the logistics of scheduling, classroom. It involves the use of live chat, white boards,
time zones, and student availability need to be managed. and video and audio conferencing. (Sivakumar, 2006)
(Galitsky, 2005b)
Synchronous Technology
Synchronous Group Communication 1: Technology that allows communication to occur within
Technology a very short ixed time interval, such as audio conferencing
Allows real-time, interactive communications and requires or videoconferencing. (Wei & Wang, 2006) 2: Technology
participants to be online simultaneously. (Turoff et al., that supports simultaneous participation at distributed
2005b) locations in real time and include immediate, two-way
communication between participants. (Wild, 2005)
Synchronous Learning
1: A real-time, instructor-led online learning event in Synchrony
which all participants are logged on at the same time 1: A feature of any communication medium. A
and communicate directly with each other. (Torres- communication medium is synchronous if the recipient of a
Coronas, 2005) 2: Learning that occurs in real time. message can respond immediately. For example, telephone
Classroom-based, face-to-face instruction is an example and instant messaging are synchronous communication
of synchronous learning. (Chapman, 2005a) 3: Online media, while e-mail and voicemail are asynchronous
courses and activities that require students and teachers communication media. (Y.D. Wang, 2005) 2: Simultaneous
to be online at the same time. (Lazarus, 2005b) occurrence of two or more events. Synchronous features
would make it possible to perform lectures, demonstrations,
Synchronous Media and group activities in real time. (Rollier & Niederman,
Real-time delivery of media (e.g., videoconferencing). 2005)
(Whateley et al., 2005)
Synergy Project
Synchronous Mode A team-developed project. (Melkonyan, 2005)
Real-time education where students and teachers can have
a dialogue simultaneously, for example, by using chat. Synonymy
(Lammintakanen & Rissanen, 2005a) A particular interschema property. A synonymy between
two concepts A and B indicates that they have the same
Synchronous Online Distance Education meaning. (De Meo, Terracina, et al., 2005)
Courses which use software to provide video, audio, and
information to students who are not physically attending a Syntactic Metadata
class, but who are required to be at a speciic location at a Metadata that describes a documents structure and/or
speciic time to participate in the class. (Novitzki, 2005) format. For example, document language, document

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Synt a c t ic Se a rch Syst e m 663

size, and MIME type might all be included as elements correspond to different data sets and scenarios of real-
of syntactic metadata. (Banerjee et al., 2005) world behavior. (Tzouramanis, 2005)
S
Syntactic Search Synthetic Data Set
A text search based on string patterns that appear in the 1: A data set that is generated by some artificial
text, without reference to meaning. (Navarro, 2005) speciications. Synthetic data are of high importance
for the evaluation of the performance behavior of access
Syntax methods in exactly speciied or extreme situations, where
The grammatical arrangement of words in sentences. real data are not available. (Tzouramanis, 2005) 2: A set
(Galitsky, 2005c) of artiicial target concepts. (Maloof, 2005)

Synthesis Synthetic Economy


1: Occurs when the inal product of a group effort includes An economy of virtual goods or currency which essentially
information and other elements from all members in such a exists in the virtual world such as online games. However,
way that individual contributions are dificult or impossible it is not necessarily conined in virtual space, but often
to identify. (Ingram, 2005) 2: The creation of a product integrated with the real-world economy. (Park & Lepawsky,
by the group that is distinct from the contribution of the 2006)
individual members. (Ingram & Hathorn, 2005a) 3: Within
the natural computing domain, synthesis corresponds to the System
act or process of developing or designing a computational 1: A whole composed of subsystems, and at the same time
system; an emulation or a simulation of a given natural included in a supra-system in such way that some particular
phenomenon. It is usually an outcome of the analysis of the properties of the whole and of the subsystems are getting
corresponding natural phenomenon. (de Castro, 2005) lost when they are considered analytically, for example, by
separation of the parts of the whole. (Gelman et al., 2005)
Synthesis Filter Bank 2: A collection of components (subsystems) together with
Combines subband signals into one signal. (Jovanovic- their interrelations. (Szczerbicki, 2005) 3: A structured
Dolecek, 2005b) activity in which the whole is more than the sum of its
parts. (Murphy, 2005a) 4: A group of devices or artiicial
Synthetic and Natural Hybrid Coding (SNHC) objects, or an organization forming a network, especially
An MPEG working group dealing with speciications of for distributing something or serving a common purpose.
3D graphics tools, and integration of synthetic and natural (Kabene, Takhar, et al., 2005) 5: A purposeful entity whose
media in hybrid scenes. (Prteux & Preda, 2005) parts interact with each other to function as a whole. Thus,
a system is not the sum of its parts; it is the product of
Synthetic Benchmark their interactions (Ackoff, 1993). 6: A system can be part
A benchmark in which the workload model is artiicially of a larger system. (Maani, 2005) 7: A system must exist
generated, as opposed to a real-life workload. (Darmont, within a world and cannot exist if its world is undeined: no
2005) world means no system. Existence is a property a system
derives from the world around it. The nature of a system
Synthetic Character is the nature of the world that contains it; for example, a
Computer-generated semi-autonomous agent corporally physical world, a world of ideas, and a social world may
embodied using multimedia and/or robotics. (Hall & contain physical systems, idea systems, and social systems,
Woods, 2006) respectively. A system that exists still needs an identity
to deine what is a system and what is not a system. A
Synthetic Data Generator system indistinguishable from its world is not a system; for
A tool able to generate a variety of synthetic data sets, example, a crystal of sugar that dissolves in water still has
according to statistical distributions. A fundamental issue existence as sugar, but is no longer a separate macroscopic
in the generation of the synthetic data sets is the availability system. The point separating system from non-system is
of a rich set of parameters that control their generation. the system boundary. Existence and identity seem two
Different statistical distributions and parameter settings basic requirements of any system. (Whitworth, 2006a) 8:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
664 Syst e m Aspe c t Syst e m Leve l

Systems are being deployed by various political entities 2005) 3: An interdisciplinary method to enhance learning
to form a global network. GLONASS (Global Navigation of complex systems that is based on nonlinear dynamics
S Satellite System) is deployed by the Russian Federation. and feedback control. (Trcek, 2005)
GPS (Global Positioning System) is deployed by the United
States. Galileo is the GPS system being structured by the System Encapsulation
European Union. (Freeman & Auld, 2005) The deinition and implementation of a software interface,
called wrapper, that allows the access to the system, and
System Aspect its subsystems, from other applications. (Aversano et al.,
One of the technological and physical speciicities of the 2005)
e-learning experience at server and data layers, and the
usability and accessibility issues of the presentation layer System Engineering
of the e-learning system. (Rentroia-Bonito et al., 2006) The branch of engineering concerned with the development
of large and complex systems. It includes the deinition and
System Decomposability setup of adequate and controlled processes for the design
The capability to decompose the system into a set of loosely and development of these complex systems. (Villemur &
coupled subsystems. (Aversano et al., 2005) Drira, 2006 CSCW)

System Delay System Environment


The time lapse between action and response. Delays often In a changing world, changes outside a system may cause
destabilize the system and slow down a systems progress changes within it, and changes within may cause changes
towards reaching its goal. System delays often mask without. A systems environment is that part of a world that
anticipated outcomes as well as unintended consequences can change the system or be affected by it. What succeeds
of actions since the intervening time lapse is often longer in the system-environment interaction depends on the
than expected. (Maani, 2005) environment. In Darwinian evolution, the environment
deines system performance. Three things seem relevant:
System Development Lifecycle (SDLC) opportunities, threats, and the rates by which these
1: The methodology used by most organizations for change. In an opportunistic environment, right action can
developing large information systems. (Yao et al., 2005) give great beneit. In a risky environment, wrong action
2: The process of understanding how an information can give great loss. In a dynamic environment, risk and
system can support business needs, designing the system, opportunity change quickly, giving turbulence (sudden
building it, and delivering it to users. (Singh & Kotze, risk) or luck (sudden opportunity). An environment can
2006) 3: A system development methodology that divides be of any combination, for example, opportunistic, risky,
projects into phases and uses written documentation to and dynamic. (Whitworth, 2006a)
maintain control. (Steinbach & Knight, 2005) 4: The
various stages through which a project of development System Level
and utilization of information systems passes. (de Souza Is the physical world the only real world? Are physical
& Zwicker, 2005) systems the only possible systems? The term information
system suggests otherwise. Philosophers propose idea
System Development Methodology systems in logical worlds. Sociologists propose social
A model that is used to structure, plan, and control the systems. Psychologists propose cognitive mental models.
process of developing an information system. (Steinbach Software designers propose data entity relationship models
& Knight, 2005) quite apart from hardware. Software cannot exist without
a hardware system of chips and circuits, but the software
System Dynamics world of data records and iles is not equivalent to the
1: A methodology for modeling and managing complex hardware world. It is a different system level. Initially,
feedback systems. This includes dynamic simulation computer problems were mainly hardware problems, like
models that allow policy formulation and testing. (Saha, overheating. Solving these led to software problems, like
2005) 2: A scientiic tool that embodies principles from ininite loops. Informational requirements began to drive
biology, ecology, psychology, mathematics, and computer chip development, for example, network and database
science to model complex and dynamic systems. (Maani, protocol needs. HCI added cognitive requirements to the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Syst e m M igrat ion Syst e m -Wide K now le dge Re c ove r y 665

mix. Finally, a computer-mediated community can also a system interacts with its environment, usability can join
be seen as a social system. An information system can non-functional IS requirements, like security and reliability,
be conceived on four levels: mechanical, informational, as part of system performance. The four advanced system
S
cognitive, and social. Each emerges from the previous, not elements (boundary, internal structure, effectors, and
in some mystical way, but as a different framing of the receptors) can maximize opportunity or minimize risk
same thing. If all levels derive from hardware, why not in a system environment. (Whitworth, 2006a)
just use that perspective? Describing modern computers
by chip and line events is possible but ineficient, like System Quality
describing World War II in terms of atoms and electrons. 1: A global judgment of the degree to which the technical
As higher levels come into play, systems become more components of delivered IS provide the quality of
complex but also offer higher performance eficiencies. information and service as required by stakeholders,
(Whitworth, 2006a) including hardware, software, help screens, and user
manuals. (Wilkin, 2005) 2: The reliability and eficiency
System Migration of an information system. (Shayo & Guthrie, 2005)
The incremental transformation of a legacy system toward
newer and more modern technology. It entails the reuse of System Reengineering
system components through their encapsulation. (Aversano When an existing software system requires major
et al., 2005) changes, typically by altering its original design,
speciic methodologies are used to help modify the
System Model design successfully. This process is referred to as system
A description of a system. Initially, the model describes reengineering. (Gaffar, 2005)
what problem the system should solve, and then it can
be gradually reined to describe how the system solves System Response Time
the problem. Finally, when operational, the system can The amount of time it takes for a computer system to
be viewed as a model of some domain behavior and respond to a command from a user. (Hantula, 2005)
characteristics. (Hvannberg et al., 2006)
System Theory
System of Artifacts Facilitates the illustration of complex and complicated
The system of documents, processes, mental models, relations between different elements. Thus, it enables
and so forth that different organizational units tend to speciic views, suited for the respective purpose of the
(autonomously) develop while satisfying their internal system. (Hofer, 2006)
needs. The choice and usage of these tools is a manifestation
of the units semantic autonomy. This may be for historical System Usage
reasons (e.g., people use old legacy systems that are still The extent of actual use of a speciic information system
effective), but also because different tasks may require (mostly voluntarily). (Shayo & Guthrie, 2005)
the use of different applications and data structures (i.e.,
text documents, audio, or movies) to work out effective System-Initiated Wireless Emergency Service
procedures and to adopt a speciic and often technical A type of wireless emergency service (WES) in which
language. (Cuel et al., 2006) context-aware information systems detect emergency
events and provide necessary help to involved users
System of Innovation when they are still unaware of or unable to report the
A conceptual framework in which networks of irms, events. Depending on whether WES is oriented toward
organizations, and other parties apply tacit and secondary the internal or external user contexts, there are two major
knowledge to interactive learning processes to generate system-initiated WES applications: personal WES and
favorable economic outcomes. (Taylor, 2005) public WES. (Sun, 2005)

System Performance System-Wide Knowledge Recovery


A traditional information systems performance is its Provides an overall view of the business processes
functionality, but functions people cannot use do not add supported by an application. The system-wide knowledge
performance. If system performance is how successfully recovery facility enables analysts to identify the programs

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
666 Syst e m at ic Sourc ing Syst e m s Deve lopm e nt Life cycle

in which particular business rules exist and then extract Systems Acceptance
those rules out from across applications. (Raisinghani, A function of perceived relevance, systems accessibility,
S 2005) and management support. (Ericsson & Avdic, 2005)

Systematic Sourcing Systems Accessibility/Development


Buying pre-negotiated contracts with qualiied sellers. Knowing who the user is, systematizing the actions workers
These contracts are often long term in nature and tend to perform in their work practice the system is to support,
have a cooperative nature. (Janssen, 2005) deciding the systems physical location, securing a certain
degree of usage before the system is put into operation,
Systematic Thinking/Planning and ensuring the systems design meets the goals of the
Planning that is carried out in an organized, deliberate, system. (Ericsson & Avdic, 2005)
and methodical manner. (Bober, 2005)
Systems Analysis
Systematic Variation of Variables Analyze, determine, and model how people, data,
A sensitivity analysis method whereby the input of interest information, knowledge, and process can integrate to
is varied, while holding all other inputs to some ixed value accomplish improvement of the business. (Tauber &
to determine the impact that particular variable has on the Schwartz, 2006)
output. (Yeo, 2005)
Systems Analysis and Design (SAD) Course
Systemic Change A course in which the student learns to understand how
Change that affects the entire enterprise or system. an information system can support organizational needs,
Systemic change typically provides holistic solutions rather and how to design the system, build it, and deliver it to
than addressing single problems. (Norris, 2005) users. (Ruppel & Ruppel, 2005)

Systemic Enterprise Architecture Methodology Systems Archetype


(SEAM) A generic pattern of relationships that occurs in a wide
A methodology proposed by LAMS-EPFL for system range of systems and circumstancesnatural, biological,
modeling in the domain of enterprise architecture political, social, and economic. A powerful tool for seeing
(the domain that considers integration of IT systems high-level dynamics. (Maani, 2005)
and business systems in the context of an enterprise).
(Naumenko, 2005) Systems Biology
The quest of a mathematical model of the feedback
Systemic Functional Linguistics regulation of proteins and nucleic acids within the cell.
A theory of language which seeks to understand how (Liberati, 2005)
speakers use language to make meaning. It is functional
in the sense that it analyzes such language in its practical Systems Development
context, and it is systemic as it theorizes meaning as A process where an information system is developed.
selection from system networks of choices. (Zappavigna, (Avdic, 2005)
2006)
Systems Development Lifecycle
Systemic Thinking/Planning 1: A controlled, phased approach in building information
Planning that affects or relates to a system as a whole, systems from understanding wants, deining speciications,
not merely its individual elements/components. (Bober, designing and coding the system, through implementing
2005) the inal solution. (DeLorenzo, 2005) 2: A logical and
iterative sequence of activities that highlight the phases
Systemic Understanding of any development project. These phases typically
A holistic view of an organization and its inter-relationships, include analysis, logical design, physical design, test,
an understanding of the fabric of relationships, and the likely measurement and implementation, and maintenance, and
effect of interrelated actions. (Ali & Warne, 2005) are often performed as concurrently as possible. (Clegg
& Tan, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Systems Engineering Systems-Speciic Security Policy 667

Systems Engineering
The systems engineering discipline covers the development
of total systems, which may or may not include software.
S
Systems engineers focus on transforming customer needs,
expectations, and constraints into product solutions and
supporting those product solutions throughout the product
lifecycle. (Gibson, 2005)

Systems Failure
Systems abandoned before completion; systems completed
but never used, under used, or failing to deliver key aspects
of functionality; and projects that are signiicantly over
budget or schedule. (Doherty & King, 2005)

Systems Implementation
Customization or parameterization and adaptation of
the software application according to the needs of the
organization. (Colmenares & Otieno, 2005)

Systems Integration
The process of tying together two or more computer systems
for sharing data and functionality. (Hwang, 2005)

Systems Model
A comprehensive approach to considering the many
interconnected components within an organization. (Baker
& Schihl, 2005)

Systems Thinking
1: A manner of thinking that takes into account how the
things being studied relate and connect to each other. A key
idea embedded in systems theory is that it can assist us in
understanding of phenomena and that its holistic emphasis
will promote orderly thinking. It is an apt approach to use
when thinking about complex issues and interactions.
(Proctor, 2005) 2: Closely related to system dynamics; a
methodology to model and analyze the dynamic, complex,
and interdependent nature of systems. However, systems
thinking seldom includes developing dynamic simulation
models as in system dynamics. (Saha, 2005) 3: Thinking
holistically and conscientiously about the world by focusing
on the interaction of the parts and their inluence within
and over the system. (Maani, 2005)

Systems-Speciic Security Policy


One of the policies codiied as standards and procedures
used when coniguring or maintaining systems. (Mattord
& Whitman, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
668 T-Com m e rc e Ta c it K now le dge

T
T-Commerce: See Television Commerce. the main forms of data entry, and they commonly have
an A4-size footprint. (Garrett, 2006b)
T-1 (or T1)
The T-1 carrier is the most commonly used digital line in Tabu Search
the United States, Canada, and Japan. In these countries, A metaheuristic procedure based on principles of intelligent
it carries 24 pulse code modulation (PCM) signals using search. Its premise is that problem solving, in order to
time-division multiplexing (TDM) at an overall rate of qualify as intelligent, must incorporate adaptive memory
1.544 million bits per second (Mbps). In the T-1 system, and responsive exploration. (Mart, 2005)
voice signals are sampled 8,000 times a second and each
sample is digitized into an 8-bit word. (Rahman, 2005c) TACACS: See Terminal Access-Controller Access-
Control System.
T-1 Access
Provides a data transmission rate of 1.544 megabits per Tacit
second (Mbps). (Butcher-Powell, 2005) From the Latin tacitus, meaning silent. (Zappavigna,
2006)
T-1 Line
A communications link that can be used for digital data Tacit Knowledge
transmission. Provides a data rate (bandwidth) of 1.544 1: Deined as personal, context-speciic knowledge.
million bits per second (Mbps). (Ruppel & Ruppel, It is knowledge acquired by experience and practice.
2005) It is therefore dificult to formally state, codify, and
communicate such knowledge. (Sivakumar, 2006) 2:
T-Test Experiential knowledgethat is, know-how represents
A kind of statistical method that measures how large the knowledge that is gained through experience and through
difference is between two groups of samples. (Chu & doing. (Wickramasinghe, 2006) 3: Highly personal and hard
Wang, 2005) to formalize, making it dificult to communicate or share
with others. Subjective insights, intuitions, and hunches fall
Table Scan into this category of knowledge. Tacit knowledge is deeply
The sequential reading of all the blocks of a relational rooted in an individuals actions and experience, as well
table to select a subset of its attributes based on a selection as in the ideals, values, or emotions he or she embraces.
argument, which is either not indexed (called a sargable (Zeleznikow, 2006) 4: Implicit understanding of which the
argument) or the index is not clustered. (Thomasian, individual is not directly aware and which is involved in his
2005a) or her skillful practice. (Zappavigna-Lee & Patrick, 2005)
5: Knowledge owned by the individual. It is personal, is
Tablet PC developed through life experiences and education, and is
1: A mobile computing device that offers high portability, not readily shared or made explicit. (Mitchell, 2005a) 6:
inking capability, and the slate coniguration. (Roldan, Knowledge possessed by an individual who is unable to
2005) 2: A newer type of format of personal computers. formulate and communicate it verbally. Such knowledge is
It provides all the power of a laptop PC but without a frequently the product of intuition, emotions, and leeting
keyboard for text entry. Tablet PCs use pen-based input, impressions, which form inchoate or incomplete memories.
and handwriting and voice recognition technologies as Tacit knowledge is the partner of explicit knowledge on the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ta c it K now ing/Ta c it I nt e grat ion Ta iloring 669

dimension they share. (Ein-Dor, 2006) 7: Knowledge that Tactical Goal


has not been explicitly codiied. It resides in peoples minds More speciic target that represents the desired outcome
as an understood thing. Mostly ingrained in experience the organization expects to achieve over the middle
T
and learning of a person. (Ray, 2006) 8: Knowledge that term; tactical goals are derived from the strategic goals.
is in peoples heads and not externalized in documents or (Brabston, 2005)
any other form. (Woods et al., 2006) 9: Knowledge that is
dificult or impossible to express, except by demonstrating Tactical Planning
its application. (J.S. Edwards, 2005) 10: Knowledge that 1: Planning that identiies and selects the best ways and
is known in the mind of an individual. Some of it may be means to get from current results to desired onesto be
verbalized, made explicit, and encoded to become explicit tactical. (Kaufman & Lick, 2005) 2: Small-scale actions
knowledge; some of it may not be explicable so that it must made or carried out with only a limited or immediate end
be demonstrated if it is to be transferred, as in a master in sight. (Bober, 2005)
craftsman showing an apprentice how to do something
and the apprentice subsequently practicing what has been Tag
demonstrated. (King, 2006b) 11: Knowledge that is not HTML and XML markers that delimit semantically
written down but is held in the heads and minds of people. meaningful units in their code. (N.C. Rowe, 2005a)
(Elshaw, 2006a) 12: Knowledge we do not know that we
know. (Askar et al., 2005) 13: Knowledge that is embodied Tagged Image File Format (TIFF)
in peoples minds, not easily visible, and dificult to be High-quality image reproduction formattypically
transmitted in words by skilled people. The concept was generates large iles used for archival purposes. (McCarthy,
brought to light by Polanyi (1966). (Nabuco et al., 2006) 2005a)
14: Personal knowledge which includes cognitive technical
and attitude elements. This knowledge coincides with the Tagged Value
persons competencies. (Falivene & Kaufman, 2006) 15: Extension to the properties of a UML element. (Gur u,
Personal or subjective knowledge, which includes mental 2005)
models, know-how, skills, and so forth. (Goldsmith &
Pillai, 2006) 16: Polanyis statement We know more than Tailorability
new can say probably best explains what tacit knowledge The dynamic accommodation of context-dependent
is. In contrast to explicit knowledge, which is expressed behavioral variations in an existing software system.
in formal language systems (e.g., data, formulae, or any (Lepouras et al., 2006)
written document), tacit knowledge is personal and dificult
to formalize. Personal insights, intuition, and sensing are Tailorable Information System
examples of such knowledge. It is embodied in procedures, An information system whose behavior is dynamically
routines, activities, values, culture, and feelings. (Brock user controlled at runtime, without causing instability
& Zhou, 2006) 17: Practical understanding possessed by and disruption to the rest of the information system, not
individuals and shared in communities which is below-view affected by the change(s) initiated by the user, aiming at
in the sense that it is not subject to the conscious attention endowing the information system with the capability to
of those who hold it. (Zappavigna, 2006) 18: Relatively meet new or altered user requirements, and thus, rendering
subjective, personal knowledge, which is hard to formalize it adaptable to any contextual change within a problem
and communicate. (Medeni, 2006a) 19: Knowledge gained domain. (Stamoulis et al., 2005)
through an individuals own experiences. (Neville &
Powell, 2005) Tailored-Application
Application based on industry or organizational needs to
Tacit Knowing/Tacit Integration complement the off-shelf software applications available
Polanyis concept of the process of implicit integration in the marketplace. (Kamel, 2005a)
of subsidiary and focal elements by an individual. The
individual attends from the element in his or her Tailoring
subsidiary awareness to the element in his or her focal In the context of personalization, it can be with respect to
awareness. (Zappavigna-Lee & Patrick, 2005) content or navigation. Content refers to the information

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
670 Ta iloring Opt ion Ta rge t U se r Group

being displayed, and navigation refers to the structure of Target Concept


the links that allow the user to move from one page to The true, typically unknown model underlying a data set
T another. (Anke & Sundaram, 2006) or data stream. (Maloof, 2005)

Tailoring Option Target Culture


Describes how changes can be incorporated into the ERP The culture for which one revises source materials in the
system or how a maintenance request can be serviced. localization process. (St.Amant, 2005a)
(Ng, 2005)
Target Marketing
Taiwan-Direct-Shipment Communicating with a market segment by specialized
A distribution practice that Taiwan manufacturers send business messages. Virtual community facilitates target
their notebooks to buyers through door-to-door service in marketing by providing access to speciic consumer groups
order to reduce distribution cycle time. (Tyan, 2006) and identifying focused needs of the consumer groups.
(Wang, Wei, et al., 2006)
Taking Responsibility
Responsibility drives the desire to make progress on Target Object
implementing actions. The individuals own desire to make Object in a particular target table for which a prediction is
progress on an actionor the feeling that they are being to be made. Other objects reside in additional background
viewed negatively as a result of their lack of progress, or tables, but are not the focus of the prediction task. (Perlich
that they are hindering others making progressmight & Provost, 2005)
force their action. (Shaw et al., 2006)
Target of Evaluation (TOE)
Talkspurt An IT product or system and its associated administrator
Short burst of energy, in an audio communication, during and user guidance documentation that is the subject of an
which the audio activity is carried out. A packetized audio evaluation. (den Braber et al., 2005)
segment may be considered as being constituted of several
talkspurts separated by silent periods (during which no Target Population
audio packet is generated). During speech transmission A particular group within a larger group, about which
activities over the Internet, in order for the receiving site the researchers are trying to generalize their study or
to reconstruct the audio conversation, the audio packets research indings (e.g., seniors). Sometimes referred to
constituting a talkspurt must be played out in the order as the reference group. (De Weaver, 2005)
they were emitted at the sending site. (Roccetti & Ferretti,
2005) Target System
The physical machine on which the data warehouse is
TAM: See Technology-Acceptance Model. organized and stored for direct querying by end users,
report writers, and other applications. A target system is
Tangible Cost often called a presentation server. (Simitsis & Theodoratos,
Cost that can be measured in a direct way, taking always 2005)
into account that sometimes tangible costs cannot be
measured in monetary terms. (Esteves & Pastor, 2005) Target User Group
Refers to a focus user group, which a product or a
Tangible User Interface development process speciically targets or aims at.
System that gives a physical form to digital information The qualities of such a group are a relevant baseline
through augmenting tools and graspable objects with for the developer (used as orientation and target for the
computing capabilities, thus allowing for smooth transitions development process, and the features of the new designed
between the background and foreground of the users focus product). Their requirements are relevant for the orientation
of attention. (Oulasvirta & Salovaara, 2006) of the developer. (Rse, 2006a)

TAPRIC: See Telecommunications Action Plan for


Remote Indigenous Communities.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ta rsk is T he or y of Trut h Ta sk -Ba se d Pra c t ic e 671

Tarskis Theory of Truth Task Design


A theory proposed by Polish logician Alfred Tarski. The The way key attributes of the task are arranged, in terms
theory deines the criteria for a formal deinition of a true of the inluence of these attributes on the effectiveness of
T
sentence; the theory allows deriving the notion of Tarskis a team in performing the task. Research has found key
declarative semantics for a modeling language where the design attributes include the need for a variety of skills,
modeling language terms are put in the unambiguous the perceived importance of the task, the independence and
correspondence with the subjects of modeling interest autonomy given to people to determine how the task will
that they represent in applications of the language. be done, and the way task feedback is provided. (Wong
(Naumenko, 2005) & Staples, 2005)

Task Task Environment


1: An action and/or a goal an agent has to realize as delegated Includes those sectors that have a direct working
by another agent; thusin the opposite perspectivethe relationship with the organization. It includes customers,
couple action/goal that an agent intentionally delegates competitors, suppliers, and the labor market. Effectively
to another agent, where at least the delegating agent it is the industry in which the irm operates, which is a
knows one between the action and the goal. (Falcone subset of the wider environment. (Rowe et al., 2006)
& Castelfranchi, 2005) 2: An atomic process that is not
divided further and is a logical unit of work. (Dustdar, Task Knowledge
2005) 3: An object with a set of attributes and actions to Knowledge required to perform a task in an organizational
achieve a speciic process goal using certain resource called or extra-organizational context. Examples are storing
process resource. (Daneshgar, 2005) 4: The mechanism by inventory items, updating accounts, or delivering goods.
which an application domain is changed by a work system The extent to which the task is performed solely within
to achieve the work systems goals. (Diaper, 2006) the organization or externally determines the nature of
the knowledge on the task-context dimension. (Ein-Dor,
Task Analysis 2006)
1: A method of providing an extraction of the tasks users
undertake when interacting with a system. (Xu et al., Task Model
2006b) 2: An analysis of the actions and/or knowledge and A description of how the system is supposed to be used to
thinking that a user performs to achieve a task. (Sharples, achieve pre-deined goals. Task models are usually deined
2006) 3: The systematic analysis of a terminal behavior in terms of the actions that must be carried out to achieve
to identify and sequence the subskills needed to master a goal. (Campos & Harrison, 2006)
the terminal behavior. (Lazarus, 2005a)
Task Ontology
Task Assignment A system of vocabulary/concepts used as building blocks
The assignment of a task to an agent responsible for it, for knowledge-based systems. (Seta, 2006)
made by the worklow management system. The agent
may be a person or a process. When it is a person, the Task Performance
assignment usually implies a notiication to the agent; The proiciency of accomplishing a task that allows
when it is a process, the assignment usually results in its discriminating the users (i.e., experts, novices). (Sas,
execution. (Pinheiro, 2005) 2006)

Task Culture Task-Action Mapping Model


Characterized by an emphasis on problem solving by a Synonym for functional model. (Maceield, 2006)
team of experts. Teams are formed to deal with particular
problems or projects. Once the task is completed or the Task-Based Practice
project is over, the team will disband. Here the culture is Work practice related to a speciic job description that must
one which attaches importance to knowledge and expertise. be carried out to produce a deliverable product, process,
(Fong, 2006b) or idea. (P.M. Leonardi, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
672 Ta sk -Dire c t e d Disc ussion (T DD) Tc pdum p

Task-Directed Discussion (TDD) consistent) architecture. Prominent examples include the


A type of dialogue game based on techniques used widely adopted schema of Carl Linnaeus (biology) and
T in second-language teaching, designed to encourage Dmitrii Mendeleev (Periodic Table of Elements). Most
discussion of a topic. Suggested as a means to elicit learning taxonomies contain their own nomenclature for describing
dialogues that may be useful as material for vicarious the taxons (singular) and taxa (plural) that correspond to
learning. (J.R. Lee, 2005) formal units in the classiication scheme, such as kingdom,
phylum, class, order, family, genus, species (adapted from
Task-Level Model Linnaeus). Taxonomies may evolve over time. Neither
A third-level model in the REA ontology is the most detailed system of Linnaeus or Mendeleev is exactly in the original
level, which speciies all steps necessary for the enterprise form as when irst presented, but both are fundamentally
to accomplish the business events that were included at and substantially the same in all relevant aspects and overall
the process level. (Dunn & Grabski, 2005) structure, changing only as our knowledge of science
changed over time to add additional granularity to the
Tax Holiday taxons and taxa of their brilliantly original and enduring
No taxes for export-oriented software and data processing descriptive taxonomies. (Lasnik, 2005)
services industry every 10 years. (Raisinghani & Rahman,
2005) Taxonomy, Mono-Dimensional
A taxonomy where an item can be classiied under a single
Taxonomy concept only. (Sacco, 2006)
1: An ordered list of taxa or categories. A subordinate
taxon (category) inherits the deining characteristics of Taxonomy, Multi-Dimensional
its superordinate (parent) taxon. Example: An automobile A taxonomy where an item can be classiied under several
has all the characteristics of its superclass, vehicle, but concepts. (Sacco, 2006)
not of its sibling class, truck. (Buchholz, 2006) 2: A
classiication based on a pre-determined system that is Taxonomy, Reduced
used to provide a conceptual framework for discussion, In a dynamic taxonomy, a taxonomy describing the
analysis, or information retrieval. (Ashrai et al., 2005) 3: current user focus set F which is derived from the original
A classiication system used for analysis or information taxonomy by pruning from it all the concepts not related
retrieval. (Millet, 2005) 4: A hierarchical organization to F. (Sacco, 2006)
of concepts going from the most general (topmost) to the
most speciic concepts. A taxonomy supports abstraction, Taxonomy Tree
and models IS-A and/or PART-OF relations between a A collection of related concepts organized in a tree structure
concept and its father. Tree taxonomies can be extended where higher-level concepts are decomposed into lower-
to support multiple inheritance (i.e., a concept having level concepts. (Scime, 2005b)
several fathers). (Sacco, 2006) 5: A hierarchical structure
for organizing a body of knowledge; it gives a framework TBT: See Technology-Based Training.
for understanding and classifying knowledge. (Metaxiotis,
2006) 6: Any system of categories used to organize TCE: See Transaction Cost Economics.
something, including documents; often less comprehensive
than a thesaurus. (Woods et al., 2006) 7: Classiication TCO: See Total Cost of Ownership.
into categories and sub-categories. (Elshaw, 2006a) 8:
From the Greek taxis (for arrangement, order) and nomos TCP: See Transport Control Protocol; Transport Control
(law). Every serious taxonomy is an organizational scheme Protocol.
that includes a system representing structure, order,
and relationship. Some form of hierarchical structure is TCP/IP: See Transmission Control Protocol/Internet
generally deined, but this may be multi-dimensional and Protocol.
nonlinear in form. The purpose, domain, attributes, and
granularity of schema vary, but all taxonomies attempt to Tcpdump
provide a robust (i.e., logical, coherent, cohesive, internally Computer network debugging and security tool that
allows the user to intercept and display TCP/IP packets

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T DD Te a m 673

being transmitted over a network to which the computer Teaching Machine


is attached. (Lazarevic, 2005) 1: A device that uses linear programmed instruction,
whereby frames present a question followed by feedback
T
TDD: See Task-Directed Discussion. of the correct answer. Learning results from reinforcement
of the students correct answer. (Owen & Aworuwa, 2005)
TDMA: See Time Division Multiple Access. 2: Constructions, usually in the form of a box, that allow
test items to be presented for students to answer and
TDOA: See Time Difference of Arrival. receive feedback regarding their performance. (Lazarus,
2005a) 3: Invented in 1924 by Sydney L. Pressey to
TDT: See Topic Detection and Tracking. administer rudimentary drill and practice. They were also
manufactured in the 1950s as programmed instruction
Teacher Relection devices based on either B.F. Skinners linear curriculum-
Thinking about professional work and self-evaluation delivery model or Norman Crowders branching model.
done by an individual preparing for a teaching career or (Reisman, 2006)
an educator. (Wieseman, 2005a)
Teaching Presence
Teacher-Centered Learning 1: The design, facilitation, and direction of cognitive and
Characterized by didactic teaching, passive learning, and social processes for the purpose of realizing personally
the teacher as the expert. Control of learning rests with meaningful and educationally worthwhile outcomes.
the instructor. The learning of the students is directed by (Swan, 2005) 2: The ways in which a teacher is present,
the instructor and is often based on what the instructor or input from a teacher, in terms of the design of online
believes the student needs to learn. This approach can lead activities, facilitation of online interactions, and direction
to students focusing on determining what knowledge they of learning. (Kukulska-Hulme, 2005)
require to pass the subject, rather than the instructional
objectives of the program, a phenomenon well known to Teaching Strategy
educators. (Lowry & Turner, 2005) 1: Techniques used by teachers when presenting
information to students. (Judd, 2005) 2: A simple tool
Teacher-Educator Belief that is used to accomplish teaching something. (Whitield,
We have beliefs about everything, but teacher-educator 2005) 3: Consists of didactic knowledge, a set of rules
beliefs about the nature of knowledge and teaching have that controls the adaptation and sequencing of the course.
wide-ranging implications. The beliefs about teaching (Esmahi, 2005)
and learning inluence pre-service teacher beliefs about
teaching and learning, and also the students within the Team
early childhood, primary, and secondary settings. (Keppell 1: A collection of four to 12 individuals collaboratively
et al., 2005) working on a common and interdependent task or goal.
The goal is often one requiring a decision or a solution to
Teaching some problem. The elements of common tasks, goals, and
Educational process wherein a teacher, using the interdependence are integral to our deinition of a team,
transmission of knowledge, educates or instructs at least with respect to an imposed need to arrive at a
someone. (Andrade, Ares, Garca, Rodrguez, Seoane, collective position on a matter under consideration. (Ferris
et al., 2006) & Minielli, 2005) 2: A collection of individuals who see
themselves and who are seen by others as a social entity,
Teaching at a Distance who are interdependent because of the tasks they perform
Refers to all instructional activities that are carried out as members of a group, who are embedded in one or more
where and when the learners are separated from the larger social systems (e.g., community, organization),
learning organization and the teachers for much of the and who perform tasks that affect others. (Verburg et al.,
learning process. (Naidu, 2005b) 2005) 3: A deined group that intentionally combines its
members various skills and knowledge to undertake a
shared task that requires them to coordinate their various

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
674 Te a m Cha ra c t e rist ic s T chn

efforts for satisfactory completion. Teams will normally interactions; involves an experience of increased ambiguity
have a deined leadership and authority structure, or deine and artiiciality (i.e., unnatural quality) associated with
T their own in order to address the task. (Cargill, 2006b) distributed interaction, which inherently lacks the rich
4: A small cross-functional group with complementary visual, auditory, and social array of cues traditionally
skills that is responsible for a time-speciic project, set of available to co-located teams. (Cuevas et al., 2005)
performance goals, and approach for which members hold
themselves mutually accountable. (Hustad & Munkvold, Team Paradigm
2006) 5: A small number of people, usually possessing A team perspective or belief which is collectively
complementary skills, who work together toward a common constructed and accepted by members of the team. (Fong,
purpose, with shared performance goals and an approach 2006b)
to work for which they hold themselves and other team
members accountable. (Dara-Abrams, 2006) 6: A social Team Productivity
system of three or more people, whose members perceive Degree to which a group of two or more individuals can
themselves and are perceived by others as team members, successfully coordinate their efforts to perform a task.
and whose members collaborate on a common temporary (Cuevas et al., 2005)
task. (Lettl et al., 2006) 7: To make up a team, members
must have a minimum of: (1) task interdependency among Team-Based Co-Learning
members, (2) shared responsibilities, (3) team identity, and Where two distinct organizations assemble a cross-
(4) power to manage the relationship between the team organizational team with the purpose of learning from
and the organization. (Tremblay, 2006b) one another. This team utilizes the knowledge contained
in each separate organization to create new knowledge
Team Characteristics beneicial for both. Intense interactions with the customer
The composition of the team and the shared beliefs held occur to gain their knowledge on processes and systems
within the team about the team. Team composition includes to facilitate systematic change. (Paquette, 2006b)
such things as the number of team members, the skills the
team members collectively possess, and the stability of TeamBased Organization
team membership. (Wong & Staples, 2005) Organization structure that gives a group of people
responsibility for a coherent part of production, and assigns
Team Charter the associated control responsibilities to that group (self-
A document created when a project team is formed that managing teams). (Hendriks, 2006)
details the teams objectives and rules of engagement,
including items such as the mission statement, team roles Teamwork
and responsibilities, and deliverables to be produced. Working with others interdependently to effectively
(Elshaw, 2006b) achieve a goal. Teamwork involves both task and social/
interpersonal communication aspects among team
Team Diversity members. (Petska & Berge, 2005)
The combined variety of skills, backgrounds, experiences,
ideas, thoughts, abilities, and perspectives that individuals Teamwork Quality (TWQ)
bring to their team. (Staples et al., 2005) A comprehensive concept of the quality of interactions in
teams. It represents how well team members collaborate
Team Effectiveness or interact. (Proserpio & Magni, 2005)
The ability of a team to perform its tasks on time, on budget,
and with acceptable quality, as well as the satisfaction, Tchn
motivation, and commitment of the team members. (Staples 1: Aristotles term for skills-based technical and action-
et al., 2005) oriented knowledge: how to perform a speciic task. The
end result, or realization of tchn, is the production of
Team Opacity something. (Schwartz, 2006) 2: Skills-based technical
Increased level of abstraction forced upon virtual knowledge. The social activity that has as its concern
teams due to the over-reliance on technology-mediated the making or production of social artifacts is called

