Академический Документы
Профессиональный Документы
Культура Документы
Volume I
A-J
Mehdi Khosrow-Pour
Information Resources Management Association, USA
Copyright 2007 by Idea Group Inc. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identiication purposes only. Inclusion of the names of the products or companies
does not indicate a claim of ownership by IGI of the trademark or registered trademark.
All work contributed to this handbook is new, previously-unpublished material. The views expressed in this handbook are those of
the authors, but not necessarily of the publisher.
1
Contents
Volume I
A ...........................................................................................................................................................1
B .........................................................................................................................................................46
C .........................................................................................................................................................69
D .......................................................................................................................................................152
E .......................................................................................................................................................200
F .......................................................................................................................................................254
G.......................................................................................................................................................277
H.......................................................................................................................................................296
I ........................................................................................................................................................314
J ........................................................................................................................................................376
Volume II
K.......................................................................................................................................................379
L .......................................................................................................................................................400
M ......................................................................................................................................................423
N .......................................................................................................................................................467
O.......................................................................................................................................................481
P .......................................................................................................................................................507
Q.......................................................................................................................................................557
R .......................................................................................................................................................563
S .......................................................................................................................................................591
T .......................................................................................................................................................668
U .......................................................................................................................................................703
V .......................................................................................................................................................716
W ......................................................................................................................................................737
X .......................................................................................................................................................758
Y .......................................................................................................................................................760
Z .......................................................................................................................................................761
2
v
Preface
During the past few decades, considerable advancements of computer technologies, combined with innovations achieved
in telecommunication technologies, have served as fuel for the formation of a new discipline, known today as information
science and technology (IST). Since its inception, IST has grown to encompass many other speciic areas within the ield
itself, allowing the IST domain of studies to expand exponentially. Moreover, the primary focus of IST as a discipline
is broadening the science of information processing, management, and dissemination. This newly developed scientiic
paradigm is comprised of many resources and components, including: (1) type of information; (2) computer hardware
technologies; (3) computer software technologies; (4) telecommunication technologies; (5) technology applications; (6)
information processing systems structures; (7) systems personnel and management; (8) end users; and (9) management
skills and programs (Khosrow-Pour & Yaverbaum, 1990). In recent years, the IST revolution has globally impacted all
aspects of life at the individual, organizational, and societal level. In many ways, IST has been the principal driving
force behind the second industrial revolution, known as the digital revolution.
The expansion of IST as a science, like other scientiic ields, such as medicine, has created a new language illed
with terminologies, key words, and acronyms unique to IST and its speciic disciplines. Furthermore, the sheer volume
of ongoing discoveries of new technologies and applications, as well as transpiring research indings, continue to expand
the list of terminology associated with the ield of IST. Because of these incessant advancements, it is nearly impossible
to maintain an understanding of the jargon related to IST and its peripheral domains of study without comprehending
its emerging technological vernacular.
To provide the most comprehensive coverage of IST language, the idea of a new Dictionary of Information Science and
Technology was formed to provide the most in-depth and complete introduction to all terms, acronyms, and deinitions
related to some of most commonly studied areas of IST, such as accounting information systems; database management
and technologies; data warehousing and mining; decision support systems technologies; distance education technologies;
e-collaboration; electronic commerce technologies management; end user computing; enterprise resource planning,
expert systems; geographical information systems; global IT management; human computer interaction; human side of
IT; information resources management; information security management; information systems research; information
technology education; IT evaluation methods and management; IT management in libraries; IT management in health care;
IT in small business; IT personnel; professional IT association; intelligent information systems; knowledge management;
minorities in information technology; mobile computing and commerce; multimedia information management; objected
oriented technologies; open source technologies and systems; social responsibility in the information age; software
engineering; strategic IT management; telecommunications and networking technologies; uniied modeling languages
and uniied process; and virtual communities and IT.
Perhaps the most challenging task related to the compilation of a dictionary for such a young ield of science, is the
fact that there is no single or standard deinition in existence for each element of the vocabulary. Instead, individual
researchers have formed distinctive descriptions of the terminology, providing a much more meaningful and broader
understanding of each term. To achieve this goal, all attempts were made to supply the user of this dictionary with the
most inclusive deinition used to describe every term, and not just a singular deinition designated by the editor. An
exhibition of numerous language contributions from different researchers have been listed for each of the terms, allowing
vi
the user to be exposed to different angles of each deinition in hopes that the user will form a much broader understanding
of the vocabulary that is speciic to IST.
This dictionary is divided into two sections. The irst section lists all terms and acronyms in alphabetical order. Each
term may consist of multiple deinitions, numbered in sequential order, and ends with the source/reference from which the
deinition was derived. The second section includes the complete reference information, also organized in alphabetical
order and formatted to comply with American Psychological Association (APA) recommended style guidelines. Although
one might notice a wide range of deinitions for various terms, it is our opinion that it is much more helpful to provide an
expansive list of deinitions rather than limit the meaning to a singular description. Furthermore, to defuse any inaccuracy
in the deinitions obtained from different sources, it was decided to provide the most complete meaning as possible,
allowing for any confusion that may result from the descriptions to be dealt with in light of other explanations.
The two-volume Dictionary of Information Science and Technology is the premier comprehensive resource composed
of the latest terms and deinitions related to all aspects of the information science and technology ield. This complete and
timely reference collection of over 13,000 deinitions for more than 11,000 terms and acronyms will provide researchers,
practitioners, educators and students with the most accurate and current knowledge available of prevalent key words in
the ever-expanding world of IST. Terms and deinitions included in this important reference publication were contributed
by over 2,500 noted researchers from over 40 countries. The Dictionary of Information Science and Technology will
prove to be a valuable and essential reference publication for libraries and individuals worldwide.
To make sure that the Dictionary of Information Science and Technology and its coverage stays up-to-date, access to
the dictionarys online database, which provides complete search capabilities, will be offered to all libraries at a discount
of 50% off the subscription price upon purchase of the print copy. This database will be updated on a regular basis with
new terms, acronyms, and their deinitions, and will provide coverage of all new and emerging terminologies and their
deinitions as they materialize.
The comprehensive coverage of thousands of terms and acronyms provided in this two-volume resource will
contribute to a better understanding of the technical and managerial language available and its applications for the ield
of information science and technology. Furthermore, the deinitions included in this dictionary will be instrumental in
the body of knowledge expanding in this vast ield. The coverage of this two-volume dictionary provides strength to this
source of reference for both information science and technology researchers in obtaining a greater comprehension of the
language of IST. It is my sincere hope that this reference publication and its immeasurable amount of valuable information
will assist my research colleagues, all faculty, their students, and practitioners in enhancing their understanding of this
discipline. Perhaps this publication will even inspire additional breakthroughs in this gigantic ield and elevate it to a
much higher level within the world of scientiic discoveries.
Reference
Khosrow-Pour, M., & Yaverbaum, G.J. (1990). Information technology resources utilization and management: Issues
and trends. Hershey, PA: Idea Group Publishing.
vii
Acknowledgments
Putting together a comprehensive publication of this magnitude requires tremendous involvement and assistance from
many individuals. The most important goal of editing this dictionary was to compile a comprehensive list of terms,
acronyms and their deinitions in the ield of information science and technology. This goal could not have been achieved
without the valuable contributions of more than 2,500 researchers in the ield of IST, and I am very thankful for their
contributions to this publication.
In terms of editorial assistance, I would like to convey my deep appreciation and gratitude to my editorial staff
at Idea Group Reference (IGR), including Ms. Michelle Potter, former acquisitions and development editor, for her
immeasurable assistance during the development process for this publication. I would also like to express my many
thanks to Ms. Kristin Roth, development editor, Ms. Lynley Lapp, former assistant development editor, Ms. Kristin
Klinger, acquisitions editor, Ms. Lauren Kenes, former editorial assistant, Ms. Sara Reed, managing editor, Ms. Jennifer
Neidig, senior managing editor, Ms. Diane Huskinson, assistant managing editor, Ms. Lisa Tosheff, graphic artist, and
Ms. Maria Boyer, copy editor for their involvement and assistance with this publication. My warmest thanks also go to
my wife, Beth Peiffer, for her support, wisdom, encouragement, understanding, patience, and love. My heart also goes
to my two young girls, Basha and Anar, for the joys that they have brought to my life. Finally, much gratitude goes to
all those who have taught me immeasurable amounts during the past three decades.
Mehdi Khosrow-Pour, DBA is currently the executive director of the Information Resources Management Association
(IRMA), USA, and senior academic editor for Idea Group Reference. Previously, he served on the faculty of the Pennsylvania
State University as an associate professor of information systems for 20 years. He has written or edited over 30 books
in information technology management, and he is also the editor of the Information Resources Management Journal,
Journal of Electronic Commerce in Organizations, Journal of Cases on Information Technology, and International
Journal of Cases on Electronic Commerce.
Aa d Ac a de m ic Adm inist rat ion 1
A
Aad: See Attitude Toward the Ad. of its employees. The greater the absorptive capacity of
an organization, the greater its ability to learn and adapt
AAR: See After-Action Review. to changing market forces. (Jones & Gupta, 2005) 2:
Relects the receiving employees ability to absorb the
Abduction knowledge sent by the giving employee. (Chen, Duan, et
1: Abduction is the process by which a new concept is al., 2006) 3: The ability of a irm to recognize the value
formed on the basis of an existing concept that is perceived of new, external information; assimilate it; and apply it
as having something in common with it. Therefore to commercial ends. (Priestley, 2006; Yaniv & Schwartz,
abduction focuses on associations. (Nobre, 2006a) 2: 2006; Lertwongsatien & Wongpinunwatana, 2005)
The explanatory process of inferring certain facts and/or
hypotheses that explain or discover some phenomenon or Abstract Dimension
observation. (Magnani & Bardone, 2006) Describes the soft issues of a relationship. (Leonard,
2005)
Abductive Mode
This mode permits programs to explore how did this Abstract Windows Toolkit (AWT)
happen? or provides for diagnostic programming features. Library of classes for writing window interfaces. (Lucas,
(Murthy & Krishnamurthy, 2005c) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
2 Ac c e pt a ble U se Policy (AU P) Ac c e ss Point (AP)
Acceptable Use Policy (AUP) mechanism which grants, denies, or revokes permissions.
1: A policy created in an organization to outline the (Mundy & Otenko, 2005) 3: Software control of the use
A permitted and restricted uses of the companys networks of a computer. (N.C. Rowe, 2006c)
and computer systems. (Urbaczewski, 2005) 2: A written
policy document that deines what activities are appropriate Access Control List (ACL)
and inappropriate for a user of a particular resource. A A list of people or other entities permitted to access a
document indicating the understanding and acceptance of computer resource. (Mattord & Whitman, 2005)
an AUP is often required to be formally signed by a user
before he or she gains access to the resource. (Knight & Access History
Labruyere, 2005) Navigation path taken by a user as he/she surfs a Wireless
Application Protocol (WAP). (Quah & Seet, 2006)
Access
1: One of the three preconditions for citizen participation in Access Latency
e-democracy (accesscompetencemotivation). Access to The delay time when a data item or object is accessed.
communication involves existence of technical and logical (Tse, 2006)
access point, communications device, and permission to
access. (Keskinen & Kuosa, 2005) 2: Citizens have access Access Link
to the technology they need. Access is both physical (ICT Web page address used for navigation purposes. (Quah
is located at a physically appropriate place, such as in the & Seet, 2006)
home, community center, library, or school) and economic
(it is affordable). (Williamson, 2005) 3: Refers to the Access Method
ability to get into, and use, an online system. Access to 1: A data structure that enables fast access over the
the Internet through commercial online services requires records of a database ile. Careful tuning or selection of the
an account, an access telephone number, a password, and appropriate access method is very important in database
special software designed for that service. (Magagula, performance. (Tzouramanis, 2005) 2: In the database
2005) 4: The ability to ind or to exchange information domain, indexes are designed to access data that are stored
via online media. (St.Amant, 2005d) 5: The ability to in a speciic structure. The type of data and the type of
physically or electronically obtain data or information. the structure used determine the procedures followed by
(Buche & Vician, 2005) 6: The ability, the opportunity, the index to access these data, which is referred to as the
or the right to enter or use technology and all that it has access method. (Gaffar, 2005) 3: A technique of organizing
to offer in todays society. (Reilly, 2005) 7: The quality data that allows the eficient retrieval of data according
principle that is the fundamental motivation for online to a set of search criteria. R-trees and Quadtrees are two
learning, access means that people who are qualiied and well-known families of such techniques. (Vassilakopoulos
motivated can obtain affordable, quality education in the & Corral, 2005)
discipline of choice. (Moore, Bourne, et al., 2005)
Access Network: See Local Network.
Access Board Standards
Technical and functional performance criteria developed by Access Point (AP)
the Architectural and Transformation Barriers Compliance 1: A device that connects wireless communication
Board (the Access Board), a U.S. government agency, devices to create a wireless network. A wireless access
under Section 508. Only electronic and information point acts as the networks arbitrator, negotiating when
technology conforming to these standards is considered each nearby client device can transmit. Many access points
accessible. (Schmetzke, 2005) can be connected together to create a larger network that
allows roaming, where a person using the network can
Access Control infrastructure a network. In contrast, a network where
1: Methods used to determine if requests to use a system, the client devices manage themselves is called an ad-hoc
network, application, or resource should be granted or network. (Kao & Rerrer, 2006) 2: Equivalent to a cellular
denied. (Knight & Labruyere, 2005) 2: Restriction of base station, this Wi-Fi component provides Wi-Fi stations
access to some resource through the application of a with access to each other and to the Internet. (Efstathiou &
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac c e ss Point Devic e Ac c e ssible Te chnology 3
Polyzos, 2006) 3: Typically, infrastructure-based wireless operating. Designing for diversity not only increases
networks provide access to the wired backbone network the number of people able to access software or a Web
via an AP. The AP may act as a repeater, bridge, router, or site, but also increases their level of involvement with
A
even as a gateway to regenerate, forward, ilter, or translate it. (Singh, 2005b) 5: Problems encountered by Internet
messages. All communication between mobile devices has users with perceptual and cognitive challenges, physical
to take place via the AP. (Sarkar, 2005) conditions, or other factors such as geographical location;
sociocultural, political, and economic issues; language; and
Access Point Device so forth, which inluence their use of the Web. (Campbell,
The device that bridges wireless networking components 2005) 6: The ability to easily navigate and move about
and a wired network. It forwards trafic from the wired in the environment. Usually thought of in terms of the
side to the wireless side and from the wireless side to the architecture of buildings, but since the recent advent of
wired side, as needed. (Lawson-Body, 2005) the Web Accessibility Initiative (WAI), has been expanded
to include the architecture of the World Wide Web and
Access Rights Management all electronic and information technology. (Proctor,
The process of assigning digital rights to users which 2005) 7: The measure of whether a person can perform
can then be used in conjunction with an access control an interaction, access information, or do anything else.
system to obtain access to some resource. The management It does not measure how well he or she can do it, though.
infrastructure covers for example the allocation, renewal, (Polovina & Pearson, 2006) 8: The relative ease by which
and revocation of users rights. (Mundy & Otenko, the locations of activities, such as work, school, shopping,
2005) and health care, can be reached from a given location.
(Wang & Lou, 2005) 9: The sum of the space and time
Access Table between an individual and an activity. (Kenyon, 2005)
A table listing the transactions to be implemented with
an application. For each transaction, it shows the classes Accessibility Data Quality
from the Class Diagram it needs to visit, including the An aspect of data quality that refers to the ease with which
number and types of accesses (Read, Write) in order to one can get to data. (Borchers, 2005)
collect the data necessary for composing the inal result.
(Polese et al. 2005) Accessibility Legal Issues
Many governments around the globe issued laws
Accessibility and regulations demanding accessibility for public
1: A characteristic of information technology that allows organizations sites, usually starting from W3C WAI
it to be used by people with different abilities. In more technical recommendations. (Costagliola, Di Martino,
general terms, accessibility refers to the ability of people Ferrucci, & Gravino, 2006)
with disabilities to access public and private spaces.
(Keates et al., 2006) 2: An individuals perception that Accessibility Toolkit
he/she can contact or reach his/her leader when so desired. Refers to software tools and resources, provided by
(Connaughton, 2005) 3: Accessibility is achieved when operating system manufacturers, that help in the developing
individuals with disabilities can access and use information accessibility software (e.g., screen readers). (Lahiri &
technology in ways comparable to those available to people Basu, 2005)
without disabilities. A narrower, operational deinition
conceptualizes accessibility in terms of conformance to Accessible
certain accessibility criteria. (Schmetzke, 2005) 4: Just Describes a product, information, or environment that
as computers vary by operating system, processor speed, is fully usable by a person, with or without assistive
screen size, memory, and networking abilities, users vary technology. (Burgstahler, 2005b)
in ways both expected and unexpected. Some differences
more commonly thought of are language, gender, age, Accessible Technology
cultures, preferences, and interests. However, some of Products, devices, or equipment that can be used, with
the differences that need to be paid more attention to by or without assistive technology, by individuals with
the software and Web development community are skills, disabilities. (Keates et al., 2006)
ability levels, and constraints under which users may be
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
4 Ac c e ssible We b De sign Ac c re dit at ion M ills
Accessible Web Design Being called to account or held responsible for discharging
Also sometimes referred to as barrier-free Web design. higher education mission and goals, generally understood
A Web design that strives to accommodate the needs of people in terms of higher educations responsibility to ensure
with disabilities, including those using assistive technology, student learning at a reasonable cost. (Keinath, 2005) 4:
to access the Web environment. (Schmetzke, 2005) Responsibility of member behavior for their actions among
the community. Such notion is strictly related to identity
Accommodation management in a virtual community. (Bertino et al., 2006)
1: A mental process individuals use to create new schemata 5: Transparency of responsibility for performance, the
or to modify old schemata as the result of interaction with management of performance, and resulting implications
new environmental stimulus. Both of these actions result for the deployment of future resources. (Wright & Taylor,
in cognitive development. (Gillani, 2005a) 2: Modiication 2005)
or adjustment to a task or an environment that allows a
person with a disability an equal opportunity to complete Accountable Identiication
a task or to access an environment. Not all persons with A way to identify a person in an electronic interaction
disabilities, or kinds of disability, require accommodations. and to give legal status to electronic documents. Different
Environmental accommodations include, but are not technologies have been tried out, for example, chip cards
limited to, ramps, curb cuts, handicapped-accessible and digital signatures. (Jaeger, 2005)
bathrooms, accessible computer stations, touch screens,
and light switches. Education accommodations include, Accounting Performance Measures
but are not limited to, tape recorders, screen readers, Evaluation of the impact of information systems
oral tests, extra time to complete related course work, investments including typical accounting rations such as
materials printed in Braille, and note takers and interpreters return on assets and return on equity. (Dykman, 2005)
provided to students with disabilities. (Proctor, 2005;
Burgstahler, 2005a) 3: Provisions made in how a student Accreditation
accesses and/or demonstrates learning. The term focuses 1: An external quality-review process used by higher
on changes in the instruction, or how students are expected education to evaluate colleges, universities, and educational
to learn, along with changes in methods of assessment that programs or courses to ensure and improve quality. (Kung-
demonstrate or document what has been learned. The use Ming, 2005) 2: Endorsement of quality performance by an
of an accommodation does not change the educational outside agency. (C. Cavanaugh, 2005) 3: Recognition by
goals, standards, or objectives, the instructional level, or a certifying organization or agency that a college meets
the content, and provides the student with equal access certain acceptable standards in its education programs,
and equal opportunity to demonstrate his or her skills and services, and facilities. Regional accreditation applies to
knowledge. (T. Cavanaugh, 2005) a college as a whole and not to any particular program
or course of study. (Riffee & Sessums, 2005) 4: The
Accommodation Management Systems primary means by which colleges and universities and
Integrated software (desktop, network, or Web-based) other higher learning programs assure academic quality
to assist a variety of functions for accommodation to students and to the public. (Garten & Thompson, 2005)
establishments. This may include reservations, room 5: The process of certifying whether a program meets the
maintenance, banquet booking, inance, and customer standards and expectations of any association to which
relationship management. (Carson, 2005) it belongs. (Howell & Wilcken, 2005) 6: The seal of
approval granted by an accrediting agency to an academic
Accountability institution indicating that certain quality standards are
1: A responsibility to account for and/or explain actions met. (Kostopoulos, 2005)
undertaken; obligation of government, public services,
or funding agencies in compliance with agreed rules and Accreditation Mills
standards. (Park, 2006) 2: Accountability of parties means Associations that claim to extend academic accreditation,
holding to account, scrutinizing, and being required to give while they themselves do not have any oficials or otherwise
an account; especially in white-collar crime, accountability recognized capacity. (Kostopoulos, 2005)
is often associated with governance. (Mitrakas, 2006) 3:
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac c re dit ing Age ncy Ac t ion Le a r ning 5
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
6 Ac t ion or Ca pa c it y Le a r ning Ac t iona ble I nfor m at ion
member facing an important real-life problem such that and facilitate the articulation of self-deinitions for a
(s)he may take reasoned action to resolve her/his problem, wider audience. In each case, action research involves
A and the individual and other group members learn the identiication of a problem, an understanding of for
through the overall process. (Smith, 2006a) 2: A practical whom the research is being conducted, and a notion of some
and structured process focused on real organizational disadvantage that is to be addressed or solved through
problems and the development of a case study describing research. (Forte, 2005) 3: Research that is designed not
the problem, including team-based research within an simply to establish the facts about a situation, but which
online environment. Action learning includes a continuous is designed to facilitate the goals of the organization being
renewal process of reflective observation, abstract researched. (David, 2005) 4: Type of research approach
conceptualization, active experimentation, and concrete in which the researcher attempts to improve the research
experience. (Baskin et al., 2005) client, which can be an organization, while at the same
time generating relevant academic knowledge. (Kock,
Action or Capacity Learning 2005) 5: An action-oriented methodology or intervention
In verb form, gaining capacity for effective action; in noun process that is collaborative in nature. It aims to work with
form, capacity for effective action. (Lick & Kaufman, stakeholders. (Braun, 2005a)
2005)
Action Theory
Action Plan Perspective on action facilitation that makes a distinction
A portfolio of complementary activities which aim to have between acts, actions, and operations in performing a
an effective and the desired effect on the organization task. A basic principle of the theory is that the tools used
when implemented. (Shaw, Baker, et al., 2006) should provide suficient feedback to allow for adaptation
of task execution. (Verburg et al., 2005)
Action Research (AR)
1: A research approach operationalized by constant cycles Action-Mediating Web
of planning, acting, observing, and relecting, which Services and actions are enabled by the Web including
encourages the participation of local subjects as active learning actions. This complements the traditional idea of
agents in the research process, and which works hand the Semantic Web as knowledge representation structure.
in hand with people-centered research methodologies. (Liu & Koppelaar, 2005)
(Foth, 2005) 2: Action research, labeled as such, has its
origins in British social science research at the end of Action-Oriented Formal Speciication Language
World War II. There are many types and manifestations Time can be considered in the speciication. There are
of action research, each having in common the goal of several ways of doing this: considering time as linear
researchers engaged in social problem solving. In essence, or branching, synchronous, asynchronous, and so forth.
action research is a value-driven mode of research. (Dasso & Funes, 2005)
Types of action research that are particularly relevant
for Internet research and communication practice are Actionability
educational action research, technical action research, Actionability of a pattern indicates its usefulness.
and hermeneutic action research. Educational action Essentially, a pattern is actionable if a user can act on it
research consists of applied learning in a social context, to his or her advantage. Though it has a great practical
with a focus on solving community problems. Technical orientation, actionability is dificult to operationalize due
action research involves particular persons who, because to the inherent dificulty in mapping patterns to useful
of greater experience and qualiications (for example, actions. (Natarajan & Shekar, 2006)
in Web design and multimedia), may be regarded by
collaborators as technical experts. In this case, technical Actionable Information
knowledge is put to the service of solving a community Information that can be used as the basis for a decision, or
problem that hinges on communication and public visibility. for taking action, usually to change something. (Holstein
Hermeneutic action research involves mutual analysis and & Crnkovic, 2005)
collaborative documentary research conducted between
partners, designed to draw out greater self-understanding
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac t iona ble Rule Ac t ive Le a r ning Te chnique s 7
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
8 Ac t ive M e cha nism Ac t ivit y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ac t ivit y Dia gra m Ada pt a ble Pe rsona lizat ion Syst e ms 9
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
10 Ada pt a ble Syst e m s Ada pt ive Se r vic e s
appearance, and so forth to his or her needs. (Anke & Adaptive Collaboration Support in CSCL
Sundaram, 2006) Using models of different learners to form a matching
A group of learners for different kinds of collaboration.
Adaptable Systems (Devedi, 2006)
Systems that offer personalizationthat is, pre-deined
before the execution of the system and which may be Adaptive Feedback
modiied by users. (Gaudioso & Montero, 2006) Immediate feedback in the form of an explanation or
discussion that is tailored to the qualities of the students
Adaptation answer. (Owen & Aworuwa, 2005)
A system characteristic concerned with the capacity of
adjusting its behavior according to one or a combination of Adaptive Filter
targets: the user, the human computer interaction process, Linear system that modiies its parameters, minimizing
or the computational platform. (Tobar et al., 2006) some given criterion of the difference between its output
and a given reference signal. Widely used in echo and
Adaptation Engineering noise canceling, equalization of communication channels,
The process of constructing the automatic adjustment of antenna arrays, and so forth. (Perez-Meana & Nakano-
an application to the user; often in adaptation engineering, Miyatake, 2005)
models are created for the domain, the user, and the
adaptation. (Houben, Aroyo, & Dicheva, 2006) Adaptive Hypermedia System (AHS)
1: An adaptive concept-based system that is based
Adaptation Model on applying adaptation to a hypermedia application;
Representation of the way in which both the selection and characteristic is the (virtual) construction of a
presentation of content are adapted to the user. (Houben hyperdocument. (Houben et al., 2006) 2: A hypertext and
et al., 2006) hypermedia system that can adapt various visible aspects of
the system in order to relect users features. (Wu & Chen,
Adapter 2005) 3: Focuses on adaptive presentation and adaptive
Intermediate software that understands proprietary navigation support; uses knowledge about its users and
back-end application interfaces and provides easy access can incorporate domain knowledge to adapt various visible
interfaces for EAI technology integration. (Bussler, aspects of the system to the user. (Esmahi, 2005)
2005b)
Adaptive Interfaces
Adaptive Algorithm Interfaces that allow for some user customization and
Method used to modify the ilter coeficients, online, in personalization. (Zaphiris & Kurniawan, 2005)
order to minimize the power of an adaptive ilter output
error. (Perez-Meana & Nakano-Miyatake, 2005) Adaptive Learning
An algorithm that can learn a hidden concept from
Adaptive Boosting (AdaBoost) interactive feedback provided by a user or the underlying
An iterative bootstrap replication of the sample units of the environment. (Meng & Chen, 2005)
training sample such that at any iteration, misclassiied/
worse predicted cases have higher probability to be Adaptive Personalization System
included in the current bootstrap sample, and the inal A system that changes the presentation implicitly by using
decision rule is obtained by majority voting. (Siciliano & secondary data. This data can be obtained from a variety
Conversano, 2005) of sources, for example, from the users actions, from the
behavior of other users on that site, or based on the currently
Adaptive Cognition displayed content. (Anke & Sundaram, 2006)
A cognitive style that prefers to think sequentially and
work within current paradigms. (Kaluzniacky, 2006) Adaptive Services
In order to support personalized application, a system
provides special content, presentation, and interaction
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ada pt ive Synchronizat ion Fra m e w ork (ASF) Adding Va lue 11
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
12 Addre ssa ble U nit Adult Le a r ne r
ADISSA: See Architectural Design of Information Sys- ADSL: See Asymmetric Digital Subscriber Line;
tems Based on Structured Analysis. Asymmetric DSL; Asynchronous Digital Subscriber Line;
Digital Subscriber Line.
Adjacency Matrix
A matrix representing a graph with n vertex. It is an n-by-n Adult Education
array of Boolean values with the entry in row u and column This term is used to show awareness of the reality that
v deined to be 1 if there is an edge connecting vertex u many adults come to formal educational programs with
and v in the graph, and to be 0 otherwise. (Li, 2005) different orientations to study, motivations, and prior
experiences from younger learners. These differences
ADL/SCORM ADLNet: See Advanced Distributed need to be accommodated in the learning designs used.
Learning Network. (Ching et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Adva nc e Orga nize r Ae rophone s 13
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
14 Aesthetic Integrity Afinity Portal
clarinet), double reeds (oboe), lutes, and brass (trumpet). area concerned with computing that relates to, arises from,
(Wieczorkowska, 2005) or deliberately inluences emotion. Affective computing
A expands HCI by including emotional communication,
Aesthetic Integrity together with the appropriate means of handling affective
A principle that advocates that a design should be visually information. (Pantic, 2005a)
appealing and should follow common principles of visual
designconsistency, a clear identity, a clear visual Affective Learning
hierarchy, good alignment, contrast, and proportions. The attitude of the student toward the educational
(Singh, 2005b) experience. (Woods & Baker, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Afforda nc e Age nt 15
peoples emotions, values, and belief systems. (Vrazalic 2005) 3: A computational entity capable of both perceiving
& Hyland, 2005) dynamic changes in the environment it is operating in and
autonomously performing user-delegated tasks, possibly by
A
Affordance communicating and cooperating with other similar entities.
1: Can be viewed as a property of an object that supports (De Meo, Quattrone, et al., 2005) 4: A computational entity
certain kinds of actions rather than others. (Magnani & which acts on behalf of other entities. (Karoui, 2005) 5: A
Bardone, 2006) 2: A features of an environment or artifact convenient metaphor for building software to interact with
that affords or permits certain behaviors. (Graham, the range and diversity of online resources is that of an
Allen, et al., 2005) 3: The actual or perceived properties agent. An agent is a program that performs some task on
of an object that determine how the object could be used. your behalf. You expect an agent to act even if all the details
(Yong, 2005) are not speciied or if the situation changes. You expect an
agent to communicate effectively with other agents. Using
AFIS: See Automated Fingerprint Identification agents adds a layer of abstraction that localizes decisions
System. about dealing with local peculiarities of format, knowledge
conventions, and so forth, and thus helps to understand
African Networking Renaissance and manage complexity. (Hamdi, 2005b) 6: A module that
Used to describe business organizations inding innovative is able to sense its environment, receive stimuli from the
ways of doing business by harnessing information and environment, make autonomous decisions, and actuate
communication technologies (ICTs), cultural strengths, the decisions, which in turn change the environment.
and inspiration to meet the challenges of its local needs (Soh, 2006) 7: A piece of software that autonomously
and global competition. (Averweg, 2006) performs a given task using information collected from its
environment to act in a suitable manner so as to complete
AFTA: See Australian Federation of Travel Agents. the task successfully. This software should be able to adapt
itself based on changes occurring in its environment, so
After-Action Review (AAR) that a change in circumstances will still yield the intended
The AAR process, developed mainly in the U.S. Army, is result. (Camarinha-Matos & Ferrada, 2006) 8: A program
a central building block of KM in the military, conducted designed to provide specialized and well-deined services.
immediately (or as soon as possible) after every mission, An agent can be staticexecuting on the computer where
training exercise, or project. It is a non-hierarchical it was installed, or mobileexecuting on computer nodes
knowledge event that allows debrieing, understanding, in a network. (Raisinghani, Klassen, & Schkade, 2005)
and realizing the value of tacit knowledge on the local 9: A software agent is a piece of autonomous or semi-
level. (Ariely, 2006b) autonomous, proactive and reactive computer software.
Many individual communicative software agents may
AFX: See Animation Framework eXtension. form a multi-agent system. (Guan, 2006f) 10: A software
agent is a programmable artifact capable of intelligent
Agenda Setting autonomous action toward an objective. (Nabuco et al.,
Recognition of a problem that may be solved through 2006) 11: A system that is capable of perceiving events
innovation. (Klobas & Renzi, 2005a) in its environment, or representing information about the
current state of affairs and of acting in its environment
Agent guided by perceptions and stored information (current
1: A complex system constituting elements that are deinition by AOIS, agent-oriented information system
individual performers, which can be described by their community). (Murthy & Krishnamurthy, 2005a) 12: A
interrelationships, knowledge/skill, performance and virtual representation of real or imaginary human beings
constraints factors. (Plekhanova, 2005a) 2: A component in software systems. (Arya, 2005) 13: An agent is an
of software and/or hardware that is capable of acting in encapsulated computer system that is situated in some
order to accomplish tasks on behalf of its user. Software environment and that is capable of lexible, autonomous
agents are agents in the form of programs (code) that action in that environment in order to meet its design
operate in computer environments. (Cardoso & Freire,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
16 Age nt a nd Aut onom ous Age nt Aggre gat e Func t ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Aggre gat e M at e ria lize d V ie w AI C Crit e rion 17
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
18 AI CC Alignm e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Alignm e nt M a p Am bie nt I nt e llige nc e 19
with determinant factors that affect the degree to which one Alt String
set of objectives are mutually consistent and supportive of An HTML tag for attaching text to a media object. (N.C.
the other. (Dery & Samson, 2005) 3: Explicit mapping of Rowe, 2005b)
A
characters of a sequence to characters of one or more other
sequence(s). (Tsunoda et al., 2005) 4: Means the alignment Alternative Assessment
of the strategic vision for information technology with the Activities developed by an instructor to assist the student in
organizations strategic vision, ensuring the strategic vision identifying the processes and products of learning beyond
for information technology supports the organizations the one right answer approach, and where the scoring
strategic vision. (Brabston, 2005) 5: The arrangement or rating criteria are distributed at the same time as the
or position of different separate elements (strategies) in assignment directions. (B.L. MacGregor, 2005)
relation to each other. (Johnston, 2005)
Alternative Document Model
Alignment Map A conceptual rule for grouping together Web pages into
A representation on a surface to clearly show the larger units, such as sites and domains, for more effective
arrangement or positioning of relative items on a straight data mining, particularly useful in Web-structure mining.
line or a group of parallel lines. (Alkhalifa, 2006) (Thelwall, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
20 Am biguit y AM PS
the aim of enabling a pervasive and unobtrusive intelligence American Society for Training & Development
in the surrounding environment supporting the activities (ASTD)
A and interactions of the users. Technologies like face-based Beginning in 1944, a leading association of workplace
interfaces and affective computing are inherent ambient- learning and performance professionals, 70,000
intelligence technologies. (Pantic, 2005b) members from more than 100 countriesmulti-national
corporations, medium-sized and small businesses,
Ambiguity government, and academia. (Rhoten, 2006b)
Something dificult to interpret, dificult to understand,
unclear. A situational factor proposed to contribute to the American Standard Code for Information
occurrence of Limited-Perspective Bias. (Moore & Burke, Interchange (ASCII)
2005) 1: A code for information exchange between computers
made by different companies; a string of seven binary digits
Ambiguous Deinition of Distance Education represents each character; used in most microcomputers.
There are many differing deinitions for distance education, (Rhoten, 2006a) 2. A standard method of encoding upper
spanning from videotape exchange through simple and lower case text and other symbols with a 7-bit code.
video supported to completely asynchronous (different (Kieler & West, 2005) 3: Serves a code for representing
time/different place) environments. (Martz & Shepherd, English characters as numbers with each letter assigned
2005) a number from 0 to 127. (Pang, 2005a) 4: System used to
convert simple text to computer readable form. (McCarthy,
Ambulatory Measurement Device 2005a)
A data-gathering instrument that can be worn during
everyday experiences. The device gathers biophysical Americans with Disabilities Act (ADA)
data for later transmission or reading. (Molinari, Dupler, 1: U.S. public law enacted in 1990 ensuring rights for people
et al., 2005a) with disabilities. This legislation mandates reasonable
accommodation and effective communication. (Yu, 2005a)
AMEC: See Agent-Mediated E-Commerce. 2: Section 508 of the federal Rehabilitation Act requires that
all Web sites developed with federal dollars meet certain
America Online (AOL) accessibility requirements so that those with physical or
A U.S. online service provider based in Vienna, Virginia, mental impairments can access Web-based information.
AOL claims to be the largest and fastest growing provider of This is sometimes referred to as ADA compliance.
online services in the world, with the most active subscriber (Glick, 2005a) 3: U.S. civil rights legislation passed in
base. AOL offers its three million subscribers electronic 1990 that prohibits discrimination against people with
mail, interactive newspapers and magazines, conferencing, disabilities in the areas of employment, transportation,
software libraries, computing support, and online classes, telecommunications, and public accommodation.
among other services. (Kontolemakis et al., 2005) (Schmetzke, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ana log Anchore d Le a r ning I nst ruc t ions 21
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
22 Anchoring Annot at ion
Anchoring Animation
An evaluator bias in analytic methods in which a system is 1: A graphical representation of a simulation process. The
A evaluated with respect to users too similar to the evaluator major popularity of animation is its ability to communicate
to be representative of the user population. (Danielson, the essence of the model to managers and other key project
2006a) personnel, greatly increasing the models credibility. It is
also used as a debugging and training tool. (Al-Hanbali
Andragogy & Sadoun, 2006) 2: A synthetic apparent motion created
1: The art and science of helping adults learn. (Whitield, through artiicial means. (Yong & Choo, 2005) 3: Technique
2005) 2: The study of adult education. The term andragogy of imparting motion and activity in graphic images of such
was coined by Malcolm Knowles, a leading researcher objects as products and cartoons to create a condition of
in the study of adult learners. (Ordonez, 2005) 3: This being alive, active, or spirited. (Gao, 2005b)
concept was irst developed by Knowles in the late 1960s
as a science of teaching adults; its key assumptions, Animation Framework eXtension (AFX)
based on the characteristics of adult learners, are: (1) Standard conducted by the Synthetic and Natural Hybrid
self-directedness and independence increases as a person Coding group within MPEG; its goal is to specify
matures; (2) adult experience constitutes a resource for compression schemes for 3D animation data and tools,
learning; (3) readiness to learn is related to needs, which such as body animation, image-based rendering, texture-
in turn are related to the different developmental tasks, mapping, and so forth. (Di Giacomo et al., 2005)
phases, and roles of adult life; (4) as a person matures,
his or her orientation to learn is more directed toward Animation Model
the immediacy of application and to one of problem A graphical representation of a problem situation that can
centeredness; and (5) in the adult, learning motivation is consist of a visualization of the time-ordered dynamics of
intrinsic. (Correia & Sarmento, 2005) objects, a static background, an overview of performance
indicators, and a user interface. (Janssen, 2005)
Anecdote
A naturally occurring story or the recounting of an ANN: See Artiicial Neural Network.
experience in conversation or when prompted. Anecdotes
are in effect a response to some form of stimulus and recount Annotation
real or imagined experience. (Snowden, 2006) 1: A technique for content adaptation. Special tags are
added to the HTML page to allow browsers to operate
Angle of Arrival (AOA) in a pre-deined function. (Goh & Kinshuk, 2005) 2:
1: A positioning technology in which the mobile network Also referred to as metadata; a document containing
sends directional antenna beams to locate a mobile device knowledge about another documenthence the meta
at the intersection of the directions of maximum signal preix. According to the speciication language used,
strength. (Giaglis, 2005) 2: A positioning technique that one distinguishes informal annotations (interpreted
determines a mobile users location by the angle of an by humans) and formal annotations (intended to be
incoming signal. AOA covers only the arc of a circle instead interpreted by machines). Concerning the content of these
of the whole cell. (Fraunholz et al., 2005) 3: The angle- annotations, knowledge can relate either to the contents of
of-arrival method measures the angle of a signal arriving an annotated document (e.g., by means of a collection of
at the antenna of a base station. The intersection of the concepts expressed in the document) or to a documents
projection of two calculated angles (from the antennas of overall properties (e.g., author, publication date, language
two base stations) on the two-dimensional space reveals used, etc). (Fortier & Kassel, 2006) 3: Descriptive text
the location of the mobile phone. (Ververidis & Polyzos, attached to multimedia objects. (Hurson & Yang, 2005) 4:
2006) Information about a multimedia object. This information
may directly describe the semantic content of an object
Animated Pedagogical Agents (e.g., this photo shows a cityscape) or describe its relations
Animated igures operating in a learning environment and to other external objects (e.g., this photo was made in the
aiming at supporting learners in their learning process, and year 1999). (Windhouwer & Kersten, 2005) 5: Comments,
capable of adapting their support to the learners paths. typographical corrections, hypotheses, or ratings given
(Clarebout et al., 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Annot at ion Ex t ra c t ion Algorit hm Ant hropom orphic 23
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
24 Ant hropom orphism API
Antimonotonic APA
A property of some pattern-inding problems stating that Association for Project Management. (D. Brandon,
patterns of size k can only exist if certain patterns with sizes 2005b)
smaller than k exist in the same dataset. This property is
used in level-wise algorithms, such as the a priori algorithm Apache: See Apache Software Foundation.
used for association rule mining or some algorithms for
inclusion dependency mining. (Koeller, 2005) Apache Software Foundation
1: Provides support for the Apache community of
Antinoise open source software projects. The Apache projects
Estimated replica of acoustic noise generated by an are characterized by a collaborative, consensus-based
active noise canceller system, which is used to cancel an development process, an open and pragmatic software
environmental noise. (Perez-Meana & Nakano-Miyatake, license, and a desire to create high-quality software that
2005) leads the way in its ield. Most famous projects among
them are: http (the well-known Web server), XML (an
Antivirus Software instrument for the development of Web pages based on
A class of programs that searches networks, hard drives, XMLExtended Markup Language), and Jakarta (Java
loppy disks, and other data access devices, such as CD- server). (Cartelli, 2005b) 2: An open source HTTP server
ROM/DVD-ROMs and zip drives, for any known or for operating systems, including UNIX and Windows NT.
potential viruses. The market for this kind of program has A project supported by the Apache Software Foundation.
expanded because of Internet growth and the increasing use (Goh & Kinshuk, 2005) 3: An open source Web server.
of the Internet by businesses concerned about protecting Web servers use http to enable a computer user to connect
their computer assets. (Luo & Warkentin, 2005) to the Internet. (Boateng & Boateng, 2006a)
Any Time, Any Place (ATAP) Learning APDIP: See Asia Paciic Development Information
A basic characteristic of Web-based education courses Program.
in that they are available to the student on a 24/7 basis.
(Marold, 2005) API: See Application Programming Interface.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
API CS Applic at ion Se r vic e Provide r (ASP) 25
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
26 Applic at ion Solut ion Provide rs Appre c iat ive Syst em s
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Appropriat ion Ara bizat ion 27
In order to describe and to explain the processes that approximation and the upper approximation. (Voges,
characterize social systems, it is necessary to capture 2005)
the establishing and modifying of relationships through
A
time. Vickers also rejects the cybernetic paradigm where Apriori Algorithm
the course to be steered is available from outside the 1: An eficient association rule mining algorithm developed
system, whereas systems of human activity themselves by Agrawal in 1993. Apriori employs a breadth-irst
generate and regulate multiple and sometimes mutually search and uses a hash tree structure to count candidate
inconsistent courses. Vickers model is cyclical and starts item sets eficiently. The algorithm generates candidate
with previous experiences which have created certain item sets of length k from k1 length item sets. Then, the
tacit patterns, standards, values, or norms; these lead to a patterns that have an infrequent subpattern are pruned.
readiness to notice certain features which determine which Following that, the whole transaction database is scanned
facts are relevant; the facts noticed are evaluated against to determine frequent item sets among the candidates. For
the norms, leading both to regulatory action and to the determining frequent items in a fast manner, the algorithm
modiication of the norms so that future experiences may uses a hash tree to store candidate item sets. (Huang,
be evaluated differently. The organization of this process 2005) 2: A classic algorithm that popularized association
is the appreciative system which creates an individual rule mining. It pioneered a method to generate candidate
and a social appreciative world. The appreciative settings itemsets by using only frequent itemsets in the previous
condition new experience but are also modiied by the new pass. The idea rests on the fact that any subset of a frequent
experience. Since the state of an appreciative system is itemset must be frequent as well. This idea is also known
the function of its own history, this implies that they are as the downward closure property. (Woon et al., 2005)
learning systems, and for Vickers, learning is the most 3: A level-wise algorithm for inding association rules.
central and basic social process. Soft systems methodology Apriori uses the support of an itemset to prune the search
and complex systems thinking have extended the use and space of all itemsets. It then uses the conidence metric
notion of appreciative systems. (Nobre, 2006b) to ind association rules. (Imberman & Tansel, 2006) 4:
Association rule mining algorithm that uses the fact that
Appropriation the support of a non-empty subset of an item set cannot be
The idea that active exploration enables peoplewhile smaller than the support of the item set itself. (Denton &
creating their own textsto appropriate the knowledge Besemann, 2005) 5: The method of generating candidates
that will help them read other texts. (Pryor, 2005) before testing them during a scan over the database,
insuring that if a candidate may be frequent, then it will
Appropriation and Delivery Structure be generated. See also Generating-Pruning. (Masseglia
The rules and resources that determine the choices made by et al., 2005) 6: Analysis and description of the media
educators regarding strategies for integrating the learning content at the time of insertion in the database. The gained
model(s) and supporting technologies within a selected information is stored in a database and enables content-
instructional design. (LeRouge & Webb, 2005) based retrieval of the corresponding media object without
actually accessing the latter. (Geisler & Kao, 2005)
Approved
Term used to describe an educational institution or program APS-Based Virtual Enterprise
that has the explicit recognition of an accrediting agency. A net of distributed APSs with those same objectives of
(Kostopoulos, 2005) traditional virtual enterprises, but with higher lexibility
managing partners core competences domain. (Pires et
Approximate Searching al., 2006)
Searching that permits some differences between the
pattern speciication and its text occurrences. (Navarro, AR: See Action Research.
2005)
Arabization
Approximation Set The transformation of software applications into the
An alternative (and more technically correct) name Arabic language, in terms of usage as well as interface,
for a rough set, which is deined by two sets, the lower to be able to cater for a community that stands in 2003 at
around 300 million people. (Kamel, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
28 Arbit ra ge Are a of t he Se a rch Spa c e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Areal Interpolation Artiicial Intelligence (AI) 29
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
30 Artiicial Intelligence Markup Language (AIML) ASAP System
systems that feature automated human-intelligent, rational patterns found in sample or historical data. (Kitchens,
behavior and employ knowledge representation and 2005) 3: Biologically inspired statistical tools modeled
A reasoning methods. (Heucke et al., 2005) 5: The branch after the structure of the human brain. Neural networks
of computer science concerned with making computers are composed of interconnected units or nodes (similar to
behave like humans. John McCarthy coined the term in neurons) with associated weights and activation values.
1956 while at the Massachusetts Institute of Technology. Training or learning rules are incorporated into the network
It refers to the science that provides computers with to accomplish forecasting or classiication tasks based on
the ability to solve problems not easily solved through the pattern of interconnection throughout the network.
algorithmic models. (Becerra-Fernandez & Sabherwal, (Fuller & Wilson, 2006) 4: Parallel distributed processor
2006) 6: The ield of science that studies how to make formed by single processing units that has a natural capacity
computers intelligent. It consists mainly of the ields of storing experimental knowledge and making it available
of machine learning (neuronal networks and decision for use. Artiicial neural networks are designed to model
trees) and expert systems. The principal problem is how complex problems such as time series forecasting, pattern
to represent knowledge. (Rodrguez-Tastets, 2005b) 7: recognition, and so forth. (Castro & Braga, 2006) 5: A
The study of the principles of intelligence (scientiic network of many simple processors (units or neurons)
objective), and the design and build of intelligent machines that imitates a biological neural network. The units are
like robots (engineering objective). (Gelepithis, 2005) 8: connected by unidirectional communication channels,
The use of computer systems, software, and models to which carry numeric data. Neural networks can be trained
imitate human thought and reasoning when completing to ind nonlinear relationships in data, and are used in
a task. (Ally, 2005b) applications such as robotics, speech recognition, signal
processing, or medical diagnosis. (Rabual Dopico et al.,
Artificial Intelligence Markup Language 2005) 6: A system composed of many simple processing
(AIML) elements operating in parallel whose function is determined
An XML speciication for programming chat agents like by network structure, connection strengths, and the
ALICE. The free ALICE AIML includes a knowledge base processing performed at computing elements or units.
of approximately 41,000 categories. (Sourin, 2006) (Zhou, 2005) 7: Approach based on the neural structure
of the brain with the capability to identify and learn
Artiicial Life (ALife) patterns from different situations as well as to predict
1: The synthetic or virtual approach to the study of life- new situations. (Hentea, 2005b) 8: A nonlinear predictive
like patterns (forms), behaviors, systems, and organisms, model that learns through training and resembles biological
independently of the matter used for synthesis. (de Castro, neural networks in structure. (Hamdi, 2005a) 9: Type of
2005) 2: The reproduction in digital models of certain machine learning paradigm that simulates the densely
aspects of organic life, particularly the ability of evolving interconnected, parallel structure of the mammalian brain.
adaptation through mutations that provide a better it to ANNs have been shown to be powerful tools for function
the environment. In information sciences, artiicial life approximation. (Wen, Hong, et al., 2005)
is not concerned with the physico-chemical recreation of
life. (Duchastel, 2006) Artiicially Intelligent Systems
Information systems that help users manage data and
Artiicial Neural Network (ANN) models by delivering virtual expertise and other forms of
1: A network of nodes modeled after a neuron or neural artiicial intelligence in support of these tasks. (Forgionne,
circuit. The neural network mimics the processing of the 2005)
human brain. (Garrity et al., 2005) 2: Commonly referred to
as neural network or neural net, a computer architecture AS: See Autonomous System.
implemented in either hardware or software, modeled
after biological neural networks. Nodes are connected in a ASAP System
manner suggestive of connections between the biological The abbreviation of a synchronous approach for photo
neurons they represent. The resulting network learns sharing across devices to facilitate photo viewing across
through directed trial and error. Most neural networks multiple devices, which can simultaneously present
have some sort of training algorithm to adjust the similar photos across multiple devices at the same time for
weights of connections between nodes on the basis of comparative viewing or searching. (Hua et al., 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
ASCI I Asse ssm e nt 31
ASCII: See American Standard Code for Information beneits so they dedicate their efforts to the project. (Sipior,
Interchange. 2005) 3: Expression in a relational database system that
allows stating a condition involving several attributes and
A
ASEAN several tables. Assertions are irst-class database entities,
Association of Southeast Asian Countries. (Sanzogni & such as tables. (Badia, 2005b)
Arthur-Gray, 2005)
Assertion Between Knowledge Patterns
ASF: See Adaptive Synchronization Framework. A particular interschema property. It indicates either
a subsumption or an equivalence between knowledge
Asia Paciic Development Information Program patterns. Roughly speaking, knowledge patterns can be
(APDIP) seen as views on involved information sources. (De Meo,
The regional ICT program of UNDP. (Hutchinson, Terracina, et al., 2005)
2005)
Assertion of Copyright
Asia-Paciic Telecommunity Retention of the protection right of copyright by an
A 32-member body established in 1979 through joint individual, and hence the ability to collect any royalties
initiatives of the United Nations Economic and Social that may be apportioned. (Fleming, 2005b)
Commission for Asia & the Paciic and the International
Telecommunication Union. Members of the APT include Assertional Reasoning
governments, telecom service providers, manufactures of A description logic knowledge base is made up of two parts,
communication equipment, and research and development a terminological part (the terminology or Tbox) and an
organizations. (Hassall, 2005) assertional part (the Abox), each part consisting of a set of
axioms. The AbBox contains extensional knowledge that
ASP: See Application Service Provider; Active Server is speciic to the individuals of the domain of discourse.
Page Scripting. There has been a great deal of work on the development
of reasoning algorithms for expressive DLs, but in most
ASP Aggregator cases these only consider Tbox reasoning. Reasoning
The ASP aggregator model is based on the premise that mechanisms for the Abox (i.e., instance checking) are
the rapid proliferation of irms offering ASP services called assertional reasoning. Assertional reasoning is
has created an overly complex market for medium-sized important for real Semantic Web applications. (Roldn-
enterprises to deal with when investigating application Garca et al., 2005)
outsourcing options. (Guah & Currie, 2005)
Assessment
Aspect 1: A process by which learning is measured, often through
Deines a set of related node properties, attributable to content-related assignments such as papers, projects, or
nodes with the same value for an aspect descriptor. For a tests. (Hawkins & Baker, 2005) 2: A process of assisting an
given node, aspects can be added and removed at runtime individual with a disability in the selection of appropriate
by manipulating the values for its aspect descriptors. assistive technology devices and/or conigurations of
(Lemahieu, 2005) standard information technology devices. (Trewin &
Keates, 2006) 3: Determining how much someone has
Aspect Descriptor learned or how well someone understands a particular
Attribute for which each possible value deines an aspect subject. (Bieber et al., 2005) 4: Process by which learning
of a node. (Lemahieu, 2005) gains or performance chance are measured and labelled
according to a consistent scoring criterion. (Collis &
Assertion Moonen, 2005a) 5: Systematic evaluation of student work
1: A statement (entity deinition, attribute value, constraint, and learning based on scoring criteria and leading to a mark
rule, function, and the like) assumed to be true and therefore or grade. (Collis & Moonen, 2005b) 6: The evaluation of
supporting the theory of the ontology. Example: Gravity the amount, value, quality, or importance of something.
is an attracting force in nature. (Buchholz, 2006) 2: (Kung-Ming, 2005) 7: The process of comparing the
Authoritatively convincing others of a projects potential actual measurements of the characteristics of interest with
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
32 Asse ssm e nt of Le a r ning Out c om e s Assoc iat ion Ana lysis
Assignment Association
A repartition in which we allocate the available resources 1: A relationship between two statistical variables. Unlike
to achieve the different tasks. (Kacem, 2005) a correlation, an association does not yield a quantitative
result, but is contingent upon the ranking of the bivariate
Assisted Global Positioning System (A-GPS) data values only. (Mullany, 2005) 2: A technique in data
1. A variation of the global positioning system (GPS) in mining that attempts to identify similarities across a set
which the mobile network or a third-party service provider of records, such as purchases that occur together across a
assists the mobile handset in determining its geographical number of transactions. (Amaravadi, 2005) 3: The degree
position (either by directing it to look for speciic satellites to which participation in global communication confers
or by collecting data from the handset to perform location on participants some of the prestige associated with more
identiication calculations that the handset itself may glamorous lifestyles. (Pryor, 2005)
be unable to perform due to limited processing power).
(Giaglis, 2005) 2: A system that uses measurements from Association (Undirected Association Rule)
ixed GPS receivers scattered throughout the mobile A subtuple of a bag relation whose support is greater than
network in order to assist a mobile phone in locating the a given threshold. (T. Y. Lin, 2005)
available satellites and calculating its location. (Ververidis
& Polyzos, 2006) Association Analysis
Use of statistics criteria to measure the proximity of two
Assistive and Augmentative Communication distinct objects or texts using some of their properties
A multidisciplinary ield that seeks to design devices and or attributes. A method for identifying correlation
methods to alleviate the problems faced by physically or dependencies among elements or attributes, using
challenged people running programs they do not know statistical techniques. (Antonio do Prado et al., 2005)
and/or trust. (Abhishek & Basu, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Assoc iat ion of Re se a rch Libra rie s (ARL) Assoc iat o
i n Rule Disc ove r y 33
Association of Research Libraries (ARL) likely to satisfy the conditions of Y. (Chung & Mangamuri,
An organization that unites the 123 leading research 2005) 14: The implication of connections for variables
libraries in North America. (McCarthy, 2005b) that are explored in databases, having a form of AB,
A
where A and B are disjoint subsets of a dataset of binary
Association Rule attributes. (Wu & Lee, 2005) 15: An implication of the form
1: A kind of rule in the form X Ij, where X is a set of A B, where A and B are database itemsets. Association
some items and Ij is a single item not in X. (Wong & Fu, rules must satisfy the pre-set minimum support (minsup)
2005) 2: A pair of frequent itemsets (A, B), where the ratio and minimum conidence (minconf) constraints. (Daly
between the support of AB and A itemsets is greater than & Taniar, 2005a) 16: An implication rule between two
a predeined threshold, denoted minconf. (Dumitriu, 2005) itemsets with statistical measures of range (support) and
3: A relation between the occurrences of a set of items precision (conidence). (Pasquier, 2005) 17: An implication
with another set of items in a large data set. (Jha & Sural, rule that brings out hidden relationships among attributes
2005) 4: A rule in the form of if this, then that. It states on the basis of co-occurrence of attributes. In the market-
a statistical correlation between the occurrence of certain basket context, it informs about items that are likely to
attributes in a database. (Huang, 2005) 5: A rule of the be purchased together, thereby providing an insight into
form AB, meaning if the set of items A is present in a customer purchasing behavior. Formally, an association
transaction, the set of items B is likely to be present too. rule is an implication of the form A B, where A and B
A typical example constitutes associations between items can be single items or sets of items, with no commonality
purchased at a supermarket. (Denton & Besemann, 2005) between sets A and B, e.g., {Bread} {Butter}, {Bread,
6: A rule relating two itemsetsthe antecedent and the Jam} {Butter}, and so forth. An association rule is
consequent. The rule indicates that the presence of the characterized by two measures, support (a statement
antecedent implies that the consequent is more probable of generality) and conidence (a statement of predictive
in the data. Written as (Butler & Webb, 2005) 7: A rule ability). These rules are very general, having a simple
showing the association between two or more nominal interpretation with minimal restrictions on their structure.
attributes. Associations can be directed or undirected. For {Bread} {Butter} with support =20% and conidence =
instance, a rule of the form, If the customer buys French 60% means that 60% of the transactions that contain Bread
fries and hamburgers she or he buys ketchup, is a directed also contain Butter, and they are purchased together in 20%
association rule. The techniques for learning association of the transactions. (Natarajan & Shekar, 2006) 18: Let
rules are speciic, and many of them, such as the Apriori X1, .., Xp be a collection of random variables. In general, a
Algorithm, are based on the idea of inding frequent item pattern for such variables identiies a subset of all possible
sets in the data. (Hernandez-Orallo, 2005b) 8: A statement observations over them. A rule is a logical statement
A => B, which states that if A is true, then we can expect between two patterns, say a and b, written as ab. (Giudici
B to be true with a certain degree of conidence. A and & Cerchiello, 2005) 19: Predicts the occurrence of an event
B are sets of items, and the operator is interpreted as based on the occurrences of another event. (Yeo, 2005) 20:
implies. (Ale & Rossi, 2005) 9: An association between Uncovering interesting trends, patterns, and rules in large
two sets of items co-occurring frequently in groups of data. data sets with support s and conidence c. (Swierzowicz,
(Meo & Psaila, 2005) 10: An association has the form 2005) 21: Used to associate items in a database sharing
I1I2, where I1 and I2 are two itemsets. The support of an some relationship (e.g., co-purchase information). Often
association rule is the support of the itemset I1I2, and the takes the form if this, then that, such as, If the customer
conidence of a rule is the ratio of support of I1I2 and the buys a handheld videogame, then the customer is likely
support of I1. (Zhou & Wang, 2005) 11: An implication to purchase batteries. (Schafer, 2005)
rule XY that shows the conditions of co-occurrence of
disjoint itemsets (attribute value sets) X and Y in a given Association Rule Discovery
database. (Shen, 2005) 12: Given a set I = { i1, i2, i3, in} 1: A rule in the form of if this, then that which associates
of items, any subset of I is called an itemset. Let X and Y events in a database. Association rule discovery can be
be subsets of I such that XY = . An association rule is used to ind unordered correlations between items found
a probabilistic implication X Y. (Imberman & Tansel, in a set of database transactions, such as the association
2006) 13: Implication of the form X Y, meaning that between purchased items at a department (Hu, Yang, Lee,
database tuples satisfying the conditions of X are also
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
34 Assoc iat ion Rule M ining Asynchronous
Assurance Asymmetry
Statement, indication, or presumption that inspires Used in IT to mean that parties are heterogeneous and
conidence while excluding doubt. Assurance is an aspect possess diverse knowledge bases. Asymmetry manifests
of trust. Given the fact that trust cannot be quantiied also in corporate culture and management. (Blomqvist,
precisely, assurance provides a basis for quantitatively or 2005)
qualitatively specifying the level of trust towards a system.
(Oermann & Dittmann, 2006) Asynchronous
1: A form of online discussion among students, workers,
Assured Forwarding (AF) or instructors. Participants post comments, opinions,
A per-hop behavior deined in DiffServ. AF provides relections, or questions to a type of online discussion
different levels of forwarding assurances depending on board. Participants can read and respond to others
available resources, the current number of lows in that postings. Participants can access or post at any time.
AF class, and the drop precedence associated with the IP (Iannarelli, 2005) 2: Communication between parties in
datagram. (DaSilva, 2005) which the interaction does not take place simultaneously.
(Danenberg & Chen, 2005) 3: Communication occurring
Ast: See Attitude Toward the Site. via a time delay, such as posts to an electronic bulletin
board. (Hawkins & Baker, 2005) 4: Communication that
ASTD: See American Societ y for Training & allows for the sharing of ideas over a period of time, such
Development. as through discussion boards, e-mail, or a newsroom. (Etter
& Byrnes, 2005) 5: Communications between the student
Asymmetric Communication and teacher which do not take place simultaneously. (T.
A process in which both communicating parties are at Cavanaugh, 2005) 6: Denotes a communication method
different levels of economic and social development. which participants use to interact in a time-delayed context,
(Targowski & Metwalli, 2005) that is, without everyone gathering at a particular time.
(Al-Saggaf & Weckert, 2005) 7: Occurring at different
Asymmetric Cryptography times. In the context of communications technologies,
A data encryption system that uses two separate but asynchronous technologies allow communicators to
related encryption keys. The private key is known only to interact with the conversation at different timesfor
its owner, while the public key is made available in a key example, e-mail or threaded discussions. (Newberry,
repository or as part of a digital certiicate. Asymmetric 2005) 8: Occurring at different times; typically used to
cryptography is the basis of digital signature systems. refer to technologies such as a discussion board or e-mail
(Richter & Roth, 2006) that may be utilized at the users convenience. (Ordonez,
2005) 9: Online, asynchronous refers to communication
Asymmetric Digital Subscriber Line (ADSL): See that occurs at different times. Common examples of
Digital Subscriber Line. asynchronous communications are e-mail, ListProc
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Asynchronous Colla borat ion Asynchronous Com put e r-Me diat e d Com m unic at ion 35
(listerserv), or the WebCT discussions tool. (Paoletti, often taking place in geographically dispersed locations
2005) 10: Out of synchronicity. Conversations with time and time zones. (Wong-MingJi, 2005) 10: Information
lags, as in e-mail. (Coakes, 2006b) 11: Refers to the ability sharing and interaction between individuals taking place at
A
of learners to complete required tasks at different times. different times, as in the sending of e-mails where messages
Discussion tools (i.e., bulletin boards) are examples of are sent and then read at a later time. (Ally, 2005d) 11:
asynchronous tools used in the Web-based environment. The sharing of messages with delayed feedback. (Han &
(Morphew, 2005) 12: The 24-hour classroom discussion Hill, 2006) 12: When participants decide when to retrieve
is always open; plenty of time for relection, analysis, and and respond to others in the online environment through
composition; encourages thinking, retrospective analysis; tools such as discussion boards and e-mail. (S.-K. Wang,
the whole transcript discussion is there for review; class 2005) 13: Communications that occur between two or
discussion is open ended, not limited to the end of a period. more people in which the method of communication of
(Nandavadekar, 2005) 13: Time-delayed interaction that one or more individuals does not occur at the same time
does not require participants to be online simultaneously; as the others involved (Day, 2005) 14: When messages
individuals send or post messages, and the recipients read are exchanged during different time intervals (Burke et
them at a later time. (Woods & Baker, 2005) al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
36 Asynchronous Coope rat ion Asynchronous Le a r ning
Asynchronous Cooperation mail, and video programming, and the implicit absence of
Members are not present in the same time within the immediate interaction with the teacher or other students.
A cooperation group (no co-presence). They communicate (C. Wright, 2005)
with asynchronous media (e.g., e-mail messages) on top
of extended and improved message systems. (Villemur Asynchronous Distance Learning
& Drira, 2006) The mode of distance learning where provider and recipient
are communicating off-linethat is, leaving messages for
Asynchronous Delivery Mode each other or viewing each others pre-recordings while
Material to be delivered is made available by the instructor geographically apart. (Kostopoulos, 2005)
through technology, and students are able to access the
material based upon their own schedules. (Hunter & Asynchronous Group Communication
Carr, 2005) Technology
Allows participants to send and respond to messages
Asynchronous Digital Subscriber Line (ADSL) without being online simultaneously. (Alavi et al., 2005)
A digital switched technology that provides very high data
transmission speeds over telephone system wires. The Asynchronous Instructional Dyad
speed of the transmission is asynchronous, meaning that Material placed on electronic media for access by students
the transmission speeds for uploading and downloading as needed; an example is a detailed instruction sheet that
data are different. For example, upstream transmissions supplements explanations given during regular class
may vary from 16 Kbps to 640 Kbps, and downstream sessions. (Lerch et al., 2005)
rates may vary from 1.5Mbps to 9Mbps. Within a given
implementation, the upstream and downstream speeds Asynchronous Interaction
remain constant. (Raisinghani & Ghanem, 2005) 1: Communication that takes place over a network at
different times. Examples of asynchronous interaction
Asynchronous Discussion include communication via group support systems, e-
1: Discussion that occurs irrespective of time and location. mail, and electronic bulletin boards. The opposite of
Asynchronous discussion allows readers (e.g., from asynchronous interaction is synchronous interaction,
different time zones and/or at different times) to create which occurs when participants interact over a network
and respond to learners who are typically not online simultaneously (i.e., in real time). (Klein, 2005) 2:
at the same time. (Bedard-Voorhees, 2005) 2: Online Interactions that do not take place simultaneously for the
discussions that occur independent of time and space. involved participants (e.g., email communication). (Taylor
Participants do not have to be online simultaneously, and et al., 2005)
can read and contribute to the conversation on their own
schedules. (Ingram, 2005) 3: The exchange of information Asynchronous Learning
that occurs over a period of time. This discussion method 1: A type of learning that is both time and location
allows for relection and considered opinions. (Ingram & independent; the learner can be located anywhere and
Hathorn, 2005b) contribute anytime. Also called delayed learning as
opposed to real-time learning. (Bonk et al., 2005) 2:
Asynchronous Discussion Forum Learners use a computer and communications technologies
This is at the heart of many computer-based courses. It is the to work with remote learning resources, without the
place where student-student and student-faculty interaction requirement to be online at the same time or in the same
occurs and learning takes place. The participants in the location. Participation in online discussion boards is an
discussion need not be present in the learning environment example of asynchronous learning. (Chapman, 2005a) 3:
at the same time, and they make contributions to selected Learning in which interaction between instructors and
threads as needed. (Shaw, 2005) students occurs intermittently with a time delay. Examples
are self-paced courses taken via the Internet or CD-ROM,
Asynchronous Distance Delivery Q&A mentoring, online discussion groups, and e-mail.
An anytime, anywhere experience where all participants (Torres-Coronas, 2005) 4: Learning that occurs at the place
work independently at times convenient to them and that and time of the students choosing, not the instructors.
includes methods such as online discussion boards, e-
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Asynchronous Le a r ning N e t w ork (ALN ) At om a 37
(Novitzki, 2005) 5: Online courses that allow students Technology that does not require real-time, simultaneous
to participate at anytime from any location with Internet participation, and that does not support anytime, anyplace
access. (Lazarus, 2005b) communication. (Wild, 2005)
A
Asynchronous Learning Network (ALN) Asynchronous Transfer Mode (ATM)
1: Technology-enabled networks for communications and 1: A high-speed transmission protocol in which data blocks
learning communities. (Moore et al., 2005) 2: Anytime, are broken into cells that are transmitted individually
anywhere education using computer and communication and possibly via different routes in a manner similar to
technologies without the requirement for learners to packet-switching technology. (Raisinghani & Ghanem,
be online at the same time. (Rovai & Gallien, 2006) 2005) 2: A network technology based on transferring
3: Communication between people that does not occur data in cells or packets of a ixed size. The small, constant
simultaneously. (Brown, 2006) cell size allows ATM equipment to transmit video, audio,
and computer data over the same network, and assure
Asynchronous Learning Tool that no single type of data hogs the line. (Wong, 2006)
Software package designed to support education at any 3: A high-speed, low-delay, multiplexing and switching
location and at any time. (Novitzki, 2005) technology that allows voice, image, data, and video
to be transmitted simultaneously rather than through
Asynchronous Media trafic-speciic networks. (Hin & Subramaniam, 2005c)
Delayed delivery of media (e.g., video, e-mail). (Whateley 4: A transmission technique that transmits combined
et al., 2005) information in small, ixed-size packets called ATM cells.