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te chnic a l Ana lysis Te chnolit e ra cy 675

poiesis and involves the application of tchn. Tchn and competent teachers are technicians who have a certain
is knowledge of how to perform task-based activities in set of skills. (Wieseman, 2005b)
pursuit of some practical end: this end may be tangible or
T
intangible. Thus, tchn provides managers, professionals, Technical Support
craftsmen, laborers, and scientists with an understanding Consists of maintenance of hardware, software and
of the why and the wherefore, the how and with-what of communication infrastructure, archiving collected data,
their concerns. The skills of qualiied craftsmen, artists, providing user support, and at times also providing user
musicians, surgeons, computer programmers, physicists, training for use of technology. (Rugelj, 2005)
accountants, and so on all fall into this categoryas
indeed does the oft-ignored skills of ordinary unskilled Technical Trade Knowledge
workers. (Butler & Murphy, 2006) Knowledge that is task specific, industry specific,
and generally available among irms in an industry.
Technical Analysis Examples of such knowledge are knowledge of automobile
The study of the behavior of market participants, as construction methods, knowledge of the techniques of
relected in the technical data. Used to identify early stages computer hardware construction, and so on. (Butler &
in trend developments, with a view to proiting from price Murphy, 2006)
movements. This style of analysis is generally short term.
(Vanstone & Tan, 2005) Techno-Economic Paradigm
Best-practice model made up of a set of all-pervasive
Technical Data generic technological and organizational principles that
The term used to describe the components of price history represent the most effective way of applying a particular
for a security. These components are open price, low price, technological revolution, and of using it for modernizing
high price, close price, volume traded, and open interest. and rejuvenating the whole economy and social sphere.
(Vanstone & Tan, 2005) When generally adopted, these principles become the
common-sense basis for organizing any activity and for
Technical/Functional Evaluation structuring any institution. (Kalvet, 2005)
This type of evaluation focuses on the technical (IT)
components. The evaluation is concerned with the Techno-Economic Rationality
relationship between inputs and outputs. Its focal point is Logical justiication for making a connection between
on eficiency in terms of the technical performance and technical advances and economic growth. (McPherson,
the control of resources. Further interests lie around the 2005)
increased and improved capacity, fewer errors, greater
reliability, humanpower savings, and so forth, and also Technocratic View of Knowledge
in terms of software performance developments and Knowledge is an organized collection of data and
quality (e.g., TQM). The driving force for the timing of information. (Ericsson & Avdic, 2005)
evaluation is the traditional systems development lifecycle.
(Serafeimidis, 2005) Technolibertarianism
A companion political ideology to digital Darwinism
Technical Indicator that argues in an age of global connectivity for radical
Indicator produced as a result of various computations individualism and no governmental regulation of digital
on technical data. Primarily used to conirm price action. life. (Skovira, 2005)
(Vanstone & Tan, 2005)
Technoliteracy
Technical Relection 1: A shorthand term referring to ones competence level,
Relection concerned with the effective application of skill, and comfort with technology. (Macfadyen, 2006a)
skills and technical knowledge in a classroom; stems 2: The ability to understand, use, critically analyze, and
from a belief system that education serves the needs of an improvise solutions within an information technology
economy, rather than being oriented toward social change, infrastructure. (Hantula & DeRosa, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
676 Te chnologic a l Ac c e ss Te chnology Conve rge nc e

Technological Access of some form of technology (often information technology)


Refers to the physical availability of suitable information into an organization. (Tatnall, 2005b)
T and communication technologies, including computers of
adequate speed and equipped with appropriate software Technological Instrumentalism
for a given activity. (Kvasny & Payton, 2005) The view that technologies are merely useful and culture-
neutral instruments, and that they carry no cultural
Technological Addiction values or assumptions in their design or implementation.
These addictions are operationally deined as non-chemical (Macfadyen, 2006b)
(behavioral) addictions that involve human-machine
interaction. They can either be passive (e.g., television) or Technological Model
active (e.g., computer games, Internet), and usually contain Incorporates ICT without changing bureaucratic
inducing and reinforcing features which may contribute engineering, in the belief that incorporation itself should
to the promotion of addictive tendencies. Technological improve public management. The political level considered
addictions can be viewed as a subset of behavioral makes no decision in regard to e-government; therefore,
addictions and feature core components of addiction, that ICT development is delegated to IT experts. (Kaufman,
is, salience, mood modiication, tolerance, withdrawal, 2005)
conlict, and relapse. (Grifiths, 2005)
Technological Risk
Technological Determinism Risk derived from incompatible technologies that cause
1: Determinist or developer-based models of diffusion integration and operation issues. (Ratnasingam, 2005)
focus on the technical characteristics in order to promote
change. They assume that technological superiority is all Technological Subsystem
that is required to bring about the adoption of innovative Sociotechnical system component representing the
products and practices. (Salter, 2005c) 2: The belief that technology (e.g., collaborative information technology)
technology develops according to its own internal available to the organizational unit, inluencing the nature
laws and must therefore be regarded as an autonomous of information low (synchronous or asynchronous) and
system controlling, permeating, and conditioning all format (e.g., text, audio, video). (Cuevas et al., 2005)
areas of society. (Macfadyen, 2006b) 3: The belief that
technology develops according to its own internal laws, Technology
and must therefore be regarded as an autonomous system 1: Any electronic tool (digital camera, computer, scanner,
controlling, permeating, and conditioning all areas of laboratory probe, etc.) and/or software (database,
society. (Macfadyen & Doff, 2006) spreadsheet, word processing, etc.). (Johnson, 2005) 2:
Applied science, systematically organized knowledge.
Technological Factor (Mockler & Dologite, 2005)
One of the aspects characterizing a technical system
(i.e., computer-generated world) and its components that Technology Adoption
impact the quality of interaction and task performance. The decision, by an organization or individual, to utilize
(Sas, 2006) and implement a technology. (Tatnall & Burgess, 2005)

Technological Fluency Technology Anxiety


In addition to traditional literacy, technological literacy is A state of apprehension, uncertainty, and fear relative to
increasingly becoming a necessity in higher education and implementing technology. (Scarpi & DallOlmo-Riley,
in society. With the abundance of available information, 2006)
information literacy is also growing in importance.
(Lindsay, Williams, et al., 2005) Technology Convergence
When one function of one or more technologies is combined
Technological Innovation in a device. Example: Some current telephones combine
1: The introduction or alteration of some form of technology Web, telephone, and personal digital assistant functions.
(often information technology) into an organization. (Bedard-Voorhees, 2005)
(Tatnall & Burgess, 2005) 2: The introduction or alteration

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te chnology Cost ing Te chnology-M e diat e d Dist a nc e Educ at ion 677

Technology Costing Technology Use


Techniques and tools for determining the full costs of The usage of a technology whether it be e-mail, chat
technology integration into the teaching and learning rooms, automated tests, software, and so forth. (Martz
T
process. (S.M. Johnstone, 2005) & Reddy, 2005)

Technology Diffusion Technology Value


Pervasive application and use of technology in everyday 1: The perceived beneits obtained by the use of technology.
life. (Efendioglu, 2006) (Martz & Reddy, 2005) 2: The users beneits (perceived
and actual) over the costs (perceived and actual) created
Technology Implementation by the use of technology. (Martz & Reddy, 2005)
The putting into place, at a system level of a school, the
conditions that support the integration of technology at Technology-Acceptance Model (TAM)
the classroom level. (Dexter, 2005) 1: An adaptation of TRA customized to technology
acceptance. The intention to adopt is affected by two
Technology Infrastructure beliefs: perceived usefulness and the perceived ease of use
The required supporting activities and facilities of the new technology. (McManus & Standing, 2005) 2: A
including network, hardware, software, development, and user-behavior theory which states that user acceptance of
maintenance. (LeRouge & Webb, 2005) information technology can be explained by two beliefs:
perceived usefulness and perceived ease of use. (Chen
Technology Integration & Yang, 2006) 3: From Davis TAM model, ease of use
1: A variety of technologies used as tools in educational and perceived usefulness of a technology are factors that
activities to achieve curriculum goals and objectives. (Judd, either directly or indirectly increase a persons intention to
2005) 2: The use of technology in teaching to support adopt an innovation. (Hsu & Kulviwat, 2006) 4: A model
learning. (Dexter, 2005) that explains the acceptance of information technology.
(Signoret, 2006) 5: A theoretical explanation of factors
Technology Partnership inluencing technology usage that hypothesizes perceived
In a technology partnership, the technology and a common ease of use and perceived usefulness inluence a persons
objective are included in inter-irm collaboration. R&D intention, which in turn determines actual technology
collaboration is a typical example. (Blomqvist, 2005) usage. (McHaney, 2005) 6: Describes the relationship
between perceived qualities of a systems usage, affective
Technology Plan attitude, and behavioral responses to the system. (Liu &
Goals and benchmarks for technology systems and support Tucker, 2005)
in an organization. (C. Cavanaugh, 2005)
Technology-Based Training (TBT)
Technology Transfer The delivery of content via Internet, LAN or WAN (intranet
1: The process by which new ideas and technologies or extranet), satellite broadcast, audiotape or videotape,
diffuse from research settings, usually in universities or interactive TV, or CD-ROM. TBT encompasses both CBT
research institutes, into the wider community. Typically, and WBT. (Torres-Coronas, 2005)
this involves the commercialization of new knowledge
through the establishment of intellectual property rights. Technology-Enabled Education
(Warren, 2006) 2: The process of enacting research The use of advanced electronic technologies for purposes
innovations by properly channeling research to actionable of direct support and enhancement of the student learning
outlets. (Cumbie et al., 2006) experience, in all of its aspects and wherever it might
occur. (Garten & Thompson, 2005)
Technology Trust
The subjective probability by which organizations believe Technology-Mediated Distance Education
that the underlying technology infrastructure is capable In many distance education programs, technology has
of facilitating transactions according to their conident assumed a central role. As in any educational situation,
expectations. (Ratnasingam, 2006) the relationships of signiicance are between teachers and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
678 Te chnology-M e diat e d I nst ruc t ion Te le c om m unic at ion

students. The use of technology can facilitate or mediate this center equipped with the necessary ICTs and manned
relationship. In this sense, technology provides strategies by adequately skilled staff to allow the community
T to bridge the gap between, or bring closer, teachers and members to connect to the global communications network
learners. (Ching et al., 2005) (telephone, fax, and Internet). Usually additional ofice-
like facilities are offered such as photocopying, printing,
Technology-Mediated Instruction scanning, and multimedia. (Trusler & Van Belle, 2005) 7:
Learning that is aided or entirely accomplished through the Computer-based distance learning centers usually located
use of computer-based technology. (Kaur et al., 2005) in non-educational settings. Sometimes referred to as
telecottages when in a rural location. (David, 2005) 8:
Technology-Mediated Learning Multi-purpose community-based centers equipped with
Learning where the learners interactions with learning computers, Internet- and Web-connected computers,
materials, other students, and/or instructors are mediated audioconferencing, videoconferencing, photocopiers, fax
through information technologies. (Dixon et al., 2005) machines, printers, TV and video, cameras, scanners, and
so forth. (Latchem, 2005)
Technology-Related Assistance: See Assistive
Technology. Teleclass
Voice-only communications linking two or more sites.
Technology-Supported Learning Environment A standard method used is to connect multiple telephone
An environment in which appropriate technology is lines for an audio conference through a phone bridge. A
integrated to support learners and teachers. (Bennett, telephone bridge where the conference is established by
2005) having all of the distant sites call in to a common bridge
telephone number. (T. Cavanaugh, 2005)
Telecare
The use of information and communications technology Telecommunication
to provide medical services and resources directly to a 1: Any transmission, emission, or reception of signs, signals,
patient in his or her home. (Becker, 2006) writings, images, sounds, or information of any nature by
wire, radio, visual, or other electromagnetic systems.
Telecenter (Melkonyan, 2005) 2: A broadly dispersed communications
1: A multi-functional office area outfitted with network involving a transmitter, a medium (line), a channel
communication and information processing equipment imposed upon the medium, and a receiver. (M. Mitchell,
using computer assets with access to telecommunication 2005b) 3: The exchange of information between computers
networks. (Kabene, Leduc, & Burjaw, 2005a) 2: An open via telephone lines. This typically requires a computer, a
social system where people interact among themselves, modem, and communications software. (Luppicini, 2006)
with technology and with their context, exchanging 4: The transmission of data, text, sound, and images
information, materials, ideas, feelings, and so forth. over long distances, and the physical infrastructure that
The purpose of a telecenter is to maintain this low supports such endeavor. (Ochoa-Morales, 2005) 5: The
by: (1) carrying out cultural, pedagogic, distributive, transmission, emission, or reception of signs, signals,
and socio-organizational functions; and (2) providing writings, images, sounds, or information of any nature
access to the necessary technology. (Santos, 2005) 3: by cable, radio, visual, optical, or other electromagnetic
Shared site that provides public access to ICT. (Cecchini, systems. It refers to long-distance communication carried
2005) 4: A public-access facility providing electronic out with the aid of electronic equipment such as the radio,
communications services, especially in marginalized or telegraph, telephone, and television. The information
remote areas where commercial development of ICT is that is transmitted can be in the form of voice, symbols,
not prevalent. (Songan et al., 2005) 5: A public-access pictures, or data, or a combination of these. The physical
facility providing electronic communication services, equipment for a telecommunications system includes
especially in marginalized or remote areas where ICTs a transmitter, one or more receivers, and a channel or
are not prevalent. Computers and networking facilities means of communication such as the air, water, wire,
are normally available in the telecenter. (Gnaniah, Yeo, cable, communications satellite, or some combination of
et al., 2005) 6: A shared, centrally located community these. (Magagula, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te le c om m unic at ions Ac t Te le duc at ion 679

Telecommunications Act Teleconferencing


The irst major overhaul of American telecommunications 1: Communication that allows participants to hear and
policy in nearly 62 years. This act added Section 255 to the see each other at multiple remote locations. (C. Wright,
T
Communications Act of 1934. (Bursa et al., 2005) 2005) 2: Many-to-many synchronous communication
between two or more groups in separate sites via audio,
Telecommunications Action Plan for Remote video, and/or computer systems. Participants at each site
Indigenous Communities (TAPRIC) can simultaneously hear and see each other via monitors.
Released in May 2002 by the Australian Federal Connecting two sites together is known as point-to-
Government; provides a framework for improving ICT to point or site-to-site conferencing. A connection between
remote indigenous communities. (Dyson, 2005) three or more sites is known as multi-point or multi-site
conferencing. (Erlich, 2005)
Telecommunications Infrastructure
The aggregate of equipment, such as radios, telephones, Telecottage
teletypewriters, facsimile equipment, data equipment A community-based facility to assist learning, access
(computers, modems and other equipment), cables, and to technology, and access to work. (Kabene, Leduc, et
switches, used for providing telecommunications services. al., 2005)
(Melkonyan, 2005)
Teledemocracy
Telecommunications System A normative theory on democracy that is dedicated to
A collection of individual telecommunications networks, greater, improved, and more direct citizen participation
transmission systems, relay stations, tributary stations, and and inluence in all aspects of government. It is based on
data terminal equipment usually capable of interconnection the notion of transformational politics that emphasizes
and interoperation to form an integrated whole. The the necessity to ine-tune a democratic system to meet
components of a communications system serve a common the requirements of an increasingly complex information
purpose, are technically compatible, use common society. This is evident in how it favors the utilization
procedures, respond to controls, and operate in unison. of new ICTs in democratic processes, in such forms as
(Melkonyan, 2005) electronic town meeting, scientiic deliberative polling, and
new democratic use of the Internet. The most prominent
Telecommunications Technology academic developer and advocate of teledemocracy is
All technologies, including telephone, telex, fax, video/ Professor Ted Becker, Auburn University, Alabama, USA.
audio conferencing, e-mail telecommunications channels (Anttiroiko, 2005a)
or networks (e.g., either wired or wireless: local public
telephone lines or more sophisticated channels and Teledensity
networks such as ISDN, Frame Relay, DSL, microwave, 1: The number of telephone lines per 100 inhabitants in
satellite, and LAN and WAN technologies), which could a given geographic area. (Poda & Brescia, 2005) 2: The
provide up to several gigabits of data transfer per second number of telephone mainlines per 1,000 people. (Cecchini,
(Gbps). (Al-Qirim, 2005) 2005) 3: The number of telephones per 100 people in a
region. (Roofe, 2005)
Telecommuting
1: Work arrangement that allows employees to work at Teleducation
home during regular work hours. Also called Telework. 1: Term used in Latin America to deine educational
(Blanger, 2005) 2: The practice of working from the systems in which the main delivery technology is television.
employees home instead of physically commuting to a It is often used as a synonym of distance education.
company ofice location. The connection to the ofice Telecourse, teleschool, and telecenter are derivations
is done via telecommunications, rather than physically of teleducation. (Barrera, 2005) 2: Teacher support and
commuting (i.e., traveling) to the ofice. (Staples et al., educational resources supplied mainly through computers
2005) using one-way or two-way communication for distance
education programs from K-12, universities, or adult
learning. (Harris, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
680 Te le he a lt h Te le w ork ing

Telehealth from ones own physical location. Telepresence creates a


1: ICT-enabled clinical health care, health education, and virtual or simulated environment of the real experience.
T health administration. (Latchem, 2005) 2: The use and (El-Gayar et al., 2005)
transmission of video, voice, and text data for a multitude
of health-related issues, including health management, Teleservice Center
patient care, and health worker training and education, as Electronic points of presence (often in rural areas) that
well as individual and patient education on health matters. provide a range of services, training, and facilities. A hub
(Kabene, Takhar, et al., 2005) 3: The use of information for information and knowledge economy development.
and communications technologies to provide a broader (Geiselhart & Jamieson, 2005)
set of health care services including medical, clinical,
administrative, and educational ones. (Becker, 2006) Television
The combination of text, graphics, audio, and video with
Telemedicine links and tools that allows the user to navigate and interact,
1: A means of delivering medical services to any place, but lacks the means to provide users the opportunity to
no matter how remote, thereby removing the limitations create and contribute their own ideas. (Bradley et al.,
of space and time that exists in todays health care 2005)
settings. (Murthy & Krishnamurthy, 2005d) 2: ICT-
enabled exchange of medical information to help doctors, Television Commerce (T-Commerce)
nurses, and so forth. (Latchem, 2005) 3: Medicine from a E-commerce occurring over the medium of television.
distance where distant and dispersed patients are brought (Galanxhi-Janaqi & Nah, 2005)
closer to their medical providers through the means of
telecommunication technologies. (Al-Qirim, 2005) 4: Telework
Refers to the delivery of health care at a distance using 1: Working from a remote location operating through
telecommunications or the Internet. (Wang, Cheng, et al, electronic transmissions. (Calzonetti & deChambeau,
2006) 5: The delivery of health care through the Internet 2006) 2: Ability to carry out work from a distance, for
or other computerized means such as videoconferencing. example, sitting at home and doing ofice work. Telework
(Cannoy & Iyer, 2006) 6: The provision of clinical advice does not imply that the worker is mobile (i.e., in motion)
by health care professionals to patients living in remote in any sense, even though the concept of telework is
rural areas. Technology used in telemedicine can range sometimes used as a synonym for mobile work. (Wiberg,
from telephones to more sophisticated applications that 2005) 3: ICT-enabled work, product, or service delivery or
employ advanced image as well as audio capabilities, for communication with employers or customers undertaken
example, x-rays or teleconferencing. (Harris, 2005) 7: The in a telecenter, at home, or while traveling. (Latchem,
use of information and communications technologies to 2005) 4: Use of computers and telecommunications to
provide medical services and resources. (Becker, 2006) enable people to work remotely away from the ofice. The
substitution of telecommunications for transportation.
Telepointers (OHagan, 2005)
The act of moving an on-screen tracking symbol, such as
a cursor, by manipulating the input device from a remote Teleworking
site. (Murthy & Krishnamurthy, 2005d) The concept of teleworking was originally conceived
during the oil crisis of the early 1970s to describe the
Telepresence possibility of working from home by means of computers
1: A psychological phenomenon of being mentally present and telecommunications to avoid the day-to-day
at a technologically mediated remote world. (Sas, 2006) commuting to the central oficetelecommuting. Its
2: The degree to which the individual feels present in connotation has since been extended to include all work-
the virtual environment rather than in his/her immediate related substitutions of ICT for travel. Today, teleworking
physical environment. (Roberts et al., 2006a) 3: The is generally used to refer to a variety of lexible work
experience of presence in an environment by means of organizations with different combinations of work in the
a communication medium. (P.M. Leonardi, 2005) 4: central ofice, at customer sites, in satellite centers, on the
The feeling of being fully present at a remote location road, or at home. (Kimble & Li, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T ELN ET Te m pora l Full-Tex t I ndex 681

TELNET Temporal Data Model


1: A terminal emulation program for TCP/IP networks A data model with constructs and operations to capture
such as the Internet. The TELNET program runs on the and manipulate temporal data. (Tansel, 2005)
T
client computer and connects it to a host on the network.
Commands can be then entered through the TELNET Temporal Database
program, and they will be executed as if the user was 1: A database that has transaction time support, valid
entering them directly on the server console. (Kontolemakis time support, or both. In the literature, it is loosely used
et al., 2005) 2: An early protocol for network computing, to mean a database that has some kind of time support.
enabling a user to log on to a remote machine and access (Tansel, 2005) 2: A database that supports some aspect
its iles. (Murphy, 2005a) of time, not counting user-deined time. (Ale & Rossi,
2005) 3: A database that supports the maintenance of
TELRIC: See Total Element Long-Run Incremental Cost. time-evolving data and the satisfaction of specialized
queries that are related to three notions of time for these
Template data: the past, the present, and the future. (Tzouramanis,
1: A combination of static content, references to units 2005) 4: A database that records time-variant information.
of existing content, and program code for producing the It is deined as an union of two sets of relations Rs and
content and navigation aids for a Web site. (Honkaranta R1, where Rs is the set of all static relations and R1 is the
& Tyrvinen, 2005) 2: A pre-designed master document set of all time-varying relations. (Raisinghani & Klassen,
that is reusable. (Judd, 2005) 3: A solution to a recurring 2005) 5: Ability of the database to handle a number of time
problem that is more specialized than problems handled by dimensions, such as valid time (the timeline of perception
patterns. (Berztiss, 2006b) 4: At the programming level, of the real world), transaction time (the time the data is
a template allows programmers to fully write and debug stored in the database), and schema time (the time that
their code without specifying certain types of variables. indicates the format of the data according to the active
Later the template can be instantiated by providing it with schema at that time). (Bounif, 2005)
the necessary variable types as needed. The same template
can be instantiated several times with different sets of Temporal Document
variable types. (Gaffar, 2005) 5: Templates are included in A document in which the currently valid version and also
an inheritance hierarchy, HTemp(lates), which implements the previously valid versions of the document are kept in
NKRLs ontology of events. (Zarri, 2006c) the system,. Every document version has an associated
time period in which it was valid. (Nrvg, 2005)
Template Matching
Involves designing template masks, which are capable of Temporal Document Database Management
detecting incidences of the relevant feature at different System
orientations. (Chan, Ho, et al., 2005) A system capable of storing, retrieving, and querying
temporal documents. Typically, a document name or
Temporal document identiier is used to distinguish documents from
Of or relating to time. (Hunter & Carr, 2005) each other, and timestamp is used to distinguish particular
versions of a document as well. (Nrvg, 2005)
Temporal Coordination Mechanism
A process structure imposed to intervene and direct the Temporal Element
pattern, timing, and content of communication in a group. Union of maximal time intervals in which no two time
(Wong-MingJi, 2005) intervals overlap or meet. (Tansel, 2005)

Temporal Data Temporal Full-Text Index


Time-oriented data. (Artz, 2005d) An index supporting retrieval of identiiers from documents
that contained a particular word at a particular point in
Temporal Data Mining time. (Nrvg, 2005)
An application of data-mining techniques to the data
that takes the time dimension into account. (Lingras et
al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
682 Te m pora l Loc a lit y Te r m ina l Ac c e ss-Cont rolle r Ac c e ss-Cont rol Syst e m (TACACS)

Temporal Locality Terabyte


Describes the effect that an object, which has just been A unit of memory or data storage capacity equal to roughly
T referenced, has a high (or increased) probability of being 1,000 gigabytes. (Pang, 2005a)
referenced again in the near future. Formally: let pi(k)
denote the probability that, following a reference to object Term
i, the next reference to object i occurs within k references. One of the dimensions of the vector space in which
We say that a particular object shows temporal locality documents are represented according to the vector space
of reference if there exists a k > 0 such that pi(k) > 1 - (1 model. In thematic applications of text categorization,
- 1/n)k. (Katsaros & Manolopoulos, 2005a) terms usually coincide with the content-bearing words (or
with their stems) that occur in the training set; in non-
Temporal Recommender thematic applications, they may be taken to coincide with
Recom mender that incor porates time into the the topic-neutral words or with other custom-deined global
recommendation process. Time can be either an input to characteristics of the document. (Sebastiani, 2005)
the recommendation function, or the output of the function.
(Schafer, 2005) Term Frequency
The number of times a term appears in a document. (Fan
Temporal Sphere of Inluence & Pathak, 2005)
Tracking actions while within a speciied time domain.
(Mohamed & Ottmann, 2006) Term Frequency Inverse Document Frequency
(TFIDF)
Temporal Structured Query Language (TSQL) Weighting scheme for document and query representation
With TSQL, ad hoc queries can be performed without in the vector space model. Each dimension represents a
specifying any time-varying criteria. The new criteria term, its value is the product the frequency of the term
clause would be either WHEN or WHILE. Either name in a document (TF) and the inverse document frequency
captures the idea of a time-varying condition. Currently, (IDF) of the term. The inverse document frequency of a
a proposal to add TSQL to the existing ANSI and ISO term is the logarithmic proportion of documents in which
SQL standards is under consideration by the respective the term occurs. The TFIDF scheme assigns a high weight
governing bodies. (Raisinghani & Klassen, 2005) to terms which occur frequently in the focused document,
but are infrequent in average documents. (Bickel &
Temporally Bound Scheffer, 2005)
A story that has a beginning, an end, and a chronological
sequence. (Hunter,2006a) Term Frequency Inverse Document Frequency
(TFIDF) Vector Model
Temporary Term frequency is the raw frequency of a given term
Virtual organizations are often formed to ill temporary inside a document, which provides one measure of how
needs, only extending to the end of the speciic project that well that term describes the document contents. Document
is charged to them. In a manufacturing project, a virtual frequency is the number of documents in which a term
organization may be formed between the engineers who appears. The motivation for using an inverse document
design the project, suppliers who provide the raw materials, frequency is that terms that appear in many documents
and the factory who processes those into inished goods. are not very useful for distinguishing a relevant document
At the end of that particular project, those alliances are from a non-relevant one. (Hua et al., 2006)
dissolved as they are no longer necessary to beneit the
three independent groups. (J. Lee, 2005) Terminal Access-Controller Access-Control
System (TACACS)
10 Gigabit Ethernet An older access-control method, common on UNIX
Compatible with Ethernet, Fast Ethernet, and Gigabit systems, where an encrypted version of the users
Ethernet technologies. Deined by the IEEE 802.3ae logon password must be sent across the network to an
standard, 10 Gigabit Ethernet provisions CoS or QoS authentication server. TACACS+ is a more recent CISCO
assurances for multimedia transmissions, whereas ATM proprietary approach. (Knight & Labruyere, 2005)
supports QoS guarantees. (Littman, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te r m ina l De fe nse Tex t I nput Pa ne l (T I P) 683

Terminal Defense sampling distributions which are known a priori. However,


An initiative, undertaken by the owners of individual under certain circumstances, null sampling distributions
nodes in a network, to protect their individual nodes for arbitrary functions can be obtained by computational
T
from persistent, well-supported intrusion. (Janczewski means. (Mukherjee, 2005)
& Portougal, 2005)
Test-Delivery System
Termination A tool for the delivery of tests to students. The tool may
A rewrite system terminates if it has no ininite chain. be used to deliver tests using a stand-alone computer
(Fischer, 2005) on a local area network or over the World Wide Web.
(Valenti, 2005)
Termination Condition
The condition in a CQ which speciies to terminate the Testing a Neural Network
evaluation of the query. (Khan, 2005) To know whether a trained neural network is the mapping
or the regression we need, we test this network with some
Territory-Related Ontology data that have not been used in the training process. This
Descriptive speciication of terms and their respective procedure is called testing a neural network. (Chu &
relations, within the context of a physical or virtual space. Wang, 2005)
It is an abstract, although explicit, conceptualization
used to describe, comment, and exchange knowledge Testing Case
and meaningful content among computational resources Each of the cases (records) of the test set. (Parpinelli et
and users of a geographical domain. (Moutinho & Heitor, al., 2005)
2005)
Text Classiication
Tertiary Courseware 1: The task of assigning documents expressed in natural
A type of courseware based on accumulating discussions language to one or more categories (classes) of a predeined
of problems and learning impasses. The idea is derived set. (Bickel & Scheffer, 2005) 2: The task of automatically
from a three-stage cyclical theory of learning in which assigning a set of text documents to a set of predeined
the irst stage (conceptualization) gives rise to primary classes. Recent text classiication methods adopt supervised
courseware that is essentially expository, and the second learning algorithms such as Nave Bayes and support
stage (construction) to secondary courseware that vector machine. (Kim, 2005)
provides activities such as problem solving. The third
stage (dialogue) may often occur in relation to issues and Text Database
impasses that arise at the second stage and ind resolution A database system managing a collection of texts.
through discussion. Capturing such discussion gives rise (Navarro, 2005)
to tertiary courseware. (J.R. Lee, 2005)
Text Equivalent
Test Error An alternative version of a document that provides the
Learning systems should be evaluated with regard to their same functions and conveys the same information as the
true error rate, which in practice is approximated by the media-rich version, but without using non-text media.
error rate on test data, or test error. (Muruzbal, 2005) (Fagan, 2005)

Test Set Text Expansion


A set of cases unseen during the training phase of the Situation in which one language requires more words to
algorithm and used to compute the predictive accuracy express the same meaning than does another language.
of the list of rules discovered during the training phase. (St.Amant, 2005a)
(Parpinelli et al., 2005)
Text Input Panel (TIP)
Test Statistic A software-based panel that appears on a tablet PCs
A relevance scoring function used in a hypothesis test. screen to allow the user to input information using a soft
Classical test statistics (such as the t-statistic) have null keyboard or ink. (Roldan, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
684 Tex t M ining T FI DF Ve c t or M ode l

Text Mining Textuality, Intertextuality, and Contextuality


1: A computer-supported process that uses computational In philosophical and ontological terms, it is within a text
T algorithms and tools over textual data with the objective that a discourse is woven, thus realizing, by the nature
of discovering statistical patterns. Most common methods of its own movement, the topography of the world and
include clustering, classiication, and association analysis. the maximum meaning of reality. Philosophy not only
Most of the time, the expression is interchangeable with is linguistic in nature, but it is also characteristically
knowledge discovery from texts, however the last is a literary, which means that it has to become involved in the
larger process where the irst one is involved. (Antonio fundamental conditions of the functioning of language.
do Prado et al., 2005) 2: A process of identifying patterns Philosophy, or rather the philosophical discourse, could
or trends in natural language text including document be said to lead language to achieve its best expression, in
clustering, document classiication, ontology learning, the sense that it realizes its fundamental aim, which is to
and so forth. (Chung et al., 2005) 3: Known as text data manifest the broadest sense possible. Tantalization is part
mining or knowledge discovery from textual databases, of the global action of emergence of meaning; humans
and refers to the process of extracting interesting and enter this action as agents and as a result of the process
non-trivial patterns or knowledge from text documents. itself. Where the act of tantalization is more visible and
(Faz & Mahmoudi, 2005) 4: The application of analytical apprehensible, taking the perspective of its comprehension,
methods and tools to usually unstructured textual data and where we can measure the extent and reach of the
for the purpose of identifying patterns and relationships intertextualization, is at the fundamental moment of
such as classiication, prediction, estimation, or afinity contextualization. Intertextuality exists when there are
grouping. (Yang & Lee, 2005) 5: The automatic analysis referents present in one text which allude to referents
of a large text collection in order to identify previously in other texts. Intertextualization is the intertwining of
unknown patterns, trends, or anomalies, which can be used different texts, the relationship between texts. Each text
to derive business intelligence for competitive advantage meaning or action is generated by a previous text meaning
or to formulate and test scientiic hypotheses. (Kroeze, and action. If authors are texts, action has stronger reason
2005) 6: The process of discovering new information to be a text, as it is the distension of meaning from
analyzing textual collections. (Loh et al., 2005) where other meaning may emerge. Contextualization
takes the work of the manifestation of meaningthe
Text Mining by Concepts tantalizationand integrates it within the continuity of
The application of text-mining methods over textual the meaning previously given. Contextualization is the
documents that are represented or modeled by concepts organization of a text: it deepens the world of the interpreter;
instead of words. (Antonio do Prado et al., 2005) it captures the vectors of different texts in their fusion;
and it produces a new text, which relects the increase in
Text Segmentation meaning. Contextualization shows the dynamic nature
The process of partitioning a text into segments according of the manifestation of meaning: the intentionality that
to a given criterion. (Kulyukin & Nicholson, 2005) transverses it; the active participation of the interpreter; and
the historical, temporal, differentiated, and simultaneously
Text Summarization global nature of that manifestation. (Nobre, 2006a)
A process of generating summary from a longer text,
usually based on extracting keywords or sentences, or Texture Feature
generating sentences. (Mladeni, 2005) Depicting the surface of an image object. (Chan & Chang,
2005)
Text-to-Speech (TTS)
A TTS synthesizer is a software application that takes TFIDF: See Term Frequency Inverse Document
text input and produces its corresponding voice rendition. Frequency.
(Lahiri & Basu, 2005)
TFIDF Vector Model: See Term Frequency Inverse
TextTiling Document Frequency Vector Model.
A technique for automatically subdividing texts into multi-
paragraph units that represent passages, or subtopics. (Faz
& Mahmoudi, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T he m at ic Se a rch Engine T hird Ge ne rat ion of M obile Com m unic at ions Te chnology (3 G) 685

Thematic Search Engine posits that an individuals attitude toward a given behavior
A search engine devoted to the construction and is determined by the belief that this behavior will result
management of a database of Web pages that pertain to in a particular outcome. (McHaney, 2005) 2: States that
T
a limited subset of the knowledge or of the Web users. the intention to adopt is affected directly by attitudinal
(Caramia & Felici, 2005) components (beliefs about the outcome of the behavior
and beliefs of the consequences of the behavior) and the
Theory subjective norm component (level of importance or desire
A set of patterns of a pdBf (T, F), such that each data vector to please signiicant others and/or society). (McManus &
in T has a pattern satisfying it. (Boros et al., 2005) Standing, 2005)

Theory of Complex Adaptive Systems Theory of Systems


A theory that was born in the discovery of chaotic dynamics A research inquiry paradigm based on an expansionist
in systems behaviors. It uses systemic inquiry to build world view, a synthetic and holistic thought, and teleological
fuzzy, multi-valent, multi-level, and multidisciplinary principles, which makes it suitable and effective for
representations of reality. (Askar & Kocak-Usluel, studying complex phenomena. (Gelman et al., 2005)
2005)
Thermodynamic Emergence
Theory of Informational Added Values This is of the view that new stable features or behaviors can
Concept discussing the impacts of information work in arise from equilibrium through the use of thermodynamic
information markets comprising the following eight types: theory. (Deb, 2005)
organizational, strategic, innovative, macroeconomic,
eficiency, effectiveness, aesthetic-emotional, and lexible Thesaurus Module
added values. Informational added values may represent A keyword-expansion mechanism to increase the coverage
the resulting beneit of an e-commerce solution as well and success rate of information search using a user-entered
as of an m-commerce solution. (Derballa & Pousttchi, keyword (or keywords). (Quah, Leow, & Soh, 2006)
2006a)
They Relation
Theory of Planned Behavior (TPB) Relation where our partners are types, and not concrete
1: According to the theory, human behavior is guided by and unique individuals. We experience then in more or less
three kinds of beliefs: beliefs about the likely outcomes of the anonymous processes, and thus we obtain relatively little
behavior and the evaluations of these outcomes (attitude); specialized information about their motives and actions.
beliefs about the normative expectations of others and (Shariq & Vendel, 2006)
motivation to comply with these expectations (subjective
norms); and beliefs about the presence of factors that may Thinking Along
facilitate or impede performance of the behavior and the Consists of the temporary application of ones knowledge to
perceived power of these factors (perceived behavioral somebody elses problem. This includes the application of
controls). As a general rule, the more favorable the attitude tacit knowledge, intuitions, associations, and hunches. The
and subjective norm, and the greater the perceived control, application of this knowledge may yield ideas, hypotheses,
the stronger should be the persons intention to perform suggestions, comments, questions, and so on. (Berends
the behavior in question. Intention is assumed to be the et al., 2006)
immediate antecedent of actual behavior. (Kankanhalli
et al., 2006) 2: An extension of the Theory of Reasoned Third Generation of Mobile Communications
Action (TRA). It adds a third dimensionthe perceived- Technology (3G)
behavior control componentthat looks at uncontrolled 1: Popular term for high-speed mobile cellular networks.
external circumstances. (McManus & Standing, 2005) (Gilbert, 2005c) 2: Will bring wireless transmission
speeds up to 2Mbps, which permits high-quality wireless
Theory of Reasoned Action (TRA) audio and video. It comprises three primary standards:
1: This theoretical model explains actions by identifying W-CDMA (wideband code division multiple access),
connections between various psychological constructs CDMA2000, and TD-CDMA (time division CDMA). (Lei
such as attitudes, beliefs, intentions, and behaviors, then et al., 2005a) 3: The services associated with 3G provide

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
686 T hird M ission T hre e -Dim e nsiona l Com put e r-Aide d De sig n (3 D CAD)

the ability to transfer both voice data (a telephone call) Third-Party Logistics
and non-voice data (such as downloading information, The activity of outsourcing activities to an independent
T exchanging e-mail, and instant messaging). (Wong, 2006) company that perform clients management function of
4: Long-awaited digital mobile systems with a maximum the logistic operations. (Tyan, 2006)
data rate of 2 Mbps under stationary conditions and 384
kbps under mobile conditions. This technology is capable Third-Person Perspective
of handling streaming video, two-way voiceover IP, The visualization of the gaming environment through an
and Internet connectivity, with support for high-quality external body of the character. (Ip & Jacobs, 2006)
graphics. (Akhtar, 2005) 5: A wireless communication
technology which supports multimedia, video streaming, Thoroughness
and videoconferencing. (Petrova, 2006) 6: A wireless A measure for assessing usability inspection methods.
system that can provide fairly high-speed (384 Kbps) Determined by dividing the number of real problems found
packet-switched wide-area wireless Internet access to by the Usability Inspection Method (UIM) by the number
support multimedia applications. (Lee, Hu, & Yeh, 2005) of known problems. (Woolrych & Hindmarch, 2006)
7: The generic term used for advanced multimedia wireless
communication. (M. Rowe, 2005a) Thou Relation
Relation where no reciprocal awareness exists among us
Third Mission and our partners, and therefore, understanding involves
The desire of the UK government to extend the remit of UK more anonymous types of meaning. (Shariq & Vendel,
universities beyond their traditional research and teaching 2006)
role to a broader set of commercially oriented activities,
including the establishment of spin-out companies. Threaded Discussion
(Warren, 2006) 1: An asynchronous collaboration medium in which
participants contribute to topics and to contributions under
Third Sector topics, creating a nested discourse structure. (Carroll et al.,
A generic collective name for charity, voluntary, 2005) 2: Asynchronous communication via the Internet
community, and non-government organizations. Third whereby data can be transmitted intermittently or at any
sector refers to a set of civic and social organizations or time and at irregular intervals. An example would be e-mail,
institutions situated between the state (irst sector) and the whereby a message can be sent at any time by the user and
business world (second sector). (Arkhypska et al., 2005) read at any time by the recipient. (Cooper, 2005)

Third Wave Threat


A term used by Alvin Tofler (1981) to describe a new 1: Event that disrupts the normal operation of a building,
phase of societal development based on an Information organization, or network of computers. (Thuraisingham,
Revolution. The irst and second waves are the Agricultural 2005) 2: Something that can go wrong or that can attack the
Revolution and the Industrial Revolution, respectively. system. Examples might include ire or fraud. Threats are
(Lepawsky & Park, 2006) ever present for every system. (Tong & Wong, 2005a)

Third Way 3D CAD: See Three-Dimensional Computer-Aided


Political ideology proclaiming the need to move beyond Design.
the supposed dogmas of rigid social regulation and total
deregulation. For some this means a movement that 3D Interface
abolishes traditional forms of state/community and free An interface in which text and images are not all on the
markets. For others it has meant a fusion of both. (David, same lat level. (Xu et al., 2006b)
2005)
Three-Dimensional Computer-Aided Design
Third-Generation Partnership Project (3GPP) (3D CAD)
An industry body set up to develop a 3G standard based A computer-based graphical tool utilized in several
upon wideband CDMA (WCDMA). (Akhtar, 2005) industries to design and engineer products. (Aurum &
Demirbilek, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
3 G T im e Corre lat ion 687

3G: See Third Generation of Mobile Communications should not be visible to the user, but should be resolved
Technology. internally by the database system. (Baumann, 2005)
T
3GPP: See Third-Generation Partnership Project. TIM: See Tourism Information Marketplace.