(Louvros, Karaboulas, et al., 2005)
Asynchronous Mode
A non-real-time education where students and teachers Asynchrony
interact with each other, but not at same time, e.g., by A condition whereby events occur that are not coordinated
using a bulletin board or e-mail. (Lammintakanen & in time. In online education, asynchrony makes it possible
Rissanen, 2005a) to perform course tasks at the most convenient time, not
tied to a schedule. (Rollier & Niederman, 2005)
Asynchronous Online Distance Education
Courses that use software that contains course content ATAP: See Any Time, Any Place Learning.
and pedagogy that allow students to participate when and
where they want. (Novitzki, 2005) ATC: See Air Trafic Control.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
38 At om ic Broa dc a st At t it ude Tow a rd t he Sit e (Ast )
functionality for representing and manipulating the entity. with the attention-related constructs are what we presume
(Lepouras et al., 2006) to be detecting in dual-task studies. (Owen, 2006c)
A
Atomic Broadcast Attention Object
Requires that each correct process deliver all messages An information carrier that delivers the authors intention
in the same orderthat is, a reliable broadcast with total and catches part of the users attention as a whole. An
order. (Muoz-Esco et al., 2005) attention object often represents a semantic object, such
as a human face, a lower, a mobile car, a text sentence,
Atomic Transaction and so forth. (Hua et al., 2006)
A transaction whose updates are either all executed or
removed (the A in the ACID properties). The atomicity Attention-Based IT Infrastructure
property makes it easier to complete database recovery. An IT infrastructure that is able to sort through volumes
(Frank, 2005b) of data and produce the right information at the right
time for the right persons to consume. (Chen, Zhang, et
At-Risk Learners al., 2005b)
Typically individuals who struggle with the structure
and/or content of formal education. (Crichton, 2005) Attention-Deicit Principle
Recognizes that organizations have limited attention
Attachment capacity, and attention should be treated as a resource that
An extra ile, in any ile format, that is linked to a e-mail needs to be managed. (Yaniv & Schwartz, 2006)
message. The e-mail message itself must structurally
conform to messaging protocols. (Horiuchi, 2005b) Attentional Capacity
Cognitive capacity divided and allocated to perform
Attacks cognitive task. (Seta, 2006)
Any processing that circumvents the intended purpose of
the watermarking technique for a given application. An Attentive User Interfaces
attack potentially breaks the robustness of the watermark. AUIs are based on the idea that modeling the deployment of
(Sattar & Yu, 2006) user attention and task preferences is the key for minimizing
the disruptive effects of interruptions. By monitoring the
Attack Signature users physical proximity, body orientation, eye ixations,
Patterns observed in previously known attacks that are and the like, AUIs can determine what device, person,
used to distinguish malicious packets from normal trafic. or task the user is attending to. Knowing the focus of
(Syed, Nur, et al., 2005) attention makes it possible in some situations to avoid
interrupting the users in tasks that are more important
Attack vs. Intrusion or time-critical than the interrupting one. (Oulasvirta &
A subtle difference, intrusions are the attacks that succeed. Salovaara, 2006)
Therefore, the term attack represents both successful and
attempted intrusions. (Kayacik et al., 2005) Attenuation
Loss of signal strength and power as a signal passes through
Attention the optical iber medium. (Littman, 2006)
1: An internal cognitive process by which one actively
selects which part of the environmental information Attitude Toward the Ad (Aad)
surrounds them and focuses on that part or maintains A mediator of advertising response that inluences brand
interest while ignoring distractions. (Alkhalifa, 2006) attitude and purchase intentions. (Gao et al., 2006)
2: Mental processing that consumes our conscious
thinking. Through a variety of mechanisms, there is a Attitude Toward the Site (Ast)
limit to the amount of processing that can take place in our A Web users predisposition to respond either favorably or
consciousness. (Owen, 2006b) 3: Associated with a variety unfavorably to a Web site in a natural exposure situation.
of more speciic constructs such as mental effort, mental (Gao, 2005b)
focus, mental elaboration, and such. Processes associated
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
At t ribut e Audio Brow se r 39
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
40 Audio File Aut he nt ic at ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Aut he nt ic at ion Syst e m Aut horing Tool 41
so on. (Mundy & Otenko, 2005) 5: Method of assuring the as opposed to passive reception. This is the only way in
identities of entities engaged in electronic communication. which an individual can relate incoming information to
(Calzonetti & deChambeau, 2006) 6: A set of procedures the context of his or her own lifeworld, without which
A
employed to verify the identity of an entity. (Buche & meaning does not exist for that person. We often sense
Vician, 2005) 7: Technique by which a process veriies that the lack of authenticity in interaction without necessarily
its communication partner is who it is supposed to be and understanding our own misgivings. (Kettley, 2006b) 3:
is not an imposter. It makes sure that the parties engaging Undisputed credibility of being genuine, honest with
in business are who they claim to be. Integrity allows the oneself as well as others; an absence of hypocrisy or self-
system to verify whether modiications have occurred; it deception. (Park, 2006)
does not ensure that information was not altered. (Pierre,
2006b) 8: The action of verifying information such as Author
identity, ownership, or authorization. (Vatsa et al., 2005) 9: Much of the philosophy extended in analyses of technology
The process by which a contemporary biometric sample is stems from literary theory. Author has connotations
acquired from an individual and is used to compare against synonymous with artist and designer, and may be useful
a historically enrolled sample. If the samples match, the in future discussions regarding terminology across more
user is authenticated. Depending on the type of system, or less user-centered processes. (Kettley, 2006a)
the authentication may be prompted by some additional
informationa key to the identity of the user or the Author Cocitation Analysis
pseudonym against which the enrolled data was registered. The analysis of how authors are cited together. (Chen &
(Fleming, 2005a) 10: The process of determining whether Liu, 2005)
someone or something is who or what they declare to be.
In private or public computer networks, authentication is Authoring
commonly done through the use of logon passwords or The creation and organization of multimedia or hypermedia
digital certiicates. (Butcher-Powell, 2005) 11: The process content. (Lemahieu, 2005)
of ensuring that an individual is who he or she claims to be.
(Guan, 2006h) 12: Veriication that one is who they say they Authoring Language
are. (Lawson-Body et al., 2005) 13: Biometric identiiers A program designed for use by a non-computer expert
operate either in veriication (authentication) mode or in to create e-learning products. An authoring system does
a recognition (identiication) mode. A veriication system not require programming knowledge to operate. It allows
authenticates a persons identity by comparing the captured the placement of graphics, text, and other multimedia
biometric characteristic with the persons own biometric elements into an e-learning program. It functions like
original. In a recognition system, the system establishes word processing software. (Kapp, 2005)
a subjects identity by searching the entire template for a
match, without the subject initially claiming an identity. Authoring Program
(Scott et al., 2006) Software used to develop multimedia applications. (Berg,
2005e)
Authentication System
System used to verify the identity of an entity (user, Authoring Shell
application, host, system, device) that is attempting to Internet-based template that consists of various electronic
participate in a computing environment. (Knight & tools and functions with which a user can create a
Labruyere, 2005) customized Web environment. (Ketelhut et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
42 Aut horit y Aut om at e d Por t Sc a n
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Aut om at e d T he ore m Prove r Aut onom ous Le a r ning 43
Automated Theorem Prover new content on the basis of the learners response to content
A software tool that (semi-)automatically performs presented by the machine. (Aworuwa & Owen, 2005)
mathematical proofs. Available theorem provers range
A
from fully interactive tools to provers that, given a proof, Automatic Tutoring Device
check if the proof is correct with no further interaction A device that uses programmed branching and adaptive
from the user. (Campos & Harrison, 2006) feedback. Learning results from cognitive reasoning.
(Owen & Aworuwa, 2005)
Automatic Classiication
The process by which a classiicatory system processes Automatically Deined Function (ADF)
information in order to classify data accurately; also the Parametric functions that are learned and assigned names
result of such process. (Wieczorkowska, 2005) for reuse as subroutines. ADFs are related to the concept
of macro-operators or macros in speedup learning. (Hsu,
Automatic Documentation 2005b)
Allows for a structured view of the application and
generates books of HTML documentation. Knowledge Automation
minings automatic documentation focuses on the The technique, method, or system of operating or
ability to save diagrams and reports in various formats. controlling a process by highly automatic means, as by
(Raisinghani, 2005) electronic devices, reducing human intervention to a
minimum. When applied to education, automation means
Automatic Facial Expression Analysis increasing teacher/student ratio, reducing teacher/student
A process of locating the face in an input image, extracting contact, and reducing qualiied staff with automated
facial features from the detected face region, and classifying teaching methods and tutorials. (Reilly, 2005)
these data into some facial-expression-interpretative
categories such as facial muscle action categories, emotion Automatism
(affect), attitude, and so forth. (Pantic, 2005b) An attention mechanism established through practice
whereby the performance of a task apparently no longer
Automatic Indexing interferes with the concurrent performance of other tasks.
A process that algorithmically examines information items (Owen, 2006b)
to build a data structure that can be quickly searched. (Hu,
Yang, Yeh, et al., 2005) Autonomous Agent
1: A system situated within an environment and a part
Automatic Teller Machine (ATM) System of an environment that senses that environment and acts
A system installed by a bank in different locations in on it, over time, in pursuit of its own agenda, so as to
order to enable customers to access their bank accounts affect what it senses in the future. (Raisinghani et al.,
and withdraw cash from them. (Al-Hanbali & Sadoun, 2005) 2: Software components capable of working for the
2006) performance of tasks to the beneit of its users. An agent is
anything that can be viewed as perceiving its environment
Automatic Thesaurus Construction through sensors and acting upon that environment through
The process of using a computer to automatically extract actuators. (Castro & Braga, 2006)
thesauri from texts. (Kulyukin & Nicholson, 2005)
Autonomous Information System
Automatic Transcription Information system existing as an independent entity.
The process of extracting the musical content from an (Ras & Dardzinska, 2005)
audio signal and representing it in standard music notation.
(Dixon, 2005) Autonomous Learning
The student is engaged in the learning environment
Automatic Tutoring independent of instructor guidance/supervision and
Programmed-machine methods that interact with the peer interaction/communication. S/he takes primary
learner in a way that mimics a human teacher by adjusting responsibility for her/his learning needs and goals, as well
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
44 Aut onom ous Produc t ion Syst e m Ave ra ge Pre c ision (P_Avg)
as for self-assessment of work completed. (McCracken, (Oermann & Dittmann, 2006) 2: Availability of data is the
2005) degree to which a system is operable and in a committable
A state at the start of an assignment. (Mitrakas, 2006) 3:
Autonomous Production System Prevention of unauthorized withholding of information
Part of a company directly exposed to the market which is or resources. (Tong & Wong, 2005a)
able to become part of a virtual enterprise when an adequate
business opportunity arises. (Pires et al., 2006) Availability of Data
The probability of having access to the data. Replication
Autonomous Robot will normally increase data availability. (Frank, 2005a)
A robot that is capable of existing independent of human
control. (Hall & Woods, 2006) Avatar
1: A computer-generated representation almost always
Autonomous Software Agent graphical in nature, and sometimes a three-dimensional
An agent with the ability to anticipate changes in the construct that represents the user/operator in the virtual
environment so that the agent will change its behavior world. (Ajiferuke & Markus, 2005) 2: A graphical
to improve the chance that it can continue performing its representation of a user or a character controlled by a user.
intended function. (Zwitserloot & Pantic, 2005) (Champion, 2006b) 3: A virtual representation generated
by computers. It can be, for example, a copy of a users
Autonomous (Sub)System body to try on virtual clothes. (Volino et al., 2005) 4: An
A system that decides about its own information input and image representing a user in a multi-user virtual reality
output requirements. (Szczerbicki, 2005) space. (Yong & Choo, 2005) 5: Personiication of a user
in a graphic virtual reality. An avatar can be an icon, an
Autonomous System (AS) image, or a character, and it interacts with other avatars in
1: A network where the main routers are in common the shared virtual reality. The term is drawn from the Hindu
administration. The Internet is composed of peering culture, where it refers to the incarnation of a deity. (Pace,
ASs. (Hosszu, 2005a) 2: A basic building element of 2005) 6: The computer-simulated graphic of the human
the Internet. Each AS is independent from the others. body in which speciic physical and mental attributes
(Hossz, 2006) are embodied. (Park & Lepawsky, 2006) 7: The word
comes from Indian culture and means reincarnation.
Autopoietic System On the Internet, the word is used to describe the object
A self-making or self-organizing system. (Murphy, representing the user in forms of two- or three-dimensional
2005a) photo, design, picture, or animation. (Pys & Lowyck,
2005) 8: Computer-generated personas that are adopted by
Autoregressive users to interface with other humans and agents involved
Uses historical data to predict future results. (Kushnir, in a social interaction, particularly in interacting in online
2006) virtual reality worlds. (Duchastel, 2006) 9: Synthetic
representation of a human body able to be animated.
Auxiliary View Avatars are often used in games for representing players
A view materialized in the DW exclusively for reducing the or in virtual environments when the presence of the user
view maintenance cost. (Theodoratos & Simitsis, 2005) must be visible. (Prteux & Preda, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
AV LE Ax iom at ic T he or y 45
Awareness Model
A model that represents various levels of awareness. Level-
0 awareness consists of the concepts that lead an actor
to knowledge about all the tasks that an actor performs
within the process. A roles level-3 awareness is its level-
2 awareness, plus awareness about all the interactions
(represented by the process resources used/shared) that
occur between any two roles within the process. And
inally, level-4 awareness is the highest level of awareness
that a role can have in any ERP process. It is deined as
the knowledge about how everything its together to form
the ERP process. (Daneshgar, 2005)
Axiom
1: A rule or maxim accepted as a truth in the ontology.
Axioms provide the inferencing or logical power of the
ontology. Example: If and only if a wine is red, then it
is derived from a grape that is red. (Buchholz, 2006) 2:
A generally accepted proposition or principle sanctioned
by experience; a universally established principle or law
that is not necessarily true. (Polgar, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
46 BA Ba ck propa gat ion Algorit hm
B
BA: See Behavior Aggregate. data that was not used to optimize model parameters.
(Kushnir, 2006)
Ba
A physical, virtual, or mental context that enables effective Backbone Network
knowledge creation; based on the Japanese idea of place. Long-haul networks such as CA*net 4 and GANT 2,
(Medeni, 2006a) Long-Haul that interconnect network segments in WAN
conigurations to facilitate resource sharing and e-
Back Propagation collaborative information exchange. (Littman, 2006)
A training method used to calculate the weight in a neural
net from the data. (Kumar, 2005) Backpropagation
1: A learning algorithm for modifying a feed-forward
Back-Channel neural network which minimizes a continuous error
The standard use of e-mail, person to person, without function or objective function. Back-propagation is
routing through the communitys available channels. a gradient descent method of training in that it uses
(Patrick et al., 2006) gradient information to modify the network weights to
decrease the value of the error function on subsequent
Back-End Application System tests of the inputs. Other gradient-based methods from
A software system that manages business domain-speciic numerical analysis can be used to train networks more
data for businesses, e.g., enterprise resource planning eficiently. (Kitchens, 2005) 2: A neural network training
(ERP) systems. (Bussler, 2005a) algorithm for feed-forward networks where the errors
at the output layer are propagated back to the previous
Back-End Interoperability layer to update connection weights in learning. If the
Business-process-centric integration approach that previous layer is not the input layer, then the errors at this
interconnects different application systems in order to hidden layer are propagated back to the layer before. (An,
enable the execution of cross-organizational business 2005) 3: Method for computing the error gradient for a
processes. (Werth, 2005) feed-forward neural network. (Yeo, 2005) 4: The name
of the most common learning algorithm for MFNNs. It
Back-End Processing involves modifying the weights of the MFNN in such a
Dealing with the raw data, which is stored in either tables way that the error (difference between the MFNN output
(ROLAP) or arrays (MOLAP). (Tan, 2005b) and the training data desired output) is minimized over
time. The error at the hidden neurons is approximated by
Back-End System propagating the output error backwards, hence the name
The support components of a computer system. Typically backpropagation. (Smith, 2005)
refers to the database management system (DBMS), which
is the storehouse for the data. (Mockler et al., 2006) Backpropagation Algorithm
Learning algorithm of artiicial neural networks based
Back-Testing on minimizing the error obtained from the comparison
Testing a mathematical model for its performance over between the outputs that the network gives after the
past intervals. Back-testing often uses out-of-sample application of a set of network inputs and the outputs it
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ba ck propa gat ion, Fe e d-Forw a rd N e ura l N e t w ork Ba ndwidt h 47
should give (the desired outputs). (Rabual Dopico et Balanced Scorecard Collaborative
al., 2005) A strategic management system that measuresby means
of quantitative relations of different selected variablesthe
B
Backpropagation, Feed-Forward Neural behavior of the organization, taking into account the settled
Network aims established in different perspectives (e.g., increase,
A type of neural network popular for use in classiication internal processes, customers, inances). The analysis is
data mining. The neurons in a feed-forward network are based on the cause-effect relations between the variables
organized into an input layer and enable the network to and ratios that represent them. (Xodo & Nigro, 2005)
represent the knowledge present in the data. (Fuller &
Wilson, 2006) Balancing (Counteracting) Feedback
A systemic pattern that is responsible for stability, balance,
Backsourcing and control. It represents adjusting, correcting, and
Taking work that had been outsourced back in-house. counteracting processes that resist, slow down, or impede
(Beaumont, 2005) change and growth. (Maani, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
48 Ba ndw idt h M a na ge m e nt Ba sic N avigat ion Suppor t
mobile phones, and so on. In computer networks, bandwidth Barriers to Knowledge Sharing
refers to the amount of data that can be transferred in a Characteristics of the knowledge-sharing environment that
B given period of time. (Papagiannidis et al., 2005) 11: Term may limit or preclude the knowledge-sharing transaction.
used to denote the capacity of a communication channel The evaluation of barriers to knowledge sharing should
for information: a narrow bandwidth implies slow or actually be measured in terms of knowledge workers
limited communication. It describes the carrying capacity perceptions of barriers to knowledge sharing since
of the users connection or the server connection. It is knowledge workers may not be able to elucidate the actual
commonly measured in bits or bytes per second. (Boersma barriers. (Lindsey, 2006)
& Kingma, 2006) 12: The amount of data per second that
can be delivered to your computer. A 56K modem has a Base Class
bandwidth of 56 kilobits/second. The term bandwidth is User-deined class; a collection of objects that have the same
also used in conjunction with data rate when discussing behavior and state deinition. (Alhajj & Polat, 2005b)
video. (Cosemans, 2005a)
Base Station Controller (BSC)
Bandwidth Management The intelligent element of the Base Station Subsystem.
Determines the information capacity of a network per unit It has complex functions in radio resource and trafic
of time. Wireless networks deliver lower bandwidth than management. (Hackbarth et al., 2005)
wired networks. The choice of appropriate bandwidth for
eficient and cost-effective transmission of voice, data, Base Station Transceiver (BST)
and pictures is called bandwidth management. (Murthy The irst element that contacts the mobile terminal in the
& Krishnamurthy, 2005d) connection, and the irst element of the ixed part of the
mobile network. (Hackbarth et al., 2005)
Bandwidth of Communication Channel
Actual speed of communication medium available at Baseband
the time of transmission. Limitations of bandwidth can In radio communications systems, the range of frequencies
substantially affect quality of interaction and eficiency starting at 0 Hz (DC) and extending up to an upper
of learning. (Rugelj, 2005) frequency as required to carry information in an electronic
form, such as a bitstream before it is modulated onto a
Banner carrier in transmission or after it is demodulated from
A typically rectangular advertisement placed on a Web a carrier in reception. In cable communications, such
site either above, below, or on the sides of the main content as those of a local area network (LAN), it is a method
and linked to the advertisers own Web site. In the early whereby signals are transmitted without prior frequency
days of the Internet, banners were advertisements with conversion. (Chochliouros et al., 2005b)
text and graphic images. Today, with technologies such
as Flash, banners have gotten much more complex Baseline Data
and can be advertisements with text, animated graphics, The data in a study captured before an intervention or
and sound. (Lalopoulos, Chochliouros, & Spiliopoulou- innovation is introduced in an experimental setting, in
Chochliourou, 2005b) order to describe the situation before the experimental
intervention or innovation is effected. (Fisher, 2005)
Bar Codes
Simple form of optical character recognition where Basic Methods of Computer-Mediated
information is encoded in printed bars of relative thickness Communication
and spacing. RFID combines this technology with radio Includes such tools as threaded discussions, gradebooks,
frequency. (Kotzab, 2005) class announcements, and lecture notes. (Gold, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ba sic Re side nt ia l Re gist e r N e t w ork Ba ye sia n N e t w ork 49
Bayes Theorem D
Result in probability theory that states the conditional
probability of a variable A, given B, in terms of the 2: A directed acyclic graph where the nodes represent
conditional probability of variable B, given A, and the random variables and arcs represent the relationships
marginal probability of A alone. (Bashir et al., 2005) between them. Their strength is represented by means of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
50 Ba ye sia n N e ura l N e t w ork (BN N ) Be nchm a rk Toolk it
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Be nchm a rk ing Bia se d M a rke t pla c e 51
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
52 Bia se d Sa m pling Bina r y I m a ge
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bina r y For m at for Sc e ne s (BI FS) Biom e t ric 53
Binary Format for Scenes (BIFS) 7: The processing of the huge amount of information
Based on VRML97, BIFS is extended with commands pertaining to biology. (Liberati, 2005)
that can update, delete, or replace objects in the scene.
B
For streaming scenarios, BIFS also offers an integrated Biological Model
binary compression scheme, media mixing, and audio A construct developed from the observation of biophysical
composition. (Di Giacomo et al., 2005) processes of living things. (Atkinson & Burstein, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
54 Biom e t ric Aut he nt ic at ion Bit -Pa ra lle lism
these measures are increasingly being introduced for the integrity of sensitive data stored in information systems.
authentication purposes and will play a critical role in (Scott et al., 2006)
B the future of digital security. (Tassabehji, 2005a) 8: The
use of computational methods to evaluate the unique Biometric Sample
biological and behavioral traits of people. (Lowry et al., The unprocessed image or physical or behavioral
2005b) 9: The use of technological devices to identify characteristic captured to generate the biometric template.
people through scans of their faces, hands, ingers, (Vatsa et al., 2005)
eyes, or voice. (Szewczak, 2005) 10: Using one or more
physical characteristics of a person for identiication. Biometric Template
Fingerprints, retina scans, hand proiles, voice recognition, The mathematical representation of the biometric sample
face recognition, and many others may be used. (Strauss, which is inally used for matching. The size of a template
2005) 11: Usually refers to technologies for measuring varies from 9 bytes for hand geometry to 256 bytes for
and analyzing human physiological characteristics such iris recognition to thousands of bytes for face. (Vatsa et
as ingerprints, eye retinas and irises, voice patterns, al., 2005)
facial patterns, and hand measurements, especially for
authentication purposes. In a typical IT biometric system, Biophysical Variables
a person registers with the system when one or more of Objective physical data collected during experiments
his physiological characteristics are obtained, processed such as pulse, blood pressure, hormone levels,
by a numerical algorithm, and entered into a database. electroencephalograms, and electrocardiograms.
Ideally, when he logs in, all of his features match 100%; (Molinari, Anderberg, et al., 2005)
then when someone else tries to log in, she does not fully
match, so the system will not allow her to log in. (Wong, B-ISDN: See Broadband Integrated-Services Data
2006) 12: Generally, biometrics refers to the study of Network.
measurable biological characteristics. In computer security,
biometric technologies are deined as automated methods of Bit Depth
identifying or authenticating the identity of a living person The number of bits used for color resolution when viewing
based on his or her physiological (e.g., ingerprint, hand, ear, a movie. (Vitolo et al., 2005)
face, eyeiris/retina) or behavioral (e.g., signature, voice,
keystroke) characteristic. This method of identiication is Bit Rate
preferred over current methods involving passwords and 1: A data rate expressed in bits per second. In video
pin numbers, as the person to be identiied is required to encoding, the bit rate can be constant, which means that it
be physically present at the point of identiication, so the retains a speciic value for the whole encoding process, or
person or user is identiied, not the device, as in case of it can be variable, which means that it luctuates around a
PIN and password. (Mezgr, 2006b) speciic value according to the content of the video signal.
(Koumaras et al., 2005) 2: In a bit stream, the number of
Biometric Authentication bits occurring per unit time, usually expressed in bits per
The identiication of individuals using their physiological second. Usually, it measures the rate of transmission of
and behavioral characteristics. (Chakravarty et al., information. (Ragazzi, 2005)
2005a)
Bit Stream
Biometric Encryption The actual data stream, which is the transmission of
A technique whereby the biometric data is used as a characters at a ixed rate of speed. No stop and start
personal or private key to be used in some cryptographic elements are used, and there are no pauses between bits
process. (Fleming, 2005a) of data in the stream. (Knight & Angelides, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bit -Slic e Signat ure File Ble nde d Le a r ning 55
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
56 Ble nde d Le a r ning Environm e nt Bloom s Ta xonom y of Le a r ning
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Blue t oot h Boole a n Func t ion 57
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
58 Boole a n Que r y Bounda r y Crossing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bounda r y Ele m e nt M e t hod Bra nching 59
is, they usually cross time and distance, and often include shaped surfaces. Most animation programs use this method.
different national (ethnic), organizational, and functional (Cruz et al., 2005)
cultures. (Pauleen, 2005)
B
Bounded Rationality
Boundary Element Method A theory of individual decision making that contends
Numerical method to solve the differential equations with decisions are not made in a purely rational manner, due to
boundary/initial conditions over the surface of a domain. limited cognitive capabilities and incomplete information.
(Kanapady & Lazarevic, 2005) (Moore & Burke, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
60 Bra nching Digit a l Sk ills Broa dba nd
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Broa dba nd Ac c e ss Broa dc a st Disk 61
Internet that will ensure rapid access, faster download technologies to vastly speed up rates of information transfer
times, and better overall performance such as high- between communication devices such as computers.
resolution, graphics, and CD-quality sound. Broadband (Hin & Subramaniam, 2005b) 3: A telecommunications
B
connections are sometimes also called fat pipes due to network that allows for rapid transmission of voluminous
the substantial amounts of data they can carry compared amounts of information. (Hin & Subramaniam, 2006) 4:
to more traditional narrowband connections, such as A network that operates at a wide band of frequencies.
a modem which delivers variable service quality with In these communications networks, the bandwidth can be
slow download speeds. A broadband connection can be divided and shared by multiple simultaneous signals (for
delivered in several different ways: cable, DSL, ixed voice or data or video). (Barolli & Koyama, 2005a)
wireless, and satellite. (Cosemans, 2005a) 9: High-speed
transmission services such as xDSLs and CATV lines Broadband Passive Optical Network (BPON)
which allow users to access the Internet at signiicantly Features point-to-multipoint architecture for provisioning
higher speeds than dial-up modems or narrowband. (Park access to high-speed broadband applications such as video-
& Lepawsky, 2006) 10: In data communications, generally on-demand over the irst-mile. (Littman, 2006)
refers to systems that provide user data rates of greater
than 2 Mbps and up to 100s of Mbps. (Ngoh & Shankar, Broadband Transmission
2005) 11: Internet connection with a download speed of A form of data transmission in which data are carried
more than 56k band. (Msiska, 2005) 12: Transmission on high-frequency carrier waves; the carrying capacity
facility having a bandwidth suficient to carry multiple medium is divided into a number of subchannels for data
voice, video, or data channels simultaneously, often greater such as video, low-speed data, high-speed data, and voice,
than 512 Mbit/sec. Each channel occupies (is modulated allowing the medium to satisfy several communication
to) a different frequency bandwidth on the transmission needs. (Hentea, 2005a)
medium and is demodulated to its original frequency at
the receiving end. (Negash, 2005) Broadband Wireless Access
A form of access using wireless technologies. (Hentea,
Broadband Access 2005a)
1: A form of Internet access that provides information and
communication services to end users with high-bandwidth Broadcast
capabilities. (Hentea, 2005a) 2: The process of using ADSL, A transmission to multiple unspeciied recipients. (Prata,
iber cable, or other technologies to transmit large amounts 2005)
of data at rapid rates. (Hin & Subramaniam, 2005a)
Broadcast Channel
Broadband Digital Services Unidirectional wireless channel to disseminate a set of
These allow very high data transmission rates, and are the database items periodically to multiple numbers of mobile
most popular and widely used kinds of digital services. users. (Waluyo et al., 2005)
These services include DSL, ADSL, and cable modem
services. (Pease et al., 2005) Broadcast Cycle
A complete broadcast ile. (Waluyo et al., 2005)
Broadband Integrated-Services Data Network
(B-ISDN) Broadcast Database
An ISDN that supports a wider range of voice and non- A mobile database whose contents are being broadcast,
voice applications. (Louvros et al., 2005b) fully or partially, to a population of mobile clients. (Leong,
2005a)
Broadband Network
1: A telecommunications network that can transmit Broadcast Disk
information well above the normal rate (56K) on Distributes data according to a predeined schedule so that
ordinary phone lines. (Hin & Subramaniam, 2005c) 2: A interested clients can pick up the data from the schedule.
telecommunications network that leverages on various (Fiege, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
62 Broa dc a st T V Se r vic e Bucke t
Broadcast TV Service server logs incomplete because some requests are served
A television service that provides a continuous low of by the cache. A related issue is the management of the
B information distributed from a central source to a large cache to improve its hit rate. (Y. Fu, 2005)
number of users. (Hulicki, 2005)
Browser Log
Broker A computer ile (program) running on the clients browser
1: A manager of a virtual enterprise. A broker acts as that lists all requests for individual iles and ads. (Dasgupta
an intermediary with the buyer of goods or services. A & Chandrashekaran, 2005)
broker may also manage and control the ICT and provide
educational services to small and medium enterprises, Browsewrap Agreement
SMEs, or micro-companies. (Richards et al., 2005) 2: Also Generally pertains to accessing information on a Web
called organization coniguration, structure, organization, page. A notice is placed on the Web site informing the user
or architecture manager, a broker is the main agent of that continued use of (browsing) the Web site constitutes
agility and virtuality in an agile/virtual enterprise (A/VE), acceptance of a license agreement (the terms of which are
acting either between two operations of the A/VE (off-line usually made available by the user selecting a link on the
reconigurability, providing agility only) or online with the Web site). (Sprague, 2005)
operation of the A/VE (online reconigurability, providing
virtuality and a higher level of agility). (Cunha & Putnik, BSC: See Balanced Score Card; Base Station
2005) 3: Generically, a certiied entity authorized to link Controller.
two different layers. (Pires et al., 2006)
BSP: See Business System Planning.
Brokerage
The activity of connecting two or more unconnected nodes BSS: See Basic Service Set.
in a network. (Dekker & Hendriks, 2006)
BST: See Base Station Transceiver.
Browse
To view formatted documents. For example, one looks at BS7799-2:2002
Web pages with a Web browser. Browse is often used Part 2 is an information security management system
in the same sense as surf. (Singh, 2005a) (ISMS) that adopts a systematic approach to managing
sensitive company information that encompasses people,
Browser processes, and IT systems. (Tassabehji, 2005b)
1: An application that interprets the computer language and
presents it in its inal Web page format. (Falk & Sockel, B2A: See Business-to-Administration.
2005) 2: A client software program used for searching and
viewing various kinds of resources such as information on B2B: See Business-to-Business.
a Web site or on an intranet. (Vaast, 2005) 3: A computer
software program that requests Web pages and other B2B E-Commerce: See Business-to-Business Electronic
associated applications over the Internet, and that can Commerce.
display these iles using the right format. (Dasgupta &
Chandrashekaran, 2005) 4: A software program running B2B Integration Technology: See Business-to-
on a client computer that allows a person to read hypertext. Business Integration Technology.
The browser permits viewing the contents of pages and
navigating from one page to another. Netscape Navigator, B2C: See Business-to-Consumer.
Microsoft Internet Explorer, and Lynx are common
browser examples. (Vician & Buche, 2005) B2E: See Business-to-Employee.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Bucke t -Ba se d H ist ogra m Busine ss Alignm e nt 63
is an aggregate information (i.e., sum, average, count, etc.) used for early local Internet service providers, since their
about tuples with that value of X belonging to the interval message board function was a key service. (Paoletti, 2005)
(inf, sup). (Buccafurri & Lax, 2005) 2: A computerized meeting and announcement system
B
that allows people to carry on discussions, upload and
Bucket-Based Histogram download iles, and make announcements without people
A type of histogram whose construction is driven by the being connected to the computer at the same time. In
search of a suitable partition of the attribute domain into the early 1990s, there were millions of BBSs around the
buckets. (Buccafurri & Lax, 2005) world, most very small, running on a single IBM clone
PC with one or two phone lines. Some are very large, and
Buddy List the line between a BBS and a system like CompuServe
Presence awareness technology that allows users to monitor gets crossed at some point, but it is not clearly drawn.
the online status of others. A buddy list window shows (Chim, 2006)
whether buddies are online or off-line. Users double-click
on a screen name of an active friend, and a message is Bullwhip Effect
automatically initiated. (Hwang & Stewart, 2005) 1: A situation in which ineffective network effects occur
because each successive node in the supply chain orders
Buffer Query more supplies than the previous one based on wrong
This spatial query involves two spatial datasets and a assumptions, a lack of communication, and lawed planning
distance threshold d. The answer is a set of pairs of spatial processes. (Hanebeck, 2005) 2: Demand ampliication
objects from the two input datasets that are within distance from its source across the supply chain. This is largely
d from each other. (Corral & Vassilakopoulos, 2005) caused by information asymmetry among the entities in
the supply chain. (Aigbedo, 2005)
Buffet Model of Course Redesign
This model moves instruction away from a ixed menu Burst
of activities and resources to a buffet of choices for In OBS networks, IP packets (datagrams) are assembled
learners, offering a large variety of offerings that can into a very large-sized data packet called a burst.
be customized to it the needs of the individual learner. (Rodrigues, Freire, Monteiro, & Lorenz, 2005)
(Twigg, 2005)
Burst Assembly
Building Block The process of aggregating and assembling packets
1: A basic element or part of something. (Askar & Kocak- into bursts at the ingress edge node of an OBS network.
Usluel, 2005) 2: Relects one of the many the critical success (Rodrigues et al. 2005)
factors of the information technology industry that include:
hardware, software, human resources humanware, Burst Detection
networking, and information. (Kamel, 2005a) The identiication of sharp changes in a time series of
values. Examples of bursts include the increasing use of
Bulkload certain words in association with given events. (Chen,
Adding a (large) set of data to a database rather than Toprani, et al., 2006)
individual tuples. (Schmidt et al., 2005)
Burst Header Packet: See Control Packet.
Bulletin Board
1: A discussion forum, similar to that of Usenet newsgroups, Burst Offset
in which questions and responses are connected in a The interval of time at the source node between the
thread, resembling a conversation. (Teigland & Wasko, processing of the irst bit of the setup message and the
2005) 2: An electronic message database where people can transmission of the irst bit of the data burst. (Rodrigues
log in and leave messages. (Coakes & Willis, 2005) et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
64 Busine ss a nd I T Exe c ut ive Busine ss I nt e llige nc e (B I )
product, with the required speciications, at the required Business Intelligence (BI)
time, with the lowest cost, and with the best possible 1: A popularized umbrella term introduced by Howard
B return. (Cunha & Putnik, 2005) Dresner of the Gartner Group in 1989 to describe a set
of concepts and methods to improve business decision
Business and IT Executive making by using fact-based support systems. The decision
A senior person at a business organization, such as the support purpose is to provide managers with information
chief information oficer (CIO), chief technology oficer or business intelligence. The term is sometimes used
(CTO), or chief executive oficer (CEO). (Henry, 2006) interchangeably with briefing books and executive
information systems. A business intelligence system is a
Business and Scientiic Applications data-driven DSS. (Power, 2005) 2: A broad set of tools
End-user modules that are capable of utilizing Analytical and technologies that facilitate management of business
Information Technology along with domain-speciic knowledge, performance, and strategy through automated
knowledge (e.g., business insights or constraints, process analytics or human-computer interaction. (Ganguly et al.,
physics, engineering know-how). Applications can be 2005) 3: Software and a set of tools that allow end users
custom built or pre-packaged and are often distinguished to view and analyze data and business knowledge through
from other information technologies by their cognizance automated analytics or human-computer interaction.
of the speciic domains for which they are designed. This (Khan et al., 2006) 4: Business information systems have
can entail the incorporation of domain-speciic insights transitioned from function-oriented to knowledge-oriented
or models, as well as pre-deined information and process systems. Business intelligence is a study of business rules
lows. (Ganguly et al., 2005) that are the best in practice. Intelligence is the execution
of knowledge. Business intelligence is related to the
Business Complexity knowledge acquisition, repository, sharing, and application
Degree of dificulty associated with supplier- and customer- in the activities of an organization. Business intelligence
facing processes. It incorporates diversity and volatility is becoming a necessity to most business organizations to
aspects. (Setzekorn et al., 2005) be carried out in their business procedures and functions.
Business intelligence has now emerged as a sharable
Business Ecosystem commodity embodied in commercial software and is
A system in which companies work cooperatively and no longer something that could only be possessed by a
competitively to support new products, satisfy customers, small bunch of experts. (Li, 2005a) 5: Deployment of
and create the next round of innovation in key market (usually artiicial intelligence-based) techniques such as
segments. (Lee et al., 2006) On-Line Analytical Processing and data mining to analyze
information in the operational data sources. (Trcek, 2005)
Business Engineering 6: Information that enables high-level business managers
The integral design of both organizational structures and and executives to make strategic and long-term business
information systems. (Janssen, 2005) decisions. (Athappilly & Rea, 2005) 7: The process of
gathering information in the ield of business. The goal is
Business Games to gain competitive advantage. The information gathered
Computer-based simulations designed to teach business- usually refers to customers (their needs, their decision-
related concepts. (Proserpio & Magni, 2005) making processes), the market (competitors, conditions
in the industry), and general factors that may affect the
Business Incubators market (the economy at large, technology, culture). (Badia,
Proper t y-based organizations with identif iable 2006) 8: The type of detailed information that business
administrative centers focused on the mission of business managers need for analyzing sales trends, customers
acceleration through knowledge agglomeration and purchasing habits, and other key performance metrics
resource sharing. The main role of the incubator is to assist in the company.(Zhu, 2005) 9: A term used in two ways:
entrepreneurs with business start-ups and development. (1) as a synonym for competitive intelligence, and (2) to
(Moodley, 2005) indicate a speciic set of ICT tools to support managerial
decision making. This set of tools often consists of a data
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Busine ss M ission Busine ss Proc e ss Exe c ut ion La ngua ge for We b Se r vic e s (BPEL4 WS) 65
warehouse and the tools to store, retrieve, and present Business Process
the information it contains (e.g., data-mining software). 1: A collection of interrelated work tasks initiated in
(Vriens, 2005a) response to an event that achieves a speciic result for the
B
customer of the process. (Sundaram & Portougal, 2005a)
Business Mission 2: A collection of business activities which take several
A basic role or function that a irm performs in a speciic inputs and creates one or more outputs. (Johnston, 2005)
environment. (Cepeda-Carrin, 2006) 3: A process at the business layer of an organization.
Since the 1990s, the focus of any business reengineering
Business Model project and one of the central inputs for IT design. It is
1: A speciic arrangement of organizational strategies, sometimes also used as a synonym for worklow. (Heucke
goals, processes, resources (technologies, inances, people, et al., 2005) 4: A series of related activities performed by
etc.), structures, products, and services that enable a staff in a business organization to achieve a speciic output
irm to successfully compete in the marketplace. Many (for example: loan processing). (Henry, 2006) 5: A set of
EC researchers have taken a narrower view, based on interrelated activities performed in an organization with
organizations involved (i.e., B2B, B2C, B2G, etc.) or speciic the goal of generating value in connection with a product
framework used (i.e., hierarchy, hub, or intermediary for or service. (Kock, 2006) 6: A set of one or more linked
e-markets). While there is not yet a consensus about what activities which collectively realize a business objective
makes up a business model, the trend is away from a or goal, normally within the context of an organizational
narrower view. (Craig, 2005) 2: Architecture for products, structure. (Cardoso, 2006) 7: A set of organized
services, and information lows, including descriptions of work-related tasks and resources to pursue a speciic
the various business actors and their roles, the potential organizational objective inluencing learning experiences
beneits, and the sources of revenue. (Shan et al., 2006b) by deining two speciic relationships: process-based roles
3: Means by which a new venture will attract and serve (between business process and people) and learning tasks
customers, in order to generate revenue and proit. (Craig, (between business process and information systems).
2006b) 4: The method of doing business by which a (Rentroia-Bonito & Jorge, 2005) 8: A term widely used
company can generate revenue to sustain itself. (Lee et al., in business to indicate anything from a single activity,
2006) 5: With regard to business models, we must verify such as printing a report, to a set of activities, such as an
which cooperation partner is responsible for which partial entire transaction cycle. Sometimes used as a synonym of
tasks. We can either assign services that have been provided transaction cycle. (Dunn & Grabski, 2005) 9: The sequence
by the public sector to the private sector (privatization), of activities, the people, and the technology involved in
or both cooperation partners can invest resources to carrying out some business or achieving some desired
accomplish these tasks (partnership). Outsourcing is an results in an organization. (Galatescu, 2005) 10: Business
example of privatization, while franchising is an example transactions that realize a business objective. (Johannesson,
of partnership. (Knust & Hagenhoff, 2005) 2005) 11: The interaction, coordination, communication,
and decision choices made by organizations in order to
Business Opportunity transform inputs (resources)personnel, equipment,
Perfect time interval to eficiently match a speciic market technology, information, energy, capital, and so forthinto
need to a core competence and available capacity. (Pires products or services of added value to the customer/citizen.
et al., 2006) (Joia, 2006) 12: The speciic processes into which each
primary activity of the value chain can be decomposed.
Business Performance (Scupola, 2005)
Relects an organizations overall results and is often
measured using a number of inancial measures; for Business Process Execution Language for Web
example, annual sales revenue, sales growth, annual proit, Services (BPEL4WS)
and proit growth. Rather than seek empirical data, some Provides a language for the formal speciication of business
studies ask managers for their perceptions, for example, processes; extends the Web services model and enables it
their perception of sales growth compared to competitors. to support business transactions. (Cardoso, 2006)
(Cragg & Todorova, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
66 Busine ss Proc e ss (of a V ir t ua l Ent e rprise ) Business Va lue
Business Process (of a Virtual Enterprise) is deined in terms of existing objects. (Halpin, 2005)
A set of linked activities that are distributed at member 2: Originally, a statement that deines or constrains the
B enterprises of the virtual enterprise and collectively realize evolution of data pertaining to an enterprises business.
its common business goal. (Protogeros, 2006) Business rules usually are implemented by integrity
constraints or triggers, or stored procedures. (Decker, 2005)
Business Process Outsourcing 3: Statement that deines or constrains business objects,
Service recipients hand over the responsibility for the their behavior, and relationships. Usually expressed in a
execution of complete business processes to service semiformal language, using a vocabulary of business terms
providers. Most of the business processes in business and verbs such as have to, should, and must. (Badia, 2005b)
process outsourcing are IT-related processes. (Beulen, 4: Statements that model the reaction to events that occur in
2005) the real world, having tangible side effects on the database
content. They respond to application needs. (Rivero, 2005)
Business Process Reengineering (BPR) 5: Precise statements that describe, constrain, and control
1: Any radical change in the way in which an organization the structure, operations, and strategy of a business. They
performs its business activities; BPR involves a may be thought of as small pieces of knowledge about a
fundamental re-think of the business processes followed business domain. (Cilia, 2005)
by a redesign of business activities to enhance all or most
of its critical measurescosts, quality of service, staff Business Rule Extraction
dynamics, and so forth. (Colmenares & Otieno, 2005) 2: Enables concise business rules to be extracted from
Analysis and redesign of worklow within and between within legacy programs and across entire legacy systems.
enterprises. (Sarmento, 2005) 3: The analysis and redesign (Raisinghani, 2005)
of processes within and between organizations. Usually
differentiated from process improvement, which is less Business Strategy
transformational. (Mendonca, 2005) 4: The fundamental 1: A description of the plans, actions, or steps an
rethinking and radical redesign of business processes to organization intends to take in order to strengthen
achieve signiicant improvements of the performances, and grow itself. (Johnston, 2005) 2: The main way the
such as cost, quality, service, and speed. (Aversano et organization chooses to compete; for example, via cost
al., 2005) 5: Related to the alignment between business leadership, differentiation, niche, and so forth. (Cragg &
processes and the ERP business model and related best Todorova, 2005)
practices. This process will allow the improvement of the
software functionality according to current and future Business System Planning (BSP)
organization needs. Managers must decide if they do IBMs developed methodology of investing in information
business process reengineering before, during, or after technology. An example of a system approach methodology
ERP implementation. (Esteves & Pastor, 2005) 6: Redesign of developing an information system. (Janczewski &
of business processes with the purpose of a dramatic Portougal, 2005)
improvement in business performances and productivity.
(Peterson & Kim, 2005) Business Term
Word or expression denoting a concept that has a particular
Business Q&A Exchange meaning in the context of an enterprise. (Badia, 2005b)
One of the most popular knowledge exchanges in knowledge
communities. The most reined software structure is called Business Value
Q&A community. (Yamazaki, 2006) The overall value that an investment brings to a corporation.
Examples of performance measures of the business value
Business Rule of electronic commerce can be: (1) proitabilitythat is,
1: A constraint or derivation rule that applies to the business whether electronic commerce contributes to an increase
domain. A static constraint restricts the possible states of in the proitability of the corporation; or (2) competitive
the business, and a dynamic constraint restricts the possible advantage that could be measured as an increase in
transitions between states. A derivation rule declares how market share, shareholder value, or customer satisfaction.
a fact may be derived from existing facts, or how an object (Scupola, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Busine ss-Cont inuit y Pla nning Busine ss-t o-Consum e r (B2 C) 67
Business-Continuity Planning business applications and services that allow small and mid-
The objective of business-continuity planning is to sized organizations and divisions of large enterprises to
counteract interruptions to business activities and critical connect employees, customers, and suppliers for improved
B
business processes from the effects of major failures or eficiency. (Passi et al., 2005)
disasters. (Tong & Wong, 2005a)
Business-to-Business Electronic Commerce
Business-Episode Concept (B2B E-Commerce)
The approach to classify and cluster public services by 1: A transaction that occurs between and among irms that
repeating speciic situations that often occur during the are related to the procurements of goods and/or services
life of a citizen resp. the different periods of an enterprise. through electronic medium. The typical medium of
Typical examples are marriage for a citizen and VAT transaction is the Internet and World Wide Web. (Aigbedo,
declaration for a company. (Werth, 2005) 2005) 2: The process for conducting transactions involving
the exchange of valued goods, information, or services for
Business-Process Analysis (BPA) monetary or non-monetary compensation between two or
A set of technologies that provide support for obtaining more business organizations. (Turner, 2006) 3: Focuses on
relevant properties of business-process models in order direct transactions between businesses and end consumers.
to reason about them, detect functional errors, or improve Consumers are able to purchase goods and services such
their performance. (Fisteus & Kloos, 2006) as books, computer products, or music, at any time that
is convenient to the consumer. (Peszynski, 2005) 4: Any
Business-to-Administration (B2A) business transaction conducted between two business
Data interchange between commercial organizations and entities. An example is where a manufacturer buys raw
government bodies using e-technologies such as EDI or material from a supplier over the Internet. (Gangopadhyay
an Internet Web site. A component of e-government. & Huang, 2005) 5: The sale of products or services, or
(Whiteley, 2006) an information exchange, among two or more businesses
through electronic technology, usually involving the
Business-to-Business (B2B) Internet, through a public or private exchange. (Mockler
1: Business made electronically (mainly by Internet) et al., 2006)
between companies by the selling or purchasing of goods
or services. Includes data interchange. (de Medeiros Business-to-Business Integration Technology
et al., 2006) 2: A business that provides some kind (B2B Integration Technology)
of services or sells some product to other businesses. A software system that provides business-to-business
(Youn & McLeod, 2006) 3: Interactions between two integration functionality by sending and receiving
businesses, such as transfers of information, purchases messages, and retrieving and storing them in back-end
and so forth, are said to follow a B2B format. (Baim, application systems. (Bussler, 2005a)
2006a) 4: Business-to-business trading involves the sale
of goods or services by one business to another business. Business-to-Business Model
(Braun, 2005c) 5: E-procurement systems improve the Provision of education content to another institution, which
eficiency of the procurement process by automating and then enters the teaching and learning agreements with the
decentralizing the procurement process. The traditional learner. (Robinson, 2005)
methods of sending Request for Quotes (RFQ) documents
and obtaining invoices are carried out over the Web Business-To-Business Transaction
through purchasing mechanisms such as auctions or other Electronic commercial transaction from business to
electronic marketplace functions, including catalogs. business. (Pierre, 2006a)
(Mller, 2005) 6: A business selling goods and/or services
online to another business. (Toland, 2006) 7: Commercial Business-to-Consumer (B2C)
transactions between commercial trading partners using 1: Retail selling via the Internet. (de Medeiros et al., 2006)
e-technologies such as EDI or an Internet e-shop. (Whiteley, 2: Interactions between a business and its customers are
2006) 8: Automated processes between trading partners. said to follow a B2C format. In common usage of the
(Shih & Fang, 2006) 9: Used to describe an e-business term B2C, the distinction between customers (purchasers
solution that caters to other businesses. It offers integrated of a product/service) and consumers (end users of a
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
68 Busine ss-t o-Consum e r M ode l Byt e -Code
Busy Hour
The hour at which a mobile telephone network handles the
maximum call trafic in a 24-hour period. It is that hour
during the day or night when the product of the average
number of incoming calls and average call duration is at
its maximum. (Mani et al., 2005)
Buy-and-Hold Strategy
An investment strategy for buying portfolios of stocks
or mutual funds with solid, long-term growth potential.
The underlying value and stability of the investments are
important, rather than the short- or medium-term volatility
of the market. (Hou, Sheng, et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
CA CAGR 69
C
CA: See Certificate (or Certification) Authority; Cache Replacement Policy
Conditional Access Service. The policy to choose a data item or object to be deleted
from the cache when a new data item or object is stored
CA AT: See Computerized Assisted Auditing to a full cache. (Tse, 2006)
Technique.
Cache Result
Cable Access The Result of a group-by is obtained from other group-by
A form of broadband access using a cable modem attached computation (in memory). (Tan, 2005a)
to a cable TV line to transfer data. (Hentea, 2005a)
Caching
Cache 1: A replication method where access to frequently used
1: A region of a computers memory which stores recently data is optimized. In remote caching, a primary copy of
or frequently accessed data so that the time of repeated the frequently used data is normally stored on a very fast
access to the same data can decrease. (Lin et al., 2005) 2: medium to optimize access to data. In local caching, an
Disk space used to store the documents loaded from the often inconsistent secondary copy of the frequently used
server for future use. (Kacimi et al., 2005) 3: A storage area data is stored in or close to the location of some users to
on the user computers hard disk where recently viewed optimize their access to the data. (Frank, 2005a) 2: The
Web pages are stored. (Dasgupta & Chandrashekaran, technique of copying data from a server machine (the
2005) 4: Memory that mirrors often-used parts of a slower central storage place) to a client machines local disk or
but larger memory. The term cache mainly refers to the memory; users then access the copy locally. Caching
function, not to the memory technology. Cache can be reduces network load because the data does not have to
standard random access memory that is used to speed up be fetched across the network more than once (unless the
disk access, but it also can be very specialized high-speed central copy changes). (Bose et al., 2005) 3: Using a buffer
memory that is used to speed up processor access to main within your own computers fast memory to hold recently
memory. (Meixner, 2005) accessed data. Designed to speed up access to the same
data later. (Cosemans, 2005b)
Cache Invalidation
The procedure of validating whether the cached data Caching Proxy
is consistent with the master copy at the server. (Xu, A caching proxy or proxy server or proxy is a server that
2006) acts as an intermediary between a client and a content
server. It intercepts the requests of the client and checks
Cache Memory whether it can serve the client from its own cache, and if
A technology developed to reduce ile download time and not, it forwards the requests to the content server. (Katsaros
maximize network performance. (Szewczak, 2005) & Manolopoulos, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
70 CAI Ca pa bilit y M at urit y M ode l (CM M )
CAI: See Computer-Assisted Instruction. biometric sample in order to generate multiple variants to
represent the same person. (Li, 2006)
C Calculative Trust
Trust based on the weights of the costs and beneits of Candidate Generation
certain actions, and on a view of man as a rational actor. Creating new subgraphs out of smaller ones; then it checks
(Huotari & Iivonen, 2005) to see how often this new subgraph appears in the analyzed
graph database. (Fischer & Meinl, 2005)
Calculative-Based Trust
Trust based on the calculation that it is not in the best Candidate Key
interest of the trusted party to cheat or take advantage Minimum set of attributes that uniquely identify each
of the situation, regardless of his or her trustworthiness. tuple of a given relation. One candidate key is selected as
(Paravastu & Gefen, 2006) the primary key. (Alhajj & Polat, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ca pa bilit y Ta ble Ca rrie r 71
8: An integration of best practices from proven process and knowledge base that can then be leveraged for achieving
improvement models, including the SW-CMM, EIA731, other, more broad goals. (M. Mitchell, 2005b)
and the Integrated Product Management CMM. Included
C
are tools that help organizations improve their ability Capacity Miss
to develop and maintain quality products and services. This miss occurs because the cache cannot accommodate all
(Leung, 2005) requested objects. (Katsaros & Manolopoulos, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
72 Ca rrie r Se nsing CASE Tool
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ca se -Ba se d Ex pe r t Syst e m Cat e gor y T he or y (CT ) 73
software components of an application. Most CASE tools a mathematical construct (like the roots of a tree) can go
provide functions to allow developers to draw database much wider and deeper than can be seen in the construct
schemas and to generate the corresponding DDL code. as such. The result is that in mathematical modeling, an apt
C
(Hainaut et al., 2005) formal counterpart F of a real-world phenomenon/artifact
W can give much more than initially expected from stating
Case-Based Expert System the correspondence F models W. The history of applying
An expert system that uses modeled representations of mathematics to science and engineering is full of examples
previous cases and decisions to make inferences about of when formalisms turned out to be surprisingly clever
new cases. (Svensson, 2005) in their modeling and predictive capabilities. (Gaffar &
Seffah, 2005)
Case-Based Learning (CBL)
Stemming from case-based reasoning, the process of Categorization
determining and storing cases of new problem-solution 1: The process of deducing, from the content of an artifact,
scenarios in a casebase. (Soh, 2006) the potentially multiple ways in which the artifact can be
classiied for the purpose of later retrieval from a database,
Case-Based Reasoning (CBR) library, collection, or physical storage system. (Heucke et
1: A reasoning process that derives a solution to the al., 2005) 2: A cognitive process based on similarity of
current problem based on adapting a known solution to mental schemes and concepts in which subjects establish
a previously encountered, similar problem to the current conditions that are both necessary and suficient (properties)
one. (Soh, 2006) 2: An Artiicial Intelligence approach to capture meaning and/or the hierarchy inclusion (as part
that solves new problems using the solutions of past cases. of a set) by family resemblances shared by their members.
(Lorenzi & Ricci, 2005) Every category has a prototypical internal structure,
depending on the context. (Amoretti, 2005)
Casebase
A collection of cases with each case containing a problem Category
description and its corresponding solution approach. 1: A collection of objects or entities that is a subset of
(Soh, 2006) the union of different entity types; entities offering a
similar role are grouped into a category. (Bagui, 2005)
Catalog 2: Special type of entity that represents the union of two
The collection of records used to describe and locate the or more different entity types. (Mani & Badia, 2005) 3:
items contained in a library. (Hnisch, 2005) A set of levels of observed actions or choices made by an
individual. (Medlin et al., 2006)
Categorical Attribute
An attribute that takes values from a discrete domain. Category Attribute
(Gehrke, 2005) The variable that describes the summary data of an
aggregate data structure. (Rafanelli, 2005)
Categorical Data
Fits into a small number of distinct categories of a discrete Category 5 Ethernet (Cat5)
nature, in contrast to continuous data; may be ordered The most common form of cable used for networking
(ordinal), for example, high, medium, or low temperatures, containing (four) twisted pairs of copper wire, supporting
or non-ordered (nominal), for example, gender or city. data transmission speeds of 100 Mbps. (D. Stern, 2005)
(Zhu, 2005)
Category Theory (CT)
Categorical Models Power A branch of modern algebra, providing a language and
As a rule, formal mathematical constructs appear within machinery for deining and manipulating mathematical
consistent systems of concepts rather than discretely. structures in an abstract and generic way. The method of
Such systems normally explicate some integral non-trivial CT is to present the universe of discourse as a collection of
intuition, partially embedded in each of the constructs objects (nodes) and morphisms (arrows) between them. The
that the system consists of. This way the intuition behind latter can be composed, and so the universe is presented
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
74 Cat 5 CDR
as a category: directed graph with composable arrows. For Causal Loop Diagram (CLD)
example, models of a given sort (meta-model) and mappings 1: A tool that captures the causal interrelationships among a
C between them form a category in a very natural way. If one set of variables. CLDs reveal systemic patterns underlying
wants to work with a heterogeneous universe of models complex relationships, and highlight hidden causes and
(that is, models of different meta-models), one should use unintended consequences. (Maani, 2005) 2: A diagram of
ibrations described in Math-II. The philosophy of CT is two or more variables connected by links, which usually
that everything one wants to say about objects, one must take the form of arrows. These diagrams depict three major
say in terms of arrows between objects. Correspondingly, components: feedback loops, cause-effect relationships,
an objects structure is a structure over its arrow interface. and delays. (Saha, 2005)
This way of deining structures and manipulations with
them is often called arrow thinking. (Diskin, 2005) CBIR: See Content-Based Image Retrieval.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
CD-ROM Ce llula r Te le phony 75
CD-ROM: See Compact Disc Read-Only Memory. mobile communication networks. The method relies on
the fact that mobile networks can identify the approximate
CD-ROM Program position of a mobile handset by knowing which cell site
C
Standard computer disk-operated software that runs on a the device is using at a given time. (Giaglis, 2005)
stand-alone computer or on multiple computers through
a ile server. (Switala, 2005) Cell Phone: See Mobile Phone.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
76 Ce llula r Va lue -Adde d Se r vic e Cat e gorie s Ce nt ra l Rout e t o Pe rsua sion
y =1 y =1
Brescia, 2005) 2: In contrast with decentralization, the
centralized structure is sometimes referred to as vertical,
and bureaucratic, mechanistic, rigid, or inlexible. (Wang,
Chen, et al., 2006)
Y = (x.Pv [x ])/ Pv [x ],
n n
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Certiication Change Agent 77
predictors of behavior than when the peripheral route is CG: See Computer Graphic.
taken. (Duthler, 2005)
CGI: See Cell Global Identity; Common Gateway
C
Certiication Interface.
1: A procedure by which a third party gives written
assurance that a product, process, or service conforms CGI Program: See Common Gateway Interface
to specified characteristics. Certification involves Program.
assessment. (Leung, 2005) 2: The conirmation that
external professional requirements have been met. (D.B. CGI-TA: See Cell Global Identity with Timing
Johnstone, 2005) Advance.
Certiicate (or Certiication) Authority (CA) CHAID: See Chi-Square Automatic Interaction
1: A trusted third party whose purpose is to sign certiicates Detection.
for network entities that it has authenticated using secure
means. Other network entities can check the signature to Chain Graphical Model
verify that a CA has authenticated the bearer of a certiicate. A graph that contains both undirected and directed links.
(Pulkkis et al., 2005b) 2: An authority that manages the Such models can show both symmetric and asymmetric
allocation of digital identity certiicates to users. The CA relationships; they give rise to graphical chain models.
exists as part of a PKI. The CA in conjunction with a (Giudici & Cerchiello, 2005)
Registration Authority (RA) initially checks to ensure the
identity of a user. Once identity has been conirmed, the Chain of Sustainability
CA issues digital identity certiicates that electronically An evolving, dynamic, and matched mix between company
assure the identity of a user based on the CAs digital resources (arranged in value-generating combinations)
signature. (Mundy & Otenko, 2005) 3: An entity (typically and the changing marketplace that gives the company a
a company) that issues digital certiicates to other entities competitive edge. (Potgieter et al., 2005)
(organizations or individuals) to allow them to prove their
identity to others. (Fortino, 2005) 4: An authority such Challenge and Response
as GlobalSign that issues, suspends, or revokes a digital A cryptographic technique used to identify a client to a
certiicate. (Mitrakas, 2005) 5: An authority trusted server. Server and client share a common secret key. The
by one or more users to create and assign public key server sends bit strings (challenges) to the client who
certiicates. (Trcek, 2005) 6: A trusted third party in a encrypts these strings and resends them to the server
network that issues, signs, and manages certiicates for (response). The server may then check the correctness by
network entities. Technically, a CA provides a set of digital applying the secret key and comparing the result to the
certiicate management services, including veriication. original bit string. (Stickel, 2005)
(Xu & Korba, 2005)
Challenged Project
Certiication Practice Statement A completed and approved project that is over budget,
A statement of the practices of a certiicate authority and late, and has fewer features and functions than originally
the conditions of issuance, suspension, revocation, and so speciied. (Dalcher, 2005)
forth of a certiicate. (Mitrakas, 2005)
Change Advocate
CFF: See Critical Failure Factor. A person or group who supports a change but does not
have the authority to sanction the change effort. (Lick &
C4ISR Kaufman, 2005)
Command, control, communications, computers,
intelligence, surveillance, and reconnaissancea military Change Agent
application framework that makes extensive use of GIS A person or group who is responsible for implementing
technologies. (Morris-Jones & Carter, 2005) the desired change. (Lick & Kaufman, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
78 Cha nge Cre at ion Cha nne l Ava ila bilit y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cha nne l Ca pa c it y Cha r t e r School 79
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
80 Cha se Che ck
school exists independent from a larger school district, and Chat Room
is run primarily by teachers and parents. (Glick, 2005a) 1: A Web site, or part of a Web site, that allows individuals
C 3: A public school operated independently of the local to communicate in real time. (Whitty, 2005) 2: An area
school board, often with a curriculum and educational where synchronous, text-based, online conversation can
philosophy different from the other schools in the system. take place. Sometimes conversations can be conducted ad
(Schrum, 2005) hoc, or they can be scheduled for a speciic time and topic.
(Coakes, 2006b) 3: Interactive conversation involving
Chase several people (via typing on a computer terminal or PC)
A kind of a recursive strategy applied to a database V, usually centered on a single topic utilizing the Internet.
based on functional dependencies or rules extracted Occasionally members of the chat room break off to form
from V, by which a null value or an incomplete value a smaller, more intimate conversation, to the exclusion of
in V is replaced by a new, more complete value. (Ras & all others, thus invoking privacy privileges. (Friedman,
Dardzinska, 2005) 2005) 4: Many-to-many synchronous communication that
provides communities of users with a common interest
Chat of the opportunity to communicate in real time. Users
1: A technology that provides the capability of instant, register and log into a particular room, and chat by
textual conversation with another individual through a typing messages that are instantly visible in the communal
computer session. (Panton, 2005) 2: A computer-mediated message area (room). Synonym: Group Chat. (Erlich, 2005)
real-time written conversation. It has the characteristics 5: In online chat meetings, people come together, in real
of a casual conversation and is usually not stored. A chat time over long distances, by typing on their computers. All
can be Web based or software based. The irst means comments are recorded on screen so that participants can
that it can be accessed from any computer with a Web view what has been discussed. (Gillani, 2005b) 6: Online
connection, the latter that certain software needs to be spaces where virtual users can converse in real time about
installed on the computer. There are open chat forums issues of speciic interest. Users can engage in both public
that anyone can visit to chat, to ind new acquaintances and private chats with other users. (Boateng & Boateng,
or information. Just as often, people prefer to chat with 2006b) 7: A real-time online interactive discussion group.
friends, using chat tools that require authentication before (Hwang & Stewart, 2005)
allowed chatting. Examples of software chat tools are Irc
and Mirc. (Dunkels, 2005) 3: A real-time conferencing Chat Session
capability that uses text by typing on the keyboard, not A live discussion online with a variable number of
speaking. Generally between two or more users on a local participants in a Web-based class. Can be formal and led by
area network (LAN), on the Internet, or via a Bulletin Board the instructor, or can be leaderless informal conversations.
Service (BBS). (Burke et al., 2005) 4: A software system A chat session is synchronous. (Marold, 2005)
that enables real-time communication among users through
the exchange of textual messages.(Loh et al., 2005) 5: An Chat Tool
interactive communication between two or more people A Web-based tool that enables text-based synchronous
who can enter text by typing on the keyboard, and have communication among individuals in a learning
the entered text appear in real-time on the other users community. (Morphew, 2005)
monitor. Internet Relay Chat (IRC) is an early example.
(OHagan, 2005) 6: In combination with asynchronous Chatiquette
conferencing, chat allows people to gather and interact Standard rules of courtesy and correct behavior for online
with a small group at a very low cost. It is very effective chat. (Link & Wagner, 2006)
for small group meetings where decisions can be made
and details arranged. (Kardaras & Karakostas, 2006) 7: CHEA: See Council for Higher Education Agency.
One-to-one synchronous communication in which two
persons exchange messages in real time. (Erlich, 2005) Check
See Instant Messaging. Expression in a relational database system that allows
stating a condition involving an attribute in a table; used
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Che ck point ing (Full, I nc re m e nt a l) Circ ulat ion Data ba se 81
with CREATE DOMAIN or CREATE TABLE statements. Examples: guitar, violin, piano, harp, lyre, musical bow.
(Badia, 2005b) (Wieczorkowska, 2005)
C
Checkpointing (Full, Incremental) Choreography
In full checkpointing, all of the state of the process is The message exchange behavior that a business exposes
captured. In incremental checkpointing, only that part in order to participate in a business relationship based on
of the state that has changed since the last checkpoint in electronic message exchange. (Bussler, 2005a)
captured. (Zhao et al., 2005)
Choropleth Map
Chemoinformatics A color-coded map, also called a thematic map, in
Storage, analysis, and drawing inferences from chemical which geographic areas are portrayed in different hues or
information (obtained from chemical data) by using intensities according to their values on some quantities.
computational methods for drug discovery. (Lodhi, (Garb & Wait, 2005b)
2005)
Chromatic Dispersion
Chen Approach Spreading of light pulses as they transit an optical iber.
One way to calculate cardinality constraints. It limits the Results from variations in the density of the optic iber
participation of a combination of the other entity(ies) with medium and culminates in signal distortion. (Littman,
an entity in the relationship. (Cuadra et al., 2005) 2006)
Chief Information Oficer (CIO) CIF: See Common Interface Format; Corporate
The head of the IS department in an organization. Information Factory.
(Johnston, 2005)
CIM: See Common Information Model.
Chief Information Security Oficer
Employee of an organization who is the top authority in CIO: See Chief Information Oficer.
relation to information security issues. (Janczewski &
Portougal, 2005) Circuit Switched
A type of network in which a physical path is obtained
Chief Knowledge Oficer (CKO) for and dedicated to a single connection between two
A senior-level executive responsible for managing a irms endpoints in the network for the duration of the connection.
knowledge management initiative. (Herschel, 2005) Ordinary voice phone service is circuit switched. The
telephone company reserves a speciic physical path to
Chi-Square Automatic Interaction Detection the number you are calling for the duration of your call.
(CHAID) During that time, no one else can use the physical lines
A decision tree technique used for classiication of a data involved. (Olla, 2005a)
set. CHAID provides a set of rules that can be applied to
a new (unclassiied) data set to predict which records will Circuit Switching
have a given outcome. CHAID segments a data set by using 1: A type of communication in which a dedicated
chi square tests to create multi-way splits. (Yeo, 2005) channel (or circuit) is established for the duration of a
transmission. (Lee & Warkentin, 2006) 2: A circuit-
Choiceboard switched network establishes a permanent physical
An interactive, Web-based tool that lets customers design connection between communicating devices. For the
their own products and services by choosing from a menu time of the communication, this connection can be used
of options. (Roberts & Schwaab, 2006) exclusively by the communicating devices. (Kaspar &
Hagenhoff, 2005)
Chordophones
The category of musical instruments producing sound Circulation Database
by means of a vibrating string; stringed instruments. The information of material usages that are stored in a
database, including user identiier, material identiier,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
82 CI S Cit y a nd Re giona l Pla nning/Engine e ring
date the material is borrowed and returned, and so forth. and government, and conceptualizes citizens as the
(Wu & Lee, 2005) most important stakeholder of e-government initiatives.
C (Almazn & Gil-Garca, 2006)
CIS: See Computer Information System.
Citizen-Centric
Cisco-Certiied Network Associate (CCNA) A new approach to organization of government information
A data communications industry certiication. (Dixon and dissemination of government services that focuses
et al., 2005) on citizen needs and desires instead of traditional
bureaucratic functions. For example, a citizen-centric Web
Citation Indexing site may combine various services, provided by different
The indexing mechanism invented by Eugene Garield in departments or agencies, under a common heading based
which cited work, rather than subject terms, is used as part on life events. (Schelin, 2005)
of the indexing vocabulary. (Chen & Lobo, 2006)
Citizen-Led E-Democracy
Citizen Engagement Bottom-up, transformative process. Citizens create and
A two-way process through which a government or agency sustain ICT applications, including e-mail lists, discussion
can develop an understanding of citizens concerns and boards, chat, and Web sites, that accurately capture and
needs and respond to them, conversely enabling citizens relect the discourse of citizen. Such fora can be vertical
to develop an appreciation of how they can positively (subject) or horizontal (geographic). Such an entity must
contribute to and inluence the future of their community be able to inluence government actions either directly
and region. (Sutcliffe, 2005) (through shared involvement) or indirectly (through public,
media, or political inluence). Citizen-led e-democracy
Citizen Rights involves governments working with, rather than
Those rights that an individual has by virtue of being a delivering to citizens. (Williamson, 2005)
member of a government unit (country, state, province,
etc.). They vary from government unit to government Citizen-Oriented Model
unit. (Gilbert, 2005) A model in which citizens are considered to be decision
makers with equal opportunities to reach representative
Citizen Satisfaction decision makers. In this model, the citizens set the agenda,
Term coined to describe the overall approval rating of not the politicians, or this process is interactive and based
services received by citizens within their communities. on win-win strategies. However, there has to be a procedure
A 100% rating indicates total satisfaction with services to coordinate this process and avoid the continuous
received. Ratings may be taken per service or represent need for voter input. The citizens should be able to take
satisfaction with an entire government structure. (Baim, part in strategic decision making, while conventional
2005) decision makers take the role of executive decision makers.
(Keskinen & Kuosa, 2005)
Citizens Jury
A group of people selected for preparation of public Citizenship
opinion. The jury is typically selected using stratiied A complex part of collective identity, refers to the
sampling in order to match a proile of a given population. relationship between the individual and the community
The participants (usually a group of 12 to 20) spend two to and between the individuals within a community/state.
three days deliberating on a charge under the guidance (Kozeluh, 2005)
of an impartial moderator. Participants have opportunities
to question experts and to discuss the complexities of the City and Regional Planning/Engineering
issue, and are asked to work toward a consensus response. The ield that deals with the methods, designs, issues, and
(Keskinen & Kuosa, 2005) models used to have successful plans and designs for cities,
towns, and regions. (Al-Hanbali & Sadoun, 2006)
Citizen-Centered Approach to E-Government
A way to study e-government that emphasizes the social
and political nature of the relationships between citizens
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Civic Enga ge m e nt Cla ss-Condit iona l I nde pe nde nc e 83
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
84 Classiication Classiication Model
The probability of observing a combination of variable to one another, and different groups are as far as possible
values given the class label is equal to the product of the from one another, where distance is measured with respect
C probabilities of each variable value given the class: P(x,y|c) to speciic variables one is trying to predict. For example,
= P(x|c)*P(y|c). (Perlich & Provost, 2005) a typical classiication problem is to divide a database of
companies into groups that are as homogeneous as possible
Classiication with respect to a creditworthiness variable with values good
1: A method of categorizing or assigning class labels to and bad. Supervised classiication is when we know the
a pattern set under the supervision. (Oh et al., 2005) 2: class labels and the number of classes. (Hamdi, 2005a) 13:
A process of predicting the classes of unseen instances The process of predicting the classes of unseen instances
based on patterns learned from available instances with based on patterns learned from available instances with
predeined classes. (Liu & Yu, 2005) 3: A systematic predeined classes. (Yu & Liu, 2005) 14: The task of
arrangement of objects (texts) or groups according to (pre) inferring concepts from observations. It is a mapping
established criteria, or the process of allocating elements from a measurement space into the space of possible
in predeined classes. The classiication needs a predeined meanings, viewed as inite and discrete target points
taxonomy in contrast with the clustering technique that (class labels). It makes use of training data. (Domeniconi
works without previous knowledge. Sometimes it is also & Gunopulos, 2005)
associated with the process of identifying classes, that
is, discovering attributes that characterize one class and Classiication and Regression Tree (CART)
that distinguish this from others. (Antonio do Prado et A tool for data mining that uses decision trees. CART
al., 2005) 4: A technique dividing a dataset into mutually provides a set of rules that can be applied to a new dataset
exclusive groups. Unlike clustering, classiication relies on for predicting outcomes. CART segments data records by
predeined classes. (Chen, Tsai, et al., 2005) 5: A technique creating binary splits. (Wilson, et al., 2006a)
in data mining that attempts to group data according to
pre-speciied categories, such as loyal customers vs. Classiication Error
customers likely to switch. (Amaravadi, 2005) 6: Also 1: Error produced by incorrect classiications which
known as a recognition problem; the identiication of the consists of two types: correct negative (wrongly classify
class to which a given object belongs. (Mart, 2005) 7: an item belonging to one class into another class) and
Given a set of training examples in which each example false positive (wrongly classify an item from other classes
is labeled by a class, build a model, called a classiier, to into the current class). (Y.-J. Zhang, 2005b) 2: Number
predict the class label of new examples that follow the of elements that are classiied in the wrong class by a
same class distribution as training examples. A classiier classiication rule. In two class problems, the classiication
is accurate if the predicted class label is the same as the error is divided into the so-called false positive and false
actual class label. (Zhou & Wang, 2005) 8: The process negative. (Felici & Truemper, 2005)
of distributing things into classes or categories of the
same type by a learnt mapping function. (Fung & Ng, Classiication Level
2005) 9: Mapping a data item into one of several pre- A security level that represents both the conidentiality
deined categories. Stored data are used to locate data in degree of the information and its category. (Gabillon,
predetermined groups. For example, a retail store chain 2005)
could use customer purchase data to determine when
customers visit and what they typically buy. (Laura, Classiication Model
2005) 10: The central problem in (supervised) data mining. A pattern or set of patterns that allows a new instance
Given a training data set, classiication algorithms provide to be mapped to one or more classes. Classiication
predictions for new data based on predictive rules and other models (also known as classiiers) are learned from data
types of models. (Muruzbal, 2005) 11: The distribution in which a special attribute is selected as the class.
of things into classes or categories of the same type, or the For instance, a model that classiies customers between
prediction of the category of data by building a model based likely to sign a mortgage and customers unlikely to do
on some predictor variables. (Zhu, 2005) 12: The process so is a classiication model. Classiication models can
of dividing a dataset into mutually exclusive groups such be learned by many different techniques: decision trees,
that the members of each group are as close as possible neural networks, support vector machines, linear and
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Classiication Rule Clear Direction 85
nonlinear discriminants, nearest neighbors, logistic competition and cooperation processes. Note that classiier
models, Bayesian, fuzzy, genetic techniques, and so forth. systems can also be understood as systems capable of
(Hernandez-Orallo, 2005b) performing classiication. Not all CSs qualify as classiier
C
systems in the broader sense, but a variety of CS algorithms
Classiication Rule concerned with classiication do. (Muruzbal, 2005)
The association that occurs in classiication data between
an antecedent containing a set of predicates expressing the Class Label
values of particular attributes or features and a consequent A label identifying the concept or class of an instance.
expressing a class label. Classiication rules represent (Maloof, 2005)
concise descriptions of the target class. (Richards & de
la Iglesia, 2005) Classroom Community
Sense of community in a classroom setting. (Rovai &
Classiication Rule Mining Gallien, 2006)
A technique/procedure aiming to discover a small set of
rules in the database to form an accurate classiier for Classroom Interaction
classiication. (Y.-J. Zhang, 2005b) The interaction that can only be achieved face to face in a
classroom. (W.B. Martz, Jr. & V.K. Reddy, 2005)
Classiication Tree
1: A decision tree that places categorical variables into CLC: See Conversation Learning Community.
classes. (Kumar, 2005) 2: A decision tree where the
dependent attribute is categorical. (Gehrke, 2005) 3: An CLD: See Causal Loop Diagram.
oriented tree structure obtained by a recursive partitioning
of a sample of cases on the basis of a sequential partitioning CLDS
of the predictor space such to obtain internally homogenous The facetiously named system development life cycle
groups and externally heterogeneous groups of cases with (SDLC) for analytical, DSS systems. CLDS is so named
respect to a categorical variable. (Siciliano & Conversano, because in fact it is the reverse of the classical SDLC.
2005) 4: Type of decision tree that is used to predict (Yao et al., 2005)
categorical variables, whereas regression trees are decision
trees used to predict continuous variables. (Hirji, 2005) Cleansing
To ilter the irrelevant entries in the Web log, such as
Classiier graphics iles. The HTTP protocol is stateless, which
1: A decision-supporting system that, given an unseen requires a separate connection for each ile that is requested
input object, yields a prediction (e.g., it classiies the from the Web server. Therefore, several log entries may
given object to a certain class). (Bruha, 2005) 2: An result from a request to view a single page, since the iles
algorithm that, given as input two or more classes (or for the graphics embedded in the page are automatically
labels), automatically decides to which class or classes downloaded from the Web server. Such iltering can be
a given document belongs, based on an analysis of the done by checking the sufixes of the URI name such as
contents of the document. A single-label classiier is one jpg and gif. (Yao & Xiao, 2005)
that picks one class for each document. When the classes
among which a single-label classiier must choose are just Clear Case
two, it is called a binary classiier. A multi-label classiier A case that experts agree can be solved in an acceptable
is one that may pick zero, one, or many classes for each manner by simply applying the existing legal rules to it.
document. (Sebastiani, 2005) (Svensson, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
86 Cle a ra nc e Leve l Clie nt -Originat e d ERP M a int e na nc e Re que st
Clearance Level on each page, and in what order the pages are viewed. It is
A security level that represents both the trust level of the frequently recorded in Web server logs. (Nasraoui, 2005)
C user and his or her need to know. (Gabillon, 2005) 6: A sequential series of Web page view requests from an
individual user. (Lee-Post & Jin, 2005b)
Clementine
Data-mining software developed by SPSS Corporation Clickstream Data
that is used to create predictive models to solve business Web usage data. A virtual trail that a user leaves behind
challenges. (Athappilly & Rea, 2005) while suring the Internet (e.g., every Web site and every
page of every Web site that the user visits; how long the user
CLF: See Common Log Format. was on a page or a site). (Dholakia, Bang, et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Clie nt -Se r ve r M ode l Close d Loop 87
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
88 Close d Se que nt ia l Pat t e r n Clust e r Ana lysis
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Clust e r Ce nt e r (Prot ot ype ) Clust e ring Dat a -M ining Ta sk 89
regarding the number of groups, and the deterministic 2005) 5: A process of mapping a data item into one of
and stochastic mechanisms that generate the observed several clusters, where clusters are natural groupings for
values. (Burr, 2005a) 5: Partitioning a given data set into data items based on similarity metrics or probability density
C
clusters where data assigned to the same cluster should models. (Oh et al., 2005) 6: A process to group, based on
be similar, whereas data from different clusters should be some deined criteria, two or more terms together to form
dissimilar. (Klawonn & Georgevia, 2005) 6: The process a large collection. In the context of image segmentation,
that includes the clustering method and the analysis of its clustering is to gather several pixels or groups of pixels
results in order to discover and understand the contents of with similar property to form a region. (Y.-J. Zhang, 2005c)
a set of elements, texts, or objects, and the relations among 7: A task that segments objects into groups according to
them. (Antonio do Prado et al., 2005) object similarity. (Chen & McLeod, 2006) 8: A technique in
data mining that attempts to identify the natural groupings
Cluster Center (Prototype) of data, such as income groups that customers belong to.
A cluster in objective function-based clustering is (Amaravadi, 2005) 9: An algorithm that takes a dataset and
represented by one or more prototypes that deine how the groups the objects such that objects within the same cluster
distance of a data object to the corresponding cluster is have a high similarity to each other, but are dissimilar to
computed. In the simplest case a single vector represents objects in other clusters.(Cunningham & Hu, 2005) 10:
the cluster, and the distance to the cluster is the Euclidean An unsupervised process of dividing data into meaningful
distance between cluster center and data object. (Klawonn groups such that each identiied cluster can explain the
& Georgevia, 2005) characteristics of underlying data distribution. Examples
include characterization of different customer groups based
Cluster Frequent Item on the customers purchasing patterns, categorization
A global frequent item is cluster frequent in a cluster Ci of documents on the World Wide Web, or grouping of
if the item is contained in some minimum fraction of spatial locations of the earth where neighbor points in
documents in Ci. (Fung et al., 2005) each region have similar short-term/long-term climate
patterns.(Chung et al., 2005) 11: Clustering algorithms
Cluster Sampling discover similarities and differences among groups of
The process in which a sample of clusters is selected and items. They divide a dataset so that patients with similar
observations/measurements are made on the clusters. content are in the same group, and groups are as different
(Lutu, 2005) as possible from each other. (Kusiak & Shah, 2005) 12: The
process of identifying groups in data. In the classiication,
Cluster Validation all groups are pre-deined in the classiication system and
Evaluating the clustering results, and judging the cluster products are arranged into the existing group structure.
structures. (Ma & Li, 2005) Contrary to this, the clustering process identiies groups
based on the product data. This means that the groups
Cluster-Support of Feature F in Cluster Ci change depending on the product data. (Abels & Hahn,
Percentage of objects in Ci possessing f. (Saquer, 2005) 2006) 13: Data-mining approach that partitions large sets
of data objects into homogeneous groups. (Garrity et al.,
Clustering 2005) 14: Data-mining task in which the system has to
1: A technique that uses features to ind the linking pages classify a set of objects without any information on the
of each other automatically. Usually, the Web pages with characteristics of the classes. (Jourdan et al., 2005)
near features will be clustered together. (Chen, Tsai, et
al., 2005) 2: Two or more interconnected computers that Clustering Algorithm
create a solution to provide higher availability, higher An algorithm that sorts data into groups of similar items,
scalability, or both. (Tong & Wong, 2005b) 3: A form of where the category boundaries are not known in advance.
unsupervised learning that divides a data set so that records (Dixon, 2005)
with similar content are in the same group and groups are
as different from each other as possible. (Lingras et al., Clustering Data-Mining Task
2005) 4: A process of grouping instances into clusters so The act of identifying items with similar characteristics,
that instances are similar to one another within a cluster and thus creating a hierarchy of classes from the existing
but dissimilar to instances in other clusters. (Liu & Yu, set of events. A data set is partitioned into segments of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
90 Clust e ring M ode l COAC
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Coa ch Coevolut ion 91
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
92 Cognit ion Cognit ive Ga p
be envisaged as a set of multi-dimensional networks, (Cartelli, 2006b) 2: Students work in teams on projects or
themselves part of a larger set of networks to which they problems with close scaffolding of the instructor. Cognitive
C are linked. Nodes in the networks represent entities such as apprenticeships are representative of Vygotskian zones of
ofices, factories, teams, and individuals. They are linked proximal development in which student tasks are slightly
formally or informally to other nodes. Activities at any more dificult than students can manage independently,
node send messagesand by implication, knowledgeto requiring the aid of their peers and instructor to succeed.
other nodes in the form of feedback, or feed-forward, (Jennings et al., 2005)
thereby triggering activities in those nodes. The messages
may use the formal or the informal links in the network. Cognitive Complexity
They may be sent intentionally or accidentally. (Land, A function of the intensity of information exchanged and
Amjad, et al., 2006a) the multiplicity of views held. (Willis, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cognit ive Gra phic a l Wa lk t hrough Cognit ive Pre se nce 93
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
94 Cognit ive Proble m -Solving St yle Cognit ivism
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cognos Colla borat ion 95
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
96 Colla borat ion Sc ript Colla borat ive Fore c a st ing a nd Re ple nishm e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Colla borat ive I nt e rfa c e Colla borat ive Pla nning, Fore c a st ing, a nd Re ple nishm e nt (CPFR) 97
parties can reduce demand uncertainty and coordinate (Bonk et al., 2005) 10: Learning is integrated in the life
their decisions. (Abraham & Leon, 2006) of communities that share values, beliefs, languages, and
ways of doing things. What holds the learners together is
C
Collaborative Interface a common sense of purpose and a real need to know what
Interface in which the interaction between the user and the other knows. The essence is the underlying process
the system is guided by the principles of collaborative of shared creation, involving two or more individuals
behavior. (Babaian, 2005) interacting to create shared understanding where none
could have existed on its own. (Vat, 2005a) 11: Learning
Collaborative Learning situation in which a group of learners work together
1: A model of learning that involves groups of students on a task, where each learners input is critical to the
working together on a project or assignment. In this model, learning of the others in the group. (Collis & Moonen,
communication between students is crucial to a successful 2005a) 12: Learning that occurs through the exchange
outcome. (Shaw, 2005) 2: A more radical departure from of knowledge among learners. Collaborative learning is
cooperative learning. Involves learners working together a form of social learning. (Klobas & Renzi, 2005b) 13:
in small groups to develop their own answer through Learning that requires joint activity in which two or more
interaction and reaching consensus, not necessarily a learners negotiate meaning and process, and contribute
known answer. Monitoring the groups or correcting to the inal outcome. (Bennett, 2005) 14: Learning where
wrong impressions is not the role of the trainer, since there emphasis is placed on student-to-student interaction in the
is no authority on what the answer should be. (Blackmore et learning process, and the instructors role becomes that of a
al., 2006) 3: A philosophy of interaction where individuals facilitator (a guide-on-the-side). (McInnerney & Roberts,
are responsible for their actions, including learning, and 2005) 15: A form of learning that involves collaborative
respect the abilities and contributions of their peers. (Berg, learning processes. It is designed for coaches, helpers
2005f) 4: A style of teaching and learning in which students and faculty, and groups of learners to fulill the learning
work in teams toward a common goal. In some online objectives of groups and of each learner through sharing
courses, collaborative learning teams are used to encourage resources and interacting. (Kayama & Okamoto, 2005)
students to work cooperatively with each other. The idea is
that students learn from each other while participating in Collaborative Learning and Teaching
teams. (Du Mont, 2005) 5: An instruction method in which Includes a process of creating a teaching and learning
students work in groups toward a common academic goal. environment that focuses on the establishment of
(Moreira & da Silva, 2005) 6: An instructional approach in partnerships with which to approach learning tasks
which students of varying abilities work together in small and achieve common goals. Key characteristics of
groups to solve a problem, complete a project, or achieve collaborative learning and teaching include interactivity,
a common goal. It is a philosophy that involves a sharing interdependency, and shared learning goals. (McCracken,
of authority and responsibility among group members 2005)
who strive to build consensus and group ownership for
the learning. (Sala, 2005b) 7: A personal philosophy, not Collaborative Network
just a classroom technique. In all situations where people A network of services and the base infrastructure
come together in groups, it suggests a way of dealing supporting distributed cooperative environments. (Unal
with people that respects and highlights individual group et al., 2006)
members abilities and contributions. There is a sharing of
authority and acceptance of responsibility among group Collaborative Online Environment
members for the groups actions. The underlying premise Internet-based learning setting that facilitates collegial
of collaborative learning is based upon consensus building or collaborative relationships and attempts to maximize
through cooperation by group members, in contrast the eficiencies of virtual learning teams. (Bonk et al.,
to competition in which individuals beat other group 2005)
members. (Donnelly, 2005) 8: An approach that involves
learners (and sometimes teachers) working together and Collaborative Planning, Forecasting, and
learning from each other. (Agosti, 2005) 9: Engagement Replenishment (CPFR)
in learning wherein students utilize and build upon 1: A process where the entire extended supply chain,
their individual strengths and interests for greater good. including manufacturers, distributors, and retailers, is
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
98 Colla borat ive Re se a rch Colle c t ion M a na ge m e nt
using the same information through collaborative process premium brand name and Nestls manufacturing and
to improve sales and forecast accuracy, reduce inventory distribution know-how. (Angehrn & Gibbert, 2005)
C levels, and prevent stock outs due to promotions. (Khan
et al., 2006) 2: An industry-wide initiative that involves Collaborative Tool
collaboration between trading (supply chain) partners in 1: A tool or technique that facilitates distant collaboration
the retail industry in order to achieve lower costs, higher geographically at different locations. (Nandavadekar, 2005)
eficiency, and better customer satisfaction. (Saha, 2005) 2: An electronic tool that supports communication and
3: A global, open, and neutral business process standard collaborationpeople working together; essentially it takes
for value chain partners to coordinate the various activities the form of networked computer software. (Metaxiotis,
of purchasing, production planning, demand forecasting, 2006) 3: E-mail, an intranets, a threaded discussions, or an
and inventory replenishment, in order to reduce the online discussion room that allows learners to collaborate
variance between supply and demand, and to share the on projects. Such tools also allow moderated discussions
beneits of a more eficient and effective supply chain. to take place in an online environment. (Brown, 2006)
(Archer, 2005) 4: Traditional chat, whiteboard, messaging, presentation,
VoIP, or a conferencing system; a strong component of
Collaborative Research knowledge management in the military. (Maule, 2006)
A type of research developed by individuals who belong
to different academic or practical disciplines in which Collaborative Virtual Environment
there is a variety of purposes, methods, and outcomes. 1: An environment that actively supports human-
(Crdoba & Robson, 2006) human communication in addition to human-machine
communication and which uses a virtual environment
Collaborative Resources as the user interface. (Viktor & Paquet, 2005) 2: An
An object representing a resource used/shared/exchanged interactive space in cyberspace that allows communities
by a pair of collaborating roles in order to perform certain to work, as opposed to communicate only, by interacting
simple tasks in collaboration with one another. (Daneshgar, in deined virtual spaces, using speciically designed
2005) artifacts to mimic the physical environment in which they
traditionally work. (Huq, 2006)
Collaborative Technology (CT)
A technology that includes at a minimum a virtual Collaborative-Social-Filtering Recommender
workplace that provides a repository recording the process Systems
of the group, electronic information sharing (such as Technique based on the correlation between users interest.
through ile sharing, e-mail, electronic whiteboards, and This technique creates interest groups between users, based
electronic conference), meta-information on the entries on the selection of the same. (Gil & Garca, 2006)
in the repository (such as data, sequence, and author of
each contribution), and ease access and retrieval from the Collaboratory
repository. (Sun & Xiao, 2006) Provides groups with technologies and tools so that they
can access each other, databases, and remote tools to better
Collaborative Tele-Learning collaborate, coordinate activities, and enhance group
The use of technology for distributed communication, processes. (Alavi et al., 2005)
collaboration, and problem solving among participants
in a learning environment. (Wild, 2005) Collection Development
The portion of collection management activities that
Collaborative Thinking primarily deals with selection decisions. (Gregory,
A strategic mindset where adjacent and even overlapping 2005)
stages in the industry value chain are seen as potential
partners rather than competitors. For example, Starbucks Collection Management
and Nestl both produce coffee, but they nevertheless All the activities involved in information gathering,
partnered up for the creation and distribution of chilled communication, coordination, policy formulation,
coffee-based soft drinks, thereby leveraging Starbucks evaluation, and planning that result in decisions about
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Colle c t ion of I nfor m at ion Collusion At t a ck 99
the acquisition, retention, and provision of access to and such social inluence as compliance, group norms,
information sources in support of the needs of a speciic and social identity and such personal mental states as
library community. (Gregory, 2005) anticipated emotions, desires, and value perceptions (e.g.,
C
purposive value, self-discovery, maintenance or personal
Collection of Information connectivity, social enhancement, and entertainment
Comprises several (typically several thousand or several value). (Bagozzi & Dholakia, 2005)
million) documents. (Trujillo, 2005)
Collective Knowledge
Collection Stage 1: Knowledge produced and shared by a group of people.
Stage of the intelligence cycle in which sources regarding Virtual community is a source of collective knowledge
the required environmental data are located and accessed, with the contribution of its participants. (Wang, Wei, et
and the data are retrieved from them. (Vriens, 2005b) al., 2006) 2: The knowledge of the organization, including
the knowledge of its employees, and customer/supplier and
Collection Type industry knowledge that can be actioned to bring about
A composite value comprising elements of some data innovation. (Mitchell, 2005a)
types. SQL:1999 supports arrays, which are ordered and
unbounded sets of elements. Another collection type not Collective Responsibility
supported by the standard is a nested table. (Zendulka, The idea that a group is sanctioned with, and accepts
2005b) responsibility for, creating change in the organization.
Each member helps and supports other members to make
Collective Action progress on implementing actions. (Shaw et al., 2006)
1: The voluntary cooperation of a group of individuals
that typically involves the production of a public or Collectivism
semi-public good. (Teigland & Wasko, 2005) 2: An Concerned with group interest rather than individual
initiative, undertaken by groups of owners, industry interest (individualism). Collectivist societies support
groups, government groups, and so forth, who audit the structures where people are born and live in extended
collective system operation and exchange information families. The concept of collective strength includes
to detect patterns of distributed attacks. (Janczewski & sharing, nurturing, supporting, and empowering
Portougal, 2005) interdependent groups. (Peszynski, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
100 Color Fe at ure Com m on Cost
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com m on Dat a M ode l (CDM ) Com m on Vulne ra bilit ie s a nd Ex posure s (CV E) 101
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
102 Com m onse nse K now le dge Com m unic at ion Te chnology
the names for all publicly known vulnerabilities and constructively conlict is managed. (Ali & Warne, 2005)
security exposures. (Cardoso & Freire, 2005) 2: Or atmosphere, can be deined as a set of conditions
C that transform cultural behavior and information into
Commonsense Knowledge desired (or undesired) states of a given entity (person,
The knowledge expected of every individual in a society. group, organization, region, nation, globe) through the
It includes acquaintance with the physical world and the communication process. (Targowski & Metwalli, 2005)
laws governing it, social behaviors, and procedures for
everyday tasks, such as simple business transactions. It Communication Environment
lies on the commonsense-expert knowledge dimension. In one sense, technology operates in a physical environment,
(Ein-Dor, 2006) but for computer-mediated communication, technology is
the environment, that is, that through which communication
Communicating X-Machine occurs. (Whitworth, 2006b)
A set of stream X-machine components that are able to
communicate with each other by exchanging messages. Communication Infrastructure
(Kefalas et al., 2005) Glue that links geographically dispersed users of
a learning environment together and gives them the
Communication impression of being in the shared workspace of the virtual
1: The exchange of information between two or more classroom. (Rugelj, 2005)
people with the intent that the senders message be
understood and considered by the receiver. (Teeni, 2006) Communication Media
2: H1 communicates with H2 on a topic T if and only if: The methods or tools in which information can be
H1 understands T (symbol: U(H1 T)), H2 understands exchanged and communication can be facilitated.
T (symbol: U(H2 T)), U(H1 T) is presentable to and Examples include telephones, televisions, e-mail, Web
understood by H2, and U(H2 T) is presentable to and sites, videoconferencing, and instant messaging, to name
understood by H1. (Gelepithis, 2005) 3: Human interaction a few. (Y.D. Wang, 2005)
to present, share, and build information and knowledge.
(Han & Hill, 2006) 4: The exchange of thoughts, messages, Communication Norms
or information by speech, signals, writing, or behavior. In the context of virtual teams, communication norms
Communication generally includes a sender, a receiver, are typical routines and expectations for communicating
a message, and a medium used to carry the message. within a virtual team using the communication media
(Croasdell & Wang, 2006) that the team has available to them (e.g., electronic
communication such as e-mail or instant messaging,
Communication Apprehension telephone, etc.). (Staples et al., 2005)
Apprehension associated with real or anticipated
communication with others. Traditional students with Communication Preference
high communication apprehension tend to quietly sit The selection of your own way in the art and technique
in a large lecture room, having minimal interpersonal of using words effectively to impart information or ideas.
contact with the instructor or other students. (Adkins & (Janvier & Ghaoui, 2006)
Nitsch, 2005)
Communication Strategies
Communication Channel The means by which communication goals can be fulilled.
The medium used to convey the message. The channel (Willis, 2005)
could involve seeing, hearing, smelling, feeling, or tasting.
Various media (e.g., e-mail, Web sites, telephone) may be Communication Technology
more or less appropriate for various messages. (Jacobson, The branch of technology concerned with the representation,
2006) transfer, interpretation, and processing of data among
persons, places, and machines. (Melkonyan, 2005)
Communication Climate
1: Extent to which there is an open and free exchange of
information, transparency of decision making, and how
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com m unic at ions Ce nt e r Com m unit y K now le dge Building 103
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
104 Com m unit y M e m or y Com m unit y of I nt e re st
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com m unit y of Le a r ne rs (CoL) Com m unit y of Pra c t ic e (CoP) 105
in the same way as a community of practice. (Kimble with strategic imperatives, helping each other to solve
& Hildreth, 2005) 2: An online group that grows from problems, share and beneit from each others expertise,
common interest in a subject. They develop norms based and are committed to jointly developing better practice.
C
on shared values and meanings. (Lambropoulos, 2006b) (Ng & Pemberton, 2006) 7: A relatively tightly knit,
emergent social collective, in which individuals working
Community of Learners (CoL) on similar problems self-organize to help each other and
1: A community of students, teachers, tutors, and experts share perspectives about their work practice, generally
marked by the presence of the following elements: (1) in face-to-face settings. (Wasko & Teigland, 2006a) 8:
multiple ZPDs (the ones of the subjects in the CoLs); (2) An informal collective group of individuals bound by
legitimated peripheral participation (the respect of the a common practice base engaged in knowledge-sharing
differences and peculiarities existing among the various activities to add value to work. (Huq, et al., 2006) 9: An
subjects in the community); (3) distributed expertise; informal community of people bound by a common task
and (4) reciprocal teaching, peer tutoring, and various or purpose (e.g., similar work activities). A CoP nurtures
scaffoldings. In this community previous knowledge is a critical skill set in an organization. It can exist across
analyzed, veriied, and discussed, and new knowledge company divisions and sometimes across organizational
and theories are built. (Cartelli, 2006a) 2: A community boundaries. (Sivakumar, 2006) 10: A group of people
whose learning is fundamentally a social phenomenon. who share a set of concerns and sustain their collective
Namely, a CoL focuses on engagement in social practice actions through their participation and generation of new
as the fundamental process by which we learn and so knowledge. (Crdoba & Robson, 2006) 11: AHIMAs
become who we are. (Vat, 2005a) online networking and collaborating tool, created for
the use of its members and launched in 2001. (Zender,
Community of Peers 2006) 12: The concept of a CoP was irst introduced by
A grouping of peers having something in common or Lave and Wenger in 1991 in relation to situated learning.
considered grouped for a speciic purpose, (e.g., having Lave and Wenger saw the acquisition of knowledge as a
particular types of privacy policies as discussed above). social process in which people participated in communal
(Yee & Korba, 2006) learning at different levels depending on their authority
in a groupthat is, newcomers learn from old-timers by
Community of Practice (CoP) being allowed to participate in tasks relating to the practice
1: A community of individuals having the following of the community. Since 1991, the concept of CoPs has
elements in common: (1) a joint enterprise, as understood been extended and applied to areas such as knowledge
and continually renegotiated by its members; (2) a mutual management and virtual working. (Kimble & Li, 2006)
engagement binding members together into a social 13: A group of people who come together around common
entity; and (3) a shared repertoire of communal resources interests and expertise. They create, share, and apply
(routines, sensibilities, artifacts, vocabulary, etc.) that knowledge within and across the boundaries of teams,
members developed over time. (Cartelli, 2006b) 2: A business units, and even entire organizationsproviding
group of people in an organization who are (somehow) a concrete path toward creating a true knowledge
held together by common interest in their work topic, organization. (Vat, 2006b) 14: Although this term is
purpose, and activities. (Disterer, 2005) 3: A community common when referring to informal groups or networks
of professional individuals who have the shared sense of of people who share similar interests and objectives, CoPs
purpose in a work situation (e.g., professionals at different have been seen as an alternative to teamwork where a
institutions collaborating on best practice, or individuals variety of problems may be better considered through
that perform the same function in different parts of an knowledge shared by loose coalitions of people who
organization). (Fleming, 2005c) 4: A group of individuals develop their own tacit knowledge and methods for doing
that may be co-located or distributed, are motivated by a things. This is more common among certain professions
common set of interests, and are willing to develop and such as lawyers, barristers, GPs, academics, and so forth
share tacit and explicit knowledge. (Coakes & Clarke, whose conduct is regulated by professional associations
2006a) 5: A group of people who have work practices in and who share a similarity of attitudes and conventions.
common. (Elshaw, 2006a) 6: A group of self-governing (Grieves, 2006b) 15: Collaborative means to build and share
people with shared interests whose practice is aligned knowledge and expertise, increase social capital and the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
106 Com m unit y of Pra c t ic e M e m be rship Com pa c t Disc Re ad-Only M e m or y (CD-ROM )
economic value of relationships within the military, and Community Service Obligation
lower the cost of training. (Maule, 2006) 16: A community An obligation undertaken by particular levels of
C formed by people who engage in a process of collective government to ensure the provision of certain services.
learning in a shared domain of human endeavor. For a (Cameron, 2005)
community of practice to function, it needs to generate and
appropriate a shared repertoire of ideas, commitments, and Community Space
memories. It also needs to develop various resources such A spacereal, virtual, or a combination of bothwhere
as tools, documents, routines, vocabulary, and symbols a sense of community is created. (Walker, 2006)
that in some way carry the accumulated knowledge of the
community. (Boersma & Kingma, 2006) Community Telecenter
A public place that provides low-cost community access to
Community of Practice Membership ICTs such as computers, printers, telephones, faxes, e-mail,
In a community of practice, new members are included and the Internet. In many cases telecenters also have library
in tasks concerned with the practices of the group and resources, as well as audio, video, and documentation
they acquire knowledge from more expert members. production facilities. They may also provide training in the
Participation in a community of practice therefore involves use of ICTs, distance learning, and telemedicine, and also
movement from the periphery towards full participation usually support the production of information resources
in the group. (Ranguelov & Rodrguez, 2006) relevant to the needs of local users. They are sometimes
referred to as multipurpose community telecenters.
Community of Purpose (Mwesige, 2005)
A community that forms around people who are to
achieve a similar objective. Such a community only Community-Based Information Technology
serves a functional purpose. Members of the community The provision of training and information technology
can assist each other by sharing experiences, suggesting services to local communities to meet their communications
strategies, and exchanging information on the process in needs. (Pease et al., 2005)
hand. (Kimble & Hildreth, 2005)
Community-Building Activity
Community Place An online or off-line activity that promotes relational
Place inherent to the existence of a community, but not and social connection among participants. (Woods &
equivalent to it, with the following attributes: interactivity, Baker, 2005)
sustainable membership, diversity of communicators,
and a shared technology for group CMC. (Porto Bellini Community-Oriented Policing
& Vargas, 2006) Contemporary policing approach that builds relationships
between police oficers and the citizens of a community
Community Portal on an ongoing basis. Crime prevention is stressed as
1: A portal designed and developed to provide access a partnership approach before an actual emergency
to community resources and serve community needs situation(s) develops. (Baim, 2005)
and interests. (Vrazalic & Hyland, 2005) 2: A Web
site tailored for the needs of a community. (Boateng & Compact and Generalized Abstraction of the
Boateng, 2006b) 3: An online initiative often developed Training Set
through participative processes which aims to achieve A compact representation built by using the training set
better coordination of relevant Web-based information and from which not only the original patterns, but also some
provide communication services for community members. new synthetic patterns can be derived. (Viswanath et al.,
(Thompson, 2005) 4: Often set up by community groups or 2005)
based around special group interests, a community portal
attempts to foster the concept of a virtual community where Compact Disc Read-Only Memory (CD-ROM)
all users share a common location or interest, and provide 1: A type of optical disk capable of storing large amounts
many different services. (Tatnall et al., 2006) of data, up to 1 GB, although the most common size is
650 Mbytes. (Sala, 2005b) 2: Optical data storage medium
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com pa rat ive Online Ana lysis of Cult ure s (COAC) Com pe t it ion 107
using the same physical format as audio compact discs, Compensating Transaction
readable by a computer with a CD-ROM drive. (Kabene, A transaction that is executed to undo the effect of another
Takhar, et al., 2005) 3: A computer storage device offering a committed transaction. Unlike ordinary transaction
C
relatively high capacity. The full name denotes the fact that rollback or abort, both original and compensating
CD-ROMs are read-only devices; data cannot be written transactions are visible in the committed projection of
to a CD-ROM by a conventional player. (Duan, 2005) the execution history. (Leong, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
108 Com pe t it ive Adva nt a ge Com ple m e nt a rit y
biological systems, this is typically for food, space, or would deine similar variables as the required returns and
some other physical need, but in IT, it can be any matter beneits. A company is said to have a sustained competitive
C relating to IS curriculum. When the thing the competitors advantage when it is implementing a value-creating
are striving for is not in adequate supply for both of them, strategy, which generates returns and beneits at a level
the result is that both are hampered or adversely affected not enjoyed by current competitors and when these other
in some manner. (Tatnall & Davey, 2005) companies are unable to reach an equilibrium level
with the company enjoying the advantage. In this sense,
Competitive Advantage the deinition of sustained competitive advantage adopted
1: A condition that enables companies to operate in a more here does not imply that it will last forever, and does not
eficient or higher quality manner than the companies it depend upon the period of time during which a company
competes with, which results in inancial beneits. (Braun, enjoys a competitive advantage (rather, the equilibrium
2006) 2: A positive, relative position held by a irm as level is critical in this deinition). (Potgieter et al., 2005)
compared with competitors within a market or industry.
There are two types of competitive advantage: cost Competitive Intelligence
leadership and differentiation. (Cepeda-Carrin, 2006) 3: 1: In IT literature, two deinitions are used: a product
Deines a places or regions attribute(s) with the potential deinition and a process deinition. In the product deinition,
to place it in a leading position in any ield (generally used competitive intelligence is deined as information about
with regard to commercial or economic activity), such as the environment, relevant for strategic purposes. The
a natural or environmental icon that may give a region a process deinition highlights producing and processing this
competitive advantage in terms of tourism, or a mineral environmental information. Process deinitions often refer
deposit in terms of mining. A region or place needs to to the intelligence cycle. (Achterbergh, 2005a) 2: The set
identify and capitalize on distinctive assets and capacities of interrelated measures that aim at systematically feeding
to realize its competitive advantage. (Sutcliffe, 2005) 4: the organizational decision process with information about
Employing organizational resources in an advantageous the organizational environment in order to make it possible
manner that cannot be imitated readily by competitors. for people to learn about it, to anticipate its evolution, and
(Nissen, 2005) 5: The ability to gain a disproportionately to make better decisions in consequence. (de Carvalho &
larger share of a market because of cost leadership, or Ferreira, 2006)
product or service differentiation. (McManus & Carr,
2005) 6: The head start a business has owing to its access Competitive Neutrality
to new or unique information and knowledge about the A principle that states that government agencies and
market in which it is operating. (Kroeze, 2005) 7: Usually businesses should not enjoy any competitive advantage
refers to characteristics that permit a irm to compete over privately operated competitors in the delivery of
effectively with other irms due to low cost or superior services by virtue of being government owned. Competitive
technology, perhaps internationally. (Lubbe, 2005) 8: A neutrality is achieved through transparent accounting and
company is said to have a competitive advantage when, cost-relexive charges for services. (Cameron, 2005)
based on its strategic architecture and complementary
resource combinations (CRCs), it is able to implement a Complementarity
strategy that generates returns and beneits in excess of 1: A product or service that provides more value as
those of its current competitorswho simultaneously part of a group than individually. For example, hybrid
are implementing strategies, similar or otherwise e-retailers can leverage complementarities by providing
because of the perceived value in the marketplace. The off-line services to online shoppers. (I. Lee, 2005) 2:
deinition therefore also depends on what the company, Several activities are mutually complementary if doing
its management, and its stakeholders deine as what the more of any one activity increases (or at least does not
required returns and beneits should be (because even decrease) the marginal proitability of each other activity
though many would list it as inancial, clearly this does in the group. Complementarities among activities imply
not apply to all companies, i.e., an advantage could be mutual relationships and dependence among various
something other than inancial). One could reasonably activities whose exploration can lead to higher proitability.
expect, though, that companies within similar industries (Scupola, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com ple m e nt a r y Core Com pe t e nc ie s/Pooling of Re sourc e s Com plex Syst e m 109
Complementary Core Competencies/Pooling of the time availability decreases, and the degree of judgment
Resources required increases. Decision making is ex-post, complex,
The ease with which two members of a virtual organization and may require multiple steps. Initial monitoring uses a
C
can communicate allows them to pool their resources, even priori thresholds broader than in a simple environment
with members not directly involved in a speciic project. that is, more granular and produces exceptions that
Separate entities can quickly be called upon to provide identify a Suspected Non-Compliant Event (SNCE).
secondary service or consult on a project via virtual Evidence for decision making uses the results of the initial
channels. (J. Lee, 2005) monitoring as well as important information related to the
event, characterized by a need for judgmental expertise.
Complementary Resource Combination (CRC) (Goldschmidt, 2005)
Not a factor input, but a complex combination of inter-
related conigurations, or a network of assets, people, Complexity
and processes that companies use to transform inputs to 1: Degree to which an innovation is seen by the potential
outputs. Many of these conigurations are a blend of hard adopter as being relatively dificult to use and understand.
tangible resources and soft intangible resources which (Green et al., 2005) 2: The degree to which the structure,
simply cannot be recreated by another company. Finely behavior, and application of an organization is dificult
honed CRCs can be a source of competitive advantage. to understand and validate due to its physical size, the
(Potgieter et al., 2005) intertwined relationships between its components, and
the signiicant number of interactions required by its
Complementary Similarity Measurement collaborating components to provide organizational
An index developed experientially to recognize a poorly capabilities. (Ng & Pemberton, 2006) 3: The degree to which
printed character by measuring the resemblance of the a system or component has a design or implementation
correct pattern of the character expressed in a vector. that is dificult to understand and verify. The irst and
Referred to by some as a diversion index to identify the still classic measure of complexity is that introduced by
one-to-many relationship in the concurrence patterns Kolmogorov which is the shortest computer program
of words in a large corpus or labels in a large database. capable of generating a given string. (Polgar, 2005b)
(Ito, 2005)
Complexity of Innovation
Complete Evaluation The degree to which an innovation seems dificult to
To re-evaluate a CQ on the whole base data (i.e., the new understand and use. (Askarany, 2005)
result) and then ind the symmetric difference with the
previous result set. (Khan, 2005) Complex Situation
The current world state that the user needs to understand.
Complete Test The understanding in a complex situation extends beyond
Veriies that an update operation leads a consistent database procedural information and requires understanding
state to either a consistent or inconsistent database state. the dynamic interrelationships of large amounts of
(Ibrahim, 2005) information. (Albers, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
110 Com plia nc e Com posit iona l De sign a nd Re use
system give rise to the collective behaviors of the system. CORBA components, EJB, and COM+/.NET. (Stojanovic
Complexity (information-theoretical and computational) & Dahanayake, 2005)
C and emergence of collective behavior are the two main
characteristics of such complex systems. Social systems Component Model
formed (in part) out of people, the brain formed out of A model specifying the standards and conventions
neurons, molecules formed out of atoms, and the weather imposed on developers of components. Includes admissible
formed out of air lows are all examples of complex ways of describing the functionality and other attributes
systems. The ield of complex systems cuts across all of a component, admissible communication between
traditional disciplines of science, as well as engineering, components (protocols), and so forth. (Chroust, 2006)
management, and medicine. (Shahabi & Banaei-Kashani,
2005) 4: Borrowed from Complexity Theory, a system Component-Based Development
that is neither rigidly ordered nor highly disordered. A software development approach where all aspects
System complexity is deined as the number and variety and phases of the development lifecycle are based on
of identiiable regularities in the structure and behavior components. (Stojanovic & Dahanayake, 2005)
of the group, given a description of that group at a ixed
level of detail. (Farooq et al., 2006) Component-Based Solution
A set of smaller software components that link seamlessly
Compliance to a wider framework through the adoption of standards.
Social inluence process whereby a person conforms to the (Salter, 2005b)
expectations of others based upon the motivation of a need
for approval. Also known as subjective norm. (Bagozzi Component-Based Web Engineering
& Dholakia, 2005) The application of systematic, disciplined, and quantiiable
component-based and reuse-oriented approaches to the
Compliance Veriication understanding, construction, operation, and evolution
Ensuring the necessary and suficient evidence supports of Web-based applications and systems. (Gaedke et al.,
the assertion of non-compliance. (Goldschmidt, 2005) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com pre he nsibilit y Com put e r Anim at ion 111
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
112 Com put e r Anx ie t y Com put e r Re se r vat ion Syst e m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com put e r Sc ie nc e (CS) Com put e r-Aide d Soft w a re Engin e e ring (CASE) 113
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
114 Com put e r-Assist e d I nst ruc t ion (CAI ) Com put e r-M e diate d Com m unic at ion (CM C)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com put e r-M e diat e d Com m unic at ion Syst e m Com put e r-Suppor t e d Asynchronous Disc ourse M e dium 115
and computer networks that enables users to transmit, individuals that occurs via computer networks. Computer-
receive, and store information via synchronous and mediated communication may be text, audio, graphics,
asynchronous communication tools. (Erlich, 2005) 3: or video based, and may occur synchronously (in real
C
A communication system that involves or is assisted by time) or asynchronously (delayed). (Roberts et al., 2005)
computers. Computer-mediated communication includes 16: Communication that is facilitated using information
group support systems, e-mail, videoconferencing, chat technologies such as e-mail, videoconferencing, and
rooms, and instant messaging. (Klein, 2005) 4: CMC was teleconferencing. (Panteli, 2005)
made widely popular by the Internet, which allows people
to communicate in a variety of modes such as e-mail or Computer-Mediated Communication System
chat. CMC in turn is affecting translation practice as more Includes a wide range of telecommunication equipment
and more people communicate in a CMC mode across such as phones, intranets, Internets, e-mail, group support
languages and require language support. (OHagan, 2005) systems, automated worklow, electronic voting, audio/
5: Communication between humans using the computer video/data/desktop videoconferencing systems, bulletin
as a medium. (Link & Wagner, 2006) 6: Communication boards, electronic whiteboards, wireless technologies, and
that is facilitated by computer applications, for example, so forth to connect, support, and facilitate work processes
e-mail, bulletin boards, and newsgroups. (Kung-Ming among team members. (Wong-MingJi, 2005)
& Khoon-Seng 2005) 7: Communication that takes
place through, or is facilitated by, computers. Examples Computer-Mediated Education (CME)
include both asynchronous tools such as bulletin boards, Teaching using developed and still-evolving powerful and
e-mail, and threaded discussion, and synchronous tools sophisticated hypermedia computer tools. (Danenberg &
such as chat and videoconferencing. (Swan, 2005) 8: Chen, 2005)
Human communication that takes place through or is
facilitated by information technology, including networked Computer-Mediated Information Technology
telecommunications systems and computers. (Ridings, An effective means of storing and retrieving knowledge.
2006a) 9: Interactions in which all involved parties use IT tools such as Lotus Notes and intranets are designed
computers as the primary or the only means of exchanging to provide a means for retaining and accessing electronic
information. (St.Amant, 2006a) 10: All media that are archives. (Jasimuddin et al., 2006)
involved in the dynamic transfer and storage of data (analog
and digital) across established networks. The technology Computer-Mediated Interaction (CMI)
includes the World Wide Web, e-mail, telephones, iber Interaction mediated by electronic means, whether between
optics, and satellites. (Zakaria & Yusof, 2005) 11: Using people or computer agents. (Whitworth, 2006b)
technology-based tools such as e-mail, chat programs,
or conferencing tools to communicate at a distance. Computer-Mediated Technology (CMT)
(Schoenfeld & Berge, 2005) 12: The use of information The combination of technologies (e.g., hypermedia,
technology to support the interaction between people, handheld technologies, information networks, the
directed to the resolution of a problem or activity in a Internet, and other multimedia devices) that are utilized
task context. (Fleming, 2005c) 13: CMC, like e-mail, is for computer-mediated communication. (Kwok Lai-yin
one-to-one, asynchronous communication mediated by & Tan Yew-Gee, 2005)
electronic means. List e-mail seems to be many-to-many
communication, but the transmission system simply Computer-Supported Asynchronous Discourse
duplicates one-to-one transmissions. In true one-to-many Medium
transmissions, like a bulletin board, one communication An electronic medium for discussion where participants
operation is transmitted to many people (e.g., posting do not have to be communicating at the same time, as they
a message). (Whitworth, 2006b) 14: Communication do in an oral discussion. Participants make contributions
between instructor and student or between students which to a community knowledge base accessible to everyone.
discusses some aspect of course content, assignment, The knowledge is represented by notes that are preserved
or student progress in an online course, utilizing the in a database and are continually available for search,
online computing environment for the communication. retrieval, comment, reference, and revision. (Woodruff
(Gold, 2005) 15: Communication between two or more & Nirula, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
116 CSCW Com put e rize d Assist e d Audit ing Te chnique (CAAT )
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Com put e rize d Crim ina l H ist or y (CCH ) Conc e pt Cont ra c t ion 117
Computerized Criminal History (CCH) & Diday, 2005) 4: In the Galois connection of the (T, I,
A system containing offenders and their individual arrests, D) context, a concept is a pair (X, Y), XT, YI, that
inal disposition of those arrests, and custodial information satisies s(X)=Y and t(Y)=X. X is called the extent and
C
for those arrests. (Holland, 2005) Y the intent of the concept (X,Y). (Dumitriu, 2005) 5: An
abstract or generic idea, opinion, or thought generalized
Computerized Language Labs from particular instances by the selection of meaningful
Foreign language instructional programs operated via terms. The concept may be identiied by the use of text-
computer disks, distributed to multiple computers by a mining techniques, which are used to explore and examine
ile server, and accessed by an entire class of students. the contents of talks, texts, documents, books, messages,
(Switala, 2005) and so forth. Concepts belong to the extra-linguistic
knowledge about the world, representing real things in
Computerized School Information System formal ways. (Antonio do Prado et al., 2005) 6: A mental
A speciic information system for educational management, construct, unit of thought, or unit of knowledge created by
for example, an enrollment system or an assessment and a unique combination of characteristics. (Gillman, 2006)
reporting system. (Mackey, 2005) 7: Simultaneously a result and an agent; concepts are
formed within the discourse, however they lack meaning
Computing Inspired by Nature if isolated from it. It is the concepts that bring density and
Embodies all approachesmainly problem-solving relief to a discourses content. A concept is an accumulation
techniquesdeveloped using ideas from or inspired by of meaning, and this meaning is produced within a
natural phenomena and/or their corresponding theoretical discourse, through a metaphorization process, constitutive
models. It is also sometimes referred to as computing of all natural language, and thus inherent to philosophy
with biological metaphors. Instead of trying to create itself. The density and thickness of a text depends on the
accurate (theoretical) models, it usually results in high-level combination and hierarchization of concepts. Philosophy
abstractions of natural phenomena. (de Castro, 2005) is not a sophistication or a puriication of concepts; it is
discourse and text, where concepts have a key role and can
Computing with Symbols be searched for, never at the beginning but rather through
The interpretations of the symbols are not participating the interpretation process itself. (Nobre, 2006b) 8: A sort
in the formal data processing or computing. (T.Y. Lin, of scheme produced by repeated experiences. Concepts
2005) are essentially each little idea that we have in our heads
about anything. This includes not only everything, but
Computing with Words every attribute of everything. (Amoretti, 2005)
One form of formal data processing or computing in
which the interpretations of the symbols do participate. Concept Abduction
L.A. Zadeh uses this term in a much deeper way. (T.Y. Non-standard reasoning service provided by digital
Lin, 2005) libraries. Abduction is a form of non-monotonic reasoning,
modeling commonsense reasoning, usually aimed at
Concept inding an explanation for some given symptoms or
1: A mental structure derived from acquired information manifestations. Concept abduction captures the reasoning
which, when applied to a problem, clariies to the point of mechanismnamely, making hypothesesinvolved
solving the problem. (Andrade, Ares, Garca, Rodrguez, when some constraints required by a resource request R
& Silva, 2006) 2: A pair (A, B) of a set A of objects and a are not speciied in a offered resource Othat obviously
set B of features such that B is the maximal set of features in later stages of the request/offer interaction might turn
possessed by all the objects in A, and A is the maximal out to be fulilled or not. (Colucci et al., 2006)
set of objects that possess every feature in B. (Saquer,
2005) 3: Each category value of a categorical variable or Concept Contraction
a logical association of variables. For example, a concept Non-standard reasoning service provided by digital
can be simply a town or a type of unemployment, or in a libraries. Contraction is the irst step in belief revision.
more complex way, a socio-professional category (SPC) Concept contraction captures the possibility to relax some
associated with an age category A, and a region R. (Murthy of the constraints of a requested resource R when they
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
118 Conc e pt Drift Conc e pt ua l M a ps
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Conc e pt ua l M ode l Conc e pt ua lizat ion 119
Conceptual Model and their principal characteristic is easy and intuitive use.
1: A model concerned with the real-world view and (Cuadra et al., 2005)
understanding of the data. It suppresses non-critical
C
details in order to emphasize business rules and user Conceptual Modeling: See Conceptual Model.
objects. (Pardede et al., 2005) 2: Abstraction of the real
world/domain, and a mechanism for understanding and Conceptual Modeling Language
representing organizations and the information systems A language used to represent conceptual models. (Andrade
that support them. The most important types of models are: et al., 2006a)
Object ModelDescribes objects by data and operations
on the data. The objects identity encapsulates its state Conceptual Schema
(attributes and relationships with other objects) and its 1: A completely or partially time-independent description
behavior (allowed operations on/with that object). Process of a portion of the (real or postulated) world in the sense that
ModelDescribes (sub)processes by the activities they a conceptual schema contains the deinition of all concepts
involve, the activity order, decision points, and pre-/post- and all relationships between concepts allowed to be used
conditions for the activity execution. Functional Model in the description of that portion of the world. (Marjomaa,
Describes the information low and transformation, as well 2005) 2: A structured technology-independent description
as the constraints and functional dependencies among the of the information about an application domain such as a
activities in a process. Organizational ModelDescribes company or a library. By extension, it is also an abstract
the worklow (activities for the creation and movement of representation of the existing or project database that is
the documents) within an organization, the peoples roles, made up of the data of this domain. (Hainaut et al., 2005)
and the communication among people for performing 3: Speciication of the structure of a business domain using
the activities. (Galatescu, 2005) 3: An abstraction of the language and terms easily understood by a non-technical
problem as well as a possible model of a possible conceptual domain expert. A conceptual schema typically declares
solution to the problem. (Andrade et al., 2006a) 4: Semi- the fact types and business rules that are relevant to the
formal framework (usually a language and a diagram business domain. (Halpin, 2005)
notation) used to capture information about the structure
and organization of things, properties, and relations in a Conceptual Schema of a Database
fragment of the real world, called the domain, usually one A semi-formal, high-level description of the database,
of interest to a (software) system. The model represents independent of its implementation. (De Antonellis et al.,
the semantics of the domain to the system. (Mani & 2005)
Badia, 2005) 5: The abstraction of relevant aspects of a
targetusually physicalsystem into a representation Conceptual/Functional Equivalence
system consisting of symbols, logic, and mathematical Refers to whether a given construct has similar meaning
constructs. (Vitolo & Coulston, 2005) 6: A formal or semi- across cultures. (Karahanna, Evaristo, & Srite, 2005)
formal description of the actual world elements (objects,
persons, organizations) to be included in the future software Conceptualism
artifact. (Doorn, 2005) 7: An action describing a domain An ontological position that entity classes exist only in
with the help of some artiicial or formalized language. the mind of the modeler. (Artz, 2005c)
(Fettke, 2005) 8: High-level modeling; modeling at a high
level of abstraction. (Barca et al., 2005) 9: Process of Conceptualization
forming and collecting conceptual knowledge about the 1: A model of reality, a generalized abstraction of
Universe of Discourse, and documenting the results in particular items. Example: A radio exists physically, but
the form of a Conceptual Schema. (Marjomaa, 2005) 10: when conceptualized it exists symbolically as some form
Starting point for database design that consists of producing of knowledge representation: a word, picture, diagram,
a conceptual model. (Mani & Badia, 2005) 11: The use graph, or formula. (Buchholz, 2006) 2: The process of
of concepts and their relationships to deal with and solve constructing conceptual structuresthat is, structures of
a problem. (Andrade et al., 2006a) 12: Tools to achieve a concepts and their relationships that represent a subject
good design of information systems. These tools are used domain. (Houben et al., 2006)
to express information system requirements speciication,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
120 Conc e r n of Com m e rc ia lizat ion Condit iona l I nde pe nde nc e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Conditional Probability Conidential Information 121
and Y of variables are conditionally independent given a antecedent of the rule X that also support the consequent
third set Z, if knowledge on Z (what value Z takes) makes of the rule Y in the set of data cases D. (Swierzowicz,
knowledge on Y irrelevant to guessing the value of X. 2005) 2: An asymmetric index that shows the percentage of
C
(Xiang, 2005) records for which A occurred within the group of records
and for which the other two, X and Y, actually occurred
Conditional Probability under the association rule of X, Y A. (Ito, 2005) 3:
Probability of some event A, assuming event B, written Given an association rule X Y, the conidence of a rule
mathematically as P(A|B). (Bashir et al., 2005) is the number of transactions that satisfy X Y divided
by the number of transactions that satisfy X. (Imberman
Conditional Structure & Tansel, 2006) 4: The conidence of a rule is the support
An algebraic expression that makes the effects of of the item set consisting of all items in the rule (A B)
conditionals on possible worlds transparent and divided by the support of the antecedent. (Denton &
computable. (Kern-Isberner, 2005) Besemann, 2005) 5: The conidence of a rule X Ij,
where X is a set of items and Ij is a single item not in X,
Conditioning is the fraction of the transactions containing all items
Revision process of a belief by a fact accepted as true. in set X that also contain item Ij. (Wong, & Fu, 2005) 6:
(Smets, 2005) The proportion of records that belong to the target class
from those that satisfy the antecedent of the rule. This is
Condominium Fiber also often called the accuracy of the rule. An alternative
A unit of dark iber installed by a particular contractor deinition is the proportion of records for which the rule
(originating either from the private or the public sector) on makes the correct prediction of the target class. (Richards
behalf of a consortium of customers, with the customers to & de la Iglesia, 2005) 7: The rule A=>B has conidence c,
be owners of the individual iber strands. Each customer- if c% of transactions that contain A also contain B. (Daly
owner lights the ibers using his or her own technology, & Taniar, 2005a)
thereby deploying a private network to wherever the iber
reaches, that is, to any possible terminating location or Conidence in Vendor
endpoint. (Chochliouros et al., 2005a) Trust or faith in a vendor, especially trust or faith in the
vendors guarantees of a safe shopping environment.
Conduit Metaphor (Shan et al., 2006a)
A metaphor about communication which suggests that
an addressers ideas are objects contained in packages, Conidence of a Rule
known as words, that are directly sent to the addressee. Percentage of the rows that contain the antecedent that
(Zappavigna-Lee & Patrick, 2005) also contain the consequent of the rule. The conidence
of a rule gives us an idea of the strength of the inluence
CONE that the antecedent has on the presence of the consequent
A new lifecycle in which development process occurs in of the rule. (Ale & Rossi, 2005)
iteration cycles, each one having many activities grouped
together in phases. (Furtado, 2005) Conidence of Rule XY
The fraction of the database containing X that also contains
Conferencing System Y, which is the ratio of the support of XY to the support
A system speciically designed to facilitate synchronous of X. (Shen, 2005)
virtual meetings by phone or computer. Teleconferencing
utilizes computer-controlled audiovisual transmission. Conidential Information
Computer conferencing uses computer-enabled Sensitive organizational information that should be
conferencing to work together in real time using free disclosed only to authorized users. Usually stored in the
proprietary software. (Ferris & Minielli, 2005) database or data warehouse, this information needs to
kept secure from hackers and snoopers. (Wilson et al.,
Conidence 2006b)
1: A parameter used in the association-rules method for
determining the percent of data cases that support the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
122 Conidentiality Connectionist Expert System
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Conne c t ions in Pla nning Consor t ia 123
processing elements that are connected through weighted in the belief that the indings of those sciences offer a
connections. The knowledge in these systems is represented more robust foundation for the proper investigation of all
by these weights. The topology of the connections are phenomena. (Atkinson & Burstein 2006)
C
explicit representations of the rules. (R., 2005)
Consistency
Connections in Planning 1: On Web sites, refers to keeping similar Web pages
Refers to the degree of contact between HR and IT similar in their look and feel. Examples of ways to
executives in their respective planning processes. (Dery achieve consistency include using the same or similar
& Samson, 2005) colors, font, and layout throughout the site. (Chalmers,
2006) 2: Similar to compatibility and sometimes used
Connectivity interchangeably; designs that match our expectations
1: The ability to access various media via the necessary in terms of characteristics, function, and operation, and
equipment and channels. (Reilly, 2005) 2: The ability to are applied in a constant manner within the design itself.
link to the Internet via a computer. (Braun, 2005a) 3: The (Noyes, 2006)
interconnections that employees and users have through
the use of the Internet or other knowledge management Consistency of Warehouse Data and Web
tools. (Borders & Johnston, 2005) Documents
In order to introduce consistency among documents and
Connectivity Phenomena data, the data warehouse library (DWL) must enjoy data
A term drawn from computational linguistics. In the warehouse features. Hence, documents are never removed
presence of several logically linked elementary events, from the DWL; all documents are properly described with
it denotes the existence of a global information content metadata and linked to data warehouse objects. There are
that goes beyond the simple addition of the information four levels of consistency between the DWL and DW that
conveyed by the single events. The connectivity enable the eDW system to build retrieval queries: subject
phenomena are linked with the presence of logico- consistency, temporal consistency, semantic consistency,
semantic relationships like causality, goal, indirect speech, and personalization. These four levels together provide
coordination, and subordination, as in a sequence like: constraints for sub-setting the DWL and producing relatively
Company X has sold its subsidiary Y to Z because the small ranked lists of relevant documents associated with
proits of Y have fallen dangerously these last years due data warehouse reports. (Wecel et al., 2005)
to a lack of investments. These phenomena cannot be
managed by the usual ontological tools; in NKRL, they are Consistent Answer
dealt with using second-order tools based on reiication. 1: A set of tuples, derived from the database, satisfying
(Zarri, 2006c) all integrity constraints. (Flesca, Greco, et al., 2005) 2:
Data satisfying both the query and all integrity constraints
Consensus Building deined on the given database. (Flesca, Furfaro, et al.,
Also known as collaborative problem solving or 2005)
collaboration, it includes techniques such as brainstorming,
focus groups, techniques for managing meetings, Consistent Database
negotiation techniques, Delphi, and NGT, and is used as A database satisfying a set of integrity constraints. (Flesca,
a resolution process mainly to settle complex disputes or Furfaro, et al., 2005)
issues. (Janes, 2005)
Consolidation
Consequent Work models developed from individual observations are
A logical conclusion to an event. For example, in the combined to identify both commonalities and uniquenesses.
relationship When it is hot, Mary buys an ice cream, The third step in contextual design. (Notess, 2005)
buys an ice cream is the consequent. (Beynon, 2005b)
Consortia
Consilience An organization formed from several businesses or
The reconciliation of all knowledge with the historical and enterprises joining together as a group for a shared purpose.
scientiic observations of biology, chemistry, and physics (Kung-Ming, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
124 Consor t ia -Type Dist a nc e Te a ching Ve nt ure Const ruc ti onism
Consortia-Type Distance Teaching Venture to push the constraints, or at least part of them, deeply
A collaborating venture between several universities or into the data-mining algorithms. (Boulicaut, 2005) 2:
C between universities and other partners joining forces to Data mining obtained by means of evaluation of queries
offer distance teaching programs together. (Guri-Rosenblit, in a query language allowing predicates. (Meo & Psaila,
2005a) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Const ruc t ive Solid Ge om e t r y (CSG) Consult a ncy 125
that the student constructs his/her own knowledge on certain behaviors on how to interact with it. (Karoulis &
the domain, rather than acquiring certain behaviors Pombortsis, 2005a)
on how to interact with it. (Athanasis & Andreas, 2005)
C
5: Knowledge is constructed by the learner through Constructive Solid Geometry (CSG)
experiential learning and interactions with the environment One of the most popular ways to describe a three-
and the learners personal workspace. (Ally, 2005b) 6: A dimensional model. In CSG, a model is compiled from
form of learning in which students construct their own primitives and Boolean operators linking them. Data
unique understanding of a subject through a process that are stored in the tree structure, where the leaves are the
includes social interaction, so that the learner can explain primitives, and the nodes are the operations: intersection
understandings, receive feedback from teachers and other (AND), union (OR), and complement (NOT). (Cruz et
students, clarify meanings, and reach a group consensus. al., 2005)
(Grasso & Leng, 2005) 7: A learning theory based on the
premise that students construct their own learning based Constructivist
on their own experiences. (Burrage & Pelton, 2005) Relating to a learning environment where the learner
8: A learning theory that knowledge is constructed by interacts with objects and events, thereby gaining an
the learner through experience-based activities. (Judd, understanding of the features held of such objects or
2005) 9: A learning theory that posits people construct events. (Blicker, 2005)
knowledge by modifying their existing concepts in light of
new evidence and experience. Development of knowledge Constructivist Learning
is unique for each learner and is colored by the learners 1: A learning philosophy that contends that learning occurs
background and experiences. (Stodel et al., 2005) 10: A in incremental steps, leveraging on the previous knowledge
theory of learning and knowing that holds that learning of the learner about the topic. (Hin & Subramaniam, 2005b)
is an active process of knowledge construction in which 2: A model for learning based on the widely held notion
learners build on prior knowledge and experience to that individuals construct their own knowledge of, and
shape meaning and construct new knowledge. (Bieber et meaning for, the world around them. (Pritchard, 2005b)
al., 2005) 11: A theory of learning based on the idea that
knowledge is constructed as learners attempt to make Constructivist Methodology
sense of their experiences. It is assumed that learners are A teaching method based on the works of Jean Piaget and
not empty vessels waiting to be illed, but rather active Lev Vygotsky by which the instructor helps the student
organisms seeking meaning: regardless of what is being construct meaning rather than simply lecturing. This
learned, learners form, elaborate, and test candidate mental method is learner centered and learner driven. (Trammell,
structures until a satisfactory one emerges. (Vat, 2005a) 2005)
12: A theory of learning that asserts that learning results
from learners actively interacting with their learning Constructivist Perspective
environment rather than passively receiving information. A perspective on learning that places emphasis on learners
(Pelton & Pelton, 2005) 13: A very prominent learning as building their own internal and individual representation
theory that postulates that learning is a process essentially of knowledge. (Torrisi-Steele, 2005)
involving activity and involvement through which learners
construct their own knowledge and skills. This naturally Constructivist Theory
seems to imply that overhearers cannot learn from a A theoretical framework developed by Jerome Bruner
learning dialogue. The theory of vicarious learning does where learning is an active process in which learners
not reject constructivism, but suggests that activity and construct new ideas or concepts based upon their current
involvement can arise cognitively through phenomena or past knowledge. The learner selects and transforms
of empathy, and hence that vicarious participation in information, constructs hypotheses, and makes decisions,
dialogue can also foster constructive processes. (J.R. relying on a cognitive structure to do so. (Sala, 2005b)
Lee, 2005) 14: An educational approach that takes the
view that knowledge must be constructed within the Consultancy
cognitive structure of each individual. (Banks, 2005) 15: The process of helping organizations to better understand
An educational theory arguing that students construct complex processes through their knowledge and
their own knowledge on the domain, rather than acquiring experience, and provide solutions to achieve the objectives.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
126 Consum e r Cont e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont e nt Aggre gat ion Cont e nt M a na ge m e nt 127
various genres of information available on the Internet. training content for specialists only may be an assembly.