3.5G Timbre
1: Interim system between 3G and 4G allowing a downlink A dimension of music which is deined by negation:
data rate up to 14 Mbps. Also called high-speed downlink timbre is not pitch nor dynamics, and is everything else.
packet access. (Akhtar, 2005) 2: Based on a technology Timbre deines the texture of the sound, and allows one
called high-speed downlink packet access. It will be to differentiate between different instruments playing the
upwardly compatible with 3G W-CDMA systems, but will same note (pitch) at the same volume. (Pachet, 2006)
enable more than 10 times the peak data rate and more than
6 times the capacity of initial 3G systems. (Lei, 2006) Time Activator
Trigger for initiating automatic update of the report in the
Three-Tier Application informationbase. Could be calendar day, month or year,
Consists of clients in the front tier, servers that perform inancial (booking) month, and so forth. So, if the trigger
the application business logic processing in the middle is calendar day, the report is produced automatically each
tier, and databases that store the application data in the day. If the trigger is booking month, the report is produced
backend tier. (Zhao et al., 2006) whenever booking month is changed in the database.
(Dragan, 2005)
Three-Tier Client/Server
Three-tier splits the logic between: (1) clients that run the Time Bank
graphical user interface (GUI) logic, (2) the application A tool for community building. The basic idea is that
server running the business logic, and (3) the database people help each other by exchanging the performance
and/or legacy application. (Galup et al., 2005) of simple, though useful, tasks among them. Examples
include gardening, cooking, simple home repairs, teaching
Three-Tier Model languages, and so forth. (Camarinha-Matos & Ferrada,
A model consisting of a headquarters, and regional and 2006)
student modules. The student module is the interface for
the student and it communicates only with the regional Time Barrier
module. The regional module acts an intermediary between Time is typically the most commonly cited barrier
the student and the headquarters module. The regional by teachers to involvement in staff development and
module also aggregates all the communications from the development of online learning materials. (Salter, 2005b)
individual students before sending them to the headquarters
and vice versa. (Shareef & Kinshuk, 2005) Time Compression
A term that describes the faster replay of continuous
TICCIT: See Time-Shared Interactive Computer media iles, such as audio or video signals. In the context
Controlled Information Television. of speech recordings, time compression usually assumes
that special techniques are used to avoid pitch shifting,
Tie Strength which otherwise results in unpleasant, very high voices.
The strength of a tie is a function of frequency of contact, (Hrst & Lauer, 2006)
affect, and reciprocity. The stronger the tie, the more easy
it is for one actor to inluence and convey complex, multi- Time Constraint
faceted information to another. (Nelson & Hsu, 2006) Refers to the need to catch something just when it takes
place because time lows. (Cirrincione, 2005)
TIFF: See Tagged Image File Format.
Time Correlation
Tiling Time-delayed relationship between two or more time
The technique of decomposing raster data objects into series. Time correlation can be used for identifying causal
smaller raster items (tiles) for storage purposes. Tiling relationships among multiple time series. (Sayal, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
688 T im e De la y T im e St re t ching

Time Delay Time Management System (TMS)


Often, the decisions and their consequences are not closely Calendar-based application that allows a user to schedule
T related in time. For instance, the response of gasoline sales her/his tasks, monitor their execution, and provide various
to the changes in price involves time delays. If prices go up, descriptions for them. (Abramowicz et al., 2006)
then after a while, sales may drop. (Qudrat-Ullah, 2006)
Time of Arrival (TOA)
Time Difference of Arrival (TDOA) 1: A positioning technology where information is derived
A remote positioning service where the time difference from the absolute time for a wave to travel between a
of arrival of a radio signal sent by one single mobile transmitter and a receiver or vice versa. (Giaglis, 2005) 2:
device at several base stations is recorded. (Fraunholz Similar remote positioning service to Time Difference of
et al., 2005) Arrival (TDOA), where the running time of a radio signal is
measured and not the time. (Fraunholz et al., 2005) 3: The
Time Division Multiple Access (TDMA) time-of-arrival positioning method is based on measuring
A technology for sharing a medium by several users by the time needed by a signal transmitted by a mobile phone
dividing into different time slots transmitting at the same to reach three or more location-measurement units (LMUs).
frequency. (Akhtar, 2005) From these measurements, the distance between the phone
and the LMU can be calculated as the radius of a circle
Time Domain with the LMU as its center. The intersection of three or
The representation of a signal, such as the amplitude or more such circles gives the actual position of the mobile
pressure of a sound wave, as a function of time. (Dixon, phone. (Ververidis & Polyzos, 2006)
2005)
Time Series
Time Economy 1: A sequence of observations or events that are ordered
Time deined by clock time and production, where time in time. The successive observations will be dependent
in the form of labor is exchanged for money. (Jain & on time or previous events. (Cho, 2005) 2: Composed of
Lyons, 2005) a sequence of values, where each value corresponds to a
time instance. The length remains constant. (Kontaki et
Time Expansion al., 2005) 3: Sequence of data values that are recorded with
A term that describes the slower replay of continuous equal or varying time intervals. Time series data usually
media iles, such as audio or video signals. In the context includes timestamps that indicate the time at which each
of speech recordings, time expansion usually assumes individual value in the times series is recorded. (Sayal,
that special techniques are used to avoid pitch shifting, 2005) 4: Sequence of real numbers, collected at equally
which otherwise results in unpleasant, very low voices. spaced points in time. Each number corresponds to the
(Hrst & Lauer, 2006) value of an observed quantity. (Denton, 2005)

Time Granularity Time Series Model


Unit of time, such as seconds, minutes, hours, days, months, A model that forecasts future values of the time series
years. Time advances by each clock tick according to the based on past data. (Kumar, 2005)
granularity used. (Tansel, 2005)
Time Stretching
Time Interval (Period) Sometimes also referred to as time scaling, this term is often
The consecutive set of time points between a lower bound used to embrace techniques for the replay of continuous
(l) and an upper bound (u) where l < u. The closed interval media iles using time compression and time expansion,
[l, u] includes l and u, whereas the open interval (l, u) does particularly in relation to speech signals in which faster
not include l and u. Half-open intervals [l, u) or (l, u] are or slower replay is achieved in a way that preserves the
analogously deined. (Tansel, 2005) overall characteristics of the respective voices, such as
pitch and timbre. (Hrst & Lauer, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T im e -Ba se d Cont inua l Que r y Top-Dow n Cube Com put at ion 689

Time-Based Continual Query TIP: See Text Input Panel.


The continual query that is executed at regular intervals.
(Khan, 2005) TMC: See Translation-Mediated Communication.
T
Time-Shared Interactive Computer Controlled TMS: See Time Management System.
Information Television (TICCIT)
A computer-assisted instruction system developed by TMUX: See Transmultiplexer Filter Bank.
the MITRE Corp. and funded by the National Science
Foundation in 1968, based on television technology TOA: See Time of Arrival.
products controlled by a time-shared computer system,
designed to provide TV-based individualized instruction. TOE: See Target of Evaluation.
(Reisman, 2006)
Token
Time-Space Compression An abstract concept passed between places to ensure
Dislocating aspects of technological change that force shifts synchronized access to a shared resource in a distributed
in perceptions of time and space. Usually, transport and environment. (Guan, 2005d)
communications technologies are cited as prime examples,
for example, the world before and after the automobile, Tolerance
the jet plane, the telegraph, or the telephone. (Lepawsky The process whereby increasing amounts of the particular
& Park, 2006) activity are required to achieve the former effects. For
instance, a gambler may have to gradually have to increase
Time-Tolerant and Eventually Consistent the size of the bet to experience a euphoric effect that
Transaction was initially obtained by a much smaller bet. (Grifiths,
Some transactions can wait until reconnection takes place, 2005)
and are not time- critical, in the sense they will not create
global inconsistency, but are only necessary to provide Tonal Music
an eventual consistency with respect to the user and the Music following the rules of tonality (i.e., based on
relevant database. (Murthy & Krishnamurthy, 2005c) scales). Usually opposed to atonal music such as serial
music (based on the principle that all notes must be used
Time-to-Live (TTL) with the same frequencies), spectral music (based on the
A ield in the IP packet header. Its value is the allowed nature of sounds rather than on pitches), minimalism, and
hop-count, the number of routers, which can forward the so forth. (Pachet, 2006)
packet before delivery or dropping out. (Hosszu, 2005a)
T1: See T-1.
Timer
Used to determine timestamp of navigation events invoked Tool
by the teacher during the recording stage. (Liu & Chen, An artifact used to achieve speciic, predetermined goals.
2005) Deined by human-computer interaction and certain
branches of philosophy by its disappearance in use.
Timeslice/Snapshot Query (Kettley, 2006b)
A query that asks for data as of a given transaction time.
For example, ind all objects alive during a time interval. Top-Down Approach
(Rodrguez-Tastets, 2005b) Initiating from the highest level of a hierarchy, down to
the grassroots level. Opposite of Bottom-Up Approach.
Timing Advance (Gnaniah, Yeo, et al., 2005)
A GSM-speciic method for determining the distance
between a base station and a mobile device. (Fraunholz Top-Down Cube Computation
et al., 2005) Cube construction that starts by computing the base cuboid
and then iteratively computing the remaining cells by

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
690 Topic Topologic a l I nva ria nt

aggregating over already computed iner-grade cells in is provided, their topics as well as the associations among
the lattice. (Abdulghani, 2005a) topics are identiied and are used to form a map that guides
T the user through the topics. (Yang & Lee, 2005)
Topic
The object or node in the topic map that represents the Topic Occurrence
subject being referred to. However, the relationship between A topic may be linked to one or more information resources
topics and subjects is (or should be) one to one, with every that are deemed to be relevant to the topic in some way.
topic representing a single subject, and every subject being Such resources are called occurrences of the topic. (Yang
represented by just one topic. (Yang & Lee, 2005) & Lee, 2005)

Topic Association Topic Ontology


The relationship between two or more topics in a topic A collection of terms that characterize a topic at multiple
map. (Yang & Lee, 2005) levels of abstraction. (Chung et al., 2005)

Topic Detection and Tracking (TDT) Topic Tracking


1: A DARPA-sponsored initiative to investigate the state A TDT component that tracks events of interest based on
of the art for news understanding systems. Speciically, sample news stories. It associates incoming news stories
TDT is composed of the following three major components: with the related stories, which were already discussed
(1) segmenting a news stream (e.g., including transcribed before, or it monitors the news stream for further stories
speech) into topically cohesive stories; (2) identifying on the same topic. (Chung et al., 2005)
novel stories that are the irst to discuss a new event; and
(3) tracking known events given sample stories. (Chung Topic Type
et al., 2005) 2: A sub-ield of information retrieval. The Topics can be categorized according to their kind. In a
goal is to detect the irst appearance of text that differs topic map, any given topic is an instance of zero or more
from a body of previously processed text, or to monitor topic types. This corresponds to the categorization inherent
the behavior of some identiied themes over time. (Chen, in the use of multiple indexes in a book (index of names,
Toprani, et al., 2006) index of works, index of places, etc.), and to the use of
typographic and other conventions to distinguish different
Topic Hierarchy (Taxonomy) types of topics. (Yang & Lee, 2005)
A formal hierarchical structure for orderly classiication
of textual information. It hierarchically categorizes Top-Level Ontology
incoming documents according to topic in the sense that An engineering object deining the very general concepts
documents at a lower category have increasing speciicity. on which a model of knowledge is created. In particular,
(Kim, 2005) top-level ontologies give account to the notions of relation,
entity, and instance, and model space, time, matter, and
Topic Identiication and Tracking the notion of things. (Cristani & Cuel, 2006)
A process of identifying appearance of new topics in
a stream of data, such as news messages, and tracking Topological Consistency
reappearance of a single topic in the stream of text data. Two representations are consistent if they are topologically
(Mladeni, 2005) equivalent or if the topological relations are valid under
certain consistency rules. (Rodrguez-Tastets, 2005a)
Topic Knowledge
Declarative memory consists of two types of knowledge Topological Relationship
topic or semantic and episodic. Topic knowledge refers to The intersections of boundary and interior of two regions
the meaning of a word, such as its deinitions in a dictionary embedded in R2. (Pourabbas, 2005a)
or textbook. (Raisinghani, 2005)
Topological Invariant
Topic Map One of the properties that are invariant under topological
A navigation scheme for exploring information resources in transformations. Examples of topological invariants are
a topic-driven manner. When a set of information resources

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Topologic a l Re lat ion Tourism Supplie r 691

the interior, boundary, and exterior of spatial objects. time, installation, maintenance, training, and so forth.
(Rodrguez-Tastets, 2005a) (Sowe et al., 2005) 3: Developed by the Gartner Group,
an accounting method used by organizations seeking to
T
Topological Relation identify their both direct and indirect systems costs. (Pang,
Describes the intersection and the incidence between 2005a) 4: An evaluation method with a broad perspective
objects. Six basic relations have been identiied in the on the costs of system ownership, including training, lost
literature: disjoint, meet, overlap, cover, contain, and productivity during learning cycles, maintenance, and so
equal. (Chbeir & Yetongnon, 2005) forth. TCO methodologies bring into focus a softer side
of the cost equation. (Dykman, 2005) 5: The total amount
Topological Requivalence of money that the decision of introducing new software
Two representations are said to be topologically equivalent costs. (Sahraoui, 2006)
if one can be mapped into the other by a topological
transformation of the real plane. Examples of topological Total Element Long-Run Incremental Cost
transformations are rotation, scale change, translation, and (TELRIC)
symmetry. (Rodrguez-Tastets, 2005a) The FCC pricing methodology for local loop unbundling.
It is based on forward-looking long-run incremental
Topology costs: essentially, the regulator estimates the overall
The branch of mathematics that deals with the properties additional cost supported by the incumbent when a certain
of geometric conigurations that are not altered by new element is introduced in its network, but under the
homomorphic transformations. In GIS, topology refers to hypothesis that the network is built with the most eficient
a set of techniques that allows us to determine the relative technology available. (Arbore, 2005)
positioning between two spatial objects, regardless of their
exact coordinates. (Davis et al., 2005) Total Information Awareness
A discontinued effort by the federal government to create
Topos a vast database containing public and private information
A category endowed with a certain collection of diagram on individuals to allow for advanced search techniques
operations that allow one to perform many manipulations to uncover suspicious activity or indications of possible
with objects and morphisms. Roughly, in a topos one terrorist links. (Holland, 2005)
can perform all constructive operations with objects:
intersections, unions, and other analogs of common set Toulmin Argument Structure
theoretical operations, including the powerset (forming Toulmin stated that all arguments, regardless of the domain,
the object of all sub-objects of a given object). Typical have a structure that consists of four basic invariants:
examples of toposes are the category of sets and mappings claim, data, warrant, and backing. Every argument makes
between them, the category of graphs, and graph mappings. an assertion. The assertion of an argument stands as the
(Diskin, 2005) claim of the argument. A mechanism is required to act as a
justiication for the claim, given the data. This justiication
Tort is known as the warrant. The backing supports the warrant
A civil wrong committed by another. Tort law recognizes and in a legal argument is typically a reference to a statute
that individuals or businesses may owe a duty of care to or precedent case. (Zeleznikow, 2006)
others with whom they have contact. If that duty of care
is breached, and the breach results in damages, the party Tourism Information Marketplace (TIM)
that owed the duty of care may be liable for the resulting A conceptual model depicting the entities that participate
damages. (Sprague, 2005) and interact in the processes that facilitate the exchange of
tourism information commodities. (Taylor, 2005)
Total Cost of Ownership (TCO)
1: Accounts for all of the costs associated with procuring, Tourism Supplier
deploying, and operating an existing asset like an ERP A business that supplies a tourism product for consumption
system at a given point in time. (Esteves & Pastor, 2005) by tourists. These may take various forms, such as
2: The total cost associated with acquiring software. This transport, attractions, events, accommodations, or
may include, but is not limited to, code downloading hospitality. (Hornby, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
692 T PB Tra dit iona l Te a m /Colloc at e d Te a m

TPB: See Theory of Planned Behavior. or discussion format was used. The same problem occurs
in grouping all distance learners and delivery formats
T TRA: See Theory of Reasoned Action. together, when in reality a great deal of variation exists.
(Lindsay, Howell, et al., 2005a)
Trace
The resultant digital-ink representation made by Traditional Familiarity
movements of the hand using a digital pen on a digital Combines an assumption of continuity with the past
screen. (Mohamed & Ottmann, 2006) experience of a partner. Traditional trust, therefore, relies
on the fact that virtual enterprise partners who could be
Traceability observed as trustworthy in the past will display the same
1: The ability to describe the life of a requirement in both kind of behavior in the future. (Wong, 2005)
backward and forward directions. (Doorn, 2005) 2: The
property of software design and development that makes Traditional Learning
it possible to link any abstract artifact to the technical Occurs in situations where students learn primarily from
artifacts that implement it and conversely. In addition, the instructor (sage-on-the-stage) and/or from resources
this link explains how and why this implementation has such as books, journals, audiotapes, and videotapes.
been chosen. In the database realm, traceability allows a (McInnerney & Roberts, 2005)
programmer to know exactly which conceptual object a
deinite column is an implementation of. Conversely, it Traditional Management Style
informs him/her on how a conceptual relationship type has An approach that maintains dominance and control over
been implemented. The transformational paradigm is one employees and relies on a wait and see policy for new
of the most promising approaches to formally guarantee technology adoption. Employees are encouraged to ignore
traceability. (Hainaut et al., 2005) data that do not it existing frames of reference, focus only
on the job at hand, and comply with established reporting
Traced Forgery relationships and rules. (Winston & Dologite, 2005)
A signature instance or its photocopy is used as a reference
and tried to be forged. (Chakravarty et al., 2005b) Traditional Menu
This type of menu is essentially a series of display screens
Tracking that appear sequentially as the user responds to the requests
The process of estimating the parameters of a dynamic detailed on each screen. (Henley & Noyes, 2006)
system by means of measurements obtained at successive
time instances. An example is the estimation of the position Traditional Modeling Concern
of a moving object based on an image sequence. (Aifanti Traditionally, a modeling concern is related to
et al., 2005) representations for structure (data), behavior (process),
and constraints. (Tobar et al., 2006)
Traction
Successfully putting a business model into operation, Traditional Retail Operation
proving its viability. (Craig, 2006a) The exchange of value directly with consumers through
store locations and facilities. (Bahn, 2006)
Traditional Course
A course taught using in-class, face-to-face instruction. Traditional Systems Development
(Baugher et al., 2005) Systems development carried out according to the
lifecycle model. (Avdic, 2005)
Traditional Education and Students
Usually refers to education and students in the classroom, Traditional Team/Collocated Team
but grouping all types of classroom instruction together A group of individuals who work on interdependent tasks,
makes comparison studies between traditional education who share responsibility for outcomes, and who work
and distance education inexact. As one example, the term together at the same location (i.e., their ofice/work area
traditional education does not specify whether a lecture is in the same general location). (Staples et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Trafic Aggregation Trans-Urbanity 693

Trafic Aggregation Training Sample


Using a domain name, often multiple domain names, to A set of documents or other pieces of text, together with
drive trafic (visitors) to one Web site. (Owen, 2006d) categories that are assigned to them to be used for training
T
an automatic text classiier; there may be exactly one
Trail category assigned to each or there may be any number of
A track of Web sites that have been visited. (Guan, categories, including zero, assigned to each piece of text.
2005b) (Woods et al., 2006)

Training Training Set


1: A process that aims to improve knowledge, skills, A set of cases used by the algorithm to discover the
attitudes, and/or behaviors in a person to accomplish classiication rules. For example, at each iteration of Ant-
a speciic job task or goal. Training is often focused Miner, only one rule is discovered. The training cases
on business needs and driven by time-critical business that are covered correctly by the discovered rule (i.e.,
skills and knowledge, and its goal is often to improve cases satisfying the rule antecedent and having the class
performance. (Snchez-Segura et al., 2005) 2: Improving predicted by the rule consequent) are removed from the
performance, with the help of coaches and mentors, to training set. This process is performed iteratively, while
reach a speciied level of standard to complete a task. the number of uncovered training cases is greater than a
(Ally, 2005a) user-speciied threshold. (Parpinelli et al., 2005)

Training a Neural Network Training System


Using some known data to build the structure and tune An organizational system with the primary mission of
the parameters of this network. The goal of training is to training employees to improve performance. (Jeffery &
make the network represent a mapping or a regression we Bratton-Jeffery, 2005)
need. (Chu & Wang, 2005)
Trait Anxiety
Training Algorithm Traits are properties of individuals that dispose them to
Learning process of artiicial neural networks whose react in certain ways in given classes of situations. Trait
function consists of deining the adequate values of the anxiety is a chronic predisposition to be anxious and
synaptic weights w and bias b, by minimizing an error nervous that may be based on feelings of inadequacy,
measure such as the sum of square errors (SSEs) or the sum usually due to poor past performances, low self-image,
of mean square errors (MSEs). (Castro & Braga, 2006) or low self-esteem. (Kase & Ritter, 2005)

Training Case Trajectory


One of the cases (records) of the training set. (Parpinelli 1: A set of multi-dimensional points which deine the route
et al., 2005) of a moving object during a time interval. (Bozanis, 2006)
2: The track followed by a moving object in the course of
Training Data time (due to the change of its position). (Vassilakopoulos
1: A representative subset of records for which the & Corral, 2005)
truth of classiications and relationships is known and
that can be used for rule induction in machine learning Trajectory of Use
models. (Winkler, 2005) 2: Collection of observations No designer, artist, or developer can predict the outcomes
(characterized by feature measurements), each paired of the many and consequential readings or uses to which
with the corresponding class label. (Domeniconi & a public will put his work. The work is a starting point of
Gunopulos, 2005) social interaction, not an end in itself. (Kettley, 2006a)

Training Knowledge Management Approach Trans-Urbanity


Develops real and virtual training space to facilitate The capacity of the worldwide network of computers, and
the knowledge conversion cycle. (Falivene & Kaufman, of the Internet, to support the proper practical relations of
2006) an urbanity in environments that surpass a physical city

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
694 Tra nsa c t ion Tra nsa c t ion-Proc e ssing Syst e m

and involve a set of varied urbanities, in accordance with Transaction/Global Transaction


the practice of the participants of the society on the Net A transaction is a sequence of operations on a database
T who coexist in a digital way, but who also have a physical that should appear as if they were executed non-interfered,
existence in the urban context which they inhabit. The even in the presence of other concurrent transactions. A
urbanity then surpasses the local place, thus extending transaction should satisfy the ACID properties, namely,
the concrete practice of the citizens beyond the immediate atomicity, consistency, isolation, and durability. A global
physical context. (Matta, 2005) transaction is a distributed transaction that is executed on
two or more database systems. (Leong, 2005b)
Transaction
1: A record containing the items bought by a customer. Transaction Processing
(Wong, & Fu, 2005) 2: Some set of items chosen from a An application programming paradigm that is based
ixed alphabet. (Zhou & Wang, 2005) 3: An atomic set of on the notion of a transaction. A transaction is a set of
processing steps in a database application such that all the operations on the application state that exhibit the atomicity,
steps are performed either fully or not at all. (Tan & Zhao, consistency, isolation, and durability (ACID) properties.
2005a) 4: An instance that usually contains a set of items. (Zhao et al., 2006)
For example, extending a transaction to a composition of
a head and a tail (i.e., N=X:Y), where the head represents Transaction Processing Council
a known frequent itemset, and the tail is the set of items This council has published numerous benchmarks for
for extending the head for new frequent patterns. (Zou & transaction processing (TPC-C), decision support (TPC-
Chu, 2005) 5: Group of operations that are either performed H and TPC-R), and transactional Web benchmark, also
all or none. (Meixner, 2005) supporting browsing (TPC-W). (Thomasian, 2005a)

Transaction Abort Transaction Time


Removal of a transaction, such as one managed by a 1: Designates the time when data values are recorded in
concurrency control method that detects that some the database. (Tansel, 2005) 2: The time when an element
unwanted isolation anomalies have occurred. (Frank, (i.e., anything that may be stored in a database) is part of
2005b) the current state of the database. It can be seen as the valid
time of an element that is currently in the database, that
Transaction Cost is, valid time of element e is current in the database.
One of the costs associated with contractual relationships (Rodrguez-Tastets, 2005b)
in a market economy, such as costs that the consumer or
the producer pays to make the market transaction happen. Transaction Trust
(C.-S. Lee, 2005) Trust-based exchange between a buyer and a seller of a
product or service. (Efendioglu, 2006)
Transaction Cost Economics (TCE)
An economic paradigm of organization analysis Transaction-Based Community
that explains the development of organizations and Community focuses on purchasing-related topics. A
organizational hierarchies as a function of the costs virtual community organized in a business site is generally
of conducting transactions in a market. (Morris et al., transaction based. (Wang, Wei, et al., 2006)
2005)
Transaction-Based Virtual Community
Transaction Cost Theory An online community that facilitates electronic commerce
Provides an economic viewpoint to outsourcing via a set of applications. (Jong & Mahatanankoon, 2006)
principles for analyzing buyer-supplier (outsourcer-vendor)
transactions and determining the most eficient mode of Transaction-Processing System
structuring and managing them. (Gupta & Iyer, 2005) This is a computer system designed to support the
recording and completion of value exchange activities.
Transaction Fee (Law, 2005)
The commission the Web site earns for each transaction
that is made over the Web site. (Shan et al., 2006b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Tra nsa c t ion-T im e Te m pora l Doc um e nt Dat a ba se Tra nsfe rre d-Out 695

Transaction-Time Temporal Document Transactional Software


Database Search engines for inding and comparing products;
Every document version that is stored is assigned a negotiating software; encryption and payment; ordering
T
timestamp (the commit time) by the system. The time (front ofice) inventory and back ofice software. (Singh,
period a particular version is valid is from commit time 2005)
until the document is deleted or updated by a new version.
(Nrvg, 2005) Transactive Memory
Refers to the set of individual memory systems in
Transactional Content combination with their intercommunications; transactive
Refers to the kind of relationship that exists between two memory exists as a property of a group as group members
actors rather than the shape of the network or the actors share their memories through their interactions with
position within the network. Many types of relationship each other and with external memory storage devices.
are possible, including inluence, information exchange, (Goldsmith & Pillai, 2006)
advice, emotional support, antagonism, and exchange of
goods and services. (Nelson & Hsu, 2006) Transcoding
1: A process to change the resolution of a multimedia
Transactional Data object. (Tse, 2006) 2: A technique for content adaptation
1: All data that are acquired, processed, and compiled into by modifying the incoming and outgoing HTTP stream.
reports, which are transmitted to various organizations (Goh & Kinshuk, 2005) 3: The process of changing
along a supply chain. (Mathieu & Levary, 2005) 2: Data that one multimedia object format into another. (Knight
contains records of purchases over a given period of time, & Angelides, 2005) 4: The process of converting a
including such information as date, product purchased, compressed multimedia signal into another compressed
and any special requests. (Cook, 2005) signal with different properties. (Cavallaro, 2005)

Transactional Data Stream Transducer


Data stream representing log interactions between entities, 1: A inite state machine speciically with a read-only input
such as credit card transactions, phone calls, and Web and a write-only output. The input and output cannot be
clickstreams. (Chatziantoniou & Doukidis, 2005) reread or changed. (Chang & Hsu, 2005) 2: An electronic
device that converts energy from one form to another.
Transactional Distance (Trewin & Keates, 2006)
1: Refers to the extent to which time and distance impact
communications and interactions in a virtual learning Transfer
environment. (McCracken, 2005) 2: The dynamic of Includes a variety of interactions between individuals and
teacher-learner relationships that exist when learners and groups; within, between, and across groups; and from
instructors are separated by a combination of space or groups to the organization. (Lindsey, 2006)
time. (Marcinkiewicz & McLean, 2005b)
Transference-Based Trust
Transactional Model Trusting another person because someone else who is
This deines a way to handle transactions in a database trusted somehow recommends them. (Paravastu & Gefen,
environment, including using subtransactions, scope, 2006)
limitations, and so forth. (Coratella et al., 2005)
Transferred-Out
Transactional Security Trust Student who enrolled in a course (or courses) with an
The customers belief about the e-tailers expertise in intention to transfer the credit to another program.
providing a secure shopping environment; also, the Transferred-outs are different from those who dropped
consumers expectation about an e-tailers ability to protect out of a degree program and later transferred credits to
his/her information from unauthorized access by third another degree program that they have newly started.
parties (i.e., hackers). (Yeo & Chiam, 2006) (Chyung, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
696 Tra nsfor m at ion Tra nsm ission Pa ra digm

Transformation Transition Economy


1: Generation (creation) or consumption (destruction) of Country that is moving from socialist toward a market
T an object, or a change of its state. (Dori, 2006) 2: The (capitalist) economy. (Damaskopoulos & Gatautis,
conversion of incoming data into the desired form. (Peter 2006)
& Greenidge, 2005b) 3: To convert the ields to the format
required by a speciic pattern discovery algorithm. (Yao Transitive Closure
& Xiao, 2005) The transitive closure of a directed graph G is a graph G*,
in which there is an edge from node a to node b if there
Transformation Logic exists a path from a to b in G. (Chen, 2005a)
XML-based documents can be read by other applications.
Their contents can be manipulated according to desired Translation
rules and algorithms, and then transformed to new 1: The interpretation given by the proponents of a system
documents with partial or different contents. These rules of their interests and the interests of the people they
are referred to as transformation logic and are determined are trying to convince. (Brady, 2005) 2: The process
by the applications. (Gaffar & Seffah, 2005) involved in converting the source text written in one
natural language into the target text in another language.
Transformational Leader (OHagan, 2005)
Inspires others, through charisma, inspiration, intellectual
stimulation, and individualized consideration, to transcend Translation-Mediated Communication (TMC)
his or her own self-interests for a higher collective purpose. Communication mediated by translation in CMC rather
(Sipior, 2005) than in conventional communication modes. (OHagan,
2005)
Transformational Software Engineering
A view of software engineering through which the Transmission Control Protocol (TCP)
production and evolution of software can be modeled, 1: A network protocol used by computers in communicating
and practically carried out, by a chain of transformations to each other even if they use different operating systems.
which preserve some essential properties of the source It is the primary protocol used for accessing the Internet.
speciications. Program compiling but also transforming (Kirlidog, 2005) 2: The suite of communications protocols
tail recursion into an iterative pattern are popular examples. used to connect hosts on the Internet. (Sala, 2005a) 3: The
This approach is currently applied to software renovation, basic communication language or protocol of the Internet.
reverse engineering, and migration. (Hainaut, 2005) (Dudding, 2005) 4: The system of protocols developed to
network computers and to share information. There are
Transformative Income Generation two protocols: the Transmission Control Protocol (TCP)
Content re-purposing with an understanding of the various and the Internet Protocol (IP). (Clayton, 2006a) 5: The
potential markets and the opportunity to re-purpose in a suite of protocols that deines the Internet. (Kabene et al.,
cost-effective manner. (Robinson, 2005) 2005a) 6: One of the main protocols in TCP/IP networks.
Whereas the IP protocol deals only with packets, TCP
Transistor enables two hosts to establish a connection and exchange
The basic active circuit element semiconductor device. The streams of data. (Yang et al., 2005a)
essential building block of microprocessors and all parts
of a computer that manipulate data. (Strauss, 2005) Transmission Medium
The physical path between a transmitter and receiver; can
Transition Band be wired (guided medium) or wireless (unguided medium).
The range of frequencies between the passband and the (Statica & Deek, 2006)
stopband is called the transition band, and for which no
ilter speciication is given. (Jovanovic-Dolecek & Daz- Transmission Paradigm
Carmona, 2005) A model of learning that involves one-way teacher-led
delivery of academic material, most often in the form of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Tra nsm ission Prot oc ol Trave l Ca rd 697

a 50-minute lecture, to a group of passive learners in the The principle of iltering is that documents are analyzed
absence of interaction. (Shaw, 2005) only once, hence only new documents are processed by
the system. Transparent iltering can be further divided
T
Transmission Protocol into proiling and iltering. Those two sub-processes are
The communication language used for transmission of mutually independent. (Wecel et al., 2005)
data. For videoconferencing, there are several available
transmission protocols. (Dudding, 2005) Transparent Proxy
A proxy that closely cooperates with either a router or a
Transmissive Pedagogy Layer 4 switch, to intercept Web requests while invisible to
Teaching based on an assumption that students receive the users. Other than being invisible, it works as a regular
information from the teacher and slot it straight into an proxy cache. (Danalis, 2005)
empty ledge base, or at best, work on it later to make it
their own. (Vat, 2005c) Transparent Retrieval
A spontaneous process triggered by data warehouse
Transmultiplexer Filter Bank (TMUX) users each time they launch a data warehouse report. In
Consists of a synthesis ilter bank followed by an analysis this process the data warehouse library is mechanically
ilter bank. This type of ilter bank is used for converting searched for documents that match the current context of
time-multiplexed signals (TDMs) into frequency- a given data warehouse report. The context is extracted
multiplexed signals (FDMs), and vice versa. (Jovanovic- from the report metadata and data. The ranked list of
Dolecek, 2005b) matching documents is compared against the user proile
and presented to the business user as an extension of
Transmutator structured information displayed on the report. (Wecel
Knowledge transformation operator that modiies learner et al., 2005)
knowledge by exploring learner experience. (Leni et
al., 2005) Transparent Technology
Technology that workers use on a daily basis without
Transparency thinking about it. Most often a technology is considered
1: Also known as disappearance, transparency is largely transparent when a worker forgets that he or she uses it.
considered the hallmark of good interaction design, When a worker must think about how and when to use
wherein the user is able to complete tasks without cognitive a speciic technology, it is no longer transparent. (P.M.
interference caused by the interface. The user is said to Leonardi, 2005)
act through the computer rather than to interact with it.
(Kettley, 2006a) 2: Systems supporting decision making Transport Control Protocol (TCP)
in administrative organizations should be transparent to Protocol governing the operation of the transport layer of
users so that it is clear to all actors involved (street-level the Internet. (Pendegraft, 2005)
bureaucrats, clients, legal and administrative supervisors,
appeal boards) how certain conclusions have been reached. Transport Layer
(Svensson, 2005) Layer 4 of the OSI model. Provides reliable, transparent
transfer of data between end points. (Ngoh & Shankar,
Transparency in Government Services 2005)
A mechanism by which citizens know and understand
the different activities of the government. Information on Trap Doors
functioning of different government machineries is made Pieces of code inserted into a program. Trap doors generally
available to the citizens. (Borbora & Dutta, 2005) are used for the purpose of debugging or bypassing standard
access control mechanisms. (Butcher-Powell, 2005)
Transparent Filtering
A continuous process, transparent for business users, in Travel Card
which documents are acquired from Web sources and stored Credit card issued to federal employees to pay for costs
in the data warehouse library with appropriate descriptions. incurred on oficial business travel. (Pang, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
698 Trave l T im e Budge t Trigge r

Travel Time Budget duration, diversity, and intensity. Primary quality measures
The proportion of time allocated by individuals for travel of trend detection include sensitivity and accuracy. (Chen,
T per day. (Jain & Lyons, 2005) Toprani, et al., 2006)

Treatment Group Trialability


1: Individuals who are contacted (e.g., mailed) in a 1: Perceptions of the degree to which an innovation can be
campaign. (Lo, 2005) 2: The group in an experimental used on a trial basis before conirmation of the adoption
study that receives experimental treatment and is otherwise must occur. (Green et al., 2005) 2: The degree to which
similar to the group not receiving the treatment, in all a product can be tried on a limited basis. (Owens et al.,
relevant respects. (Fisher, 2005) 2005)

Treatment Proxy Trialability of Innovation


Identiied as a powerful machine with high capacities for The degree to which an innovation can be tried on a limited
storage, treatment, and/or communication. In addition to basis before full implementation. (Askarany, 2005)
storage capacity, its main task is to manage a set of cache
proxies of the same proile and to maintain the index of Triangle Inequality
their content. (Kacimi et al., 2005) The property d(x,y) d(x,z) + d(z,y) that a distance d
must satisfy in order to be a metric. (Chvez & Navarro,
Tree 2005)
A tree is a graph with a root in which the indegree of each
node is equal to 1. (Chen, 2005a) Triangle Pattern
A triangle is a particular pattern observed using technical
Tree and Rule Induction analysis. There are a variety of circumstances under which
Data-mining approach that uses an algorithm (e.g., the a triangle can occur, and dependent on the circumstances,
ID3 algorithm) to induce a decision tree from a ile of the triangle can be either a reversal or continuation pattern.
individual cases, where the case is described by a set of (Vanstone & Tan, 2005)
attributes and the class to which the case belongs. (Garrity
et al., 2005) Triangulation
When a subject is viewed from more than one perspective
Tree Inclusion during the learning or perceptual process. (Maceield,
Given two ordered labeled trees T and S, the tree inclusion 2006)
problem is to determine whether it is possible to obtain
S from T by deleting nodes. Deleting a node v in tree T Trie
means making the children of v become the children of An n-ary tree whose organization is based on key space
the parent of v and then removing v. If S can be obtained decomposition. In key space decomposition, the key
from T by deleting nodes, we say that T includes S. (Chen, range is equally subdivided, and the splitting position
2005b) within the key range for each node is predeined. (Woon
et al., 2005)
Trend
1: Long-term movement in a time series that represents Trigger
the growth or decline over an extended period of time. 1: A schema object in the database that deines the event,
(G.P. Zhang, 2005) 2: The continuous growth or decline condition, and action part of a production rule. (Ale & Espil,
of a variable over a period of time. (Chen, Toprani, et al., 2005) 2: An SQL statement that automatically generates an
2006) action (e.g., an update or a reset) upon a speciied update
request. Triggers are a procedural means to enforce and
Trend Detection preserve integrity. See Integrity Enforcement. (Decker,
Using quantitative methods to identify the presence of a 2005) 3: One operation invoking another operation; a call
trend. A number of domain-speciic criteria may apply to from one method to another method within the same or
determine what qualiies as a trend, for example, in terms of different object type (class). (D. Brandon, Jr., 2005a) 4:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Trigge ring Condit ion Trust 699

Rule of the form Event-Condition-Action, used in relational Trojan Horse


database systems to implement active functionality. 1: A program in which malicious or harmful code is
(Badia, 2005b) disguised as a benign application. Unlike viruses, Trojan
T
horses do not replicate themselves but can be as destructive.
Triggering Condition (Tassabehji, 2005a) 2: A program that appears to be
The condition in a CQ which speciies when to evaluate legitimate but is designed to have destructive effects, as
the query. (Khan, 2005) to data residing in the computer onto which the program
was loaded. (Friedman, 2005) 3: A program that appears
Triple Bottom Line to perform only advertised tasks, but which is in reality
Measures of growth or accounting that look at performing further, often malicious, undocumented tasks
environmental, social, and economic outcomes. (Geiselhart in the background by the unauthorized user. (Butcher-
& Jamieson, 2005) Powell, 2005)

Triple-Loop Learning Trolling


When information cannot be processed within the given 1: Acting in a deliberately inlammatory way to provoke a
knowledge system, the system has to be revised. This is response online, usually in a newsgroup and usually with
what Argyris and Schn call single- and double-loop insincerity. (N.C. Rowe, 2006d) 2: Posting a controversial
learning. Single-loop learning is based on negative message on a Discussion Forum, with the purpose to
feedback and correction of deviation from the norm. attract or instigate a laming response, mainly targeting
Learning is limited to operational actions that are allowed. the inexperienced members of the forum. (Gur u, 2006)
Single-loop learning works at the level of facts. Learning
is focused on the question of how we can reach an existing True Negative
goal in the best possible way within existing norms. Double- A potential usability problem discovered in a usability
loop learning is directed to correction of mistakes based inspection that upon analysis is correctly eliminated by
on deined norms. It implies an extra loop reconsidering the analyst as an improbable problem. The discovered
existing rules and their validity. Triple-loop learning problem is conirmed in real use as causing the user no
considers not only the facts and the norms, but also the dificulties. (Woolrych & Hindmarch, 2006)
context. Triple-loop learning works on perception and the
permanent questioning of inconsistencies in the action True Positive
theory of the organization. (Hall & Croasdell, 2006) A prediction of a usability problem reported in a usability
inspection that is proven to be a real problem in actual use
Triune Continuum with real users. (Woolrych & Hindmarch, 2006)
One of the principles of the Triune Continuum Paradigm.
The principle introduces three continuums (spatiotemporal, Trust
constitution, and information continuums) to justify a 1: The provision of adequate measures to ensure the
minimal set of modeling concepts that are necessary and security of private or sensitive data, thus providing
suficient to cover the representation scope of the general conidence in the reliability of electronic services. (Scott
system modeling domain on the most abstract level. et al., 2006) 2: A mechanism that enables cooperation and
(Naumenko, 2005) participation between members of a community in relation
to the engagement of the practice. (Raja et al., 2006) 3: A
Triune Continuum Paradigm relationship between individuals or a group of individuals
A paradigm for general system modeling. The paradigm that includes a dependency on another individual to have
introduces and justiies a set of principles that provide a need met, or a choice or willingness to take some risk
designers and architects of system modeling methodologies as a part of the relationship. (Gangeness, 2005) 4: The
with the necessary theoretical support for building their lack of physical interaction places a higher regard to
modeling frameworks. The principles are derived from the trust that exists between each entity involved in the
Tarskis Theory of Truth, from Russells Theory of Types, organization. Since fewer checks and balances can be
and use of the notion of Triune Continuum. (Naumenko, placed on appropriate departments, management and other
2005) entities trust that they will complete the appropriate work