For instance, local content is information that is speciic to (Honkaranta & Tyrvinen, 2005)
a community, neighborhood, or area, such as businesses,
C
housing, neighborhood services, and recreation activities. Content Compression
Community content is information about the neighborhood A term that describes approaches in which parts of a
that promotes community development and facilitates continuous media ile are removed in order to speed up
community building. Examples include a listing of places replay and data browsing or to automatically generate
where GED courses are offered, or a newsletter. Culturally summaries or abstracts of the ile. In relation to speech
relevant content is information that is signiicant to people signals, content-compression techniques often shorten
with different cultural backgrounds. (Kvasny & Payton, the signals by removing parts that have been identiied
2005) as less relevant or unimportant based on pause detection
and analysis of the emphasis used by the speakers. (Hrst
Content Aggregation & Lauer, 2006)
A set of existing content units collected together for a
speciic use purpose. An aggregation may contain several Content Distribution Network (CDN)
versions of the same unit of content, and its creation may 1: The general term encompassing any technology for
require human involvement. (Honkaranta & Tyrvinen, wide-area distribution of content. (Fiege, 2005) 2: A
2005) network of cache servers owned by the same Internet
service provider that delivers content to users on behalf
Content Aggregation Model of content providers. CDN servers are typically shared,
Speciies how to combine learning content labeled as a delivering content belonging to multiple Web sites, though
Sharable Content Object (SCO) in a standardized way for all servers may not be used for all sites. (Katsaros &
reusability and interoperability. Includes a metadata for Manolopoulos, 2005a)
describing content, XML binding to deine how to code
metadata tags using XML so they are machine readable, Content Gratiication
and an Instructional Management System (IMS) content Enjoyment of message speciics. Content can mean
speciication that deines how to package a collection information, and often does, though it also includes
of SCOs and deines the design of the learning event. entertainment in the form of medium-carried programming.
(Stavredes, 2005b) (Stafford, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
128 Cont e nt M a na ge m e nt Syst e m (CM S) Cont e nt -Ba se d Re t ri eva l
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont e nt -Ba se d-Filt e ring Re c om m e nde r Syst e m Cont ex t Que r y 129
data. (Li, Yang, & Zhuang, 2005) 3: Method for automatic Context
multimedia content features extraction. (Hentea, 2005c) 1: An individual construct that emerges as an individual
4: Retrieval based on image content. This includes encounters a situation, including others and artifacts, as it
C
retrieval based on image color, texture, shape and position is the individuals interpretation of a situation that results
of salient objects, dominant edges of image items, and in context. (Shariq & Vendel, 2006) 2: Describes the
regions. (Chang, 2005) 5: The search for suitable objects working environment and atmosphere including policies,
in a database based on the content; often used to retrieve work hours, work climate, and work goals. (Schoenfeld &
multimedia data. (Bretschneider & Kao, 2005) Berge, 2005) 3: Everythingsocial, cultural, political, and
historical factorsthat surrounds a particular event. These
Content-Based-Filtering Recommender System are the forces of inluence at play when the event actually
Technique based on the correlation between item contents occurs. Greater knowledge of the context of a thing leads to
by statistical studies about different characteristics. Such a deeper understanding of and a more balanced perspective
techniques compute user-purchase histories in order to on its nature. (Kasi & Jain, 2006) 4: A mathematical
identify association rules between items. (Gil & Garca, model or group of mathematical models within which
2006) a piece of mathematical knowledge is understood.
(Farmer, 2006) 5: The information that characterizes
Content-Based Image Retrieval (CBIR) the interaction between humans, applications, and the
1: A process framework for eficiently retrieving images surrounding environment. Context can be decomposed
from a collection by similarity. The retrieval relies into three categories: (1) computing context (e.g., network
on extracting the appropriate characteristic quantities connectivity, communication cost); (2) user context (e.g.,
describing the desired contents of images. In addition, user proile, location, nearby people); and (3) physical
suitable querying, matching, indexing, and searching context (e.g., lighting, noise levels). (Maamar, 2005) 6:
techniques are required. (Y.J. Zhang, 2005a) 2: The A triple (G, M, I) where G is a set of objects, M is a set
technique of image retrieval based on the features of features, and I is a binary relation between G and M
automatically extracted from the images themselves. (Y.- such that gIm, if and only if object g possesses the feature
K. Chan et al., 2005) 3: A general term used to describe m. (Saquer, 2005) 7: A triple (T, I, D) where T and I are
the semiautomatic or automatic extraction, indexing, sets and DTI. The elements of T are called objects,
and retrieval of images by their visual attributes and and the elements of I are called attributes. For any tT
characteristics. (Venters et al., 2005) 4: In this kind of and iI, note tDi when t is related to i, that is, (t, i)D.
retrieval, symmetry between input image and images of (Dumitriu, 2005) 8: All information about the current
database are established based on contents of the images users situation. (Abramowicz, Bana kiewicz, Wieloch,
under consideration. (Deb, 2005) 5: Retrieval of images & ebrowski, 2006)
similar to a given image based only on features present
in the image and not any external information. (Sural, Context Lens
Vadivel, & Majumdar, 2005) 6: Search for suitable image in A visual classiication scheme for a set of documents that
a database by comparing extracted features related to color, can be dynamically updated. The classiication scheme is
shape, layout, and other speciic image characteristics. arranged in a tree hierarchy to facilitate browsing. (Corral,
(Kao & Tendresse, 2005) LaBrie, & St. Louis, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
130 Cont ex t -Aw a re Com put ing Cont ex t ua l M e t a dat a
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont ex t ua lism Cont inuous Syst e m 131
and production processes of documents. (Lyytikinen et education. A tool to support professional development
al., 2005) in changing work life based on the principle of life-long
learning. (Lammintakanen & Rissanen, 2005b)
C
Contextualism
Integrates process, content, and context to study Continuous Animation
organizational decision making. (Chou et al., 2005) Animated objects deployed on a Web site to catch a
visitors attention to an advertising message or to attempt
Contextualizing Logic to entertain visitors. (Gao et al., 2006)
Method to formally represent knowledge associated with
a particular circumstance on which it has the intended Continuous Auditing
meaning. (Alonso-Jimnez et al., 2005) Type of auditing that produces audit results simultaneously,
or a short period of time after, the occurrence of relevant
Contingency Theoretic Software Development events. (Garrity et al., 2005)
(CTSD)
A new model for MAS design using tenets from CT and Continuous Data
Information Processing Theory (IPT). The CTSD design Data that can assume all values on the number line within
approach is focused on design for maintainability, a crucial their value range. The values are obtained by measuring.
requirement for complex, dynamic systems. (Durrett et An example is temperature. (Yang & Webb, 2005)
al., 2005)
Continuous Quality Improvement (CQI)
Contingency Theory (CT) A process that measures progress towards goals, using
1: A research branch of organizational theory that suggests metrics and feedback from stakeholders for continuous
that an organizations structure relects its adaptation improvement. (Moore et al., 2005)
to the environment in which it operates. Hierarchical
organizations operate best in stable, simple environments, Continuous Query (CQ)
while lat, team-based organizations are better adapted to 1: A query that is re-evaluated continuously. For example,
dynamic, complex task environments. (Durrett et al., 2005) the query give me the most updated temperature will
2: A meta-theory which argues that irm performance is return different readings depending on the current moment.
deined by the environment-strategy-structure relationship, Some continuous queries are also location dependent. For
where the organizations strategy is contingent on the instance, the query show me the nearest gas station
external environment and the organization structure is will continually execute a location-dependent query.
contingent on the irms strategy. (Baker & Coltman, 2005) An advanced query processing technique is needed
3: States that desired organizational outcomessuch in conjunction with moving object databases. (Leong,
as performanceare the consequence of it or match 2005a) 2: The answer to a continuous query is produced
between two or more factors (e.g., strategy, culture, over time, relecting the stream data seen so far. Answers
structure, tasks, environment, and leadership style). The may be stored and updated as new data arrives or may be
best way to organize depends upon the characteristics and produced as data streams themselves. (Chatziantoniou &
the interplay between these factors. (Herschel, 2005) Doukidis, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
132 Cont inuous Va lue Assum pt ion (CVA) Cont rol Pa cke t
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cont rol Room Conve rsat iona l Syst e m 133
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
134 COO Ce ll/Origin Coope t it ion
COO Cell/Origin group dividing the work so that each member of the group
A positioning technique that determines a mobile users completes a portion of the project. (Ingram & Hathorn,
C location by identifying a cell in which the persons mobile 2005b) 4: Acting together, in a coordinated way at work
device is registered. Also known as Cell Global Identity or in social relationships, in the pursuit of shared goals,
(CGI). (Fraunholz et al., 2005) the enjoyment of the joint activity, or simply furthering
the relationship. (Sala, 2005b) 5: Occurs when one species
Cookie works with another in order to achieve an outcome
1: A message generated and sent by a Web server to a beneicial to one or both. Proto-cooperation is the situation
Web browser after a page has been requested from the in which both beneit by the cooperation, but can survive
server. The browser stores this cookie in a text ile, and without it. Mutualism occurs when each beneits and
this cookie then is sent back to the server each time a cannot otherwise survive. Commensalism occurs when
Web page is requested from the server. (Nasraoui, 2005) two species habitually live together, one species being
2: A small amount of information that the Web site server beneited by this arrangement and the other unharmed
requests the users browser to save on the users machine. by it. (Tatnall & Davey, 2005)
(Sockel & Chen, 2005) 3: A general mechanism that
server-side connections (such as CGI scripts) can use to Cooperative Agent
both store and retrieve information on the client side of the Usually each agent participating in an agent system does
connection. The addition of a simple, persistent, client-side not solve the whole problem by itself, but only a small
state signiicantly extends the capabilities of Web-based subproblem for which it has the required competence.
client/server applications. (Chim, 2006) 4: Information, By means of cooperation with other agents, the whole
usually including a username, Internet address, and the problem is inished. While cooperating, an agent has to
current date and time, placed on the hard drive of a person bid for solving some aspect of the problem or negotiates
using the World Wide Web by a Web site that one has with other agents for the distribution of tasks. (Barolli &
visited. This information can be used to identify visitors Koyama, 2005b)
who have registered or viewed the site, but also to report
the visitors unrelated Web activity, or worse, personal Cooperative Information System
information stored by the user. (Friedman, 2005) 5: A A set of geographically distributed information systems
short string of text that is sent from a Web server to a that cooperate on the basis of shared objectives and goals.
Web browser when the browser accesses a Web page. The (Marchetti, Mecella, Scannapieco, & Virgillito, 2005)
information stored in a cookie includes the cookie name,
the unique identiication number, the expiration date, and Cooperative Learning
the domain. (Mullen, 2005) 6: A string of text that a Web 1: A structure of interaction designed to facilitate the
browser sends to you while you are visiting a Web page. accomplishment of a speciic end product or goal through
It is saved on your hard drive, and it saves information people working together in groups. (Berg, 2005f) 2: A
about you or your computer. The next time you visit this learning situation in which students work together in small
Web site, the information saved in this cookie is sent back groups and receive rewards or recognition based on their
to the Web browser to identify you. (T. Stern, 2005) 7: groups performance. (Sala, 2005b) 3: Learning where
A text ile created by a Web server and stored on a users students are required to work in small groups, usually
hard disk that contains data about a Web site that has been under the direct guidance of the instructor, who may set
visited. (Szewczak, 2005) speciic tasks and objectives for each session. (McInnerney
& Roberts, 2005)
Cooperation
1: A group of people working on a common global task. Cooperative Marketing
(Villemur & Drira, 2006) 2: Cooperative groups work The act of working together to conduct activities associated
together on group projects in ways that do not necessarily with buying and selling products or services. (Hornby,
result in high-quality interaction, and new products and 2005)
knowledge. A typical cooperative strategy is to divide
up the work among the members and stitch the various Coopetition
contributions together at the end of the project. (Ingram, 1: A situation where organizations, usually SMEs, are
2005) 3: Group effort characterized by individuals in a cooperating with each other and at the same time they are
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Coope t ive N e t w ork Copyle ft 135
also competing against each other. (Mason et al., 2006) 2: between human agents and the overall organization
Simultaneous existence and relevance of cooperation and of work. Organizations should understand the nature
competition. (Loebbecke & Angehrn, 2006) of coordination, establish what kinds of structures of
C
organizations already exist, and discover the appropriate
Coopetive Network coordination processes. (Nichols & Chen, 2006)
A structured network of N organizations that are in
simultaneous competition and cooperation (e.g., the Coordination Within a Supply Chain
VISA network). This network type is characterized by a Occurs when the decisions made at different stages of
decentralized structure, high competition, and a common the chain maximize the total supply chains proitability.
scope of operations among members. (Priestley, 2006) When a party makes a decision that maximizes its own
local proitability, a lack of coordination can occur in the
Coordinate System supply chain, as that decision may not be in the best interest
A reference system used to gauge horizontal and vertical of the entire chain. (Abraham & Leon, 2006)
distances on a planimetric map. It is usually deined by a
map projection, a spheroid of reference, a datum, one or CoP: See Community of Practice.
more standard parallels, a central meridian, and possible
shifts in the x- and y-directions to locate x, y positions Copper Line
of point, line, and area features (e.g., in ARC/INFO GIS The main transmission medium used in telephony networks
system, a system with units and characteristics deined by to connect a telephone or other apparatus to the local
a map projection). A common coordinate system is used exchange. Copper lines have relatively narrow bandwidth
to spatially register geographic data for the same area. and limited ability to carry broadband services unless
(Al-Hanbali & Sadoun, 2006) combined with an enabling technology such as ADSL.
(Chochliouros et al., 2005c)
Coordination
1: Enabling and controlling the cooperation among members Copresence
of a group of human or software-distributed agents. It 1: Copresence can only take place with a system where you
can be considered as software glue for groupware tools, have the sense of being in another place or environment
including architectural and behavioral issues. Coordination other than the one you are physically in, and being there
includes several synchronization and management with another person. (Champion, 2006a) 2: The coming
services. (Villemur & Drira, 2006) 2: The act of working together of people (face-to face), people with objects (face-
together harmoniously. It consists of the protocols, tasks, to-object), or people with places (face-to-place) in time
and decision-making mechanisms designed to achieve and space. (Jain & Lyons, 2005)
concrete actions between interdependent units. (Daassi &
Favier, 2006) 3: The activity and effort associated with the Copyleft
information processing tasks of an organization. (Nissen 1: A non-exclusive, publicly accorded legal license backed
& Levitt, 2006) by copyright law that permits derivative works from
the copyright holders licensed works, on the condition
Coordination of Commitments that licensees relicense their works to the public under
The actions by humans leading to the completion of a similarly liberal copyleft. (Okoli & Carillo, 2006) 2:
work. Coordination is described in terms of contracts A term coined by Richard Stallman, leader of the free
and promises consisting of recurring loops of requesting, software movement and creator of the General Public
making, and fulilling commitments. (Janssen, 2005) License, or GPL. The key tenet of the GPL, which copyleft
describes, is that software licensed under it can be freely
Coordination of Tasks copied, distributed, and modiied. Hence, this software is
The management of dependencies between tasks. (Janssen, copyleft, or the opposite of copyright. It insures that there
2005) are no protections or restrictions when copyright insures
the opposite. (St.Amant & Still, 2005) 3: Provision in the
Coordination Theory GNU General Public License that forces any derived work
Assumes that the introduction and use of information based on software covered by the GPL to be covered by
technology will modify both the structure of the interaction the GPL; that is, the author of a derived work must make
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
136 Copyright Corporat e M e m orie s a nd N a rrat ive Doc um ent s
all source code available and comply with the terms of Core Group
the GPL. (Fleming, 2005b) The repository of knowledge, inluence, and power in an
C organization. (Partow-Navid & Slusky, 2005)
Copyright
1: A legal term describing rights given to creators for their Core Knowledge
literary and artistic works. See World Intellectual Property A highly structured, fact-based curriculum based on the
Organization at www.wipo.int/about-ip/en/copyright.html. work of E.D. Hirsch. (Glick, 2005b)
(Lowry, Grover, et al., 2005) 2: The bundle of rights that
control the copying and use of original works ixed in Corporate Communications
tangible form. The details of the exact rights granted, their The use by organizations of technology infrastructure
duration, and their ownership all vary between different and software solutions that empower them to create and
jurisdictions, but in its simplest form, copyright allows deliver communication messages, both internally among
creators of original works control over whether or not their employees and externally (outside the organization), to
work is copied (either directly or through a derived work) support their business needs and goals; operationally less
and under what circumstances, including whether or not it is costly. (Nandavadekar, 2005)
published or made available to the public. In most countries
copyright comes into existence automatically when a work Corporate E-Image
is ixed in some tangible form and is not conditional on An overall impression held of an e-vendor by its customers
any notice or formal process. The rights that are granted at a particular point in time. This, in turn, is the net result
under copyright can be separated, licensed, sold, or waived of consumers experiences with an organization, both
entirely at the discretion of the owner (except moral rights online and off-line, and from the processing of information
in some countries). (Marshall, 2005) 3: Protected right on the attributes that constitute functional indicators of
in many jurisdictions that controls ownership over any image. (Yeo & Chiam, 2006)
material of a creative nature originated by an individual
or organization. (Fleming, 2005b) 4: The exclusive right Corporate Information Factory (CIF)
given to the creator of an intellectual work of text, audio, A logical architecture with the purpose of delivering
video, or software to restrict and control how their work business intelligence and business management capabilities
and its derivatives are distributed or exploited for inancial driven by data provided from business operations. (Yao
or other beneit. (Okoli & Carillo, 2006) et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Corporat e Pe rfor m a nc e M a na ge m e nt (CPM ) Cosine M e asure 137
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
138 Cost Ce nt e r Course Deve lopm e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Course Deve lopm e nt Tools Course -M at e ria l St ruc t ure 139
materials. Faculty involved in the development of online of the functions associated with offering and managing
courses are often required to have technology-speciic an online course, so students and faculty members have
knowledge and skillsdigitizing, converting ile formats, only one program to use. (Johnstone, S.M., 2005) 6: An
C
operation of speciic software programs, and programming. integrated course environment (e.g., WebCT, Blackboard)
(Sales, 2005) that includes components such as e-mail, discussion
group, chat, grade book for delivery, and management of
Course Development Tools instruction. (Hazari, 2006) 7: An integrated learning tool
Software with high executive performance, good lexibility, or package that facilitates the tracking and monitoring of
easy utility, runtime softness, and so forth, suitable for student online learning in a technology setting. (Bonk
the implementations of online Web courses. (Y.J. Zhang, et al., 2005)
2005b)
Course Map
Course Management Graphical image that provides a pictorial representation
Includes the ability to share materials and modules across of the course syllabus to allow for easy conversion from
course containers, the ability to edit comments and to face-to-face to online delivery. (Etter & Byrnes, 2005)
track changes on learners documents, and the ability to
monitor and access learners e-learning performance. In Course Partnership
short, course management offers instructors the ability Course-based industry-university partnerships, where
to electronically maintain and manage class rosters, a course is designed so that the concepts and theory
distribute course materials, administer online exams, and discussed in class are applied in team course projects
communicate with learners. (Xu & Wang, 2006) geared at solving immediate problems at the company
partner. (Kock, 2005)
Course Management Software
Instructional technology software packages created for Course Web Environment
educational use, primarily as course support or as a vehicle A course management system or similar system offering
for online courses. Groupware features include messaging integrated facilities for organization, contribution,
tools, conferencing tools, and information management collaboration, and communication for those associated
and data resources. (Ferris & Minielli, 2005) with a particular course. (Collis & Moonen, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
140 Course -Wit hdra w a l Cre at ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cre at ive Abra sion CRI SP-DM 141
Creative Abrasion and temporarily store candidate assets until a inal decision
The meeting of minds on common ground to explore and can be made. (Subramanian, 2005)
negotiate different opinions and, as a result, generate new
C
ideas. (Chua, 2006) Creativity
1: The ability to generate or recognize ideas, alternatives,
Creative Idea Generation or possibilities that may be useful in solving problems,
The production and development of original and useful communicating with others, and entertaining ourselves and
ideas. Creative idea generation is a key activity in problem- others. (Sala, 2005b) 2: The production of something new
solving groups. (Klein, 2005) or original that is useful; the act of creating recombining
ideas or seeing new relationships among them. Creativity
Creative Learning is usually deined in terms of either a process or a product
A type of learning that improves the ability to be creative and at times has also been deined in terms of a kind of
and to develop original, diverse, or elaborate ideas. (Sala, personality or environmental press. These are four Ps of
2005b) creativity: process, product, person, and press. (Torres-
Coronas & Gasc-Hernndez, 2005) 3: In the context of
Creative Observation discovery, creativity is the ability to generate or recognize
A phenomenon that pertains to Field Creation. This form ideas and alternatives that might be useful in solving
of observation involves conventional notions of participant problems. There are several aspects of creativity, including
observation, with one important difference: that which is creative product or value, creative person/people, creative
being observed has, in fact, been created by the observer, environment, creative symbols, and creative process.
either alone or in conjunction with collaborators. See Co- (Aurum, 2005)
Construction. (Forte, 2005)
Creativity-Enhancing System
Creative Performance An information system designed to offer creative tools to
High level of capability in an idea or solution, applied to help users formulate problems and perform other creative
solve a problem in an imaginative way, resulting in effective tasks in decision making. (Forgionne, 2005)
action. Environmental factors such as autonomy and
freedom, challenge, clear direction, diversity/lexibility/ Credibility
tension, support for creativity, trust, and participative safety 1: A characteristic of information sources that inluences
directly affect the creative performance within work teams. message persuasiveness, attitudes toward the information
(Torres-Coronas & Gasc-Hernndez, 2005) source, and behaviors relevant to message content,
consisting of two primary attributes: expertise and
Creative Problem Solving (CPS) trustworthiness. (Danielson, 2006c) 2: The quality of
A systematic process model to solve problems and to being believable or trustworthy. (Wong, 2005)
harness creativity. Its six steps include objective-inding,
data-inding, problem-inding, idea-inding, solution- Credit
inding, and acceptance-inding. Each step has a divergent Delivery of a value in exchange of a promise that this
and convergent phase. During the divergent phase, a free value will be paid back in the future. (de Carvalho et al.,
low of ideas is elicited. Convergent phases involve the 2005)
evaluation and selection of the ideas with the greatest
potential or relevancy. The defer-judgment rule separates Credit Scoring
idea generation from idea evaluation. (Torres-Coronas & A numerical method of determining an applicants loan
Gasc-Hernndez, 2005) suitability based on various credit factors, such as types
of established credit, credit ratings, residential and
Creative Worklow occupational stability, and ability to pay back loan. (de
Workf low that is more discovery-oriented, hence Carvalho et al., 2005)
more volatile and browse intensive. This worklow is
characterized by the need to do many interactive searches CRISP-DM: See Cross-Industry Standard Process for
Data Mining.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
142 Crit e ria Crit ic a l Re a lism
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Critical Relection Cross-Border Linkage 143
the practices of its members. Thus individuals have an Critical Success Factor (CSF)
agency capacity to interfere back, and thus promote 1: One of several factors that indicate the few key areas of
social changenot isolated individuals, however, but activity in which favorable results are absolutely necessary
C
units and collectivities of individuals. Individuals are for the manager to succeed. (Colmenares & Otieno, 2005)
persons, and their acts are situated in a world constituted 2: A methodology for managing projects and irms that
by past and present human activity, thus a humanized concentrates on the areas where things must go right if the
natural and social world. Because social structures are endeavor is to lourish. (Adam & Pomerol, 2005) 3: One
incarnate in the practices of its members, this means that of a limited number of areas in which results, if they are
they do not exist independently of the conceptions of the satisfactory, will ensure successful competitive performance
persons whose activities constitute, and thus reproduce or for the organization. (Peterson & Kim, 2005)
transform them. It is because persons have beliefs, interests,
goals, and practical and tacit knowledge, not necessarily Critical Theory
cognitively available, acquired in their early stages as The branch of social theory, grounded on Kant and pursued
members of a society, that they do what they do and thus by the Frankfurt School. The best known contemporary
sustain, or transform, the structures to which they belong. critical theorist is Jurgen Habermas (1929- ). (Clarke,
Critical realism thus proposes a transformational model 2006)
of social activity. It states that reality exists independently
of our knowledge about it, and it takes science as a social Critical Thinking
practice, and scientiic knowledge as a social product. 1: Encompasses the belief that the function of the researcher
Communities of practice theory implicitly incorporates a is to provide warnings about the fallibility of current
critical realism perspective. (Nobre, 2006a) 3: The careful orthodoxies by pointing to the power and politics implicit
or critical application of the scientiic approach to the social in the process of knowledge creation and utilization.
sciences. (Dobson, 2005) (Land, Nolas, et al., 2006) 2: In academic contexts, this
phrase usually refers to complex intellectual reasoning
Critical Relection that questions assumptions, and seeks to assess evidence
Questioning of moral, ethical, and equity issues that and examine claims made by others. More simply, it can
relate directly or indirectly to institutional and broader also refer to logical thinking based on facts and evidence.
social and political contexts of schooling, and relection (Kukulska-Hulme, 2005)
oriented toward development of emancipatory strategies
to resolve inequities identiied; stems from a belief system Critical Value Activity
that education can serve as an agent for social change, One of several value activities that an organization must
and teachers are professionals constantly engaged in the execute satisfactorily to ensure successful performance.
evaluation and resolution of a large number of competing (Jeffcoate, 2005)
variables using poorly understood processes (not a set
of speciic, identiiable technical skills). (Wieseman, CRM: See Customer Relationship Management.
2005b)
CROP: See Council of Regional Organizations in the
Critical Research Paciic.
Critique of the status quo through the exposure of what
are believed to be deep-seated, structural contradictions Cross and Edge Points
within social systems. (Trauth, 2005b) A cross point is an image pixel in the thinned image having
at least three eight-neighbors, while an edge point has just
Critical Stance one eight-neighbor in the thinned image. (Chakravarty et
Any approach to an accepted system that intentionally al., 2005a)
highlights issues of power structures supported by it, often
emancipatory in nature and always political. (Kettley, Cross-Border Linkage
2006b) An active connection, relation, or association between two
or more institutions separated by a geographic distance
or boundary. (Poda & Brescia, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
144 Cross-Classiication of Maps Cryptographic Data-Mining Techniques
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cr ypt ogra phy Cult ura l Cognit ion T he or y 145
Cryptography Cube
1: A study of making a message secure through encryption. 1: A collection of data aggregated at all possible levels
Secret key and public key are the two major camps of over the dimensions. (Deshpande & Ramasamy, 2005)
C
cryptographic algorithms. In secret key cryptography, 2: A data structure of aggregated values summarized for
one key is used for both encryption and decryption; in a combination of preselected categorical variables (e.g.,
public key cryptography, two keys (public and private) number of items sold and their total cost for each time
are used. (K. Chen, 2005) 2: Protecting information by period, region, and product). This structure is required
transforming it into an unreadable format using a number for high-speed analysis of the summaries done in online
of different mathematical algorithms or techniques. analytical processing (OLAP). Also called a Multi-
(Tassabehji, 2005a) 3: The art of protecting information Dimensional Database (MDDB). (Nigro & Gonzlez
by encrypting it into an unreadable format, called cipher Csaro, 2005b) 3: A group of data cells arranged by the
text. Only those who possess a secret key can decipher dimensions of the data. Assigning a value to each dimension
(or decrypt) the message into plain text. (Guan, 2005a) 4: of a cube, the measure is obtained by a mapping from this
The conversion of data into secret codes for transmission assignment. (Pourabbas, 2005b) 4: A multi-dimensional
over a public network to prevent unauthorized use. (Wang, representation of data that can be viewed from different
Cheng, & Cheng, 2006) perspectives. (Bellatreche & Mohania, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
146 Cult ura l Func t ion of a Te le c e nt e r Curre nt Cost
knowledge structures and ultimately impacts the design (Cagiltay et al., 2005) 8: Integrated system of spiritual,
and development of interactive systems, whether software material, intellectual, and emotional features of society
C or Web sites. (Faiola, 2006) or a social group that encompasses, among other things,
art and literature, lifestyles, ways of living together, value
Cultural Function of a Telecenter systems, traditions and beliefs, and artifacts. (M. Mitchell,
Set of processes that a telecenter as an open social system 2005a) 9: Multiple deinitions exist, including essentialist
carries out to strengthen grassroot values and identity. ICT models that focus on shared patterns of learned values,
should facilitate multi-culturalism instead of pursuing the beliefs, and behaviors, and social constructivist views
standardization of society. (Santos, 2005) that emphasize culture as a shared system of problem
solving or of making collective meaning. The key to the
Cultural Metadata understanding of online cultureswhere communication
Metadata obtained from the analysis of corpora of textual is as yet dominated by textmay be deinitions of culture
information, usually from the Internet or other public that emphasize the intimate and reciprocal relationship
sources (radio programs, encyclopedias, etc.). (Pachet, between culture and language. (Macfadyen, 2006b) 10: The
2006) collective programming of the mind, which distinguishes
the members of one group or category of people from
Cultural Readiness another. (Limayem, 2005) 11: The ideals, values, symbols,
The preparedness of an organizations culture of its people and behaviors of human societies that create a distinctive
and processes (past and present) to facilitate or inhibit identiication. (Sharma & Mishra, 2005)
change. (Ash & Burn, 2006)
Culture Gap
Culturally Appropriate Content A gap of misunderstanding in the sense of two different
Information, documents, and programs delivered to users organizational cultures that coexist in most organizations.
via the Internet, broadcasting, or CD-ROM which express The two cultures under discussion in the IT context are
and respect the users culture and interests. (Dyson, the culture of the IT profession and the culture of the rest
2005) of the organization. (Leonard, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Curre nt Doc um e nt Ve rsion Cust om e r K now le dge M a na ge m e nt 147
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
148 Cust om e r Life t im e Va lue (CLV ) Cust om e r Re t e nt ion
customer knowledge. It is within these processes that an 3: Methodologies, softwares, and capabilities that help an
organization and its customers work together to combine enterprise manage customer relationships in an organized
C existing knowledge to create new knowledge. It differs way. (Morabito & Provera, 2005) 4: Refers to retaining
from managing internal knowledge as it must facilitate and using information about customers in databases to
the low of knowledge across an external boundary. develop customer loyalty and increase sales. (Bridges et
(Paquette, 2006b) al., 2006) 5: Systems with technological tools related to
the implementation of relationship marketing strategies.
Customer Lifetime Value (CLV) (Flavin & Guinalu, 2006) 6: The methodologies,
Consists of taking into account the total financial software, and Internet capabilities that help a company
contribution (i.e., revenues minus costs) of a customer manage customer relationships in an eficient and organized
over his or her entire life of a business relationship with manner. (Nemati & Barko, 2005) 7: The technology,
the company. (Gur u, 2005) services, and processes that connect an organization with its
customers in the most reliable, eficient, and cost-effective
Customer Loyalty manner while striving to create long-term, proitable
1: Because there is no existing ownership to service relationships. (Van Dyke et al., 2006) 8: The process of
products, suppliers have to make a special effort to get attracting, retaining, and capitalizing on customers. CRM
long-standing customers. (Seitz, 2005) 2: The ability deines the space where the company interacts with the
to develop and maintain long-term relationships with customers. At the heart of CRM lies the objective to deliver
customers by creating superior customer value and a consistently differentiated and personalized customer
satisfaction. (Forgionne & Ingsriswang, 2005) experience, regardless of the interaction channel. (Pagani,
2005b) 9: A term describing how a company interacts with
Customer Loyalty Plan its customers, gathers information about them (needs,
A strategy for improving inancial performance through preferences, past transactions), and shares these data
activities that increase stickiness. (Forgionne & within marketing, sales, and service functions. (Burke et
Ingsriswang, 2005) al., 2005) 10: Management, understanding, and control of
data on the customers of a company for the purposes of
Customer Management Software enhancing business and minimizing the customers churn.
Software application that allows a company to interact with (Meo & Psaila, 2005) 11: An approach that manages in
multiple customer segments and to send them personalized an integrated manner all business processes that directly
offers. (Gur u, 2006b) involve customers, in an effort to build long-term and
sustainable relationships with customers. A CRM system
Customer Premise Equipment (CPE) is a central repository of customer information that records
End-user equipment. (Nugent, 2005) information from all contact points with customers, and
generates customer proiles available to everyone who
Customer Proiling wishes to know the customer. (Tarafdar, 2005) 12: An
1: Selecting customers you want to ind, going after them, approach that recognizes that customers are the core of
and keeping them. (Borders & Johnston, 2005) 2: Usage of the business and that a companys success depends on
the Web site to get information about the speciic interests effectively managing its relationship with them. CRM
and characteristics of a customer. (Seitz, 2005) is about locating and attracting customers, and thereby
building long-term and sustainable relationships with
Customer Relationship Management (CRM) them. (Y.D. Wang, 2005) 13: An enterprise-wide strategy
1: A core business strategy that promotes interactions, and enabling organizations to optimize customer satisfaction,
creates and delivers value to targeted customers to improve revenue, and proits, while increasing shareholder value
customer satisfaction and customer retention at a proit. through better understanding of customers needs.
It is grounded in high-quality customer data and enabled (Rahman, 2005e)
by information technology. (Dholakia et al., 2005a) 2:
Application system that allows a company to manage its Customer Retention
relationship with a customer, including sales, marketing, The ability to retain customers and their allegiance to the
customer service, and support. (Feuerlicht & Vorisek, 2006) Web site. (Forgionne & Ingsriswang, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cust om e r Sat isfa c t ion Cut -Point 149
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
150 CV Cybe rspa c e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Cybe rw orld Cyclom at ic Com plex it y 151
Cyberworld
An information world created in cyberspace either
intentionally or spontaneously, with or without visual
design. Cyberworlds are closely related to the real world
and have a serious impact on it. (Sourin, 2006)
Cyborg
Literally, a hybrid of cybernetics and organism. Generally
it refers to humans as modiied by technoscientiic implants
and drugs. (Srinivasan, 2006)
Cycle
The time period required for each student to enter and
complete all courses required for an academic degree; for
example, MBA. (Murray & Efendioglu, 2005)
Cyclic Graph
A directed graph that contains at least one cycle. (Y.
Chen, 2005a)
Cyclical Process
An event or operation within a project that can occur and
lead project teams back to areas that resemble the starting
point of the project. (Nash et al., 2005b)
Cyclomatic Complexity
A broad measure of soundness and conidence for a
program. This measure was introduced by Thomas McCabe
in 1976. (Polgar, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
152 DAC Dat a
D
DAC: See Discretionary Access Control. Spatial data represent tangible features (entities). Moreover,
spatial data are usually an attribute (descriptor) of the spatial
DAG: See Directed Acyclic Graph. feature. (Al-Hanbali & Sadoun, 2006) 2: A set of discrete
and objective facts concerning events. (Joia, 2005) 3:
DAI: See Digital Access Index; Distributed Artiicial Binary (digital) representations of atomic facts, especially
Intelligence. from inancial transactions. Data may also be text, graphics,
bit-mapped images, sound, or analog or digital live-video
DAISY: See Digital Accessible Information System. segments. Structured data are the raw material for analysis
using a data-driven DSS. The data are supplied by data
DAM: See Digital Asset Management. producers and are used by information consumers to create
information. (Power, 2005) 4: Combination of facts and
DAML: See DARPA Agent Markup Language. meanings that are processed into information. (Yoon et al.,
2005) 5: Data are carriers of knowledge and information.
Dark Fiber They consist mostly of signs and are the raw material
Optical iber for infrastructure (cabling and repeaters) to be further processed. Data represent observations or
that is currently in place but is not being used. Optical facts out of context that are not directly meaningful. Both
iber conveys information in the form of light pulses, so information and knowledge are communicated through
dark means no light pulses are being sent. (Chochliouros data. (Haghirian, 2006) 6: Highly explicit knowledge
et al., 2005a) derived from the data in databases and data warehouses
used for strategic decision making after summarizing,
DARM: See Distributed Association Rule Mining. analyzing, mining, and so forth. (Kulkarni & Freeze,
2006) 7: Something given or admitted as a fact on which
DARPA Agent Markup Language (DAML) an inference may be based. Simple observations of the
An extension of XML and the Resource Description world, which are often quantiied, and easily structured,
Framework (RDF) providing constructs with which to captured on machines, and transferred. The number of
create ontologies and to mark up information so that it is baby boomers born in a given year is data. (Mockler &
machine readable and understandable. (Jain & Ramesh, Dologite, 2005) 8: The generic term for signs, symbols,
2006) and pictures. Data can be saved, processed, printed, and
so on. They are not bound to individuals. (Hofer, 2006)
DARS: See Degree Audit Reporting System. 9: The raw material that feeds the process of information
generation. (Hoxmeier, 2005) 10: The set of samples, facts,
Dashboard or cases in a data repository. As an example of a sample,
Specific display of information that presents key consider the ield values of a particular credit application
information about a process or device. A dashboard may in a bank database. (de Carvalho et al., 2005) 11: Often
or may not be computerized. (Adam & Pomerol, 2005) deined as the raw facts and information data. Knowledge
is about the application of data and information for a given
Data task so that the given task can be effectively performed.
1: A collection of attributes (numeric, alphanumeric, (R. Zhang, 2005)
igures, pictures) about entities (things, events, activities).
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Ac c ount a bilit y Dat a Consist e ncy 153
Data Accountability this proile is then auctioned off to the highest bidder(s).
The ability to trace back all the actions and changes made (St.Amant, 2006b)
to information. (Wang, Cheng, & Cheng, 2006)
D
Data Availability
Data Accuracy The ability to ensure the readiness of the information when
An aspect of numerical () data quality: a standard needed. (Wang, Cheng, & Cheng, 2006)
statistical error between a real parameter value and the
corresponding value given by the data. Data accuracy is Data Center
inversely proportional to this error. (Kulikowski, 2005) A centralized repository for the storage and management
of information, organized for a particular area or body of
Data Actuality knowledge. (Ashrai et al., 2005)
An aspect of () data quality consisting in its steadiness
despite the natural process of data obsolescence increasing Data Checking
in time. (Kulikowski, 2005) Activity through which the correctness conditions of the
data are veriied. It also includes the speciication of the
Data Aggregation type of the error or condition not met, and the qualiication
The process in which information is gathered and expressed of the data and its division into the error-free and erroneous
in a summary form. In case the aggregation operator data. Data checking may be aimed at detecting error-
is decomposable, partial aggregation schemes may be free data or at detecting erroneous data. (Conversano &
employed in which intermediate results are produced that Siciliano, 2005)
contain suficient information to compute the inal results.
If the aggregation operator is non-decomposable, then Data Cleaning (Cleansing)
partial aggregation schemes can still be useful to provide 1: The act of detecting and removing errors and
approximate summaries. (Roussos & Zoumboulakis, inconsistencies in data to improve its quality. (Tzanis et al.,
2005) 2005) 2: The methodology of identifying duplicates in a
single ile or across a set of iles by using a name, address,
Data Allocation and other information. (Winkler, 2005) 3: The elimination
The process of determining what data to store at which of anomalies or outright mistakes in data that will otherwise
servers in a distributed system. (Chin, 2005) impede with its intended usage. These include the discovery
and elimination of duplicates, homonyms, fake entries
Data and Model Assembly such as 999-99-9999 in a social security ield, correcting
A set of query functions that assemble the data and data names and addresses, and so on. (Malik, 2006)
visualization instruments for data mining. (S. Wang &
H. Wang, 2005) Data Cloud
Collection of data points in space. (Cottingham, 2005)
Data Architecture
The underlying set of rules and descriptions of relationships Data Completeness
that govern how the major kinds of data support the Containing by a composite data all components necessary
business processes deined in the business architecture. to full description of the states of a considered object or
(Yoon et al., 2005) process. (Kulikowski, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
154 Dat a Cont e nt Dat a Excha nge
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Ex t ra c t ion Dat a I nt e rcha nge 155
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
156 Dat a I rre dunda ncy Dat a M ining (DM )
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a M issing Com ple t e ly At Ra ndom (Dat a M CAR) Data Pe r t urbat ion 157
databases which can be used to predict future behavior. (Li manipulations with instances, and models, queries,
et al., 2006) 4: A component of the business intelligence and constraints. A typical example of a well-developed
decision-support process in which patterns of information data model is the relational model. The ER data model,
D
in data are discovered through the use of a smart program though less formal, is another example. (Diskin & Kadish,
that automatically searches the database, inds signiicant 2005) 2: Deines which information is to be stored in a
patterns and correlations through the use of statistical database and how it is organized. (Bounif, 2005) 3: Part
algorithms, and infers rules from them. (Raisinghani & of the run-time environment described in SCORM. The
Nugent, 2005) 5: A database research area that aims at data model speciication is needed to standardize what
automated discovery of non-trivial, previously unknown, is communicated to the learning management system
and interesting regularities, trends, and patterns in large about the learner (i.e., score on quizzes, name, ID, time
data sets. (Manolopoulos et al., 2005) 6: A discovering in content). (Stavredes, 2005b)
process aimed at the identiication of patterns hidden in
the analyzed dataset. (Santos et al., 2005) 7: A form of Data Modeling
information extraction activity whose goal is to discover 1: Implementing data management in engineering
hidden facts contained in databases; the process of using information systems with information technology and,
various techniques (i.e., a combination of machine learning, in particular, database technology. The complex data
statistical analysis, modeling techniques, and database semantics and semantic relationships are described in data
technology) to discover implicit relationships between data modeling. (Ma, 2005a) 2: The process of producing a model
items and the construction of predictive models based on of a collection of data which encapsulates its semantics
them. (Rahman, 2005e) 8: A process by which information and hopefully its structure. (Delve, 2005)
is extracted from a database or multiple databases using
computer programs to match and merge data, and create Data Multi-Dimensionality
more information. (T. Stern, 2005) 9: A process by which The set of dimensions of a table or a data cube. (Rafanelli,
previously unknown patterns, rules, and relationships are 2005)
discovered from data. (Sadeghian et al., 2006) 10: A process
of seeking interesting and valuable information from a large Data Node
database using a combination of methods. (Kumar, 2005) An entity containing virtue attributes used to describe and
11: A research ield that investigates the extraction of useful aggregate knowledge in a knowledge network. (Croasdell
knowledge from large datasets. Clustering and Association & Wang, 2006)
Rule Mining are two examples of data-mining techniques.
(Kontaki et al., 2005) 12: A set of tools, techniques, and Data Operability
methods used to ind new, hidden, or unexpected patterns An aspect of () data quality: a level of data record
from a large collection of data typically stored in a data ability to be used directly, without additional processing
warehouse. (Bala et al., 2005) (restructuring, conversion, etc.). (Kulikowski, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
158 Dat a Pla nning Dat a Re leva nc e
2006b) 2: Modifying the data so that original conidential et al., 2005) 2: A multi-faceted concept in information
data values cannot be recovered. (Saygin, 2005) systems research that focuses on the itness for use of
D data by consumers. Data quality can be viewed in four
Data Planning categories: intrinsic (accuracy, objectivity, believability,
The projection of expected future needs for data, with and reputation), contextual (relevancy, timeliness, and
speciications on data sources, data collection and storage, appropriate amount of data), representational (format of
data processing and presentation, data distribution, and the data), and accessibility (ease of access). (Borchers,
data security. (Law, 2005) 2005) 3: A set of data properties (features, parameters, etc.)
describing their ability to satisfy the users expectations
Data Precision or requirements concerning data using for information
An aspect of numerical () data quality: the maximum acquiring in a given area of interest, learning, decision
error between a real parameter and its value given by making, and so forth. (Kulikowski, 2005) 4: Data have
the data, caused by the data values discretization. good quality if they are it for use. Data quality is measured
Data precision is inversely proportional to this error. in terms of many dimensions or characteristics, including
(Kulikowski, 2005) accuracy, completeness, consistency, and currency of
electronic data. (Marchetti et al., 2005) 5: Ensuring that
Data Preprocessing data supplied is it for use by its consumer. Elements of data
1: The application of several methods preceding the mining quality can extend to include the quality of the context in
phase, done for improving the overall data-mining results. which that data is produced, the quality of the information
Usually, it consists of: (1) data cleaninga method for architecture in which that data resides, the factual accuracy
ixing missing values, outliers, and possible inconsistent of the data item stored, and the level of completeness
data; (2) data integrationthe union of (possibly and lack of ambiguity. (Schwartz & Schreiber, 2005) 6:
heterogeneous) data coming from different sources into a Interchangeably used with information integrity, it can
unique data store; and (3) data reductionthe application refer to an organizational data-quality program as well
of any technique working on data representation capable of as quality of a data element. When applied to the latter, a
saving storage space without compromising the possibility data elements quality is measured against the dimensions
of inquiring them. (Buccafurri & Lax, 2005) 2: The of information integrity (accuracy, completeness,
data-mining phase that converts the usage, content, and validity, uniqueness, precision, timeliness, accessibility,
structure information contained in various data sources consistency, clarity, and suficiency). (Malik, 2006) 7:
into data abstractions necessary for pattern discovery. Most large databases have redundant and inconsistent
(Lee-Post & Jin, 2005b) data, missing data ields, and/or values, as well as data
ields that are not logically related and that are stored in
Data Privacy the same data relations. (Owrang O., 2006)
Current United States laws provide protection to student
data, including performance data. Online distance Data Reconciliation
education environments need to address privacy issues The process of resolving data inconsistencies in database
through design of courses and security features built into federations (such as constraint conlicts). (Balsters,
recordkeeping systems. (Sales, 2005) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Re plic at ion Dat a St ruc t ure 159
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
160 Dat a Ta g Dat a Wa re house Libra r y (DWL)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a Wa re housing Dat a -M ining Te chnology (DM T ) 161
system. However, there are three distinctive features that Data-Mining Data Table
make a DWL something more than a typical DL: temporal The lat ile constructed from the relational database
indexing, CSL-based indices, and direct links to warehouse that is the actual table used by the data-mining software.
D
business metadata. All these features provide novel (Breault, 2005)
possibilities of sub-setting the collection of documents to
be searched and establishing links among documents and Data-Mining Group (DMG)
data. (Wecel, Abramowicz, & Kalczynski, 2005) 1: The process of searching and analyzing data in order
to ind latent but potentially valuable information, and to
Data Warehousing identify patterns and establish relationships from a huge
1: A compilation of data designed for decision support by database. (Dholakia, Bang, et al., 2005) 2: A consortium of
executives, managers, analysts, and other key stakeholders data-mining vendors for developing data-mining standards.
in an organization. A data warehouse contains a consistent They have developed a Predictive Model Markup Language
picture of business conditions at a single point in time. (PMML). (Zendulka, 2005a)
(Pang, 2005a) 2: A form of data storage geared towards
business intelligence. It integrates data from various parts Data-Mining Guidelines
of the company. The data in a data warehouse are read- A set of standards by which medical data mining, in
only and tend to include historical as well as current data particular, might be conducted. This is a framework that
so that users can perform trend analysis. (Raisinghani, adopts a forward-looking responsibility in the evaluation
Klassen, et al., 2005) 3: Refers to the process of extraction of methods and explanation of conclusions, especially in
of data from different information sources (e.g., databases, the context of heuristic methods (with outcomes that may
iles) and their integration in a single data warehouse. be ill-deined). This extends not only to the methods of the
(Pourabbas, 2005b) 4: The gathering and cleaning of data data-mining procedure, the security and privacy aspects of
from disparate sources into a single database, optimized data, but also to where and how the results of data mining
for exploration and reporting. The data warehouse holds are utilized, requiring that an ethical reference be made to
a cleaned version of the data from operational systems, the inal purpose of the mining. (George, 2005a)
and data mining requires the type of cleaned data that
lives in a data warehouse. (Nicholson & Stanton, 2005) Data-Mining Model
5: The gathering and cleaning of data from disparate A high-level global description of a given set of data which
sources into a single database, which is optimized for is the result of a data-mining technique over the set of data.
exploration and reporting. The data warehouse holds a It can be descriptive or predictive. (Zendulka, 2005a)
cleaned version of the data from operational systems, and
data mining requires the type of cleaned data that live in Data-Mining Technology (DMT)
a data warehouse. (Nicholson & Stanton, 2005) 1: Broadly deined, includes all types of data-dictated
analytical tools and technologies that can detect generic
Data-Driven Decision Making and interesting patterns, scale (or can be made to scale)
The practice of purposefully collecting, analyzing, and to large data volumes, and help in automated knowledge
interpreting data according to accepted criteria, and discovery or prediction tasks. These include determining
using the outcomes to select and justify decisions. (Law, associations and correlations, clustering, classifying, and
2005) regressing, as well as developing predictive or forecasting
models. The speciic tools used can range from traditional
Data-Driven Design or emerging statistics and signal or image processing, to
A data warehouse design that begins with existing historical machine learning, artiicial intelligence, and knowledge
data and attempts to derive useful information regarding discovery from large databases, as well as econometrics,
trends in the organization. (Artz, 2005b) management science, and tools for modeling and predicting
the evolutions of nonlinear dynamical and stochastic
Data-Driven Web Design systems. (Ganguly, Gupta, Khan, 2005) 2: Statistical,
The data available in the organization are taken as the artiicial intelligence, machine learning, or even database-
starting point for the design of the Web site. (De Troyer, query-based approaches that are capable of extracting
2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
162 Dat a -M ining Tool Dat a ba se M a na ge m e nt Syst e m (DBM S)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dat a ba se M a rke t ing Dat ave illa nc e 163
of programs that enables users to create and maintain a Database Schema Reengineering
database. (Doorn, 2005) The process of analyzing a subject database schema to
recover its components and their relationships. It guides
D
Database Marketing the reconstitution of such a system into an enhanced one,
A branch of marketing that applies database technology with a higher level of abstraction and semantically closer
and analytics to understand customer behavior and improve to the Universe of Discourse. (Rivero, 2005)
effectiveness in marketing campaigns. (Lo, 2005)
Database Snapshot
Database Model A consistent collection of values of data items in a database
Conceptual data models and logical database models. that correspond to what a read-only transaction would
(Ma, 2005a) collect. The snapshot can be used as a checkpoint for
recovering a database upon. (Leong, 2005b)
Database Modeling
The irst step of database design, where the database Database Status
designers deine the data objects and their relationships to The structure and content of a database at a given time
other data objects. Data modeling involves a progression stamp. It comprises the database object classes, their
from conceptual model to logical model to physical schema. relationships, and their object instances. (Sindoni,
(Pardede et al., 2005) 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
164 DBA De c ision Cont e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De c ision Ex plore r De c ision Suppor t Syst e m (DSS) 165
context, which refers to the national economic, political, Decision Support System (DSS)
and social context for an organization, and the inner 1: An interactive arrangement of computerized tools
context that is the ongoing strategy, structure, culture, tailored to retrieve and display data regarding business
D
management, and political process of the organization. problems and queries. (Peter & Greenidge, 2005a) 2: An
Context helps to shape the process of decision making. interactive computer-based system which helps decision
(Chou et al., 2005) makers utilize data and models to solve semi-structured
or unstructured problems. (Duan & Xu, 2005) 3: An
Decision Explorer interactive. computer-based system composed of a user-
Software often used in Journey Making events that supports dialogue system, a model processor, and a data management
the representation and analysis of maps. The Decision system, which helps decision makers utilize data and
Explorer maps are projected onto a public screen for all quantitative models to solve semi-structured problems.
participants to read and use to illustrate their opinion (Forgionne et al., 2005) 4: A computer-based system
during the workshop. (Shaw, 2006) designed to assist in managing activities and information
in organizations. (Mathieu & Levary, 2005) 5: A computer
Decision Rule system that enables managers to solve a given problem in
1: An automatically generated standard that indicates the their own personalized way. (Pomerol & Adam, 2005) 6:
relationship between multimedia features and content A system designed, built, and used to support the decision-
information. (Hurson & Yang, 2005) 2: In (U,A,d) is making process. Its components are the data management
any expression of the form {a=va : aA and vaVa} system, the model management system, the knowledge
d=v where d is the decision attribute and v is a decision engine, the user interface, and the user or users. (Xodo
value. This decision rule is true in (U,A,d) if for any & Nigro, 2005) 7: A computer-based information system
object satisfying its left-hand side, it also satisies the whose purpose is the support of (not replacement) decision-
right-hand side; otherwise, the decision rule is true to a making activities. (Chen, Holt, et al., 2005) 8: One of a
degree measured by some coeficients such as conidence. speciic class of computerized information systems that
(Pawlak et al., 2005) 3: Speciication of the relationship support decision-making activities. DSSs are interactive,
between a collection of observations (conditions) and an computer-based systems and subsystems intended to help
outcome (a decision). (Grzymala-Busse & Ziarko, 2005) decision makers use communications technologies, data,
4: The result of an induction procedure providing the inal documents, knowledge, and models to identify and solve
assignment of a response class/value to a new object so problems and make decisions. Five more speciic DSS types
that only the predictor measurements are known. Such a include communications-driven DSS, data-driven DSS,
rule can be drawn in the form of a decision tree. (Siciliano document-driven DSS, knowledge-driven DSS, and model-
& Conversano, 2005) driven DSS. (Power, 2005) 9: Broadly deined, includes
technologies that facilitate decision making. Such systems
Decision Set can embed DMT and utilize these through automated
Ordered or unordered set of decision rules; a common batch processes and/or user-driven simulations or what-if
knowledge representation tool (utilized in the most expert scenario planning. The tools for decision support include
systems). (Bruha, 2005) analytical or automated approaches like data assimilation
and operations research, as well as tools that help the
Decision Support human experts or decision makers manage by objectives
1: Evolutionary step in the 1990s with characteristics to or by exception, like OLAP or GIS. (Ganguly et al., 2005)
review retrospective, dynamic data. OLAP is an example 10: In a broad sense, can be deined as a system/tools that
of an enabling technology in this area. (DeLorenzo, 2005) affect the way people make decisions. In IT, could be
2: The tools, techniques, and information resources that deined as a system that increases the intelligence density
can provide support to the decision maker in improving of data. (Sundaram & Portougal, 2005b) 11: A speciic
the eficiency and effectiveness of his/her decisions. Many class of computerized information system that supports
of these decision support tools may employ ICTs and be business and organizational decision-making activities.
part of the management information system itself. (Ritchie DSS is an interactive, software-based system that compiles
& Brindley, 2005) useful information from raw data, documents, personal
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
166 De c ision Syst e m De cla rat ive M ode
knowledge, and/or business models to identify and solve models. (Gehrke, 2005) 6: A method of inding rules or
problems and make decisions. (Raisinghani et al., 2005) rule induction which divides the data into subgroups that
D 12: An information system that interactively supports the are as similar as possible with regard to a target variable.
users ability to evaluate decision alternatives and develop (Nigro & Gonzlez Csaro, 2005c) 7: Each decision-tree
a recommended decision. (Forgionne, 2005) 13: Typically, algorithm creates rules based on decision trees or sets of
a business application that analyzes large amounts of data if-then statements to maximize interpretability. (Kusiak
in warehouses, often for the purpose of strategic decision & Shah, 2005) 8: A tree-shaped structure that represents
making. (Das, 2005) 14: A system and tools that affect the sets of decisions. Different types of decisions trees, such
way people make decisions. (Anke & Sundaram, 2006) as a Classiication and Regression Tree (CART), allow
15: Software designed to facilitate decision making, experts to create validated decision models that can then
particularly group decision making. (Roibs, 2006b) be applied to new datasets. (Athappilly & Rea, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De cla rat ive (N onproc e dura l) Que r y La ngua ge De fe nse M e cha nism s 167
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
168 De fe rre d De sign De c ision De libe rat ive De m oc ra cy
mechanisms may be manipulated and indoctrinated in Degree Audit Reporting System (DARS)
order to adapt to the demands of society, versus defense This reporting system for electronic advising through
D mechanisms that witness the huge complexity of the a match of degree requirements with a students
unconscious life that may be explored in order to create completed courses includes transfer articulation of course
fuller meaning and further development. Defense concepts equivalencies. (Langer, 2005)
include projection, introjection, delection, idealization,
splitting, and denial, and all have the common aim of Degree of Abnormality
overcoming anxiety. Groups and organizations develop A probability that represents to what extent a segment is
their own defense mechanisms which may be explored distant to the existing segments in relation with normal
through psychoanalytic-oriented consulting, aiming at events. (Oh et al., 2005)
social change. (Nobre, 2006b)
Degree of Range
Deferred Design Decision Type of transactions developed within the meta-business,
The cornerstone of implementing tailorable information and the way the companies are working together in order
systems, the DDD mechanism through which decisions to set up a workgroup environment. (Joia, 2005)
traditionally are taken during the design phase of an
information system development project, as a result Degree of Reach
of a set of user requirements elicited during analysis, How the involved companies are linked within the meta-
are now being deferred at run-time, until after the user business in order to transmit data and information among
decides about the required information system behavior. themselves. (Joia, 2005)
The information system can then follow the new design
speciications without any maintenance or redevelopment Degree of Structuring
action, and execute them to provide the user-deined The ability that the companies have to extract knowledge
behavior. (Stamoulis, Theotokis, & Martakos, 2005) from the data, and information retrieved and shared by
them. (Joia, 2005)
Deferred Maintenance
The policy of not performing database maintenance Deixis
operations when their need becomes evident, but A linguistic expression whose understanding requires
postponing them to a later time. (Sindoni, 2005a) understanding something besides itself, as with a caption.
(N.C. Rowe, 2005b)
Deferred Option
The option to defer a project or an investment, giving a Delay Jitter
irm an opportunity to make an investment at a later point Variance of the network delay computed over two
in time. (W. Li, 2005) subsequent audio packets. (Roccetti & Ferretti, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De libe rat ive Poll De m at For m 169
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
170 De m ogra phic s De pe nde ncy
removed and retired from circulation in exchange for Dense-Wavelength Division Multiplexing
electronic recording. (Saha, 2006b) (DWDM)
D The operation of a passive optical component (multiplexer)
Demographics that separates (and/or combines) two or more signals at
1: Involves the statistical study of characteristics within different wavelengths from one (two) or more inputs into
any population such as age, gender, marital status, address, two (one) or more outputs. (Chochliouros et al., 2005a)
occupation, mobility, health or disease rate, and so on.
(De Weaver, 2005) 2: Refers to the changing population Density
proile of the United States, to its implications for higher 1: An index used to indicate how actors are closely or
education, to the reasons for the explosive growth of loosely connected in a network. It is measured by the
distance learning. (D.B. Johnstone, 2005) proportion of possible lines that are actually present in
a network. (Assimakopoulos & Yan, 2006) 2: The ratio
Dendrogram of realized to possible ties. In a network with a density
1: A tree-like diagram that summarizes the process of of one, every member of a network is connected to every
clustering. Similar cases are joined by links whose position other. In a sparse network, there are few connections
in the diagram is determined by the level of similarity between people. The overall density of a network or a
between the cases. (Oh et al., 2005) 2: A graphical networks sub-region is closely related to every other
procedure for representing the output of a hierarchical network dimension. (Nelson & Hsu, 2006)
clustering method. It is strictly deined as a binary tree
with a distinguished root that has all the data items at its Density-Biased Sampling
leaves. (Chen & Liu, 2005) A database sampling method that combines clustering and
stratiied sampling. (Lutu, 2005)
Denial-of-Service (DOS) Attack
A type of computer system security attack where an Deontic Effect
opponent prevents legitimate users from accessing a service The establishment of an obligation or the fulillment of
or a resource, typically by overloading that resource with an obligation. (Johannesson, 2005a)
fabricated requests. (Knight & Labruyere, 2005)
Dependability
Denormalization A broader concept that includes availability, reliability,
A step backward in the normalization processfor safety, integrity, and maintainability, but not conidentiality.
example, to improve performance. (Kontio, 2005) A system is available if it is ready to perform a service;
it is reliable if it continues providing a correct service.
Denormalized Data Table Safety refers to the absence of catastrophic consequences
A database design that violates principles of a good for users and the environment. A systems integrity
(normalized) data model. Such a database design may guarantees no unauthorized modiications. When systems
lead to various problems such as data redundancy, reduced can be modiied and repaired easily, they are maintainable.
lexibility, and update anomalies. (Millet, 2005) Conidentiality means that information is not disclosed to
unauthorized subjects. (Weippl, 2006)
Denotational Semantics
The meaning is given in terms of mathematical functions. Dependence Relation
(Dasso & Funes, 2005) Relates to data cube query, where some of the group-by
queries could be answered using the results of other.
Dense Data (Tan, 2005a)
Data that has metric values for a substantial percentage
of all possible combinations of the dimension values. Dependency
(Deshpande & Ramasamy, 2005) The relation between data items or ields, or occasionally,
tables. Detecting dependencies is the key to putting tables
Dense Data Cube
A data cube is dense if a signiicant number of its cells (typically
at least 1-10%) are not empty. (Riedewald et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De pe nde nt Va ria ble De sign K now le dge Com pa rison 171
in the various normal forms and, hence, is the key to assertions and deinitions, which impose restrictions on
avoiding anomalies. (Schultz, 2005) possible interpretations according to the knowledge elicited
for a given domain. Each description logic has its set of
D
Dependent Variable constructors. (Colucci et al., 2006) 3: Considered to be
A value representing the presumed effect or consequence the most important knowledge representation formalism
of various states of related independent variables. In other unifying and giving a logical basis to the well-known
words, a dependent variable is the condition for which an traditions of frame-based systems, semantic networks and
explanation is sought. (McHaney, 2005) KL-ONE-like languages, object-oriented representations,
semantic data models, and type systems. (Roldn-Garca
Deployment Cost et al., 2005) 4: Logical formalism to represent structured
The IP-multicast requires additional knowledge in the concepts and the relationships among them. Formally, it is
routers to the basic unicast communication and extra work a subset of FOL dealing with concepts (monadic predicates)
from the administrators of the routers; the ALM needs and roles (binary predicates) which are useful to relate
the traditional unicast IP infrastructure only. (Hossz, concepts. Knowledge databases in description logic are
2005a) composed of a Tbox (the intentional component) and an
Abox (the box of asserts, the extensional component part).
Depot (Alonso-Jimnez et al., 2005)
An intermediate server to choose a proxy server for a
client request. (Tse, 2006) Descriptive Taxonomy
In educational theory and practice, an organizational
Depth of the Intervention scheme for classifying the structure of conditions for
For Andrew Harrison, intervention strategies range from learning, describing the approaches, types, events,
deep to surface level. Deep interventions are those which methods, and goals of instruction. While affective and
act on emotional involvement. These require a high level psycho-motor capabilities are also important, classic
of behavioral knowledge and skill as well as a sensitivity instructional design theory has focused on the cognitive
to the clients needs. Furthermore, there are clearly ethical domain. (Lasnik, 2005)
issues which require the willing participation of a client.
(Grieves, 2006b) Deseasonalization
Sometimes also called seasonal adjustment, a process
Depth-First of removing seasonality from the time series. Most
The method of generating candidates by adding speciic governmental statistics are seasonally adjusted to better
items at the end of the sequences. See also Generating- relect other components in a time series. (G.P. Zhang,
Pruning. (Masseglia et al., 2005) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
172 De sign M e t hod De st inat ion M a rke t ing Orga nizat ion (DM O)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
De st inat ion M a rke t ing Syst e m Deve lopm e nt Lit e rat ure 173
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
174 Deve lopm e nt Proc e ss Dida c t ic a l Sit uat ion
Device Diaspora
1: A piece of equipment used in a network. Devices include, 1: A dispersion of a people from their original homeland,
but are not limited to, workstations, servers, data storage such as the Jewish Diaspora after WWII or the Vietnamese
equipment, printers, routers, switches, hubs, machinery diaspora in the early 1970s. The Khmer diaspora was the
or appliances with network adapters, and punch-down result of the civil war and displacement of people due
panels. (Maris, 2005) 2: An entity that does not deal to the Khmer Rouge regime in the 1970s. Cambodian
with information storage, retrieval, or transmission, but refugees mostly settled in the U.S., Canada, Australia,
only deals with the exchange and transmission of data. France, and Thailand. (Hutchinson, 2005) 2: Immigrant
(Benyon, 2006) communities that live in nation-states other than their
original homelands. (Harris, 2005)
Device Proile
A model of a device storing information about both its costs DIC: See Deviance Information Criterion.
and capabilities. (De Meo, Quattrone, et al., 2005)
Dice
DFD: See Data Flow Diagram. Selecting a range on multiple dimensions to select a sub-
cube of the original space. (Deshpande & Ramasamy,
DFT: See Discrete Fourier Transformation. 2005)
DHT: See Distributed Hash Table. DICOM: See Digital Imaging and Communications in
Medicine.
DHTML: See Dynamic Hypertext Markup Language.
Didactical Situation
A set of circumstances of a teaching situation that can be
linked in a way that is coherent, regular, reproducible, and
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Diffe re nc ing Diffusion of I nnovat ion 175
speciic to the targeted knowledge. It is not a theory of division, as well as behavioral attributes of the members
learning but a process of guiding other peoples learning of organizational subsystems. (Peterson, 2005)
(i.e., the dissemination and transposition of knowledge).
D
(Pelton & Pelton, 2005) Differentiation Agent
Comparison-shopping agent specializing in collecting
Differencing price-related, impersonal information, for example,
Removes trend from a time series. This is an effective way Pricewatch.com. (Wan, 2006)
to provide a clearer view of the true underlying behavior
of the series. (Cho, 2005) DiffServ: See Differentiated Service.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
176 Digit a l Digit a l Cit y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Digit a l Com m unit y Digit a l Ec onom y 177
the diffusion ICT. (Moutinho & Heitor, 2005) 2: Usually a existing between communities regarding their ability
Web site that is centered on a city, where public authorities, or the possibility to effectively access information and
business, and citizens can communicate and exchange communication technologies. (Costagliola, Di Martino,
D
information. (Jaeger, 2005) Ferrucci, & Gravino, 2006) 5: Refers to segments of the
population lacking Internet access or Internet-related skills.
Digital Community (Holzer & Schweste, 2005) 6: A term used to describe the
A city, town, or community that actively applies interactive disparity between persons who have access to information
communication technologies to enhance all aspects of and computing technology, and those who do not. Often
its culture, community, and commerce. (Geiselhart & used to describe the lack of Internet accessibility to those
Jamieson, 2005) living in rural or remote areas or who lack computing
knowledge and skills. (Becker, 2005a) 7: The discrepancy
Digital Darwinism between people who have access to and the resources to
An ideology framing economic and social situations use new information and communication tools, such as
which argues that only the economically and socially it the Internet, and people who do not have the resources
will survive because of their ability to adapt to the digital and access to the technology. It can exist between rural
world. (Skovira, 2005) and urban areas, between the educated and uneducated,
between economic classes, and between more and less
Digital Deliberation developed nations. (Neumann, 2005) 8: The disparity in
The process of thoughtful discussion regarding an issue access to technology that exists across certain demographic
or course of action through the use of ICTs. Digital groups. Also, a term used to describe the discrepancy
deliberation in government is characterized by access to between those who have the skills, knowledge, and
balanced information, an open agenda, time to consider abilities to use technology and those who do not. (Sharma,
issues expansively, freedom from manipulation or coercion, 2006a) 9: The gap between countries or communities with
a rule-based framework for discussion, participation by an and without access to technology, usually because of a
inclusive sample of citizens, broader and freer interaction combination of economic, socio-political, and historical
between participants, and the recognition of differences causes. The differences relate to ICT infrastructure and
between participants. (Holzer & Schweste, 2005) human resources and skills, although it is usually used
in the context of the inadequate Internet connectivity
Digital Democracy in developing countries or in underdeveloped regions.
Encompasses the use of ICTs in the practice of democracy, (Arellano et al., 2005) 10: The gap created between those
whereby emphasis is placed on the processes and structures using ICT and those who do not, for a range of reasons,
that deine the relationships between government and including a lack of access to ICT as a result of social or
citizens, between elected oficials and appointed civil economic factors, a lack of technical and keyboard skills
servants, and between the legislative and executive to use ICT, and a lack of basic skills or computer literacy
branches of government. (Holzer & Schweste, 2005) skills to understand the requirements and interpret the
information of ICT. (Sutcliffe, 2005)
Digital Divide
1: Refers to individuals or members of communities and Digital Economy
groups whose social, cultural, political, economic, or 1: Accepts as its foundation ICT developments and
personal circumstances constrain access to electronic represents the impact that these have had on the conduct of
communications or limit beneit to their lives from business and commercial activities. Changes in markets and
contemporary electronic technologies. (Malina, 2005) 2: supply chains as well as increasing global competition all
A term used to describe the gap between the technology represent what is encapsulated within the term the digital
haves and have-nots. It is a gap in opportunities economy. (Ritchie & Brindley, 2005) 2: The economy
experienced by those with limited accessibility to based more in the form of intangibles, information,
technology. (Rahman, 2005b) 3: Unequal access and use of innovation, and creativity, to expand economic potential;
data, information, and communication. More speciically, based on the exploitation of ideas rather than material
digital divide means unequal access to ICT infrastructure things using digital infrastructure. (Sharma, 2006a) 3:
or lacking skills in using it. (Heinonen, 2005) 4: Gap Economic system using Internet technology for business
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
178 Digit a l Elevat ion M ode l (DEM ) Digit a l I nclusion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Digit a l I nt e ra c t ivit y Digit a l Right s M a na ge m e nt (D RM ) 179
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
180 Digit a l Sat e llit e I m a ge Digit a l Te levision (DT V )
including end users and any intermediaries such as dealers, can be checked by anyone and, if properly used, assures
distributors, and system administrators. (Wang, Cheng, integrity of the signed message, as well as the identity of
D Cheng, & Huang, 2006) 4: A set of technologies whose the signer. (Stickel, 2005)
purpose is to restrict access to, and the possible uses of,
digital media objects, for example, by scrambling the data Digital Subscriber Line (DSL)
on a DVD to prevent unauthorized copying. (Hughes & 1: Shortened from Asymmetric Digital Subscriber Line
Lang, 2005) 5: The limitation of the access of users to (ADSL). A family of digital telecommunications protocols
information in a repository through the use of technical designed to allow high-speed data communication over
protection measures. (Hassan & Hietanen, 2006) 6: A the existing copper telephone lines between end users
concept for managing and controlling the access and and telephone companies. (Vician & Buche, 2005) 2: A
utilization of digital assets. (Karnouskos & Vilmos, 2006) mechanism for transmitting online information through
7: Refers to methods and technologies designed to control telephone lines, but at a faster speed than permitted by
access to or use of copyrighted data. (Gaedke et al., 2005) a normal telephone connection. (St.Amant, 2005e) 3: A
8: A platform to protect and securely deliver content on a switched telephone service that provides high data rates,
computer. (Upadhyaya et al., 2006) typically more than 1 Mbp. (Raisinghani & Ghanem, 2005)
4: A technique for transferring data over regular phone lines
Digital Satellite Image by using a frequency different from traditional voice calls
A digital image sent by a satellite system that is usually or analog modem trafic over the phone wires. DSL lines
launched in special orbits such as the geostationary orbit. carry voice, video, and data. (Hentea, 2005a) 5: Supports
The latter type of satellite system rotates at about 35,000 consolidation of data, video, and voice trafic for enabling
Km from the surface of the earth and is able to cover the broadband transmissions over ordinary twisted-copper-
same area of the earth 24 hours a day. (Al-Hanbali & wire telephone lines between the telephone company
Sadoun, 2006) central ofice and the subscribers residence. (Littman,
2006) 6: A method implementing a numerical coding
Digital Signal technique for fast Internet access. It uses the ordinary
A discrete-time signal whose amplitude is also discrete. It telephone line and splits the signals of voice and data.
is deined as a function of an independent, integer-valued It can offer speeds up to 8Mbps. (Kirlidog, 2005) 7: A
variable n. Consequently, a digital signal represents a technique for transmitting large amounts of data rapidly
sequence of discrete values (some of which can be zeros) on twisted pairs of copper wires, with the transmission
for each value of integer n. (Jovanovic-Dolecek, 2005a) rates for downstream access being much greater than for
the upstream access. (Hin & Subramaniam, 2005a) 8: A
Digital Signal Processing technology that provides high bandwidth digital data lows
Extracts useful information carried by the digital signals, over existing ordinary copper telephone lines to homes
and is concerned with the mathematical representation and small businesses. (Pease et al., 2005)
of the digital signals and algorithmic operations carried
out on the signal to extract the information. (Jovanovic- Digital Subscriber Loop (DSL)
Dolecek, 2005a) The global term for a family of technologies that transform
the copper local loop into a broadband line capable of
Digital Signature delivering multiple video channels into the home. There are
1: An electronic signature can be deemed the digital a variety of DSL technologies known as xDSL; each type
equivalent of a handwritten signature. Electronic signatures has a unique set of characteristics in terms of performance
can be used to authenticate the identity of the signer of (maximum broadband capacity), distance over maximum
the document and to also conirm the data integrity of performance (measured from the switch), frequency of
the document. (Mundy & Otenko, 2005) 2: Extra data transmission, and cost. (Chochliouros et al., 2005c)
appended to the message in order to authenticate the
identity of the sender and to ensure that the original Digital Television (DTV)
content of the message or document that has been sent 1: The term adopted by the FCC to describe its
is unchanged. (Guan, 2005c) 3: A digital signature may speciication for the next generation of broadcast-television
be used to electronically sign a document. The signature transmissions. DTV encompasses both HDTV and STV.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Digit a l T hink ing Sk ills Dim e nsion 181
(Chochliouros et al., 2005b) 2: The new generation of and audiofor the purposes of copyright protection,
broadcast television transmissions. These are of better authentication, content integrity veriication, and so forth.
quality than the traditional analogical broadcasts and will (Si & Li, 2006) 4: The practice of hiding a message in
D
presumably replace them. (Prata, 2005) 3: Broadcasting digital media, such as a digital image, audio, and/or video.
of television signals by means of digital techniques, used Digital watermarking only gained enormous popularity as
for the provision of TV services. (Hulicki, 2005) a research topic in the latter half of the 1990s. (Sattar &
Yu, 2006) 5: Sometimes also known as digital data hiding,
Digital Thinking Skills a technique for inserting secret information into digital
1: A reinement of the term Digital Literacy describing content in a seemingly innocuous and standards-compliant
the variety of thinking skills that comprise digital literacy. manner for applications of content authentication, covert
(Eshet, 2005) 2: Creation of a new mental model that is communications, copyright control or protection, and
based on an asynchronous mental model and on the ability so forth. In the case of covert communications, it is also
of linking, combining, and associating different, or even called steganography. (Wang, Cheng, Cheng, & Huang,
opposite ideas. (Joia, 2005) 2006) 6: The act of inserting a message into a cover work.
The resulting stego-object can be visible or invisible. (K.
Digital Versatile Disc (DVD) Chen, 2005)
An optical disc technology expected to rapidly replace the
CD-ROM (as well as the audio compact disc) over the next Digitality
few years. The DVD holds 4.7 gigabytes of information The proportion of a companys business that is online.
on one of its two sides, or enough for a 133-minute movie. (Borders & Johnston, 2005)
(Bochicchio & Fiore, 2005)
Digitation
Digital Video Broadcasting (DVB) The process of converting analog data to digital data where
1: Originally meant television broadcasting using digital binary systems are usually used. Programmers ind dealing
signals (as opposed to analog signals), but now refers to with digital data is much easier than dealing with analog
broadcasting all kinds of data as well as sound, often data. (Al-Hanbali & Sadoun, 2006)
accompanied by auxiliary information and including
bidirectional communications. (Chochliouros et al., 2005b) Digitization
2: The European standard for the development of DTV. Measures that automate processes. (Sundaram & Portougal,
(Hulicki, 2005) 3: A standard for sending and receiving 2005a)
digital information. It is used for transmitting television
by satellite and for broadcasting Internet. (D. Stern, Dilution of a Training Program
2005) 4: The European standard for digital TV. This Short circuiting the full delivery of a program, or inaccurate
standard provides a very high-speed, robust transmission presentation of material. (D. Wright, 2005)
chain capable of handling the many megabytes per second
needed for hundreds of MPEG-2 digital TV channels. Dimension
(Cosemans, 2005b) 1: A business perspective useful for analyzing data. A
dimension usually contains one or more hierarchies that
Digital Watermark(ing) can be used to drill up or down to different levels of
1: An image or a logo in digital format embedded in a detail. (Bellatreche & Mohania, 2005) 2: A category of
host image. The embedded data can later be used to prove information relevant to the decision-making purpose of the
the rightful ownership. (Chen, Chen, Ma, et al., 2005) data warehouse (Scime, 2005b). 3: A dimension attribute
2: A process that secretly embeds a message, such as a of an entity is a functional attribute that describes an
logo or data about the authorship, into multimedia. The aspect of the entity such as location or product. Dimension
watermark information still can be detected or extracted attributes can be hierarchical, for example, year-quarter-
after suffering from attacks. Its major intent is establishing month-day for the time dimension. (Riedewald et al.,
an identity of multimedia to prevent unauthorized use. (Lou 2005) 4: A property of a fact that speciies or explains one
et al., 2006) 3: A method of embedding secret information aspect of said fact. Usually a dimension has information
(watermark) into a host mediasuch as image, video, associated with it. (Badia, 2005c) 5: A property of the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
182 Dim e nsion De pe nde ncy Dire c t Audio Broa dc a st ing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dire c t I m pa c t Dire c t iona l Re lat ion 183
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
184 Dire c t or y Disc ove r y I nfor m at ic s
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Disc ove r y Tool Disc rim ina nt Ana lysis 185
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
186 Disc rim ina nt Func t ion Algorit hm Disjunc t ive Dat a o
l g Progra m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Disjunc t ive Se t of Conjunc t ive Rule s Dist a nc e Educ at ion (DE) 187
a constraint or denial rule, that is, a rule which is satisied Disruptive Innovation
only if Body(r) is false. (Greco & Zumpano, 2005b) An innovation that typically presents a different package
of performance attributesones that, at least at the outset,
D
Disjunctive Set of Conjunctive Rules are not valued by existing customers. (C.-S. Lee, 2005)
A conjunctive rule is a propositional rule whose antecedent
consists of a conjunction of attribute-value pairs. A Dissemination
disjunctive set of conjunctive rules consists of a set of 1: Because information is not created equally, it must
conjunctive rules with the same consequent. It is called be codiied and aggregated such that one producer of
disjunctive because the rules in the set can be combined knowledge is not privileged over another. For example, a
into a single disjunctive rule whose antecedent consists city portal where all community information is collated or
of a disjunction of conjunctions. (An, 2005) republished. (Williamson, 2005) 2: Stage of the intelligence
cycle. In this stage, the intelligence produced in the analysis
Disorientation stage is presented and forwarded to strategic decision
The sensation of feeling lost in a hypermedia document, makers. (Achterbergh, 2005a)
characterized by three categories of the users experience:
(1) the user does not know where to go next, (2) the user Distal Context
knows where to go but not how to get there, or (3) the user The physical scope of a consumer context that is outside
does not know where he or she is in relation to the overall the direct perception of the consumer. Most context-aware
structure of the document. (Boechler, 2006a) applications intend to help mobile consumers obtain useful
and interesting information about their distal context.
Disparity (Sun & Poole, 2005)
The inequality or difference in access to media and
technology. (Reilly, 2005) Distance
A function from pairs of objects into non-negative real
Disparity Map Generation numbers. It can be zero only if the two arguments are
Solving the correspondence problem, that is, to ind the the same. It must be symmetric and obey the triangle
corresponding points in the stereo images by inding inequality. (Chvez & Navarro, 2005)
the difference in spatial position of the points, namely,
disparity. (Ozer et al., 2005) Distance Communication
Communication under conditions of geographic
Dispersed/Distributed Team separation that minimize the possibility of face-to-face
A team separated by some degree of physical distance. and synchronous interactions. (Murphy, 2005c)
(Connaughton, 2005)
Distance Education (DE)
Displaying Pipeline 1: Education in which there is a physical separation between
Collective term for the different stages which must be the learner and the teacher, and is usually contrasted with
passed to show graphical content on screen. (Rosenbaum on-campus education. (Taylor et al., 2005) 2: A form of
et al., 2006) instruction in which a geographical separation exists
between instructor and students; it may be same time/
Disposal different place or different time/different place. Various
Even disconnected computers may lead to cyber-identity types of technology may be used as part of this form of
theft. Careless handling or disposal of discarded computers education, with more technology required for the same-
can lead to identity theft. Furthermore, disposed hardware time format. (Simon et al., 2005) 3: A formal educational
and software may lead to cyber-identity theft. If a user process in which instruction occurs when student and
fails to take precautions such as data deletion or physical instructor are separated by geographic distance or by time.
destruction of a machine, the data are readily accessible for Instruction may be synchronous or asynchronous. Distance
the next userwhoever may ind it. (Close et al., 2006) education may employ correspondence study or audio,
video, or computer technologies. (Beck & Schornack,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
188 Dist a nc e Educ at ion a nd Tra ining Counc il (DETC) Dis t a nc e Te a ching U nive rsit y
2005) 4: A teaching method in which students do not have the range [0,1], with values close to 0 for similar elements.
to come to a speciic location in order to hear lectures or (Chang et al., 2005) 2: Used to express the similarity
D study. The learning materials reach them either by mail, between two objects. It is usually normalized in the range
through the Internet, or through other means (satellite, between 0 to 1. Examples of distance functions used for
cable). The main component of the method is usually time series data are the Euclidean Distance and the Time
written material together with additional components Warping Distance. (Kontaki et al., 2005)
such as assignments, face-to-face (or computer-mediated)
tutorials, and examinations. It involves learning outside Distance Learners Guide
of the traditional avenues of attendance at educational Originally a consumers guide to help prospective online
institutions. (Erlich & Gal-Ezer, 2005) 5: Education that students make intelligent decisions about their provider
takes place when an instructor and student are separated and the tools they will need to be successful. (S.M.
by physical distance, and various technologies (e.g., the Johnstone, 2005)
Internet, videoconferencing, etc.) are used to bridge the
distance. These types of instructional delivery systems Distance Learning: See Distance Education.
can provide non-traditional students with a second chance
at a college education, and reach those disadvantaged Distance Learning Library Service
by time constraints, physical disability, or remote Refers to one of several library services in support of
geographical locations. It is sometimes called distance college, university, or other post-secondary courses and
learning. (Paraskevi & Kollias, 2006) 6: Also known programs offered away from a main campus or in the
as correspondence education, refers to the alternative absence of a traditional campus, and regardless of where
approach to traditional classroom instruction, whereby credit is given. These courses may be taught in traditional
learning packages are delivered to the learners via multiple or non-traditional formats or media, may or may not
channels. The term is used to designate any learning that require physical facilities, and may or may not involve live
takes place between a teacher and a learner when they are interaction of teachers and students. The phrase is inclusive
not in the same place at the same time. Distance learning of courses in all post-secondary programs designated
has evolved into Web-based education due to information as: extension, extended, off-campus, extended campus,
technology, especially the Internet. (Rahman, 2005f) 7: distance, distributed, open, lexible, franchising, virtual,
Learners are connected with educational resources beyond synchronous, or asynchronous. (Buchanan, 2005)
the conines of a traditional classroom, and instructed via
computer-mediated communication and different types of Distance Learning Program
electronic technologies that can overcome the constraints of A program that typically does not meet or hold class
distance, time, physical presence, or location that separate sessions on campus. (Riffee & Sessums, 2005)
instructors and students. Learning may be synchronous
or asynchronous. (Malina, 2005) Distance Learning Satellite Transmission
A learning program transmitted via television signal from
Distance Education and Training Council a remote source and accessed locally by students through
(DETC) a receiver dish antenna. (Switala, 2005)
Established in 1926, the standard-setting agency for
correspondence study and distance education institutions. Distance Measure
(Rhoten, 2006b) One of the calculation techniques to discover the
relationship between two implicit words in a large corpus or
Distance Education Course/Program labels in a large database from the viewpoint of similarity.
1: The curriculum offered through distance education. (Ito, 2005)
(Schifter, 2005) 2: A course designed for students who are
not present in person in class. (Novitzki, 2005) Distance Teaching University
1: A university that teaches students via a wide range
Distance Function of distance education methods and technologies. (Guri-
1: A function used to compute the similarity between two Rosenblit, 2005a) 2: A university in which instructors and
multimedia elements. In particular, it returns a number in students are separated by distance and interact mainly
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dist a nc e Tra ining a nd Educ at ion (DT & E) Dist ribut ed Environm e nt 189
through communication technologies. It allows its students of the remote procedure-calling mechanism and allows
to study wherever convenient, and requires special methods calls to remote objects interacting with COM services.
of course and instructional design, as well as special (Kasi & Young, 2006)
D
organizational and administrative arrangements. (Erlich
& Gal-Ezer, 2005) Distributed Computing
The process of using a number of separate but networked
Distance Training and Education (DT&E) computers to solve a single problem. (Zwitserloot &
The process of delivering instructional resources for Pantic, 2005)
the purposes of training and education to a location (or
to locations) away from a classroom, building, or site Distributed Computing System
to another classroom, building, or site by using video, Computing distributed over networks instead of on single
audio, computer, multimedia communications, or some computers. (Kasi & Young, 2006)
combination of these with other traditional delivery
methods. (Brace & Berge, 2006) Distributed Constructionism (DC)
An extension of the Constructionism theory to knowledge-
Distanced Leadership building communities, where the online learning
Leadership of a team or organizational members that are community (instead of one student) collaboratively
separated by some degree of time and distance from their constructs knowledge artifacts. (Zaphiris et al., 2005)
leader. (Connaughton, 2005)
Distributed Data Mining
Distilled Statecharts 1: Mining information from a very large set of data spread
A statecharts-based formalism for lightweight mobile across multiple locations without transferring the data to
agents. (Fortino et al., 2006) a central location. (Jha & Sural, 2005) 2: Performing the
data-mining task on data sources distributed in different
Distributed Artiicial Intelligence (DAI) sites. (Saygin, 2005)
A subset of Artiicial Intelligence that is concerned with
the study of issues related to knowledge distribution and Distributed Database
problem solving involving a society of decentralized but A collection of multiple, logically interrelated databases
connected entities. (Tang & Sivaramakrishnan, 2005) distributed over a computer network. (Ibrahim, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
190 Dist ribut e d Ex pe r t ise Dist ribut e d Work
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dist ribut ion Cha nne l DN A 191
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
192 DNS Document Type Deinition (DTD)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Doc um e nt Ve c t or Dom a in M ode l 193
are to be used. It can also list any elements a document actual data in a ield are a subset of the ields domain.
cannot contain. (Passi et al., 2005) 2: Provides guidelines (Koeller, 2005)
about how speciic elements in a document are represented
D
or which segments of data may coexist or are mutually Domain Analysis Technique
exclusive. (Hawk & Zheng, 2006) 3: A formal description Search for the larger units of cultural knowledge called
in XML declaration syntax of a particular type of document domains, a synonym for person, place, or thing. Used to
It begins with a <!DOCTYPE keyword and sets out what gain an understanding of the semantic relationships of
names are to be used for the different types of markup terms and categories. (DeLorenzo, 2005)
elements, where they may occur, the elements possible
attributes, and how they all it together. For example, a Domain Key/Normal Form (DK/NF)
DTD may specify that every person markup element must Rather than functional dependencies, DK/NF is based
have a name attribute and that it can have an offspring on domain dependencies and key dependencies only.
element called id whose content must be text. There are Although it is provable that a set of tables in DK/NF avoids
many sorts of DTDs ready to be used in all kinds of areas all anomalies, it is also provable that there is no procedure
that can be downloaded and used freely. (Zarri, 2005b) 4: for producing this normal form. (Schultz, 2005)
A set of rules deining the element types that are allowed
within an XML document, and specifying the allowed Domain Knowledge
content and attributes of each element type. Also deines all 1: A set of small domain knowledge elements makes up
the external entities referenced within the documents and domain knowledge. Domain knowledge represents all
the notations that can be used. (Pallis, Stoupa, & Vakali, topics in teaching domain and forms a complete course
2005) 5: The capability of XML to specify constraints for structure. (Wu & Chen, 2005) 2: Expertise in a given
a class of documents. A DTD deines element and attribute application area. (Hoxmeier, 2005)
names and the hierarchic structure of the elements for the
documents of a class. (Lyytikinen et al., 2005) Domain Language
1: The language, including speciic technical terms,
Document Vector phrases, and shortcuts/abbreviations of speech that are
Each document is represented by a vector of frequencies of unique and speciic to the sphere of knowledge. (Coakes
remaining items after preprocessing within the document. & Clarke, 2006b) 2: Used to learn about some speciic
(Fung et al., 2005) subject domain, for example, in an academic discipline.
This contrasts with more general learning of discussion
Document Warehouse strategies, metacognition, learning to learn, and so forth.
A document database consisting of documents gathered Vicarious learning has thus far been more effectively
from various independent sources. (Schmidt et al., shown to work in the latter type of area than in domain
2005) learning, but this may be quite sensitive to the choice of
domain. (J.R. Lee, 2005)
DOM: See Document Object Model.
Domain Model
Domain 1: A model that contains information about the course taught
1: A scope of information deinition. A domain deines in a wireless emergency service. A usual representation
a collection of information generally recognized as is a concept network specifying concepts and their
appropriate to a ield of study, a business process or relationships. (Gaudioso & Montero, 2006) 2: Codiied
function, or mission. (Fulton, 2005) 2: Combines several information about an application domain, speciically a
secondary structure elements and motifs; has a speciic domain for which a business process is being developed.
function. (Tsunoda et al., 2005) 3: Scope or range of a (Berztiss, 2006b) 3: Representation of the subject domain
subject or sphere of knowledge. (Coakes & Clarke, 2006a) at a conceptual level, often in terms of concepts and their
4: The area of interest for which a data warehouse was relationships. (Houben et al., 2006)
created. (Scime, 2005b) 5: The set of permitted values for
a ield in a database, deined during database design. The
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
194 Dom a in N a m e Dot -Com
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dot -Com Bubble Dra m a Se ria l 195
did not exist. Dot-coms often deliver all their services taxation happens when comparable taxes are imposed by
over an Internet interface, but products might be delivered two or more taxing jurisdictions on the same taxpayer in
through traditional channels as well. Dot-coms are often respect of the same taxable income or capital. (Raisinghani
D
divided into two categories: those that provide products & Petty, 2005)
and services for consumers (B2C) and those that provide
products and services to other businesses (B2B). (Sharma Double-Knit Organization
& Wickramasinghe, 2005) 2: An electronic retailer that An organization where people work in teams for projects,
operates exclusively through one distribution channel. but importantly also belong to a much more enduring and
By nature, dot-coms are non-store-based retailers. Also lasting community of practice in order to keep their skills
known as pure player. (Madlberger, 2006) sharp. (Ray, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
196 Dra m a Se rie s Dua l-M ode I nst it ut ion
DREAM: See Design Rationale Environment for DSV-IS: See Design, Speciication, and Veriication of
Argumentation and Modeling. Interactive Systems.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dua l-Ta sk St udy Dyna m ic Digit a l De libe rat ion 197
on-campus courses and distance education courses. DVB: See Digital Video Broadcasting.
(Graham, Allen, et al., 2005)
DVC: See Desktop Video Conferencing; Document Cut-
D
Dual-Task Study Off Value.
A study in which two tasks are performed concurrently
to observe changes in task interference. Usually the DVD: See Digital Versatile Disc.
participant is expected to or asked to focus on the primary
task so that interference is observed only in the secondary DVP: See Delivery-vs.-Payment.
task, but this is not necessarily always the objective.
Observations of task interference are taken to suggest DWL: See Data Warehouse Library.
that the limits of the processing system are being reached.
(Owen, 2006c) DWT: See Discrete Wavelet Transformation.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
198 Dyna m ic E-Busine ss Dyna m ic Sa m pling (Ada pt ive Sa m pling)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dyna m ic T im e Wa rping (DT W) Dyst opia 199
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
200 E- E-Certiicate
E
E- E-Business Model: See Electronic Business Model.
Oftentimes used without the hyphen, the e originally
stood for electronic, as in online. Today the term is E-Business Opportunity: See Electronic Business
used rather freely to describe any situation or solution that Opportunity.
has made the migration from real world to the Internet.
(Passi et al., 2005) E-Business Option: See Electronic Business Option.
E-Assessment Project: See Electronic Assessment E-Business Policy Group: See Electronic Business
Project. Policy Group.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
E-Channel E-Fulillment Capability 201
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
202 E-Gove r na nc e E-Life st yle
E-Government Integration Stage: See Electronic E-Learning Environment: See Electronic Learning
Government Integration Stage. Environment.
E-Government Internet Security: See Electronic E-Learning Evaluation Framework: See Electronic
Government Internet Security. Learning Evaluation Framework.
E-Government Portal: See Electronic Government E-Learning Framework: See Electronic Learning
Portal. Framework.
E-Government Stage: See Electronic Government E-Learning Management System: See Electronic
Stage. Learning Management System.
E -H I M: See Elect ronic Health Infor mation E-Learning Process: See Electronic Learning
Management. Process.
E-Journalism: See Electronic Journalism. E-Learning Study Skill: See Electronic Learning
Study Skill.
E-Knowledge: See Electronic Knowledge.
E-Learning Support and Development Team: See
E-Knowledge Network: See Electronic Knowledge Electronic Learning Support and Development Team.
Network.
E-Learning System: See Electronic Learning
E-Lab: See Electronic Lab. System.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
E-M a rke t E-Ta ile r 203
E-Mail Newsletter: See Electronic Mail Newsletter. E-Questionnaire: See Electronic Questionnaire.
E-Mail Protocol: See Electronic Mail Protocol. E-R Model: See Entity-Relationship Model.
E-Meeting: See Electronic Meeting. E-Service Quality: See Electronic Service Quality.
E-Mentor: See Electronic Mentor. E-Social Contract: See Electronic Social Contract.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
204 E-Ta iling Ec ologic a l M e t a phor
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ec ologic a l N iche Edit Dist a nc e 205
for the inclusion of complexity, and a language and set Economies of Scale
of analytical and descriptive tools from the ecological 1: The achievement of lower average cost per unit through
sciences. (Tatnall & Davey, 2005) increased production, or the decrease in the marginal cost
E
of production as a irms extent of operations expands.
Ecological Niche (D. Kim, 2005) 2: The notion of increased eficiency for
A place where a particular species that is well suited to the production and/or marketing of goods/products by
this environment is able to thrive, where other species pooling or sharing resources. (Braun, 2006) 3: Supply-side
may not. (Tatnall & Davey, 2005) economies of scalereductions in unit costs resulting
from increased size of operations. Demand-side economies
Ecological System of scalethe value of a technology or product increases
The organization and interactions of communities of living exponentially as the number of users increase (network
things, together with the chemical and physical factors in effects lead to demand-side economies of scale). (C.-S.
their environment. (OLooney, 2006) Lee, 2005) 4: The notion of increased eficiency for the
production and/or marketing of goods/products by pooling
Economic Evaluation or sharing resources. (Braun, 2005a)
This approach to evaluation views IT/IS as an investment
or a business facilitation project. Therefore, the focus Economies of Scope
of evaluation shifts from the performance of the IS per Supply-side economies of scopecost of the joint
se to the quality of its outputs (e.g., information) and production of two or more products can be less than the cost
their utilization (e.g., customer satisfaction, creation of of producing them separately. Demand-side economies of
business value). Here the evaluation of IT investments is scopea single set of digital assets can provide value for
based on an organizational analysis that emphasizes the customers across many different and disparate markets.
achievement of predetermined outcomes as a measure (C.-S. Lee, 2005)
of effectiveness (e.g., critical success factors, business
objectives/strategy). In other words the worth of an Ecosystem
IS is sought in the systems performance and inancial 1: The ecosystem represented by the curriculum in a
proitability. (Serafeimidis, 2005) university information systems department contains
(at least) the following species: lecturers, researchers,
Economic Order Quantity (EOQ) students, professional bodies, university administrators,
An approach to deining the lot size for purchasing raw and representatives of the computer industry. (Tatnall
materials, the EOQ is a mathematical expression of the & Davey, 2005) 2: The entire ecological community
trade-off between ordering costs (for purchased items) composed of all living organisms interacting with the
or set-up costs (for manufactured items) and the cost of physical environment as one system. (Targowski, 2005)
storing material as inventory. If set-up or ordering costs
are high, it may make sense to deal in larger batches, with EDA: See Exploratory Data Analysis.
the inherent knock-on effect of increasing inventory costs.
(Carton & Adam, 2005) EDGE: See Enhanced Data Rates for GSM Evolution.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
206 Edit Re st ra int Educ at iona l Ta sk
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Educational Technology Eficacy 207
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
208 Eficiency Elastic Interface
Eficiency Eigenvalue
1: A measure of performance based on comparison of The quantity representing the variance of a set of variables
E the value of the output of the system and the resources included in a factor. (Lee, Peterson, et al., 2005)
needed to achieve the output; in other words, is the system
worthwhile? (Abu-Samaha, 2005) 2: From an IT viewpoint, EIP: See Enhanced Instructional Presentation; Enterprise
this usually relates to improvements within the business, Information Portal; Enterprise Internal Portal.
so for a business it may mean IT systems that reduce costs
or perform tasks more reliably or faster. (Darbyshire & EIP Model: See Enhanced Instructional Presentation
Burgess, 2005) 3: Related to the time spent for assessors Model.
to accomplish the assessment task. (Diamadis & Polyzos,
2005) 4: The ability to accomplish a task with few EIS: See Executive Information System.
resources. (Hunter, 2005) 5: The way a system supports
users in carrying out their tasks, and a measure of how EISP: See Enterprise Information Security Policy.
quickly users can accomplish goals or inish their work
when using the system. (Yong, 2005) EKM: See Enterprise Knowledge Management.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ela st ic Pa nning Ele c t ronic Busine ss (E-Busine ss) 209
the object are a function of the length of this connection, fails. (Murthy & Krishnamurthy, 2005a) 2: The process
thus following the rubber-band metaphor. (Hrst & Lauer, of selling online, with the highest bidder winning the
2006) product. (Guan, 2006a)
E
Elastic Panning Electronic Auction Marketplace
An approach for navigation in visual data which has proven A form of a virtual B2B community where goods, services,
to be feasible not only for the visual browsing of static, or information are offered for purchase and bid upon
time-independent data, but for continuous, time-dependent by various organizations under some pre-determined
media streams as well. Similar to the FineSlider, it builds structured process. eBay would be an example of an
on the concept of elastic interfaces and therefore solves electronic auction marketplace. (Turner, 2006)
the scaling problem, which generally appears if a long
document has to be mapped on a slider scale that is limited Electronic Board
by window size and screen resolution. (Hrst, 2006) A classic groupware tool that supports the functionalities
of a traditional whiteboard (sharing sketches, pointing,
Elderly Time Bank annotating) through a set of distributed computers.
A virtual community applying the concept of time bank (Villemur & Drira, 2006)
to support the active aging of elderly and that resorts to
computer networks to facilitate the interactions among Electronic Brainstorming System (EBS)
members. (Camarinha-Matos & Ferrada, 2006) A computer-based system that facilitates brainstorming
between group members. (Aurum, 2005)
Electricity Grid for E-Learning and Professional
Development Electronic Bulletin Board
A metaphor for a systemic environment in which e-learning A Web site where students and instructors can post
and professional development resources and experiences information for others to view at a later time. (Hawkins
low to stakeholders throughout the system. Surplus is built & Baker, 2005)
into the system, and knowledge resources are entered
once and used anywhere. This model enables reduced Electronic Business (E-Business)
marginal costs. (Norris, 2005) 1: A comprehensive term used to describe the way
an organization interacts with its key constituencies,
Electronic Administration including employees, managers, customers, suppliers, and
E-government initiatives that deal particularly with partners through electronic technologies. It has a broader
improving the internal workings of the public sector. connotation than e-commerce because e-commerce is
(Olatokun, 2006) limited to business exchanges or transaction over the
Internet only. (Zhao, 2005) 2: The administration of
Electronic Administrator conducting business via the Internet. This would include
Online course or program administrator. (Whateley et the buying and selling of goods and services, along with
al., 2005) providing technical or customer support through the
Internet. E-business is a term often used in conjunction
Electronic Assessment Project with e-commerce, but it includes services in addition to
A system-wide quality assurance project for Minnesota the sale of goods. (Mockler et al., 2006) 3: The conduct
State Colleges and Universities online programs. (Olson of business on the Internet. It is a more generic term than
& Langer, 2005) e-commerce because it refers to not only buying and
selling, but also electronically back-end integration with
Electronic Auction other business processes such as servicing customers and
1: A centralized protocol for redistributing resources collaborating with business partners. (Sharma, 2006c) 4: A
among agents. Each agent attaches a value to each resource. business made via the Internet, not only selling or buying,
The seller asks a price for a resource, the buyer offers a but also supporting customers and connecting the supply
price, and they negotiate over the Internet to achieve a chain. (de Medeiros et al., 2006) 5: A concept capturing
desired outcome satisfying to both, else the negotiation the essence of conducting business by electronic means in
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
210 Ele c t ronic Busine ss Cha nge Ele c t ronic Busine ss X ML (EBX M L)
addition to or as a substitute for a physical location (bricks Electronic Business Performance Gain
and mortar). In its simplest form, the conduct of business The improvement in corporate resourcing, employee work
E on the Internet. It is a more generic term than e-commerce life, and customer satisfaction. (Ash & Burn, 2006)
because it refers to not only buying and selling, but also
servicing customers and collaborating with business Electronic Business Planning and Analysis
partners. (Sanzogni & Arthur-Gray, 2005) 6: Any inancial Framework (E-PAF)
or non-inancial transaction involving an electronic process A combination of QFD, VCA, and BSC that supports
using the Internet or Internet technologies (OBuyonge & strategic e-business initiatives. (Clegg & Tan, 2006)
Chen, 2006) 7: Derived from such terms as e-mail and
e-commerce, the conduct of business on the Internet or Electronic Business Policy Group (EBPG)
extranet, not only buying or selling, but also servicing A collaboration of representatives of the EU member
customers and collaborating with business partners. states and the European Commission services. (Wiggins,
(Malik, 2006) 8: Business or business activities integrated 2006)
with business processes and usually carried out onlinefor
example, over the Internet. (Mizell & Sugarman, 2005) Electronic Business Strategy
9: Refers to commerce that is conducted via the Internet. 1: An elaborate and systematic plan of action intended
This also applies to e-inance, e-marketing, e-design, and to accomplish speciic e-business goals which considers
e-management. (Reynolds, 2005) e-business multi-dimensional characteristics (Wang
& Forgionne, 2006) 2: Comprehensive set of planning
Electronic Business Change approaches that relect the stage of e-business growth
The process surrounding the effective management of within the organization. (Burn & Ash, 2006)
different stages of online business development and growth.
(Ash & Burn, 2006) Electronic Business System
An organized, structured whole that implements business
Electronic Business Environment activities that are based on electronic technologies,
The business environment characterized by rapid time- methodologies, and processes. (Trcek, 2005)
to-market pressures, heterogeneous technical access, and
quick IT strategic response requirements. (Steinbach & Electronic Business Technology
Knight, 2005) Any technology that enables an organization to conduct
business electronically, with the overall aim of improving
Electronic Business Model irm performance. (Baker & Coltman, 2005)
1: That subset of the general business model that supports
e-business. (Craig, 2005) 2: The set of strategies that enable Electronic Business Value Model
businesses to take advantage of the latest technologies to A model that conveys to management where to focus
generate proits and customer satisfaction. (Boateng & organizational resources by highlighting speciic areas
Boateng, 2006a) of opportunity. (Boonstra & de Brock, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Ca pa bilit y Ele c t ronic Com m e rc e (EC, E-Com m e rc e ) 211
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
212 Electronic Commerce Beneit Electronic Commerce Techno-Structure
workings within a business. (Peszynski, 2005) 7: The It consists of three main parts: the architecture for the low
buying and selling of information, products, and services of products, services, and information; the generation of
E via computer networks and especially the Internet. (Scupola, value; and the source of revenue. (Madlberger, 2006)
2005) 8: Selling and buying of products and services via the
Internet. (de Medeiros et al., 2006) 9: A concept capturing Electronic Commerce Disadvantage
the essence of carrying out commerce by electronic means. One of the dificulties or problems experienced by a
E-commerce refers to the buying and selling of goods and business following e-commerce adoption. (Vrazalic et
services on the Internet, especially the World Wide Web. al., 2005)
In practice, this term and a newer term, e-business, are
often used interchangeably. (Sanzogni & Arthur-Gray, Electronic Commerce Driving Force
2005) 10: Any business done electronically. The electronic A conditions and/or expectation that facilitates e-commerce
business where information technology is applied to all adoption. (Vrazali et al., 2005)
aspects of a companys operations. (Dholakia, Bang, et
al., 2005) 11: Commercial activities taking place over Electronic Commerce Security Course
electronic networks (primarily the Internet); e-commerce is Technologies, architectures, and infrastructure for
a subset of general commerce. (Craig, 2005) 12: Conducting securing electronic transactions over nonproprietary
business and inancial transactions online via electronic net works. Implementation and maintenance of
means. (T.S. Chan, 2005) 13: Conducting commercial mechanisms that secure electronic documents with
transactions on the Internet, where goods, information, confidentiality, authentication, integrity, and non-
or services are bought and then paid for. (Raisinghani & repudiation. Public key certiicate. Digital signature.
Petty, 2005) 14: Connection, electronic data exchange, (Knight & Chan, 2005)
and transaction capability via the Internet. (Braun, 2005a)
15: Consists of techniques and algorithms used to conduct Electronic Commerce Strategy
business over the Internet. Trading processes such as A subset of general business and information technology
supply-chain management, strategic purchase planning, strategy, focusing on Web-based commercial opportunities.
and market mechanisms for trading commodities online are It may dominate general strategy in some irms. (Craig,
implemented using e-commerce. (Dasgupta et al., 2006) 2005)
16: Doing business electronically, including buying and
selling information, products, and services over a digital Electronic Commerce Study
infrastructure via computer networks. (Rhodes, 2005) 17: Contains elements of information systems, business
Using the Internet and related technologies and software processes, and communications technologies. (Tatnall &
to support business activities in general. It ranges from Burgess, 2005)
simple setup such as e-mail and ile transfer to complex
systems such as supply chain management and enterprise Electronic Commerce System Simulation
resources-planning systems. (Poon, 2005) 18: The process An integrative procedure to run a business processes-
of buying and selling goods and services online. (Gordon oriented simulation program based on both internal and
& Lin, 2005) 19: Financial business transaction that occurs external business environmental factors to demonstrate the
over an electronic network such as the Internet. (Liu & actual results of implementing an e-commerce business
Tucker, 2005) 20: Means selling items over the World model by using computer-driven software toolkits. It is
Wide Web. Consequently, enterprises must incorporate an effective, eficient, and economical approach, and can
new technology information and communication means. be used to experiment and evaluate different e-commerce
(Pires et al., 2006) business models or plans. (Chen, Li, et al., 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Com m unic at ion Ele c t ronic Dat a I nt e rchange (EDI ) 213
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
214 EDI FACT Ele c t ronic Disc ourse
EDI and Internet technology can be recently observed by in which to engage the community to participate in and
the upcoming Web-based EDI solutions, where on EDI contribute to the governance process generally, and to
E partner does not have to install EDI, but uses common Web facilitate and enhance the capability of a citizen to have
browsers to communicate via EDI. (Kotzab, 2005) 10: The a say in the impact of governance on themselves and their
computer-to-computer exchange of intercompany business communities. (Sutcliffe, 2005) 4: Depending on what
documents and information through standard interfaces; type of democracy it should support, ICT can be used for
requires hardware, software, and communications electronic voting, online referendums, or to support the
technology that permit those computers to transfer the political parties in their dialogue with the voters. It can also
data electronically (such as purchase orders, invoices, be used to support political debate in a local community or
medical claims, and price lists). (Ratnasingam, 2006) in other political processes. (Jaeger, 2005) 5: A democracy
11: The electronic exchange of business documents in which e-government is involved in the development
using standardized document formats. (Harris & Chen, of direct forms of political deliberation and decision
2006) 12: The interchange of a data message structured making through electronic referendums and similar
under a certain format between business applications. devices. (Sharma, 2006b) 6: A tool-oriented conception
(Mitrakas, 2005) 13: The movement of specially of democracy referring to new democratic practices in
formatted standard business documents, such as orders, which ICTs and innovative institutional arrangements are
bills, and conirmations sent between business partners. utilized (cf. teledemocracy). (Anttiroiko, 2005a) 7: Refers
(Lertwongsatien & Wongpinunwatana, 2005) to relations of two-way and horizontal powerusing
technologies to enhance democratic practice. It is about:
Electronic Data Interchange for Administration, interconnecting citizens among themselves, participation,
Commerce, and Transport (EDIFACT) empowering those in the margins, inclusion, creating and
1: An international standard for the electronic exchange maintaining responsiveness, accountability, maintaining
of business documents widely used in Europe. (Harris & universality, and openness. (Yigitcanlar & Baum,
Chen, 2006) 2: The worldwide EDI messaging standard, 2006a) 8: The electronic process through which citizens
administered and maintained by the UN. (Whiteley, engage with government and its agents (and vice versa),
2006) including consultation and voting. E-democracy is a
two-way process that can be driven by either government
Electronic Deliberation or citizens. (Williamson, 2005) 9: The use of electronic
Online public engagement with emphasis on the deliberative communications to support and increase democratic
element. (Kozeluh, 2005) engagement, and deepen and widen citizen participation.
(Malina, 2005) 10: The use of electronic media such as
Electronic Democracy Technique the Internet to enhance democracy. (Boateng & Boateng,
One of the ways (methods) of citizen engagement in the 2006b) 11: The utilization of electronic communications
process of decision making based on ICT usage. The main technologies, such as the Internet, in enhancing democratic
techniques are: e-consultation, e-petition, and e-voting. processes within a democratic republic or a representative
(Pazyuk, 2005) democracy. It is a political development still in its
infancy, as well as the subject of much debate and activity
Electronic Democracy/Teledemocracy within government, civic-oriented groups, and societies
(E-Democracy) around the world. E-democracy also includes within its
1: The use of modern information and communications scope electronic voting. (Chochliouros & Spiliopoulou-
technologies as instruments to empower the people in a Chochliourou, 2006) 12: The use of ICT, such as the
democracy to help set agendas, establish priorities, make Internet or WWW, to foster democratic processes such as
important policies, and participate in decision making citizen participation. (Hinnant & Sawyer, 2005)
and implementation in an informed and deliberative
way. (Keskinen & Kuosa, 2005) 2: Interaction between Electronic Discourse
public, private, and third sectors by ICT usage in Text-based conversation and discussion generated by
democratic processes; the way in which citizens interact computer-mediated communication asynchronously and
with government by ICT usage. (Pazyuk, 2005) 3: A synchronously. (Han & Hill, 2006)
qualitative term to describe the use of ICT as a medium
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Doc um e nt Ele c t ronic Gove r na nc e (E-Gove rna nc e ) 215
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
216 Ele c t ronic Gove r nm e nt (E-Gove r nm e nt ) Ele c t ronic Gove r nm e nt I nt e rope ra bilit y
public policy issues (deliberative e-democracy). (Knepper sometimes called e-services); the conduct of government
& Chen, 2006) business where the activities are of those involved in
E the process of government itself (such as legislators and
Electronic Government (E-Government) the legislative process), and where some electronic or
1: The ability of government to design and use ICTs to online aspect is under consideration; voting where some
interact internally and externally with government bodies, technological aspect is under consideration. (Kozeluh,
citizens, and businesses in order to deliver integrated 2005) 11: Reengineering the current way of doing business,
electronic public services. (Malina, 2005) 2: A concept by using collaborative transactions and processes required
capturing the essence of carrying out the business of by government departments to function effectively and
government by electronic means, including the delivery of economically, thus improving the quality of life for citizens,
public services and voting (in some instances). (Sanzogni and promoting competition and innovation. To put it simply,
& Arthur-Gray, 2005) 3: A strategy for revolutionizing e-government is about empowering a countrys citizens.
the business of government through the use of information (Singh, 2006) 12: Public administration infrastructure of
technology (IT), particularly Web-based technologies, a government on the Internet; a range of services needed
which improve internal and external processes, eficiencies, by citizens and businesses can be accessed here. (Hin &
and service delivery. (Schelin, 2005) 4: Based on Subramaniam, 2005c) 13: Refers to relations of top-down
ICT, taking place in public administration, concerns powergoverning populations through use of online
electronic ways to perform administrative tasks, and the information and services. It is more about transforming
communication between the public administration and government services to provide more effective and more
the citizens. (Jaeger, 2005) 5: Any government functions eficient services, and also coming to the realization that
or processes that are carried out in digital form over the those services have to be customer-centric. (Yigitcanlar
Internet. E-government refers to the use by government & Baum, 2006a) 14: Set of activities that aim to improve
agencies of information technologies (such as wide area relationships between government institutions and citizens
networks, the Internet, and mobile computing) that have with the help of information systems and technologies.
the ability to transform relations with citizens, businesses, (Crdoba, 2006b) 15: The application of information
and other arms of government. (Sharma, 2006b) 6: The technology by public sector organizations to provide
use of technology to enhance the access to and delivery of services and information to individuals and business
government services to beneit citizens, business partners, organizations. (Toland, Purcell, et al., 2005)
and employees. (Averweg, 2006) 7: Those aspects of
government in which ICTs are or can be utilized, the basic Electronic Government Integration Stage
functions being to increase eficiency in administrative Also partially referred to as Participation stage; it is the
processes (e-administration), to guarantee easy access to formation of networked governments and the integration
information for all, to provide quality e-services, and to of public services both internally (i.e., electronically
enhance democracy with the help of new technological interconnected, multi-tier-transaction-enabled business
mediation tools (e-democracy). (Anttiroiko, 2005a) 8: The processes) and towards the customers, citizens, and
use of information technologies to improve and facilitate businesses (i.e., offering of uniied user access interfaces
citizens relationships with government through democratic directly linked to integrated services). (Werth, 2005)
procedures, cost-effective transactions, and eficient
regulations, all of which enhance these relationships. Electronic Government Internet Security
(Almazn & Gil-Garca, 2006) 9: Governments use Technological tools, standards, policies, and other decisions
of information technology to introduce eficiency and concerning the security of the information and systems
transparency in its own functioning and in its service used by government organizations or in public-sector
offerings to citizens. (De, 2005) 10: A term used to describe settings. (Gil-Garca & Luna-Reyes, 2006)
several closely related topics, it introduces the notion and
practicalities of electronic technology into the various Electronic Government Interoperability
dimensions and ramiications of government. The most The ability of a public service to collaborate (i.e., to
frequent use is related to the delivery of public services, work together) with other public services without special
where there is an online or Internet-based aspect to the effort on the part of the processing unit. This includes the
delivery of the services (online government services are collaboration of the service-executing business processes,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Gove r nm e nt Por t a l Ele c t ronic La b 217
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
218 Ele c t ronic Le a r ne r Ele c t ronic Le a r ning Environm e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Le a r ning Eva luat ion Fra m e w ork Ele c t ronic Life st yle 219
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
220 Ele c t ronic Loya lt y Ele c t ronic M a rke t (E-M a rke t )
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic M a rke t Syst e m Ele c t ronic N e t w ork of Pra c t ic e (EN OP) 221
allowing them to agree on and fulill commitments. exchange information about prices and product offerings.
(Janssen, 2005) 5: An market free from inhibiting (Ratnasingam, 2006)
constraints and affordable for all businesses in any shape,
E
form, or size, and to allow them to easily take part in e- Electronic Marketplace Portal
business with beneicial returns. It is a market in which trust, Extended enterprise portal that offers access to a companys
security, and dependability apply, and in which regulatory extranet services. (Tatnall, 2006)
and legal issues are uniied. It is a market where buyers and
sellers ubiquitously execute business transactions online. Electronic Marketplace Technology Course
These may include searching and identifying competence; System development for online trading applications
ability to identify the right product or service together supporting complex interactions among a variety of users.
with quality, price, and quantity; and virtual auctions. It Theoretical models of online information exchanges
is also based on an open, secure, and reliable collaborative supporting negotiations, including auctions, brokerages,
platform for knowledge exchange, joint product design, and exchanges. (Knight & Chan, 2005)
production planning, and logistics in stable customer-
supplier relationships. (Richards et al., 2005) Electronic Media
Interactive digital technologies used in business,
Electronic Market System publishing, entertainment, and arts. (Baralou & Stepherd,
An interorganizational information system that allows 2005)
participating buyers and sellers to exchange information
about prices and products. (Janssen, 2005) Electronic Meeting
An electronically facilitated meeting allowing participants
Electronic Marketing to share and work on documents remotely. (Elshaw,
1: Conducting marketing activities on any electronic 2006b)
device, including cell phones, PDAs, laptop computers, and
fax machines. (Singh, 2006a) 2: Using electronic means Electronic Mentor
and the Internet to market products/services. (Markellou et A term for an online guide, system, or person that provides
al., 2006) 3: Achieving marketing objectives through use information, resources, assistance, and direction for
of electronic communications technology. (Wang, 2006) learners. (Langer, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
222 Ele c t ronic N e w sgroup Ele c t ronic Proc ure m e nt (E-Proc ure m e nt )
members focus on a shared practice. (Teigland & Wasko, Electronic Portfolio (E-Folio)
2006) 2: A relatively large, emergent social collective 1: A Web-based collection of information and artifacts
E in which individuals working on similar problems self- about an individual. (Wasko, 2005) 2: Part of the
organize to help each other and share perspectives about brand name for the system developed by Avenet, LCC,
their work practice through text-based computer-mediated and the Minnesota State Colleges and Universities:
means, for example, listservs, discussion boards, and so eFolioMinnesota. (Langer, 2005) 3: A portfolio collected,
forth. (Wasko & Teigland, 2006a) 3: An emergent group saved, and stored in electronic format. (Wieseman, 2005a)
of an unlimited number of dispersed individuals working 4: An electronic (often Web-based) personal collection of
on similar tasks using a similar competence whose selected evidence from coursework or work experience and
communication channel is purely electronic. (Teigland relective commentary related to those experiences. The
& Wasko, 2005) e-portfolio is focused on personal (and often professional)
learning and development, and may include artifacts from
Electronic Newsgroup curricular and extra-curricular activities. (Garrett, 2006a)
A collection of messages posted online by individuals on 5: An electronic portfolio used by individuals to house
a speciied subject matter. (Coakes & Willis, 2005) personal information. An e-folio can be thought of as a
specialized version of an e-portfolio. (Wasko, 2005)
Electronic Participation
The engagement of an individual or a group in speciic Electronic Prescription
decision making and action by using ICT means. It aims A prescription created and handled in electronic form in
to encourage those not normally involved in a particular an integrated information system. (Suomi, 2005)
process or decision-making system to be involved.
(Yigitcanlar & Baum, 2006b) Electronic Press
A publishing service with a strong emphasis on the
Electronic Partnership publishing of digital courseware. This does not mean
A partnership relying on electronic (information) that print and traditional media, such as ilm, are not
technologies to communicate and interact amongst used. However, the courseware packs are predominantly
partners. It is mostly associated with e-commerce or e- electronic. (Ching et al., 2005)
business partnerships. (Zhao, 2005)
Electronic Procurement (E-Procurement)
Electronic Patient Record 1: The use of ICT such as the Internet and WWW by
All health-related information related to a patient in government agencies to facilitate the purchasing of goods
electronic form, assembled as a single entity. (Suomi, and services. (Hinnant & Sawyer, 2005) 2: The business-to-
2005) business (B2B) or government-to-business (G2B) purchase
and sale of supplies and services that is facilitated by the
Electronic Petition Internet and is sometimes referred to by other terms such
An e-democracy technique used for citizens appeal to as e-tendering or supplier exchange. (Demediuk, 2005) 3:
public bodies by ICT usage (e-mail, online forums, public The business-to-business purchase and sale of supplies and
bodies online interface). (Pazyuk, 2005) services over the Internet. An important part of many B2B
sites, e-procurement is also sometimes referred to by other
Electronic Policy terms, such as supplier exchange. Typically, e-procurement
The policy formulation and legal function of government. Web sites allow qualiied and registered users to look for
E-policy refers not only to the use of ICTs in government buyers or sellers of goods and services. Depending on the
settings, but also to the leading role of government in approach, buyers or sellers may specify prices or invite
promoting the information society through an adequate bids. Transactions can be initiated and completed. Ongoing
regulatory framework. (Sharma, 2006b) purchases may qualify customers for volume discounts
or special offers. E-procurement software may make it
Electronic Politics possible to automate some buying and selling. Companies
The use of ICT such as the Internet and WWW by political
actors to inform and facilitate public participation in the
political process. (Hinnant & Sawyer, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Proc ure m e nt Syst e m Ele c t ronic Sa le s Cycle 223
participating expect to be able to control parts inventories An e-readiness assessment normally takes into account
more effectively, reduce purchasing agent overhead, and education levels, infrastructure, the accessibility of ICT,
improve manufacturing cycles. E-procurement is expected and legal and regulatory issues. (Toland et al., 2005b) 4:
E
to be integrated with the trend toward computerized supply- Available technological, legal, institutional, and human
chain management. (Mockler et al., 2006) 4: The means for resources infrastructures and political will to engage in
the realization of online purchases, by using appropriate online activities. (Misuraca, 2005) 5: The capacity to
electronic communications services and infrastructures. participate in the global digital economy. (Finquelievich,
(Chochliouros & Spiliopoulou-Chochliourou, 2006) 5: 2005) 6: The state of being prepared to operate and
The online provision of goods and services by government utilize electronic technology. (Poda & Brescia, 2005)
agencies. E-procurement includes online requests for 7: E-readiness may be deined in terms of availability
proposal (RFPs), online requests for bids (RFBs), online bid of ICT infrastructure, the accessibility of information
acceptance, and online monitoring of contracts. (Schelin, and communication technologies (ICTs) to the general
2005) 6: The use of the Internet by government to procure citizen and business organization population, and the
or purchase goods and services, advertise their needs, effect of the legal and regulatory framework on ICT use.
select vendors, manage services, organize fulillment of (Averweg, 2006)
contracts, and effect payments. (Toland, 2006) 7: Using the
Internet and related technologies to facilitate procurement. Electronic Research
(Foley & Samson, 2006) Research that takes advantage of Internet-based tools and
techniques. (Janes, 2005)
Electronic Procurement System
The process of electronically managing the procurement of Electronic Reserve
goods. An e-procurement system cares about this process 1: A digitized collection of reading materials, accessible
and offers interfaces to perform typical activities, such as via a Web browser. A common ile format is .pdf, read
ordering products or browsing a list of available products through Adobe Acrobat Reader. (Buchanan, 2005) 2:
from product suppliers. (Abels & Hahn, 2006) The electronic storage and transmission of course-related
information distributed by local area networks (LANs)
Electronic Product Code (EPC) or the Internet. Also known as e-reserves; in addition to
1: Global coding scheme, administered by EPCglobal, displaying items on a screen, printing to paper and saving
identifying an items manufacturer, product category, to disk are often allowed. (Burke et al., 2005)
and unique serial number. The numerical code is stored
on the RFID chip, which is comparable to a conventional Electronic Retailer
bar code. (Loebbecke, 2006) 2: Uniquely identiies each A collective term applied to any Web site that sells a product
product and is normally a 128-bit code. It is embedded in or service, accepts payments, and fulills orders; a retailer
the RFID tag of the product. (Owens et al., 2005) who has an online storefront. (Scarpi & DallOlmo-Riley,
2006)
Electronic Questionnaire
A questionnaire in an electronic form that can be completed Electronic Retailing (E-Tailing)
via the Internet. (Paraskevi & Kollias, 2006) The application of electronic networks, especially the
Internet, as channels of distribution in order to address
Electronic Readiness (E-Readiness) inal consumers. Like traditional retailing, e-tailing is
1: The aptitude of an economy to use Internet- restricted to buying and selling physical or digital goods,
based computers and information technologies to but no services. (Madlberger, 2006)
migrate traditional businesses into the new economy.
(Lertwongsatien & Wongpinunwatana, 2005) 2: The Electronic Sales Cycle
preparedness of an organizations technology, processes, The time that elapses between the customer initiating the
and people to facilitate or inhibit e-business development. buying process online, and the point at which a decision
(Ash & Burn, 2006) 3: A measurement of how ready a is made on which product to buy. (Wang & Forgionne,
society is to beneit from recent developments in ICT. 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
224 Ele c t ronic Sc ie nc e Ele c t ronic St rat e gy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ele c t ronic Supply Cha in Ele c t ronic Whit e Boa rd 225
Electronic Supply Chain voting, mobile phones, plus a wide variety of face-to-face
The physical dimension of e-business with the role of meetings. The focus of the process is on problem issues
achieving a base level of operational performance in the or on involved planning or envisioning processes. ETM
E
physical sphere. (Zhao, 2005) can be conducted at local, regional, or national levels.
(Keskinen & Kuosa, 2005)
Electronic Survey
A survey based on answers of an e-questionnaire. Electronic Trust
(Paraskevi & Kollias, 2006) A set of speciic beliefs dealing primarily with integrity
(trustee honesty and promise keeping), benevolence
Electronic Tailer (trustee caring and motivation to act in the trusters interest),
An online retail store. (Wang, Ding, et al., 2006) competence (ability of trustee to do what truster needs),
and predictability (trustees behavioral consistency of a
Electronic Technology particular e-vendor). (Yeo & Chiam, 2006)
1: Encompasses information technology, but also includes
any equipment or interconnected system or subsystem Electronic Tutelage
of equipment that is used in the creation, conversion, or Learning of new complex concepts (sometimes called
duplication of data or information. Electronic technology scientiic concepts), not with the intervention of a physical
includes telecommunications products such as telephones, tutor, but via electronically delivered materials; the basic
and ofice equipment such as fax machines. (Burgstahler, theory behind Web-based education. (Marold, 2005)
2005b) 2: Technology including hardware and software,
and their development using Internet, multimedia, mobile, Electronic Tutor
wireless, and security technologies, and so forth. (Youn Off-campus, online academic tutor. (Whateley et al.,
& McLeod, 2006) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
226 Ele c t ronic Word-of-M out h (E-WOM ) Em e rge nc e
Emergence
ELMS: See Enterprise Learning Management System. 1: In the context of natural computing, an emergent
phenomenon can be understood as the one whose global
Elongated Diffusion Pattern properties are neither possessed by, nor directly derivable
A pattern of IT diffusion in which, due to a reduction in from, any of its component parts. For instance, a single
the reputation effect, there is a hiatus prior to the arrival ant is a very simple insect with limited capabilities, but an
of a late minority of adopters. (Grifin, 2005) ant colony is capable of performing complex tasks, such
as nest building and organization. (de Castro, 2005) 2:
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Em e rge nc e I ndex Em ot iona l I nt e llige nc e 227
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
228 Em piric a l Eva luat ion Enc oding
adaptability, emotional self-control, initiative, achievement combining multiple sections of a course into one large
orientation, trustworthiness, and optimism. Social section, and heavy reliance on computer-based learning
E competencies include social awareness, empathy, service resources and an instructional staff of varying levels of
orientation, and organizational awareness. Relationship skills and expertise. (Twigg, 2005)
management competencies include inspirational
leadership, development of others, change catalyst, conlict EMS: See Enhanced Messaging Service.
management, inluence, teamwork, and collaboration.
(Wong-MingJi, 2005) Emulation
1: Actual software is written to execute something,
Empirical Evaluation instead of simulating it. (Janssen, 2005) 2: The realization,
Evaluation methodology which employs users to interact sometimes also called emulation, of a system or organism
with the system. (Athanasis & Andreas, 2005) corresponds to a literal, material model that implements
functions; it is a substantive functiona l device. Roughly
Empirical Interface Evaluation speaking, a realization is judged primarily by how well it
The empirical evaluation of an interface implies that can function as an implementation of a design speciication.
users are involved. Known methods, among others, are A system or function is used to emulate or realize another,
observational evaluation, survey evaluation, and when one performs in exactly the same way as another. A
thinking aloud protocol. (Karoulis et al., 2006) typical example in computer science is the emulation of
one computer by (a program running on) another computer.
Empirical Method (de Castro, 2005)
Method in which a system is evaluated based on observed
performance in actual use. (Danielson, 2006b) Enabler
A factor that makes something possible, for example,
Employability alignment is an enabler for organizations to cut production
The extent to which employees have skills that the market costs by half. (Lubbe, 2005)
and employers regard as attractive. (Scholarios et al.,
2005) Enabling Technology
A sphere of concern; consists of those technologies that
Employee Abuse are under development at a certain moment and that have
Employees, especially those employees who believe that potential to become part of the global infrastructure in
they are treated unjustly, may provide the data necessary the future. Currently, new 3G terminals and 4G network
for cyber-identity theft. With e-mail and databases full of technologies are typical examples. (Veijalainen & Weske,
consumer information, an employee or other insider can 2005)
pass spreadsheets along to thieves. Employees may divulge
personal information unintentionally or intentionally. Also Enactment
related to cyber-identity theft and the workplace is the Knowledge only takes on meaning as it interacts with the
possibility of phony job listings online in order to obtain learners environment. (Frank et al., 2005)
consumer information. (Close et al., 2006)
Encapsulation
Employee Lifecycle Management (ELM) 1: Data and actions are packaged together in a class, with
The integration of all aspects of information and knowledge the details of the implementation hidden from other classes.
in relation to an employee, from the hiring to the retirement (Lucas, 2005) 2: The ability to insulate data in a class
from the company. ELM enables enterprises to effectively so that both data security and integrity is improved. (D.
manage their portfolio of competencies. (Mller, 2005) Brandon, Jr., 2005a) 3: The addition of control information
by a protocol entity to data obtained from a protocol user.
Emporium Model of Course Redesign (Ngoh & Shankar, 2005)
This model eliminates all regular class meetings, replacing
classes with a learning resource center featuring online Encoding
materials and on-demand personalized assistance. 1: The process by which the content and meaning that is
Additional features of the emporium model often include to be communicated is transformed into a physical form
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Enc r ypt ing Ende m ic 229
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
230 Ent e rprise Re sourc e Pla nning (ERP) Enha nc e d Obse rve d-T im e -Diffe re nc e M e t hod (E-OT D)
Enterprise Resource Planning (ERP) and to implement various engineering activities. (Ma,
The set of processes of voluntary (conscious) control of 2005a)
E attention. These processes are also referred to as top-down
or goal-driven. An example of an endogenous attentional Enhanced Data Mining with Incomplete Data
mechanism is the attention you are paying to this page Data mining that utilizes incomplete data through fuzzy
as you are reading. Endogenous attention is voluntary; it transformation. (H. Wang & S. Wang, 2005)
requires explicit effort, and it is normally meant to last.
(Thomas & Roda, 2006a) Enhanced Data Rates for GSM Evolution
(EDGE)
Energetic Engagement 1: An enhanced version of GSM networks for higher
Active participation that refers to members ability to data rates. The main difference is the adoption of 8
suggest changes on the policies, the structure, and the QPSK modulation in the air interface which increases
environment/system. (N.C. Rowe, 2006d) the available bit rates. (Louvros et al., 2005b) 2: Gives
GSM and TDMA the capability to handle 3G mobile
Energy Management System phone services with speeds up to 384 kbps. Since it uses
The system used to eficiently manage power network the TDMA infrastructure, a smooth transition from
operation, coordinate optimized power distribution, and TDMA-based systems such as GSM to EDGE is expected.
manage costs of electricity production and distribution. (Akhtar, 2005) 3: A faster version of the GSM wireless
(Jeong et al., 2006) service, EDGE is designed to deliver data at rates up to
384 Kbps, and enable the delivery of multimedia and other
Engagement broadband applications to mobile phone and computer
Becoming involved with a topic at more than a simple users. (Olla, 2005a)
and supericial level; a time when individuals come to
know and understand the detailed content of what they Enhanced Instructional Presentation (EIP)
are studying. (Pritchard, 2005b) A traditional linear presentation (e.g., text, video)
supplemented with learner control features and hyperlinked
Engagement-Supporting Technology material, providing answers to authentic learner questions
One of a number of technologies that enable people to learn and additional support information (e.g., enrichment,
and communicate with fellow citizens about a speciic remedial). (Pelton & Pelton, 2005)
policy-related event or challenge. (OLooney, 2006)
Enhanced Instructional Presentation Model
Engineering Design (EIP Model)
Encompasses a variety of activities aiming at generating A transformation model that guides the transformation of
and reining detailed product descriptions prior to their existing (or newly captured) linear content into hypermedia
physical realization. (Ma, 2006) presentations (online or CD-ROM based). (Pelton &
Pelton, 2005)
Engineering Design Knowledge
All the standards, laws, and best practices that affect Enhanced Messaging Service (EMS)
design decision are called engineering design knowledge. An application-level extension to SMS for cellular phones
(Ma, 2006) available on GSM, TDMA, and CDMA networks. An EMS-
enabled mobile phone can send and receive messages that
Engineering Design Knowledge Management have special text formatting (i.e., bold or italic), animation,
The management of engineering design knowledge pictures, icons, sound effects, and special ringtones.
generally entails its modeling (representation), maintenance, (Lalopoulos et al., 2005a)
integration, and use. (Ma, 2006)
Enhanced Observed-Time-Difference Method
Engineering Information System (E-OTD)
An information system used to manage the information in Similar to OTDOA, without the need for base stations to be
data and knowledge-intensive engineering applications, synchronized (additional elements are used that measure
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Enha nc e d Te levision (Enha nc e d T V ) Ent e rprise Archit e c t ure 231
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
232 Ent e rprise Colla borat ion Ent e rprise M ine r
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ent e rprise M ode l Ent e rprise Re sourc e Pla nning (ERP) 233
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
234 Ent e rprise Re sourc e Pla nning Com m unit y Ent e rprise Re sourc e Pla nning I I (ERP I I )
as inance, operations, human resources, and sales. This Enterprise Resource Planning Modiication
system extends the pool of information for business A tailoring option, which results in changes being made
E intelligence. (Raisinghani & Nugent, 2005) to the existing ERP (standard) code and custom objects
being created. (Ng, 2005)
Enterprise Resource Planning Community
A model defining the collective relationships and Enterprise Resource Planning Patch-Option
interactions between the three de facto actors (the ERP A tailoring option, where vendors patches are used to
vendor, the ERP consultant, the implementing organization) service a maintenance request. (Ng, 2005)
within the ERP market. (Sammon & Adam, 2005)
Enterprise Resource Planning Stabilization
Enterprise Resource Planning Coniguration Stage
A tailoring option that involves setting or coniguring a The irst weeks after the beginning of an ERP system
generic/industry-speciic ERP system using the switches/ operation in the company. (de Souza & Zwicker, 2005)
tables provided by the vendor in order to personalize the
ERP system to support an organizations business practices Enterprise Resource Planning System
and requirements. (Ng, 2005) 1: A comprehensive information system that collects,
processes, and provides information about all parts of an
Enterprise Resource Planning Customization enterprise, automating business processes and business
Customization simply means that changes, modiications, rules within and across business functions, partly or
or adaptations are needed in order to meet some user completely. (Kurbel, 2005) 2: An integrated information
requirements. It can be carried out via coniguration system purchased as a commercial software package with
tables, adding extensions or making modiications to the the aim of supporting most operations of a company. (de
standard code (but cannot be done by applying any patch Souza & Zwicker, 2005)
provided by the vendor). (Ng, 2005)
Enterprise Resource Planning Total Cost of
Enterprise Resource Planning Decision and Ownership
Selection Stage ERP software lifecycle cost covering the initial
Stage at which the company decides to implement an ERP implementation and installation, continuous maintenance,
system and chooses the supplier. (de Souza & Zwicker, and upgrades to the system until the software is retired from
2005) the production system. It includes all the software, hardware
and equipment, annual maintenance fees, outsourcing,
Enterprise Resource Planning Extension training, documentation, personnel, management, and
A tailoring option that involves adding custom or third- service costs. (Ng, 2005)
party codes to user-exits, add-ons, reports, or user
interfaces, without changing the vendor/standard code. Enterprise Resource Planning II (ERP II)
(Ng, 2005) 1: A term that has been coined to denote the applications
aimed at satisfying organizations that have already
Enterprise Resource Planning Implementation implemented ERP. This appears to include the realization
Stage of eficiency gains originally planned for ERP, the
Stage of an ERP project at which the ERP systems modules implementation of ERP solutions to more vertical market
are put into operation. (de Souza & Zwicker, 2005) segments, and the further integration of key business
processes (for example, to include PLM). (Carton &
Enterprise Resource Planning Lifecycle Adam, 2005) 2: ERP II is understood to mean the re-
1: Consists of the several stages that an ERP system implementation and expansion of ERP. It is an extended,
goes through during its whole life within the hosting open, vertical, and global approach to systems integration
organization. (Esteves & Pastor, 2005) 2: The various and can be understood as an application and deployment
stages through which a project of introducing an ERP strategy for collaborative, operational, and inancial
system in a company passes through. (de Souza & Zwicker, processes within the enterprise, and between the enterprise
2005) and key external partners and markets in an effort to
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ent e rprise Re sourc e Pla nning U t ilizat ion St a ge Ent re pre ne uria l I de nt it y 235
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
236 Ent re pre ne uria l M a na ge m e nt St yle EPCgloba l
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ephe m e ris Dat a Pa ra m e t e r ERP Com m unit y 237
Episodic Knowledge ER
Declarative memory consists of two types of knowledge See Entity-Relationship.
topic or semantic, and episodic. Episodic knowledge
consists of ones experience with knowledge. These are ER Diagram: See Entity-Relationship Diagram.
learned through experience once the topic knowledge is
obtained from textbooks, formal training, and education. Ergonomy
(Raisinghani, 2005) The science of the interface between people and products. It
is based on human factor considerations such as cognition,
EPM: See Enterprise Performance Management. reasoning, memory, and language. In the context of a
software product, it guides the design and constitutes
EPON: See Ethernet PON. a support for testing and evaluating user interfaces to
facilitate the ease of use of the software system. (Daassi
Equal Employment Opportunity Classiication et al., 2006)
A job classification system set forth by the Equal
Employment Opportunity Commission (EEOC) for Eriksson-Penker Process Diagram
demographic reporting requirements. (Troutt & Long, UML extension created to support business modeling
2005) which adapts the basic UML activity diagram to represent
business processes. (Gur u, 2005)
Equal Error Rate
The error rate when the proportions of FAR and FRR are ERP: See Enterprise Resource Planning.
equal. The accuracy of the biometric system is inversely
proportional to the value of EER. (Chakravarty et al., ERP Community: See Enterprise Resource Planning
2005b) Community.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
238 ERP Coniguration Ethernet
ERP Coniguration: See Enterprise Resource Planning algorithm is used to determine the minimal set of ields
Coniguration. to impute so that the inal (corrected) record will not fail
E edits. (Conversano & Siciliano, 2005)
ERP Customization: See Enterprise Resource
Planning Customization. Erudite Agent
Acts as a broker locating compatible candidates according
ERP Decision and Selection Stage: See Enterprise to speciic similarities found in their proiles. Erudite has
Resource Planning Decision and Selection Stage. two roles: one is upon the requesting of interface agents, it
queries its knowledge base, searching for other candidates
ERP Extension: See Enterprise Resource Planning that seem to have the same interests; the other is to keep
Extension. its knowledge base updated with the candidates speciic
information provided by the resident interface agents. In
ERP Implementation Stage: See Enterprise Resource doing so, it implements the processing part of the SHEIK
Planning Implementation Stage. systems architecture. (Nabuco et al., 2006)
ERP Lifecycle: See Enterprise Resource Planning ES/KBS: See Expert System/Knowledge-Based
Lifecycle. System.