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
700 Trust a nd Pa r t ic ipat ive Sa fe t y Trust w or t hy We b Sit e

on time or be straightforward about delays or problems. If Trust-Inducing Design


two entities working on a project together, separated by The application of empirically veriied features of a Web
T thousands of miles, are unwilling to trust each other, the site to enhance a consumers perception that the online
work slows and suffers to a critical point. (J. Lee, 2005) vendor is trustworthy. (Y.D. Wang, 2005)

Trust and Participative Safety Trusted Third Party


Especially crucial for group creativity. The emphasis A trust center that serves as an intermediary for Internet
is on encouraging participation in a non-threatening, transactions. (Quah, Leow, & Ong, 2006)
non-evaluative environment. (Torres-Coronas & Gasc-
Hernndez, 2005) Trusted Time
Trusted time is emerging as the industrys best practice.
Trust Center Trusted time is auditable, secure, available, warranted,
It is important to assure the identity of the owner of a accurate, and managed. Trusted time is essential to ensuring
public key. Otherwise potential adversaries may pretend that the network and operations infrastructure run accurately,
to have another identity by using their own public keys in securely, and reliably, and ensure legal enforceability of
conidential transactions. Trust centers certify the identity electronic business transactions. The auditable sourcing,
of owners of public keys. (Stickel, 2005) setting, and synchronization of time involve a chain of
trust that is complex, requires time specialization, and
Trust Chain involves multiple sources of risk. (Mezgr, 2005)
A solution for addressing trust is to build a chain of trust,
where each link is strong but also connects to its neighbor Trustee
by verifying its trustworthiness. (Mezgr, 2006b) The e-merchant in which trust is placed. (Jeanson &
Ingham, 2006)
Trust Management
A unified approach to specifying and interpreting Truster
security policies, credentials, and relationships; it allows The individual who willingly enters into a commercial
direct authorization of security-critical actions. A trust- transaction and expects the trustee to fulill the contract
management system provides standard, general-purpose underlying the transaction. (Jeanson & Ingham, 2006)
mechanisms for specifying application security policies
and credentials. Trust-management credentials describe a Trustworthiness
speciic delegation of trust and subsume the role of public 1: Ability to create and develop trust. Trustworthiness
key certiicates; unlike traditional certiicates, which bind is the assurance that a system deserves to be trusted.
keys to names, credentials can bind keys directly to the (Oermann & Dittmann, 2006) 2: Beliefs based on which
authorization to perform speciic tasks. (Mezgr, 2005) people are willing to trust. Typically, these are ability,
integrity, and benevolence. (Paravastu & Gefen, 2006) 3:
Trust Placement Process The ability to attain and maintain a trusted state, which
The decision-making process and the consequential is deinable, measurable, validatable, and demonstrable
actions resulting from trusting others under conditions over time. Digital trustworthiness means a veriiable
of uncertainty and risk. (Fernndez, 2005) level of electronic process integrity, security, control,
authenticity, and reliability that captures, preserves,
Trust Relationship retrieves, veriies, renders, and makes available in human
A relationship in which each party is assured of the readable form the essential transaction content, context,
reliability of the character, ability, strength, or truth of notice, intent, and consent, to meet the electronic forensic
someone. (Hanson et al., 2005) evidence requirements necessary for legal admissibility
and regulatory compliance. (Mezgr, 2006b)
Trust Signaling
Actions available to organizations participating in virtual Trustworthy Web Site
B2B communities to increase their perceived level of A Web site that reduces a consumers perception of risk and
trustworthiness. (Turner, 2006) that increases conidence in the online vendors integrity.
(Y.D. Wang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T SQL 2 .5 G 701

TSQL: See Temporal Structured Query Language. Tutored-Video Instruction


A distance education technology whereby students watch a
TT: See Turing Test. videotaped classroom lecture as a group and then undergo
T
an organized, systematic discussion of that lecture led by
TTL: See Time-to-Live. a tutor. (Murray & Efendioglu, 2005)

TTS: See Text-to-Speech. Tutorial Function


Program used to help students gain and/or refresh
Tuning Time understanding of general principles and basic ideas,
The total time a mobile client must listen to the channel, available in computer format on an educators Web site.
which is used to indicate its energy consumption. (Waluyo (Beck & Schornack, 2005)
et al., 2005)
Tutoring
Tunneling A support system for learning. A tutor is acting as a
1: The encapsulating of protocol information for the facilitator for learning and group processes. Tutoring
transmission of data via the Internet to a private network. is a role, which can be shifted between different actors
(Butcher-Powell, 2005) 2: Allows one network to transmit (e.g., teachers, students). (Lammintakanen & Rissanen,
its data via another networks connections. In the context 2005b)
of the IPv4/IPv6 discussion, tunneling refers to the
encapsulation of IPv4 data in order to be carried by an IPv6 TV Object
network, or the opposite. (Papagiannidis et al., 2005) A video ile embedded in a TV site, normally surrounded
by other elements such as textual information. (Prata,
Tuple Distance Function 2005)
A function used to compute the similarity between two
tuples of a relational multimedia database. Similarly to the Twice-Learning
distance function, this function also returns a number in A machine learning paradigm using coupled learners to
the range [0, 1], computed by synthesizing the values that achieve two aspects of advantages. In its original form,
the distance function returns when applied on the attributes two classiiers are coupled together where one classiier
of the compared tuples. (Chang et al., 2005) is devoted to the accuracy while the other is devoted to
the comprehensibility. (Zhou, 2005)
Tuple Space
A globally shared, associatively addressed memory space Twisted Pairs
that is used by processes to communicate asynchronously, Two pairs of insulated copper wires intertwined together
based on the notion of tuples and tuple matching. (Kunz to form a communication medium. (Hin & Subramaniam,
& Gaddah, 2005) 2005a)

Turing Test (TT) 2D Interface


For computational intelligence. In the test, a human An interface in which text and lines appear to be on the
judgment must be made concerning whether a set of same lat level. (Xu et al., 2006b)
observed behaviors is suficiently similar to human
behaviors that the same wordintelligentcan justiiably 2G: See Second Generation.
be used. (Raisinghani et al., 2005)
2PC: See Two-Phase Commit Protocol.
Turning Point
Marks the beginning or the end of a trend. For example, the 2.5D Interface
point at which economy turns from recession to growth. An interface that applies various graphical algorithms
(Chen, Toprani, et al., 2006) to simulate the sense of depth on a 2D interface. (Xu et
al., 2006b)

2.5G: See 2.5-Generation Wireless Service.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
702 2 .5 -Ge ne rat ion Wire le ss Se r vic e (2 .5 G) Typosquat t n
ig

2.5-Generation Wireless Service (2.5G) Two-Way Satellite Service


2.5G changes wireless service to a packet-switched An always-on Internet service providing broadband data
T service that dramatically increases transmission speeds. transfer to and from the customer via satellite. (Dyson,
It describes the state of wireless technology and capability 2005)
usually associated with General Packet Radio Services
(GPRS)that is, between the second and third generations TWQ: See Teamwork Quality.
of wireless technology. (Lei et al., 2005a)
Type Conlict
Two-Layered Approach A particular interschema property. It indicates that the
An approach similar to the CD-ROM-Internet hybrid same concept is represented by different constructs (e.g.,
model where both online and off-line approaches are used an element and an attribute in an XML source) in different
to reach the students. This approach uses the Internet schemas. (De Meo, Terracina, et al., 2005)
to communicate between the headquarters module and
regional modules, and CD-ROMs to deliver the content Type of Authentication
to the students. (Shareef & Kinshuk, 2005) Authentication generally can be based on three types of
information: by some thing the user has (e.g., bank card,
Two-Phase Commit (2PC) Protocol key, etc.), by something the user knows (e.g., password,
1: The most popular atomic commit protocol; it is so number, etc.), or by something the user is (e.g., biometric
named because it involves two phases of message passing, methods like ingerprints, face recognition, etc.). (Richter
a transaction coordinator, which drives the protocol, and & Roth, 2006)
one or more transaction participants, which control the
application state to be persisted. (Zhao et al., 2006) 2: An Type of Date Interval
atomic commitment protocol that behaves as follows: The Informationbase parameter that deines the relative time
coordinator asks the participants to vote on commitment; period. This could be document date, delivery due date,
if any votes No, the coordinator informs all participants to payment due date, and so forth. (Dragan, 2005)
Abort; if all participants voted Yes, then the coordinator
informs all participants to Commit. (Haraty, 2005b) Type-M Functional Dependency
Let R be a relation with attribute set U, and X, Y U.
Two-Phase Locking Xg1(t) Yg2(t) is a type-M functional dependency (MFD)
The most used concurrency control method for relation if and only if for any two tuples t1 and t2 in R
implementing the isolation property. (Frank, 2005b) that have t1[X] g1(t) t2[X], then t1[Y] g2(t) t2[Y],
where g1TD(X) and g2TD(Y), whereas t and t[0, 1]
Two-Sided Matching Market are thresholds. (Chang et al., 2005)
Market involving two groups of participants, in which
a member of one group is uniquely matched to one and Typeface
only one member of the other group (e.g., two partners The particular style and design of alphabetic letters,
in a marriage). Matches are stable if no two participants, numbers, and symbols that make up a font. (Szabados &
who are from opposite groups in the market and are not Sonwalkar, 2005)
matched to one another, would prefer one another to their
current partner. (Gates & Nissen, 2005a) Typography
The art of selecting, designing, and using appropriate
Two-Tier Client/Server typefaces in the content of the material in order to produce
Two-tier splits the processing loading in two. The majority clear, legible, and aesthetically appealing reading material
of the applications run on the client (often referred to as for print or screen. (Szabados & Sonwalkar, 2005)
fat client), which typically sends SQL requests to a
server-resident database. (Galup et al., 2005) Typosquatting
Registering and using a domain name that is a misspelled
variation of a trademark or organization name. (Owen,
2006d)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U a E Approa ch U N /EDI FACT 703

U
UaE Approach: See User-as-Editors Approach. into the environment will enable people to move around
and interact with computers more naturally than they
Ubiquitous Computing currently do. (Dhar, 2005)
1: A vision of the future and a collection of technologies
where information technology becomes pervasive, UCC: See Uniform Commercial Code.
embedded in the everyday environments and thus
invisible to the users. According to this vision, everyday UDDI: See Universal Description, Discovery, and
environments will be saturated by computation and Integration.
wireless communication capacity, and yet they would
be gracefully integrated with human users. (Roussos & UDF: See Unit Development Folder.
Zoumboulakis, 2005) 2: A vision where computers are
made available throughout the physical environment, but UDP: See User Datagram Protocol.
effectively invisible to the users. (Cremonini et al., 2006)
3: An environment where computers are embedded in our UEM: See Usability Evaluation Method.
natural movements and interactions with our environments.
Combines mobile and pervasive computing. (Krogstie, UIL: See User Interface Language.
2005b) 4: Computing technology that is invisible to the
user because of wireless connectivity and transparent user UIM: See Usability Inspection Method.
interface. (Ally, 2005c) 5: Includes computers everywhere,
the wireless technologies wave, and various portable and UM: See Uniied Messaging.
networked technologies in our daily lives. Ubiquitous
computing can help to create an anytime, anywhere UMA: See Universal Media Access.
learning environment that learners, teachers, and parents
can access easily. Ubiquitous computing has been changing UML: See Uniied Modeling Language.
the way teachers and students utilize technologies in the
classroom. (Yang, 2005) 6: Refers to the ability to perform UML Profile: See Unified Modeling Language
computing or communications from anywhere at any given Proile.
time. Thus, untethering individuals from wired networks
creates opportunities but is constrained by other issues UML Stereotype: See Uniied Modeling Language
such as power consumption. (Chen, Sockel, et al., 2005) Stereotype.
7: The evolution of mobile human-computer interation
whereby user-centered principles of hardware and software UMTS: See Universal Mobile Telecommunication
development embed the nature of mobile computing System.
into the background of everyday life. (Mohamedally et
al., 2005) 8: The trend of technological development to UN/EDIFACT
integrate into any kind of object information processing An international EDI standard that is similar to and based
and communication capabilities. (Falcone & Castelfranchi, on X12. Its syntax is somewhat different from X12s, but it
2005) 9: Integrating computation into the environment follows the same basic principles and architecture. (Hawk
rather than having computers that are distinct objects. & Zheng, 2006)
Promoters of this idea hope that embedding computation

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
704 Unbundling of Faculty Roles Uniied Content Model

Unbundling of Faculty Roles Undifferentiated-Capacity Hypothesis


Entails the division of traditional faculty tasks. No longer A model of attention that assumes a lexible, multi-
U are all faculty designing their instruction, implementing purpose central processor that can process multiple tasks
it, and then conducting the assessment of learning. More concurrently. This processor has a limited amount of
and more, different people or technological devices are resources, however, that can be allocated across all tasks.
performing these and other functions. (Lindsay, Williams, (Owen, 2006b)
et al., 2005)
Unexpectedness
Uncanny Valley A pattern is interesting to the user if it is surprising to
Feelings of unease, fear, or revulsion created by a robot or the user. This unexpectedness might be due to the pattern
robotic device that appears to be, but is not quite, human- contradicting the belief system of the user: the greater the
like. (Hall & Woods, 2006) contradiction, the higher the unexpectedness. Most of the
data-mining studies use unexpectedness as the primary
Uncertain Attitude criterion for operationalizing subjective interestingness.
A perception about IT that results in behavior that shows (Natarajan & Shekar, 2006)
indecision about IT, hesitation to invest in IT, and anxiety
about using IT. (Winston & Dologite, 2005) Unicast
1: Oneto-one communication. (Barolli & Koyama, 2005a)
Unconscionability 2: The one-to-one communication way, where only one host
Generally involves a lack of meaningful choice on the transfers data with another host. In the traditional IP, the
part of one of the parties to a contract together with unicast is applied. (Hosszu, 2005a) 3: The point-to-point
terms that are unreasonably favorable to the other party. delivery of data, for example, when a Web server delivers
Unconscionability also refers to a contract that is so unfair a page to a visitor. (Papagiannidis et al., 2005)
or one-sided that a judge cannot in good conscious enforce
the contract. (Sprague, 2005) Unicast Stream
A data low communicated over a network between a single
Unconstrained Movement sender and a single receiver. (Kacimi et al., 2005)
Movement (of a moving object) that is not conined
according to a set of spatial restrictions. (Vassilakopoulos Unicode
& Corral, 2005) A 16-bit character set standard, designed and maintained
by the non-proit consortium Unicode Inc. that aims to
Uncontrolled Indexing standardize all non-roman languages. The hexadecimal
The indexing of objects using uncontrolled vocabularies, range U+1780 to U+17FF in Unicode/ISO10646 includes
such as descriptions or semi-structured metadata. (Gaedke characters of the Khmer/Cambodian script. With Unicode
et al., 2005) Version 4.0, an additional range has been added: U+19E0 to
U+19FF. The Khmer script, in turn, is used to record text in
Understanding the following languages: Khmer, Sanskrit (transliteration),
A layer above the traditional three-tier model of data, Pali (transliteration), Cham, Krung, and other minority
information, and knowledge to address the additional languages used in Cambodia. Khmer Unicode is the
need of military personnel for knowledge systems capable only globally standardized encoding of the Khmer script.
of conveying understanding or expertise for the decision (Hutchinson, 2005)
maker. (Maule, 2006)
Uniied Content Model
Underwriter As used in multilingual Web-based systems, the uniied
An employee of an insurance company whose job duties content model refers to word-for-word translation of the
include analyzing an application for insurance and making content from one language to another. (Gangopadhyay
a decision whether to accept or reject the application. If & Huang, 2005)
accepted, the underwriter further determines the premium
to be charged. Underwriters also review existing insurance
contracts for renewal. (Kitchens, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Uniied Messaging (UM) Uniform Resource Locator (URL) 705

Uniied Messaging (UM) motivational model, and social cognitive theory. (McManus
Enables access to faxes, voicemail, and e-mail from a & Standing, 2005)
single mailbox that users can reach either by telephone
U
or a computer equipped with speakers. (Lalopoulos et Uniform Commercial Code (UCC)
al., 2005b) A uniform collection of laws relating to commercial
transactions. Speciic provisions of the code which relate
Uniied Modeling Language (UML) to the sale of goods (Article 2) have been enacted by all
1: An industrial standard notation for object-oriented of the states. (Sprague, 2005)
development. It consists of several types of (mostly)
diagrams that enable describing systems from different Uniform Random Sampling
perspectives, including managerial, structural, and A method of simple random sampling where the
behavioral (functional). (Shoval & Kabeli, 2005) 2: The probabilities of inclusion for each element are equal.
standard modeling and design notation to build object- (Lutu, 2005)
oriented applications. UML comprises a set of submodels
that allow a designer to easily express both structural Uniform Resource Identiication (URI)
and dynamic aspects of object societies. UML and its 1: Also known as Universal Resource Identiier, it is a
accompanying process model, the rational uniied process string that unambiguously identiies a resource. A URI
(RUP), cover all steps of the software development process describes the mechanism used to access the resource,
by providing different diagrammatic tools such as use- the speciic computer where the resource is housed,
case diagrams, class diagrams, sequence diagrams, state and the speciic name of the resource. URL (Uniform
models, and so forth. UML is itself described by a meta- Resource Locater), the most common form of URI, and
model and possesses its own extension mechanisms to URN (Uniform Resource Name) are subsets of the URI.
adapt it to speciic application domains. (Rossi & Schwabe, (Pereira & Freire, 2005) 2: A short string that identiies
2005) 3: Adopted by the Object Management Group as a resources on the Web: documents, images, downloadable
modeling language for object-oriented analysis and design iles, services, electronic mailboxes, and others. They make
of software systems. UML includes several sub-languages resources available under a variety of naming schemes
and diagram notations for modeling different aspects of and access methods such as HTTP, FTP, and Internet
software systems. (Halpin, 2005) mail addressable in the same simple way. (Raisinghani
& Sahoo, 2006)
Uniied Modeling Language (UML) Proile
A predeined set of stereotypes, tagged values, constraints, Uniform Resource Identiier (URI)
and notation icons that collectively specialize and tailor Identiies abstract or physical resources. A resource can
the UML for a speciic domain or process. (Zendulka, be a collection of names that has been deined by some
2005b) organizations, or it can be a computer ile that contains
that list. The most familiar form of URI is the uniform
Uniied Modeling Language (UML) Stereotype resource locator (URL). (Sethi & Sethi, 2006a)
One of UML extensibility mechanisms. It is an extension
of the vocabulary of the UML that allows creating new Uniform Resource Locator (URL)
kinds of building blocks that are derived from existing 1: The address of an object accessible on the Internet.
ones. (Zendulka, 2005b) The object could be an HTML document, a text ile, an
image ile, a program such as a common gateway interface
Uniied Model of IPFS application, and so forth. These are mainly used in HTML
A model in which all or most of the inancial services a documents to specify the target of a hyperlink. (Hu, Yang,
consumer might want are provided within a single corporate Yeh, et al., 2005) 2: The address of all Web pages, images,
structure. (Gordon & Mulligan, 2005) and other resources on the World Wide Web. (Scime,
2005b) 3: A system that locates the address of documents
Uniied Theory of Acceptance and Use of and other resources across the WWW. (Maggioni &
Technology (UTAUT) Uberti, 2005) 4: The global address of a Web page or
This model is quite comprehensive as it combines other resource on the Internet. A URL has three basic
TRA, TAM, TPB, the DOI model of PC utilization, the parts: the protocol identiier, IP address or domain name

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
706 U nifor m Sa m pling U nive rsa l De sc ript ion Disc ove r y a nd I nt e grat ion (U DDI )

of the server, and the relative path to the resource on the Unit Price/Unit Cost Model
server. (Manolopoulos et al., 2005) A slope analysis tool used to plot actual unit prices and
U unit costs for several periods in order to discern future
Uniform Sampling trends and likely outcomes. (Nugent, 2005)
1: A random sample of k tuples of a database, where each
subset of k tuples is equally likely to be the sample. (Das, Univariate/Multivariate
2005) 2: All objects or clusters of objects are drawn with A univariate (or monothetic) method processes a particular
equal probability. (Hou, Guo, et al., 2005) attribute independently of the others. A multivariate
(or polythetic) method processes all attributes of the
Uniform Spread Assumption (USA) representation space, so it can ix some problems related
A technique for estimating values inside a bucket by to the interactions among the attributes. (Muhlenbach &
assuming that values are distributed at an equal distance Rakotomalala, 2005)
from each other and that the overall frequency sum is
distributed equally among them. (Buccafurri & Lax, Universal Access
2005) 1: Communal access to telephone and other ICT services
usually measured by indicators such as distance, population,
Uninterrupted Power Supply (UPS) and time. (Frempong & Braimah, 2005) 2: Provision of
1: A mechanical/electronic device used to provide power ICT services to all of a countrys households through
supply without any disruption at the time of power failure. shared facilities. (Cecchini, 2005) 3: The availability of
This is mainly used in computers as a power back up. information and communication technologies such as
(Borbora & Dutta, 2005) 2: System that prevents power telephones, computers, and the Internet to the widest range
surges or lightning strikes that can cause costly damage of potential users. (Mwesige, 2005)
to computer parts and unexpected shutdowns. (Latchem,
2005) Universal Change Principle
Learning must precede change. (Lick & Kaufman,
Uninterruptible Power Supply 2005)
A backup electricity supply, in the form of batteries or
other device, designed to provide continuous power to Universal Description Discovery and Integration
computer or telecommunications equipment in the event (UDDI)
of a power failure. (Dyson, 2005) 1: A set of speciications for a service registry. It is a meta
service for locating Web services. (Zhang, 2006) 2: A
UNION Query standard designed to facilitate a searchable directory of
By inserting the key word UNION between multiple service providers. UDDI resides at the service registry.
SQL SELECT statements, the resulting rows from these (Kasi & Young, 2006) 3: A virtual yellow pages for Web
statements are appended into a single result set (provided services allowing software to discover what Web services
the number and data types of the columns match). (Millet, are available and how to hook up to them. (Hwang, 2005)
2005) 4: A mechanism for holding descriptions of Web services.
UDDI deines a data structure standard for representing
Unique Knowledge Web service description information in XML. It is also
Knowledge that is irm speciic and applies to the possession a mechanism, or a directory, for inding Web services.
by social actors of knowledgeself-knowledge and skills- (Chan & Kellen, 2006) 5: A speciication that provides a
based knowledgeof unique organizational routines, framework for describing and discovering Web services
production processes, and IT infrastructures, to mention based on the idea of a business registry. (Moser & Melliar-
a few. (Butler & Murphy, 2006) Smith, 2006) 6: Initiated by Ariba, IBM, and Microsoft;
an industry standard for registering, publishing, and
Unit Development Folder (UDF) discovering Web services in a central registry called a
A kind of structured report to describe a development UDDI directory. (Sethi & Sethi, 2006a) 7: A directory
process. (Moreira & da Silva, 2005) that enables businesses to list themselves on the Internet

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U nive rsa l De sign U nive rsa l Se r vic e s Age ncy (U SA) 707

and discover each other. It is similar to a traditional phone Universal Mobile Telecommunication System
books yellow and white pages. (Lalopoulos et al., 2005b) (UMTS)
8: A Web-based distributed directory for discovery of 1: The evolution of GSM to higher bandwidth services
U
Web services offered by companies. It is similar to a and multimedia applications. (Louvros, Karaboulas, et
traditional phone books yellow and white pages. (Nicolle al., 2005) 2: One of the third-generation (3G) mobile
et al., 2005) 9: Provides a registry for businesses to list phone technologies. This technology provides the mobile
themselves on the Internet. It functions as an online version phone access to several services, such as videoconference.
of a telephone books white and yellow pages. (Hawk & (Flavin & Guinalu, 2006) 3: A third-generation (3G)
Zheng, 2006) 10: The UDDI speciications deine a way broadband, packet-based transmission of text, digitized
to publish and discover information on Web services. At voice, video, and multimedia at data rates up to 2 Mbps
a conceptual level, the information provided in a UDDI that offers a consistent set of services to mobile computer
business registration consists of three components. First, and phone users no matter where they are located in the
the white pages component includes address, contact, and world. (Olla, 2005a)
known identiiers. Second, the yellow pages component
includes industrial categorization based on standard Universal Resource Locator (URL)
taxonomies. Finally, the green pages component includes 1: An Internet address that includes the protocol required
the technical information about services that a business to open an online or off-line document. (Falk & Sockel,
exposes. At a business level, the UDDI business registry 2005) 2: A text string used as a reference to a Web
can be used for checking whether a given partner has resource. A URL consists of a protocol, a host name,
particular Web service interfaces, inding companies in a and a document name. (Yen, 2005) 3: The address of a
given industry with a given type of service, and locating computer or a document on the Internet that consists of
information about how a partner or intended partner has a communications protocol followed by a colon and two
exposed a Web service. The objective is to become aware slashes (as http://), the identiier of a computer (as www.
of the technical details required for interacting with that m-w.com), and usually a path through a directory to a ile.
service. (Maamar, 2005) Also called Uniform Resource Locator. (Dez-Higuera &
Daz-Pernas, 2005) 4: Identiies the address location of
Universal Design Web pages. (Goh & Kinshuk, 2005)
1: A concept or philosophy for designing and delivering
products and services that are usable by people with the Universal Serial Bus (USB)
widest possible range of functional capabilities. (Zaphiris A plug-and-play interface between a computer and add-
& Kurniawan, 2005) 2: A concept similar to accessible on devices (such as audio players, joysticks, keyboards,
design. Its meaning is broader in that it refers to design telephones, scanners, and printers). With USB, a new
that strives to create products that are usable by all people, device can be added to a computer without having to add
regardless of age, gender, (dis)ability, handedness, and so an adapter card or even having to turn the computer off.
forth. Its meaning is narrower in that it seeks one solution (Bochicchio & Fiore, 2005)
to accommodate the needs of all people. (Schmetzke, 2005)
3: An approach to the design of products and environments Universal Serial Bus (USB) Port
fostering usability by as many people as possible, without A standard external bus that can be used to connect multiple
adaptation. (Newell & Debenham, 2005) types of peripherals (including modems, mice, and network
adapters) to a computer. (Lawson-Body, 2005)
Universal Emotions
Mainly after the inluence of Ekman, these six emotions Universal Service
are considered to be universal, in the sense that they are 1: Provision of ICT services to all of a countrys households
uniformly recognized across different cultures. (Karpouzis within their homes. (Cecchini, 2005) 2: Widespread access
et al., 2005) to telephone and other ICT services normally related to
household access. (Frempong & Braimah, 2005)
Universal Media Access (UMA)
How users can access the same media resources with Universal Services Agency (USA)
different terminal equipment and preferences. (Knight U.S. agency established u nder South Af r ican
& Angelides, 2005) Telecommunications Act 103 of 1996 with the mission of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
708 U nive rsa l U sa bilit y U ppe r Approx im at ion

promoting universal services and access to historically Unstructured Information


underserviced areas. One of its most visible instruments Information that is not well speciied. An example is
U is the establishment of MPCCs. (Trusler & Van Belle, a free-text description of a certain product that cannot
2005) be exhaustively characterized by specific features.
(Gangopadhyay & Huang, 2005)
Universal Usability
Concerns research and design activities that enable Unsupervised Clustering
interfaces to be accessed and used by all users. (Knight, Automatic classiication of a dataset in two of more subsets
2006b) on the basis of the intrinsic properties of the data without
taking into account further contextual information.
Universally Unique ID (UUID) (Liberati et al., 2005)
Typically machine generated and used as worldwide
unique labels. Their uniqueness is assured through such Unsupervised Learning
means as encoding of timestamps and hardware identiiers. 1: Learning that occurs when you are given a set of
(Gaedke et al., 2005) observation with the aim of establishing the existence
of classes or clusters in the data. (Awad & Khan, 2005)
Universe of Discourse 2: A machine learning technique that typically treats
1: A collection of all those entities that have been, are, or input objects as a set of random variables. A joint density
ever might be in a selected portion of the real world or the model is then built for the data set. (Fernndez & Layos,
postulated world. (Marjomaa, 2005) 2: The application 2005) 3: A machine learning technique, which is used
domain of an information model viewed from a semantic to create a model based upon a dataset; however, unlike
perspective. (Artz, 2005c) 3: The environment in which the supervised learning, the desired output is not known
software artifact will be used. It includes the macrosystem a priori. (Cunningham & Hu, 2005) 4: A speciic type
and any other source of knowledge. (Doorn, 2005) of a learning algorithm, especially for self-organizing
neural nets such as the Kohonen feature map. (R., 2005)
Unix-to-Unix Copy (UUCP) 5: Learning in the absence of external information on
A Unix utility program and protocol that allows one Unix outputs. (Lingras et al., 2005) 6: The task of learning a
system to send iles to another via a serial line, which model that describes a given data set where the attribute
may be a cable going directly from one machines serial of interest is not available in the data. Often, the model
port to anothers or may involve a modem at each end of is a mixture model, and the mixture component, from
a telephone line. (Kontolemakis et al., 2005) which each instance has been drawn, is not visible in the
data. (Scheffer, 2005)
Unlabeled Data
A sequence of training instances without corresponding Up-Sampling
class labels. (Scheffer, 2005) Inserting L-1 zeros between every two samples. (Mili,
2005)
Unnesting
A particular technique in query rewriting that aims Update Time
at transforming SQL queries with subqueries in them Time necessary to draw graphical content to display; the
into equivalent queries without subqueries. Also called update step is part of the displaying pipeline. (Rosenbaum
lattening. (Badia, 2005a) et al., 2006)

Unremarkable Computing Uplink


An approach that focuses on designing domestic devices The communication link from an Earth station to a satellite.
that are unremarkable to users. Here, unremarkable (Statica & Deek, 2006)
is understood as the use of a device being a part of a
routine, because, it is believed, routines are invisible in Upper Approximation
use for those who are involved in them. (Oulasvirta & In rough sets theory, one of the two sets used to deine
Salovaara, 2006) a rough or approximate set. The upper approximation

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U ppe r Approx im at ion of a Rough Se t U sa bilit y 709

contains objects that may or may not be in the approximation with which speciied users can achieve speciied goals
set. It can be formally deined as the union of the in a particular environment. (Yong, 2005) 6: Generally
lower approximation and the boundary region. It is the regarded as ensuring that interactive products, such as
U
complement of the set of objects deinitely not in the set. e-commerce applications, are easy to learn, effective to
(Voges, 2005) use, and enjoyable from the users perspective. It involves
the optimization of user interaction with these interactive
Upper Approximation of a Rough Set products. (Singh, 2005b) 7: How easy an interface design
Minimum definable set containing the rough set. is to understand and use. A user-friendly document will
(Grzymala-Busse & Ziarko, 2005) let the user read or play any content at will; it will have
unambiguous interactive controls and a clear navigational
UPS: See Uninterrupted Power Supply. scheme. (Liu & Tucker, 2005) 8: How effectively site
visitors can access a sites informationthings enacted
Urbanity to make a Web site easier to use. (Falk & Sockel, 2005) 9:
A set of people, institutions, and interdependent relations Usability of hypertext/Web is commonly measured using
that exist collectively in a city, and all the individual established usability dimensions covering these categories
or collective interests and existences that belong and of usability defects such as screen design, terminology
constitute the city. (Matta, 2005) and system information, system capabilities and user
control, navigation, and completing tasks. (Theng, 2005)
URI: See Uniform Resource Identiication; Uniform 10: Study of the usefulness of technology as it relates to
Resource Identiier. an individual being able to successfully perform his or her
task with ease. Usability is measured through the ability of
URL: See Uniform Resource Locator; Universal Resource the technology to do the right job and to do the job right.
Locator. (Carstens, 2005) 11: The ease and speed with which the user
can ind and understand material on the Web site without
USA: See Uniform Spread Assumption; Universal assistance. (Stodel et al., 2005) 12: The ease with which
Services Agency. a user can accomplish a desired task within a Web site.
One also talks of a site being user friendly. (Duchastel,
Usability 2005) 13: The ease with which a user can learn to operate,
1: The ability of a system to interact natural and prepare inputs for, and interpret outputs of a system or
transparent with its users. Natural in this context is the component. (Proserpio & Magni, 2005) 14: The extent to
way the user is used to acting and transparent means which a product or system can be used by speciied users
not interfering with the performed task. (Athanasis & to achieve speciied goals with effectiveness, eficiency,
Andreas, 2005) 2: The ISO 9241-11 standard deinition for and satisfaction in a speciied context of use. (De Troyer,
usability identiies three different aspects: (1) a speciied 2005) 15: The external quality factor that is deined as a
set of users; (2) speciied goals (tasks) which have to be set of attributes that bear on the effort needed for the use
measurable in terms of effectiveness, eficiency, and and on the individual assessment of such use by a stated
satisfaction; and (3) the context in which the activity or implied set of users. (Xenos, 2006) 16: The capacity
is carried out. (Singh, 2006) 3: A measure of how well of an object to be used within a given course of action. It
someone can use something. Usability, in comparison to includes the ease of use of the object for the action and
accessibility, looks at factors such as ease of use, eficiency, its usefulness or utility for the user to achieve the
effectiveness, and accuracy. It concentrates on factors of action. (Blandin, 2005) 17: Addresses the full spectrum
an interaction other than whether someone can perform of impacts upon user success and satisfaction. Usability
something, access information, and so forth, which are all is accomplished through user-centered (not necessarily
handled by accessibility. (Polovina & Pearson, 2006) 4: A user-driven) design. The usability engineer provides a
measure of quality of a users experience when interacting point of view that is not dependent upon designers goals
with a product or a system. It is described by the ease of because the usability engineers role is to act as the users
learning, eficiency of use, memorability, error frequency advocate. (Y.-W. Lin, 2005) 18: Refers to how well an
and severity, and subjective satisfaction. (Rowe, 2006d) 5: application is designed for users to perform desired tasks
A measure of the effectiveness, eficiency, and satisfaction easily and effectively. (Chan & Fang, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
710 U sa bilit y Ba rrie r U se Ca se

Usability Barrier Usability Inspection Method (UIM)


Technical, cognitive, social, or organizational constraint The term given to a variety of analytical methods for
U or bias that decreases usability-data quality, consequently predicting usability problems in designs. (Woolrych &
hindering the optimal detection of, and response to, a Hindmarch, 2006)
systems usability deiciencies. (Danielson, 2006a)
Usability Lab
Usability Data A lab designed for user testing, typically a quiet room with
Any information used to measure or identify factors computer equipment and a space for an observer to sit,
affecting the usability of a system being evaluated. along with a special observation area. (Roibs, 2006b)
(Danielson, 2006b)
Usability of an IS
Usability Data Quality Refers to how easy it is to use and learn the system.
Extent to which usability data eficiently and effectively (Furtado, 2005)
predict system usability in actual usage, can be eficiently
and effectively analyzed, and can be eficiently and Usability Practitioner
effectively reacted to. (Danielson, 2006a) A person who designs and evaluates software user
interfaces. (Henry, 2006)
Usability Engineering
1: A systematic approach to making software (Web Usability Requirement
designs) easy to use, thus meeting the needs of the targeted Related to users satisfaction and the performance of the
users. (Becker, 2005b) 2: Provides structured methods system. (Furtado, 2005)
for optimizing user interface design during product
development. (Singh & Kotze, 2006) USB: See Universal Serial Bus.

Usability Evaluation USB Port: See Universal Serial Bus Port.