ERP Modiication: See Enterprise Resource Planning ESD: See Electronic Service Delivery.
Modiication.
ESS: See Extended Service Set.
ERP Patch-Option: See Enterprise Resource Planning
Patch-Option. Essentialism
The view that some properties are necessary properties
ERP Stabilization Stage: See Enterprise Resource of the object to which they belong. In the context of IT,
Planning Stabilization Stage. essentialism implies a belief that an individuals cultural
identity (nationality, ethnicity, race, class, etc.) determines
ERP System: See Enterprise Resource Planning and predicts that individuals values, communicative
System. preferences, and behaviors. (Macfadyen, 2006a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Et he r ne t Fra m e Et hnogra phy 239
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
240 Et hnom e t hodology Eva luat ion
ETL: See Extraction, Transformation, Load System. European Computer Manufacturers Association
(ECMA)
ETM: See Electronic Town Meeting. Standardizes information and communication systems.
(Barone, 2005)
ETSI: See European Telecommunications Standards
Institute. European Telecommunications Standards Insti-
tute (ETSI)
EUC: See End-User Computing. An organization promulgating engineering standards
for telecommunications equipment. (Chochliouros et al.,
EUC Net Beneit 2005b)
A measure that captures the balance of positive and negative
impacts that result from EUC activities in an organization. Eustress
(Shayo & Guthrie, 2005) A change in biophysical or psychological variables that is
considered good. (Molinari et al., 2005b)
EUC Satisfaction
An affective measure of an end users opinion about the net EVA: See Economic Value Added.
beneits derived from EUC activities in an organization.
(Shayo & Guthrie, 2005) Evaluation
1: A process of inding the value of information services
EUC Success or products according to the needs of their consumers
The degree to which the organizational EUC strategy or users. (Crdoba, 2006b) 2: A quality program has
contributes to individual, group, and organizational continual and ongoing evaluation. This includes a needs
computing success in an environment that includes analysis (diagnostic); emergent data collected throughout
applications developed by the information system the program/course/training allowing changes to be
implemented even as the course/program/training is being
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Eva luat ion Age nt Eve nt M a na ge m e nt Soft w a re 241
delivered (formative); and end-of-the-course/program/ known as primitive event). If the event involves correlation
training surveys and interviews with learners, course or aggregation of happenings, then it is called a complex
facilitators, and programs to determine course/program/ or composite event. (Cilia, 2005) 4: Part of a trigger that
E
training redesign (summative). (MacDonald et al., 2005) 3: refers to the occurrence of a certain situation. When the
The gathering and observing of a broad range of evidence event occurs, the rule is triggered (i.e., is scheduled so
in order to gauge the impact and effectiveness of an object, that its condition is evaluated). In most systems, the event
program, or process. (Naidu, 2005a) 4: The assessment of can mention only basic database actions (e.g., insertions,
the effectiveness of service delivery and the identiication deletions, updates). (Badia, 2005b) 5: Something that
of obstacles or barriers to service delivery. Some means happens at a point in time. (Ale & Espil, 2005) 6: A
of evaluation include understanding the perceptions phenomena that changes the applications state. (Trossen &
of improvement in the organization in the manner in Molenaar, 2005) 7: In contrast to request/reply, producers
which it formalizes knowledge processes, knowledge send unsolicited notiications about events they observe.
structures, and underlying systems. These in turn will Instead of delivering notiications directed to consumers,
affect the operations, products, or services delivered. they are irst sent to an intermediary service. This service
Another means of evaluation of the effectiveness of a delivers the notiications according to the subscriptions
KM strategy is through establishing increased awareness consumers have issued. (Fiege, 2005)
and participation in that strategy. (Zyngier, 2006) 5: The
systematic determination of the merit or worth of an object. Event Algebra
(Nash et al., 2005a) Composite events are expressed using an event algebra.
Such algebras require an order function between events
Evaluation Agent to apply event operators (e.g., sequence) or to consume
Comparison-shopping agent specializing in collecting events. (Cilia, 2005)
product and service rating information. (Wan, 2006)
Event Handler
Evaluation Management A procedure (subroutine) that executes in response to
Used to guide learners e-learning and build their an event. The event may represent a speciic user action
knowledge, and to verify if the information is successfully (e.g., a mouse click) or may be a manifestation of a
turned into knowledge. In order for e-learning to be proven system process (e.g., page has inished loading). Details
effective, online learners need to verify that they have surrounding the event are provided as arguments of the
succeeded in gaining new knowledge or skills. During procedure. (Westin, 2005)
this phase, the relationship between information and
knowledge becomes visible with respect to e-learning. Event Instance
(Xu & Wang, 2006) An event is an instance of an event type associated to a
point in time that belongs to the validity interval of its
Evaluation Strategy type. (Vargas-Solar, 2005)
A process designed to guide the collection and reporting
of evaluation results. (Waddington et al., 2005) Event Logger
A text ile used to record the timestamps, attributes, and
Evaluative Judgment types of navigation events invoked by the teacher during
An assessment based on characteristics of an information the recording stage. The log is treated as synchronization
object, independent of assessments based on information information for dynamic presentation. (Liu & Chen,
prior to encountering the object (predictive judgments). 2005)
(Danielson, 2006c)
Event Management Model
Event Deines policies for detecting, producing, and notifying
1: An act performed by a whole or to the whole that instances of event types. (Vargas-Solar, 2005)
is perceived by an observer directly or through its
consequences on other wholes. (Gelman et al., 2005) 2: An Event Management Software
occurrence of an event type at a given timestamp. (Harms, Integrated software (desktop, network, or Web based) to
2005) 3: An occurrence of a happening of interest (also assist a variety of functions for event managers. This may
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
242 Eve nt Se que nc e Evolut iona r y Ga m e T he or y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Evolut iona r y I nnovat ion Ex ist e nt K now le dge 243
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
244 Exoge nous At t e nt iona l Proc e ss Ex pe rie nc e -Ba se d Le ar ning
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex pe rie nc e d Cre dibilit y Ex pe r t Syst e m 245
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
246 Ex pe r t Syst e m /K now le dge -Ba se d Syst e m (ES/K BS) Ex plicit Te a m Proc e ss
Expert System/Knowledge-Based System make them more public and observable for other colleagues
(ES/KBS) and pre-service teachers. (Keppell et al., 2005)
E A computer-based system composed of a user-dialogue
system, an inference engine, one or several intelligent Explicit Edit
modules, a knowledge base, and a work memory, which An edit explicitly written by a subject matter specialist.
emulates the problem-solving capabilities of a human (Conversano & Siciliano, 2005)
expert in a speciic domain of knowledge. (Forgionne et
al., 2005) Explicit Goal
Similar to meta-management, each member of the
Expert-Based Evaluation organization is charged with an explicit task to complete
Evaluation methodology which employs experts, mostly as it relates to the overall function of the organization.
from different cognitive domain, to assess certain system Often times, after this single goal is completed, the link
aspects. (Athanasis & Andreas, 2005) between the organization and the entity is dissolved until
a further need for it is realized. At this point, the link is
Expert-Based Interface Evaluation reestablished. (J. Lee, 2005)
Evaluation methodology that employs experts from
different cognitive domains to assess an interface. Explicit Knowledge/Information
(Karoulis et al., 2006) 1: Knowledge that is external in the form of documents,
graphs, tables, and so forth. (Woods et al., 2006) 2: A
Expertise type of knowledge that can be described, formalized,
1: A sources perceived ability to provide information coded, and stored in documents, magazines, journals, and
that is accurate and valid (based on attributes such as so forth. (Aurum & Demirbilek, 2006) 3: Also known
perceived knowledge and skill); with trustworthiness, it as information, this is knowledge that is adequately
is one of two primary attributes of credibility. (Danielson, and properly represented by facts, igures, symbols,
2006c) 2: Highly tacit, domain-speciic knowledge gained and data. (Ray, 2006) 4: Can be expressed in words
through experience, formal education, and collaboration. and numbers, and shared in the form of data, scientiic
(Kulkarni & Freeze, 2006) formulae, speciications, manuals, and the like. This
kind of knowledge can be readily transmitted between
Explanation individuals formally and systematically. (Zeleznikow,
A sequence of statements of the reasons for the behavior 2006) 5: Context-free knowledge that can be codiied using
of the model of a system. (Kontos & Malagardi, 2006) formal and systematic language. Explicit knowledge can
be expressed using words (language) or as mathematical
Explanation-Oriented Data Mining formulae, procedures, or principles. Explicit knowledge
A general framework includes data pre-processing, is easy to codify and communicate. (Sivakumar, 2006)
data transformation, pattern discovery and evaluation, 6: Formal knowledgethat is, know-what represents
pattern explanation and explanation evaluation, and knowledge that is well established and documented.
pattern presentation. This framework is consistent with (Wickramasinghe, 2006) 7: Information that has speciic
the general model of scientiic research processes. (Yao meaning and that can be easily and clearly understood.
& Zhao, 2005) (Neville & Powell, 2005) 8: Knowledge codiied into a
formal and systematized language. It may be transmitted,
Explication preserved, retrieved, and combined. (Falivene & Kaufman,
The act of making clear or removing obscurity from 2006) 9: Knowledge that can be codiied in words, numbers,
the meaning of a word, symbol, expression, and such. or rules and can take the shape of documents, or perhaps
(Marjomaa, 2005) result in the production of some type of equipment.
(Qayyum, 2005)
Explicit
This refers to the act of articulating our reasoning and the Explicit Team Process
rationale for our teaching and learning theories. In effect Openly articulated, overt communication and coordination
we are attempting to articulate our tacit theories in order to behaviors. Example: Member A directly requests task-
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex ploit Ex t e nde d ERP 247
relevant information from Member B. (Cuevas et al., atoma and roles and use it in its own context. (Lepouras
2005) et al., 2006)
E
Exploit Export Restriction
1: A program that uses a vulnerability to attack the systems A restriction on the type, quantity, or destination of goods
security mechanisms. Exploits usually compromise that can be exported out of a country. (D. Brandon, Jr.,
secrecy, integrity, or availability and often lead to elevation 2005b)
of privilege. (Weippl, 2006) 2: Taking advantage of a
software vulnerability to carry out an attack. To minimize Export-Oriented Software
the risk of exploits, security updates or software patches A unit is considered export oriented if at least 70% of its
should be applied frequently. (Kayacik et al., 2005) 3: revenue comes from export. (Raisinghani & Rahman,
Weakness in a system through which hackers can gain 2005)
entry into the system. (Friedman, 2005)
Exposed Node
Exploratory Analysis The problem where a transmitting or exposed node is
Part of the Data Analysis French School, developed between within range of a sender, but is out of range of the intended
1960 and 1980. The process of analysis takes as a target destination. (Erbas, 2005)
to discover new relations between the sets of the analyzed
information. (Nigro & Gonzlez Csaro, 2005c) EXPRESS/STEP
To share and exchange product data, the Standard for the
Exploratory Data Analysis (EDA) Exchange of Product Model Data (STEP) is being developed
Comprises a set of techniques used to identify systematic by the International Organization for Standardization
relations between variables when there are no (or not (ISO). EXPRESS is the description method of STEP and
complete) a priori expectations as to the nature of those can be used to model product design, manufacturing, and
relations. In a typical exploratory data analysis process, production data. (Ma, 2005a)
many variables are taken into account and compared,
using a variety of techniques in the search for systematic Expression
patterns. (Katsaros & Manolopoulos, 2005b) The utterance through any language system of prelinguistic
emotion or understanding toward the creation of consensual
Exploratory Factor Analysis meaning between people. (Kettley, 2006b)
A process used to identify statistically signiicant constructs
underlying a set of data. (Martz & Reddy, 2005) Expressiveness
The ability of employees to use oral or facial expression
Exploratory Tree and body language to clearly express what they know.
An oriented tree graph formed by internal nodes and (Chen, Duan, et al., 2006)
terminal nodes, the former allowing the description of the
conditional interaction paths between the response variable Extended Enterprise
and the predictors, whereas the latter are labeled by a The seamless Internet-based integration of a group or
response class/value. (Siciliano & Conversano, 2005) network of trading partners along their supply chains.
(Sammon & Adam, 2005)
Exponentially Decaying
A quantity that decreases such that the momentary rate of Extended ERP
decrease is directly proportional to the quantity. (Kushnir, Extends the foundation ERP systems functionalities such
2006) as inances, distribution, manufacturing, human resources,
and payroll to customer relationship management, supply
Export/Import chain management, sales-force automation, and Internet-
Information systems may deine atoma and roles and then enabled integrated e-commerce and e-business. (Rashid,
export them to be used by other information systems. 2005)
An information system may import any of the exported
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
248 Ex t e nde d I t e m Ex t e nsible Busine ss Re por t ing La ngua ge (X BRL)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex t e nsible M a rk up La ngua ge (X M L) 249
data and documents interchange. (De Antonellis et al., characterized by a ixed format but lets the user design his
2005) 9: The novel language, standardized by the World own customized markup languagesa speciic Document
Wide Web Consortium, for representing, handling, and Type Description (DTD)for limitless different types of
E
exchanging information on the Web. (De Meo et al., 2005a) documents. XML is then a content-oriented markup tool.
10: A markup language for representing information as (Zarri, 2005b) 8: A meta-language deining the syntax for
structured documents. Developed from an earlier language presenting and exchanging data in Web environments. It
called SGML (Standard Generalized Markup Language) overcomes the limit of ixed tags in HTML and allows users
for the purposes of information management on the to deine their document structures. W3C has designated
Internet. (Lyytikinen et al., 2005) XML as the standard for Web data. (Wang, Cheng, Cheng,
et al., 2006) 9: An open standard, developed by the W3C,
Extensible Markup Language (XML) that involves formal syntax for adding structure and/or
1: A standard with very lexible and simple syntax (a small content information in a Web-based document. This subset
set of rules in human-readable plaintext) used to describe of SGML deines data elements in a neutral way for easy
and share commonly structured platform-independent interchange of structured data, such as markup tags,
information. Main components of its structure are elements deinitions, transmission validation, and interpretations
(markups) and attributes of elements that are nested to create across applications and organizations. (Parikh & Parolia,
a hierarchical tree that easily can be validated. XML is 2005) 10: A language for creating markup languages. There
extensible, because, unlike HTML, anyone can deine new are two kinds of XML documents: well-formed and valid.
tags and attribute names to parameterize or semantically The irst respects the XML standard for the inclusion and
qualify content. It has been a formal recommendation the names of the tags. The second must be well formed
from W3C since 1998, playing an increasingly important and uses a grammar to deine the structure and the types
role in the exchange of a wide variety of data on the Web. of data described by the document. (Nicolle et al., 2005)
(Pereira & Freire, 2005) 2: A mechanism for encoding 11: A meta-language directly derived from SGML but
data into computer-understandable forms, useful for designed for Web documents. It allows the structuring of
applications such as business-to-business electronic information and transmission between applications and
document interchange via the World Wide Web. (Lang, between organizations. (de Campos et al., 2005) 12: A
2006) 3: A speciication developed by the World Wide sublanguage of SGML that provides a way to structure
Web Consortium (W3C). XML is a pared-down version and format data, especially in textual form. The data
of the Standard Generalized Markup Language (SGML), is represented as XML documents; an XML document
designed especially for Web documents. It allows designers may have an optional schema associated with it. XML is
to create their own customized tags, enabling the deinition, considered a semistructured data model because a schema
transmission, validation, and interpretation of data between is not always necessary, and even if a schema is present,
applications and between organizations. (Raisinghani & it could be quite lexible. (Mani & Badia, 2005) 13: An
Sahoo, 2006) 4: A subset of SGML, designed to describe easy-to-use dialect of SGML, this is a lexible technique
data. It incorporates features of extensibility, structure, for storage and interchange of data. One important aspect
and validation, and is currently playing an increasingly of XML is the combination of data and metadata in a
important role in the exchange of a wide variety of data on single document. (Hnisch, 2005) 14: A markup language
the Web and elsewhere. (Dotsika, 2006) 5: A text-based that is quite different from HTML in that XML gives
markup language that describes data in a document. document authors the ability to create their own markup.
Since XML is a platform-independent language, it is XML is lexible in creating data formats and sharing both
used as the standard format for transferring data over a the format and the data with other applications or trading
network using Web services. (Sethi & Sethi, 2006a) 6: partners, compared with HTML. (Suh & Kim, 2005) 15:
An application-independent meta-language for deining A markup language for structured documents. Structure
markup languages. It serves as the basis for syntactic is represented with textual markup that intermixes with
interoperability among information systems. (Antoniou document content. XML is a recommendation from the
et al., 2005) 7: Created to overcome some dificulties World Wide Web Consortium. (Martnez-Gonzlez, 2005)
proper to HTML, whichdeveloped as a means for 16: A W3C standard similar to HTML, but it allows creators
instructing Web browsers how to display a given Web to create their own tags. (Goh & Kinshuk, 2005) 17: A
pageis a presentation-oriented markup tool. XML is speciication for computer-readable documents. XML is
called extensible because, contrary to HTML, it is not actually a meta-language, a mechanism for representing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
250 Ex t e nsible M a rk up La ngua ge (X M L) Cont e nt Ana lysis M ining Ex t e nsion
other languages in a standardized way; therefore, XML Extensible Markup Language (XML) Schema
provides a syntax to encode data. (Vardaki, 2005) 1: A database-inspired method for specifying constraints
E on XML documents using an XML-based language.
Extensible Markup Language (XML) Content Schemas address deiciencies in DTDs, such as the inability
Analysis Mining to put constraints on the kinds of data that can occur in
Concerned with analyzing texts within XML documents. a particular ield (e.g., all numeric). Since schemas are
(Nayak, 2005b) founded on XML, they are hierarchical, so it is easier
to create an unambiguous speciication, and possible
Extensible Markup Language Database to determine the scope over which a comment is meant
(XMLDB) to apply. (Passi et al., 2005) 2: A more complete way of
A database that accepts XML documents for storage, and specifying the semantics of a set of XML markup elements.
allows for retrieving them in their original XML format. XML schema supplies a complete grammar for specifying
XMLDB can physically store XML data in their original the structure of the elements, allowing one, for example,
format or can transform them internally into relational to deine the cardinality of the offspring elements, default
tables, which are then reverted to their XML format upon values, and so forth. (Zarri, 2005b) 3: An alternative to
retrieval. (Gaffar & Seffah, 2005) DTDs, it is a schema language that assesses the validity
of a well-formed element and attribute information items
Extensible Markup Language (XML) Document within an XML document. There are two major schema
A document consisting of an (optional) XML declaration, models: W3C XML Schema and Microsoft Schema.
followed by either an (optional) DTD or XML schema (Chen, 2005b)
and then followed by document elements. (Chen, 2005b;
Pallis et al., 2005) Extensible Markup Language (XML) Structural
Change
Extensible Markup Language (XML) Interstruc- Not all changes to XML may cause structure changes the
ture Mining language when it is represented as a tree structure. In IT
Concerned with the structure between XML documents. use, only insertion and deletion are called XML structural
Knowledge is discovered about the relationship among changes. (Zhao & Bhowmick, 2005)
subjects, organizations, and nodes on the Web. (Nayak,
2005b) Extensible Markup Language (XML) Structural
Clariication Mining
Extensible Markup Language Metadata Inter- Concerned with distinguishing the similar structured
change (XMI) documents based on content. (Nayak, 2005b)
A widely used interchange format for sharing objects using
XML. (Paiano, 2005) Extensible RDBMS
Relational DBMS implementing the concept of universal
Extensible Markup Language (XML) Mining server. It allows the extension of the DBMS type system by
KnowledgediscoveryfromXMLdocuments(heterogeneous enabling the deinition of user-deined data types (UDTs),
and structural irregular). For example, clustering data- and the associated user-deined manipulation functions
mining techniques can group a collection of XML (UDFs). (Chang et al., 2005)
documents together according to the similarity of their
structures. Classiication data-mining techniques can Extensible Representation of Requirements
classify a number of heterogeneous XML documents into A way to represent easy requirements that were not
a set of predeined classiications of schemas to improve necessarily identified nor truly considered in the
XML document handling and achieve eficient searches. requirements analysis. (Furtado, 2005)
(Nayak, 2005b)
Extension
Extensible Markup Language (XML) Rewrite 1: A Boolean function f that satisies f(x)=1 for xT
A document that is not originally written in XML can be and f(x)=0 for xF for a given pdBf (T, F). (Boros et
rewritten in XML format by adding the necessary syntax al., 2005) 2: An extramural department or division that
and semantics to it. (Gaffar & Seffah, 2005) operates within a university and offer mainly continuing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ex t e nsion, De e p Ex t ra c t ion 251
education and professional upgrade courses. Extensions are External Environmental Structure
typical mainly to American universities. (Guri-Rosenblit, The set of rules and resources offered by outside interests,
2005a) including academic standards bodies, technology
E
developers and vendors, industrial organizations,
Extension, Deep employers, and end users. (LeRouge & Webb, 2005)
Of a concept C, denotes the shallow extension of C union
the deep extension of Cs sons. (Sacco, 2006) External Knowledge
The kind of knowledge that a irm needs in order to
Extension Mechanism compete, but that is standard and available in an open
Speciies how model elements are customized and extended market to any organization on the same conditions of price
with new semantics. (Riesco et al., 2005) and functionality. Thus, it can be bought and sold, and
therefore it is relatively easily integrated in a irm even if
Extension, Shallow it is implicit and collective. (Andreu & Sieber, 2006)
Of a concept C, denotes the set of documents classiied
directly under C. (Sacco, 2006) External Link
A URL address that connects to a site on an intranet or
Extensional Inference Rule the Internet. (Baugher et al., 2005)
Two concepts A and B are related if there is at least one
item d in the knowledge base which is classiied at the same External Metric
time under A (or under one of As descendants) and under A metric used to measure attributes of the product that can
B (or under one of Bs descendants). (Sacco, 2006) be measured only with respect to how the product relates
to its environment. (Xenos, 2006)
External Data
1: A broad term indicating data that is external to a particular External Stakeholder
company. Includes electronic and non-electronic formats. Organizations exchange information and communicate
(Peter & Greenidge, 2005a) 2: Data originating from other with all external stakeholders, who can be divided into
than the operational systems of a corporation. (Peter & business partners and other stakeholders. (Boonstra &
Greenidge, 2005b) 3: Traditionally, most of the data in a de Brock, 2006)
warehouse have come from internal operational systems
such as order entry, inventory, or human resource data. External Support
However, external sources (i.e., demographic, economic, Assistance from persons outside the irm. Some irms
point-of-sale, market feeds, Internet) are becoming more pay for such support by employing a consultant. Other
and more prevalent and will soon be providing more common forms of external support include IS vendors
content to the data warehouse than the internal sources. and advice from peersthat is, managers in other irms.
(Owrang O., 2006) (Cragg & Suraweera, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
252 Ex t ra c t ion Group Re se a rch M e t hodology (X -Group M e t hodology) Eye Tra cke r
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Eye Tra ck ing Eye -M ind H ypot he sis 253
Eye Tracking
A technique whereby an individuals eye movements are
measured so that the researcher knows where a person
E
is looking at any given time and how the a persons eyes
are moving from one location to another. (Poole & Ball,
2006)
Eye-Mind Hypothesis
The principle at the origin of most eye-tracking research.
Assumes that what a person is looking at indicates what
the person currently is thinking about or attending to.
Recording eye movements, therefore, can provide a
dynamic trace of where a persons attention is being
directed in relation to a visual display such as a system
interface. (Poole & Ball, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
254 F Va lue Fa c ia l Ac t ion Coding Syst e m (FACS)
F
F Value: See Fisher Value. Face Synthesis
A process of creating a talking head that is able to speak,
FA: See Facial Animation. display (appropriate) lip movements during speech, and
display expressive facial movements. (Pantic, 2005b)
Face Detection
Given an arbitrary image, the goal of face detection is to Face-Based Interface
determine whether or not there are any faces in the image, Regulating (at least partially) the command low that
and if present, return the image location and extent of each streams between the user and the computer by means of
face. (Tan & Zhang, 2006) facial signals. This means associating certain commands
(e.g., mouse pointing, mouse clicking, etc.) with certain
Face Localization facial signals (e.g., gaze direction, winking, etc.). Face-
Given a facial image, the goal of face localization is to based interface can be effectively used to free computer
determine the position of a single face. This is a simpliied users from classic keyboard and mouse commands.
detection problem with the assumption that an input image (Pantic, 2005b)
contains only one face. (Tan & Zhang, 2006)
Face-to-Face (F2F)
Face Model 1: Term used to describe the traditional classroom
General information required for recreating faces in a environment. (Blackmore et al., 2006) 2: Communication
computer graphics system, for example, geometrical occurring in the same physical domain. (Whateley et
parameters. (Arya, 2005) al., 2005) 3: Communication requiring the synchronous
presence of participants in space and time. (Beuschel et
Face Model Feature al., 2005)
One of a set of features used to represent (model) the face
or facial features, such as the width, height, and angle in Face-to-Face Learning
a template of the eye, or all nodes and triangles in a 3D Considered as a traditional environment in which the
face mesh model. (Tan & Zhang, 2006) instructor and students meet in a classroom setting. (S.-
K. Wang, 2005)
Face Recognition
A technique for identity veriication or identiication Facet
based on the users facial features, such as positions of One of several top-level (most general) concepts in a multi-
cheekbones, and positions and shapes of eyes, mouth, and dimensional taxonomy. In general, facets are independent
nose. (Li, 2006) and deine a set of orthogonal conceptual coordinates.
(Sacco, 2006)
Face Space
The vector space spanned by the eigenfaces. (Lovell & Facial Action Coding System (FACS)
Chen, 2005) 1: A comprehensive system that can distinguish the most
possible visually distinguishable facial movements. FACS
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fa c ia l a nd Body Anim at ion (FBA) Fa c ilit at or 255
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
256 FACS Fa c ult y
for a discussion, activity, or course. In many cases, a process. (Tininini, 2005a) 4: The central table in a star
course facilitator or faculty facilitator acts as a mentor for schema, containing the basic facts or measures of interest.
F a course, providing guidance, assistance, or trusted advice Dimension ields are also included (as foreign keys) to link
to the student. (Riffee & Sessums, 2005) 3: A person who to each dimension table. (Bellatreche & Mohania, 2005)
acts in such a way as to allow others to take an active
role in learning, especially in groups. Teachers in this Faction
role typically assist students by asking probing questions In the most basic form, faction is simply street creditability
and by stimulating discussion. (Kukulska-Hulme, 2005) or worthiness in the eyes of NPCs, as it is inevitable that
4: A community member who coordinates the activities there will be enemies among the races. When players make
within the communitys place. (Porto Bellini & Vargas, friends with one particular race, this can consequently
2006) 5: An AHIMA member who volunteers to support make you disliked or hated by another, so as your faction
and champion the success of a particular community. goes up with one race, it will go down with another. This
Such a volunteer monitors activity within the community, effect is not an all or nothing, but a gradual process.
encourages member participation, organizes community (Grifiths et al., 2006)
events, posts resources, and reviews and approves all
submitted resources. (Zender, 2006) 6: Someone helping Factor
people self-discover new approaches and solutions to The expressed requirement of the customer. (Lacaze et
problems. (Whitield, 2005) 7: An instructor who utilizes al., 2006)
the facilitative method for course delivery, is focused on
a student-centered environment, is attentive to students Factor Analysis
needs, and assists students in achieving self-actualization. 1: A process used to identify statistically signiicant
(Ordonez, 2005) constructs underlying a set of data. (W.B. Martz, Jr. &
V.K. Reddy, 2005) 2: Any of several methods for reducing
FACS: See Facial Action Coding System. correlational data to a smaller number of dimensions or
factors; beginning with a correlation matrix, a small number
Fact (Multi-Dimensional Datum) of components or factors are extracted that are regarded
1: A single elementary datum in an OLAP system, as the basic variables that account for the interrelations
the properties of which correspond to dimensions and observed in the data. (Colmenares & Otieno, 2005) 3:
measures. (Tininini, 2005b) 2: An entity of an application Method of grouping questions based on the correlation of
that is the subject of decision-oriented analysis. It is each question to other questions. (Witta & Lee, 2005)
usually represented graphically by means of a table or,
using a metaphor, by a data cube. (Rafanelli, 2005) 3: Factor Score
Basic, irreducible data item that is stored in the data A measure of a factors relative weight to others; it is
warehouse. It represents the basic unit of business analysis obtained using linear combinations of variables. (Lee,
and therefore must represent the basic activity of the Peterson, et al., 2005)
enterprise under consideration. (Badia, 2005c) 4: Element
recorded in a warehouse (e.g., each product sold in a shop) Factual Data
and whose characteristics (i.e., measures) are the object Data that include demographic information such as name,
of the analysis (e.g., quantity of a product sold in a shop). gender, and birth date. It also may contain information
(Schneider, 2005) derived from transactional data such as someones favorite
beverage. (Cook, 2005)
Fact Table
1: A database table that stores the base facts that consist Factual Data Analysis
of values of different metrics for different combinations Another term for data mining, often used by government
of dimension values. (Deshpande & Ramasamy, 2005) 2: agencies. (Cook, 2005)
A member of the star schema data model which records
data about a set of phenomena of interest. (Pourabbas, Faculty
2005b) 3: A table of (integrated) elementary data grouped The collection of teachers at a school, college, or university.
and aggregated in the multi-dimensional querying (Shaw, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fa c ult y Deve lopm e nt Fa ir ne ss 257
Faculty Development and corrected, lead to failure of the system. A fault is the
A purposeful, institutionalized approach to doing that original cause of the error. (Zhao et al., 2005)
which helps faculty do their work better as individuals
F
within an institution and within the collective enterprise Failure Recovery
of higher education. (Kinuthia, 2005) Recovery in a situation where log-iles and the current
database or an old database copy are available. (Frank,
Faculty Function 2005a)
Basic functions of faculty in a cost analysis generally
include preparation, presentation, and assessment of Failure to Enroll Rate
student work. (Berg, 2005c) The condition that arises if the biometric sample captured
is not of proper quality that a template can be generated
Faculty Satisfaction from it. (Vatsa et al., 2005)
The quality principle that recognizes faculty as central to
quality learning. (Moore et al., 2005) Fair Use
1: A term deined in the U.S. Copyright Act. It states the
Faded Information Field exemption for schools to some copyright regulations.
A group of server machines connected in a topology (This exemption pre-dates many current educational
that allows information documents to be distributed in applications of technology and may be not address some
a fashion that can improve retrieval eficiency, typically online learning situations.) (Sales, 2005) 2: The exception
through some algorithmic computation to determine server to the rights of the copyright owner set out under section
locations. (Quah et al., 2006b) 107 of the United States Copyright Act of 1976. This allows
for a limited amount of personal copying in the context
Failed Project of activities such as criticism, teaching, scholarship, and
A projects that is cancelled before completion, never research. The freedom to copy under this section is widely
implemented, or scrapped following installation. (Dalcher, misunderstood, and it is important to note that the courts
2005) have quite tightly restricted the use of this exclusion.
Generally, this exception will only hold if the use is non-
Failed-Out commercial, relates to a factual work of a small amount,
A student who failed a course (or courses) and did not and is not done in a way that impacts on the commercial
meet the academic standard. Therefore, he or she has market for the original. Fair use only applies in the United
been automatically removed from the program. Failed- States, and while some exceptions for similar uses exist
outs are different from no-shows since the failing grade in other jurisdictions, the details differ signiicantly.
resulted from the lack of academic competence rather than Despite this, the term is commonly used internationally
abandoning behavior. (Chyung, 2005) to describe uses of copyright material that are considered
defendable exceptions to the normal regime of protection.
Failure (Marshall, 2005)
The inability of a system or component to perform
its required functions within speciied performance Fairness
requirements. (Schneidewind, 2005) 1: A subjective term deining the level to which a student
feels he or she was treated fairly by the professor with
Failure Analysis respect to the class, including but not limited to test
Computing the time it takes for a manufactured component questions, grading, schedule lexibility, and so forth.
to fail. (Chen, Oppenheim, et al., 2005) (Martz & Reddy, 2005) 2: It is recognized that the greater
the diversity in the methods of assessment, the fairer the
Failure, Error, Fault assessment is to students. Therefore, assessment needs to
A failure is the event of a system generating a result that embrace a variety of kinds of activity, so that candidates
does not satisfy the system speciication or of the system have a greater opportunity to demonstrate their skills on
not generating a result that is required by the system at least some of the assessment occasions they encounter.
speciication. An error is incorrect information, or lack of (Diamadis & Polyzos, 2005)
information, within the system that will, unless detected
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
258 Fa ir ne ss a nd Just ic e Fa m ilia rit y-Ba se d Trust
Fairness and Justice More generally, a false negative occurs when the null
The philosophical view that the moral act is the one that hypothesis is erroneously accepted. Also called Type II
F treats similarly situated people in similar ways with regard error. (Mukherjee, 2005) 3: A mail message that the ilter
to both process and outcome. (Gilbert, 2005) tags as ham but is actually spam. (de Freitas & Levene,
2006a)
False Acceptance Rate
1: Rate of acceptance of a forged signature as a genuine False Positive
signature by a handwritten signature veriication system. 1: A iltering system can make two types of errors: false
(Chakravarty et al., 2005b) 2: The probability of incorrectly acceptance and false rejection. The latter is a false positive.
identifying any impostor against a valid users biometric A spam ilter can wrongly let spam through, or wrongly
template. (Vatsa et al., 2005) 3: A case where an individual ilter real e-mail as spam. In false acceptance, it is not
is authenticated when they were not the person that enrolled doing its job, while in false positives, it is doing it too
the original sample. (Fleming, 2005a) well. Decreasing one type of error tends to increase the
other, as with Type I and Type II errors in experimental
False Alarm design. As the spam-ilter catch rate rises above 99.99%,
A case in which a candidate match is found during the number of false positives also rises. (Whitworth,
preprocessing step of a similarity analysis algorithm 2006b) 2: A prediction of a usability problem reported in
when a match does not really exist. Minimization of false a usability inspection that in reality is not a problem to the
alarms is important because extracting a large amount real users. (Woolrych & Hindmarch, 2006) 3: The error
of false candidates in early steps of an algorithm causes committed when an object is selected as relevant when
performance degradation that will not improve the accuracy it is in fact irrelevant. More generally, a false positive
of the result. (Sayal, 2005) occurs when the null hypothesis is erroneously rejected.
Also called Type I error. (Mukherjee, 2005) 4: A mail
False Discovery Rate (FDR) message that the ilter tags as spam but is actually ham.
The expected proportion of false positives among the (de Freitas & Levene, 2006a)
objects selected as relevant. (Mukherjee, 2005)
False Rejection
False Dismissal A case where an individual is not authenticated, although
A case in which a candidate match is eliminated during he or she has previously enrolled biometric data. (Fleming,
the preprocessing step of a similarity analysis algorithm 2005a)
when a match does exist. Minimization of false dismissals
is important because it reduces accuracy of the algorithm. False Rejection Rate
(Sayal, 2005) 1: Rate of rejection of a genuine signature as a forged
signature by a handwritten signature veriication system.
False Drops (Chakravarty et al., 2005b) 2: The probability of incorrectly
A property of signature iles. Since signature iles use hash rejecting the valid users or failing to verify the legitimate
to activate bits corresponding to the set elements, possibility claimed identity of any user. (Vatsa et al., 2005) 3: The
exists for one or more set elements setting the same bits. probability that a biometric system will fail to identify
When a query signature is evaluated using signatures in an enrollee or verify the legitimate claimed identity of
signature iles, there is a probability that the signatures an enrollee. (Vatsa et al., 2005)
might match, but the actual sets might not match. These
are called false drops. (Ramasamy & Deshpande, 2005) Falsiication Testing
A method for testing the accuracy of predictions made
False Negative during usability inspections. (Woolrych & Hindmarch,
1: A potential usability problem discovered in a usability 2006)
inspection that upon analysis is incorrectly eliminated
by the analyst as an improbable problem. The discovered Familiarity-Based Trust
problem is conirmed in real use as causing dificulties Knowing what to expect of the trusted party based on
to users. (Woolrych & Hindmarch, 2006) 2: The error previous interactions with it. (Paravastu & Gefen, 2006)
committed when a truly relevant object is not selected.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fa m ily PC Progra m Fe at ure 259
Family PC Program the bulk of the data-processing operations while the data
A program launched in Tunisia in April 2001 to help itself is stored on the server. (Rashid, 2005)
households acquire a PC and printer at a total cost of 1000
F
TD (US$700). (El Louadi, 2005a) Fault (Crash, Timing, Omission, Commission,
Byzantine)
Fantasy Role-Playing (FRP) A crash fault occurs when a component operates correctly
Like being and playing in an improvisational drama or up to some point in time, after which it produces no further
free-form theatre, in which the participants (actors) adopt results. A timing fault occurs when a component produces
imaginary characters or parts that have personalities, results at the wrong time. An omission fault occurs when
motivations, and backgrounds different from their own. a component produces some results but not others. A
(Medeni & Medeni, 2006) commission fault occurs when a component generates
incorrect results. A Byzantine or malicious fault is a form
Fantasy Role-Playing Game of commission fault in which a component generates
A type of game that allows players to role-play imaginary incorrect results intentionally to mislead the algorithms
characters in an imaginary setting. Usually, role-players or components of the system. (Zhao et al., 2005)
engage in cooperatively creating a story, each restricting
themselves to the character they themselves introduced Fault Detector, Analyzer, Notiier
to the story. (Medeni & Medeni, 2006) A fault detector monitors the occurrence of faults in a
component. A fault analyzer subscribes to fault reports
Fantasy-Based Virtual Community from a fault notiier and aggregates multiple related fault
A virtual environment where users create their own avatars reports into a single fault report. A fault notiier receives
and personalities, and interact with other users through fault reports from fault detectors and fault analyzers, and
role-playing fantasies. (Jong & Mahatanankoon, 2006) supplies fault reports to subscribers for those reports.
(Zhao et al., 2005)
FAP: See Facial Animation Parameter.
Fault Tolerance
FAQ The ability to provide continuous service, even in the
Frequently asked question. (Toland et al., 2005b) presence of faults. (Zhao et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
260 Fe at ure Ex t ra c t ion Fe de rat e d Dat a ba se Syst e m
sampled points, lengths, and the speed of the sketched Feature-Based Image Retrieval
trace. (Mohamed & Ottmann, 2006) Based on speciic visual characteristics called features
F and considered at a low abstraction level. Features are
Feature Extraction commonly referred to perceptive attributes of images,
1: A subject of multimedia processing that involves such as color, texture, shape, and so forth, of images.
applying algorithms to calculate and extract some attributes (Y.-J. Zhang, 2005a)
for describing the media. (Wei & Li, 2005) 2: The process
to obtain a group of features with the characters we need Feature-Level Architecture
from the original data set. It usually uses a transform (e.g., In this type of architecture, modality fusion operates
principal component analysis) to obtain a group of features at a low level of modality processing. The recognition
at one time of computation. (Chu & Wang, 2005) 3: Use process in one modality can inluence the recognition
of one or more transformations of the input features to process in another modality. Feature-level architectures
produce more useful features. (Hentea, 2005c) generally are considered appropriate for tightly related
and synchronized modalities, such as speech and lip
Feature Reduction Method movements. (Bourguet, 2006)
The goal of a feature reduction method is to identify the
minimum set of non-redundant features (e.g., SNPs, genes) FEC: See Forwarding Equivalence Class.
that are useful in classiication. (Kusiak & Shah, 2005)
Federal Depository Library Program (FDLP)
Feature Selection Federal program of disseminating government program
1: A process of choosing an optimal subset of features from information products in all media to participating libraries.
original features, according to a certain criterion. (Yu & (Inoue & Bell, 2005)
Liu, 2005) 2: The process of selecting some features we
need from all the original features. It usually measures Federal Model
the character (e.g., t-test score) of each feature irst, then A hybrid coniguration of centralization and decentralization
chooses some features we need. (Chu & Wang, 2005) 3: in which decision making is differentiated across divisional
The process of identifying the most effective subset of the and corporate units. (Peterson, 2005)
original features. (Hentea, 2005c) 4: The task of identifying
and selecting a useful subset of features from a large set Federated Database
of redundant, perhaps irrelevant features. (Jourdan et al., A type of multi-database in which component databases
2005) 5: The process of identifying the most effective preserve their autonomy. (Unal et al., 2006)
subset of the original features to use in data analysis such
as clustering. (Huang, 2005) 6: The process of identifying Federated Database Schema (FDBS)
those input attributes that contribute signiicantly to Collection of autonomous cooperating database systems
building a predictive model for a speciied output or target. working in either a homogenous environmentthat is,
(Mani et al., 2005) dealing with schemas of databases having the same data
model and identical database management systemsor
Feature Space a heterogeneous environment. (Bounif, 2005)
The higher dimensional space that results from mapping
the input space, as opposed to the input space occupied Federated Database System
by the training examples. (Awad & Khan, 2005) 1: A network of independent and autonomous databases
cooperating in a loosely coupled manner to share and
Feature Vector exchange information. (Leong, 2005a) 2: A system that
1: A vector in which every dimension represents a property integrates a number of pre-existing autonomous database
of a 3D structure. A good feature vector captures similarity management systems (DBMSs) that can be homogeneous
and dissimilarity of 3D structures. (X. Wang, 2005) 2: Data or heterogeneous. They can use different underlying
that describes the content of the corresponding multimedia data models, data deinition and manipulation facilities,
object. The elements of the feature vector represent the and transaction management and concurrency control
extracted descriptive information with respect to the mechanisms. A DBMS in the federation can be integrated
utilized analysis. (Bretschneider & Kao, 2005) by a mediator providing a uniied view of data: a global
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fe de rat e d I nfor m at ion Syst e m (FI S) Fibrat ion 261
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
262 Fide lit y File Tra nsfe r Prot oc ol (FT P)
MB, Cobjects (models, schemas) S for which S. f = M of automation devices, for example, assembly lines,
and Carrows between them s: SS for which s.f = id M production cells, or single machines. Depending on
F (identity mapping of M), form a category (of models in the the nature of the business, different types of FANs are
meta-model M), CM. This category is called the iber over applied, which are either based on ield buses or Internet
M. Fibers are mutually connected in the following way. Let technologies. Well-known FANs are, for example, Proibus,
m: MM be a base arrow (meta-model interpretation) and DeviceNet, CAN Open, and SERCOS. (Blecker, 2006a)
S be an object over M, S. f = M. Then there is an object S*
over M, S*.f =M, and an arrow m*: S*S over m, m*.f Fieldwork
=m, having some remarkable properties (their formulation Often used interchangeably with ethnography (see
is too technical to be presented here). In the MMt context, deinition), it is, in fact, less precise and much broader as a
object S* is the same model S, but its elements are concept. Fieldwork may be ethnographic or not, qualitative
renamed in terms of meta-model M as governed by the or quantitative, short term or long term. What deines
interpretation m, and m* is the renaming mapping. The ieldwork is a situation of doing research outside of the
technical properties just mentioned abstract this intuition conines of a laboratory or a library, gathering primary
in terms of morphisms in C and B. (Diskin, 2005) data in person, and locating oneself within a given social
formation (e.g., a neighborhood, political party, social
Fidelity club, school, hospital, etc.). Fieldwork in the ethnographic
The measure of how well the rules extracted from a mode typically involves an anthropologist relocating to
complicated model mimic the behavior of that model. a distant society to learn and document another culture,
(Zhou, 2005) usually involving periods of continuous stay of a year or
more, and relying heavily on Participant Observation as
Field Creation a research method. (Forte, 2005)
In traditional ethnographic ield research (see ethnography,
ieldwork), an anthropologist would spend time in a ield Figuration
site (i.e., a village belonging to a tribe) that logically As deined in image theory, a complex construction
predated the existence of a research project. Field creation comprising multiple images. Figurations are inherently
involves this process, only in reverse. In this case, an less eficient for extracting information than images,
anthropologist or other researcher constructs a particular according to image theory. (Crossland, 2005)
site that then attracts interest and generates a network
of social interaction around itinformants come to the File Format
site created by the researcher. The creation of a Web- The way a ile stores informationthe way in which a
based information resource that fosters a community of ile is saved. The ile format depends on the content that
interacting interests, and then becomes a site of research is being stored, the application that is being used, and the
about itself, is one example of ield creation. (Forte, compression algorithm that is being used. (Prata, 2005)
2005)
File Server
Field Dependence (FD) A piece of equipment that allows one to distribute a software
Measures a persons ability to separate an item from an program from a single source to a number of computers.
organized ield or to overcome an embedded context. (Switala, 2005)
(Crossland, 2005)
File Transfer Protocol (FTP)
Field Learning 1: An application and network protocol for transferring iles
Derives rules by looking at the ield of the values of each between host computers. Such a protocol allows users to
attribute in all the instances of the training data set. (Dai, quickly transfer text and binary iles to and from a distant
2005a) or local PC. (Gillani, 2005b) 2: A computer protocol used
for accessing a remote computer over the Internet and
Field-Area Network retrieving iles from it. (Kirlidog, 2005) 3: A protocol
Real-time network on the ield level (shop loor) of industrial used to transfer iles over a TCP/IP network (Internet,
irms communication systems for the interconnection UNIX, etc.). (Parikh & Parolia, 2005) 4: A protocol
to transfer iles from one computer to another over the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Filt e r Finge rprint 263
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
264 Finge rprint Sc a nning Fishe r Ex a c t Te st
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fishe r Va lue (F Va lue ) Fla sh M e m or y 265
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
266 Fla sh Pla ye r Flow
Flash Player some of their learning on campus and some of their learning
A multiple-platform client that Web users must download off campus. (Klobas & Renzi, 2005b)
F and install (a browser plug-in) in order to view and interact
with Macromedia Flash content. (Barone, 2005) Flexible Mining of Association Rules
Mining association rules in user-speciied forms to suit
Flexibility different needs, such as on dimension, level of abstraction,
1: The ease with which a system or component can be and interestingness. (Shen, 2005)
modiied for use in applications or environments other than
those for which it was originally designed. A lexible system Flexible Workplace
may be transformed by IT professionals and customized by Organizational settings that can quickly take external
end users. (Vaast, 2005) 2: The host- and the IP-multicast and internal changes into account in their processes.
are lexible, and it is easy to change the topology of the (Oravec, 2005)
multicast tree. (Hosszu, 2005a) 3: Virtual organizations
are, by their nature, lexible. Traditional organizational Flexography
structures are rooted in the physical world and rely on A printing process that uses a raised or relief-type image
structures, unalterable networks, and speciic locations on a lexible photoploymer or rubber plate. Commonly used
to function properly. Because of this, when it becomes for printing corrugated and lexible packaging, newsprint,
necessary to introduce change into a speciic organization, and other media. (Snyder, 2005)
a barrier is reached where further alteration requires
physical, costly modiications. A virtual organization Floating Catchment Area Method
is unhindered by these problems. These structures are A Geographic Information System (GIS)-supported
designed so that they can operate regardless of time or method for assessing the scarcity of supply vs. demand.
place, independent of existing physical realities. (J. Lee, For example, assuming a threshold travel distance of 15
2005) miles for primary healthcare, a 15-mile circle is drawn
around a residential location as its catchment area. The
Flexible Attribute circle loats from one location to another throughout a
An attribute is called lexible if its value can be changed study area, and the physician-to-population ratio within
in time. (Ras et al., 2005) each catchment indicates whether an area is medically
underserved. (Wang & Lou, 2005)
Flexible Calendar Option
Typically, school districts are bound to a relatively ixed Flooding-Based Broadcasting Mechanism
calendar, either by state or local policy. Flexible calendar The unconditional broadcasting mechanism utilized
option refers to one of a variety of programs that might by Gnutella peers to forward their searching queries.
include year-round schooling, alternate calendars, or Gnutella peers implement such a looding-based searching
alternate daily schedules. (Glick, 2005a) mechanism in order to maximize their searching coverage
on the networks. (Kwok et al., 2006)
Flexible Job Shop
A shop in which resources are lexible and can execute Floor Control
many types of tasks with variable performances according Functionality that allows for resolving concurrent access
to the assignment choices. (Kacem, 2005) to common resources, such as mouse pointers in shared
applications. A loor is usually assigned to such a resource
Flexible Learning together with a policy for access authorization. (Trossen
1: A combination of varied teaching practices, including & Molenaar, 2005)
applied research and investigative projects within a lexible
learning mode, that is aimed at maximizing learner FLOSS: See Free/Libre Open Source Software.
engagement through action learning methodologies and
advanced technologies. The key focus driving educational Flow
design is meeting the learners needs. (Baskin et al., 2005) 1: The amount of change in a variable over time. Flow
2: A systems in which students may choose to complete represents the change in the status or the quantity of a
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
F/OSS For m a l Com m unic at ion 267
variable over a speciied time unit. (Maani, 2005) 2: A Foreign Direct Investment (FDI)
psychological state experienced when there is a match An acquisition of an asset in a foreign country (host
between task requirements and a users skills, a state that country) made by an investor in another country (home
F
involves high attention and leads to feelings of control and country) with the intention to manage this asset. (Brock
enjoyment. (Sas, 2006) 3: A psychological state in which & Zhou, 2006)
one is so focused on an activity that one loses a sense of
self and of the passage of time. (Bridges et al., 2006) 4: A Foreign Key
representation of the rate of change in the condition of a 1: A key is a ield or set of ields in a relational database
variable in a system dynamics model. (Casado, 2005) 5: table that has unique valuesthat is, no duplicates. A ield
A set of packets associated with a single application and or set of ields whose values form a subset of the values
that share common requirements. (Gutirrez & Ting, 2005) in the key of another table is called a foreign key. Foreign
6: The holistic sensation that people feel when they act in keys express relationships between ields of different
total involvement. (Scarpi & DallOlmo-Riley, 2006) tables. (Koeller, 2005) 2: A set of one or more attributes
that correspond to a primary key in order to simulate a
F/OSS: See Free/Open Source Software. relationship. It links two tables. (Alhajj & Polat, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
268 For m a l Conc e pt Ana lysis Forw a rd Error Corre c t ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Forw a rd-Look ing Re sponsibilit y Fra gm e nt at ion 269
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
270 Fra gm e nt e d Va lue Cha in Fre e Riding
Frame Franchisee
A small piece of information or a statement to which the The individual or business that receives the business
student is exposed, such as a page with a single question. In rights and pays the royalties for using the rights. (Chen
linear programmed instruction, a frame includes a stimulus, et al., 2005b)
a response, and reinforcement (positive feedback). (Owen
& Aworuwa, 2005) Franchisee Lifecycle
The stages a franchisee goes through in the franchise
Frame of Discernment system: Courting, We, Me, Rebel, Renewal. (Chen et
A inite, non-empty set of hypotheses. (Beynon, 2005a) al., 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fre e Soft w a re Fre que ncy Dom a in 271
on ones own machine available to the network in return. ignore the other, and as such, can be used as a compromise
(Hughes & Lang, 2005) 2: The act of enjoying the public term palatable to adherents of either movement. It also
good without contributing anything to its creation or emphasizes the libre meaning of the word free rather
F
maintenance. (Teigland & Wasko, 2005) 3: Consuming than the free of charge or gratis meaning, which those
community resources without contributing, a well-known unfamiliar with the subject might assume. This all-inclusive
problem in peer-to-peer ile-sharing systems (and in many acronym has the extra advantage of being non-anglo-
other public good provisioning settings) where certain centric: the F stands for Frei in German while the L stands
users only download iles without sharing iles themselves. for Libre in French and Spanish, Livre in Portuguese,
(Efstathiou & Polyzos, 2006) 4: The user behavior when a and Libero in Italian, showing that the concepts and their
user contributes nothing or undesired content to the P2P implementation are not exclusive to the English-speaking
network, while consuming the contributions of others. world. (Y.-W. Lin, 2005)
(Kwok et al., 2006)
Free/Open Source Software (F/OSS)
Free Software 1: Software whose source code, under certain license
1: An earlier name for open source software, emphasizing agreements, is freely available for modification,
the liberties given to end users and developers of derivative distribution, and innovation. (Sowe, Samoladas, &
works. There is no requirement that the software be Stamelos, 2005) 2: Software with an unrestrictive license
distributed at no charge; thus, distinct from freeware. whose source code is made available for modiication,
(Carillo & Okoli, 2006) 2: Software that is distributed customization, and distribution by others. (Boateng &
under the terms of a license agreement that makes it Boateng, 2006a)
freely available in source code form. Strong advocates of
free software insist that the ideas underlying a piece of Freeblock Scheduling
software, once published, must always be freely available. A disk arm scheduling method that uses opportunistic
(Fleming, 2005b) accesses to disk blocks required for a low-priority activity.
(Thomasian, 2005a)
Free Software Foundation (FSF)
Founded by Richard Stallman in 1985 to promote free Freely Available
software, especially the Copyleft concept. Produced the Wide distribution at no cost to the consumer. (Fleming,
GNU Manifesto (1985), the GNU General Public License 2005b)
(1989, 1991), the GNU Lesser General Public License
(1991, 1999), and the GNU Free Documentation License Freeware
(2000, 2001, 2002). (Okoli & Carillo, 2006) Software provided at no charge to the user. Might be open
source or proprietarythat is, the developer only permits
Free Tree redistribution and use, with no modiications permitted.
Let G be a connected acyclic labeled graph. Because of In fact, most open source software is freeware, but most
its acyclicity, each connected acyclic labeled graph has freeware is not open source. (Carillo & Okoli, 2006)
at least one node which is connected to the rest of the
graph by only one edgethat is, a leaf. If we label the Freight Consolidation
leaves with zero and the other nodes recursively with the The combining of small shipments into a composite
minimal label of its neighbors plus one, then we get an truckload or other unit of volume that is sent to a destination
unordered, unrooted tree-like structure, a so-called free point. (Tyan, 2006)
tree. It is a well-known fact that every free tree has at most
two nodes, which minimize the maximal distance to all Frequency
other nodes in the tree, the so-called centers. (Katsaros Rate of signal oscillation in Hertz. (Statica & Deek,
& Manolopoulos, 2005b) 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
272 Fre que ncy H opping Spre a d Spe c t rum (FH SS) Front -End I nt e rope ra bilit y
Frequency Hopping Spread Spectrum (FHSS) the itemset. A frequent itemset is an itemset with support
When a broad slice of bandwidth spectrum is divided above a pre-speciied threshold. (Zhou & Wang, 2005)
F into many possible broadcast frequencies to be used by 9: An itemsets that has support at least equal to minsup.
the transmitted signal. (Akhtar, 2005) (Daly & Taniar, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Front -End Proc e ssing Func t iona l Ge nom ic s 273
FSF: See Free Software Foundation. Fully Online Model of Course Redesign
This model shares many of the features of the other course
FTE: See Full-Time Equivalent. redesign models. For example, it shares the feature of
online interactive learning activities of the Replacement
FTP: See File Transfer Protocol. model, heavy reliance on computer-based learning
resources, and instructional stafing of the Emporium and
FTTH: See Fiber-to-the-Home. Supplemental models. The most distinctive feature is that
learners generally do not meet face to face on campus.
FTTx (Twigg, 2005)
Fiber to the cabinet (Cab), curb (C), building (B), or home
(H). (Chochliouros et al., 2005a) Function
A programming construct where code that does a particular
F2F: See Face-to-Face. task is segregated from the main body of a program; the
function may be sent arguments and may return arguments
Fulillment to the body of the program. (D. Brandon, Jr., 2005a)
The capability to deliver that which is transacted. (Samuel
& Samson, 2006) Functional Area
Companies that make products to sell have several
Full PI Model functional areas of operations. Each functional area
A PI model where every proper subset of variables is comprises a variety of business functions or business
marginally independent. Full PI models are the most basic activities. (Sundaram & Portougal, 2005a)
PI models. (Xiang, 2005)
Functional Dependence
Full REALLOCATE 1: For attribute sets C, D, we say that D depends functionally
A heuristic algorithm for computing a new data allocation, on C, in symbols CD, in case IND(C)IND(D). Also
given some number of servers and a system optimization non-exact (partial) functional dependencies to a degree
parameter. This heuristic is iterative, searching for stepwise are considered. (Pawlak et al., 2005) 2: Intuitively, one
solution reinement. This heuristic evaluates the effect of attribute is functionally dependent on a second attribute
independently moving each database relation to the new when you need to know the value of the second in order to
server joining the distributed database system. It then ind out the value of the irst. More precisely, each value
holds this relation at the new server and reiterates with of the second attribute has no more than one value of the
a reevaluation of moving an additional relation. (Chin, irst associated with it. (Schultz, 2005) 3: For any record
2005) r in a record type, its sequence of values of the attributes
in X is referred to as the X-value of r. Let R be a record
Full-Text Index type, and X and Y be sequences of attributes of R. We say
An index supporting retrieval of identiiers from documents that the functional dependency, XY of R, holds at time
containing a particular word. (Nrvg, 2005) t, if at time t, for any two R records r and s, the X-values
of r and s are identical, then the U-values of r and s are
Full-Time Equivalent (FTE) also identical. (Tan & Zhao, 2005a)
An accumulation of work time that adds up to a full-
time position. For example, two half-time positions Functional Genomics
equal one full-time equivalent; or 20 hours per week The study of gene functions on a genomic scale, especially
based on microarrays. (Fu, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
274 Func t iona l I llit e ra cy Fuzzy Dat a ba se M ode l
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Fuzzy Dat a ba se M ode ling Fuzzy Tra nsfor m at ion 275
model, fuzzy nested relational database model, and fuzzy fuzzy logic is that many classes in the natural environment
object-oriented database model. (Ma, 2005b) are fuzzy rather than crisp. It deals with imprecise and
uncertain data. (Begg, 2005)
F
Fuzzy Database Modeling
In addition to the issues of fuzzy database models, fuzzy Fuzzy Membership
conceptual data models, and conceptual design of fuzzy Instead of specifying whether an object precisely belongs to
databases, fuzzy database modeling focuses on fuzzy a set, fuzzy membership speciies a degree of membership
database systems and discusses (fuzzy) query, (fuzzy) data between [0,1]. (Lingras et al., 2005)
handling, database theory (e.g., fuzzy data dependencies
and formalization in fuzzy relational databases), database Fuzzy Number
implementation, and so forth. (Ma, 2005b) Quantitative mathematical description of fuzzy
information concerning a one-dimensional numerical
Fuzzy Estimate quantity. (Viertl, 2005)
Generalized statistical estimation technique for the
situation of non-precise data. (Viertl, 2005) Fuzzy Relation
In fuzzy relations, degrees of association between objects
Fuzzy Histogram are represented not as crisp relations, but membership
A generalized histogram based on non-precise data whose grade in the same manner as degrees of set membership
heights are fuzzy numbers. (Viertl, 2005) are represented in a fuzzy set. (Kim, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
276 Fuzzy Va lue d Func t ion Fuzzy Ve c t or
Fuzzy Vector
Mathematical description of non-precise vector quantities.
(Viertl, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
GA Gat he ring 277
G
GA: See Genetic Algorithm. Game Theory
Mathematical theory of rational behavior for situations
GA A P: See Generally Accepted Accounting involving conlicts of interest. (Heucke et al., 2005)
Principles.
Game User Interface
GADP: See General Additive Data Perturbation. Elements and devices through which the user interacts
with the game. (Ip & Jacobs, 2006)
Gait Analysis
Analysis of human walking patterns. It is used to analyze Game Using
abnormality in lower limb problems and assess treatment Stage in Gaming and Simulation. During the using stage,
or intervention outcomes. (Begg, 2005) game facilitators make preparations for playing the game,
and participants actually play the game (given a certain
Galaxy Structure scenario). (Achterbergh, 2005a)
Structure of a warehouse for which two different types of
facts share a same dimension. (Schneider, 2005) Gaming and Simulation
The process of building and using simulation games as a
Galois Lattice means to deal with complex problems. See also Simulation
Provides some meanings to analyze and represent data. Game. (Achterbergh, 2005a)
Refers to two-ordered set. An ordered set (I,#) is the set I,
together with a partial ordering # on I. (Nigro & Gonzlez Gantt Chart
Csaro, 2005c) A chart displaying schedule information in a graphical
form. It may display tasks, duration, start/inish dates for
Gambling activities and milestones, dependencies, and allocated
A leisure activity in which money is staked with the resources. (Asprey, 2005)
anticipation of making a gain and/or winning a prize.
(Brindley, 2006) Gap/Racial Gap
Inequality of access to media and technology based on
Game ethnicity. (Reilly, 2005)
A simulation in which people are part of the model and their
decisions partially determine the outcome. (Pendegraft, Gathering
2005) An event where participants share their knowledge with the
group on a particular topic. A gathering focuses exclusively
Game Building on occupational knowledge and encourages an evaluation of
Stage in Gaming and Simulation. During the building the legitimacy of other peoples contributions. A gathering
stage, game constructors make a model of the problem they is unlike a brainstorm, which discourages evaluation
want to incorporate into the game. Next, they transform and encourages wild and wacky ideas. Following a
the model into a speciic game, and inally they deine gathering, facilitated group discussion is conducted on
different scenarios that can be played during the game. the contributions shared. (Shaw, 2006)
(Achterbergh, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
278 Ga ze Ge ne ra l K now le dge
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ge ne ra l (or M e ga ) Por t a l Ge ne ra lizat ion-Spe c ia lizat ion H ie ra rchy 279
General (or Mega) Portal of the source code to create new free programs. (Lowry
A portal that provides links to all sorts of different sites et al., 2005a) 2: Speciically links source code to legally
of the users choosing, often from a menu of options. protected freedom to publish, distribute, and make use of
G
(Tatnall, 2006) derived works. (Fleming, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
280 Ge ne ra lize d Disjunc t ion-Fre e Pat t e r n Ge ne ric Top-Leve l Dom a in (gT LD)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ge ne t ic Algorit hm (GA) Ge nom ic Dat a ba se 281
Genetic Algorithm (GA) solutions are then used to solve the problem. (Athappilly &
1: A class of algorithms commonly used for training neural Rea, 2005) 12: An evolutionary algorithm that generates
networks. The process is modeled after the methods by each individual from some encoded form known as a
G
which biological DNA are combined or mutated to breed chromosome or genome. Chromosomes are combined
new individuals. The crossover technique, whereby DNA or mutated to breed new individuals. Crossover, the
reproduces itself by joining portions of each parents kind of recombination of chromosomes found in sexual
DNA, is used to simulate a form of genetic-like breeding reproduction in nature, is often also used in GAs. Here,
of alternative solutions. Representing the biological an offsprings chromosome is created by joining segments
chromosomes found in DNA, genetic algorithms use chosen alternately from each of two parents chromosomes,
arrays of data, representing various model solutions. which are of ixed length. (Lazar, 2005)
Genetic algorithms are useful for multi-dimensional
optimization problems in which the chromosome can Genetic Operators, Crossover and Mutation
encode the values for connections found in the artiicial Crossover takes two selected chromosomes, the
neural network. (Kitchens, 2005) 2: A ield of algorithms parents, and cuts their gene (bit) strings at some randomly
inspired by the evolution of species and applying natural chosen position, producing two head and two tail
operators like selection, crossover, and mutation. (Kacem, substrings. The tail substrings are then switched, giving
2005) 3: A heuristic used to ind approximate solutions rise to two new individuals called offsprings, which
to dificult-to-solve problems through application of the each inherit some genes from each of the parents. The
principles of evolutionary biology to computer science. offsprings are then created through the exchange of genetic
(Guan, 2006f) 4: An optimization algorithm based on material. Mutation consists of a random modiication of
the mechanisms of Darwinian evolution, which uses the genes with a certain probability (normally a small one,
random mutation, crossover, and selection procedures e.g., 0.0001) called the mutation rate. (Zarri, 2006a)
to breed better models or solutions from an originally
random starting population or sample. (Hou, Sheng, et Genetic Programming
al., 2005) 5: A heuristic optimization algorithm based on 1: A stochastic search algorithm based on evolutionary
the concept of biological evolution. (Caramia & Felici, theory, with the aim to optimize structure or functional
2005) 6: A search and optimization technique that uses form. A tree structure is commonly used for representation
the concept of survival of genetic materials over various of solutions. (Fan & Pathak, 2005) 2: Search method
generations of populations much like the theory of natural inspired by natural selection. The basic idea is to evolve
evolution. (Bala et al., 2005) 7: An iterative procedure a population of programs candidates to the solution of
that consists of a constant-size population of individuals, a speciic problem. (Yeo, 2005)
each represented by a inite string of symbols, known
as the genome, encoding a possible solution in a given Genetic Tree
problem space. (Mart, 2005) 8: Class of algorithms A variety of dendrogram (diagram) in which organisms
used to ind approximate solutions to dificult-to-solve are shown arranged on branches that link them according
problems, inspired and named after biological processes to their relatedness and evolutionary descent. (Galitsky,
of inheritance, mutation, natural selection, and generic 2005a)
crossover. Genetic algorithms are a particular class of
evolutionary algorithms. (Polgar, 2005a) 9: Evolutionary Genome
algorithm using a population and based on the Darwinian 1: All the genetic information or hereditary material
principle, the survival of the ittest. (Jourdan et al., 2005) possessed by an organism. (Yu & Liu, 2005) 2: All the
10: Optimization technique inspired by the mechanisms genetic material in the chromosomes of a particular
of evolution by natural selection, in which the possible organism; its size is generally given as its total number of
solutions are represented as the chromosomes of individuals base pairs. (Galitsky, 2005a) 3: The genetic information
competing for survival in a population. (Galvo et al., 2005) of an organism. (Tsunoda et al., 2005)
11: A large collection of rules that represents all possible
solutions to a problem. Inspired by Darwins theory of Genomic Database
evolution, these rules are simultaneously applied to data An organized collection of data pertaining to the genetic
using powerful software on high-speed computers. The best material of an organism. (Segall, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
282 Ge nom ic M e dic ine Ge ogra phic I nfor m at ion Syst e m (GI S)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ge ogra phic Posit ion Syst e m (GPS) Ge ospat ia l Dat a 283
road junctions, railway, land-use, or even terrain. The data objects, each of them implemented by a layer. Often a
is associated with the location of the entities to allow fast geographical database includes raster, topological vector,
geo-referencing. (Leong, 2005a) 11: The geographic use image processing, and graphics production functionality.