1: A procedure to assess the usability of an interface. The
usability of an interface usually is expressed according Use
to the following ive parameters: easy to learn, easy to 1: These are the different ways a tool is used. Use is
remember, eficiency of use, few errors, and subjective highly cultural and depends upon the context of use and
satisfaction. (Karoulis et al., 2006) 2: The act of measuring the culture of the social surroundings. (Blandin, 2005) 2:
(or identifying potential issues affecting) usability Things people do with mediathe how of media use
attributes of a system or device with respect to particular motivations. (Stafford, 2005)
users performing particular tasks in particular contexts.
(Fortino, 2005) 3: Evaluation focusing on effectiveness, Use and Gratiication
eficiency, and satisfaction with which speciied users Customer activities and the enjoyment that derives from
can achieve speciied goals in particular environments. such activities, particularly in a mass media context.
(Zaphiris & Zacharia, 2005) (Stafford, 2005)

Usability Evaluation Method (UEM) Use Case


Method or technique that can assign values to usability Used during system analysis to help specify the behavior
dimensions and/or indicate usability deiciencies in a of a proposed system. A use case is a largely text-based
system. (Danielson, 2006a) description of a complete transaction as seen from the
users perspective. A use case should emphasize what the
Usability Fraternity system will do, not how it will do it, and it should be written
A group of people that designs and evaluates software in the users language. Thus, use cases are an important
user interfaces. (Henry, 2006) communication tool between developers of systems and
the intended users. (Dobing & Parsons, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U se Ca se Dia gra m U se r Ac c e pt a nc e 711

Use Case Diagram in reference to system speciications and the extent of


Diagram showing a set of use cases (by title) and the actors coverage of end users tasks supported by the system, but
involved in them. This provides an overview of the use not on end-user performance testing. (Theng, 2005)
U
case structure and also shows how each actor is involved
in a system. (Dobing & Parsons, 2005) Usenet
A worldwide distributed discussion system. It consists
Use Case Model of a set of newsgroups with names that are classiied
Consists of actors, use cases, and the relations among them. hierarchically by subject. Articles or messages are
Actors represent roles of agents who require services from posted to these newsgroups by people on computers
the system (primary actor) or who contribute to the delivery with the appropriate softwarethese articles are then
of these services (supporting actor). A use case represents broadcast to other interconnected computer systems
a service to be provided by the system in reaction to the via a wide variety of networks. Some newsgroups are
primary-actor solicitation. (Rolland & Kaabi, 2006) moderated; in these newsgroups, the articles are irst
sent to a moderator for approval before appearing in
Use Case Scenario the newsgroup. Usenet is available on a wide variety of
A scenario, as speciied in the UML, is an instance of a computer systems and networks, but the bulk of modern
use case that can help illustrate its use. For example, a Usenet trafic is transported over either the Internet or
use case (rent video) might have different scenarios for UUCP. (Kontolemakis et al., 2005)
renting a video to a child, a new customer, an existing
customer with overdue videos, and so forth. However, the User
term is also used in other ways outside the UML. (Dobing 1: A person who works with a computer without bothering
& Parsons, 2005) about the hows and whys of its functionality, like a
person who reports a virus instead of ixing it. (Magagula,
Use Quality 2005) 2: A person who operates a workstation for ones
The value of the experience of interacting with a product own beneit or for the beneit of ones customer. (Maris,
or service. (Knight, 2006a) 2005) 3: An individual that is accessing the Web through
a browser. (Yao & Xiao, 2005) 4: An individual who
Use Tax interacts with a computer system to complete a task, learn
A complementary or compensating tax imposed by all speciic knowledge or skills, or access information. (Ally,
states that impose a sales tax. Use taxes are typically 2005c) 5: Individual interacting with the system (ISO 9241-
charged on the storage, use, or consumption of goods 10). (Bevan, 2006) 6: Anyone with the willingness and
in the taxing state. Liability to remit use taxes usually capacity to access online e-government services provided
falls on the buyer of taxable property or services. Since for him/her and his/her community peers. Peers could
it is administratively dificult to compel individual self- be people with the same interests or similar concerns.
assessment of use taxes, most of those taxes will go (Crdoba, 2006b) 7: Individual who uses online media
uncollected unless the states can compel sellers to collect as a mechanism for accessing, presenting, or exchanging
them. Signiicantly, a state may impose use tax collection information. (St.Amant, 2005e)
responsibilities on Internet sellers if they have nexus with
the state. The use tax is intended to stem the erosion of the User Acceptance
sales tax base when a states residents purchase taxable With respect to information technology in general, user
goods or services from sellers located outside of the state. acceptance has been conceptualized in several ways.
(Raisinghani & Petty, 2005) First, it is equated with routinization, the point at which
an innovation ceases to be perceived as something unusual
Usefulness and is considered to be a routine part of the process
1: The user is convinced that the use of computers in the into which it was introduced. Second, user acceptance
workplace is an eficient and effective means to solve is equated with time since adoption, implying that an
problems. (Blignaut et al., 2005) 2: This is debatable. Some innovation that endures in an organization has been
make the distinction between usability and usefulness. accepted. Finally, user acceptance is equated with usage.
Although it is impossible to quantify the usefulness of a Usage is considered an objective measure of acceptance
system, attempts have been made to measure its attainment

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
712 U se r Ac t ivit y Re c ord U se r M ode l

when certain conditions are met: (1) users are motivated User Focus
to use the system; (2) users have convenient access to the The set of documents corresponding to a user-deined
U system; and (3) users understand the system and what it composition of concepts; initially, the entire knowledge
can do. (Chen & Lou, 2005) base. (Sacco, 2006)

User Activity Record User Goal


The collection of all sessions belonging to a particular user The speciic objective that a user wants to solve. In most
during a speciied time period. (Mobasher, 2005b) complex situations, goals form a hierarchy with multiple
tiers of subgoals that must be addressed as part of solving
User Belief the primary goal. (Albers, 2006)
One of the viewpoints and opinions that users hold about
a domain due to their knowledge and experience. From User Interaction
the interestingness perspective, a pattern that contradicts In multimedia, the act of users intervening or inluencing
user beliefs is interesting. Intensity of interestingness in designing multimedia presentation. (Guan, 2005d)
increases with an increase in this conlict. (Natarajan &
Shekar, 2006) User Interface
1: A collection of interaction techniques for input of
User Collaboration information/commands to an application, as well as all
Voluntary collaborative efforts from users in developing manner of feedback to the user from the system that allow
open source software. The collaboration includes looking a user to interact with a software application. (Lumsden,
for bugs, suggesting new features, reviewing/submitting 2005) 2: An aspect of a wireless device or a piece of software
source code, documentation, and offering project that can be seen, heard, or otherwise perceived by the
administration assistance. (Zhao & Deek, 2005) human user, and the commands and mechanisms the user
uses to control its operation and input data. (Lawson-Body,
User Datagram Protocol (UDP) 2005) 3: Controls how data and instructions are entered
A connectionless protocol that, like TCP, runs on top of and how information displays on a screen. (Liu & Tucker,
IP networks. Unlike TCP/IP, UDP/IP provides very few 2005) 4: Facilitates the communications between a user (a
error-recovery services so is less reliable than TCP, offering person) and an information system, and may be tailored
instead a direct way to send and receive datagrams over uniquely to an individual. (Singh, 2005) 5: The control and
an IP network. (Yang et al., 2005a) information-giving elements of a product, and the sequence
of interactions that enable the user to use it for its intended
User Engineering purpose (ISO DIS 20282-1). (Bevan, 2006)
A phrase used by IBM to describe an integrated process
of developing products that satisfy and delight users. User Interface Language (UIL)
(Sharples, 2006) A language for specifying user interfaces in Motif, the
industry standard graphical user interfaces toolkit for
User Environment Design UNIX systems (as deined by the IEEE 1295 speciication).
The systems functions and structures are deined in a (Campos & Harrison, 2006)
way that supports the new work practice as envisioned in
the redesign and speciied in the storyboards. The system User Model
is represented in a diagram. The ifth step in contextual 1: A model induced by machine-learning techniques from
design. (Notess, 2005) the available information and patterns of data from the
user. This model is used by the system to predict future
User Friendliness user actions. (Abhishek & Basu, 2006) 2: A model that
Quality of a program or user-interface that is easy to use captures information about users. User models range from
and appropriate for end users. With graphical interfaces, simple collections of information about users to cognitive
in particular, human-computer interaction is made easier architectures that attempt to simulate user behavior.
and more intuitive for end users. (Vaast, 2005) (Campos & Harrison, 2006) 3: A model that contains

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U se r M ode ling U se r Te st ing 713

information about users characteristics and preferences. proile may be used as a resource of business intelligence.
(Gaudioso & Montero, 2006) 4: A quantitative description (Li, 2005a)
of a users interaction behavior that can be used to describe,
U
predict, and/or simulate user performance on speciic tasks. User Proile Data
(Keates et al., 2006) 5: Representation of the preferences Data that provide information about the users of a Web site,
and the state of knowledge of the user (to be used as a such as the demographic information and the interests or
basis for adaptation). (Houben et al., 2006) preference of the users. (Lee-Post & Jin, 2005b)

User Modeling User Proiling


1: The process of gathering information speciic to each A process for automatic modeling of the user. In the context
user either explicitly or implicitly. This information of Web data, it can be content based, using the content of
is exploited in order to customize the content and the the items that the user has accessed, or collaborative, using
structure of a service to the users speciic and individual the ways the other users access the same set of items. In the
needs. (De Meo, Quattrone, et al., 2005) 2: The process context of text mining, we talk about user proiling when
of using analytical or machine learning techniques to using content of text documents. (Mladeni, 2005)
create an aggregate characterization of groups of users
with similar interests or behaviors. (Mobasher, 2005c) 3: User Resistance
In the context of adaptation, the describing/modeling of Any user behavior, action, or lack of action that inhibits
the users preferences, interests, usage, and environment. the development, installation, or use of an information
(Knight & Angelides, 2005) system. (Mullany, 2005)

User Navigation Pattern User Satisfaction


Interesting usage pattern contained in the Web log data. The overall affective evaluation by an end user of his or
Most algorithms use the method of sequential pattern her experience with a computer or information system;
generation, while the remaining methods tend to be rather generally measured with a Likert scale. (Hantula, 2005)
ad hoc. (Hu, Yang, Lee, & Yeh, 2005)
User Session
User Proile A delimited set of user clicks across one or more Web
1: A data log representing a model of a user that can be servers. A click corresponds to a page on the Web server,
used to ascertain behavior and taste preferences. (Parmar & which is uniquely identiied by an URI (Universal Resource
Angelides, 2005) 2: A description of the range of relevant Identiier). (Yao & Xiao, 2005)
skills of potential end users of a system. (Jaspers, 2006) 3:
A model of a user representing both the users preferences User Study
and behavior. (De Meo, Quattrone, et al., 2005) 4: A proile Any of the wide variety of methods for understanding
on a portal for each user that deines customization for that the usability of a system based on examining actual users
user. (Wojtkowski, 2006) 5: System-level representation or other people who are representative of the target user
(model) of a user, used for customizing system responses. population. (Roibs, 2006b)
(Koutrika, 2005) 6: The proile contains all the data
associated with the user or learner, for example, educational User Systems Development
background, preferences, learning aims, competitive level, Systems development initiated and performed by user-
and so forth. (Leung & Li, 2005) 7: Speciies what data developers, who have good knowledge about and who
and network resources a user can access and the type of are (partly) responsible for (part of) the organization the
access. (Paraskevi & Kollias, 2006) 8: With a large number system is to serve. (Avdic, 2005)
of customers, a service provider may need to analyze its
customers in terms of a list of identiied business-critical User Testing
factors. A user proile is a dynamically maintained data A family of methods for evaluating a user interface by
repository that groups user behaviors and classiies them collecting data from people actually using the system.
into different categories according to their attributes such (Roibs, 2006b)
as age, gender, profession, and so forth, so that the user

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
714 U se r Tra ck ing U se r-I nit iat e d Wire le ss Em e rge ncy Ser vic e

User Tracking drive development and designs, and to improve the usability
An automated logging mechanism that stores and retrieves and usefulness. (Y.-W. Lin, 2005)
U information on a users progress as he or she advances
through the courses on an e-learning system. (Quah, User-Centered Evaluation
Leow, Soh, 2006) An evaluation carried out with users in mind. (Zaphiris
& Zacharia, 2005)
User View
A subset of the external schema for querying the course- User-Centered Web Design
material knowledge base; the subset is usually deined The requirements of the users of a Web site play a central
based on the corresponding user proile for extracting role in the design process. (De Troyer, 2005)
relevant data and information. (Leung & Li, 2005)
User-Centered Web Site Engineering Course
User-as-Editors (UaE) Approach Web site engineering lifecycle and user-centered design.
The community members are responsible for supplying new Site goals, business models, value propositions, user
content and for the quality assurance of existing content, analysis, information architecture, interface and navigation
as well as for creating and maintaining the etiquette of design, usability guidelines, database, testing, hosting
the community. (Kindmller et al., 2005) strategies, usage metrics, and collaborative development.
(Knight & Chan, 2005)
User-Centered Design
1: A client or user-centered philosophy in which the User-Deined Type
individual is at the center of an iterative design process 1: Any type as deined through the use of some basic
encompassing multiple factors in an interaction between constructors, such as CREATE TYPE. The object-
user and information product. UCD considers cognitive, relational model provides user-deined type in an attempt
sociocultural, political, and technological factors involved to make the system more customizable for applications
in deining user tasks and goals that drive the design and with particular requirements of the data representation.
development of software, Web sites, information systems, (Badia, 2005d) 2: A named data type deined by a user.
and processesanything with which people interact. UCD It can contain a list of attributes, in which case it is said
is concerned with the usefulness, usability, desirability, to be a structured type (or object type, in Oracle). It is
legibility, learnability, accessibility, and meaningfulness an abstraction of a real-world entity. It can also provide
of an information product. (Campbell, 2005) 2: A method explicitly deined methods that implement operations with
for designing ease of use into a product by involving end the entity. (Zendulka, 2005b) 3: Any data type formed
users at every stage of design and development. (Keates by the users contained of any other data type and usually
et al., 2006) 3: A well-established process of designing including the routines. (Pardede et al., 2005)
technology that meets users expectations or that involves
potential users in the design process. (Sharples, 2006) 4: User-Developed Application
An approach to the design of system interfaces that seeks An information system developed by a user-developer. The
to ensure technology matches users needs and supports system is often small and dedicated to a speciic task in the
the tasks that users would like to perform. (Porter, 2006) user-developers working environment. (Avdic, 2005)
5: A philosophy that places the person (as opposed to the
thing) at the center of the design process. (Zaphiris & User-Developer
Kurniawan, 2005) 6: Puts the user into the center of the A person who develops user-developed applications that
software design process. (Zaphiris et al., 2005) 7: The support the user-developer in his work. The user-developer
real users and their goals, not just technology, should be has deep (often tacit) knowledge about, and is often (partly)
the driving force behind the development of a product. responsible for (part of) the organization the system is to
(Singh, 2005b) 8: An approach to software development serve. (Avdic, 2005)
that advocates maintaining a continuous user focus
during development, with the aim of producing a software User-Initiated Wireless Emergency Service
system with a good usability level. (Ferre et al., 2006) 9: A type of wireless emergency service that responds to the
A software process that seeks to answer questions about service requests made by users when they report emergency
users and their tasks and goals, then uses the indings to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U TAU T U WEP 715

events with mobile phones. The main application is over the Internet, and are charged according to resource
wireless emergency call service (WECS), in which usage. (Feuerlicht & Vorisek, 2006)
wireless carriers pinpoint mobile users when they dial
U
emergency numbers and deliver their emergency calls as Utopia
well as location information to local public-safety answer 1: A real or imagined society, place, or state that is
points. (Sun, 2005) considered to be perfect or ideal. (Macfadyen, 2006b) 2:
Imaginary place or state of things in which everything is
UTAUT: See Uniied Theory of Acceptance and Use of perfect. (Signoret, 2006)
Technology.
UUCP: See Unix-to-Unix Copy.
UTF-8
Unicode Transformation Format 8 bits; the byte-oriented UUID: See Universally Unique ID.
encoding form of Unicode. (T.S. Chan, 2005)
UWEP
Utilitarian An incremental association rule algorithm. Such algorithms
Plain, practical, useful. (Bridges et al., 2006) use the information obtained in previous association rule
processing to reduce the amount of dataset scans when new
Utilitarian/Economic Consumer transactions are added. (Imberman & Tansel, 2006)
Consumer who considers the shopping expedition as a
task to be fulilled; the consumer is goal oriented, does
not derive pleasure from the act of shopping, and values
quick shopping expeditions. (Scarpi & DallOlmo-Riley,
2006)

Utilitarianism
The philosophical view that the moral act is the one that
results in the greatest good or happiness for the greatest
number of people. (Gilbert, 2005)

Utile
Numerical utility value, expressing the true worth of
information. Such values are obtained by constructing a
special utility function. (Sundaram & Portougal, 2005b)

Utility
1: The extent to which the system provides the right kind
of functionality so that users can do what they need or
want to do. (Yong, 2005) 2: The quality or condition of
being useful (usefulness). (Croasdell & Wang, 2006) 3:
Measures the degree of usefulness of an object. Classical
economical theories consider that the utility of an object
and the available quantity of this object determine its
price. (Blandin, 2005)

Utility Computing
Computing services are provided on demand by a provider
organization that uses its computers and facilities.
Customers access the computers via a private network or

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
716 V M ode l Va lidat ion Tool

V
V Model Valid Time
1: A modified system development lifecycle which 1: Designates when data values become valid. (Tansel,
emphasizes quality assurance. (Steinbach & Knight, 2005) 2005) 2: The time when a fact (i.e., a statement with
2: A model for training that aligns the business context an associated truth value) is true in the modeled reality.
and needs with the evaluation strategy. (Waddington et (Rodrguez-Tastets, 2005b)
al., 2005)
Valid XML Document
V-CARD To be valid, an XML document additionally must conform
A metadata format that enables a person to be described. (at least) to an explicitly associated document schema
This is used extensively in commercial e-mail systems and deinition. (Nayak, 2005b)
can be thought of as an electronic business card. (Verhaart
& Kinshuk 2006) Valid-Time Temporal Document Database
Every document that is stored is explicitly given a time
VA: See Vulnerability Assessment. period in which it is valid. The start and end timestamps of
this period can be in the past, present, or future. (Nrvg,
Vague/Fluid/Permeable Boundary 2005)
As a continuation of lexibility, the virtual organization is
characterized by vague boundaries as to the extent of its Validation
use and purpose. Since small tweaks can easily and largely 1: The process of determining whether an expert system to
affect the overall organization, it is quite possible to extend be used in an administrative process is correct. This involves
the boundaries of an organization so that they encompass a combination of methods of which the most important
new purpose, people, or control. (J. Lee, 2005) are: letting domain experts verify the knowledge in the
knowledge base, using automated procedures to check the
VAI: See Value Activity Interaction. system for consistency, and applying the system to a larger
number of test cases. (Svensson, 2005) 2: The process of
Valence showing the correspondence between the physical system
The strength of an experienced emotion. (Byl & Toleman, and the simulated system is within acceptable tolerances
2005) of output performance. Validation relies on statistical
conirmation of the simulated output to it the behavior
Valence Model exhibited by a target, physical system. (Vitolo & Coulston,
Model showing that the overall attractiveness of an 2005) 3: Ensuring that the assumptions used in developing
application to a user is the summation of the products of the model are reasonable in that, if correctly implemented,
the attractiveness of those outcomes associated with the the model would produce results close to that observed
application and the probability that the application will in real systems. Model validation consists of validating
produce those outcomes. (Chen & Lou, 2005) assumptions, input parameters and distributions, and output
values and conclusions. (Al-Hanbali & Sadoun, 2006)
Valid Scope
The area within which the data instance is the only answer Validation Tool
with respect to a location-dependent query. (Xu, 2006) One of the tools available for semi-automatic validation
of Web site accessibility. Such tools test only the code
Valid Scope Distribution syntax and style sheets, without considering semantic
The collective set of valid scopes for a data item. (Xu, aspects where the human control is needed. (Costagliola,
2006) Di Martino, Ferrucci, et al., 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Va lidit y Va lue Cre at ion Wa y 717

Validity distribution, and sales of components, equipment, raw


1: A measure for assessing usability inspection methods. materials, and so forth to manage a series of resource and
Determined by dividing the number of real problems information low. (D. Kim, 2005) 3: A string of diverse V
found by the Usability Inspection Method (UIM) by the companies working together to create or satisfy market
number of problems predicted by the UIM. (Woolrych & demand for a particular product or a bundle of products.
Hindmarch, 2006) 2: An assessment is valid if it measures (Braun, 2005a) 4: The sequence of business processes
what is intended to be measured. (Diamadis & Polyzos, and functions through which value (utility) is added to
2005) 3: Extent to which a measure correctly represents products and services. It can be useful to consider such value
the desired concept. (Witta & Lee, 2005) chains to understand how they work, and how they can be
improved and dis-intermediated. (Gordon & Lin, 2005) 5:
Validity Time Refers to the way value is added to a product or service
A time interval within which the message remains valid, along the supply chain, from inbound logistics, through
available, and useful to its recipients. After the validity operations (manufacturing), outbound logistics, marketing,
time of a message, the message becomes useless and may and sales and service. (Marshall & Gregor, 2005) 6: The
be discarded. The notion of validity time is important in activities of a corporation such as procurement, production,
multimedia communication. (Yang et al., 2005b) marketing and sales, and customer support. (Scupola,
2005) 7: The fundamental organizational processes that
Value add value to the product or service that is produced by a
1: A fair return or equivalent in goods, services, or money company. (Mendonca, 2005) 8: The interconnection of
for something exchanged. (Ryan, 2005) 2: The amount business processes via resources that low between them,
a buyer is willing to pay for a product or service. with value being added to the resources as they low from
A business can add value by being low-cost providing, one process to the next. (Dunn & Grabski, 2005) 9: The
meaning providing a unique or differentiated product or visualization of an organization as a sequential array of
service or illing a niche market. (Darbyshire & Burgess, processes or activities that convert uninished inputs into
2005) 3: The beneits that stakeholders derive from inished outputs. (Bahn, 2006)
experiencing an enterprises products, services, experiences,
and knowledge. Perceptions of value are shaped by: (1) Value Chain Analysis (VCA)
outcomes, (2) experiences, and (3) cost. (Norris, 2005) 4: A tool for mapping business processes that are either
The beliefs that people carry, formed of identity, national primary to the business operations or serve as support
culture, behavior, and understanding that translate into processes. Variants of the model are produced for service
organizational values at the corporate level, formed of and manufacturing sectors. (Clegg & Tan, 2006)
common understanding at work. (Huq et al., 2006) 5:
Deined as desirable states, objects, goals, or behaviors Value Chain Model
transcending speciic situations and applied as normative Identiies nine generic, distinct categories of activity that
standards to judge and to choose among alternative modes an organization performs in the course of doing business,
of behavior. (Zakaria & Yusof, 2005) whichif performed better than competitorscan yield
a competitive advantage for the organization. (Holsapple
Value Activity & Jones, 2006)
A physically and technologically distinct activity that the
company performs and which adds value to a product or Value Chain Network
service. (Jeffcoate, 2005) A structured network of N organizations engaged in the
manufacture/distribution/retail sales of a product (e.g.,
Value Activity Interaction (VAI) GM and its suppliers). This network type is characterized
Interaction between two value activities performed by by a centralized structure, limited (vertical) competition,
partners in a value chain. (Jeffcoate, 2005) and uncommon scope of operations among members.
(Priestley, 2006)
Value Chain (VC)
1: A collection of activities that are performed by a Value Creation Way
company to design, produce, market, deliver, and support Knowledge creates value when it is incorporated into
its product. (Jeffcoate, 2005) 2: A chain of activities in a products and services by, for example, applying it to old
group of collaborators who are designed to meet market products or by developing new products and services.
demand. They are vendors involved in value chains across Knowledge in this context does not merely imply know-
purchasing, procurement, manufacturing, warehousing, what, know-why, and know-how; it more importantly

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
718 Va lue De live r y Va ria nc e

implies a irms ability to produce and deliver customer- Value Proposition


valued outcomes. The test of value creation is whether 1: Attributes that supplying enterprises provide, through
V customers are willing to pay for a irms products and their products and services, to achieve satisfaction and build
services under conditions of wide competitive choices loyalty with their targeted customers. (Cepeda-Carrin,
open or available to them. Other modes are: creation value 2006) 2: The particular value targets articulated by an
by globalizing deeply embedded local knowledge and enterprise for its stakeholders. (Norris, 2005)
converting knowledge to strategic knowledge to create
shareholder wealth. These two value creation ways focus Value-Added Network (VAN)
on a irms employees and investors. (Cepeda-Carrin, 1: A company that provides network capabilities to business
2006) partners that want to exchange electronic messages. A VAN
also provides storage, backup, security, and other services
Value Delivery in order to provide more message exchange functionality.
This term (although variable) may generally refer to (Bussler, 2005a) 2: Public data communication networks
the delivery of tangible or intangible things of worth or that provide basic transmission capabilities plus enhanced
importance. In a product transformation process, this term services (security, error detection, video conferencing, etc.).
may refer to eficient processes, and the effectiveness in (Harris & Chen, 2006)
attaining the right inputs, results, impacts, goals, and so
forth, and in managing any relative context. (Barima, Value-Added Service
2006a) Telecommunication service with the routing capability and
the established additional functionality. (Hulicki, 2005)
Value Delivery Orientation
Refers to positioning to deliver value to it or exceed Value-Based Query
expectations of any relatively defined value. This A probabilistic query that returns a single value. (Cheng
positioning may entail both cognitive and behavioral & Prabhakar, 2005)
aspects. (Barima, 2006a)
Value-Centered Design
Value Judgment An approach to design that involves explicating stakeholder
An assessment that could reveal the values that support (including designer and developer) values as well as needs.
a community and its members, who or what is to be Design then aims to communicate and deliver products
included, and who or what is to be marginalized. (Crdoba, and services that meet stakeholders values and needs.
2006a) (Knight, 2006b)

Value Network VAN: See Value-Added Network.


This term is ambiguous, as the analytical perspective
colors its meaning. Nevertheless, the value network in Variable Data
general terms evolves from a supply chain through mutual Information that changes on sequential pages being output
use of ICT, and more closely linked collaboration and from a printing device. (Snyder, 2005)
mutual dependency between the partner organizations or
independent companies. Collaboration means electronic Variable Group
communication via extranet or Internet, cooperation and The hosts can create, join to, or leave any group at any time.
coordination of work low, information and knowledge The communication does not need any control center to
exchange, negotiation and dynamic trading, and joint coordinate the activity of the hosts. (Hosszu, 2005a)
decision making. Value is derived through the exchanges
with partner organizations in the network and its shared
Variable Precision Rough Set Model
knowledge. The value network also aims to deliver the
An approach to forming lower and upper approximations
highest value to the end consumer and to its stakeholders.
of a rough set via generalized parametric deinitions.
(Richards et al., 2005)
(Grzymala-Busse & Ziarko, 2005)
Value of (Travel) Time Variance
Economic costing of how much people are willing to pay
A statistical measure of dispersion around the mean within
for travel time savings for infrastructure investment. (Jain
the data. Factor analysis divides variance of a variable
& Lyons, 2005)
into three elementscommon, speciic, and error. (Lee,
Peterson, et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Va ria nc e Est im at ion Ve ndor-Originat e d ERP M a int e nanc e Re que st 719

Variance Estimation Vector Primitive


Average of the sum of the squares of the differences of Geometrical object with certain properties, mostly
the values attained by a random variable from its mean. belonging to one of the basic classes: point, line, or triangle. V
(Zelasco et al., 2005) (Rosenbaum et al., 2006)

Variant Vector Quantization


Applied to many structural elements of a database (class, A signal compression technique in which an n-dimensional
table, constraint, etc.), it is used to deine mutable elements space is mapped to a inite set of vectors. Each vector is
or elements whose modiication is highly probable. An called a codeword and the collection of all codewords a
invariant is the opposite of a variant, that is, an element codebook. The codebook is typically designed using Linde-
not involved in the evolution of the database. Variants of Buzo-Gray (LBG) quantization, which is very similar to
database objects or object properties can be modiied and k-means clustering. (Denton, 2005)
can generate versions. (Camolesi & Veira, 2005)
Vector Space
VC: See Value Chain. A model that represents every document in a collection
with an n-dimensional vector for some constant n. (Meng
VCA: See Value Chain Analysis. & Chen, 2005)

VCoP: See Virtual Community of Practice. Vector Space Model (VSM)


1: A common IR model where both documents and
VCRoD: See Videoconference Recording On-Demand. queries are represented as vectors of terms. (Fan & Pathak,
2005) 2: A popular method for representing documents
VDSL: See Very-High-Speed DSL. and determining their semantic relatedness, originally
devised in the mid-1960s for text search applications and
Vector subsequently applied in the representation of documents for
A quantity having both direction and magnitude. This text categorization applications. Documents are represented
quantity can be represented by an array of components in as vectors in a vector space generated by the terms that
a column (column vector) or in a row (row vector). (Lee, occur in a document corpus (the document collection in text
Peterson, et al., 2005) search, the training set in text categorization), and semantic
relatedness is usually measured by the cosine of the angle
that separates the two vectors. (Sebastiani, 2005)
Vector Analysis
In vector analysis, all operations are possible, because
features in one theme are located by their position in explicit Vectorization
relation to existing features in other themes. The complexity The representation of objects in a class by a inite set
of the vector data model makes for quite complex and of measures deined on the objects. (Caramia & Felici,
hardware-intensive operations. (Sadoun, 2006) 2005)

Vector Graphic Vehicular Telematics System (VTS)


1: A vector graphic ile contains all the calculations to redraw An electronic on-board system with wireless communications
an image onscreen. A vector graphics ile size remains and location technology, integrated by some computing
small, and the image can be scaled to any size without technology, to handle data and manage information lows
any degradation to image quality. (Szabados & Sonwalkar, from/to the user. (Costagliola, Di Martino, & Ferrucci,
2005) 2: Approach for the description of graphical content 2006)
by vector primitives. (Rosenbaum et al., 2006)
Vendor Lock-In
Vector Model A situation where a software product is dependent on a
A model to measure the relevance between a document single vendors implementation of a technology. (Sowe
and a query, based on sharing distinctive words. (Navarro, et al., 2005)
2005)
Vendor-Originated ERP Maintenance Request
Created by a vendor in order to ix bugs in the packaged
software, adapt to new legal requirements, impose the

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
720 Ve nt ure Ca pit a l Ve r t ic a l Dim e nsion

vendors maintenance-support strategy and upgrade one matching process for determining whether the user is
path availability, and provide additional enhancement to indeed the one he/she claims he/she is. (Li, 2006)
V business process functionality and meet user requirements.
(Ng, 2005) Version
A set of variations of an object with a high degree of
Venture Capital similarity. Document versions are never completely equal,
A general term to describe inancing and investing for startup but they are similar enough so as to be recognizable as the
and early stage businesses. (Hwang & Stewart, 2006) same document. (Martnez-Gonzlez, 2005)

Venture Capitalist Version Control


To provide funds and other assistance to start-up ventures. Set of mechanisms that support object evolution in computer
(Craig, 2006b) applications. (Martnez-Gonzlez, 2005)

Venture Deal Versioning-View and Versioning-Modiication


Statement of what entrepreneurs are giving up and what Two combined versioning approaches that aim to create a
the new venture is receiving in return; covers inancing minimum number of schema versions to reduce database
amount(s), method and timing of release(s), terms and access time and database space consumption. (Bounif,
conditions, equity given up, and so forth; usually starts 2005)
with a term sheet. (Craig, 2006a)
Vertical ASP
Verbal Protocol Provides online applications customized for a speciic
Transcription of the verbal utterances of a test person industry such as staff or operations scheduling for hospitals,
performing a certain task. (Jaspers, 2006) material procurement for the steel industry, and so forth.
(D. Kim, 2005)
Verbal Protocol Analysis
Systematic analysis of the transcribed verbal utterances to Vertical Classiication System
develop a model of the subjects task behavior that then Classiication systems can be divided into horizontal
may be used as input to system design speciications. and vertical classiication systems. Vertical classiication
(Jaspers, 2006) systems concentrate on a certain part of a domain, but they
tend to deine this part in a very detailed way. An example
Veriication for a vertical classiication system is ETIM, which was
1: A one-to-one match with a biometric takes place deined for classifying electro-technical products. (Abels
during which the user must claim an identity irst and & Hahn, 2006)
then is checked against his or her identity (also referred
to as authentication). (Lowry, Stephens, et al., 2005) Vertical Data Mining
2: Comparing the two biometric templates (enrollment The process of inding patterns and knowledge from data
template and veriication template) and giving the validity organized in vertical formats, which aims to address the
of the claimed identity as to whether both are from the same scalability issues. (Perrizo, Ding, Ding, et al., 2005)
person or not. This is a one-to-one comparison. (Vatsa et
al., 2005) 3: The process of determining the correctness Vertical Database Design
of the programmed components in terms of typographical A process of developing a vertical data model, usually with
errors, numerical accuracy, algorithm completeness, and intended data-mining functionality that utilizes logical
logical unity. Veriication covers all aspects of logical, operations for fast data processing. (Perrizo, Ding, Serazi,
syntactic, and semantic debugging of computer programs. et al., 2005)
(Vitolo & Coulston, 2005) 4: The process of determining
whether or not the products of a speciication phase fulill Vertical Decomposition
a set of established requirements. Sometimes this is also A process of partitioning a relational table of horizontal
used to indicate the process of proving that a more concrete records to separate vertical data iles, either to attribute
speciication preserves the properties of a more abstract level or bit level, usually retaining the original record order
speciication. (Dasso & Funes, 2005) 5: The process of in each. (Perrizo, Ding, Serazi, et al., 2005)
inding out whether the model implements the assumptions
considered. A veriied computer program, in fact, can Vertical Dimension: See Horizontal vs. Vertical
represent an invalid model. (Sadoun, 2006) 6: A one-to- Dimension.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ve r t ic a l Disint e grat ion V ide o I ndex ing 721

Vertical Disintegration signals from a ground-station computer that acts as a


Differentiation or unbundling of the functions of hub that controls the entire operation of the network.
an organization, enabling these functions to be either (Latchem, 2005) 2: A very small earth station used for V
outsourced or dealt with by partners in strategic alliances; receipt of broadcast transmission of data or video, as well as
for example, instead of an organization having its own IT interactive communication with a host computer or database
department, it may outsource this function to a specialist for a multitude of applications. (Songan et al., 2005) 3: A
IT service provider. (Marshall & Gregor, 2005) transceiver used to receive signals from and transmit signals
to the satellite. (Gnaniah, Yeo, et al., 2005)
Vertical Industry Application
A vertical industry is one that is focused on a relatively Very-High-Speed DSL (VDSL)
narrow range of goods and services. Vertical industry An asymmetric DSL technology that provides downstream
applications are speciic to certain industries. Usually there data rates within the range 13 to 52 Mbit/s, and upstream
are some characteristics of the business processes unique data rates within the range 1.5 to 2.3 Mbit/s. VDSL can be
to a particular industry that make certain applications used for high-capacity leased lines as well as for broadband
very speciic for that particular industry. As a result, some services. (Chochliouros et al., 2005c)
vendors develop turn-key software solutions for their own
use. (Bose et al., 2005) Viability
The ability of a system to maintain a separate existence.
Vertical Industry Portal Most organizations are continuously trying to maintain
Usually based around a speciic industry, it aims to their viability. (Achterbergh, 2005b)
aggregate information relevant to these groups of closely
related industries to facilitate the exchange of goods and Vicarious Learning
services in a particular market as part of a value chain. Learning via exposure to the learning experiences of
(Tatnall et al., 2006) others. The claim is that processes such as reinforcement,
explanation, correction, and so forth can be effective for
Vertical Portal the observer as well as for the original participant. These
A portal providing content that is of interest to speciic processes are especially evident in learning dialogues,
markets or demographic categories. (Vrazalic & Hyland, hence dialogue becomes a focus in studying vicarious
2005) learning. (J.R. Lee, 2005)

Vertical Service Provider (VSP) Video Adapter


Vertically focused application service providers offering An integrated circuit card in a computer or, in some cases,
industry-speciic applications are also emerging. Their basic a monitor that provides digital-to-analog conversion
premise is that each industry (health, inance, transportation) and a video controller so that data can be sent to a
has its own unique set of characteristics that can best be computers display (alternate terms include graphics card,
served by companies that focus exclusively on the given display adapter, video card, video board, and almost any
industry. (Guah & Currie, 2005) combination of the words in these terms). (Bochicchio &
Fiore, 2005)
Vertically Partitioned Data
A distributed architecture in which the different sites store Video Analysis
different attributes of the data. The union of all these Analysis of videorecordings of the user/computer
attributes or columns together forms the complete database. interactions with the aim to detect usability problems of
(Jha & Sural, 2005) the computer system. (Jaspers, 2006)

Very Small Aperture Terminal (VSAT) Video Data Mining


1: Earthbound station used in satellite communications of A process of inding correlations and patterns previously
data, voice, and video signals, composed of a transceiver unknown from large video databases. (Oh et al., 2005)
placed outdoors in direct line of sight to the satellite and
a device placed indoors to interface the transceiver with Video Indexing
the end users communications device, such as a PC. The selection of indices derived from the content of the video
The transceiver receives or sends a signal to a satellite to help organize video data and metadata that represents
transponder in the sky. The satellite sends and receives the original video stream. (Farag, 2005b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
722 V ide o M a pping V ie w

Video Mapping to connect two or more sites together in such a way that both
A system is allowing the mapping of an audio, video movie, ends see and hear each other synchronously. (Baxendale,
V or animation on to the surface of a 3D object. A progressive 2005) 7: Two-way, interactive communication of audio-
video mapping system allows a user to collect color video video data that occurs in real time between participants
and infrared data which includes exact location information located in two or more locations. (Dudding, 2005) 8: The
on every recorded frame via GPS (global positioning use of information and communications technology to
system), and links this to computerized graphical allow people at different locations to hear, see, and speak
information systems. (Modrk & Marcn, 2006) to one another. It often includes the sharing of documents
and textual communications. (Chan, Tan, et al., 2005) 9: A
Video on Demand (VoD) video communications session among three or more people
1: Technology that allows you to order a video broadcast, who are geographically separated. (Parikh & Parolia, 2005)
for example, a Hollywood movie, at the exact moment 10: Engages communication and transmission between two
you want to watch it, with no pre-set start times. VoD also or more persons/parties in different geographical locations
allows you to control the broadcast you are watching just as via video and audio through a private network or Internet.
it would be possible with a VCR, for example, the ability It allows face-to-face conversations. (Nandavadekar, 2005)
to fast-forward, rewind, and pause your movie at any time. 11: This technology allows people in two or more distance
(Papagiannidis et al., 2005) 2: A planned system using locations to speak with each other simultaneously. It allows
compressed video streams to supply programs to viewers users to discuss ideas when face-to-face interaction is
when requested, via a network. (Fortino, 2005) desired but not possible. (Gillani, 2005b) 12: A conference
between two or more participants at different sites by
Video Shot using computer networks to transmit audio and video data.
A sequence of contiguous video frames taken using the (Hazari, 2006)
same camera. (Farag, 2005b)
Videoconferencing for Supervision
Video Streaming The use of two-way interactive videoconferencing for the
A video sequence that is sent in compressed form over purpose of live supervision of graduate students. (Dudding,
the Internet and displayed by the viewer as they arrive. 2005)
(Bochicchio & Fiore, 2005)
Videoconferencing over IP
Videoconference Recording on-Demand The use of the Internet Protocol for transmission of audio-
(VCRoD) video data during a videoconference. (Dudding, 2005)
A VoD system which is also able to dump and archive
networked media streams. (Fortino, 2005) Videogame
An interactive game played on a stand-alone arcade machine
Videoconferencing or home console. (Ip & Jacobs, 2006)
1: A synchronous audio-visual connection where two or
more geographically separated parties can see and hear Videotext
each other, which usually involves a TV and/or computer, Text graphically superimposed on video imagery, such as
speakers, microphones, and one or more cameras; a video caption text, headline news, speaker identity, location, and
phone. (Dell, 2005) 2: Conducting a conference between so on. (Aradhye & Dorai, 2005)
two or more participants at different sites by using computer
networks to transmit audio and video data. (Kabene et al., View
2005a) 3: Electronic technique used to allow three or more 1: A collection of data whose values either have to be derived
people at two or more or more locations to communicate. from other data (when the view is not materialized), or have
(Lateh & Raman, 2005) 4: Information technology tool been pre-computed from other data and stored (when it is
that transfers video (closed-circuit television) as well as materialized). (Lu, 2005) 2: A named query. (Theodoratos
audio, and is used by two or more people working together & Simitsis, 2005) 3: A logical representation of information
at different physical locations for collaboration in real contained in a database. It is an abstract vision of source data.
time. (Ribire & Romn, 2006) 5: The use of multimedia (Cannataro et al., 2005) 4: A view V on S is an assignment
elements, digital cameras, and microphones to capture of values to the elements of the set. If the assignment holds
video and sound, and transmit it live to other users who will for the dimensions and measures in a given cell X, then
receive it using their display units and speakers. (Laghos & V is a view for X on the set S. (Abdulghani, 2005b) 5: In
Zaphiris, 2005a) 6: The use of video and audio technologies multiview learning, the available attributes are partitioned

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
View Deinition Virtual Class/Virtual Lecture/Virtual Seminar/Virtual Tutorial 723

into two disjoint subsets, or views, which are required to Viral Marketing
be independent and compatible. (Scheffer, 2005) 1: A recent contribution to the marketing mix that uses
technical networks such as the Internet or mobile phone V
View Deinition network, to start an epidemic that spreads an idea or message
Maps the view schema into view domain (data sources) (the virus infection) through social networks. (Foth,
using a view deinition language. Typically an SQL-like 2005) 2: When individuals forward information online to
query language is used to map data from sources to views. each other so that it spreads exponentially like a virus or
(Cannataro et al., 2005) rumor. (Goldsmith, 2006)

View Domain Virtual


Deines the data sources on which views are built and 1: Being such in force and effect, though not actually or
contains the origins of data. (Cannataro et al., 2005) expressly such. (Rollier & Niederman, 2005) 2: Images
and text messages that only appear on a screen and are
View Maintenance experienced as real thanks to advanced technology.
When the base data of materialized views is updated, the (Srinivasan, 2006) 3: Simulated; performing the functions
values of the views need to be updated accordingly. This of something that is not really there. For example, virtual
process of keeping materialized views consistent with their classroom space refers to a simulated, electronic classroom
base data is knows as view maintenance. (Lu, 2005) space created on a Web site rather than a physical space
in a physical location. (Riffee & Sessums, 2005) 4: The
View Maintenance Cost three-dimensional and multimodal simulation or abstraction
The sum of the cost of propagating each source relation of a comprehensible situation that has some degree of
change to the materialized views. (Theodoratos & Simitsis, perceived interactivity. (Champion, 2006b) 5: Without
2005) physical place. (Ridings, 2006a) 6: Being or acting as what
is described, but not accepted as such in name or oficially.
View Monotonicity (Signoret, 2006)
A query Q is view monotonic on view V if for any cell X in
any database D such that V is the view for X for query Q, Virtual Business-to-Business Community
the condition Q is FALSE for X implies that Q is FALSE A network of business organizations that share a common
for all X`X. (Abdulghani, 2005b) interest of conducting business-to-business electronic
commerce over the Internet. (Turner, 2006)
View or Virtual Class
A class derived using a query expression. (Alhajj & Polat, Virtual Campus
2005) An institution-based interactive online learning environment
that may be supported either by dedicated computer
View Schema conferencing software or on the Internet. (Newell &
Describes how data are represented in the view both Debenham, 2005)
structurally and logically. (Cannataro et al., 2005)
Virtual Campus or Learning-Management
View Validation System
Deciding whether a set of views is appropriate for multiview Web-based, customizable e-learning environment that
learning. (Muslea, 2005) integrates a variety of educational tools with interfaces to
accommodate the technology competencies of the user and
Viewing Position his or her learning needs. (Boateng & Boateng, 2006a)
The point in three-dimensional space where the user is
positioned to view the data. There is also an associated Virtual Character
direction where the user is looking. (Cottingham, 2005) Synthetic representation of an entity (humans, animals,
plants) able to be animated. (Prteux & Preda, 2005)
Violation
An action that is in opposition to either the community Virtual Class/Virtual Lecture/Virtual Seminar/
normative state or a local policy. (Bertino et al., 2006) Virtual Tutorial
Classes, lectures, seminars, and tutorials are communication
systems that allow people in the relative roles of teachers and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
724 V ir t ua l Cla ssroom V ir t ua l Com m unit y

learners to interact in pursuit of an instructional objective participants work in their own computers but share data
and to access supporting materials such as books and and information by means of a users interface. (Xodo,
V blackboards. The use of linked computers makes it possible 2005)
for such interaction to take place without the physical
presence of teachers and learners, or any instructional Virtual College: See Virtual School.
materials or devices such as books and blackboards. The
Internet now provides a global infrastructure for this so Virtual Community
that the terms have become synonymous with holding 1: A group of people that for all practical purposes have
classes, lectures, seminars, and tutorials on the Internet. common interests and needs, and are connected to one
(Rajasingham & Tifin, 2005) another via an online means such as the Internet. (Kardaras
& Karakostas, 2006) 2: A term that describes the groups of
Virtual Classroom people with shared interests that communicate socially via
1: A classroom without physical space; a classroom deined computer networks. (De, 2006) 3: Group of people with
by its participants, content, and afiliation. (Reilly, 2005) similar (business) interests who interact, collaborate, and
2: A set of tools for communication support that allows communicate via the Internet. (Averweg, 2006) 4: Group
collaboration between participants in the educational of people, formed through the establishment of common
process (i.e., lecturers, tutors, learners) and gives them an skills and practice, who communicate in cyberspace without
impression of learning in a community. (Rugelj, 2005) 3: physical contact, and in differing spaces and time. (Huq,
An Internet-mediated forum for distribution of learning 2006) 5: Mediated social space in the online environment
materials, classroom discussion, and collaborative working. that allows collections of people to form and be sustained
(Grasso & Leng, 2005) 4: An online learning space where through ongoing communication processes. (Bagozzi
students and instructors interact. (Soh & Jiang, 2006) 5: A & Dholakia, 2005) 6: A broader concept than that of
Web-based environment that allows students to participate Internet-mediated communities, since it is applied to any
in live training events without the need to be physically in technology for information exchange. (Porto Bellini &
the same place. In a virtual classroom, one listens to lectures, Vargas, 2006) 7: A cyberspace supported by computer-based
participates in lab exercises, asks questions to teachers or information technology, centered upon the communication
students, and receives feedback just as you would do in a and interaction of participants to generate member-driven
conventional classroom. (Agosti, 2005) contents, resulting in relationships being built up. (Hassan et
al., 2006) 8: A featureless and, therefore, often misleading
Virtual Coffee Pot/Virtual Water Cooler term usually regarded as synonymous to online community.
Using electronic communication (such as e-mail or instant The term online community is preferable, as it denotes the
messaging) to conduct informal interactions (personal or character of the community more accurately. (Kindmller
non-work conversations) that would normally be discussed et al., 2005) 9: A social aggregation on the Internet when
around the ofice water cooler in a face-to-face work people interact long enough to form personal relationships.
environment. (Staples et al., 2005) (Suomi, 2006) 10: A social and technical construct that
exists to coordinate the group-based activity of a number
Virtual Collaboration: See Electronic Collaboration/ of individuals who share a common interest or sense of
Collaborative Commerce. purpose. Virtual communities are maintained in the online
world and supported by communication technology to
Virtual Collaborative Design support geographically separated groups. (Fleming, 2005c)
1: Refers to two or more designers working together 11: An online forum or discussion group through which
irrespective of time and place to deliver a common members may interact either in real time or asynchronously.
design product with the use of networked information Most virtual communities use discussion groups and
and communication technology tools. (Barima, 2006b) message boards that are accessible online to all members.
2: The process of combining ideas, expertise, and forces Members correspond by posting messages back and forth
by using computer-based technology, which supports within the forum. Membership in a virtual community
synchronous or asynchronous distributed collaboration indicates that the user shares one or more common interests
between the participants or stakeholders. (Aurum & with others in the same forum. (Baim, 2005) 12: Computer-
Demirbilek, 2006) mediated communication, particularly long term, taking
place among large groups, such that social relationships
Virtual Collaborative Environment are formed among the participants through repeated
Computing applications that include systems of groupware contact within a speciied boundary or place symbolically
in order to assist work groups with a common goal, where delineated by a topic of interest. (Shan et al., 2006b) 13: A
community of users that has the following characteristics:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Com m unit y K now le dge Ba se V ir t ua l Ent e rpris e 725

(1) it exists in cyberspace, and the communication between Virtual Community Sponsor
the members of the community is computer mediated; (2) it An individual or organization providing inancial, technical,
uses communication technologies, such as e-mail, message and/or ideological support to a virtual community in an V
boards, blogging, and online chatting, for communication; effort to keep it vibrant and active or to increase its ability to
(3) it develops largely through the activeness and interests address issues on behalf of its members. (Baim, 2006d)
of their participants. The content of virtual communities is
formed through the communication between the members Virtual Community Stage
of such communities; and (4) it leads its members to form Level of virtual communitys maturity or developmentthat
sustained relationships as a result of their interaction. is, nascent, formative, or mature. (Shan et al., 2006a)
(Hassan & Hietanen, 2006)
Virtual Design Team
Virtual Community Knowledge Base A stream of research focused on developing computational
The collective body of knowledge pulled together by methods and tools to enable the design of organizations in
members of a virtual community in an effort to provide a manner similar to how complex physical artifacts such
members with information on topics of primary interest to as airplanes, bridges, and computers are designed (i.e., via
the community. The knowledge base may exist primarily in computer models). (Nissen & Levitt, 2006)
the minds of the membership, or it be formally documented
and archived electronically for searching by individual Virtual Document
members as needed. (Baim, 2006a) A document (intellectual entity) that exists in the conscience
of individuals, but of which there is no physical copy
Virtual Community of Interest available. (Martnez-Gonzlez, 2005)
A group of individuals brought together around shared
values and purposes through an Internet-mediated Virtual E-Hospital (or Hospital Without Walls)
communication media, noting that the original purpose of A telemedical facility that provides continuous monitoring
individual virtual communities evolves and changes over of patients staying in their homes and enjoying family
time as relationships are built. The evolution of the virtual support, and creates a psychological satisfaction to the
community into an individual social network of informal, patients that they are receiving immediate attention and care
interpersonal ties is characterized by the development of as if they are in a real hospital. (Murthy & Krishnamurthy,
both intimate and weak ties that provide an important source 2005d)
of information, support, companionship, trust, and sense
of personal attachment or community over time. (Fryer Virtual Education
& Turner, 2006) 1: A distance education system that has the virtue to
improve the learning process exclusively using new
Virtual Community of Practice (VCoP) information and communication technologies. (Barrera,
1: Group of people that relies primarily on networked 2005) 2: Includes aspects of both online and e-learning,
communication media to communicate and connect in but goes somewhat further. While it is largely Web-centric,
order to: discuss problems and issues associated with their it does not necessarily limit itself to learners outside a
profession; share documents, solutions, or best practices; conventional classroom. It uses multimedia and, besides
collaborate on projects; plan for face-to-face meetings; delivering content, also enables a high level of interaction
or continue relationships and work beyond face-to-face among learners, content, teachers, peers, and administration
events (www.educause.edu/vcop). (Louis, 2006) 2: both synchronously and asynchronously. (Torres-Coronas,
Informal cluster of employees who work togethersharing 2005)
knowledge, solving common problems, and exchanging
insights, stories, and frustrationsand who do this working Virtual Enterprise
from a distance, rather than face-to-face. (Tremblay, 2006b) 1: A temporary alliance of existing enterprises or
3: Community of practice in which members interact organizations that share skills, competencies, and resources
supported by collaborative technologies in order to bridge in order to better respond to some common business
time and/or geographical distances. VCoPs are partly self- goals and whose cooperation is supported by computer
organized, deliberate groups of people who share common networks. (Rolland & Kaabi, 2006) 2: A temporary business
practices, interests, or aims on behalf of the organization organization set up between trading partners operating
they belong to, and who want to advance their knowledge. from geographically dispersed sites for the duration of
(von Wartburg et al., 2006) a common project. The design and manufacture of new

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
726 V ir t ua l Ent it y V ir t ua l Le a r ning

products or services frequently require the talents of Virtual Facility


many specialists. When many corporations combine their Conceptual representation of an actual commercial or
V specialties to create a product or service, the result can business site. (Raisinghani & Hohertz, 2005)
be called a virtual enterprise. A virtual enterprise must
be able to form quickly in response to new opportunities Virtual Group
and dissolve just as quickly when the need ceases. (Wong, A group of people who may never actually meet, but who
2005) 3: A temporary network of independent enterprises use ICT to enable them to interact and perhaps work together
or enterprise units, connected by new communication and in a virtual way. (Taylor et al., 2005)
information technology, to share technical competences,
costs, and risks accessing thus to new markets, answering Virtual Identity
to a speciic business opportunity. (Pires et al., 2006) 4: Representation of the individual in a virtual environment.
Set of economic actors, mainly enterprises, that combine The form of representation varies across virtual
their strengths to provide a speciic service traditionally environments and may range from a pseudonym only
provided by a single enterprise. (Protogeros, 2006) 5: (Internet relay chat), a pseudonym combined with a
Refers to an enterprise that consists of groups of people character description (multi-user dimensions), through to
working together on an undertaking, regardless of their graphical representations, or avatars, in graphics-based
physical location, across enterprises and countries, in real environments. An individual may have multiple virtual
time (synchronously) or deferred time (un-synchronously). identities. (Roberts et al., 2005)
(Tahinakis et al., 2006) 6: A virtual corporation or enterprise
is formed from a pool of competencies and capabilities Virtual Integration
resulting from a club of pre-qualiied partners that may be The amalgamation of the organizations respective
expanded or contracted through the mutual desires of the capacities, irrespective of time, effort, and distance barriers,
club. The management body for a virtual enterprise selects enabling the realization of a more competitive advantage.
partners, from the pool of competence available, to provide (Kamel, 2005b)
products or comprehensive services to any industry in direct
competition to single companies or other virtual enterprises.
Virtual Interaction
It is necessary to have strong collaborative relationships
Computer-mediated interaction between persons who do
between partners in the club. The virtual enterprise may
not occupy the same physical space. (Murphy, 2005c)
exist only on a temporary basis to take market chances, for
example tendering. It may also exist for a longer term for
optimization of a value network to service a market need.
Virtual Knowledge Space (Web Site)
A collection of Web pages that provides access to multiple
(Richards et al., 2005)
sources of knowledge. (Handzic & Lin, 2005)
Virtual Entity
An entity with a virtual life, generally supported by
Virtual Laboratory
1: An experiment is set up in the remote laboratory for
computational means and artifacts, with the ability to learn,
users to access through the Internet at any time and any
communicate, and interact with other entities (virtual or
place. Compared to a traditional laboratory, a virtual
real). It is characterized by properties like anthropopathy
laboratory is particularly useful when some experiments
and autonomy. (Analide et al., 2006)
involve equipment that may cause harmful effects to human
beings. Another meaning of virtual lab is to implement
Virtual Environment the laboratory by means of software simulation. (Chu,
1: A 3D computer-synthesized world in which a user
2005) 2: A computer-accessible laboratory that may be
can navigate, interact with objects, and perform tasks.
simulated by running a software package or that may
(Sadeghian et al., 2006) 2: A place that is rendered to provide
involve real remote experimentation. (Ko et al., 2005) 3:
the illusion of a 3D environment, which is replicated on
Used for virtual experimentation and can provide a problem-
the Internet. (Dara-Abrams, 2006)
solving environment to scientists. It can enable a group
of scientists to collaboratively work on problems under
Virtual Experience study and assist them throughout their experimentations.
A psychological and emotional state consumers undergo (Unal et al., 2006)
when interacting with visual products; an indirect experience
in which the product affordances do not originate from the
Virtual Learning
sensory and motor systems, but are provided by interactive
Simulated; especially simulated by electronic technology,
virtual images/simulations. (Scarpi & DallOlmo-Riley,
for example, a virtual paradise, meaning a computer
2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Le a r ning Com m unit y (V LC) V ir t ua l M e 727

simulation of Paradise, perhaps in a virtual reality or 3D the e-learning application that delivers the course to the
gaming space. (Schrum, 2005) learner. (ODea, 2005) 5: A set of teaching and learning
tools designed to enhance a students learning experience by V
Virtual Learning Community (VLC) including computers and the Internet in the learning process.
1: A learning community based not on actual geography, The principal components of a VLE package include
but on shared purpose. Through technology, learners can curriculum mapping, student tracking, online support for
be drawn together from almost anywhere, and they can both teacher and student, electronic communication, and
construct their own formal or informal groups. As such, a Internet links to outside curriculum resources. There are a
VLC is separated by space, but not time, as communication number of commercial VLE software packages available,
can be facilitated by technology in real time, partially including Blackboard, WebCT, Lotus LearningSpace, and
overcoming geographical inhibitions. (Blackmore et al., COSE. (Torres-Coronas, 2005) 6: Groupware system that
2006) 2: A community of people who come together has been developed to replace or supplement conventional
online to learn a particular subject matter. (Swan, 2005) classroom-based education. (Diamadis & Polyzos, 2005)
3: Traditionally, the concept of community refers to 7: System on the Internet whose functions enable learning
a group of people bound together with close ties and situations through information and communication
personal relationships, based typically on a kinship and technologies. (Beuschel et al., 2005)
on reciprocity. More recently, the concept has extended
to virtual environments; its members linked globally Virtual Learning Model
by information and communication technologies. In A model that, irrespective of time or distance barriers,
educational context, community practices take place in coupled with the differences in organizational structures
virtual learning environments, where learning processes and norms, can accommodate its logistics and procedures
and learning support are often blended in face-to-face to delivery knowledge in different parts of the world.
and technology-based learning environments. (Pys & (Kamel, 2005b)
Lowyck, 2005) 4: Variant of the above where individuals
come together, often in connection with a course of study or Virtual Library
academic activity, to study or investigate problems related 1: The aggregated digital learning resources and associated
to a theme or area of shared interest. (Fleming, 2005c) 5: librarian-assisted services that support the curricula and
An intentionally developed network of individuals who degree programs of online, virtual universities. (Garten,
share similar experiences, goals, and interests, and who 2005) 2: More than just a means of collocating electronic
congregate for purpose of learning. The primary mode of resources (full-text materials, databases, media, and
communication and interaction is electronic; the community catalogs), a virtual library also provides user assistance
may elect to use synchronous or asynchronous technologies services, such as reference, interlibrary loan, technical
to facilitate ongoing learning. (McCracken, 2005) assistance, and so forth. (Burke et al., 2005) 3: Services
and resources that are provided in a digital or electronic
Virtual Learning Environment (VLE) format and accessed via a computer either in a library or
1: A Web-based, designed learning environment where the remotely from another workstation. (Hanson, 2005)
information and social spaces are explicitly represented.
VLEs may vary from text-based to three-dimensional Virtual Machine
environments. Often, VLEs integrate various technological A software system that enables a collection of heterogeneous
tools and pedagogical approaches where physical and computers to be used as a coherent and lexible concurrent
virtual interaction overlaps. (Pys & Lowyck, 2005) 2: computational resource. (Yow & Moertiyoso, 2005)
Internal or external site, often organized around a tightly
focused topic, which contains technologies (ranging from Virtual Marketplace
chat rooms to groupware) that enable users to submit A simulation of the real marketplace where buyers and
and retrieve information. (Blackmore et al., 2006) 3: sellers meet to negotiate transactions. (Guan, 2006h)
Technology-mediated venue for learning; typically includes
asynchronous as well as synchronous facilities. (Coakes Virtual Me
& Willis, 2005) 4: Deals with the actual delivery of the A framework that uses Internet technologies to structure
learning material or content, including assessment, tutor- a personal portfolio and allows external users to add
to-learner communication, and tracking of student progress annotations. A sniplet is its basic unit, and digital assets
and activity, as well as linking to any student record or are structured as multimedia objects. (Verhaart & Kinshuk
management information system. A VLE may also, often, 2006)
include a content authoring facility. In essence, a VLE is

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
728 V ir t ua l M obilit y V ir t ua l Orga nizat ion

Virtual Mobility terms of distance, time, space, and interaction; typically


1: Movement of electronic data and information between used to refer to organizations that engage in the use of
V locations, which includes telephone calls, e-mails, Internet ICTs to bridge gaps in these four dimensions. (Raja et al.,
searches, and so forth. (Jain & Lyons, 2005) 2: The use 2006) 3: A contemporary organization form characterized
of the Internet to access activities without recourse to by a temporary collection of geographically dispersed
physical mobility by the person undertaking the activity. individuals, groups, or organizations that must trust each
(Kenyon, 2005) other and work together with the support of advanced
information communication technology in order to
Virtual Museum explore a business opportunity that could otherwise not
A collection of digitally recorded images, sound iles, be explored. (Wang & Gwebu, 2006) 4: A geographically
text documents, and other data of historical, scientiic, distributed organization whose members have a long-term
or cultural interest that are accessed through electronic common interest or goal bind, and who communicate and
media. A virtual museum does not house actual objects, coordinate their work through information technology.
and therefore lacks the permanence and unique qualities Virtual organization refers to a temporary or permanent
of a museum in the institutional deinition of the term. collection of geographically dispersed individuals, groups,
(Dez-Higuera & Daz-Pernas, 2005) organizational unitswhich do or do not belong to the
same organizationor entire organizations that depend
Virtual Nation on electronic linking in order to complete the production
Nation whose cohesiveness and boundaries are provided process. They are usually working by computer e-mail
by television, transnational pop culture, tourist attractions, and groupware, while appearing to others to be a single,
and Internet chat groups. (Srinivasan, 2006) uniied organization with a real physical location. (Mezgr,
2006c) 5: An organization in which business partners and
Virtual Network teams work together across geographical or organizational
A form of network that provides virtual circuits and that boundaries through the use of information technology. A
is established by using the facilities of a real network. The strategy for revolutionizing customer interaction, asset
term virtual network is used to refer to the appearance of a coniguration, and knowledge leverage. (Hassan et al., 2006)
single, seamless network system. (Rahman, 2006) 6: A combination of technology, expertise, and networks to
support an organization with little physical infrastructure,
relying on connections through computer systems rather
Virtual Networking
than shared presence in the same physical location. (Dara-
1: A form of information exchange that takes place on or is
Abrams, 2006) 7: A network form of organization that
initiated through the Web that simulates the real-world act
operates across space, time, and organizational boundaries
of building or maintaining a relationship. In terms of virtual
through an intricate Web of information technology.
business networking, it is a communications transaction
(Zhao, 2005) 8: A network of institutions that, using
initiated on the Web that builds or sustains a working
cutting-edge technology, unite to provide a value-added
relationship and produces results that are the same as if the
competitive advantage. (Kamel, 2005b) 9: An ICT-enabled
event had taken place in the real world. (Rahman, 2005f)
collaboration between legally independent subjects aimed
2: A process of using the virtual network to gain access to at the joint provision of goods or services, where each
speciic resources, and exchange of information for mutual
partner contributes to speciic activities. It does not aim
beneit relecting an initial level of trust and commitment
at achieving an autonomous legal status, but appears as
among participating organizations. (Rahman, 2006)
one organization toward third parties. (Cevenini, 2005)
10: An organization in which business partners and teams
Virtual Online Instructional Support System work together across geographical or organizational
(VOISS) boundaries through the use of information technology. It
The course management system for students and instructors. is also a strategy for revolutionizing customer interaction,
(Lateh & Raman, 2005) asset coniguration, and knowledge leveraging. (Hassan
& Hietanen, 2006) 11: An organization which relies upon
Virtual Organization electronic communication between its participants. In the
1: A commercial or nonproit enterprise that does not context of small and medium enterprises (SMEs): business
exist as a tangible entity at a single location, nor even structure based upon electronic communication between
at multiple sites, but comprises networked nodes and partners; often characterized by low departmentalization
individuals who are connected solely for the purpose of and intensive use of outsourcing. (Pease & Rowe,
pursuing that enterprise. (Cargill, 2006b) 2: The translation 2005) 12: Composed of multiple, distributed members
of the traditional organization to higher realms of work in temporarily linked together for competitive advantage

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Orga nizat ion Cont ra c t V ir t ua l Re a lit y M ode ling La ngua ge (V RM L) 729

that share common value chains and business processes computer modeling and simulation to enable a person
supported by distributed information technology. (Wei & to interact with an artiicial three-dimensional visual or
Wang, 2006) 13: An electronic transformation process for other sensory environment. VR applications immerse the V
any organization transitioning from a bricks-and-mortar user in a computer-generated environment that simulates
entity to its clicks-and-mortar counterpart, emphasizing reality through the use of interactive devices, which send
the appropriate use of information technologies in the and receive information and are worn as goggles, headsets,
three vectors of virtual encountering the organization, gloves, and so forth. (Dez-Higuera & Daz-Pernas, 2005)
virtual sourcing the tangible and intangible assets of 3: 3D digital world, simulating the real one, allowing a user
the organization, and virtual expertizing (managing) to interact with objects as if inside it. (Sappa et al., 2005)
the knowledge of the organization. (Vat, 2006b) 14: An 4: A term often used interchangeably to refer to technical
integrated approach to becoming an extended organization systems and their effects that simulate real and imagined
by focusing on customer assets, supplier alliances, and worlds, especially visually, by creating an apparently
employee empowerment through ICT-enabled knowledge immersive environment for the user(s). (Lepawsky & Park,
management. (Burn & Ash, 2006) 2006) 5: Computer-generated environment that simulates
three-dimensional reality. (Arya, 2005) 6: Immersive,
Virtual Organization Contract interactive, illustrative, and intuitive representation of the
A contract between the cooperating parties that establishes real world based on visualization and computer graphic.
the relationships and responsibilities among the virtual (Viktor & Paquet, 2005) 7: A modern technology that gives
organization members. (Unal et al., 2006) to its users the illusion of being immersed in a computer-
generated virtual world with the ability to interact with it.
Virtual Private Network (VPN) (Sala, 2005b) 8: Simulation of a real environment where
1: A virtual network constructed for users within a single users can have feelings of seeing, touch, hearing, and smell.
administrative unit (e.g., a company or university), (Terashima, 2005) 9: Uses computer-based technology
making use of public communication links. Encryption that creates the illusion of reality, and the user interacts
and bandwidth guarantees may be supported over a VPN. with that environment. The objective is to provide as
(DaSilva, 2005) 2: Method of communicating information realistic an environment for the user as possible. (Aurum
from one private secure network to another using the & Demirbilek, 2006)
Internet or telephone lines as a transport mechanism.
Tunneling protocols are used to authenticate users, provide Virtual Reality Education for Assisted Learning
error control, and encrypt and decrypt data. (Calzonetti & System (VREFALS)
deChambeau, 2006) 3: Software run on a client computer A virtual reality, computer-based training for people with
that allows it to connect to a remote network and appear as disabilities, including deaf persons. Also known as VREAL.
if connected locally. (Bagwell, 2005) 4: A private network (Rhoten, 2006b)
that provides access to various locations via a public network
carrier. (Butcher-Powell, 2005) Virtual Reality Markup Language (VRML)
1: Used to model three-dimensional worlds and data sets on
Virtual Professional Community the Internet. (M. Lang, 2005) 2: Oficially called ISOIEC
Community of professionals whose collaboration on 14772, this standard is the irst attempt to provide a uniied
activities required to realize shared goals is mostly or representation for 3D objects and 3D scenes. (Prteux &
completely computer enabled. (Signoret, 2006) Preda, 2005) 3: A platform-independent language for virtual
reality scene description. (Sappa et al., 2005) 4: An open
Virtual Public 3D description language, whose irst version became an
Symbolically delineated computer-mediated space whose international standard in 1995. Developed by the Web3D
existence is relatively transparent and open, allowing consortium, its goal is to allow shared virtual worlds and
groups of individuals to attend and contribute to a set of 3D media on the Web. (Di Giacomo et al., 2005)
computer-mediated interpersonal interactions. (Shan et
al., 2006b) Virtual Reality Modeling Language (VRML)
A programming language for the creation of virtual worlds.
Virtual Reality (VR) Using a VRML viewer, you can take a virtual tour of a 3D
1: A technology which provides an interactive interface model building, or manipulate animations of 3D objects.
between human and computer that involves using multiple Hyperlinks to other sites and iles can be embedded in the
senses, typically sound, vision, and touch in the computer- world you visit. (Dez-Higuera & Daz-Pernas, 2005)
generated environment. (OHagan, 2005) 2: The use of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
730 V ir t ua l Re a lit y Tool V ir t ua l Supply Cha in

Virtual Reality Tool only, or a networked university having multiple campuses


Computer tool which aids the imitations of the real worlds and offering Net-based learning facilities. (Haugen &
V scenarios, places, and so forth which a person could Ask, 2005) 10: Depending on a context, the term points to
experience or part-take. (Barima, 2006b) networked universities or open and distance education at
the universities. However, distance education is widely
Virtual Reference used to support face-to-face education, and many Web-based
Reference service which is initiated electronically, courses combine distance and on-campus learning. (Pys
often in real time; patrons employ computers or other & Lowyck, 2005) 11: A university that delivers courses
Internet technology to communicate with reference (typically for credit but also non-credit) primarily online,
staff, without being physically present. Communication that is, by networks such as the Internet or intranets, using
channels used frequently in virtual reference include chat, asynchronous technologies such as computer conferencing
videoconferencing, voice over Internet protocol (VoIP), or Web-based technologies especially conceived for
co-browsing, e-mail, and instant messaging. (Calzonetti education. (Sala, 2005a) 12: An online learning community
& deChambeau, 2006) or environment in which distance education takes place
through courses and instructional programs offered on the
Virtual School Advisory Board Internet and other technologically enhanced media. (Beck
A group of professionals drawn from the community in & Schornack, 2005)
the areas of business, government, and education tasked
with oversight and guidance responsibilities for the virtual Virtual Shopping Assistant
school. (G. Lang, 2005) Small mobile computer with a touch screen and bar-code
scanner that can be installed to a shopping trolley and
Virtual School can serve as a personal shopping advisor (e.g., offering a
1: The term virtual refers to the communication capabilities customized shopping list). (Kotzab, 2005)
of these institutions and implies that they can be achieved by
means of computers linked by telecommunications which, Virtual Space
in effect today means by the Internet. The term virtual is 1: Any space, physical or virtual, is an environment where
used to contrast the way communications in conventional many different interactions, usually focused on one or a
schools, colleges, and universities requires the physical small set of goals, occur. A virtual space is an application
presence of teachers and learners and instructional materials, that is reachable via a communication network and is
and invokes the use of transport systems and buildings. organized in a way that allows different people to connect
(Rajasingham & Tifin, 2005) 2: A distance learning and perform a deined set of activities such as discussions,
vehicle. (G. Lang, 2005) 3: A form of schooling that uses structured information storage and retrieval, or real-time
online computers for part or all of a students education. communication. (Agosti, 2005) 2: Space that is literally in
(Russell, 2005a) 4: School that offers entire degrees via a computers memory but that is designed to resemble or
Internet instruction. (Lazarus, 2005b) 5: All the learning mimic some more familiar conception of space (such as a
and administration activities are done through e-learning physical ile or a window or a street). (Murphy, 2005b)
and very minimum physical interactions, or no physical
interactions at all. (Fernando, 2005) 6: Institution that Virtual Speaker Bureau
exclusively offers distance courses and programs, often on a An organized listing of experts available as guest discussants
global scale. (C. Wright, 2005) 7: Post-secondary learning for online discussions. MERLOT.org has a virtual speaker
environment characterized by the delivery of courses and bureau. (Bedard-Voorhees, 2005)
degree programs completely via the Internet, without regard
to time constraints or location. The term encompasses a Virtual Store
broad range of entities and activities, including corporate Store (point-of-sale) on the World Wide Web. (Msiska,
training centers, individual institutional distance learning 2005)
initiatives, nonproit and governmental education activities,
and state-side and multi-state higher learning collaborations. Virtual Storefront
(Garten, 2005) 8: A loosely deined term, but usually A commercial enterprise using Internet and Web servers
refers to a large, coordinated, degree program offered by to sell products or services. (Efendioglu, 2006)
one institution or a consortium in which students can take
classes at any time and from any global location. (Rollier & Virtual Supply Chain
Niederman, 2005) 9: A university without one ixed campus; A supply chain with little or no ownership bond, but so
either an institution offering online/Net-based learning closely linked together and operations very well coordinated

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Te a ching V ir t ua l Te a m Le a de r 731

as though the various entities in the chain were all part of formally designated, and formally controlled group that
the same company. (Aigbedo, 2005) generally works together through text-based computer-
mediated means, for example, e-mail, listservs, and so forth. V
Virtual Teaching (Wasko & Teigland, 2006a) 12: A social system of three
Students in the virtual teaching environment are given or more people, whose members perceive themselves and
instructions by the lecturer on the requisite technology are perceived by others as team members, whose members
necessary to accomplish the virtual format of instruction. collaborate on a common temporary task, and whose
This technology includes instruction through accessing members rarely meet in person, but communicate mainly
Web pages, e-mail, the World Wide Web, and newsgroups. through telecommunication and information technologies.
To assure student competency, the virtual class may meet (Lettl et al., 2006) 13: Consists of members who are
sometimes to review the previous instructions, thereby scatted in different locations that are across geographical
maximizing the ability to carry out the class in the virtual boundaries, and who are working together mainly based
setting. (Chu & Lam, 2006) upon information technology. (Chuang et al., 2005) 14: A
team constructed of collaborative relationships supported
Virtual Team by information technology to overcome boundaries of
1: A team with members that are not co-located and so time, location, and organizational boundaries. (Morris et
use technology to communicate and conduct their work. al., 2005) 15: A work unit that is created for the purpose
(This term is predominantly used in the corporate literature of contributing some function, project, or other output
and means the same thing as computer-mediated team.) to an organizations mission, but which does not exist
(Graham & Misanchuk, 2005) 2: A given number of people in a particular location or place. Remotely located team
at distributed locations communicating and working to some members are obliged to interact with each other via codiied
degree via information and communication technologies and acknowledged authority structures, each contributing
on a set project or task, which may be of a limited or to the team output by means of electronic and/or telephonic
unlimited duration. Face-to-face meetings at the start-up linkages. These connect the team and enable the shared task
of the team or at regular intervals are possible in a virtual to be progressed. Virtual teams are often multi-location
team. (Pauleen, 2005) 3: A group of geographically and and international in nature. (Cargill, 2006b) 16: An
organizationally dispersed workers brought together across organizational unit that is unconstrained by geographical,
time and space through information and communication temporal, organizational, and/or national boundaries, and
technologies. (Long et al., 2005) 4: A group of individuals whose members rely upon electronic communication
who work on interdependent tasks, who share responsibility processes to work together both synchronously (e.g.,
for outcomes, and who work together from different videoconferencing) and asynchronously (e.g., electronic
locations (i.e., they are geographically dispersed, in terms mail) to accomplish their tasks. (Cuevas et al., 2005) 17:
of their normal work location). (Staples et al., 2005) 5: In addition to a common purpose as a team, these groups
A group of people and subteams who interact through are geographically dispersed with no or a moderate level
interdependent tasks guided by a common purpose and of physical proximity, who share a common virtual space
work across space, time, and organizational boundaries where they collaborate by means of ICT to fulill the goal
with links strengthened by information, communication, of the project. (Hustad & Munkvold, 2006) 18: Team of
and transport technologies. (Hassan et al., 2006) 6: A group people who work interdependently across space, time, and
of people brought together from different locations who organizational boundaries through the use of technology
do not meet face-to-face, but work as a team. (Elshaw, to facilitate communication and collaboration. (Hantula
2006b) 7: A group of people who are geographically & DeRosa, 2005) 19: Team that works without bounds of
separated and who work across boundaries of space and time or space, and often with the support of synchronous
time by utilizing computer-driven technologies such as and asynchronous technologies. Team members are often
desktop videoconferencing, collaborative software, and located in different geographic regions from the manager
Internet/intranet systems. How these teams interact deines as well as other team members. (Schaffer & Schmidt,
them as virtual. (Torres-Coronas & Gasc-Hernndez, 2006)
2005) 8: A group of people who are located in different
physical locations, who work together to achieve shared Virtual Team Leader
goals, supported by technology. (Dara-Abrams, 2006) 9: A The person who functions as the hub of the team, holding it
group of people working on the same project from different together. In the literature, this person may be termed a team
locations linked by computer networks. (OHagan, 2005) facilitator, (virtual) project manager, coordinator, or coach
10: A group of remotely situated individuals who rely depending on the nuances of the role, the perspective of the
primarily on electronic communication to work together researcher, and organizational terminology. The team leader
on group tasks. (Lam et al., 2006) 11: A relatively small, responsibilities may include all or some of the following:

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
732 V ir t ua l Te chnology-Ba se d U nive rsit y V ir t ue

selecting team members; setting team tasks and team Virtual Work
member roles; ensuring project or task completion; liaising 1: The combination of task-based, relational, and presence
V with stakeholders and clients; establishing communication practices conducted by workers who work from a remote
and team protocols, facilitating interpersonal and team location. (P.M. Leonardi, 2005) 2: Work environments
communication, handling conlict, managing technology, where individuals spend some time working in a non-face-
and in general ensuring effective participation of all the to-face (FTF) mode, using information and communication
team members. (Pauleen, 2005) technologies to perform work activities. (Blanger,
2005)
Virtual Technology-Based University
University that teaches students mainly through the new Virtual World
information and communication technologies. (Guri- The computer-based, digitally generated, and Internet-
Rosenblit, 2005a) connected network space of which principal features
include spatiality, temporality, interactivity, physicality,
Virtual Textbook and persistence. (Park & Lepawsky, 2006)
A collection of multimedia learning materials with some
additional functionalities, such as interactive computer- Virtual World Generator
supported examination and access to dynamically changing A system component that uses space elements and digital
information resources. (Rugelj, 2005) item representations to dynamically create a virtual
environment, which is sent to the user. (Lepouras &
Virtual University: See Virtual School. Vassilakis, 2006)

Virtual University Consortium Virtuality


A group of higher education institutions, usually sponsored 1: The speciic organizational structure between virtual
by the state, who have formed a strategic partnership to enterprise (VE) elements/partners and brokers, providing
jointly offer online programs. (Rollier & Niederman, the feature of virtuality as a further requirement for
2005) achievement of the highest VE dynamics. Virtuality makes
possible the transition from one agile/virtual enterprises
Virtual View physical structure (instance) to another in a way that the
A view that does not contain data is a virtual view. Generally enterprise or process owner is not affected by the system
views are virtual and data can only be found in the data reconiguration and is not aware of the reconigurationthe
sources. Queries against such views are evaluated using underlying service structure and reconiguration process
view deinition to retrieve results on demand from data are hidden. (Cunha & Putnik, 2005) 2: The degree to which
sources (view domain). (Cannataro et al., 2005) team members are geographically distributed such that
opportunities for meeting informally and/or face-to-face are
Virtual Web reduced. (Wong & Staples, 2005) 3: A socially constructed
A form of virtual organization that belongs to the typology reality, mediated by electronic media. (Baralou & Stepherd,
of dynamic networks and has the following properties: 2005) 4: The extent to which a group is geographically
(1) The member organizations of the network perform distributed, is organizationally and culturally diverse, has
separate functions that are performed by functional units different timeframes for work, communicates electronically,
in traditional organizations. (2) Brokers in a virtual Web and whose members are freelance or have ixed contracts
combine resources to build business units and subcontract with an organization. (Verburg et al., 2005)
to bring together the necessary functions available in the
organization. They play a leading role in building business Virtually Created Self-Identity
units and subcontracting for needed services. (3) Internal A created self that may be different in substantial ways
and external market mechanisms hold the network together from the real self due to being unconstrained by physical
and regulate its performance. (4) The information system is limitations. (Fryer & Turner, 2006)
open, and there is free access to the Webs joint knowledge
base. Companies belonging to the network have integrated Virtue
their information systems into the networks continuously An attribute or non-quantitative quality for data nodes.
updated information system via broadband access in return (Croasdell & Wang, 2006)
for a general payment structure for the value they add to
the network. (Hassan & Hietanen, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ue Chip V isua l At t e nt ion 733

Virtue Chip virus patterns into the software, to enable easy updating.
The hardware chip that contains the standard table for the (Luo & Warkentin, 2005)
virtue nets (virtue map). (Croasdell & Wang, 2006) V
Virus Signature
Virtue Link A unique string of bits, or the binary pattern, of a virus. The
The connection or bond between data nodes dictated by the virus signature is like a ingerprint in that it can be used to
types of virtues they possess. (Croasdell & Wang, 2006) detect and identify speciic viruses. Antivirus software uses
the virus signature to scan for the presence of malicious
Virtue Manager code. (Luo & Warkentin, 2005)
A module within the operating system that manages
the virtue net and learns the preferences of the user(s). Visibility
(Croasdell & Wang, 2006) 1: Points and quality of presence on where potential
customers can ind a Web site. (T.S. Chan, 2005) 2: The
Virtue Map perception of the actual visibility of the innovation itself as
A table used to store virtue-net pathways. Table values opposed to the visibility of outputs. (Green et al., 2005)
relect attributes in the table. It is dynamically updated in
programmable virtue chips. (Croasdell & Wang, 2006) Visibility of Location
In the ield of Web usability, visibility of location refers to
Virtue Net letting users know where they are in a Web site, as well as
A set of weighted pathways between data nodes based on the status of their inputs and navigation. Examples of ways
various attributes they have in common within a cognitive to increase visibility of location include providing a site
nodes control. (Croasdell & Wang, 2006) map, headers, and navigation paths. (Chalmers, 2006)

Virtue Path Vision


A set of virtue links grouped by their relationship to 1: A statement of values and beliefs that sets forth the
fundamental primary emotions. (Croasdell & Wang, organizations overriding beliefs. (Brabston, 2005) 2:
2006) Discernment or foresight to create a path toward excellence,
often used in regard to a future state of desired activity,
Virtue Plane production, or being for individuals, as well as for corporate
A virtual plane of existence for each virtue or attribute. entities. (Hanson et al., 2005)
(Croasdell & Wang, 2006)
Vision Surveillance
Virus Computer vision application area that involves scene
1: A malicious code added to an e-mail program or other monitoring and activity detection. (Aifanti et al., 2005)
downloadable ile that is loaded onto a computer without the
users knowledge and which runs often without the users Visual Aging
consent. Computer viruses can often copy themselves and Takes into account age-related changes in vision that have
spread themselves to a users e-mail address book or other consequences on daily activities. The consequences may
computers on a network. (Guah & Currie, 2005) 2: Program be related to using the Web. (Becker, 2005a)
that can infect other programs by modifying them; the
modiication includes a copy of the virus program, which Visual Attention
can then go on to infect other programs. (den Braber et al., 1: Attention is a neurobiological conception. It implies the
2005) 3: Malicious program that usually is transmitted by concentration of mental powers upon an object by close
means of various types of iles, including executable iles. or careful observing or listening, which is the ability or
Viruses can shut down a PC and an entire network, delete power to concentrate mentally. (Hua et al., 2006) 2: The
iles, and change iles. (Butcher-Powell, 2005) process by which we select the visual information most
relevant to our current behavior. In general, of all the visual
Virus Deinition File stimuli we receive, we only attend to a few; this determines
A ile that provides information to antivirus software to ind what we see. Visual attention controls the selection of
and repair viruses. The deinition iles tell the scanner what appropriate visual stimuli both by pruning irrelevant ones
to look for to spot viruses in infected iles. Most scanners and by guiding the seeking of relevant ones. Research in
use separate iles in this manner instead of encoding the visual attention aims at understanding the mechanisms by

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
734 V isua l Com plex it y V LCC

which human sensory and cognitive systems regulate what Visual Modeling Language
we see. (Thomas & Roda, 2006a) A diagrammatic modeling language. (Krogstie, 2005a)
V
Visual Complexity Visual Query Language
Graphical effects that evoke curiosity to see more. (Wishart, A language that allows the user to specify its goals in a two-
2005) (or more) dimensional way with visual expressionsspatial
arrangements of textual and graphical symbols. (Ferri &
Visual Data Browsing Rafanelli, 2005)
A term generally used to summarize all kinds of interactions
involved in visually skimming, browsing, and navigating Visual Reconstruction
visual data in order to quickly consume or identify the Computing for each corresponding point pair in the images
corresponding content or to localize speciic information. a point in space. (Ozer et al., 2005)
Visual data in this context can be a static document, such
as a text ile, graphics, or an image, as well as a continuous Visual Speech Recognition
data stream, such as the visual stream of a video recording. Computer vision techniques are used to extract information
(Hrst, 2006) about the lips shape. This information is compared with
information extracted from the speech acoustic signal to
Visual Data Mining determine the most probable speech recognition output.
1: Data-mining process through data visualization. The (Bourguet, 2006)
fundamental concept of visual data mining is the interaction
between data visual presentation, human graphics cognition, Visualization
and problem solving. (S. Wang & Wang, 2005) 2: The 1: Graphical display of data and models facilitating
integration of data visualization and data mining. Visual the understanding and interpretation of the information
data mining is closely related to computer graphics, contained in them. (Tzanis et al., 2005) 2: Graphically
multimedia systems, human-computer interfaces, pattern displayed data from simple scatter plots to complex
recognition, and high-performance computing. (Viktor & multi-dimensional representations to facilitate better
Paquet, 2005) 3: The use of computer-generated graphics understanding. (Zhu, 2005) 3: The graphical expression of
in both 2D and 3D for the use in knowledge discovery of data or information. (Viktor & Paquet, 2005) 4: To make
patterns in data. (Segall, 2005) something visible by means of some representation. A
visualization consists of two elements: a mental process
Visual Interface and a graphical language. Note that to visualize is
Visual on-screen elements that can be altered or that provide different from to see. (Pareja-Flores & Iturbide, 2005) 5:
information to the user during interaction with the game. Viewing data in picture form in an attempt to gain a further
(Ip & Jacobs, 2006) understanding of the trends and relationships it contains.
(Cottingham, 2005) 6: Visualization tools to graphically
Visual Language display data in order to facilitate better understanding of
Language characterized by a set of visual sentences, their meanings. Graphical capabilities range from simple
each composed of icons spatially arranged over a two- scatter plots to three-dimensional virtual reality systems.
dimensional space. (Polese et al., 2005) (Liu, 2005)

Visual Language Compiler Visualization of Text Data


A software tool capable of performing a two- dimensional A process of visual representation of text data, where
parsing of an input visual sentence, deciding whether different methods for visualizing data can be used to place
the sentence belongs to a given visual language. After the data usually in two or three dimensions and draw a
parsing, it translates successfully parsed visual sentences picture. (Mladeni, 2005)
into sentences of a target language, which can be visual
or textual. (Polese et al., 2005) VLC: See Virtual Learning Community.

Visual Metaphor VLCC


Graphic depiction of seemingly unrelated graphic shape Visual Language Compiler Compiler. (Polese et al.,
that is used to convey an abstract idea by relating it to a 2005)
concrete phenomenon. (Eppler & Burkhard, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V LE Vor t a l 735

VLE: See Virtual Learning Environment. 2005) 7: Standard for making telephone calls via an Internet
connection. It enables the lexible use of different input
VO Broker devices, including video telephone applications. (Blecker V
A subject who acts as an intermediary for the setting up of & Graf, 2006) 8: Web-based telephone service. (Bedard-
the virtual organization by identifying a possible business Voorhees, 2005) 9: Application sending telephone voice
opportunity, contacting the potential partners, and proposing calls over the Internet inexpensively, by transforming
agreement templates. (Cevenini, 2005) peoples voices into packet-based data. (Phala, 2005)

Vocabulary Spectral Analysis Voice Recognition


A technique using the vector space model and k-means 1: A technique foriication or identiication based on the
clustering to identify words that are highly inluential in users vocal features such as frequency, cadence, and
clustering document sets. (Thelwall, 2005) duration of voice pattern. (Li, 2006) 2: A technology that
enables computers to recognize the human voice, translate
Vocational Training it into program code, and act upon the voiced commands.
Short (in time) practical mode of instruction, aiming to (Lawson-Body, 2005)
provide the students with skills with regards to a speciic
domain. (Karoulis & Pombortsis, 2005b) Voice Synthesis
The process that allows the transformation of the text to
VoD: See Video On-Demand. sound. (Garca et al., 2006)

Voice Commerce VOIP: See Voice over Internet Protocol.