G
of data to develop maps and statistical relationships that (Ferri & Rafanelli, 2005)
help describe processes like the relationship between
alcohol outlets and violence or vehicle crashes and alcohol Geographical Dispersion
outlets. (Lipton et al., 2005) 12: A set of tools that rely The combination of virtual organization with IT allows
on data management technologies to manage, process, groups of employees to make progress on one project
and present geospatial data, which in turn can vary with while working in tandem with another group in a distant
time. (Ganguly et al., 2005) 13: A system composed physical location. Because information can be shared and
of computer hardware, software, geographic data, and meetings can be held with the use of high-speed networks
personnel designed to capture, store, update, manipulate, and computers, tasks can be carried out in the location
analyze, and display all forms of geographically referenced that is most appropriate and germane to that function. (J.
information. (Gilbert, 2005a) 14: A system to provide tools Lee, 2005)
to provision and administer base map data such as built
structures (streets and buildings) and terrain (mountain, Geographically Dispersed Team (GDT)
rivers, etc.). (Fraunholz et al., 2005) 15: A computer system A group of people who work together across boundaries
that permits the user to examine and handle numerous of time, space, and organizations, usually supported by
layers of spatial data. The system is intended to solve network and communication technologies. Team members
problems and investigate relationships. The data symbolize generally have complementary skills, sharing an overall
real-world entities, including spatial and quantitative purpose and interdependent performance goals, along
attributes of these entities. (Sadoun, 2006) 16: A computer with an approach to work that the team adopts, by which
system capable of capturing, storing, analyzing, and members hold themselves mutually accountable. (Dara-
displaying geographically referenced information. (Faz Abrams, 2006)
& Mahmoudi, 2005) 17: An information system that
manages geographic datathat is, data for which the Geometric Hashing
geometric shape and spatial location are indispensable The technique identifying an object in the scene, together
parts, which must be considered while working with them. with its position and orientation. (Chan & Chang, 2005)
(Davis et al., 2005)
Geometric Texture
Geographic Position System (GPS) Geometric distortions and additions applied to the original
A satellite-based system with applications for determining geometric shapes (e.g., roughness, bristle, fur, etc.).
locations, navigating, and monitoring the movement of (Sourin, 2006)
people and objects, including provision of accurate times
and velocities. (Barima, 2006b) Geoprocessing
Operations in GIS for integrating, analyzing, computing,
Geographical Analysis Model and presenting geospatial data. (Karimi & Peachavanish,
A model to derive new spatial information by combining 2005)
existing spatial and attribute data sources as appear useful
for a given research goal (e.g., route selection, service area Georeferencing
deinition). (Hendricks, 2005) Identifying the geographic location of features and their
boundaries on the Earths surface, for example, derived
Geographical Database from GPS, remote sensing, mapping, and surveying
A database in which geographical information is store by technologies. (Hendricks, 2005)
x-y coordinates of single points, or points that identify
the boundaries of lines (or polylines, which sometimes Geospatial Data
represent the boundaries of polygons). Different attributes Data representing objects on or near the surface of the
characterize the objects stored in these databases. In Earth. (Karimi & Peachavanish, 2005)
general, the storing structure consists of classes of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
284 Ge ospat ia l I nfor m at ion Syst e m (GI S) Globa l Digit al Divide
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Globa l Dist ribut ion Syst e m Globa l Posit ioning Syst e m (GPS) 285
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
286 Globa l Sche m a Globa l Syst e m for M obile Com m unic ati on (GSM )
A system of determining the absolute location of features portable GPS receiver very accurately. (Strauss, 2005) 11:
by calculating x, y, z coordinates of ground locations from An MEO (medium earth orbit) public satellite navigation
G the signal of satellites orbiting the Earth. (Hendricks, system consisting of 24 satellites used for determining
2005) 3: The worldwide satellite-based radio navigation ones precise location and providing a highly accurate time
system. The systems satellites transmit messages that a reference almost anywhere on Earth. (Dhar, 2005)
receiver uses to determine its own geographical position.
(Giaglis, 2005) 4: Provides real-time, satellite-derived Global Schema
location information based on information received by an Schema obtained after integrating local schemas. (Passi
appropriate GPS receiver. GPS is funded by and controlled et al., 2005)
by the U.S. Department of Defense. While there are many
thousands of civil users of GPS worldwide, the system Global Semantics of Referential Actions
was designed for and is operated by the U.S. military. A The whole effect interacting referential actions lead to
GPS may be employed in the original construction of the under update operations on the database state. (Rivero,
digital map information to be stored in a GIS. Or, if the 2005)
GIS is already constructed, the GPS may be employed to
accurately render the position of new elements to be added Global Serializability
to the GIS or the current position of a mobile element to be The correctness criterion for concurrent execution of
referenced against the information stored in the GIS. A good global transactions over many database systems. It is a
example might be a freight truck moving on a highway. The stronger correctness criterion than serializability. (Leong,
GPS receiver on the truck can derive its current latitude 2005b)
and longitude, and then send that information to the GIS
system in the truck cab, to a GIS in a central control center Global Software Team
via radio, or to both for subsequent reporting and analysis. Software teams located in different countries collaborate
(Crossland, 2005) 5: Worldwide radio-navigation system as a single team for a clear objective project. (Lui & Chan,
formed from a constellation of 24 satellites and their ground 2005)
stations that provide reference points to calculate positions
accurate to a matter of meters, and with advanced forms, to Global System for Mobile Communication
less than a centimeter. GPS receivers are so miniaturized (GSM)
that they are becoming accessible to virtually everyone. 1: The second generation of mobile technology in Europe.
Used in cars, boats, aircraft, construction equipment, farm (Hackbarth et al., 2005) 2: A digital cellular telephone
machinery, and even laptop computers, they are predicted system introduced in 1991 that is the major system in Europe
to become almost as basic as the telephone. (Latchem & and Asia, and is increasing in its use in North America. GSM
Maru, 2005) 6: Satellite technology that locates people and uses Time Division Multiple Access (TDMA) technology,
objects on earth with high accuracy. (Szewczak, 2006) 7: A which allows up to eight simultaneous calls on the same
self-positioning, wave-based positioning system consisting radio frequency. (Garrett, 2006a) 3: A world standard
of 24 satellites revolving around the Earth in six orbits, for digital cellular communications using narrowband
which send continuous radio signals using triangulation TDMA. It is the standard most commonly used in Europe
to determine an exact location. (Fraunholz et al., 2005) 8: and Asia, but not in the United States. (Lei et al., 2005a)
A system developed by the U.S. Department of Defense 4: Industry standard for second-generation digital cellular
to allow the military to accurately determine its precise communications networks, soon to be superseded by Third
location anywhere in the world. GPS uses a collection of Generation (3G) networks. (Gilbert, 2005b) 5: A mobile
24 satellites positioned in orbit to allow a person who has network that provides all services of ixed telephony to
the proper equipment to automatically have their position wireless subscribers. (Louvros, Karaboulas, et al., 2005)
triangulated to determine their location. (Kontolemakis et 6: Industry standard for 2G digital cellular networks.
al., 2005) 9: Utilizes a wide-reaching radio broadcasting (Gilbert, 2005c) 7: For mobile telecommunications, a digital
system, originally produced to aid navigation, consisting cellular communication network standard. (Fraunholz
of a group of 24 satellites plus terrestrial receiving devices. et al., 2005) 8: A digital mobile telephone system that is
(Friedman, 2005) 10: A satellite-based, publicly available widely used in Europe and other parts of the world. GSM
navigation system that can determine the position of a small uses a variation of TDMA and is the most widely used of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Globa l Te st Glossing 287
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
288 Glyc e m ic Cont rol Goa ls-Ba se d Eva luat ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
GOM S Gove r nm e nt -t o-Cit ize n (G2 C) 289
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
290 Gove r nm e nt -t o-Gove r nm e nt (G2 G) Gra nulat ion a nd Pa r ti t ion
government services that citizens need access to. (Hin & concept associated with the relative degree of complexity of
Subramaniam, 2006) 3: Governments offering services a component part to its aggregate, subsuming structure. Fine
G to citizens online. (Toland, 2006) silt is more granular than sand, which is more granular than
rock, and so forth. In taxonomic development, the smaller
Government-to-Government (G2G) the relative size to the taxons (units) of classiication, the
1: Online interactions between different government higher the degree of granularity. In instructional design,
agencies. (Toland, 2006) 2: The digital-enabled the concept of granularity is multi-faceted and can refer
collaboration and cooperation perspective among distinct to the size of learning units or scope (e.g., degree or
government agencies. (Joia, 2006) certiicate curricula, courses, lessons, modules, activities);
learning element prioritization or sequencing (e.g., logical
Government-to-Partners (G2P) order of lessons, concept formation, and skill acquisition
The type of relationship that exists in associative or network to optimize scaffolding in new knowledge construction);
governance models between government and partners or content domains architecture (e.g., superordinate concepts,
stakeholders, and vice versa. (Kaufman, 2005) subordinate concepts, rules, principles); teaching strategy
(e.g., individual vs. group learning, passive learner/
Governmental Agency expository vs. active leaner/discovery, inductive vs.
A branch, division, or department of a local, regional, or deductive, tutorial vs. simulation, abstract vs. problem
national government that carries out one or more duties or oriented, synchronous online chat vs. asynchronous
activities in support of the public good. Such duties often threaded discussions, etc.); media design and utilization
involve regulating aspects of commerce, public health, (e.g., relative size and complexity of single components or
safety, and so forth. (Baim, 2006a) combined components; type of media element including
text, graphics/visuals, audio, animation, degree of user
GPL: See General Public License. control, etc.); and learner assessment (e.g., conventional
declarative-convergent testing using multiple-choice,
GPON: See Gigabit PON. matching, and short-answer questions vs. holistic,
constructivist-divergent portfolios with demonstration
GPRS: See General Packet Radio Service. work-product artifacts from individual and group projects,
internships, and service learning). (Lasnik, 2005) 3: Refers
GPS: See Geographic Position System; Global Positioning to the size of a shareable learning object. The smaller the
System; Global Positioning Satellite. learning object, the greater the granularity it has. Smaller
learning objects have a greater opportunity for reusability.
Grammars (Stavredes, 2005b) 4: The level of detail of the facts stored
A set of formal rules that deine how to perform inference in a data warehouse, or a concept in the database. (Nigro
over a dictionary of terms. (Caelli, 2005) & Gonzlez Csaro, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Gra ph Gravit y M ode l 291
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
292 Gra y M a rke t ing Group De c ision Suppor t Syst e m (GDSS)
In the model, the intensity of interaction (e.g., trips, purchases of goods and services. (Dholakia & Kshetri,
migration, or communication) is positively related to the 2005)
G sizes of objects (e.g., population), but inversely related
to the distance or travel time between them. (Wang & Grounded Theory
Lou, 2005) 1: A method used to systematically derive theories of
human behavior from empirical data. (Trauth, 2005b) 2:
Gray Marketing A qualitative research methodology. (Molinari, 2005) 3:
Occurs when products are sold through non-authorized A mutual understanding about problems and tasks for
channels of distribution. (Rosson, 2006) groups of learners. (Berg, 2005f)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Group Ex plore r Groupw a re 293
structured problems. It enables decision makers to analyze computer-based information systems that support and
problem situations and perform group decision-making structure group interaction and facilitate group meetings.
tasks. (Karacapilidis, 2005) 4: Information systems that (Klein, 2005) 6: A system providing computer-based
G
support the work of groups (communication, decision support for group communication, decision making, and
making) generally working on unstructured or semi- work activities of co-located (same time, same place)
structured problems. (Duan & Xu, 2005) 5: A collective of or dispersed (same time, different place; or different
computer-based technologies that are speciically designed time, different place) members of a group. (Chen & Lou,
to support the activities and processes related to multi- 2005)
participant decision making. (Xodo, 2005)
Group Technology (GP)
Group Explorer The concept of grouping parts, resources, or data according
Software used in a group which (in part) enables each to similar characteristics. (Mathieu & Levary, 2005)
participant to directly insert his/her knowledge (in the form
of contributions and causal links) into a group map. Group Groupware
Explorer works with Decision Explorer, which displays 1: A generic term for specialized computer aids designed
the group map on the public screen. (Shaw, 2006) for the user of collaborative work groups. Typically, these
groups are small project-oriented teams that have important
Group Formation tasks and tight deadlines. Groupware can involve software,
The process of creating a suitable group of learners to hardware, services, and/or group process support. (Daassi
increase the learning eficiency for both the individual et al., 2006) 2: Class of technologies that allow groups
peers and the group as a whole. (Devedi, 2006) to communicate and coordinate activities. Typically
network-driven software. (Green et al., 2005) 3: Computer
Group Map software allowing groups, teams, and people in different
A structured representation of the contributions of a range locations to work together and share information. (Mitchell,
of people. The contributions are structured with links 2005b) 4: ICT applications that support communication,
that are agreed by the group members during intensive, coordination, cooperation, learning, and/or social
facilitated discussion of the issues that follow a gathering. encounters through facilities such as information exchange,
(Shaw, 2006) shared repositories, discussion forums, and messaging.
(Verburg et al., 2005) 5: Multi-user software for carrying
Group Potency out communication and collaborative activities. (Neale
A collective belief in the capability of the group to meet et al., 2005) 6: Software applications that help people
a task objective. (Wong & Staples, 2005) work together virtually while being physically located
at a distance from one another. Groupware applications
Group Query and services include the sharing of work schedules, event
It is representative of a group, and the result of grouped calendars, electronic meetings, shared databases, and
queries is computed from the group query. (Khan, group e-mail accounts. (Ruhi, 2006) 7: Software that
2005) supports teams of individuals working together via network
technology, facilitating communication, coordination,
Group Support System (GSS) and collaboration among team members. (Dara-Abrams,
1: An integrated computer-based system composed of a 2006) 8: Software that supports the collaborative efforts
communication subsystem and model-driven DMSS (DSS), of a team to communicate, cooperate, coordinate, solve
to support problem formulation and potential solution of problems, compete, or negotiate. Groupware technologies
unstructured decision problems in a group meeting. are typically categorized along two primary dimensions:
(Forgionne et al., 2005) 2: A set of technologies used to time (synchronous or asynchronous) and place (collocated
help groups in their decision-making processes. (Blanger, or face to face, or non-collocated or distant). (Wild, 2005)
2005) 3: A wide variety of technologies conigured to 9: Speciic software which allows groups of people to
support group interactions. GSS typically features software share information and to coordinate their activities over
and hardware arrangements that facilitate. (Alavi et al., a computer network. (Metaxiotis, 2006) 10: The multi-
2005) 4: Any combination of hardware and software that user software supporting CSCW. Sometimes this term
enhances group work. (Limayem, 2005) 5: Interactive is broadened to incorporate the styles and practices that
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
294 Groupw a re Applic at ion Guild
are essential for any collaborative activity to succeed, GSM: See Global System for Mobile Communication.
whether or not it is supported by computer. (Karacapilidis,
G 2005) 11: The software and technological part of CSCW. GSS: See Group Support System.
It contains application studies and platforms adapted to
groups and supporting group working. (Villemur & Drira, GSS Anonymity
2006 CSCW) 12: This software can be used by a group A key feature usually available in most group support
of people who are working on the same information at systems that allows group members to interact with each
separate workstations. It includes features such as e-mail, other while remaining unidentiied to each other. GSS
shared calendar, task list, and address book, and is used for anonymity masks status and gender cues, and reduces
project management, brainstorming, and action planning. inhibitions. (Klein, 2005)
(Nightingale, 2005) 13: Type of software designed to help
teams that are geographically dispersed who need to work gTLD: See Generic Top-Level Domain.
together. (de Carvalho & Ferreira, 2006)
G2B: See Government-to-Business.
Groupware Application
A class of computer technologies designed to support G2C: See Government-to-Citizen.
communication, collaboration, and cooperation among a
group of knowledge workers. (Chen & Lou, 2005) G2G: See Government-to-Government.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Gulf Coope rat ion Counc il 295
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
296 H .3 2 3 H a m m ing Dist a nc e
H
H.323 to describe individuals who gain unauthorized access to
An ITU-T speciication that deines network protocols, computer systems for the purpose of stealing or corrupting
operations, and components for transporting real-time information or data. Hackers see themselves as the white
video, audio, and data over IP networks such as the Internet hats or the good guys who breach security for the greater
and I2. (Littman, 2005) good. The media at large makes no distinction between a
hacker and a Cracker. (Tassabehji, 2005a) 5: A computer
H-Anim (Humanoid Animation) expert who breaks into a network or computer system
1: Part of VRML speciications consisting of node prototypes with (usually) malicious intent. (De, 2006)
allowing the deinition of an avatar. (Prteux & Preda, 2005)
2: The VRML Consortium Charter for Humanoid Animation Hacking
Working Group recently produced the International Hacking, or entering anothers computer, is a common
Standard, Information TechnologyComputer Graphics method of the cyber-identity thief. (Close et al., 2006)
and Image ProcessingHumanoid Animation (H-Anim),
an abstract representation for modeling three-dimensional Hacktivism
human igures. (Sappa et al., 2005) Clandestine use of hacking for the advance of political
causes. (De, 2006)
HA: See High Availability.
Half-Band Filters
Habermasian Logic A low-pass or high-pass ilter that divides the basis band
The learning process of the human species takes place in two equal bands, and satisies prescribed symmetry
through the accumulation of both technical and moral- conditions. (Mili, 2005)
practical knowledge within social interactions yielding a
logic of growing insight. (Pemberton & Stalker, 2006) Halftone
A method to reproduce photographic images in printed
HAC: See Hierarchical Agglomerative Clustering. media by creating a pattern of dots that change in size to
create the perception of lighter and darker tones. (Snyder,
Hack 2005)
To get access to the contents of a networks database
without permission. (Msiska, 2005) HAM
Legitimate e-mail communication. (Willis, 2005)
Hacker
1: A very knowledgeable computer user who uses his Hamming Clustering
or her knowledge to invade other peoples computers A fast binary rule generator and variable selector able to
through the computer network. (Chen, Holt, et al., 2005) build understandable logical expressions by analyzing the
2: An entity outside of an organization that gains or hamming distance between samples. (Liberati, 2005)
attempts to gain access to a system or system resource
without having authorization to do so. (Wilson et al., Hamming Distance
2006b) 3: Someone who breaks into a computer system The distance between two binary strings (with the same
for fun. (Rowe, 2006c) 4: A slang term for a computer length) given by the number of different bits. (Muselli,
enthusiast or clever programmer, more commonly used 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H a ndhe ld H a rd Te chnology 297
Handheld Haptic
A computer small and light enough to be held in a users 1: Relating to the sense of touch. (Murphy, 2005b) 2: The
hand. (Ketelhut et al., 2005) technology of touch which uses the tactile sense to send
H
and receive data. (Ajiferuke & Markus, 2005)
Handheld Computer
Also called personal digital assistant (PDA); an electronic Haptic Device
device small enough to hold in one hand and lightweight Involves physical contact between the computer and the
enough to carry in a pocket. (Woodruff & Nirula, 2005) user, usually through an input and output device, such as a
joystick or data gloves, that senses the bodys movements.
Handheld Device (Yong & Choo, 2005)
Also known as pen-based computing. (Garrett, 2006b)
Haptic Output
Handheld PC: See Web Pad. A device that produces a tactile or force output. Nearly
all devices with tactile output have been developed for
Handheld Service graphical or robotic applications. (Bourguet, 2006)
The use of a handheld device, such as a Personal Digital
Assistant (PDA) or Pocket PC, as an extension of workstation Hard Case
resources through the use of client-/server-based software A case that cannot be solved by simply applying formal
for access and synchronization in conjunction with rules, either because: (1) the characteristics of the case
wireless access service provider. Handheld services are are not easily matched to the formal rules, (2) the formal
used for electronic prescribing, real-time drug references, rules do not deliver clear conclusions, and/or (3) applying
scheduling, charge capture, and so forth. (OBuyonge & the formal legal rules leads to unacceptable results.
Chen, 2006) (Svensson, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
298 H a rdw a re a nd Soft w a re Wat e r m a rk H e a lt h I nfor m at ion Syst e m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H e a lt h I nsura nc e Por t a bilit y a nd Ac c ount a bilit y Ac t (H I PAA) H e r m e ne ut ic 299
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
300 H e t e roge ne it y H idde n M a rkov M ode l (H M M )
and transformative process of dealing with human be drawn from previous examples of business successes
interpretation of reality, thus its potential for fertile change and failures. Artiicial intelligence models rely on these
H and development at the community and organizational rules to ind relationships, patterns, or associations among
levels. (Nobre, 2006a) variables. (Athappilly & Rea, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H idde n M a rkov Ra ndom Fie ld (H M RF) H ie ra rchy of Lea r ning 301
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
302 H igh-Alt it ude St rat osphe re Plat for m (H ASP) H ist ogra m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H ist oric a l Cost H OBBit Dist a nc e 303
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
304 H oldout Te chnique H orizon of Obse r vat ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H orizont a l a nd Ve r t ic a l Proje c t ions H orizont a lly Pa r t it ione d Dat a 305
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
306 H or n Cla use H 2 DV
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H U H um a n Pe rc e pt ua l M ode l 307
HU: See Hypothetical Update. minds of employees. (Hsu & Mykytyn, 2006) 2: Relects
a human potential in knowledge, skills, and attitude
Hub that can provide better solutions (meaning), eficiency
H
1: A Web site that provides collections of links to (time), and effectiveness (money) of work. (Targowski,
authorities. (Hu et al., 2005b) 2: A centralized location 2005) 3: The attributes, competencies, and mindsets of
where activities or interactions take place. (St.Amant, the individuals that make up an organization. (Smith,
2005b) 3: A term for Web pages in link analysis. In 2006b) 4: The knowledge and knowing that exists within
contrast to an authority page, a hub page does not contain a particular unit which could be a team, an organization,
high-quality content itself, but links to the authorities. A an industry, or even a society. (Newell, 2006) 5: The
hub represents an excellent information provider and may knowledge, skills, abilities, and experiences of employees
be a clearinghouse or a link collection. The high quality that provide value-added contributions for a competitive
of these pages is shown by the information sources they advantage in organizations. (Wong-MingJi, 2005) 6: The
contain. (Mandl, 2006) unique capabilities and knowledge of individuals that aid
productivity. (Ridings, 2006b) 7: Individual skills and
Hub Company capabilities that allow actors to act in new and innovative
A lead company in a supply chain or value network that ways, and to respond to new challenges with creative
organizes and manages the work for end products and/or solutions. (von Wartburg et al., 2006)
services. This is, for example, an automotive manufacturer,
an aircraft manufacturer, a clothing manufacturer, or major Human Capital Index
food supplier. These are usually large companies, but can A measurable deinition of human capital is deined by
be small if the end product is in building construction, for the product of competence and commitment. While
instance. Usually the manufacturing and services chain is they align with business strategy, competencies need to
complex and contains many sub-products that have to be be generated through more than one mechanism, such
drawn together with processes and services to meet design- as buy, build, borrow, bounce, and bind. Commitment is
to-manufacture targets and delivery excellence. In a value concerned with how employees relate to each other and
network the tier N suppliers are part of the collaborative feel about a irm. (Hsu & Mykytyn, 2006)
network. It is to be noted that communication in the old
economy was EDI and in the new economy will be fully Human Ecology
open system interoperable ICT. (Richards et al., 2005) In a holistic vision of the environment, human ecology
is an approach to read changes and transformation in
Hub Page action; a way of integration of history, culture, and work
One of the pages that contain a large number of links to in peripheral regions in a communicative and distance-
pages that contain information about the query topics. exchange perspective; a tool for creating conditions for
(Lee-Post & Jin, 2005a) sustainable development. (Giorgi & Schrch, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
308 H um a n Pe rfor m a nc e Te chnology (H PT ) H um a noid Anim at ion (H -Anim )
media by watermarking without being perceived. (Si & reliability, consistency, portability, naturalness, and
Li, 2006) users subjective satisfaction. (Pantic, 2005a) 5: The
H study of how humans interact with computers, and how
Human Performance Technology (HPT) to design computer systems that are usable, easy, quick,
The systematic and systemic identiication and removal and productive for humans to use. (Janvier & Ghaoui,
of barriers to individual and organizational performance. 2006) 6: The study, planning, and design of what happens
(Banerji & Scales, 2005) when humans and computers work together. (Laghos &
Zaphiris, 2005a)
Human Resource Information System
An integrated system used to gather and store information Human-Computer Interface
regarding an organizations employees. (Troutt & Long, 1: A software application, a system that realizes human-
2005) computer interaction. (Pantic, 2005a) 2: Integrated
computing environment that allows the data miner to
Human Resources (HR) access the data visualization instruments, select data sets,
All activities of planning, staffing, appraisal and invoke the query process, organize the screen, set colors
remunerating, improving employees and the working and animation speed, and manage the intermediate data-
environment, and establishing and maintaining working mining results.(S. Wang & H. Wang, 2005)
relationships. (Dery & Samson, 2005)
Human-Machine System (HMS)
Human Right Based on the acceptance of an interaction between human
One of those rights that all humans have simply by reason and machine, it is a summary of all elements of hardware,
of being human, without regard to an individual government software, and useware. The term includes the micro (UI)
units laws. (Gilbert, 2005) and macro (organization) aspects of a human-machine
system. (Rse, 2006b)
Human-Centered Design
1: An alternative name for user-centered design (UCD) Humanistic Value
used in ISO process standards. (Knight & Jefsioutine, OD promotes humanistic values through empowerment
2006) 2: The process of designing sociotechnical systems that is, by articulating values designed to facilitate
(people in interaction with technology) based on an analysis visioning, organizational learning, and problem solving
of how people think, learn, perceive, work, and interact. in the interests of a collaborative management. Values are
(Sharples, 2006) seen to be central to promoting trust, collaboration, and
openness. (Grieves, 2006a)
Human-Computer Interaction (HCI)
1: A discipline concerned with the design, evaluation, Human/Problem-Sensitivity
and implementation of interactive computing systems The proximity to the human-centered/problem-oriented
for human use and with the study of major phenomena concepts, as opposed to the computer-centered/software-
surrounding them. (Debbabi & Baile, 2006) 2: A ield oriented concepts (i.e., computer/software solution-
of research and development, methodology, theory and sensitivity). (Andrade et al., 2006a)
practice with the objective of designing, constructing, and
evaluating computer-based interactive systemsincluding Humanoid
hardware, software, input/output devices, displays, An automaton that resembles a human being. (Yong &
training and documentationso that people can use Choo, 2005)
them eficiently, effectively, safely, and with satisfaction.
(Singh, 2005b) 3: Study of human behavior in interacting Humanoid Animation (H-Anim)
with any computer-based device. HCI is concerned 1: Part of VRML speciications consisting of node
with identifying ways to optimize, such as through the prototypes allowing the deinition of an avatar. (Prteux
design of technology, the relationship between humans & Preda, 2005) 2: The VRML Consortium Charter for
and computers. (Carstens, 2005) 4: The command and Humanoid Animation Working Group recently produced
information low that streams between the user and the the International Standard, Information Technology
computer. It is usually characterized in terms of speed, Computer Graphics and Image ProcessingHumanoid
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H um a nw a re H ybrid M ode l of I nve st m e nt Privat izat ion Funds 309
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
310 H ybrid M ult iple -Ac c e ss (H ybrid M A) H ype rlink Ana lysis
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H ype r m e dia H ype r t ex t 311
underlying the Web pages or hyperlinking practices within brought together through the communication networks,
Web communities. (Thelwall, 2006) and work or play together as if they were at the same place.
(Terashima, 2005)
H
Hypermedia
1: Often taken as synonymous with hypertext, though HyperSchool/HyperCollege/HyperUniversity
some authors use hypermedia to refer to hypertext The term hyper means that these institutions could exist
systems that contain not just text data, but also graphics, in HyperReality. HyperReality is where virtual reality and
animation, video, audio, and other media. Principal physical reality seamlessly intersect to allow interaction
deining features of a hypermedia system are a highly between their components, and where human and artiicial
interactive, visual, media-rich user interface and lexible intelligences can communicate. The technological
navigation mechanisms. Hypermedia is a specialized capability for this is at an experimental stage, but could
type of interactive digital multimedia. (M. Lang, 2005) be made available with broadband Internet. (Rajasingham
2: A term used to describe the interlinking of textual & Tifin, 2005)
information and other forms of media, such as audio,
video, and photographic images. (Theng, 2005) 3: A Hyperspace
computer-based information retrieval system that enables 1: Information spaces interlinked together with hypermedia
a user to gain or provide access to texts, audio and video structures. Concerning the World Wide Web, the term
recordings, photographs, and computer graphics related to cyberspace is sometimes used instead of hyperspace. (Suh
a particular subject. (Rahman, 2005c) 4: An extension of & Kim, 2005) 2: Space with more than three dimensions.
hypertext that supports linking graphics, sound, and video (Murphy, 2005b) 3: Users view of the Semantic Web
elements, in addition to text elements. (Sala, 2005b) 5: The environment, which provides information and action
style of building systems for information representation services mainly through hypermedia pages. (Liu &
and management around the network of multimedia nodes Koppelaar, 2005)
connected together by typed links. (Garca et al., 2006)
6: A way of organizing data as a network of nodes and Hypertext
links. (Lemahieu, 2005) 1: Any text that contains links to other documents. (Lee-
Post & Jin, 2005a) 2: A collection of documents containing
Hypermedia Authoring Tool cross-references that, with the aid of a browser program,
Authoring tools for hypermedia systems are meant to allow the reader to move easily from one document to
provide environments where authors may create their another. (Vician & Buche, 2005) 3: A collection of electronic
own hypermedia systems in varying domains. (Garca texts connected through electronic links. In addition to
et al., 2006) text, the documents also may contain pictures, videos,
demonstrations, or sound resources. With the addition of
Hypermedia Design Methodology (HDM) such media, hypertext often is referred to as hypermedia.
1: Developed by Polytechnic of Milan (Italy), it is a (Shapiro, 2006) 4: A term conceived and coined by Ted
methodology to design hypermedia applications. (Paiano, Nelson, who described it as interactive branching of
2005) 2: The modeling language used by W2000 to describe text information structured into non-sequential format
the information, navigation, and presentation aspects of a into nodes and links. The nonlinear nature of hypertext
hypermedia application. (Bochicchio & Fiore, 2005) provides freedom to readers who enjoy associational
thinking and reading. (Theng, 2005) 5: An approach to
Hypermedia-Based Learning information management in which data is stored as a
Learning in hypermedia environments, allowing nonlinear network of inter-related nodes (also commonly known
access to information through links provided within text, as documents or pages) that may be purposefully
images, animation, audio, and video. It is considered navigated or casually browsed in a nonlinear sequence by
lexible, where varied instructional needs can be addressed. means of various user-selected paths, following hyperlinks.
(Chambel & Guimares, 2005) These hyperlinks may be hardcoded into the system or
dynamically generated at run-time. (Lang, M., 2005)
HyperReality 6: The presentation of information as a linked network
Providing a communication environment where of nodes that readers are free to navigate in a nonlinear
inhabitants, real or virtual, at different locations, are fashion. It allows for multiple authors, a blurring of the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
312 H ype r t ex t M a rk up La ngua ge (H T M L) H ypot he sis Te st (i ng)
author and reader functions, extended works with diffuse Hypertext Structure
boundaries, and multiple reading paths. (Sala, 2005a) 7: Organization structure described by Nonaka, distinguishing
H The organization of information units as a network of a functionally organized, hierarchical, and bureaucratic
associations, which a user can choose to resolve. Hypertext business system layer for regular knowledge exploitation; a
links are the instances of such associations. (Martnez- project layer for development work; and a knowledge base
Gonzlez, 2005) layer connecting the irst two layers. (Hendriks, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
H ypot he t ic a l Re a soning H ypot he t ic o-De duc t ive Re a soning 313
Hypothetico-Deductive Reasoning
In a particular situation, applying relevant knowledge of
principles and constraints, and visualizing, in the abstract,
the plausible outcomes that might result from various
changes one can imagine to be imposed on the system.
(Donnelly, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
314 i-m at e I CM
I
i-mate IBSS: See Independent Basic Service Set.
A PDA device manufactured by Carrier Devices with an
integrated GSM cellular phone and digital camera. The IBT: See Identiication-Based Trust.
device also incorporates a built-in microphone and speaker,
a secure digital expansion card slot, and Bluetooth wireless IC: See Integrated Circuit; Intellectual Capital;
connectivity. (Garrett, 2006a) Interaction Channel.
.
i-mode ICA: See Independent Component Analysis.
1: A packet-switching wireless technology, used by NTT
DoCoMo (Japan). A range of commercial and inancial ICALL: See Intelligent Computer-Assisted Language
services are offered, including browsing the Web from Learning.
a mobile phone. (Petrova, 2006) 2: A wireless Internet
service for mobile phones using HTTP, popular in Japan and ICAT:
increasingly elsewhere (i.e., the United States, Germany, Internet Categorization of Attacks Toolkit. (Cardoso &
Belgium, France, Spain, Italy, Greece, Taiwan, etc.). It was Freire, 2005)
inspired by WAP, which was developed in the U.S., and it
was launched in 1999 in Japan. It became a runaway success ICD-10: See International Statistical Classiication of
because of its well-designed services and business model. Diseases and Related Health Problems, Tenth Revision.
(Lalopoulos et al., 2005a) 3: Brand name for voice plus a
wide range of data services delivered by NTT DoCoMo ICDL: See International Computer Driving License.
in Japan. (Gilbert, 2005b) 4: The full-color, always-on,
packet-switched Internet service for cellular phone users Iceberg Cubes
offered by NTT DoCoMo. With i-mode, cellular phone The set of cells in a cube that satisies an iceberg query.
users are able to access to tens of thousands of Internet (Abdulghani, 2005b)
sites, as well as specialized services such as e-mail, online
shopping and banking, ticket reservations, and restaurant Iceberg Distance Join
advice. (Hu, Yang, & Yeh, 2006) 5: The packet-based A spatial query involving two spatial datasets, a distance
service for mobile phones offered by Japans leader in threshold d, and a cardinality threshold K (K1). The
wireless technology, NTT DoCoMo. The i-mode protocol answer is a set of pairs of objects from the two input datasets
uses compact HTML (cHTML) as its markup language that are within distance d from each other, provided that
instead of WAPs wireless markup language (WML) to the irst object appears at least K times in the join result.
provide mobile phone voice service, Internet, and e-mail. (Corral & Vassilakopoulos, 2005)
(Lei, 2006)
Iceberg Query
IAB: See Internet Architecture Board. A query on top of a cube that asks for aggregates above
a certain threshold. (Abdulghani, 2005b)
IB: See Integration Broker.
ICM: See Intellectual Capital Management.
IBL: See Inquiry-Based Learning.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I CM P M e ssa ge I DEF0 N ot at ion 315
ICMP Message: See Internet Control Message Protocol ICT-Based Development Projects: See Information
Message. and Communication Technology-Based Development
Projects.
I
ICMS: See Intellectual Capital Management System.
ICT-Enabled Knowledge Management: See
Icon Information and Communication Technology-Enabled
1: In computer science, the icon is a graphic symbol (usually Knowledge Management.
a simple picture) that denotes a program, command,
data ile, or concept in a graphical user interface. (Sala, ICT Indicator: See Information and Communication
2005b) 2: A principal feature of GUIs, an icon is a small Technology Indicator.
picture representing an object, ile, program, user, and so
forth. Clicking on the icon will open whatever is being ICT in E-Procurement: See Information and
represented. (Henley & Noyes, 2006) Communication Technology in E-Procurement.
ICR: See Intelligent Call Routing. ICT in Teaching: See Information and Communication
Technology in Teaching.
ICT: See Information and Communication Technology.
ID: See Instructional Design.
ICT Alliance: See Information and Communication
Technology Alliance. Idea-Generation Tool
A technology designed to stimulate thinking and
ICT Architecture: See Information and Communication association. Enables users to detect hidden patterns from
Technology Architecture. mounds of data and discover relationships among entities.
(Chua, 2006)
ICT as a Cognitive Partner: See Information and
Communication Technology as a Cognitive Partner. Ideal Model
A virtual setting where all parties interact with an
ICT Diffusion: See Information and Communication incorruptible trusted party who carries out the joint
Technology Diffusion. computation for them. (Lindell, 2005)
ICT Infrast ruct ure: See Infor mation and Ideal Type
Communication Technology Infrastructure. An abstraction from the particulars and the idiosyncrasies
of the world which produce statements of general validity,
ICT Integration: See Information and Communication and we know some part of the world because of its character
Technology Integration. as ideal typical knowledge. (Shariq & Vendel, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
316 I DEF1 X I EEE 8 0 2 .1 1 b
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I EEE 8 0 2 .1 x St a nda rd I m a ge Copyright 317
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
318 I m a ge Dat a M ining I m m e diat e M a int e na nc e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I m m e rsion I m ple m e nt at ion Risk 319
Immersion Imperceptibility
1: A quality of a system, usually a computer-generated After a message is hidden in a carrier, it is dificult for a
world consisting of a set of technological factors that viewer or listener to distinguish between the carrier that
I
enable users to experience the virtual world vividly and contains the hidden message and those that do not. (Lou
exclusively. (Sas, 2006) 2: Relects the degree to which a et al., 2006)
community members behavior is dominated by the state
of low caused by human-machine interaction. (Signoret, Imperceptible
2006) Not easily detectable with the human visual system. (Chen,
Chen, Ma, et al., 2005)
Immersion School
A language or culturally based school that allows students Imperfect Knowledge
to study all or most subjects in a language other than their The imperfection of knowledge has to do with its
own. These are typically schools within a school district incompleteness (absence of a value), with its imprecision
or programs within a particular school. (Glick, 2005b) (lack of precision in a value), and with its uncertainty (doubt
on the truthfulness of a fact). (Analide et al., 2006)
Immersive IntraVascular UltraSound (IVUS)
Image Implementation
The real-time cross-sectional image obtained from a 1: The code placed inside of methods. For some languages,
pullback IntraVascular UltraSound transducer in human this code is pre-compiled or interpreted. (D. Brandon,
arteries. The dataset is usually a volume with artifacts Jr., 2005a) 2: The implementation of information system
caused by the complicated immersed environments. (Liu includes different phases: user needs and requirements
et al., 2005) analysis (speciication), system design, and initial system
implementation and testing. The system requirements
Immersive IVUS Image: See Immersive IntraVascular analysis includes worklow analysis; the initial system
UltraSound Images. implementation includes technical installation of
information system, integration of the information
Immersive System system to other information systems, and users training.
A system that provides the graphical illusion of being in (Hyrinen & Saranto, 2005)
a three-dimensional space by displaying visual output in
stereo and in a three-dimensional perspective according Implementation of an Innovation
to head position, and by allowing navigation through the The process of mutually itting innovation and organization
space. (Modrk & Marcn, 2006) to one another until the it is so good that the (former)
innovation is routine. (Klobas & Renzi, 2005a)
Impacted Domain
The area affected by a change to the pivot domain. (Abou- Implementation Quality
Zeid, 2005a) The outcome of an IT installation in an organization,
where operational success can be indicated by increased
Impaired Learner internal organizational performance and eficiency, better
A learners hampered by physical or psychological customer service, and higher quality working life within
deiciencies. (Utsi & Lowyck, 2005) the organization, although other traditional indicators
are increased proits, greater market share, and improved
Imperative Mode return on investment performance. (Winston & Dologite,
Command-oriented languages such as Fortran and Cobol 2005)
that use the commands, DO, GO TO, and so forth. (Murthy
& Krishnamurthy, 2005c) Implementation Risk
A risk derived from poor business practices such as
Imperative or State-Oriented Formal Speciica- lack of training, lack of uniform standards, quality, and
tion Language procedures that causes dissatisfaction among trading
Allows the use of variables. (Dasso & Funes, 2005) partners. (Ratnasingam, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
320 I m plic it Edit I n-Se r vic e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I na pplic a ble Re sponse I nc om ple t e Cont ra c t (Flex ibilit y) 321
Inapplicable Response (or multiple places in the same program). (D. Brandon,
Respondents omit an answer due to doubts of applicability. 2005a)
(Brown & Kros, 2005)
I
Inclusion
Incentive A classroom design where all students should take part
1: An intrinsic or extrinsic motivational factor that impacts and attend regular classes. Generally, an ESE and
faculty decisions to participate in distance education. regular education teacher work together with the same
(Dooley et al., 2005) 2: An attractive inducement offered group of students, including students with disabilities
to providers of services to be more eficient. (De, 2005) 3: and general education students. Both of the teachers share
Any factor that inluences action or behavior by its presence the responsibility for all of the students. (T. Cavanaugh,
or absence. (Marcinkiewicz & McLean, 2005a) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
322 I nc om ple t e Dat a I nde pe nde nt Ba sic Se r vic e Se t (I BSS)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nde pe nde nt Busine ss-t o-Busine ss M a rke t pla c e (or E-M a rke t pla c e ) I ndisc e r nibilit y Re lat ion 323
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
324 I ndividua l I ndividua lize d I nst ruc t ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I ndividua lize d Te m pe ra m e nt N e t w ork I ndust ria lize d N at ion 325
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
326 Industry Certiication Infocracy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfode sign I nfor m at ion 327
then designed to support the structure and reinforce the at the discretion of the mentor and protg, and persists as
power relationships. In an infocracy, information lows long as the parties involved experience suficient positive
from point of origin to point of use, without regard to outcomes. (Long et al., 2005)
I
structure or pre-determined power relationships. As such,
the organizational structure evolves to support required Informatic
information lows. (Gordon & Mulligan, 2005) Term used in Latin America as an equivalent to computer
based. (Barrera, 2005)
Infodesign
A broad term for the design tasks of deciding how to Informatics Project
structure, select, and present information. (Roibs, One of a number of projects that involve in any way
2006a) possible the use, design, delivery, implementation, and
management of information technology irrespective of
Infolink the element involved, including software, hardware, and
The human resources department Web site on the intranet. so forth. (Kamel, 2005a)
(Al-Gharbi & Khalfan, 2005)
Information
Infomediary 1: A process with data as input and knowledge as output.
A combination of the words infor mation and An individual is the subject who transforms the data into
intermediary. Infomediary refers to a vehicle (e.g., a Web knowledge. Relations between two technical devices are
site) that can collect and provide information. A virtual data exchange processes. Relations between two or more
community provides the functions of an infomediary individuals are communication processes. The reverse
in several ways. It is an information source of product information process is called documentation process (e.g.,
and service to consumers, and an information source writing an article). (Hofer, 2006) 2: Data with context
of consumers needs to the business. (Wang, Wei, et al., and utility. (Hoxmeier, 2005) 3: A comparative unit of
2006) cognition that deines a change between the previous and
present state of the natural, artiicial, or semiotic systems.
Informal Communication (Targowski, 2005) 4: A message, or data, which makes
Communication that is neither institutionally planned nor a difference. Information has meaning, and becomes
functionally deined, but opportunistic and spontaneous. knowledge when a person internalizes it. (Huotari &
(Beuschel et al., 2005) Iivonen, 2005) 5: Commonly known as a collection of facts
or data. In Computer Science, it refers to processed, stored,
Informal Leader or transmitted data. In Knowledge Management, it refers
One who demonstrates substantial leadership behavior to codiied knowledge. (Theng, 2005) 6: Contextualized
even though not oficially appointed or designated to hold data that can be analyzed and applied to decision-making
such authority. Informal leaders often emerge tacitly from circumstances. (Taylor, 2005) 7: Data that is associated
within a group. (Cargill, 2006a) with some system that enables meaning to be derived by
some entity. (Benyon, 2006) 8: Data with attributes of
Informal Learning relevance and purpose. (Joia, 2005) 9: In intelligence usage,
1: Learning anytime, everywhere in a non-organized unprocessed data of every description which may be used
way, where most of the time learning is unidentiied and in the production of intelligence. (Melkonyan, 2005) 10:
without recognition. (Lambropoulos, 2006b) 2: Learning Interpreted symbols and symbol structures that reduce both
that takes place often in work settings without any formal uncertainty and equivocality over a deined period of time.
structure; often considered to be a main way that people (Hirji, 2005) 11: Knowledge acquired through experience
learn at work. (Berg, 2005h) or study. (Drake, 2006) 12: Knowledge derived from
reading, observation, or instruction, at times consisting
Informal Mentoring of unorganized or unrelated facts or data. Data endowed
The non-assigned pairing of an experienced person who with relevance and purpose, for example, a irms balance
respects, guides, protects, sponsors, promotes, and teaches sheet and income statement. (Mockler & Dologite, 2005)
younger, less experienced personnel; it develops naturally 13: A term referring to details about an event or situation
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
328 I nfor m at ion About Obje c t I nfor m at ion a nd Com m unicat ion Te chnology Archit e c t ure
in the past or simply a scientiic fact. Information can be addition to Internet-based technologies such as computers,
regarded as a piece of knowledge of an objective kind. It telephones, and networks, ICTs in a broad sense include
I results from placing data within some meaningful context, digital television, cable and satellite technologies, and
often in the form of a message. It is purely descriptive and music formats (e.g., MP3), DVDs, and CDs. ICTs may be
explicit, does not enable decisions or actions, nor does it used to facilitate remote human interaction for good and evil
trigger new questions. (Haghirian, 2006) purposes. ICTs are used to increase human communication;
broaden education, literacy, and knowledge; and enhance
Information About Object social, cultural, political, and economic capacity. It is
x in a given information system (U,A) is deined by hoped that this will help address problems attributed
InfA(x)={(a,a(x)): aA}. (Pawlak et al., 2005) to the so-called digital divide. (Malina, 2005) 4: A
sector including a great variety of technologies such as
Information Age desktop and laptop computers, software, peripherals, and
A label given to the post-Cold War sociological and connections to the Internet that are intended to fulill
economic conditions of the world, which are driven by information processing and communications functions.
technology and information. (Reynolds, 2005) (Chochliouros & Spiliopoulou-Chochliourou, 2006) 5:
The amalgam of computing, telecommunications, and
Information Agent data networking technologies used to handle information
Program capable of retrieving information from a remote and communication. It is the convergence of information
Web site by means of Internet protocols, storing it in a technology, telecommunications, and data networking
data repository and using it for executing speciic tasks. technologies into a single technology. It encompasses
(Castro & Braga, 2006) an array of hardware and software such as computers,
digital cameras, CD-ROMs, radio, television, video and
Information and Communication System of Local digital cameras, digital media, the Internet, e-mail, word
and Regional Development processing, databases, the Internet, e-business, and e-
A system that combines all the subjects on the basis commerce. (Magagula, 2005) 6: Refers to the utilization
of common principles to realize information and of technology to process and access information, and to
communication interaction for local and regional assist and facilitate communication. (Bodomo, 2005b)
development. (Molodtsov, 2005) 7: Includes ICT equipment (computer hardware, end-
user communications equipment, ofice equipment and
Information and Communication Technology datacom, and network equipment) plus software products,
(ICT) IT service, and carrier services. (Damaskopoulos &
1: The technological convergence between digital Gatautis, 2006) 8: A range of goods, applications, and
computing, telecommunications, and broadcasting. services used for producing, distributing, processing, and
Whereas computers were largely focused on the processing transforming information, including telecommunications,
of information, ICT undertakes both processing and television and radio broadcasting, computer hardware and
communication of information. (Moodley, 2005) 2: A software, computer services, the Internet, electronic mail,
generic term used to encapsulate the diverse range of and electronic commerce. (Rhodes, 2005)
technological developments (e.g., computer storage and
retrieval, computing capacity, wired communications, Information and Communication Technology
wireless communications, portable technologies) that Alliance
have enhanced the internal and external activities of A partnership between two or more nation states to share
organizations. Especially important is the manner in which knowledge and resources in the area of ICT developments.
these strands of technological development have been (Toland, Purcell, et al., 2005)
integrated to provide greater synergy. (Ritchie & Brindley,
2005) 3: While often meaning different things in different Information and Communication Technology
timescales, places, and contexts, ICTs describe all media Architecture
and a mix of converging technology tools involved in the The ICT architecture provides a conceptual model,
dynamic transfer and storage of analog and digital data. In specifying (at a general level) the parts of an ICT
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I CT a s Cognit ive Pa r t ne r I CT-Ba se d Deve lopm e nt Proje c t 329
infrastructure (applications, databases, technological ICT diffusion of courseware, and to communication between
elements) and their relations. In this chapter we concentrate teachers and students, including communication between
on the application and database parts. (Achterbergh, teachers and between students by electronic means. (El
I
2005b) Louadi, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
330 I CT-Ena ble d K now le dge M a na ge m e nt I nfor m at ion Ec onom y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Engine e ring I nfor m at ion H iding 331
and data as its primary activities. (Hantula & DeRosa, Information Filtering System
2005) 2: An economy dominated by information-related A system whose goal is to deliver to a user only this
activities. (Ajiferuke & Olatokun, 2005) 3: A concept information that is relevant to her/his profile; the
I
created to illustrate a fundamental change in the business system operates on large streams of unstructured data.
environment. The nature of the economy has changed as (Abramowicz et al., 2006)
measured by the informational (intangible) elements of
our products, services, and production processes, and the Information Format
proportion of the workforce whose primary activities are The arrangement and appearance of information. Format
informational. Information has become the most important includes both the media used and the style of presentation.
resource upon which the eficiency and competitiveness of (McGill & Dixon, 2005)
all organizations depend. This is true in not only services
or high-tech industries, but also across the board in primary Information Gain
and manufacturing industriesand in both private and Given a set E of classiied examples and a partition P =
public sectors. (Kimble & Li, 2006) {E1, ..., En} of E, the information gain is deined as
n
| Ei |
Information Engineering entropy(E ) entropy(Ei ) *
Proper design of information low, its management, its i =1 |E|
use, and its maintenance. (Szczerbicki, 2005)
where |X| is the number of examples in X, and
Information Exchange
m
entropy ( X ) = p j log 2 ( p j )
Putting ideas and concepts in the correct formats and
getting them circulated to other persons can be termed j =1
as information exchange. However, experiences and prior
knowledge about the content are essential for making it (assuming there are m classes in X and pj denotes the
become knowledge. (Rahman, 2006) probability of the jth class in X). Intuitively, the information
gain measures the decrease of the weighted average
Information Extraction impurity of the partitions E1, ..., En, compared with the
1: A process of extracting data from the text, commonly impurity of the complete set of examples E. (An, 2005)
used to ill the data into ields of a database based on
text documents. (Mladeni, 2005) 2: An information Information Gap
extraction task is to extract or pull out user-deined and A gap that exists between the amount and types of
pertinent information from input documents. (Chang & information received and needed by members of the
Hsu, 2005) 3: The process of pulling out or extracting community. (Gnaniah, Songan, et al., 2005)
relevant or predeined types of information from a set of
documents. The extracted information can range from a Information Granularity
list of entity names to a database of event descriptions. The data structure that can be classiied. (Gabillon,
(Lee-Post & Jin, 2005a) 4: The process of using a computer 2005)
to automatically extract speciic facts and rules from texts.
(Kulyukin & Nicholson, 2005) Information Heterogeneity
The differences in syntax, structure, and semantics used in
Information Filtering different information systems. (Karimi & Peachavanish,
Filtering information from a dynamic information space 2005)
based on a users long-term information needs. (Parmar
& Angelides, 2005) Information Hiding
The umbrella term referring to techniques of hiding various
Information Filtering Agent forms of messages into cover work. (K. Chen, 2005)
Intelligent agent that applies user-input preferences
autonomously to screen passively and sort information.
(Gates & Nissen, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
332 I nfor m at ion I nt e grat ion I nfor m at ion Proc e ssing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Proc e ssing T he or y (I PT ) I nfor m at ion Re t rieva l (I R) 333
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
334 I nfor m at ion Re t rieva l Age nt I nfor m at ion Soc ie t y
typically textual documents. Although its deinition including those measures necessary to detect, document,
includes multimedia retrieval (since information items and counter such threats. (Mitrakas, 2006)
I can be multimedia), the conventional IR refers to the work
on textual documents, including retrieval, classiication, Information Security Management
clustering, iltering, visualization, summarization, and A framework for ensuring the effectiveness of information
so forth. The research on IR started nearly half a century security controls over information resources; it addresses
ago; it grew fast in the past 20 years with the efforts of monitoring and control of security issues related to security
librarians, information experts, researchers on artiicial policy compliance, technologies, and actions based on
intelligence, and other areas. A system for the retrieval of decisions made by humans. (Hentea, 2005b)
textual data is an IR system, such as all the commercial
Web search engines. (Li et al., 2005) 4: The process of Information Security Management System
discovering and indexing the relevant documents from (ISMS)
a collection of documents, based on a query presented A part of the overall management system, based on
by the user. (Lee-Post & Jin, 2005a) 5: A discipline that a business risk approach, to develop, implement,
deals with inding documents that meet a set of speciic achieve, review, and maintain information security. The
requirements. (Cunningham & Hu, 2005) 6: A technology management system includes organizational structure,
that can retrieve useful information effectively for some policies, the planning of activities, responsibilities,
themes from the Internet by artiicial or automatic method. practices, procedures, processes, and resources. (Tong
(Chen, Tsai, et al., 2005) 7: Denotes the attempt to match a & Wong, 2005a)
set of related documents to a given query using semantic
considerations (e.g., library catalog systems often employ Information Security Policy
information retrieval techniques). (Peter & Greenidge, A document that outlines the basic rules of safe processing
2005a) 8: Concerned with the representation of knowledge and dissemination of information. (Janczewski &
and subsequent search for relevant information within Portougal, 2005)
these knowledge sources. Information retrieval provides
the technology behind search engines. (Mandl, 2006) Information Service
1: Providing users up-to-date information (e.g., information
Information Retrieval Agent of weather, news, sports, mapping, etc.). (Lee & Pai, 2005)
An intelligent agent that searches for and collects 2: The activity of providing information products and
information autonomously based on user-prescribed related services according to users needs. In a broader
criteria. (Gates & Nissen, 2005a) sense, it refers to providing users with information through
any form of product or service. (Lai et al., 2005)
Information Sector
A component of the information economy. The primary Information Shopping
information sector includes those who develop hardware, The gathering of auction information, including the time
software, and information systems. The secondary and place of the auction and other related information.
information sector includes those engaged in information (Guan, 2006a)
processing activities in the course of doing work related
to some other primary activity such as insurance claims Information Society
processing. (Trauth, 2005a) 1: A context in which people interact with technology
as an important part of life and social organization to
Information Security exchange information. (Demediuk, 2005) 2: A societal
1: Domain of knowledge dealing with issues of preserving transformation in which information is the key resource.
conidentiality, integrity, and availability of information. (Trauth, 2005a) 3: A society in which economic and
(Janczewski & Portougal, 2005) 2: The protection of cultural life is integrated by complex communication
information systems against unauthorized access to or networks, and critically dependent on information and
modiication of information, whether in storage, processing, communications technologies. (Rahman, 2005b) 4: A
or transit, and against the denial of service to authorized society in which information is used heavily in the everyday
users or the provision of service to unauthorized users, life of most citizens. (Ajiferuke & Olatokun, 2005) 5:
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Sourc e I nfor m at ion Syst e m (I S) 335
A society that is very much affected by the innovations Information System (IS)
and advancements in information and communication 1: A system that communicates, transforms, and preserves
technology management and applications, and is gaining information for human users. An information system
I
more ground within the development and diffusion of the comprises one or more computerized data systems along
global digital economy. (Kamel, 2005b) 6: Communal with their human users, operators, and maintainers.
interaction based on the global informational systems of (Opdahl, 2005) 2: A system that uses IT to capture, transmit,
the Internet and the World Wide Web. Social relationships store, retrieve, manipulate, or display data for business
are informational lows, and people are informational processes in an organization. (Aurum, 2005) 3: A collection
entities or links. (Skovira, 2005) of organized procedures collecting, storing, processing,
and retrieving data. It provides information to support the
Information Source organization. (Szczerbicki, 2005) 4: A collection of sources
1: An organization or person from which information containing potential information. Information systems can
is obtained. (McGill & Dixon, 2005) 2: The source be of variable structure and size, from small bibliographic
from where information is obtained by members of the catalogs to the Web itself. (Pharo & Jrvelin, 2005) 5:
community, such as relatives, friends, government oficers, A system consisting of functions for input, processing,
teachers, community leaders, outside visitors, and the storing, output, and presentation of information. (Avdic,
grapevine. (Gnaniah et al., 2005a) 2005) 6: A pair (U,A) where U is the universe of objects
and A is a set of attributesthat is, functions on U with
Information Space values in respective value sets Va for aA. (Pawlak et al.,
1: A collection of information artifacts and, optionally, 2005) 7: The set of all human and mechanical resources
agents and devices that enable information to be stored, needed for acquisition, storage, retrieval, and management
retrieved, and possibly transformed. (Benyon, 2006) 2: of the vital data of a given system. With human resources
The aggregate of all determined objects and subjects, and are usually intended both the individuals involved in the
information ties between them, which function and interact use of the system and the procedures they have to carry
to provide for information needs of people and professional out. With mechanical resources have to be intended both
corporate communities, subject to local self-governance, the hardware and software instruments to be used for
region, society, and state. (Molodtsov, 2005) the management of data. (Cartelli, 2005b, 2006b) 8: A
system for supporting communication within and between
Information Stratiication organizations. (Johannesson, 2005A) 9: A computer-
The role distribution between the information interaction based system that helps people deal with the planning
objects according to the amounts and types of information for, development, management, and use of information
products, the creation of which is based on specialization technology tools to help them perform all tasks related to
in a speciic activity sphere and on its scale. (Molodtsov, their information needs. (Chen, Holt, et al., 2005) 10: A
2005) curriculum that integrates technical skills and knowledge
with applied business and organizational knowledge.
Information Superhighway Sometimes found in business schools, other times in schools
1: Encompasses those components that capture the visions of science, engineering, or in stand-alone IT academic units.
of a nationwide, invisible, dynamic Web learner and the Variations include the Business Information System (BIS),
source of information. Includes, but is not limited to: private Computer Information System (CIS), and Management
and public high-speed interactive, narrow, and broadband Information System (MIS). (Beise et al., 2005) 11: Uses
networks; satellite, terrestrial, and wireless technologies; data to create information and knowledge to assist in
databases; the written word; a ilm; a piece of music; a operational, management, and strategic organizational
sound recording; a picture; or computer software. (G. Lang, decision making. It is also an umbrella term for computer
2005) 2: A mixture of the full duplex (two-way), wired information systems, management information systems,
and wireless capabilities of telephones and networked and information technology. (Scime, 2005a) 12: First known
computers with television, and radios capacity to transmit as business data processing (BDP) and later as management
hundreds of programs. (Msiska, 2005) information system (MIS). The operative word is system,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
336 I nfor m at ion Syst e m Blue print I nfor m at ion Te chnology (I T )
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Te chnology Alignm e nt I nfor m at ion Te chnology End-U se r Re lat ionship 337
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
338 I nfor m at ion Te chnology Fit I nfor m at ion Te chnology Lit e ra cy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m at ion Te chnology M a st e r Pla n (I T M P) I nfor m at ion V isua lizat ion 339
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
340 I nfor m at ion Wave I nfor m e d Conse nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nfor m e d Em be dding I nhe rit a nc e 341
by the researcher(s) about the research, possible risks department chairs. (Riffee & Sessums, 2005) 5: The
associated with the research, and the voluntary nature of underlying resources that provide the necessary capability
participation. Informed consent must be obtained without for achieving outcomes. (Samuel & Samson, 2006)
I
coercion or undue inluence. (Roberts et al., 2005)
Infrastructure Interdependency
Informed Embedding Denotes a bidirectional relationship between two or
A data embedding method that exploits the information more infrastructures, through which the state of each
about the host media available at the embedder side. (C.- infrastructure inluences or is correlated to the state of
T. Li, 2005) the other infrastructure. (Jeong et al., 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
342 I nhe rit a nc e H ie ra rchy I nnovat ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nnovat ion Ca pit a l I nput Ac c e le rat ion 343
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
344 I nput De bugging I nst a nc e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nst a nc e Se le c t ion I nst it ut iona l St re ngt he ning 345
items structured according to the model. Data instantiate The applications are increasingly used to provide quick
the model (or data schema in this context). (Diskin & user help and feedback, build relationships, and easily share
Kadish, 2005) 4: An example (or record) of the dataset; comments. (Kardaras & Karakostas, 2006) See Chat.
I
it is often a row of the data table. Instances of a dataset
are usually seen as a sample of the whole population (the Instant Messenger
universe). An instance is described by its attribute values, 1: A program that hooks up to a service for conversation
which can be continuous or discrete. (Muhlenbach & in real time. Involved parties see each line of text right
Rakotomalala, 2005) after it is typed (line-by-line), thus making it more like a
telephone conversation than exchanging letters. Popular
Instance Selection instant messaging services on the public Internet include
A process of choosing a subset of data to achieve the AOL Instant Messenger, Yahoo! Messenger, .NET
original purpose of a data-mining application as if the Messenger Service, and ICQ. (Kao & Rerrer, 2006) 2:
whole data is used. (Liu & Yu, 2005) An information technology that enables people to send
real-time text messages. (Wang, J. et al., 2006b)
Instant Message (IM)
A written message, synchronous or asynchronous, sent Instantiation
via an IM tool. The IM tool allows the user to see which Creation of an object, or class instance, from a class.
pre-deined contacts are online and send synchronous (Lucas, 2005)
messages, the conversation taking the character of a chat,
or asynchronous, leaving the message until the contact Institution-Based Trust
goes online. Examples of IM tools are Icq and MSN. 1: Trust based on the guarantees of a third party. (Paravastu
(Dunkels, 2005) & Gefen, 2006) 2: Trust formed when organizational
members believe that their organization as a whole has
Instant Messaging (IM) their best interests at heart and acts accordingly. (Smith,
1: A type of communications service that enables you to 2006b)
create a kind of private chat room with another individual
in order to communicate in real time over the Internet. Institutional Connectivity
It is analogous to a telephone conversation but uses text- Refers to an organization or institutions ability to link with
based, not voice-based, communication. Typically, the others networks and the rate at which this connection is
instant messaging system alerts you whenever somebody made. (Poda & Brescia, 2005)
on your private list is online. You can then initiate a chat
session with that particular individual. (Lalopoulos et al., Institutional Dimension
2005b) 2: A method for real-time communication over a Considering the need for integrated evaluation of business
wired or wireless network. An evolution from IRC (inter- ideas/solutions enabled by IT, it is emergent that there are
relay chat), an early Internet real-time communication organizational dimensions (or institutions). They include
protocol. (Horiuchi, 2005b) 3: An application that provides the context where evaluation is integrated (e.g., the systems
immediate delivery of messages over ixed-line and development lifecycle, the IS management practices and
mobile IP networks. (Gilbert, 2005b) 4: Near-synchronous processes, the peoples roles, the organizational culture) and
Internet-based one-to-one communication technology. furthermore, the understanding of stakeholders behavior
IM allows two users to exchange short text messages in within this context. (Serafeimidis, 2005)
real time. (Hwang & Stewart, 2005) 5: Communication
service on the Internet that enables textual private chats Institutional Policy
with other individuals in real time. (Beuschel et al., 2005) A plan or course of action developed by an institution to
6: A computer application that allows two or more users guide actions. (Schifter, 2005)
to communicate with each other in real time via typed
messages. (Elshaw, 2006b) 7: An application (such as Institutional Strengthening
ICQ, PowWow, and AOLs Instant Messenger) that allows Awareness and effective use of human and technological
members of a group to see who is online at any moment, available resources in all their scope to accomplish
send instant messages, and set up spontaneous small chats. institutional goals. (Falivene & Kaufman, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
346 I nst ruc t iona l Conc e pt ion I nst ruc t iona l Deve lopm e nt
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nst ruc t iona l I m pe rat ive I nst ruc t ivist Pe rspe c t ive 347
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
348 I nst rum e nt a lit y I nt e grat e d Libra r y Syst e m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e grat e d Pe rsona l Fina nc ia l Se r vic e (I PFS) I nt egrit y 349
Integrated Personal Financial Service (IPFS) the system in every other component of the system. For
The seamless integration of previously independent example, if a Human Resources system is integrated,
inancial products and services. Prior independence of and an employee changes his or her address through any
I
these inancial products was a function of organizational, human interface that allows it, then the new address will
regulatory, and/or technological constraints imposed upon be shown automatically every place else in the system.
the providers. For example, in a true IPFS relationship, (Fulton, 2005) 3: Refers to how work is performed.
funds would low seamlessly between insurance, banking, Knowledge entities cannot be merged but should be looked
investment, and tax accounts. (Gordon & Mulligan, upon as a distributed system of cognitive elements whose
2005) integrative potential lies in the collective ability to perform.
(Munkvold, 2006)
Integrated Services (IntServ)
Architecture where network resources are apportioned Integration Adapter
according to an applications Quality of Service (QoS) Data and application adapters (also known as data
request, subject to bandwidth management policy and interfaces or data drivers) are native software objects that
focused on individual lows. (Gutirrez & Ting, 2005) allow integration tools to retrieve data eficiently from
complex, sometimes proprietary stores of information.