The initiating of business transactions through voice
commands. (Galanxhi-Janaqi & Nah, 2005) VOISS: See Virtual Online Instructional Support
System.
Voice Markup Language (VoxML)
Based on the W3C XML standard; designed to support Volatility
interactive dialogues. VoxML masks the technology behind The most important input to the BlackScholes model
the voice-to-voice communications by using XML data- (a.k.a. standard deviation of the underlying asset price
tagging structures to link the text-to-speech that generates returns). (Lajbcygier, 2005)
audio with the speech-recognition software that interprets
a users command. (Nayak, 2005d) Voluntariness
Degree to which use of an innovation is perceived as being
Voice over Internet Protocol (VoIP) of free will. (Green et al., 2005)
1: A protocol that enables people to use the Internet as
the transmission medium for telephone calls. (Burke et Voluntary Attention
al., 2005) 2: Any technology providing voice telephony The idea that a person can actively seek out information
services over IP, including CODECs, streaming protocols, or things to think about. (Owen, 2006b)
and session control. The major advantage of VoIP is
lower cost, by avoiding dedicated voice circuits. Voice Voluntary Organization
over Internet Protocol uses the computer terminal as the Anonproit-driven, non-statutory, autonomous organization,
phone with a handset attachment. (Hutchinson, 2005) 3: run by individuals who do not get paid for running the
A technology that allows the user to make telephone calls organization. (Bellarby & Orange, 2006)
using a broadband Internet connection as opposed to an
analog phone line. (Rhoten, 2006a) 4: The use of IP networks Volunteer
rather than circuit-switched ones for the transmission of A person who performs or offers to perform a service on
phone calls. (Wilsdon & Slay, 2005) 5: A system that behalf of an organization, cause, beneit, and so forth, out of
makes local and international telephony possible through his or her own free will, often without payment. (Bellarby
an Internet link. (Anderson, 2005) 6: Thhe practice of using & Orange, 2006)
an Internet connection to pass voice data using IP instead
of the standard public-switched telephone network. This Vortal
can avoid long-distance telephone charges, as the only A vertical portal. A vertical industry, or market, or speciic
connection is through the Internet. (Raisinghani & Ghanem, group portal on the Internet. (Dotsika, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
736 Vot e Ac c ura cy V ygot sk ia n

Vote Accuracy Vulnerability Assessment (VA)


Conformity of the output data of a vote-tallying system 1: The identiication and quantiication of vulnerabilities
V with logically correct and acceptably precise treatment of in a system that seeks network and information security
all input data provided to the system. (Gibson & Brown, measures. (Mitrakas, 2006) 2: An examination process
2006) of the ability of a system or application, including
current security procedures and controls, to withstand
Voting an intrusion. A vulnerability assessment may be used to
Classiication method based on the combination of several identify weaknesses that could be exploited and predict the
different classiiers obtained by different methods and effectiveness of additional security measures in protecting
different data. (Felici & Truemper, 2005) information resources from attack. (Cardoso & Freire,
2005)
Voucher
A highly controversial school inance model whereby Vygotskian
parents are given vouchers worth a certain amount of A general theory of cognitive development, developed by
money for schools that they can use in any private or Vygotsky (1979, 1989) in the 1920s and 1930s in Russia,
public school of their choice. Milwaukee, Wisconsin, is suggests that: (1) social interaction plays a fundamental
considered to be a major testing ground for the impact of role in the development of cognition, and (2) consciousness
voucher programs. (Glick, 2005b) is the end product of socialization, for example, that
cognitive development depends upon the zone (contextual)
VoxML: See Voice Markup Language. of proximal development. (Faiola, 2006)

VPN: See Virtual Private Network.

VR: See Virtual Reality.

VREFALS: See Virtual Reality Education for Assisted


Learning System.

VRML: See Virtual Reality Markup Language; Virtual


Reality Modeling Language.

VSAT: See Very Small Aperture Terminal.

VSM: See Vector Space Model.

VSP: See Vertical Service Provider.

VTS: See Vehicular Telematics System.

Vulnerability
1: This makes a system more prone to attack by a threat,
or makes an attack more likely to have some success or
impact. For example, for ire, a vulnerability would be the
presence of inlammable materials (e.g., paper). (Tong &
Wong, 2005a) 2: A systems weakness or error that might
allow to penetrate the security barriers. (Weippl, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
W-CDM A Wat e r m a rk 737

W
W-CDMA War Game
1: A w ideba nd spre a d- sp e ct r u m 3G mobi le Learning event that allows simulating the battleield in
telecommunication air interface that utilizes code division advance, either in order to test various scenarios or to train
multiple access (or CDMA, the general multiplexing decision makers at all levels. (Ariely, 2006b)
scheme). (Wong, 2006) 2: Wideband CDMA is a technology
for wideband digital radio communications of multimedia Wardriving
and other capacity-demanding applications. It is adopted Also termed WiLDingWireless Lan Driving, it is an
by ITU under the name IMT-2000 direct spread. (Akhtar, activity whereby individuals drive around an area detecting
2005) Wi-Fi wireless networks, which they then can access with
a laptop. (de Freitas & Levene, 2006a)
WAAS: See Wide Area Augmentation System.
Warranty
WAI: See Web Accessibility Initiative. A representation by a vendor regarding the quality of the
product. (Sprague, 2005)
WAN: See Wide Area Network.
Waste Exchange System
WAP: See Wireless Application Protocol. An e-commerce system for exchanging industrial residues
in the form of waste-related information exchange among
WAP Gap waste generators, waste recyclers, waste users, and possibly
A security weakness in WAP. It is caused by the inclusion landill managers, which can beneit the society by reducing
of the WAP gateway in a security session such that the total waste volume and facilitating waste reuse, recycle,
encrypted messages sent by end systems might temporarily and disposal. (Chen, Li, et al., 2006)
become clear text on the WAP gateway when messages
are processed. (Lee, Kou, et al., 2005) Waterfall Model
A modiied system development lifecycle which allows
WAP Stack some overlap and splashback between phases. (Steinbach
A set of protocols that covers the whole process of & Knight, 2005)
wireless content delivery, from the deinition of WML and
WMLScript for creating and layout of the actual content, Watermark
and the speciication of security measures in the WTLS The code hidden into a digital or analog object containing
to the lowest parts of the stack dealing with the actual an ID (identiication) code or other pieces of information.
transport of content. (Yow & Mittal, 2006) The watermark is used for identifying the ields of
embedded data (serial numbers, logos, etc.) that tell us
WAPS who is the owner of the object or supply an ID in order
A reusable W2000 interpreter to prototype Web to identify data connected with the digital object. (Nesi
applications. (Paiano, 2005) & Spinu, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
738 Wat e r m a rk Em be dding We a ra ble Com put ing

Watermark Embedding the small detail as noise), or such that the small luctuations
A technique to hide the watermark in the original are emphasized (with the larger scale luctuations as
W unwatermarked image, that is, host image. (Sattar & Yu, background). (George, 2005b)
2006)
Wavelet Transform
Watermark Extraction A method to transform data so that it can be represented
A process to retrieve/recover the hidden watermark from compactly. (Thomasian, 2005b)
the received watermarked image. (Sattar & Yu, 2006)
Wayinding
Watermark Reading The cognitive element of navigation dealing with
Process of extracting the watermarked code into the developing and using a cognitive map. (Sadeghian et al.,
watermarked object. (Nesi & Spinu, 2005) 2006)

Watermarking WBE: See Web-Based Education.


1: A technique for media authentication and forgery
prevention. A watermarked media M can be mathematically WBL: See
represented as M=M + W where M is the original media
content and W is the embedded watermark. It is common WBMS: See Web-Based Mentoring System.
that the extracted watermark W could be different from
the original watermark W because of the intentional or WBT: See Web-Based Training.
unintentional attacks or post processing. To detect the
watermark, a watermark detector is used to evaluate the WCAG 1.0: See Web Content Accessibility Guidelines.
similarity between W and W. (Kwok, 2005) 2: Process of
inserting a hidden code or message into a digital or analog WCDMA-FDD: See Wideband Code-Division Multiple
object. As opposed to steganography, it has the additional Access, Frequency-Division Duplex.
notion of robustness against attacks. As the name suggests,
the additional data (the watermark) is added in order to WCET: See Western Cooperative for Educational
protect the digital document from copyright infringements. Telecommunications.
Even if the existence of the hidden information is known,
it has to be hard for an attacker to destroy the embedded WDM: See Wavelength Division Multiplexing.
watermark without destroying the data itself. (Nesi &
Spinu, 2005) We Intention
Decision of a person to participate in joint action and
Wavelength Division Multiplexing (WDM) which involves an implicit or explicit agreement between
Allows many independent signals to be transmitted the participants to engage in the joint action. (Bagozzi &
simultaneously on one iber, with each signal located at a Dholakia, 2005)
different wavelength. Routing and detection of these signals
require devices that are wavelength selective, allowing We Relations
for the transmission, recovery, or routing of speciic Relations where we experience others directly, we and
wavelengths in photonic networks. (Akhtar, 2005) they share a common sector of time and space, and thus
we and they age together. (Shariq & Vendel, 2006)
Wavelet
1: Mathematical transformations implementing hierarchical Wear-Down Effect
decomposition of functions leading to the representation of A reduction in the participants favorable responses after
functions through sets of wavelet coeficients. (Buccafurri repeated exposure to a message. (Xu et al., 2006c)
& Lax, 2005) 2: A relatively recent mathematical approach
extending some of the principles of Fourier analysis for Wearable Computing
the study of periodic signals, decomposing a signal into its Technology that moves with a user and is able to track the
component parts. Wavelets permit the signal to be viewed users motions both in time and space, providing real-time
so that the large-scale luctuations are emphasized (with information that can extend the users knowledge and

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We a ra ble Com put ing Devic e We b Confe re nc ing 739

perception of the environment. (Oulasvirta & Salovaara, metrics (e-metrics) to determine the effectiveness of the
2006) site content and organization, and to understand the online
purchasing decisions of customers. (Mobasher, 2005c)
W
Wearable Computing Device
Device that is attached to the human body so that the hands Web Application
are free to complete other tasks. (Ally, 2005c) An application that presents the characteristics and the
issues of both hypermedia applications and traditional
Wearable Device applications. In other words, this kind of application has
May include a microprocessor worn as a wristwatch or as the navigational issues of Web sites joint to the traditional
part of clothing. (de Freitas & Levene, 2006b) operation issues. (Paiano, 2005)

Wearable Sensor Web Bug


Can be worn and detected by local computing systems. A single-pixel, transparent (or sometimes even visible)
(de Freitas & Levene, 2006b) GIF image that can surreptitiously pass along information
about a site user to second party. (Friedman, 2005)
Web Access Log
A text ile into which a Web server saves information Web Cache
about every request that it handles. (Manolopoulos et Stores Web content locally to improve network eficiency.
al., 2005) (Littman, 2005)

Web Accessibility Web Cast


1: Presentation of Web-based content in a way that allows Communication between one or many persons through
disabled users to maximally and equally beneit from the electronic media. A communication made on the World
site content. It can be achieved by using some assistive Wide Web. (Nandavadekar, 2005)
technologies (cfr.). (Costagliola, Di Martino, Ferrucci, et al.,
2006) 2: Means that any person, regardless of disabilities, Web Client
is able to use Web technology without encountering any A software program (browser) that is used to contact and
barriers. (Becker, 2005a) obtain data from a server software program on another
computer (the server). (Nasraoui, 2005)
Web Accessibility Initiative (WAI)
1: Web Consortium activity with guidelines to facilitate Web Collaboration
accessibility of Web content to persons with disabilities. A particular use of a virtual space where people can connect
(Isaak, 2006) 2: Established by W3C and the Yuri together in a certain number and perform synchronous
Rubinsky Insight Foundation in 1997, the WAI works activities such as communication (text, audio, and video),
with organizations around the world to promote Web polling/surveying, and share or work together on any
accessibility in ive key areas: technology, guidelines, tools, kind of digital content displayed on a common interface.
education and outreach, and research and development. (Agosti, 2005)
(Yu, 2005a) 3: An initiative of the W3C promoting the use
of Web techniques to provide equal access to information, Web Community
regardless of ability. (Fagan, 2005) Can be described as a collection of Web pages, such that
each member node has more hyperlinks (in either direction)
Web Advertising within the community than outside of the community.
Advertising through banners, sponsorships, interstitials, (Mobasher, 2005a)
hyperlinks, and pop-up and pop-under windows in the
Internet media. (Gao et al., 2006) Web Conferencing
1: A communication conducted via the WWW between
Web Analytics two or more parties/persons in different geographical
The study of the impact of a site on the users and their locations. It is in the form of synchronous real time or
behaviors. In e-commerce, Web analytics involves the in an asynchronous environment (at your convenience).
computation of a variety of site- and customer-oriented (Nandavadekar, 2005) 2: A relatively new technology that

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
740 We b Cont e nt Ac c e ssibilit y Guide line s (WCAG 1 .0 ) We b I m pa c t Fa c t or

uses the telephone or voice over IP, a workstation, and a Web Electronic Data Interchange
Web browser. It provides the capability to individuals in The electronic data interchange made through Internet
W multiple locations to have online meetings and training Web pages. (de Medeiros et al., 2006)
sessions using features such as whiteboarding, screen
sharing, and polling. (Panton, 2005) 3: Communication Web Enabled
that allows audio participation with simultaneous visual Business systems that are supported by Internet
presentation through a Web browser. (C. Wright, 2005) technologies. (Braun, 2006)

Web Content Accessibility Guidelines Web Enabling


(WCAG 1.0) A modiication process whereby information formerly
1: The oficial set of guidelines published by the W3C to requiring a locally constrained interface for access becomes
assist Web content developers in the creation of accessible available to commodity Web viewersproducts such as
Web sites. The guidelines established three priority levels Microsoft Internet Explorer, Netscape Navigator, or
with 64 checkpoints for Web developers to meet. (Yu, Mozilla-compliant browsers. (Horiuchi, 2005a)
2005a) 2: Guidelines for accessible Web design developed
by the World Wide Web Consortiums Web Accessibility Web Excellence in Mental Skills Education
Initiative. WCAG 1.0 was passed in 1999. A working draft A framework designed to aid practitioners in the
of a revised set of guidelines, WCAG 2.0, is currently development of online mental training environments that
under review. (Schmetzke, 2005) facilitate the development of mental skills that enhance
performance and maximize enjoyment in sport and life.
Web Content Management (Stodel et al., 2005)
Management of content intended primarily for Web
delivery. Grain size of the content unit is typically smaller Web GIS
(e.g., a page or a paragraph) than that of documents. A GIS system empowered with a Web-based interface.
(Honkaranta & Tyrvinen, 2005) (De Antonellis et al., 2005)

Web Content Mining Web Graph Mining


1: Data mining the Web primarily through the contents The mining techniques used to discover knowledge from
of Web pages and ignoring interlinking between pages. the Web graph. (Wen, 2005b)
(Thelwall, 2005) 2: The discovery or retrieval of useful
information from the content of the Web. (Lee-Post & Jin, Web Image Search Engine
2005a) 3: The process of extracting useful information from A kind of search engine that starts from several initially
the contents of Web documents. Content data corresponds given URLs (uniform resource locators) and extends from
to the collection of facts that a Web page was designed to complex hyperlinks to collect images on the WWW (World
convey to users. It may consist of unstructured or semi- Wide Web). A Web image search engine is also known as
structured text, images, audio, video, or structured records, a Web image crawler. (Y.J. Zhang, 2005a)
such as lists and tables. (Mobasher, 2005a)
Web Impact
Web Crawler A description that is sometimes applied to measures based
A program that browses the World Wide Web in a upon link counts. A Web site with a high Web impact is
methodical, automated manner. (Sterling, 2006) one that has many links to it. (Thelwall, 2006)

Web Data-Mining Course Web Impact Factor


Data collection, data extraction, and knowledge discovery Similar to the impact factor calculated in bibliometrics,
for e-business intelligence. Web usage mining, Web content it is a measure of the inluence of a site across the entire
mining, and Web structure mining. Site management. Web, calculated according to the number of sitations in
Personalization. User proiles. Privacy issues. Collaborative other sites. (Maggioni & Uberti, 2005)
and content-based iltering. (Knight & Chan, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We b I nfor m at ion Ex t ra c t ion We b Pe rsona lizat ion 741

Web Information Extraction field that supports knowledge workers who try to
The class of mining methods to pull out information from a extract information in our data rich, information poor
collection of Web pages and converting it to a homogeneous environment. Its name stems from the idea of mining
W
form that is more readily digested and analyzed for both knowledge from large amounts of data. Any method used
humans and machines. (Wen, 2005b) to extract patterns from a given data source is considered to
be a data-mining technique. When the data resides on the
Web Information System Web, the process is that of Web mining. (Hamdi, 2005b)
An information system that is accessed through the 3: The application of data-mining techniques to extract
Internet and usually tightly integrated with databases and knowledge from the content, structure, and usage of Web
transaction-processing systems. (Steinbach & Knight, resources. It is generally subdivided into three independent
2005) but related areas: Web usage mining, Web content
mining, and Web structure mining. (Mobasher, 2005a)
Web Initiative 4: The use of data-mining techniques for discovering and
Any use of the World Wide Web for a speciic purpose. extracting information from Web documents and services.
(Craig, 2005) It is distinguished as Web content, structure, or usage
mining depending on which part of the Web is mined.
Web Link Web usage mining examines usage data typically in the
Hyperlink (hot link) to another Web site that is embedded form of server logs. (Markellou et al., 2006) 5: The use
in the active pages of a Web-based education course. of data-mining techniques to automatically discover and
(Marold, 2005) extract information from Web documents and services.
(Lee-Post & Jin, 2005a) 6: Using data-mining techniques
Web Log to automatically discover and extract information from
1: An online diary, typically authored by an individual, Web data and services. (Zhao & Bhowmick, 2005) 7: The
where unstructured comments are made and annotations integration of information gathered by traditional data-
can be attached. (Verhaart & Kinshuk 2006) 2: A ile in mining methodologies and techniques with information
which a Web server records requests for pages. (Artz, gathered over the World Wide Web. Web mining is used
2005d) 3: File stored by the Web server containing data to capture customer behavior, evaluate the effectiveness
on users accesses to a Web site. (Meo & Psaila, 2005) 4: of a particular Web site, and help quantify the success of
A Web log ile records activity information when a Web a marketing campaign. (Lee, Suh, et al., 2005)
user submits a request to a Web server. A log ile can
be located in three different places: (1) Web servers, (2) Web Pad (or Handheld PC)
Web proxy servers, and (3) client browsers. (Hu, Yang, Device connected via wireless technology to an intranet
Lee, & Yeh, 2005) 5: Generally used as a frequent and (WLAN, Bluetooth, GPRS/UMTS) and offering a full-
chronological publication of personal thoughts, ideas, and featured operating system with a Web browser. (Blecker
Web links. To facilitate the process of learning, relaying & Graf, 2006)
information to students, and enhancing communications
between students and faculty, teachers are increasingly Web Page
using Web logs. (Brown, 2006) 1: A ile that is on the Web and is accessible by its URL.
(Scime, 2005b) 2: A hypermedia document that expresses
Web Marketing the knowledge content in an artistic and dynamic fashion,
The dissemination of information, promotion of products combining text, graphics, audio, and video formats.
and services, execution of sales transactions, and (Handzic & Lin, 2005) 3: The basic unit of information
enhancement of customer support via a companys Web visualized on the Web. (Caramia & Felici, 2005)
site. (Gao, 2005b)
Web Personalization
Web Mining 1: A personalized Web view or site. From a users
1: Concerned with the mechanism for discovering the perspective, a personalized Web view is the one that is
correlations among the references to various iles that are customized to the users preferences. From the server
available on the server by a given client visit to the server. perspective, a personalized Web site provides services
(Y.-J. Zhang, 2005b) 2: Data mining is a multidisciplinary tailored to its users. (Fu, 2005) 2: Customizing Web

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
742 We b Por t a l We b Se r ve r

content, in real time, to a speciic user. (Craig, 2005) 3: Web Proile


The process of customizing the content and structure of Short biography of a student enrolled in a Web-based
W a Web site to the individual needs of speciic users, based education course. The proile may contain Web links to
on the analysis of the users navigation data, Web content, the students own homepages and digitized photos of the
structure, and user proile data. (Lee-Post & Jin, 2005b) 4: student. (Marold, 2005)
The process of dynamically serving customized content
(e.g., pages, products, recommendations, etc.) to Web Web Proxy Server
users, based on their proiles, preferences, or expected A proxy server takes the HTTP requests from users and
interests. (Mobasher, 2005c) passes them to a Web server; the proxy server then returns
to users the results passed to them by the Web server. (Hu,
Web Portal Yang, Lee, & Yeh, 2005)
1: Provides Internet access to a broad array of Web pages
and linked services. (Inoue & Bell, 2005) 2: A primary Web Quest
starting site for users when they get connected to the Web. An educational Web page with hyperlinks used by students
Most portals offer users the ability to create a site that is to explore a topic. (Morphew, 2005)
personalized for their individual interests. (Chapman,
2005a) 3: A secure, single point of interaction with diverse Web Repository
information, processes, and people, personalized to a A Web site that contains a wide collection of items. It can
users needs and responsibilities. A campus Web portal be unstructured, semi-structured, or structured. (Pareja-
acts as a gateway to information and services, serves as Flores & Iturbide, 2005)
a point of access for constituent groups, and represents
a community/learning hub. (Wild, 2005) 4: A special Web Resource
Web site designed to act as a gateway to give access to A resource accessible through the HTTP protocol from a
other sites. (Tatnall & Burgess, 2006) 5: A Web site that Web server. Web resources (or Web objects) may be static,
serves as a gateway to distributed network resources, such as images or existing HTML pages, or they may be
applications, and other Web sites. (Littman, 2006) 6: dynamic, such as database-driven Web applications or Web
Commonly referred to as simply a portal. Web portal is a services. Each Web resource is identiied uniquely by a
Web site or service that offers a broad array of resources uniform resource identiier (URI). (Mobasher, 2005b)
and services, such as e-mail, forums, search engines,
and online shopping malls. The irst Web portals were Web Search Engine
online services, such as AOL, that provided access to the A Web site that inds other Web sites whose contents match
Web, but now most of the traditional search engines have a set of keywords, using a large index to Web pages. (N.C.
transformed themselves into Web portals to attract and Rowe, 2005b)
keep a larger audience. (Sharma, Wickramasinghe, et al.,
2005) 7: One of a number of focal points on the Web which Web Server
provide a place to start. Web portals facilitate the location 1: A computer program running on a machine permanently
of information by incorporating the strengths of search connected to the Internet, dedicated to serving requested
engines and additionally provide more eficient access to Web pages to the users browser (client). (Manolopoulos et
information by categorizing it into easily recognizable al., 2005) 2: A computer running special server software
subcategories or channels. (Thompson, 2005) (e.g., Apache), assigned an IP address, and connected to the
Internet so that it can provide documents via the World Wide
Web Process Web. (Nasraoui, 2005) 3: A computer used for publishing
Describes the logic to control and coordinate Web services the contents of a Web site. It is usually dedicated for this
participating in a process low to carry out a speciic goal. service and, depending on the prospective visitors, it can
It directly addresses business process challenges such be an ordinary PC or a very powerful computer. (Kirlidog,
as control low, data low between Web services, long- 2005) 4: A network computer that delivers Web pages
running nested units of work, faults, and compensation. to other computers running a client browser program.
(Cardoso, 2006) (Murphy, 2005b) 5: A computer that is addressable by a

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Web Server Log Web Service Deinition Language (WSDL) 743

URL and that houses objects. Objects include Web pages messages transferred over the Internet. Web services allow
(HTML iles), JPEG images, and other applications or for the loose integration of service components, and have
programs. (Dasgupta & Chandrashekaran, 2005) the distinct advantage of employing widely available and
W
standardized Web technologies. (Tsekouras & Roussos,
Web Server Log 2006) 8: Integration of Web-based applications using
Each time a user looks at a page on a Web site, a request common standards over an Internet protocol backbone.
is sent from the users client computer to the server. These (Hazari, 2006) 9: A modular business service, with each
requests are for iles (HTML pages, graphic elements, module fully implemented in software and delivered
or scripts). The log ile is a record of these requests. over the Internet. The modules can be combined, can
(Nasraoui, 2005) come from any source, and can eventually be acquired
dynamically and without human intervention when
Web Service needed. (Protogeros, 2006) 10: Modular Internet-based
1: A software application identiied by a URI whose business function that performs speciic business tasks
interfaces and bindings are capable of being deined, to facilitate business interactions within and beyond the
described, and discovered using XML, and that supports organization. (Ratnasingam, 2006) 11: Self-contained,
direct interactions with other software applications self-describing, modular application that has an open,
using XML-based messages via an Internet protocol. Internet-oriented, standards-based interface and can be
Web services provide a standard way of integrating published, located, and invoked across the Web. (Nichols
Web-based applications using XML, SOAP, WSDL, and & Chen, 2006) 12: Software component that is a self-
UDDI over the Internet. (Moser & Melliar-Smith, 2006) containing, self-describing, modular application that can
2: A software system designed to support interoperable be published to, located on, and invoked across the Web.
machine-to-machine interaction over a network. It has Allows applications to interoperate in a loosely coupled
an interface described in a machine-readable format environment, discovering and connecting dynamically to
(speciically, WSDL). Other systems interact with the Web services without any previous agreements having been
service in a manner prescribed by its description using established between them. (Rolland & Kaabi, 2006)
SOAP messages, typically conveyed using HTTP with an
XML serialization in conjunction with other Web-related Web Service Deinition Language (WSDL)
standards. (Nicolle et al., 2005) 3: Describes a standardized 1: An XML-based language that is used to provide
way of integrating Web-based applications using open information about a Web service to requesting applications.
standards. A Web service is deined as a remotely callable This information includes a description of the Web service,
function or procedure which communicates via the a location of the Web service, binding information, a method
HTTP (HyperText Transfer Protocol) using standardized for accessing the Web service, and a way to exchange
protocols. (Cardoso, 2006) 4: Data provided over the data by using the Web service. (Sethi & Sethi, 2006a)
Internet, usually in a WSDL (Web service description 2: Describes services offered by businesses, providing
language), meant as communication between computer mechanisms for accessing these services. WSDL is used
software. (Barone, 2005) 5: An accessible application that by UDDI. (Hawk & Zheng, 2006) 3: Provides a model and
other applications and humans can discover and trigger. The an XML format for describing Web services. It enables
following properties deine a Web service: (1) independent one to separate the description of the abstract functionality
as much as possible from speciic platforms and computing offered by a service from concrete details of the service
paradigms; (2) developed mainly for inter-organizational description such as how and where that functionality is
situations rather than for intra-organizational situations; offered. (Jain & Ramesh, 2006) 4: An XML-formatted
and (3) easily composable so that its composition with language used to describe a Web services capabilities
other Web services does not require developing complex as collections of communication endpoints capable of
adapters. (Maamar, 2005) 6: A modular self-describing exchanging messages. WSDL is an integral part of UDDI,
software service universally accessible in a standardized an XML-based worldwide business registry. WSDL is the
and platform-independent way. (De Lucia et al., 2006) 7: A language that UDDI uses. WSDL was developed jointly
software system identiied by its location on the World Wide by Microsoft and IBM. (Lalopoulos et al., 2005b) 5:
Web, whose interface and supported modes of interaction Deines Web services for distributed systems to support
are described using XML. Interaction between systems the automatic creation of client-side stubs or proxies, and
using the Web service also is also carried out using XML the binding to the Web services. It describes the interfaces

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
744 We b Se r vic e s Com posit ion We b St ruc t ure (d) M ining

to a Web services implementation in terms of format of the Web Site


messages, binding of the abstract messages to a concrete 1: A collection of Web pages located together on a Web
W protocol, and address of the endpoint. (Nichols & Chen, server. Typically the pages of a Web site have a common
2006) 6: Written in XML, and used to describe and locate focus and are connected by hyperlinks. (Scime, 2005b) 2:
Web services. (Cardoso, 2006) A set of iles stored on the World Wide Web and viewed
with a browser such as Internet Explorer or Netscape
Web Services Composition Navigator. A Web site may consist of one or more Web
Web services provided by various organizations are pages. (Snchez-Segura et al., 2005) 3: The location of a
interconnected so that they interact with each other in hyper-linked document. (Msiska, 2005)
a way to realize some important business functionality.
(Jain & Ramesh, 2006) Web Site Marketing
Conducting activities associated with buying and selling
Web Services Description Language (WSDL) products or services using a group of Web pages that
1: A standard language that is used to describe Web services collectively represent a company, in this case, a destination,
and service interfaces as XML documents, including on the World Wide Web. (Hornby, 2005)
the operations offered by a service, the mechanisms that
can be used to access the service, and the location of the Web Site Multilinguality
service. (Moser & Melliar-Smith, 2006) 2: An XML format Presence of Web sites in more than two languages on the
service description that describes the interface deinition Internet. (He, 2006)
of the Web service, details related to binding, and the
network location of the Web service. (Zhang, 2006) 3: Web Site Personalization
An XML-based language for describing Web services Web sites that are personalized to each user, knowing the
and their interfaces. (Chan & Kellen, 2006) 4: Provides user interests and needs. (Lorenzi & Ricci, 2005)
documentation for distributed systems and has as its goal
to enable applications to communicate with each other Web Site Translation
automatically. (Kasi & Young, 2006) 5: The little blurb Process of transforming content of a Web site from one
associated with each entry in the Universal Description, language into another language. (He, 2006)
Discovery, and Integration that describes what kind of
work a Web service can do. (Hwang, 2005) Web Site User
Member of an IMC who is granted permission for accessing
Web Services Integration Technology and using the communitys Web site. All members should
Technology that connects the portal to enterprise systems, be granted access and use rights, but it is up to each
repositories, and resourcees, with equal support for both community to deine service range and level according to
.NET and Java integration. (Wojtkowski, 2006) membership proiles. (Porto Bellini & Vargas, 2006)

Web Services Management Platform (WSMP) Web Spooing


Software for managing and monitoring the quality of Registering and using a domain name that is deceptively
service in a Web services environment. It manages similar to a trademark or organization name. This could
faults, capacity, availability, performance, service-level be through transposing words or inverting a phrase.
agreements, and service levels of Web services. (Chan (Owen, 2006d)
& Kellen, 2006)
Web Structure(d) Mining
Web Services Network (WSN) 1: Data mining the Web primarily through its link
An intermediary brokering service that supports electronic structure. (Thelwall, 2005) 2: The class of methods used
collaborations between applications based on Web services to automatically discover structured data and information
standards (WSDL, SOAP, and UDDI). (Chan & Kellen, from the Web. (Wen, 2005b) 3: The process of discovering
2006) structure information from the Web. This type of mining

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We b St ude nt We b-Ba se d Cust om izat ion 745

can be divided further into two kinds, based on the kind Web Visibility
of structural data used: hyperlinks connecting Web pages The popularity of a Web site among online shoppers.
and the document structure in semi-structured Web pages. (Wan, 2006)
W
(Mobasher, 2005a) 4: The discovery of useful information
from the underlying hyperlink structures of the Web. Web-Assisted Instruction
(Lee-Post & Jin, 2005a) A course that uses the Internet to provide a signiicant
amount of course content on the Web to learners outside
Web Student of class time. Materials may be supplemental in nature or
A student that plans to take the majority, if not all, of his provide content in an alternative form that may be viewed
or her classes in a particular program of study over the at the learners convenience. Learners interact with other
Internet. (Benrud, 2005) learners outside of class through e-mail, message boards,
or chat. (Kinuthia, 2005)
Web Technology
1: Refers to the combination of the Internet communication Web-Based Class
protocols (TCP/IP), networks, Web server (e.g., IIS), and Class offered via the World Wide Web. (Witta, 2005)
client (e.g., Opera) software, and the languages that can
be used to develop Web applications. (R. Zhang, 2005) Web-Based Classroom
2: The set of all instruments that allows people to use the The application of a selection of intellectually stimulating
Web and its protocols for improving communication and lessons implemented within a creative and collaborative
acquiring information. These are based on hardware, which learning environment that utilizes the resources of the
are mostly networks of computers, and software resources, World Wide Web. (Neville & Powell, 2005)
which are mostly Web servers using the HTTP protocol
for communicating, interfaced with relational data base Web-Based Control
management systems. (Cartelli, 2005a) The control of instruments or apparatuses through the
Internet. (Ko et al., 2005)
Web Television/TV
Movies, interviews, or shows transmitted via the Internet. Web-Based Course
(de Medeiros et al., 2006) 1: A course that is delivered entirely by electronic methods,
such as the Internet. (Nantz, 2005) 2: A course, typically
Web Usability delivered by a higher education institution, which is
1: The part of human-computer interaction that deals with delivered at a distance utilizing Internet technology.
the World Wide Web. It is a quality attribute that assesses (Ordonez, 2005)
how easy user interfaces are to use. (Askar et al., 2005) 2:
Refers to the user satisfaction associated with a Web site. Web-Based Course Management System
It typically includes the effectiveness of the site in meeting A learning management system designed to facilitate
the needs of the user. It also includes the sites performance, online learning. Blackboard, WebCT, and Prometheus are
reliability, and overall eficiency in supporting speciied the most frequently used Web-based course management
user goals. (Becker, 2005a) systems. (S.-K. Wang, 2005)

Web Usage Mining Web-Based Course Partnership


1: The automatic discovery and analysis of patterns in A course partnership in which a Web site is developed
clickstream and associated data collected or generated as to serve as a central communication hub and document
a result of user interactions with Web resources on one or repository for the partnership. (Kock, 2005)
more Web sites. (Mobasher, 2005b) 2: The discovery of
useful information from users usage patterns. (Lee-Post Web-Based Customization
& Jin, 2005b) 3: The process of identifying interesting An e-commerce business model that provides customers
patterns from Web server logs. Data mining and OLAP with the possibility to individualize their products via the
techniques are employed to analyze the data and uncover electronic channel. (Blecker & Abdelkai, 2006)
patterns. (Fu, 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
746 We b-Ba se d Disc ussion We b-Ba se d Syst e m

Web-Based Discussion using message boards, electronic drop boxes, or e-mail


An asynchronous discussion in which messages are placed attachments to the instructor. Interaction occurs via e-mail,
W on the Web under deined topics. (Ingram & Hathorn, message boards, chats, or conferencing programs. Web-
2005b) based instruction often utilizes the multimedia capacity
of the technology. (Kinuthia, 2005) 2: Can be deined as
Web-Based DSS using the Web as the medium to deliver course material,
A computerized system that delivers decision support administer a course (registrations, supervision, etc.), and
information or decision support tools to a manager or communicate with learners. (Magoulas, 2006) 3: The
business analyst using a thin-client Web browser like process of teaching and learning on the Web. (Aisami,
Internet Explorer. The computer server that is hosting 2005) 4: The use of computer-mediated communication
the DSS application is linked to the users computer by a such as e-mail, chat, or a threaded discussion by a group
network with the transmission control protocol/Internet to communicate for the purposes of carrying out a task.
protocol (TCP/IP). Web-based DSS can be communications (Toland, Frank, et al., 2005)
driven, data driven, document driven, knowledge driven,
or model driven. (Power, 2005) Web-Based Knowledge Management Model
How knowledge may be collected, accessed, and presented
Web-Based Education (WBE) on the Web platform. The literative identiies four Web-
1: Education that uses the Internet extensively for content based knowledge management models. (R. Zhang,
delivery, management, and interaction. (Aggarwal, 2005) 2005)
2: A variation of distance learning; the content (e.g., college
courses from an accredited institution) is delivered via Web-Based Laboratory
the World Wide Web. The Web course content covers a 1: A laboratory that typically involves physical experiments
quarter or semester of curriculum that the student must and that can be accessed remotely through the use of the
complete within a given timeline in return for course Internet. (Ko et al., 2005) 2: Use of Internet technologies
credit. (Marold, 2005) for delivering instruction. (Dixon et al., 2005)

Web-Based Educational System Web-Based Learning (WBL) Environment


An educational system that supports teaching through the A specially developed program using Internet technology
Web. (Gaudioso & Montero, 2006) for the design and development of teaching and learning
purposes. Trademarks are, for example, WebCT,
Web-Based Environment WebBoard, Top Class, Virtual U. (Lammintakanen &
A new paradigm in which applications are meant to be Rissanen, 2005a)
distributed over the World Wide Web, offering universal
interfaces, and remote accessibility and processing across Web-Based Mentoring System (WBMS)
the Internet. (Gaffar & Seffah, 2005) A Web-based technology that enables the interactive
communication between students and mentors, supporting
Web-Based Forum a collaborative learning environment. (Heavin & Neville,
A speciic type of software that facilitates public discussions 2006)
through the exchange of messages which are accessed by
clicking a hyperlink. (Al-Saggaf & Weckert, 2005) Web-Based Synchronized Multimedia Language
Developed by Multimedia Lab of NCNU in Taiwan to
Web-Based HMI assist the student/teacher who learns/teaches English as
An advanced and extended form of computerized HMI a Second Language. (Lee, Lin, et al., 2005)
characterized by the logical separation of the computer
unit from the machine itself. (Blecker & Graf, 2006) Web-Based System
1: A loose term that in its broadest sense embraces all
Web-Based Instruction software systems that somehow rely upon the WWW as
1: Courses or programs mediated by computers where a platform for execution, including not just interactive
instructional material is delivered via the World Wide Web. Web sites, but also applications such as Web crawlers and
Instruction that is solely delivered through the Internet middleware. In a narrow sense, it is generally taken to

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We b-Ba se d Te a ching We bom e t ric s 747

mean systems for which human-computer interaction is Web-Enhanced Instruction


mediated through a Web browser interface. (M. Lang, 2005) A combination of online and classroom instruction.
2: Software environments accessible via Web browser, (Aisami, 2005)
W
containing an integrated set of tools and functionalities.
(Collis & Moonen, 2005a) Web-Enhanced Learning (WEL)
Use of the World Wide Web to provide students studying
Web-Based Teaching in the classroom with access to electronic resources and
All or most teaching takes place on the Web with no or little learning activities that would not be available to them in
face-to-face interaction. (Szabados & Sonwalkar, 2005) traditional classroom-based study. The simplest forms
of WEL provide information about a course on the
Web-Based Training (WBT) Web and access to the Web from within the classroom.
1: Training material is delivered using the World More sophisticated forms of WEL blend activities in the
Wide Web. (Cirrincione, 2005) 2: Anywhere, anytime classroom with Web-enabled online learning activities,
instruction delivered over the Internet or a corporate which promote collaborative learning among students
intranet to learners. (Zaphiris et al., 2005) 3: Delivery even when they are distant from the classroom. (Klobas
of educational content via a Web browser over the public & Renzi, 2005b)
Internet, a private intranet, or an extranet. Web-based
training often provides links to other learning resources WebCT
such as references, e-mail, bulletin boards, and discussion 1: An asynchronous Web-based course-management
groups. WBT also may include a facilitator who can system that provides a platform for e-learning and teaching
provide course guidelines, manage discussion boards, practices, used among educational institutions. (Bodomo,
deliver lectures, and so forth. (Torres-Coronas, 2005) 4: 2005a) 2: Software that provides electronic learning in a
Refers to all training programs provided online which lexible integrated environment. (Lewis, 2005)
signiicantly eliminate the need for same time and same
place for learning events. (Iannarelli, 2005) 5: Training Webill
or organized learning without the physical presence of a An e-commerce business model for construction and
teacher, that is, CD-ROMs, Webcasts, video, and so forth. demolition waste exchange in the Hong Kong construction
(Ribire & Romn, 2006) 6: Use of material delivered industry, in which construction contractors, property
via Web browser to support education. This may support managers, manufacturers, recyclers, and landill managers
distance learning or can be used within an educational are all involved to participant the waste exchange. It is
establishment. (Knight et al., 2005) being further developed to an online C&D waste exchange
portal for the Hong Kong construction industry. (Chen,
Web-DMSS and Knowledge Management Li, et al., 2006)
Computer-based system composed of a user-dialogue
subsystem, a text and multimedia document storage Webinar
subsystem, and a publishing/retrieval subsystem to 1: Seminar conducted on the Web through the use of an
preserve and distribute knowledge in intranet-supported intranet or the Internet. (Coakes, 2006a) 2: Web-enabled
organizations. (Forgionne et al., 2005) (virtual) seminar. (Coakes, 2006b)

Web-Enabled Electronic Business WebMAIL


A business transaction or interaction in which participants An online system developed by AFTA providing travel
operate or transact business or conduct their trade agencies in Australia with access to tourism product and
electronically on the Web. (Nayak, 2005c) service offerings from participating industry suppliers.
(Sharma, Carson, et al., 2005)
Web-Enhanced Course
A traditional course with some electronic enhancements, Webometrics
such as Web pages for course syllabi, data iles, and test 1: First deined by Almind and Ingwersen (1997), it applies
reviews. (Nantz, 2005) bibliometric methodologies and procedures to measure

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
748 We ight Whole Course Re de sign

the virtual world of the WWW. This technique refers New England (NEBE), the South (SREB), and the Midwest
to the quantitative analysis of the nature, the structures, (MHEC). WICHE runs a vast network of student exchange
W and the properties of Web pages and sites. (Maggioni & programs among the 15 western United States, conducts
Uberti, 2005) 2: The study of quantitative aspects of Web national research projects, and is active in higher education
publishing and use. (Thelwall, 2006) policy. (S.M. Johnstone, 2005)

Weight What If? Analysis


1: Connections between neurons of neural networks have a The capability of asking the software package what the
weight. This weight can be changed during the training of effect will be of changing input data, decision variables, or
the net. (Fischer, 2005) 2: Strength of a connection between independent variables. In a model-driven DSS, a decision
two neurons in a neural network. (Yeo, 2005) variable is a changing factor in the model that is determined
by a decision maker. The presence of this capability helps
Weighted Random Sampling identify a model-driven DSS. (Power, 2005)
A method of simple random sampling where the
probabilities of inclusion for each element are not equal. What You See Is What You Get (WYSIWYG)
(Lutu, 2005) Visual Design Tools
1: A category of application development tools that
Weirdness Ratio emphasizes the visual design of the front-end graphical user
The ratio that relects preferential use of a word in a interface (GUI); that is, What You See Is What You Get
specialist domain as compared to its everyday usage. (WYSIWYG). These tools often have prototyping features,
(Ahmad & Al-Sayed, 2006) such as automatic code generation and customizable in-
built application templates. Examples include Microsoft
WEL: See Web-Enhanced Learning. Frontpage and Macromedia Dreamweaver. (M. Lang,
2005) 2: A user display that shows text and graphical
Well-Being Function of VC information exactly as it will appear in print or other
Another of three functions of a VC that contributes to its subsequent distribution. This includes expressional and
own well-being by taking proper governance mechanisms. artistic variations of text fonts, such as italics, bold, and
(Chuang, 2006) underlined text. (Kieler & West, 2005) 3: A WYSIWYG
(pronounced Wiz-zee-wig) application is one where you
Well-Formed XML Document see on the screen exactly what will appear on the printed
To be well-formed, a pages XML must have properly nested document (i.e., text, graphics, and colors will show a
tags, unique attributes (per element), one or more elements, one-to-one correspondence). It is particularly popular for
exactly one root element, and a number of schema-related desktop publishing. (Henley & Noyes, 2006)
constraints. Well-formed documents may have a schema,
but they do not conform to it. (Nayak, 2005b) What-If Question
A question about what will happen to a system under given
WEP: See Wired Equivalent Privacy. conditions or inputs. (Kontos & Malagardi, 2006)

WES: See Wireless Emergency Service. White Lie


Lie that is minor and supposedly harmless. (Rowe,
Western Cooperative for Educational 2006c)
Telecommunications (WCET)
The cooperative advancing the effective use of technology Whiteboarding
in higher education founded in 1989 by WICHE. (S.M. A technology that allows a presenter to draw on a computer
Johnstone, 2005) screen using the mouse pointer, generally for the purposes
of highlighting a particular screen area. (Panton, 2005)
Western Interstate Commission for Higher
Education (WICHE) Whole Course Redesign
Founded in the 1950s to assist the western states in sharing A process of analyzing courses to identify areas of potential
higher education resources. Sister organizations exist in eficiency in terms of learning and delivery, including

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Whole N e t w ork Ana lysis Wik i 749

goals of avoiding duplication of effort while achieving through leased lines or satellites. (Velibeyoglu, 2005) 2:
greater course consistency. (Twigg, 2005) Refers to a network that spans a large geographical area
or distance. (Shuaib, 2005) 3: The oldest type of network
W
Whole Network Analysis that extends to large geographical areas such as a state,
In a whole network analysis, the network members are nation, or the world. (Butcher-Powell, 2005)
completely deined from the beginning, and people
are asked to identify their individual connections of Wide Area Radio Network
some speciic content to the other members. (Meller- Consists of several radio transmitters with overlapping
Prothmann, 2006b) transmission ranges. (Kaspar & Hagenhoff, 2005)

Whole Product/Service Wideband Code-Division Multiple Access,


Direct product/service provided by a irm, augmented Frequency-Division Duplex (WCDMA-FDD)
by everything else required by customers (installation, The variant of UMTS WCDMA where UL and DL
training, support, integration, etc.). (Craig, 2006a) communication are realized in different frequency bands.
In the TDD (time-division duplex) variant, UL and DL are
Whole Query realized in different time slots of the frame. TDD has not
Query to retrieve information of whole class with been applied commercially yet. (Iossiides et al., 2005)
selection predicates originated at the part classes.
(Taniar et al., 2005) Wideband Signal
Signal with a bandwidth wider than that of the telephone
Whole Sequence Matching channel, usually between 50Hz to 20 kHz. This fact
Identiication of similar time series data streams such that results in major subjective improvements. (Perez-Meana
the complete patterns of data values in time series data & Nakano-Miyatake, 2005)
streams are compared to determine similarity. (Sayal,
2005) Widgets
The way of using a physical input device to input a certain
Wholesaler value. These are extensively used and are popular in the
A business that distributes manufacturers products to case of people with neuromotor disabilities. (Abhishek
retailers (pharmacies) and other distributors. (Rosson, & Basu, 2006)
2006)
Wiki
Why Question 1: A publicly modiiable bulletin board, where anyone can
A question about the reason for the occurrence of a certain change the content. Some provide features so that changes
system behavior. (Kontos & Malagardi, 2006) can be un-done. From wiki meaning quick in Hawaiian,
and coined by Ward Cunningham in 1995. (Verhaart &
Wi-Fi: See Wireless Fidelity. Kinshuk 2006) 2: A Web site to which many authors can
contribute using a simple browser interface that allows
WICHE: See Western Interstate Commission for Higher them to modify existing pages. (Graham & Misanchuk,
Education. 2005) 3: Hawaiian for hurry, a Wiki is a collaborative
document creation environment that allows users to add
Wide Area Augmentation System (WAAS) entries and edit entries. (Isaak, 2006) 4: Internet service
A safety-critical navigation system that provides based on HTTP and HTML providing open editing
positioning information. (Freeman & Auld, 2005) of Web pages with a Web browser. Hyperlinks between
documents are supported with simple textual references.
Wide Area Network (WAN) By default, everybody is allowed to edit all available pages.
1: A computer network that spans a relatively large (Kindmller et al., 2005) 5: Web pages that are editable by
geographical area. Typically, a WAN consists of two or users of a site. A form of online collaboration or community
more local area networks (LANs). Computers connected development project. (Boateng & Boateng, 2006b) 6: A
to a WAN are often connected through public networks, Web site that gives users the ability to add content, as on
such as the telephone system. They can also be connected an Internet forum, but also allows content to be edited

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
750 WiM a x Wire le ss Applic at ion Prot oc ol (WAP)

by other users. (Wiki comes from the Hawaiian term for voice, data, Internet, and video signals. (Calzonetti &
quick or super-fast.) (Waterson, 2006) deChambeau, 2006)
W
WiMax: See Worldwide Interoperability for Microwave Wireless Ad-Hoc Sensor Network
Access. A number of sensors spread across a geographical area.
Each sensor has wireless communication capability and
WIMP: See Windows, Icons, Menus, and Pointing. some computing capabilities for signal processing and
data networking. (Vargas, 2005)
Window
An event subsequence, ei, ei+1, ei+d in an event Wireless Application
sequence, where the width of the window, denoted d, An application running on a wireless device that transmits
is the time interval of interest. In algorithms that use and receives data over a wireless network. (K.J. MacGregor,
sliding windows, the frequency of an episode is deined 2005)
as the fraction of windows in which the episode occurs.
(Harms, 2005) Wireless Application Protocol (WAP)
1: A protocol used with small handheld devices and small
Window on World System ile sizes. (Roibs, 2006b) 2: An open, extensible, and
Conventional computer monitor for displaying the virtual uniied global standard for delivering information and
world. Somtimes also called desktop virtual reality. providing interactive services over cellular networks
(Modrk & Marcn, 2006) to mobile devices. (Tan & Teo, 2005) 3: A standard for
providing cellular phones, pagers, and other handheld
Windows, Icons, Menus, and Pointing (WIMP) devices with secure access to e-mail and text-based Web
1: A classical interaction technique found in most window pages. (Parikh & Parolia, 2005) 4: A set of standards
managers like Microsoft Windows. (Bastide et al., 2006) which enable data display for handheld devices, and
2: A style of graphic user interface that involves windows, support Web and e-mail access. (Petrova, 2006) 5: A
icons, menus, and pointers. It replaced the older textual protocol for providing Internet-connectivity access to
command-style interface, and the term is now of historical thin-client devices, such as mobile phones. (Ververidis &
interest only. (Duchastel, 2006) 3: A form of GUI. (Henley Polyzos, 2006) 6: A protocol for implementing advanced
& Noyes, 2006) telecommunications services for accessing Internet pages
from mobile devices. (Mohamedally et al., 2005) 7: The
Wire-Frame Drawing leading application standard to deliver information for
Only the lines deining the edges of patches are drawn, wireless devices, such as cell phones. WAP is similar to
which is useful as a quick previewing tool. (Cottingham, the HTTP (HyperText Transport Protocol) for the Web,
2005) and it is based on other Internet standards such as HTML,
XML, and so forth. (Chen, Sockel, et al., 2005) 8: Deines
Wired Equivalent Privacy (WEP) the use of TCP/IP and Web browsing for mobile systems.
1: A security protocol for wireless local area networks (Akhtar, 2005) 9: A secure speciication that allows users
deined in the 802.11b standard. WEP is designed to to access information instantly via handheld devices such
provide the same level of security as that of a wired LAN. as mobile phones, pagers, two-way radios, and so forth.
WEP is used at the two lowest layers of the OSI model. It is supported by most wireless networks (i.e., GSM,
(Pulkkis, Grahn, & Karlsson, 2005) 2: The data link-level CDMA, TETRA, etc.). WAP supports HTML and XML.
protocol that provides security for the IEEE 802.11 WLAN (Lalopoulos et al., 2005a) 10: An open, global speciication
standards. The encryption algorithm used in WEP is a that allows users with mobile devices to easily access and
stream cipher based on RC4. (Lee, Kou, et al., 2005) interact with information and services instantly. (Lee, Hu,
et al., 2005) 11: A secure speciication that allows users
Wireless to access information instantly via handheld wireless
1: Refers to transmission through air, vacuum, or water by devices such as mobile phones, pagers, two-way radios,
means of an antenna. (Ngoh & Shankar, 2005) 2: Using smartphones, and communicators. (Lee & Warkentin,
the radio-frequency spectrum or microwave network for 2006) 12: Advanced intelligent messaging service for

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Wire le ss Ce ll Wire le ss Fide lit y (Wi-Fi) 751

digital mobile phones and other mobile terminals that Engineers (IEEE) and including Wi-Fi (802.11) and
allows Internet content to be viewed in text format on Bluetooth (802.15). (Garrett, 2006b)
special WAP-enabled GSM mobile phones. (Latchem &
W
Maru, 2005) 13: An approach to link wireless devices to Wireless Device
the Internet by optimizing Internet information so it can be A communication device with computing power connected
displayed on the small screen of a portable device. (Nayak, to a network via a wireless network adapter using, for
2005d) 14: An open, global speciication that empowers instance, wireless LAN or Bluetooth standards. (Kao &
mobile users with wireless devices to easily access and Rerrer, 2006)
interact with information and services instantly. The
WAP is a standard for providing cellular phones, pagers, Wireless Emergency Service (WES)
and other handheld devices with secure access to e-mail 1: A non-interactive mode of context-aware applications
and text-based Web pages. (Lei et al., 2005a) 15: A suite that provide necessary services in response to emergency
of open, global speciications developed by the WAP contexts. Corresponding to the internal and external
Forum. It is for developing applications that operate over need contexts of mobile consumers, there are two types
wireless communication networks, and it allows users of WES: personal WES and public WES. (Sun & Poole,
with mobile handheld devices to easily access and interact 2005) 2: Wireless network-based services that respond to
with information and services instantly. (Hu, Yang, & Yeh, emergency events, either reported by people or detected
2006) 16: An application-level communication protocol by information systems, with immediate help to those
that is used to access services and information by handheld who are involved. (Sun, 2005)
devices with low-resolution displays and low bandwidth
connections, such as mobile cell phones. (Melliar-Smith Wireless Environment
& Moser, 2005) More and more people are equipped with handheld devices
such as cell phones, PDAs, and laptops. To manage all these
Wireless Cell devices, a computing model is deployed. It consists of two
The radio coverage area in which a mobile client can entities: mobile clients and ixed hosts. Some of the ixed
communicate with the wireless infrastructure. (Xu, hosts, called mobile support stations, are augmented with
2006) wireless interfaces. A mobile support station communicates
with the mobile clients within its radio coverage area called
Wireless Commerce wireless cell. Each cell has an identiier that is periodically
The buying and selling of goods and services through broadcasted to each mobile client residing in the cell.
wireless handheld devices such as cellular phones and The aim is to be fully aware of the mobile clients that
personal digital assistants (PDAs). (Galanxhi-Janaqi & are under the management of the cell. Mobile clients get
Nah, 2005) information from information servers, through the mobile
support stations. As long as a mobile client stays in the
Wireless Communication coverage area of the same mobile support station, there
1: Data communication that does not require a wired are no major issues in pushing information to the clients
connection between communicating peers, typically mobile device. As soon as the client leaves that coverage
using radio or infrared transmissions. (Kunz & Gaddah, area, another mobile support system has to be in charge
2005) 2: Interaction through a wireless device (e.g., of the information transfer. (Maamar, 2005)
cellular phone, pager, PDA, etc.). (Clarke & Flaherty,
2005) 3: To communicate with or send communications Wireless Fidelity (Wi-Fi)
by wireless means, relating to radio or communication by 1: Any 802.11 product (including 802.11b, 80.211a, and
radiotelegraphy or radiotelephony. (Hanson, 2005) 802.11g). This term is promulgated by the Wi-Fi Alliance.
Wi-Fi offers broadband access without the physical
Wireless Connectivity restraint, and the users can accis installed, for example, in
The communication of digital devices between one a coffee shop. (Yang, 2005) 2: A popular term for 802.11b,
another using data transmission by radio waves. A variety a wireless local area network (WLAN) speciied by the
of standards for wireless data transmission now exist, Institute of Electrical and Electronic Engineers (IEEE),
established by the Institute of Electrical and Electronics and based on the Ethernet protocol and CSMA/CA (carrier

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
752 Wire le ss Fide lit y Prot e c t e d Ac c e ss (WPA) Wire le ss N e t w ork

sense multiple access with collision avoidance) for path that uses radio waves as its carrier. (Cremonini et al., 2006)
sharing. Wi-Fi supports a range of about 150 feet and data 3: A wireless network installed in a local area such as a
W rates up to 11mbps. (Lei, 2006) 3: A popular wireless building. (Yang, 2005) 4: A wireless network that provides
networking technology, also known as Wireless Ethernet. access to subscribers with end-to-end IP connections.
(Efstathiou & Polyzos, 2006) 4: A wireless network that (Louvros, Karaboulas, et al., 2005)
provides high-speed data connections over short distances,
allowing visitors with laptops to connect to the Internet at Wireless Local Loop (WLL)
so-called hot spots, such as airport terminals or cafs. (D. 1: A system that connects subscribers to the public
Stern, 2005) 5: A set of product compatibility standards switched telephone network (PSTN) using radio signals
for WLAN based on the IEEE 802.11 speciications. Wi-Fi as a substitute for the usual copper phone lines for all, or
was intended to be used for mobile devices and LANs, but part, of the connection between the telephone subscriber
is now often used for Internet access. It enables a person and the switch. This includes cordless access systems,
with a wireless-enabled computer or PDA to connect to proprietary ixed radio access, and ixed cellular systems.
the Internet when in proximity of an access point. (Wong, WLL technology is an eficient as well as cost-effective way
2006) 6: Involves the use of wireless communication to deploy telephony services to subscribers in remote and
technologies to access the Internet or the World Wide Web. regional areas without the expense of burying tons of copper
(St. Amant, 2005e) 7: IEEE 802.11b (Wi-Fi) is a wireless wire. WLL services enable newer telecommunications
local area network standard. It operates in an unlicensed companies such as Norlink to bypass Telstras wireline
radio frequency band at 2.4 GHz and provides data access networks to deliver more affordable telephony and data
at 11 Mbps. (Lee, Hu, et al., 2005) 8: A set of product access services. (De Weaver, 2005) 2: System connecting
compatibility standards for wireless local area networks. subscribers to the public-switched telephone network
(Flavin & Guinalu, 2006) 9: A technology that covers (PSTN) using radio signals for all or part of the connection.
certain types of wireless local area networks, enabling users Includes cordless access systems, proprietary ixed radio
to connect wirelessly to a system or wired local network access, and ixed cellular systems. Also known as radio in
and use speciications in the 802.11 family. (Sofokleous the loop (RITL) or ixed-radio access (FRA). (Latchem,
et al., 2005) 10: Wi-Fi networks use small, low-power 2005)
antennas to carry voice and data communications between
a backbone and users at schools, businesses, households, Wireless Markup Language (WML)
and public places, all without laying a single wire, thus 1: A Web page description language derived from XML
greatly reducing the cost of traveling the last mile. (Phala, and HTML, but speciically designed to support the display
2005) 11: Wireless idelity technology allows devices to of pages on low-resolution devices over low-bandwidth
connect to the Internet without the need for landlines. connections. (Melliar-Smith & Moser, 2005) 2: Medium-
Wi-Fi-enabled computers can send and receive data from power radio communication technology, similar to cordless
anywhere within the range of their base station. (Toland, phones, used to connect computers over a distance of
Purcell, et al., 2005) several dozen meters. These networks can be either ad
hoc groups of peers or a set of mobile clients connecting
Wireless Fidelity Protected Access (WPA) to the Internet through a hardware access point. Competes
A system to secure wireless networks, created to patch the with IR and Bluetooth. (Houser & Thornton, 2005) 3: A
security of the previous system, WEP. WPA implements part markup language inherited from HTML and XML. WML
of the IEEE 802.11i standard. In addition to authentication is used to create Web pages speciically for micro browsers
and encryption, WPA also provides improved payload in mobile devices. (Chen, Sockel, et al., 2005)
integrity. (Pulkkis, Grahn, & Karlsson, 2005)
Wireless Markup Language (WML) Script
Wireless LAN: See Wireless Local Area Network. Scripting for micro browsers. WMLScript is used with
WML to offer some dynamic effects on WAP Web pages.
Wireless Local Area Network (Wireless LAN, (Chen, Sockel, et al., 2005)
WLAN)
1: Refers to a local area network that uses either infrared Wireless Network
or radio frequencies rather than physical cable as the Computer networking that permits users to transmit
transmission medium. (Sarkar, 2005) 2: Local area network data through a wireless modem connecting the remote

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Wire le ss Se nsor N e t w ork Work Group 753

computer to Internet access through radio frequency. Witness Learning


(Luppicini, 2006) A term coined by Dr. Helmut Fritsch, senior researcher
at the Fern Universitt in Hagen, Germany, that refers to
W
Wireless Sensor Network the indirect learning possibilities of learners who do not
A network of distributed sensors linked by a wireless actively take part in interactions, but learn from witnessing
connection. (Alippi & Vanini, 2005) the interactions of others, for example, in online discussion
forums. (Link & Wagner, 2006)
Wireless Service Provider
The customer-facing elements of wireless networks; the Wizard
services whose quality is perceived by customers; speed A program within an application that helps the user perform
of connection, clarity, and so on. (Rlke et al., 2005) a particular task within the application. For example, a setup
wizard helps guide the user through the steps of installing
Wireless System software on his or her PC. (Garrett, 2006a)
A system that provides service through wireless channels.
(W. Wang, 2006) WLAN: See Wireless Local Area Network.

Wireless Technology WLL: See Wireless Local Loop.


1: New forms of portable devices such as mobile phones
and laptop computers which allow users to communicate WML: See Wireless Markup Language.
using radio signals, microwave, and satellite links. (Harris,
2005) 2: Technologies that communicate without landlines, WML Script: See Wireless Markup Language Script.
for example, satellite, microwave, cellular radio, infrared.
Common uses are pagers, cellular telephones, personal Word Processing Program
digital assistants, mobile data communications, and 1: A software program that creates written documents.
personal communications services. (Toland, 2006) (Judd, 2005) 2: Words, intrastream synchronization assures
that a constant-rate source at the sender again becomes a
Wireless Transport Security Layer (WTSL) constant rate source at the receiver despite delay jitter in
A high-security, low-overhead layer that operates the network. (Yang et al., 2005b)
above WDP and below WSP to provide authentication,
authorization, confidentiality, integrity, and non- Work
repudiation. (Melliar-Smith & Moser, 2005) The change to an application domain by a work system to
achieve the work systems goals. (Diaper, 2006)
Wireless Wide Area Network (WWAN)
1: A wireless network that extends over a large geographical Work Breakdown
area by utilizing such devices as satellite dishes or antennae. A problem in the work practice. (Notess, 2005)
(Yang, 2005) 2: The cell phones high-power cellular radio
network, used for access to the Internet over the entire cell Work Breakdown Structure
phone coverage area. (Houser & Thornton, 2005) A logical assembly of related activities that describes the
totality of the work to be performed. Each activity may
Wisdom contain multiple sub-activities or groups of sub-activities
1: A pragmatic unit of cognition that generates volition, a in a descending order of detail. (Asprey, 2005)
chosen way of acting and communicating. It is a process
of choosing ordered routines that provide success and Work for Hire
eliminate obstacles in performance. (Targowski, 2005) An individual employed by an institution produces
2: The organic application of information and knowledge materials that are owned by the institution. (Fleming,
to human dilemmas and desires. Wisdom is a quality of 2005b)
thought that ties us to the cultural heritage, and gives us
the ability to ind and build the moral framework upon Work Group
which human life is deined and within which meaning 1: A group of people, often with a distinct hierarchy and
resides. (Hartoonian & Johnson, 2005) role structure, whose emphasis is eficiency before learning.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
754 Work Modeling Worklow

Focus is on the outcome and productivity, with the idea Work-Conserving Scheduling
that the best product will be most eficiently created when A work-conserving scheduler allows the link to go idle
W everyone works using their present strengths. (Graham only when there is no packet of any service class awaiting
& Misanchuk, 2005) 2: A relatively small, formally service. (DaSilva, 2005)
designated, and formally controlled group that generally
works together in face-to-face situations. (Wasko & Work-Integrated Learning
Teigland, 2006a) 3: A group of individuals who share A hybrid approach that achieves learning outcomes
network resources in order to collaborate and communicate through a combination of alternating periods of traditional
with each other while they work together on a common academic pedagogy, with extended periods of practical
project. (Dara-Abrams, 2006) 4: People, usually from the experience in the professional workplace. Work-integrated
same department with a shared responsibility for a product learning is a mature pedagogical strategy that is often
or service. (Hustad & Munkvold, 2006) referred to as sandwich and end-on courses. (Lowry
& Turner, 2005)
Work Modeling
Data gathered by contextual inquiry is used to create Working Group
diagrammatic representations of the work practice. Work A group of individuals with a common working practice
models include sequence models, low models, cultural who do not constitute a formal work team. The group
models, physical models, and artifact models. The second cuts across traditional organizational boundaries and
step in contextual design. (Notess, 2005) enables individuals to acquire new knowledgeotherwise
unavailableat a faster rate. (Ribire & Romn, 2006)
Work Motivation
Involves the restriction to those motivation elements that Working Memory
relate to the work situation; concerns the individuals Denotes the memory capable of transient preservation
degree of willingness to work towards organizational of information, which is functionally different from the
targets. (Hendriks & Sousa, 2006) memory that stores historical information (long-term
memory). See also Short-Term Memory. (Lin & Kinshuk,
Work Practice 2005)
The way in which people accomplish their intentional
activities, including their motivations, pressures, habits, Working Relationship
sequences, collaborations, artifacts, environments, and The kind of relationship exempliied by people who work
so forth. (Notess, 2005) together toward the completion of work-based tasks. It
involves communication related to sharing information,
Work Redesign coordinating tasks, meeting timelines, and so forth.
The consolidated models and insights gained are used to (Pauleen, 2005)
generate ideas for improving work practice. The redesigned
work practice is expressed in storyboards. The fourth step Workaround
in contextual design. (Notess, 2005) Informal or unauthorized changes to a computer system
to bypass a problem. (Brady, 2005)
Work Relationship
The task connections or interdependencies involved in Worklow
input-output combinations: output of one task gets used 1: A collection of tasks organized to accomplish
as input for another. The concept of work relationships some business activity between the customer and the
focuses on the content side to these combinations, and trader supported by suitable protocols. (Murthy &
involves an abstraction from the personal elements in Krishnamurthy, 2005c) 2: A recurring unit of work of
work-related cooperations. (Hendriks, 2006) which the coordination, control, and execution can be
partially or completely automated. (Signoret, 2006) 3:
Work System Comprises cases, resources, and triggers that relate to
That part of the assumed real world that attempts to change a particular process. (Dustdar, 2005) 4: Systems which
an application domain to achieve the work systems goals. are meant to automatize and control business processes.
(Diaper, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Worklow Engine World Wide Web (WWW) 755

Among its functions are task assignment, alerts, common Worklow Technology
tasks cooperation, align resources with the strategy, A software component that provides the languages and
automatization of business processes, and tracking and interpreters to implement process management. (Bussler,
W
oversight. (Xodo, 2005) 5: Term used to describe the 2005b)
tasks, procedural steps, organizations or people involved,
required input and output information, and tools needed for Workload
each step in a business process. The worklow management The log of all queries that execute on a database system.
focuses on processes rather than documents. (Sarmento, Workloads often are used by database administrators as
2005) 6: The automation of a business process, in whole well as by automated systems (such as AQA systems) to
or part, during which documents, information, or tasks are tune various parameters of database systems for optimal
passed from one participant to another for action, according performance, such as indexes and physical design, and in
to a set of procedural rules (WFMC.org) (sometimes also the case of AQA, the set of sample tables. (Das, 2005)
used as a synonym for business process). (Heucke et al.,
2005) 7: The automation of a business process, in whole Workload Model
or part, during which documents, information, or tasks In a database benchmark, a database and a set of read
are passed from one participant to another for action, and write operations to apply on this database. (Darmont,
according to a set of procedural rules. (De Lucia et al., 2005)
2006) 8: The result of automation, in whole or part, of a
business process. (Berztiss, 2006b) Workplace Learning
A process of developing the employees knowledge, skills,
Worklow Engine values, attitudes, and actions in relation to the workplace
A software component deined by WfMC. Worklow environment. It is the main means by which the employee
engine is application independent. When a worklow plan improves work, and it is a key strategic element in achieving
is executed, there may be multiple worklow instances organizational objectives and goals. (Rugelj, 2005)
concurrently running at different states. Worklow engine is
responsible for resolving the problems such as resource/data Workstation
dependency, process dependency, live-lock or deadlock, A computer that performs tasks for an individual. (Maris,
event-trigger handling, and so forth. (Li, 2005a) 2005)

Worklow Instance World Trade Organization


Also, process instance. Each execution instance of a Includes 148 member states and was established in 1995
process managed by the worklow management system. as successor to the General Agreement on Tariffs and
(Pinheiro, 2005) Trade. Its primary purpose is to liberalize international
trade through rounds of multi-lateral negotiations and to
Worklow Management System resolve trade disputes among member countries. (Smith
A system that deines, creates, and manages worklows & Smythe, 2005)
by the use of software, running on one or more worklow
engines, which is able to interpret the process deinition, World Wide Interoperability for Microwave
interact with worklow participants, and where required, Access (WiMax)
invoke the use of applications. (De Lucia et al., 2006) ICalled 802.16 in industry standard, a wireless broadband
connection in wide area network (WAN). It offers fast
Worklow Software wireless data communications over a distance up to about
Tools that deal with the automation of business processes 30 miles. (Lei, 2006)
in a managed environment. (Asprey et al., 2005)
World Wide Web (WWW)
Worklow System 1: A global system of networks that allows transmission
A software system that manages worklows. (Berztiss, of images, documents, and multimedia using the Internet.
2006b) (Burke et al., 2005) 2: A system of universally accepted

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
756 World Wide We b Consor t ium (W3 C) World Wide We b U sa ge M ining

standards for storing, retrieving, formatting, and displaying Japan, which are responsible for core development and local
knowledge in a networked environment. (Handzic & Lin, support. The W3C has around 350 member organizations
W 2005) 3: An application that runs on the Internet, and a from all over the world and has earned international
collection of electronic documents, or Web pages, that recognition for its contributions to the growth of the
can be viewed on your computer using a Web browser. Web. W3C was established initially in collaboration with
The words Internet and Web are used synonymously, CERN (European Organization for Nuclear Research),
although by deinition they are very different. (Singh, DARPA (Defense Advanced Research Projects Agency),
2006a) 4: A hypertext-based client-server system that and the European Commission. (Pereira & Freire, 2005)
is one component of the larger Internet. The hypertext- 2: An international consortium of companies involved
based format of the WWW allows users to navigate with the Internet and the Web. (Mohamed & Ottmann,
through the system by using graphical user interface 2006) 3: Develops interoperable technologies such as:
software known as browsers. (Hinnant & Sawyer, 2005) speciications, guidelines, software, and tools to lead the
5: A system of Internet servers that support specially Web to its full potential. W3C is a forum for information,
formatted documents. The documents are formatted in commerce, communication, and collective understanding.
a markup language called HyperText Markup Language (Yu, 2005a) 4: A part of the Internet where documents and
(HTML) that supports links to other documents. (Sala, other resources are accessible through hyperlinks. Using
2005a) 6: An Internet client-server, hypertext-distributed, the Web for teaching materials diffusion places the onus
information-retrieval system that originated from the on the student to download iles. (El Louadi, 2005a) 5:
CERN High-Energy Physics laboratories in Switzerland. An international organization devoted to the development
(Vician & Buche, 2005) 7: Computer network consisting of interoperable technologies, such as speciications,
of a collection of Internet sites that offer text, graphics, guidelines, software, and tools, to lead the Web to its full
sound, and animation resources through the hypertext potential. (Fagan, 2005) 6: The international body that
transfer protocol. (Barolli & Koyama, 2005b) 8: Worldwide governs Internet standards. It was created in 1994 and
collection of electronic documents on the Internet that have is open to all interested organizations. It has about 500
built-in hyperlinks to other related documents. Also called organization members from the world that jointly develop
the Web. (Inoue & Bell, 2005) 9: A popular application protocols that promote the evolution of the Web while
of the Internet sometime known as the the Web. The ensuring interoperability. The W3C holds speciications
WWW is a software tool that uses hypertext links to for many of the Web technologies such as HTML, XML,
allow computers to easily retrieve and add information and RDF, as well as many Web services standards such as
from different computer sources. (Escalante, 2005) 10: SOAP and WSDL. (Zhang, 2006) 7: A consortium that uses
Originally created as an online information tool for high- relatively simple technologies with suficient scalability,
energy physics research at CERN (the European Center eficiency, and utility that it has resulted in a remarkable
for Nuclear Physics Research in Geneva, Switzerland), information space of interrelated resources, growing across
information is organized as a series of documents referring languages, cultures, and media. (Signoret, 2006)
to each other with links of search and retrieval of text,
images, sound, and video. Based on its likeness to a spiders World Wide Web Data Mining
web, this world of hypertext links is also called the Web. Attempts to extract knowledge from the World Wide
(Theng, 2005) 11: Resources on the Internet that are using Web, producing some useful results from the knowledge
the HyperText Transfer Protocol (HTTP). (Ortega Egea extracted, and applies the results to certain real-world
& Menndez, 2006) problems. (Hu, Yang, Lee, & Yeh, 2005)

World Wide Web Consortium (W3C) World Wide Web Usage Mining
1: An industry consortium that was created in October The application of data-mining techniques to the usage
1994 to lead the Web to its full potential by developing logs of large Web data repositories in order to produce
common protocols that promote its evolution and ensure results that can be applied to many practical subjects, such
its interoperability. The consortium is international, jointly as improving Web sites/pages, making additional topic
hosted by the MIT Laboratory for Computer Science in the or product recommendations, studying user/customer
United States, ERCIM (European Research Consortium behavior, and so forth. (Hu, Yang, Lee, & Yeh, 2005)
in Informatics and Mathematics), and Keio University of

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Wor m WYSI WYG V isua l De sign Tool 757

Worm W3C WAI Guidelines


1: A program or algorithm that resides in active memory A set of guidelines deined by W3C for designing accessible
and replicates itself over a computer network, usually Web sites. It has three conformance levels (A, Double-A,
W
performing malicious actions, such as using up the and Triple-A), leading to different accessibility rank.
computers resources and shutting down systems. Worms (Costagliola, Di Martino, Ferrucci, et al., 2006)
are automatic and are only noticed when their uncontrolled
replication has used so much of a systems resources that WTSL: See Wireless Transport Security Layer.
it slows or halts other tasks. (Tassabehji, 2005a) 2: A
self-replicating, self-propagating program that uses basic W2000
computer operating system code to transfer instances 1: A methodology to conceptually design Web applications,
of itself from computer to computer. (Horiuchi, 2005b) developed by Polytechnic of Milan (Italy) in the UWA
3: Self-replicating program that aggressively spreads project. (Paiano, 2005) 2: A user-centered methodology for
through a network by taking advantage of automatic packet conceiving and deining, at conceptual level, hypermedia
sending and receiving features found on many computers. applications. (Bochicchio & Fiore, 2005)
(Lazarevic, 2005)
WWAN: See Wireless Wide Area Network.
WPA: See Wireless Fidelity Protected Access.
WWW: See World Wide Web.
Wrapper
1: A program that extracts data from the input documents WYSIWYG Visual Design Tool: See What You See
and wraps them in user desired and structured form. (Chang Is What You Get Visual Design Tool.
& Hsu, 2005) 2: A software tool to extract content from
data sources and perform data format translation. (De
Antonellis et al., 2005) 3: An application routine that can
retrieve and transform data from one format into another.
(Wan, 2006)

Wrapper Induction
Learning (highly accurate) rules that extract data from a
collection of documents that share a similar underlying
structure. (Muslea, 2005)

Write Performance
The maximum number of write operations per time unit.
Replication will normally decrease write performance and
give rise to possible inconsistency between the replicated
data. (Frank, 2005a)

WSDL: See Web Service Deinition Language; Web


Services Description Language.

WSMP: See Web Services Management Platform.

WSN: See Web Services Network.

W3C: See World Wide Web Consortium.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
758 X -Group M e t hodology X Que r y

X
X-Group Methodology: See Extraction Group Schema.
Research Methodology.
XML Structural Change: See Extensible Markup
X-Machine Language Structural Change.
A deterministic stream X-machine is an 8-tuple (, , Q,
M, , F, q0, m0), where , is the input and output inite XML Structural Clarification Mining: See
alphabet, respectively; Q is the inite set of states; M is Extensible Markup Language Clariication Mining.
the (possibly) ininite set called memory; is the type of
the machine, that is, a inite set of partial functions that X M LDB: See Extensible Mark up Lang uage
map an input and a memory state to an output and a new Database.
memory state, : MM; F is the next state partial
function that, given a state and a function from the type XPath
, denotes the next stateF is often described as a state 1: A language designed to access the different elements
transition diagram, F: QQ; q0 and m0 are the initial of an XML document. (de Campos et al., 2005) 2: A
state and memory, respectively. (Kefalas et al., 2005) language for addressing parts of an XML document. It is
used together with XSLT and XPointer. (Goh & Kinshuk,
XBRL: See Extensible Business Reporting Language. 2005)

XMI: See Extensible Markup Language Metadata X.509 and PKI


Interchange. An X.509 certiicate is a standardized data structure for
proving the ownership of a public cryptographic key
XML: See Extensible Markup Language. with a cryptographic signature of a trusted third party, a
certiication authority (CA). A public key infrastructure
XML Content Analysis Mining: See Extensible (PKI) is hardware, software, people, policies, and
Markup Language Content Analysis Mining. procedures needed to issue, manage, store, distribute, and
revoke X.509 certiicates. (Pulkkis et al., 2005a)
XML Document: See Extensible Markup Language
Document. Xpointer
The XML Pointer Language that deines an addressing
XML Interstructure Mining: See Extensible Markup scheme for individual parts of an XML document. (Goh
Language Interstructure Mining. & Kinshuk, 2005)

XML Mining: See Extensible Markup Language XQuery


Mining. An XML query language, the speciication of which is
deined by the W3C, the authorities body behind XML.
XML Rewrite: See Extensible Markup Language It can access XML databases and documents, and offer
Rewrite. different querying capabilities. (Gaffar & Seffah, 2005)

XML Schema: See Extensible Markup Language XSL

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
X SL X yle m e 759

XSL
Extensive Stylesheet Language is a W3C standard that
speciies how a program should render XML document
X
data. (Goh & Kinshuk, 2005)

XSP: See Extended Service Provider.

XSS: See Cross-Site Scripting.

X3D
1: eXtensible 3D graphics. X3D is an open standard for
Web 3D-Graphics, whose primary goal is to express the
geometry and behavior capabilities of VRML, using
XML for description and encoding. (Di Giacomo et al.,
2005) 2: Open Standards XML (Extensible Markup
Language) enabling 3D (dimensional) ile format, real-
time communication of 3D data across all applications
and network applications. (Swierzowicz, 2005)

X12
The X12 EDI standard deines the data structure and
content for business transactions transmitted between
information systems with dictionaries that specify name,
length of data ield, description, data type, and meaning.
(Hawk & Zheng, 2006)

XXS: See Cross-Site Scripting.

Xyleme
A dynamic warehouse for XML data of the Web supporting
query evaluation, change control, and data integration. The
Xyleme Project ended in 2001, and the system is now owned
by Xyleme S.A. company. (Cannataro et al., 2005)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
760 Ya hoo V ir t ua l Com m unit y Ya re n (Y re n, Ya ra n) Ta lk s

Y
Yahoo Virtual Community
One of a number of virtual Internet communities facilitated
by the Internet service product provider Yahoo! Inc.
(Fryer & Turner, 2006)

Yaren (Yren, Yaran) Talks


A social institution that has assumed responsibilities for
educating members of the community, maintaining social
security and order, and sustaining traditional arts and
customs in Anatolia for centuries during the Ottoman
Empire and Republic of Turkey periods. (Medeni,
2006b)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Z -Tra nsfor m at ion Z PD 761

Z
Z-Transformation Zone of Proximal Development (ZPD)
With the z-transformation, you can transform the values of 1: The individual learning areas marked by the distance
any variable into values of the standard normal distribution. between the skill and the knowledge a subject has in a
(Klawonn & Rehm, 2005) given ield, and the same kind of skill and knowledge
of a more clever member in the community. (Cartelli,
Zero-Knowledge Protocol 2006a) 2: The difference between the childs capacity to
A cryptographic technique to provide identiication to solve problems on his or her own, and his or her capacity
a third party. In contrast to other techniques, no secret to solve them with the assistance of someone else. (Kwok
information is transmitted between the communicating Lai-yin & Tan Yew-Gee, 2005)
partners. Nor is any secret information stored on the third
partys server. Zero-knowledge protocols try to prove that Zoom
the client knows a secret without revealing this secret to 1: A user interface operation that deines a new user focus
a third party. (Stickel, 2005) by ORing user-selected concepts and ANDing them with
the previous focus; a reduced taxonomy is then computed
0-1 Distance and shown to the user. (Sacco, 2006) 2: Changes the
The 0-1 distance between a vector of predicted values, Xg, fraction of an image being displayed when that image is
and a vector of observed values, Xf, is: taken from a larger one. (N.C. Rowe, 2005a)

d = 1(X fr X gr )
n
ZPD: See Zone of Proximal Development.
0 1
r =1

where 1(w,z) =1 if w=z and 0 otherwise. (Giudici, 2005)

0-Safe Design
Replication method where none of the copies are consistent
and up to date. (Frank, 2005a)

Zone
Can encompass an expansive desert or be a city. Zoning
usually implies a small delay or pause to the game, as
additional data from the server is needed to update a
characters geographic point and to load up the new area
of play. (Grifiths et al., 2006)

Zone of Inluence
The network of people affected by patients participating
in the online discussion, although many in the network
might not participate directly in the online discussion.
(Rada, 2006)

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.

Вам также может понравиться