Integrated Services Digital Network (ISDN) (Karakostas, 2005)
1: A set of communications standards allowing a single
wire or optical iber to carry voice, digital network services, Integration Broker (IB)
and video that may replace the plain, old telephone system. A middleware product that uses an internal (or virtual)
(Vician & Buche, 2005) 2: A set of CCITT/ITU (Comit representation of a Common Data Model (CDM) to mediate
Consultatif International Tlphonique et Tlgraphique/ the exchange of data and data-related services among
International Telecommunications Union) standards for applications. An IB manages the physical, syntactic, and
digital transmission over ordinary telephone copper wire as semantic translation of data from any application, the
well as over other media. ISDN in concept is the integration validation of rules of authorization and business processing,
of both analog or voice data, together with digital data over and the transport to each application and component
the same network. (Rahman, 2005c) 3: A communication required to preserve system-wide consistency of the virtual
technology that allows the clear transmission of voice, collection of data. (Fulton, 2005)
data, image, and their combinations. ISDN users can
have more than one call at a time. (Kirlidog, 2005) 4: A Integration Hub
telecommunication service that uses digital transmission A hub is a messaging server that exchanges important
and switching technology to support voice and digital information between different applications so that the
communications. (Butcher-Powell, 2005) 5: A digital applications can interact in a meaningful way. (Karakostas,
telephone/telecommunications network which carries 2005)
voice, data, and video over existing telephone network
infrastructure. It is designed to provide a single interface Integration of Processes
for hooking up a phone, fax machine, PC, and so forth. The coordination and integration of processes seamlessly
(Cosemans, 2005a) within and without the organization. (Sundaram &
Portougal, 2005a)
Integration
1: The process of achieving unity of effort among various Integrity
subsystems in the accomplishment of the organizational 1: Allows the system to verify whether modiications
task (process focus); the quality of the state of collaboration have occurred; it does not make sure that information was
that exists among departments which is required to achieve not altered. (Pierre, 2006b) 2: In databases, integrity
unity of effort by the demands of the environment (outcome is largely synonymous to semantic consistencythat
focus). (Peterson, 2005) 2: A system is integrated when it is, the correctness of stored data with regard to their
is suficiently interconnected that a change to any element intended meaning. Integrity, as expressed by integrity
of the system by any component of the system is relected constraints, should not be confused with a namesake
appropriatelythat is, according to the business rules of issue often associated with data security. (Decker, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
350 I nt e grit y Che ck ing I nt e lle c t ua l Ca pit a l (I C)
3: The condition that exists when data is unchanged from Integrity Satisfaction
its source and has not been modiied, altered, or destroyed A given database state satisies integrity if each integrity
I at any operation according to an expectation of data constraint in the database schema, posed as a query, returns
quality. (Mitrakas, 2006) 4: Prevention of unauthorized the required yes/no answer. An ostensibly equivalent,
modiication of information. (Tong & Wong, 2005a) 5: The but in fact slightly weaker deinition says that integrity is
belief the other party is honest and adheres to accepted satisied if it is not violated (see Integrity Violation). The
modes of behavior. (Paravastu & Gefen, 2006) 6: As difference between both deinitions manifests itself in
deined by the American Institute of Certiied Public incomplete databases. (Decker, 2005)
Accountants, it includes the character traits of honesty,
candor, and protection of conidentiality. (Wang, Chen, Integrity Violation
et al., 2006) In a given database state, integrity is violated if any one
of the integrity constraints, posed as a query, returns the
Integrity Checking opposite of the required yes/no answer. (Decker, 2005)
Systematic tests ensuring that integrity remains satisied
(see Integrity Satisfaction). If integrity is violated (see Intellectual Alignment
Integrity Violation), then the update causing inconsistency Describes a state where the content of IT and HR business
must be rejected or some other action must be taken to plans are consistent and externally valid. (Dery & Samson,
enforce a consistent state, that is, one that satisies integrity 2005)
(see Integrity Enforcement). (Decker, 2005)
Intellectual Capital (IC)
Integrity Constraint 1: The aggregation of individual human capital in a
1: A rule that must be satisied by the database or knowledge sense that the aggregation is more than the sum of it
base if it is consistent. (Grant & Minker, 2006) 2: A parts, that is, encompassing organizational routines and
requirement on the consistency of the information stored. capabilities. (von Wartburg et al., 2006) 2: The sum of the
(Decker, 2005) 3: One of a set of properties that the data individual imagination that, when aggregated, becomes
of a database are required to satisfy; they are expected everything everybody in an organization or team knows
to be satisied after each transaction performed on the and which provides them with some advantage over their
database. Integrity constraints provide a way of ensuring competitors. Organizational IC comes from the interplay
that changes made to the database do not result in a loss of structural capital, which augments the value of human
of data consistency. Integrity constraints include key capital, leading to an increase in customer/supplier capital.
references and cardinality restrictions. (Aldana Montes (Williamson et al., 2006) 3: Knowledge and know-how
et al., 2005) 4: Set of constraints which must be satisied possessed by an individual or an organization that can be
by database instances. (Flesca, Furfaro, et al., 2005) 5: converted into value in markets. Roughly the same as the
A statement that speciies the set of valid values in a concept of intangible assets. (Anttiroiko, 2005b) 4: Can be
database. Integrity constraints must be satisied to protect divided into three categories: human capitalthat in the
the database against inconsistencies. (Rivero, 2005) minds of individuals, including knowledge, competences,
experience, know-how, and so forth; structural capital
Integrity Control that which is left after employees go home for the night,
Deals with the prevention of semantic errors made by including processes, information systems, databases and
the users due to their carelessness or lack of knowledge. so forth; and customer capitalcustomer relationships,
(Ibrahim, 2005) brands, trademarks, and so forth (Herschel, 2005) 5:
Everything that is known within an organization as
Integrity Enforcement exempliied in knowledge itself, in ideas and competencies,
Actions taken to ensure that integrity remains satisied and in systems and processes. (Archer, 2006) 6: Refers
across database updates (see Integrity Satisfaction). to intellectual materialknowledge, information,
Conservative integrity enforcement rejects updates that intellectual property, and experiencethat can be put to use
would violate integrity (see Integrity Violation). Progressive for creating wealth. (Hsu & Mykytyn, 2006) 7: Knowledge
integrity enforcement attempts to satisfy the update while gathered by an organization and its employees that has
maintaining integrity by further data modiications, value and would help the organization gain beneit when
possibly consulting the user. (Decker, 2005) reused. (Elshaw, 2006a) 8: Knowledge or information that
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e lle c t ua l Ca pit a l M a na ge m e nt (I CM ) I nt e lle c t ual Prope r t y Right s 351
is created through collaborative activity by a community. It (Fleming, 2005b) 6: A comparatively recent description
can be dificult to ensure clear notions of ownership since of the much older concept that intellectual effort can
knowledge is jointly held. The organization of communities be treated as a form of property and controlled so as to
I
must deine codes of behavior to deal with ownership circumscribe or limit the ways in which that intellectual
issues. (Fleming, 2005c) 9: The human intelligence asset effort is used by others. The concept of intellectual property
that belongs to a company. It consists of people, the skills, encompasses copyright, patent, trademarks, moral rights,
values, learning, and knowledge that they bring to the and other similar forms of legal protection. A contested
organization. (Ray, 2006) 10: The set of intangible assets implication of the use of the term is that intellectual work
that enable a company to function. (Casado, 2005) should attract the same level of legal protection that is given
to physical property. (Marshall, 2005) 7: A general term for
Intellectual Capital Management (ICM) intangible property rights that are a result of intellectual
A management of value creation through intangible effort. (Pemberton & Stalker, 2006) 8: Any product of
assets. Close to the concept of knowledge management. the human intellect that is unique, novel, and unobvious
(Anttiroiko, 2005b) (and has some value in the marketplace)that is, an idea,
invention, expression or literary creation, unique name,
Intellectual Capital Management System business method, industrial process, chemical formula,
(ICMS) computer program process, or presentation. (Du Mont,
A combination of communities, processes, and technology 2005) 9: Includes business designs, business process
brought together to identify, value, categorize, and capture techniques, or patterns. Technology held proprietary
intellectual capital for reuse. (Elshaw, 2006a) through patents, copyrights, or trade secrets can deter new
entrants and achieve a competitive advantage by exploiting
Intellectual Creation economies of scale and scope or through differentiation.
Any work of creation, such as authorship, visual arts, Five steps are suggested to establish intellectual property
performing arts, or music. (Kieler & West, 2005) capital: conduct an intellectual property audit, incubate
new ideas, reduce the ideas to practical form, protect the
Intellectual Property (IP) idea, and exploit the idea. (Hsu & Mykytyn, 2006) 10: A
1: A product of the intellect (intangible property) that concept allowing individuals or organizations to own their
has commercial value such as patents, trademarks, creativity and innovation in the same way that they can
copyrights, and so forth. (Zhao, 2005) 2: Any product of own physical property. The owners of IP can control its
the human intellect that is unique and has some value in use and be rewarded for it; in principle, this encourages
the marketplace. It may be an idea, composition, invention, further innovation and creativity. (Warren, 2006)
method, formula, computer software, or something similar.
In practice, special attention is paid to such intellectual Intellectual Property Rights (IPRS)
property that can be protected by the law (e.g., patent and 1: Treating certain intangible products of the human
copyright). (Anttiroiko, 2005b) 3: A formal measurable mind as belonging to the creator or holder in legal form
subset of Intellectual Capital (IC); the tangible product that such as patents, trademarks, or copyright. (Demediuk,
results from the idea, and is represented and recognized 2005) 2: One of a set of copyright and connected rights
through patents, trademarks, designs, and copyright (which that include, inter alia, the right of copying, modifying,
includes software and multimedia). IP can also be extended and distributing the protected work. (Cevenini, 2005)
to cover a much broader and often more intangible grouping 3: Exclusive rights accorded by a state to legal persons
that extends to trade secrets, plant varieties, geographical based on intangible knowledge, permitting them to
indications, and performers rights. (Williamson et al., control how the knowledge is distributed or exploited for
2006) 4: The time-limited monopoly (a copyright or inancial or other beneit. Consists of copyrights, patents,
patent) given to one who has made a contribution to that trademarks, and trade secrets. (Okoli & Carillo, 2006) 4:
progress. It is suficient to deine IP as the protection Laws and enforcement mechanisms to afford the creator
measure for IC once identiied and deined. (Ariely, 2006a) of an intellectual property (e.g., software) the means of
5: Wider right to control ownership over any material of a controlling how their work is used, and ensuring that the
conceptual nature (i.e., invention, idea, concept) as well as creator is properly rewarded and recognized for his or her
encompassing material originally covered by copyright. work. (Hawk & Kaiser, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
352 I nt e lle c t ua l Tur ning Point I nt e llige nt Age nt Te chnology
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e llige nt Algorit hm I nt e llige nt Que r y Answ e ring 353
Intelligent Algorithm are inside, and present and retrieve the related and interested
A human-centered algorithm with the capacity for portions for the users. (Y.-J. Zhang, 2005a)
thought and reason, especially to a high degree. (Barolli
I
& Koyama, 2005a) Intelligent Interface
A point of communication between a human and a computer
Intelligent Call Routing (ICR) that displays qualities that mimic traits observed in human
A communications service that provides companies communication such as the use of natural languages.
with the ability to route inbound calls automatically to (Alkhalifa, 2005b)
destinations such as a distributed network of employees,
remote sites, or call-center agents. Call routing is typically Intelligent Key
based on criteria such as area code, ZIP code, caller ID, Contains data that has a meaning beyond the unique
customer value, previous customer status, or other business identiication of a database record. For example, a vehicle
rules. (Lalopoulos et al., 2005b) identiication number (VIN) contains information about the
manufacturer, model, and other attributes of the vehicle.
Intelligent Computer-Assisted Language (Millet, 2005)
Learning (ICALL)
The exploration of the use of artiicial intelligence methods Intelligent Metabusiness
and techniques for language learning. (Laghos & Zaphiris, A metabusiness with a high degree of reach, range, and
2005a) structuring. (Joia, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
354 I nt e llige nt Sc a le I nt e r-Orga nizat iona l I nfor m at ion Syst e m (I OI S)
the intention linked with the question. (Ras & Dardzinska, content, pedagogical, and diagnostic expertise during
2005) the learning process. (Ally, 2005d) 3: A computer-based
I instructional system using artiicial intelligence modeling
Intelligent Scale and reasoning techniques for providing a personalized
A scale equipped with a special camera and identiication learning experience. ITSs typically rely on three types of
software. Based on an objects structure, size, color, and knowledge: expert model, student model, and instructor
thermal image, the scale automatically recognizes the item, model. (Esmahi, 2005)
weighs it, and prints out a price tag. (Kotzab, 2005)
Intelligent Web Search
Intelligent (Smart) Querying A Web search system that learns a users information
Querying that is driven by some kind of inference engine preference. (Meng & Chen, 2005)
or mechanism for reining, formulating, or completing
query construction. (Kapetanios, 2005) Intention to Use
An attitude measure of an end users goal to use a speciic
Intelligent Software Agent information system. (Shayo & Guthrie, 2005)
1: A computer application software that is proactive and
capable of lexible autonomous action in order to meet its Intentional Community of Practice
design objectives set out by the designer. The software A community created by an organization rather than being
learns about the user, and adapts the interface and the an informal cluster or network of employees who share a
information to the users needs and style. (Ally, 2005c) passion, who share knowledge, or work together to solve
2: A software agent that uses Artiicial Intelligence (AI) problems. (Tremblay, 2006b)
in the pursuit of the goals of its clients. (Wan, 2006)
3: An intelligent software agent acts at speed over the Intentional Online Learning Plan
electronic communication channel on behalf of human Individualized written strategy developed between a
individuals or companies as their proxy; it is a program student and facilitator that outlines needs and goals.
acting on behalf of another person, entity, or process. An (Crichton, 2005)
intelligent software agent is an autonomous program that
is capable of perceiving and interpreting data sensed from Intentional Versioning
its environment, relecting events in its environment, and Automatic construction of versions based on coniguration
taking actions to achieve given goals without permanent rules. (Martnez-Gonzlez, 2005)
guidance from its user. Agents have to have the intrinsic
ability to communicate, cooperate, coordinate, negotiate, Inter-Arrival Distribution
and learn, as well as the capability to evolve through their The probability density function that describes likely
interactions with other agents. Agents can be stand-alone or and unlikely inter-arrival times for packets. (Guster et
be part of a multi-agent system. (Richards et al., 2005) al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r-Proje c t Le a r ning I nt e ra c t ion Syst e m 355
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
356 I nt e ra c t ion w it h Cla ssm at e s I nt e ra c t ive M ult im e dia M e t hod (I M M )
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e ra c t ive M ult im e dia Te chnique I nt e ra c t ivit y 357
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
358 I nt e ra c t ivit y Dim e nsion I nt e rfa c e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e rfa c e Age nt I nt e r na l Cont ex t 359
interface, it promises to implement all of the methods called an intergalactic client-server program. (Murthy
declared in that interface. (Wong & Chan, 2006) 2: A set of & Krishnamurthy, 2005b)
commands or menus through which a user communicates
I
with a software program. (Proserpio & Magni, 2005) 3: Interlibrary Loan
Portion of a computer application that is used by the user The process by which a library requests material from,
to communicate with the application. It is particularly or supplies material to, another library. (Raisinghani &
important for a dashboard, because it may impinge on Hohertz, 2005)
the ability of users to properly interpret the variations in
the indicators shown to them. (Adam & Pomerol, 2005) Interlinking
4: The set of components of a computer program that Linking between two or more Web sites. (Thelwall,
allow the user to interact with the information. (Ally, 2006)
2005c) 5: The design on the computer screen with which
the user interacts. (Szabados & Sonwalkar, 2005) 6: The Intermedia Synchronization
point at which two systems connect, and the method by Maintaining the requirements of the temporal relationships
which communication is accomplished. The computer between two or more media. Lip synchronization
keyboard, mouse, printer, and video display exemplify between video and audio is an example of interstream
interfaces between the machines internal operations and synchronization where the display of video must
the human user. (Horiuchi, 2005a) 7: The speciication synchronize with audio. (Yang et al., 2005b)
for a method (what a method does); how that function
is called from another program. Interfaces are provided Intermedia Transcoding
in source form as opposed to implementations which are The process of converting the media input into another
secure. This allows one to use a method without regard media format. (Cavallaro, 2005)
for how that method is coded. It also allows multiple
implementations of the same interface. (D. Brandon, Jr., Intermediary
2005a) 8: The way a user interacts with a product, what he 1: In the tourism and travel sectors, intermediaries are
or she does, and how it responds. (Magnani & Bardone, those organizations that package or on-sell a product.
2006) 9: In general, extraneous energy from natural or These include travel agents, tour packagers, inbound
man-made sources that impedes the reception of desired tour operators, and destination marketing organizations.
signals. (Ragazzi, 2005) The Internet has led to the emergence of electronic
intermediaries that offer their services entirely online.
Interface Agent (Carson, 2005) 2: A party that acts as an agent in
A semi-autonomous agent that assists a user with, or transactions or markets. (Foley & Samson, 2006) 3:
partially automates, his or her tasks. (Mohamed & A person or organization performing a (booking) role
Ottmann, 2006) between consumers and business. (Braun, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
360 I nt e r na l Cont rol I nt e r nat iona l N e t w ork ing (I N ET )
can use bodily attached sensors to keep track of the to manage a speciic business transaction, as opposed
internal context information of mobile consumers. (Sun to buying it on the market. In knowledge management
I & Poole, 2005) literature, internalization is one of four knowledge
transmission mechanisms. It refers to the explicit-to-tacit
Internal Control process of knowledge transfer. This process takes place
1: A system of people, technology, processes, and when individuals use explicit knowledge to extend their
procedures designed to provide reasonable assurance own tacit knowledge base. (Brock & Zhou, 2006) 3: It is
that an organization achieves its business process goals. the process of making a Web site interoperable in a speciic
(Chengalur-Smith et al., 2005) 2: A set of procedures market or locale. In general, interoperability means that
applied by a business organization that ensures information the functionality of the site is not dependent on a speciic
is safeguarded, that it is accurate and reliable, and that it is language or culture and is readily adaptable to others.
processed eficiently and in accordance with managements (Becker, 2005b)
prescribed policies. (Lenard & Alam, 2005)
International Computer Driving License (ICDL)
Internal Data An international certiication that serves as a benchmark
Previously cleaned warehouse data that originated from for computer literacy. (Reynolds, 2005)
the daily information processing systems of a company.
(Peter & Greenidge, 2005a) International Divide
The digital divide that exists between countries. (Cecchini,
Internal Divide 2005)
The digital divide that exists between socioeconomic
groups within a country. (Cecchini, 2005) International Division of Labor
The spatial location of production facilities in international
Internal Knowledge networks resulting from capital investment by irms in
An organization-speciic knowledge that gives idiosyncratic countries or regions where wage rates and/or regulatory
cohesiveness to the integration of external knowledge into regimes offer cost savings in comparison to those in a
a irm. Firm and context dependent, it is an indispensable irms country of origin. The emergence of advanced
complement to external knowledge in order to build up telecommunications and the abilities they afford to
knowledge-based competitive advantages when it is coordinate industrial activity in different places and times
appreciated by clients. It is more valuable inside the irm are often cited as signiicant factors in organizing these
where it originates than in the open market. It is very divisions of labor. (Lepawsky & Park, 2006)
dificult to be transmitted to a different context. (Andreu
& Sieber, 2006) International Instructor
In many regions of Asia and Africa, professional
Internal Locus of Control development programs rely on expertise from elsewhere
Characterized by the belief that personal achievement in the world, and there is heavy use of experienced invited
is due to ability and effort, as opposed to luck, fate, or speakers. Increasingly, these invited speakers provide
situational factors. (Adkins & Nitsch, 2005) electronic resources and also teach online. They may even
do all of their teaching in an online mode. These invited
Internal Metric teachers, many of whom teach in English, are described
A metric used to measure attributes of the product that as international instructors. (Ching et al., 2005)
can be measured directly by examining the product on its
own, irrespective of its behavior. (Xenos, 2006) International Mobile Subscriber Identity (IMSI)
A speciic number of subscriber, used exclusively in GSM
Internalization network, according to international numbering standards
1: A knowledge transfer mode that involves new tacit referred to as E.212. (Louvros et al., 2006)
knowledge being derived from existing explicit knowledge.
(Wickramasinghe, 2005) 2: In international business and International Networking (INET)
organization science literature, internalization means that An annual meeting held by the ISOC. (Rhoten, 2006b)
an organization makes use of its organizational hierarchy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r nat iona l Online I nt e ra c t ion (I OI ) I nt e r ne t 361
International Online Interaction (IOI) information and knowledge sharing. (Ribire & Romn,
Situation in which individuals from two or more cultures 2006) 3: A decentralized, global network. The World Wide
use an online medium to interact directly with one another. Web is only a part of this network. Other components
I
(St.Amant, 2005c) of the Internet include e-mail, news servers, Gopher,
and TELNET. (Cosemans, 2005a) 4: A global network
International Organization for Standardization connecting millions of computers linking exchange of data,
(ISO) news, and opinions. The Internet is not synonymous with
A non-governmental organization consisting of standards World Wide Web. (Sieber & Andrew, 2005) 5: A global
institutes of 148 countries. ISOs central secretariat (located public network that utilizes TCP/IP protocols to transfer
in Geneva, Switzerland) coordinates the system. (K. Chen data from one computer to another. The Internet is often
et al., 2005) referred to as a network of networks, as it is made up of
thousands of smaller privately owned networks. (Fraser,
International Outsourcing 2005) 6: A global system of interconnected networks that
1: A production model in online media used to send work allows for data transmission between myriad computers.
to employees located in a nation (generally, a developing The Internet can usually be accessed using Internet
nation). (St.Amant & Still, 2005) 2: A production process service providers. (Escalante, 2005) 7: A large system of
in which work is sent to overseas employees for completion. interconnected computer networks composed of backbone
(St.Amant, 2006b) networks, mid-level networks, and local networks. This
includes networks owned and managed by public, private,
International Statistical Classiication of Diseases and nonproit sector organizations. (Hinnant & Sawyer,
and Related Health Problems, Tenth Revision 2005) 8: A vast network of computers that connects
(ICD-10) millions of people worldwide. (Olatokun & Ajiferuke,
A medical classiication system in which conditions have 2006) 9: A worldwide interconnection of individual
been grouped for general epidemiological purposes and networks operated by government, industry, academia, and
the evaluation of health care. (Zender, 2006) private parties. (Phala, 2005) 10: A worldwide information
network connecting millions of computers. Also called
International Telecommunications Union (ITU) the Net. (Burke et al., 2005) 11: A worldwide network of
A body that closely works with all standards organizations computer networks that use the TCP/IP network protocols
to form an international uniform standards system for data to facilitate data transmission. It provides access to a vast
communications over telephone networks. Before 1993, amount of information resources including multimedia
ITU was known as CCITT. (Rhoten, 2006a) (movies, sound, and images), software, text documents,
news articles, electronic journals, travel information, and
International Virtual Ofice (IVO) so forth. It also provides an environment for buying and
A work group composed of individuals who are situated in selling products and services over a network. (Aurum,
different nations and who use online media to collaborate 2005) 12: A worldwide system of networks that has
on the same project. (St.Amant, 2005d) transformed communications and methods of commerce
by allowing various computer networks to interconnect.
Internationalize Sometimes referred to as a network of networks, the
Generalizing a design so that it can handle multiple Internet materialized in the United States in the 1970s,
languages content. (T.S. Chan, 2005) but did not become overtly visible until the early 1990s.
(Nightingale, 2005) 13: Global communications network
Internet consisting of thousands of interconnected networks.
1: The vast collection of interconnected networks that all (Ortega Egea & Menndez, 2006) 14: A global network
use TCP/IP protocols. (Kabene, Takhar, et al., 2005) 2: A connecting millions of computers. The word is derived from
worldwide system of computer servers from which users interconnected network. (Sala, 2005a) 15: The electronic
at any computer can extract information or knowledge. system that links various computer networks around the
Intranets and extranets are Internet-like networks whose world. It includes educational venues, databases, electronic
scope is to restrict access to internal personnel or external mail, news agencies, and chat rooms. (Switala, 2005)
partners within an enterprise, with the goal of fostering
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
362 I nt e r ne t Abuse I nt e r ne t Disc onne c t ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r ne t Disc ussion Sit e (I DS) I nt e r ne t Priva cy 363
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
364 I nt e r ne t Prot oc ol (I P) I nt e r ne t Se r vic e Provide r (I SP)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e r ne t Soc ie t y (I SOC) I nt e rope ra bilit y 365
customers to content and applications providers, usually to help organizations communicate proper Internet usage
for a monthly fee. (Rlke et al., 2005) 8: A company that behaviors, lessen employees perceived expectation of
provides Internet access to individuals, groups, or corporate privacy, and reduce costly litigation that may occur from
I
organizations through normal telephones, satellites, or the use of Internet monitoring and iltering software.
iber optics. (Frempong & Braimah, 2005) (Mahatanankoon, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
366 I nt e rope ra bilit y Ent e rprise Archit e c t ure I nt e rpola t ion Filt e r
diverse applications to interact and share data seamlessly. for much human intervention. Examples of IOIT include
(Yow & Moertiyoso, 2005) Electronic Data Interchange (EDI) systems. (Abraham
I & Leon, 2006)
Interoperability Enterprise Architecture
A set of consistent methods to specify the interaction Interorganizational Learning
behavior of a network of public organizations. It includes The sharing of information and process knowledge across
organizational structures, public services, and business organizational boundaries. The information and knowledge
processes, as well as interaction interactions, protocols, pertain to tasks or processes that are carried out by the
and patterns. (Werth, 2005) various organizations. By making use of the information
and process knowledge, these organizations can change the
Interoperability Framework way they carry out these tasks and processes to improve
Not simply a purely technical issue concerned with performance. (Abraham & Leon, 2006)
linking up various systems, but the wider set of policies,
measures, standards, practices, and guidelines describing Interorganizational Relationship
the way in which various organizations have agreed, or Cooperative interorganizational relationships include
should agree, to do business with each other. (Chochliouros strategic alliances, partnerships, coalitions, joint ventures,
& Spiliopoulou-Chochliourou, 2006) franchises, and network organizations. (Rowe et al.,
2006)
Interoperability Interface
An interface between XML documents and other software Interorganizational System (IOS)
programs. The interoperability stems from the fact that 1: A computer and communication infrastructure that
the XML documents can be read and operated upon by permits the sharing of an application across organizational
any software application designed to use this interface. boundaries. The aim of an IOS is to create and exploit
(Gaffar & Seffah, 2005) interorganizational eficiencies. (Rowe et al., 2006) 2: A
system that provides information links between companies.
Interoperability Problem (Harris & Chen, 2006)
Getting a collection of autonomous legacy systems to
cooperate in a single federated system. (Balsters, 2005) Interorganizational Trust
The conidence of one organization in the certainty of
Interorganization Cooperative Process another organizations ability to perform an expected
An abstraction of a complex business process involving outcome, such as delivering promised goods, services,
different organizations that cooperate with one another to information, or payment. (Turner, 2006)
offer complex services. The interorganization cooperative
process is supported by an application that helps in the Interpersonal Communication
coordination of services. (Rolland & Kaabi, 2006) This occurs in one-on-one situations or within a small
group dynamic. (Weber & Lim, 2005)
Interorganizational Communication
Communication that includes entities that are legally Interpolation
external from the organization where legal recourse may 1: A family of mathematical functions to compute unknown
occur due to the content of the message. (McManus & states between two known states. For instance, it is possible
Carr, 2005) to interpolate between two 3D models of a body to obtain
an intermediate one. (Volino et al., 2005) 2: The process
Interorganizational Information Technology of increasing the sampling rate. Interpolation consists of
(IOIT) upsampling and iltering. (Jovanovic-Dolecek, 2005b)
Consists of networking and software applications that
enable business networks to share data and information Interpolation Filter
with each other. Networks (public or private) are used to The ilter used in interpolation to remove the unwanted
provide connectivity between the software applications images in the spectra of the upsampled signal. (Jovanovic-
located within each organization. The software applications Dolecek, 2005b)
are designed to share data and information without the need
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I nt e rpolat or I nt e r ve nt ion St rat e gy 367
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
368 I nt onat ion I nt rat ra nsa c t iona l Assoc iat ion
acceptant, catalytic, confrontation, prescriptive, principles authorization. An intranets Web sites look and act just
models and theoriesthat may be applied at ive levels like any other Web sites, but the irewall surrounding an
I individual, team, inter-group, organization, society. The intranet fends off unauthorized access. (Singh, 2005a)
important point about this schema is that it forces the 4: A network within the organization using Internet
consultant to think carefully about the purpose of the technologies. (Baugher et al., 2005) 5: A private network
intervention. (Grieves, 2006b) inside a company or organization that is based on Web
standards (i.e., TCP/IP) and offers various applications for
Intonation members of a speciied group. (Vaast, 2005) 6: A restricted-
How the pitch pattern (the property of sound that varies access or internal network that works like the Internet.
with variation in the frequency of vibration) or fundamental It enables employees, or those with access, to browse or
frequency (F0) changes during speech. It refers to the share resources. Intranets are private computing networks,
rise and fall of the voice pitch. (Syed, Chakrobartty, et internal to an organization, used for sharing organizational
al., 2005) information. (Boersma & Kingma, 2006) 7: Allowing
access to a hospitals computer system to internal users via
INTOPS-1 a username and password. (Cannoy & Iyer, 2006) 8: An
Requirements of the non-European market on machine intranet can be thought of as the Internet restricted to the
design. This project was founded by the German Ministry conines of an organization in order for both the employer
of Education and Research (1996-1998). (Rse, 2006a) and employees to be able to share information within that
organization. An intranet is based on a local area network.
INTOPS-2 (Sarkar, 2005) 9: A computer network contained entirely
Requirements of the user in Mainland China for human- within an organization. (Ruppel & Ruppel, 2005)
machine systems in the area of production automation. This
project was founded by several companies from Germany Intranet and Portal Course
and Switzerland (2000-2001). (Rse, 2006a) Intranet development methodology, data warehousing,
and online analytical processing. Enterprise information
Intracluster Similarity portals. Transforming information into knowledge.
1: A measurement of the similarity between the objects Decision support. Customer applications. Content
inside a cluster. Objects in a cluster must be as similar as personalization. (Knight & Chan, 2005)
possible. (Santos et al., 2005) 2: The overall similarity
among documents within a cluster. (Fung et al., 2005) Intraorganizational Communication
Communication internal to the legal boundaries of
Intramedia Transcoding an organization, though it may cross departmental or
A transcoding process that does not change the media divisional boundaries. There is no legal recourse for the
nature of the input signal. (Cavallaro, 2005) content of a message. (McManus & Carr, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Intrinsic Dificulty Inverse Transformation 369
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
370 I nve st m e nt I P-St yle Se m a nt ic s
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I PFS I S-Archit e c t ure Alignm e nt 371
IPFS: See Integrated Personal Financial Service. IS: See Information System.
IPMA IS Success
I
International Project Management Association. (D. A global judgment of the degree to which stakeholders
Brandon, 2005b) believe they are better off. The term is sometimes used
interchangeably with IS effectiveness. (Wilkin, 2005)
IPO: See Initial Public Offering.
IS Support
IPRS: See Intellectual Property Rights. An information system (IS) function supporting people
taking purposeful action. This is often done by indicating
IPSec: See Internet Protocol Security. that the purposeful action can itself be expressed via
activity models, through a fundamental re-thinking of
IPT: See Information Processing Theory. what is entailed in providing informational support to
purposeful action. The idea is that in order to create IS
IPTV support that serves, it is irst necessary to conceptualize
The result of large-scale adoption of broadband, as well the organizational system that is served, since this order
as advances in networking technology and digital media, of thinking should inform what relevant services would
which together have made it possible for service providers indeed be needed in the IS support. (Vat, 2006)
to economically deliver high-quality live and on-demand
movies and TV content over IP networks. (Papagiannidis IS/IT Beneits Realization Methodology
et al., 2005) An approach used to ensure that beneits expected in IS/IT
investments by organizations are realized or delivered.
IR: See Information Retrieval; Infrared. (Lin & Pervan, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
372 I S-Archit e c t ure M ode l I SO 9 2 4 1 -1 1 1
simple and well structured, well managed, and clearly with leading companies. BS7799 Part 1 incorporates a
and explicitly described. (Opdahl, 2005) broad range of security practices and procedures that
I can be adopted by any organization of any size and in
IS-Architecture Model any industry sector. This is now international standard.
An enterprise model that focuses on the enterprises IS- (Tassabehji, 2005b)
architecture and that can be used to represent a current
architecture or to illustrate a candidate or selected ISO 15504
architecture vision. An IS-architecture sketch is a high- An international standard that proposes the standard
level model, whereas an architecture blueprint is more project SPICE, which establishes maturity levels for
detailed. (Opdahl, 2005) each individual process: Level 0Incomplete; Level
1Performed; Level 2Managed; Level 3Established;
IS-Architecture Principle Level 4Predictable; Level 5Optimizing. (Monteiro
A high-level rule that can be used to make decisions de Carvalho et al., 2005)
about developing and/or evolving individual ICT systems.
(Opdahl, 2005) ISO 9001
An international standard that speciies the requirements
IS-Architecture Vision of a quality management system. It is applicable to any
A coherent set of IS-architecture principles that together organization regardless of product, service, organizational
guide all the aspects of IS-architecture evolution that are size, or whether it is a public or private company. (Leung,
considered important. (Opdahl, 2005) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I SO 1 7 7 9 9 I T Gove r na nc e M at urit y M ode l 373
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
374 I T H a rdw a re I U P
ITA: See Independent Testing Authority. ITMP: See Information Technology Master Plan.
ITCA: See Information Technology Competitive ITS: See Intelligent Tutoring System.
Advantage.
ITT: See Information Technology Transfer.
Item
A sales product, or a feature or attribute. (Kryszkiewicz, ITU: See International Telecommunications Union.
2005)
ITV: See Instructional Television; Interactive
Item Bias Television.
Refers to measurement artifacts. (Karahanna et al.,
2005) IUP: See Internet Usage Policy.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
I VO I XC 375
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
376 JADE J ha i Foundat ion
J
JADE: See Java Agent Development Framework. Java Media Framework (JMF)
A Java library for the development of stand-alone and
JalChitra networked multimedia systems. (Fortino, 2005)
A village water resources mapping and water auditing
software developed by Dr. Vikram Vyas. (Literal meaning Java 2 Enterprise Edition (J2EE)
of Jal is water and Chitra is picture.) (Shaligram, 2005) Designed to simplify complex problems with the
development, deployment, and management of a multi-
Java tier enterprise solution. J2EE is an industry standard
1: A high-level programming language similar to C++ that helps build Web services (e.g., used with IBMs
developed by SUN Microsystems. (Guan, 2005c) 2: A WebSphere, HPs Web Services Platform, and Suns Sun
platform-independent programming language, produced ONE). (Chen, 2006)
by Sun Microsystems. Java is built as a method to provide
services over the WWW. With Java, a Web site provides a Java Virtual Machine (JVM)
Java application (called an applet), which is downloaded A platform-independent execution environment that
by the client and executed on the client machine. Java is converts Java byte-code into machine language and then
speciically built so that an application can be run on any executes it. (Lucas, 2005)
kind of system, so a separate MAC, Windows, Sun, and
so forth version is not needed. Java also has some security Java/RMI
features built in, to make it more dificult for destructive A Java application programming interface known as remote
applets to be written. (Dez-Higuera & Daz-Pernas, method invocation. (Yen, 2005)
2005) 3: An object-oriented language that is widely used
for Internet or Web-based applications. It was designed JavaScript
speciically for distributed environments. (Dasgupta A scripting language developed to enable Web authors to
& Chandrashekaran, 2005) 4: Programming language add dynamic content to sites. Although it shares many of
designed to be portable, used to create programs that will the features and structures of the Java language, it was
run on mobile phones and PDAs, as well as Macintosh, developed independently. It is supported by recent browsers
Windows, and Unix desktop computers. (Houser & from Netscape and Microsoft. (Valenti, 2005)
Thornton, 2005)
JAWS: See Job Access for Windows.
Java Agent Development Framework (JADE)
A middleware tool used in implementation of agent- JDM: See Java Data Mining.
based systems (http://jade.tilab.com). (Cardoso & Freire,
2005) Jhai Foundation
A non-proit organization founded by American, Lee
Java Data Mining (JDM) Thorn. The foundation is managed by an advisory board
An emerging standard API for the programming language and includes many volunteers as well as paid contractors.
Java. An object-oriented interface that speciies a set of Java Its aim is to assist the people of Laos in a collaborative
classes and interfaces supporting data-mining operations manner in the areas of economic development, education,
for building, testing, and applying a data-mining model. and information technology. (Anderson, 2005)
(Zendulka, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
J I T Joypa d 377
JIT: See Just-In-Time Training. is more likely that the community will sustain its validity.
(Louis, 2006)
JITAIT: See Just-In-Time Artiicially Intelligent Tutor.
J
Joint Intellectual Property
JMF: See Java Media Framework. The result of a company taking the view that it is owned
by its customers and they have ownership in product
Job Access for Windows (JAWS) development. This notion goes beyond normal customer
A Windows screen reader from Henter-Joyce. JAWS works relationships and co-creates new businesses based on
with PCs to provide access to software applications and the customer education and co-development. It is probably
Internet. With its internal software speech synthesizer and the most intense form of cooperation between a company
the computers sound card, information from the screen and its customers. (Paquette, 2006b)
is read aloud for visually impaired and blind people. (Yu,
2005a) Joint Outcome
Part of the direct output and by-products of the education
Job Characteristics Theory process including student learning, an employable
1: Task attributes inluence effectiveness through their workforce, AIT market exposure, and contributions to
impact on critical psychological states such as motivation industrial and academic research. (LeRouge & Webb,
and satisfaction with the work. (Wong & Staples, 2005) 2005)
2: This motivation theory, which stems from Hackman
and Oldham, identiies several characteristics of jobs, Joint Probability
such as skill variety and autonomy, that inluence the The probability of two events occurring in conjunction.
experienced meaningfulness of work, and therefore (Bashir et al., 2005)
the internal motivation and job satisfaction of workers.
(Hendriks & Sousa, 2006) Joint Probability Distribution
A function that encodes the probabilistic dependencies
Join Dependency among a set of variables in a domain. (Vargas, 2005)
Any decomposition of tables must be able to be rejoined to
recover the original table. Tables in 5NF are join dependent. Joint Venture Model
(Schultz, 2005) A model for collaboration between institutions where
modules and courses are developed and offered through
Join Index joint efforts; a jigsaw of different specialties and resources.
Built by translating restrictions on the column value of a (Haugen & Ask, 2005)
dimension table to restrictions on a large fact table. The
index is implemented using one of two representations, row Journey Making
id or bitmap, depending on the cardinality of the indexed Group mapping activities are often a central part of a
column. (Bellatreche & Mohania, 2005) groups JOint Understanding, Relection, and NEgotiation
of strategY. The methodology aims to support groups
Joint Diagnostic Relationship in their development of a feasible strategy that they are
As a result of the methods used, the approach of OD is individually and collectively committed to implementing.
informed by a joint diagnostic relationship between the OD (Shaw, 2006)
consultant or change agent and various stakeholders in the
organization. This enables the problem to be understood Joypad
from multiple perspectives. (Grieves, 2006b) A palm-sized device designed for use with both hands to
interact with the game. Its layout is typiied by directional
Joint Enterprise keys on the left, and buttons on the right and top sections
Allows the community to extend the boundaries and of the pad. Modern pads incorporate additional analog
interpretations beyond those that were created. By sharing sticks on the left or on both the left and right sides. (Ip &
a common goal, members of the community negotiate their Jacobs, 2006)
situations in their reactions to them. With joint enterprise it
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
378 Joyst ick J V M
Junk Computing
The use of organizational information technology that
does not align with organizational goals. (Mahatanankoon,
2005)
Just-in-Time
An approach to learning where knowledge and skills are
acquired when, how, and where needed by the learner, and
using various technologies to deliver the learning event.
(Stavredes, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K Close st Pa irs Que r y K a rhune n-Loeve Tra nsfor m (K LT ) 379
K
K Closest Pairs Query conidence constraints are not used. (Butler & Webb,
This spatial query involves two spatial datasets and a 2005)
cardinality threshold K (K1). It discovers the K distinct
pairs of objects from the two input datasets that have K-Nearest Neighbor
the K smallest distances between them. (Corral & A technique that classiies each Web page in a set based on
Vassilakopoulos, 2005) a combination of the classes of the k records most similar
to it. (Chen, Tsai, et al., 2005)
K-Anonymity
A privacy metric that ensures an individuals information K-Nearest Neighbors Join
cannot be distinguished from at least k-1 other people when This spatial query involves two spatial datasets and a
a data source is disclosed. (Saygin, 2005) cardinality threshold K (K1). The answer is a set of pairs
from the two input datasets that includes, for each of the
K-Line spatial objects of the irst dataset, the pairs formed with
An Asian version of a stock price bar chart where a lower each of its K nearest neighbors in the second dataset.
close than open on a day period is shaded dark and a higher (Corral & Vassilakopoulos, 2005)
close day period is shaded light. (Hou et al., 2005b)
K-Systemic Competency
K-Means Clustering One of the set of utilization-oriented characteristics of
1: A cluster analysis technique in which clusters are knowledge that could contribute positively to the creation
formed by randomly selecting k data points as initial of new business strategy or better support of existing
seeds or centroids, and the remaining data points are business strategy. (Abou-Zeid, 2005a)
assigned to the closest cluster on the basis of the distance
between the data point and the cluster centroid. (Voges, K-12
2005) 2: A clustering method that groups items that are Kindergarten through Grade 12. (Dell, 2005)
close together, based on a distance metric like Euclidean
distance, to form clusters. The members in each of the K-16
clusters can be described succinctly using the mean (or Kindergarten through undergraduate degree. (Dell,
centroid) of the respective cluster. (Mani et al., 2005) 3: 2005)
An algorithm that performs disjoint cluster analysis on
the basis of Euclidean distances computed from variables KA: See Knowledge Area; Knowledge Asset.
and randomly generated initial seeds. (Yeo, 2005) 4:
Iterative clustering technique subdividing the data in KAI: See Kirton Adaption-Innovation Inventory.
such a way to maximize the distance among centroids of
different clusters, while minimizing the distance among Karhunen-Loeve Transform (KLT)
data within each cluster. It is sensitive to initialization. Utilizes principal component analysis or singular value
(Liberati et al., 2005) decomposition to minimize the distance error introduced
for that level of dimensionality reduction. (Thomasian,
K-Most Interesting Rule Discovery 2005b)
The process of inding k rules that optimize some
interestingness measure. Minimum support and/or
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
380 K b Ke r ne lize d Archit e c t ure
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ke y K irk pat rick s Leve l 3 Eva luat ion (Tra nsfe r) 381
Key Keypad
1: A unique sequence of values that deines the location A handheld device that allows a participant to communicate
of a node in a tree data structure. (Woon et al., 2005) 2: data to an audience response system. (Banks, 2005)
K
A data item or ield used to locate records in a table. A
primary key uniquely identiies each record. If more than Keyword
one ield is needed to guarantee unique identiication, the An attribute of an electronic document used to describe
primary key is called a concatenated key or composite key. the document. (Corral et al., 2006)
When more than one combination of data items or ields
could serve as a primary key, the keys not actively used Keyword Search
are called candidate keys. (Schultz, 2005) 1: A search for documents containing one or more
words that are speciied by a user. (Galitsky, 2005c) 2:
Key Business Process A traditional search mechanism for locating electronic
A collection of intentional business activities that is both documents based on a speciic (keyword) attribute list.
measurable and worthy of improvement or optimization. Keyword searching is based on a recall paradigm of
(Artz, 2005d) cognitive retrieval. Keyword searching is currently the
most widely used retrieval mechanism, however, it is not
Key Frame without its limitations. (Corral et al., 2006)
1: Representative image of each shot. (Swierzowicz, 2005)
2: One of the representative shots extracted from a video KIBS: See Knowledge-Intensive Business Services.
that illustrate its main content. (N.C. Rowe, 2005a)
KIF: See Knowledge Interchange Format.
Key Frames Selection
The selection of a set of representative frames to abstract Killer App
video shots. Key frames are the most important frames in 1: A software application that is so popular that it drives
a shot, so that they can represent the shot in both browsing the widespread adoption of a new technology. For example,
and similarity matching operations, as well as be used as desktop spreadsheet software was so effective that it made
access points. (Farag, 2005b) personal computers a must-have technology for virtually all
businesses. (Hughes & Lang, 2005) 2: Technical jargon for
Key Intelligence Topic (KIT) the eternal search for the next big idea. (Singh, 2006b)
A process for identifying intelligence requirements by
considering strategic decisions, early-warning topics, and Killile
key players. (Parker & Nitse, 2006) In newsgroups, a list of e-mail names you do not want to
read messages from. (Rowe, 2006b)
Key Logger/Keystroke Logger
Software that runs imperceptibly during computer use that Kirkpatricks Level 1 Evaluation (Reaction)
records each keystroke, either saving the results to a log An assessment of participants perceptions of and reactions
ile or sending the results to a second party. (Friedman, to the training event. (Waddington et al., 2005)
2005)
Kirkpatricks Level 2 Evaluation (Learning)
Key Performance Indicator (KPI) An assessment of participants knowledge and skill gain as
One of the set of quantiiable measurements that help a result of the training event. (Waddington et al., 2005)
an organization evaluate how it is progressing towards
organizational goals. (Khan et al., 2006) Kirkpatricks Level 3 Evaluation (Transfer)
An assessment of the extent to which participants are
Key Process Area using what they learned in the training event on their job
A set of activities that deine a speciic capability area; the and in their roles, and whether participants behavior has
CMM has 18 key process areas. (Berztiss, 2006a) changed as a result of the training event. (Waddington
et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
382 K irk pat rick s Leve l 4 Eva luat ion (Busine ss Re sult s) K now le dge
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Ac c e ss K now le dge Archit e c t ure 383
machines, sometimes tacit, and hard to transfer. Knowledge employer, is a dificult asset to control, as it is fragmented
includes data and information (organized data which are in documents, policies, procedures, and other data storage
relevant and purposeful), and knowing how to apply and mediums. Another challenge for management is to retain
K
use that information and data. The term ledge means this knowledge in a form that is easily retrievable. This is
to put to work or apply. The word knowledge, therefore, not an easy task, since the enterprise must irst identify the
means knowing how to put to work what we know, and location of all needed knowledge, and second determine
so in popular usage can in certain situations encompass the easiest way to retrieve it. (Galup et al., 2005)
information and data. (Mockler & Dologite, 2005) 6:
Human life, as well as the philosophical exercise, are not Knowledge Access
a suffered climbing towards the unattainable mountain of A process that allows authorized information users to
truth. Human beings frequently face the question of truth read, update, duplicate, and transfer data in a convenient
as a victory over totality, the knowledge of everything, and prompt way. Based on Internet searching algorithms,
absolute knowledgeas if this total knowledge would be database technology, and modern communication
anterior and external to humans. The knowledge of being technology, people are able to access knowledge networks
is one of the most radical constituent drives of humans, at anytime, anywhere, and from any terminal on the
and it happens within the compromise of action, and never Internet. (Croasdell & Wang, 2006)
in the summing up, whether total or partial, of discreet
units. At the origin of all knowledge, there is the drive Knowledge Acquisition
to organize reality in order to optimize it. It is this drive 1: Comprises all activities that increase the global stock
that promotes the creation of all knowledge and that also of knowledge potentially useful to the organization. An
uniies it. All knowledge departs from cultural worlds, organization may acquire new knowledge through creation
all knowledge is made possible through the action of or other means (e.g., acquisition of another organization,
human beings, and all knowledge is directed towards the communication with consultants, etc.). (Prat, 2006) 2:
widest horizon possible. The engine behind the global The individual or collective process aimed at obtaining
movement of knowledge is the ontological demand felt, in knowledge from another actor, by one or more of the
particular by the areas that use natural language. (Nobre, subprocesses of transaction, communication, cooperation,
2006b) 7: The ability to enable action in the organization imitation, or appropriation. (Kraaijenbrink & Wijnhoven,
(e.g., good decisions, appropriate behaviors, useful work). 2006)
As such it complements information, which provides
the context for and meaning of action (e.g., criteria for Knowledge Agent
decisions, motivations for actions, speciications for work), An individual or organization storing, retrieving,
as well as data, which supply details associated with transferring, and applying/exploiting knowledge resources.
action (e.g., facts, observations, measurements). (Nissen (Loebbecke & Angehrn, 2006)
& Levitt, 2006) 8: Includes but is not limited to those
descriptions, hypotheses, concepts, theories, principles, Knowledge Animation
and procedures which to a reasonable degree of certainty An interactive application that consists of interactive
are either true or useful. In the growing discipline in mechanisms that foster the reconstruction of knowledge
Knowledge Management, knowledge is divided into or the generation of new insights. (Eppler & Burkhard,
explicit (information), implicit, and tacit knowledge. 2006)
(Theng, 2005) 9: Information combined with experience,
context, interpretation, and relection. (Hirji, 2005) 10: Knowledge Appropriation
The application of a combination of instincts, ideas, rules, Individually or collectively obtaining rights to utilize
procedures, and information to guide the actions and acquired knowledge in a certain way. (Kraaijenbrink &
decisions of a problem solver within a particular context. Wijnhoven, 2006)
(Xodo, 2005) 11: Knowledge can be perceived as a discrete,
objective, largely cognitive entity, susceptible of being Knowledge Architecture
classiied as tacit and explicit, or it can be considered as a The blueprints of subjective and objective knowledge,
process or practice of knowing, being socially constructed its lows, and cartography of knowledge within the
and embedded in practice. (Sarmento, 2005) 12: An organization. (Wickramasinghe & Sharma, 2005)
intellectual property that, although paid for in part by the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
384 K now le dge Are a (K A) K now le dge Ca pa bilit y Are a
Knowledge Area (KA) (Nabuco et al., 2006) 3: An entity comprising facts, rules,
Also called Project Management Knowledge Area. For and integrity constraints used for collecting and querying
K PMI there are nine knowledge areas: integration, scope, diverse types of information. (Grant & Minker, 2006) 4:
time, cost, quality, human resources, communications, An online repository of information that represents the
risk, and procurement. (D. Brandon, 2005b) collective wisdom regarding a product or service. (Borders
& Johnston, 2005) 5: The primary repository for all course
Knowledge Artifact materials. Relevant information from the knowledge base
Anything that helps illustrate or answer how, why, when, will later be extracted out in providing personalized course
what, where, and so forth. (Croasdell & Wang, 2006) materials for individual students. (Leung & Li, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Ca pit a l K now le dge Cont rol 385
Knowledge Capital a test), and know-who (e.g., the experiences with others)
The sum or worth of the knowledge held within an through face-to-face (co-located) or media-based (virtual)
organization. Often held to be of primary importance, but interactions. (Eppler, 2006)
K
dificult to quantify. (Udechukwu et al., 2006)
Knowledge Community
Knowledge Capture Self-organized, altruistic relationships of trust between
The process of eliciting knowledge (either explicit or tacit) people for research, development, and innovation-oriented
that resides within people, artifacts, or organizational knowledge exchange within a wide domain of knowledge.
entities, and representing it in an electronic form such (Meller-Prothmann, 2006a)
as a knowledge-based system for later reuse or retrieval.
(Becerra-Fernandez & Sabherwal, 2006) Knowledge Component (KC)
The logical division and element of a course. Various content
Knowledge Category representations in a course are normally organized around
A category used to characterize the topics or areas of each knowledge component. (Y.J. Zhang, 2005b)
knowledge dealt with by documents. (Woods et al.,
2006) Knowledge Composition
Involves assembling knowledge atoms (such as triples in
Knowledge Center RDF and OWL) to build more complex knowledge maps.
A support structure that assigns a distinct set of knowledge- (Aleman-Meza et al., 2005)
related tasks, usually within the coordination domain, to
a separate department. (Hendriks, 2006) Knowledge Concept
A concept that is part of an ontology used for deining and
Knowledge Chain Model describing the knowledge related with a community, such
A model that identiies generic knowledge management as the kinds of knowledge or the sources of knowledge.
activities, which are keys to achieving competitive (Rodrguez-Elias et al., 2006)
advantage and therefore can guide the formation of KM
strategies. (Holsapple & Jones, 2006) Knowledge Construction
1: Process by which knowledge new to the individual or
Knowledge Codiication group is created based on a generative process. (Collis
1: The documentation of knowledgethat is, the conversion & Moonen, 2005a) 2: Refers to the act or process of
of tacit knowledge into an explicit form. ICT is often a contributing to the development of a body of ideas, attitudes,
strong facilitator to support this strategy of knowledge and/or beliefs. (McCracken, 2005)
management. For example, knowledge objects are stored in
databases that allow lexible and fast access and retrieval. Knowledge (Content) Management Software
It is a product-centric view of knowledge management. Research software that helps content semantic search,
(Fink & Disterer, 2006) 2: The process of packaging indexation, and coding automatically. (Lambropoulos,
knowledge into formats that enable the organization to 2006a)
transmit it to other parts and thus facilitate knowledge
transfer. Codiication of knowledge is therefore a means of Knowledge Contributor
representing it and enables all members of the organization A person who provides knowledge that may be shared with
to access relevant knowledge. (Haghirian, 2006) other organizational members (used interchangeably with
knowledge producer). (Kankanhalli et al., 2006)
Knowledge Communication
The (deliberate) activity of interactively conveying and co- Knowledge Control
constructing insights, assessments, experiences, or skills A process that provides data safeguards against invasion,
through verbal and non-verbal means. It designates the corruption, and knowledge theft. It also provides statistics
successful transfer of know-how (e.g., how to accomplish to network administrators for monitoring the operating
a task), know-why (e.g., the cause-effect relationships of status of the network. (Croasdell & Wang, 2006)
a complex phenomenon), know-what (e.g., the results of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
386 K now le dge Cre at ion K now le dge Disc ove r y
(Vargas, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Disc ove r y in Dat a ba se s (K DD) K now le dge Ec onom y 387
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
388 K now le dge Engine e ring K now le dge I nfra st ruc t ure
capital. A knowledge-driven economy is one in which or propagation of knowledge across space, time, people,
the generation and exploitation of knowledge plays the and organizations. (Nissen, 2005) 3: The ways in which
K predominant part in the creation of wealth. (Aurum, knowledge can move between a Community of Practice
2005) 5: The knowledge economy is a state of economic (CoP) and the larger organization, or between members of
being and a process of economic becoming that leverages, the CoP. A free low of knowledge may be facilitated by
both intensively and extensively, knowledge assets and human or technological means or may result as a natural
competences, as well as economic learning to catalyze exchange between individuals, for example, a conversation.
and accelerate sustainable and robust economic growth. (Wenn, 2006a)
(Moodley, 2005) 6: The knowledge-based economy is
all about adding ideas to products and turning new ideas Knowledge Forum
into new products. Relationships with trading partners, A single, communal multimedia database designed to
customers and suppliers, distribution networks, intellectual facilitate computer-supported collaborative learning.
property, patents, image, and so forth are all elements of a (Nason & Woodruff, 2005a)
knowledge economy. These elements represent intellectual
capital. (Sharma et al., 2005) Knowledge Gap
The different knowledge possession through mass media
Knowledge Engineering by social groups with varied social-economic-status.
The process of eliciting an experts knowledge in order (Tarnanas & Kikis, 2005)
to construct a knowledge-based system or organizational
memory. (Becerra-Fernandez & Sabherwal, 2006) Knowledge Hierarchy
The hierarchical relationship between knowledge,
Knowledge Exchange Protocol information, and data, with each level building upon the
A method of structuring tacit knowledge sharing so as to one below. (Nissen, 2005)
make its conversion to explicit knowledge more eficient. It
emphasizes the use of dialogue segmenting accompanied Knowledge Identiication
by structural content headings to deliver implicit content. The individual or collective process aimed at locating
(Herschel, 2005) knowledge at a source, by one or more of the subprocesses
of need identiication, gap analysis, searching, viewing,
Knowledge Extraction or inding. (Kraaijenbrink & Wijnhoven, 2006)
Explicitation of the internal knowledge of a system or set
of data in a way that is easily interpretable by the user. Knowledge Imitation
(Rabual Dopico et al., 2005) Individually or collectively reproducing knowledge from
another actor by copying its objects or actions, with or
Knowledge Facilitator without its assent. (Kraaijenbrink & Wijnhoven, 2006)
A knowledge worker who ensures that knowledge is
captured, indexed, and was made available for reuse. Knowledge Indexing
(Oshri, 2006) Consists of organizing knowledge in individual or
collective memory in order to ease its subsequent retrieval.
Knowledge Finding (Prat, 2006)
Coming across knowledge or sources of knowledge by an
individual or a collective, regardless of the engendering Knowledge Information Data (KID) Debate
process. (Kraaijenbrink & Wijnhoven, 2006) A discussion (alternatively, the data-information-
knowledge debate) that pervades the knowledge-
Knowledge Flow management literature and attempts to determine at what
1: Deines how the knowledge lows through the activities point, if any, data becomes information, and information
performed by a community according to the kinds becomes knowledge. (Schwartz, 2006)
of knowledge and knowledge sources involved in the
activities, the mechanisms used by the people involved Knowledge Infrastructure
in the activity to obtain or share that knowledge, and so A technical infrastructure supporting the development
forth. (Rodrguez-Elias et al., 2006) 2: The movement of organizational knowledge, whose design philosophy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge I nt e grat ion K now le dge M a na ge m e nt (K M ) 389
is often organization speciic. An example is to consider by different programmers, at different times, in different
the infrastructure as a three-tiered system comprising the languages, and so forth). KIF is not intended as a primary
front-end knowledge management services, the middle language for interaction with human users (though it can
K
knowledge management architecture, and the back-end be used for this purpose). The purpose of KIF is roughly
organizational memory. (Vat, 2006) analogous to that of PostScript, which is commonly used
by text and graphics formatting systems in communicating
Knowledge Integration information about documents to printers. (Kapetanios,
1: Solving problems raised by specialization. Specialization 2005)
leads to a dispersion of specialized bodies of knowledge
that are held by different specialists. Knowledge Knowledge Leakage
integration refers to how this drawing on different bodies The low of company proprietary knowledge across irm
of specialized knowledge is organized. (Munkvold, 2006) boundaries. (Teigland & Wasko, 2006)
2: In most organizations, the knowledge required for
innovation and production lies dispersed over individual Knowledge Lifecycle
organization members, groups, and departments. The The activities encompassing the treatment of knowledge
performance of organizations depends on the integration as it moves through the stages of creation and capture,
of that specialized knowledge. Knowledge integration storage, retrieval and transfer, and application and reuse.
is the process in which different pieces of knowledge, (Kulkarni & Freeze, 2006)
which are valuable for a particular organizational process
and held by different organization members, are applied Knowledge Logistics
to that organizational process. (Berends et al., 2006) 3: The distribution and storage of knowledge. (Wijnhoven,
Methodology of combining, modifying, reining, and 2006)
merging usually several models (knowledge bases) into one
robust, more predictable, and usually redundant model, or Knowledge Management (KM)
that of combining decisions of single (base) models. (Bruha, 1: A set of business practices and technologies used to
2005) 4: The effectiveness of an organization to integrate assist an organization to obtain maximum advantage
the specialized knowledge of its members along three of its knowledge. (Narayanan, 2005) 2: Efforts made
dimensions: eficiency, scope, and lexibility. (Teigland by an organization to manage knowledge. Knowledge
& Wasko, 2006) 5: The identiication, acquisition, and management is a discipline that promotes an integrated
utilization of knowledge that is external to an individual approach to identifying, capturing, storing, retrieving, and
or collective actor. (Kraaijenbrink & Wijnhoven, 2006) transferring an organizations knowledge so as to enhance
6: The process whereby several individuals share and its competitive advantage. (Jasimuddin et al., 2006) 3:
combine their information to collectively create new The process through which organizations generate value
knowledge. (Newell, 2006) from their intellectual and knowledge-based assets. Most
often, generating value from such assets involves sharing
Knowledge Integration Mechanism them among employees, departments, and even with other
1: A mechanism through which the process of knowledge companies in an effort to devise best practices. KM is a
integration can be realized. The existing literature newly emerging interdisciplinary business approach that
describes sequencing, decision support systems, direction, involves utilizing people, processes, and technologies to
thinking along, group problem solving, and knowledge create, store, and transfer knowledge. (Wickramasinghe
transfer as knowledge integration mechanisms. (Berends & Sharma, 2005) 4: Management theory and practice on
et al., 2006) 2: The mechanism from where knowledge managing intellectual capital and knowledge assets, and
integration is performed (becomes visible). Examples also the processes that act upon them. In practical sense
are tinkering, enacting, storytelling, circulating, and KM is about governing the creation, dissemination, and
interplaying. (Munkvold, 2006) utilization of knowledge in organizations. (Anttiroiko,
2005b) 5: Set of activities which deals with knowledge
Knowledge Interchange Format (KIF) acquisition, selection, internalization, and usage. (Xodo,
A language designed for use in the interchange of 2005) 6: The collection of processes that manage the
knowledge among disparate computer systems (created creation, dissemination, and utilization of knowledge
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
390 K now le dge M a na ge m e nt Archit e c t ure K now le dge M a na ge m e nt M e cha nism
for learning, problem solving, and decision making. Knowledge Management Effectiveness
KM often encompasses identifying intellectual assets The measure of how well knowledge management
K within organizations. The management of knowledge is processes are implemented. (Jennex, 2006a)
regarded as a main source of competitive advantage for
organizations. KM brings together three organizational Knowledge Management Episode
resourcespeople, processes, and technologiesand A coniguration of knowledge manipulation activities,
enables the organization to use and share information more by a collection of knowledge processors, operating on
effectively. (Aurum, 2005) 7: The gamut of organizational available knowledge resources, subject to knowledge
processes, responsibilities, and systems directed toward management inluences, and yielding learning and/or
the assimilation, dissemination, harvest, and reuse of projections. (Holsapple & Joshi, 2006)
knowledge. (Kochikar & Suresh, 2005) 8: Practices
and technologies that facilitate the eficient creation Knowledge Management Infrastructure
and exchange of knowledge on an organizational level. 1: The long-term foundation on which knowledge
(Mitchell, 2005b) 9: A concept in which an enterprise management resides. It includes ive main components:
gathers, organizes, shares, and analyzes its knowledge in organization culture, organization structure, communities
terms of resources, documents, and people skills. It involves of practice, information technology infrastructure, and
capturing, warehousing, transforming, and disseminating common knowledge. (Becerra-Fernandez & Sabherwal,
data/information within an organization to leverage 2006) 2: To successfully implement knowledge management,
knowledge for competitiveness enhancement. (Rahman, it is important to understand the infrastructure required to
2005b) 10: A combination of management awareness, support the acquisition, generation, transfer, and storage
attitudes, processes, and practices for creating, acquiring, of tacit and explicit knowledge resources. Knowledge
capturing, sharing, and using knowledge to enhance management involves the coordination and integration
learning and performance in organizations. (Bellarby of multiple knowledge-based activities, structures,
& Orange, 2006) 11: A concept where an organization systems, processes, and individuals with diverse roles in
deliberately and comprehensively gathers, organizes, the organization. These elements are frequently grouped
and analyzes its knowledge, then shares it internally and into three categoriespeople, processes, and technology.
sometimes externally. (Pang, 2005a) 12: A program for (Cepeda-Carrin, 2006)
managing a irms intellectual capital by systematically
capturing, storing, sharing, and disseminating the irms Knowledge Management Initiative
explicit and tacit knowledge. (Herschel, 2005) 13: A set A systematic effort in the form of a project, for example,
of sociotechnological enablers and processes that move or that aims at generally fostering KM and speciically
modify knowledge resources and foster learning. (Handzic implementing a KM instrument in an organization. (Maier
& Lin, 2005) 14: A systematic attempt to use knowledge & Hdrich, 2006)
within an organization to improve overall performance.
(Walker, 2006) 15: An entitys systematic and deliberate Knowledge Management Instrument
efforts to expand, cultivate, and apply available knowledge A bundle of measures encompassing organization,
in ways that add value to the entity, in the sense of positive human resources, and ICT with the goal of improving
results in accomplishing its objectives or fulilling its organizational effectiveness. The support of KM
purpose. (Holsapple & Joshi, 2006) instruments distinguishes a KMS from a more traditional
ICT. (Maier & Hdrich, 2006)
Knowledge Management Architecture
The technology and procedural platforms employed by a Knowledge Management Lifecycle
irm to enable knowledge capture, sharing, retention, and The cycle of activities associated with managing
distribution. (Herschel, 2005) knowledge. (Nissen, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge M a na ge m e nt Proble m K now le dge M a na ge m e nt Syst e m (K M S) 391
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
392 K now le dge M a na ge m e nt Syst e m Effe c t ive ne ss K now le dge N e t w ork
Knowledge Management System Effectiveness learning services (such as application sharing or visualized
The measure of how well the components of a knowledge chat sessions). (Eppler, 2006)
K management system are implemented or perform their
intended functions. (Jennex, 2006a) Knowledge Mediation
The process of matching the knowledge of agents when they
Knowledge Management System Success communicate or cooperate in tasks. (Sterling, 2006)
The improvement in organizational performance that
comes from using knowledge as a result of a knowledge Knowledge Mining
management system. Success can be expressed as the result A practical synonym of knowledge discovery, not an
of the impacts caused by the use of the KMS or the effective extension of it. At present, the use of the term is strongly
implementation of KMS processes. (Jennex, 2006b) associated as a synonym of knowledge discovery and data
mining. Knowledge mining consists of the following four
Knowledge Management System Success Factor integrated components designed to seamlessly guide the
Anything necessary to encourage or increase the effective extraction process and contribute to providing corporations
use of a KMS. (Jennex, 2006b) with a concise understanding of their business rules:
system-wide knowledge recovery, program-level analysis,
Knowledge Manager business rule extraction, and automatic documentation.
Support structure that assigns a distinct set of knowledge- (Raisinghani, 2005)
related tasks, usually within the coordination domain, to
an individual person. (Hendriks, 2006) Knowledge Modeling
Consists of representing the knowledge in some selected
Knowledge Manipulation language or notation. (Ma, 2006)
The abuse of knowledge management; when information
is hidden, distorted, withheld for a particular purpose. Knowledge Need Identiication
(Land, Nolas, et al., 2006) The process of inding out to a satisfying degree what
knowledge an individual or collective actor needs at a
Knowledge Manipulation Activity certain moment for a particular purpose. (Kraaijenbrink
An activity that processes usable knowledge representations & Wijnhoven, 2006)
embedded within an entitys knowledge resources.
(Holsapple & Joshi, 2006) Knowledge Negotiation
Decision-making process to determine what knowledge is
Knowledge Map essential to collaborative knowledge work and learning.
1: An Intranet hypertext-clickable map to visually display Virtual learning spaces and concept maps may facilitate
the architecture of a knowledge domain. Knowledge maps this process. (Brown, 2006)
are also known as topic maps and skill maps. (Jennex,
2005) 2: Cartographic depiction of knowledge sources, Knowledge Network
structures, assets, and development or applications steps. 1: These networks are viewed like a relection of the growing
A knowledge map does not directly represent knowledge, dependence of the companies in front of external sources
but reference it for easier identiication and assessment. of knowledge. Therefore, they are not only sensitive to the
(Eppler & Burkhard, 2006) social contacts, but they are also important for the mobility
of the knowledge and, in consequence, at the space distance
Knowledge Media among the components of the network. (Ranguelov &
Information technology-based infrastructures that enable Rodrguez, 2006) 2: A self-managing community of people
knowledge codiication and transfer. They are platforms who share mutual trust and respect, and come together to
for the exchange of insights, experiences, and methods share their knowledge. (Elshaw, 2006a) 3: Knowledge is
among scientiic communities and communities of practice. information with guidance for action based upon insight
Knowledge media offer various electronic knowledge and experience. A network is the connection of two or
services, such as expert directories (who knows what), more entities so that they can share resources. A knowledge
knowledge maps (how are areas of knowledge related), network is an interconnected resource entity to improve the
notiication services (what is new), or communication and results of perception and learning, and reasoning. (Rahman,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge N ode K now le dge Pe rsona lizat ion 393
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
394 K now le dge Por t a l K now le dge Se a rch
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge Se e ke r K now le dge Spira l 395
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
396 K now le dge St a ke holde r K now le dge Tra nsfor m at ion
(explicit-tacit knowledge transfer), and externalization the organization, typically by using advanced information
(tacit-explicit knowledge transfer). (Wickramasinghe, technologies. (Vat, 2006a)
K 2006)
Knowledge Taxonomy
Knowledge Stakeholder The hierarchical organization of knowledge categories
Someone with critical knowledge speciic to current within a knowledge management system. (Jennex,
problems, opportunities, and prior consulting engagements, 2005)
and who can act as a human directory resource. (Croasdell
& Wang, 2006) Knowledge Topic
Deinition of a particular area of knowledge useful for a
Knowledge Stance person or the members of a community. (Rodrguez-Elias
A recurring situation in knowledge work deined by et al., 2006)
a certain occasion, a context, and a mode resulting in
knowledge-oriented actions. It describes a situation in Knowledge Trail
which an employee can, should, or must switch from a Provides information on who did what, when, how, and
business-oriented function to a knowledge-oriented action. why. (Dustdar, 2005)
(Hdrich & Maier, 2006)
Knowledge Transaction
Knowledge Storage An economic exchange whose object is knowledge. (Scarso
Retaining knowledge in individual or collective memory. et al., 2006)
When knowledge is stored, it is indexed in memory. (Prat,
2006) Knowledge Transfer
1: Knowledge is transferred from the sender(s) (person,
Knowledge Structure group, team, or organization) to the recipient(s) (person,
A parameterized concept that could help explain why a group, team, or organization). (Chen, Duan, et al.,
speciic knowledge discovery technique performs best 2006) 2: Refers to an exchange of knowledge in which
for a particular knowledge discovery task. The concept the focus is on structural capital (knowledge that has
is analogous to the form and meaning (i.e., underlying been built into processes, products, or services) and on
structure) of the knowledge to be discovered in a database, the transformation of individual knowledge to group
and deined by a set of parameters P. (Wilson et al., knowledge or organizational knowledge. (Jacobson, 2006)
2006a) 3: The focused, objective-seeking communication of
knowledge between individuals, groups, or organizations
Knowledge Substitution such that the recipient of knowledge: (1) has a cognitive
The degree to which one kind of knowledge (e.g., specialist understanding, (2) has the ability to apply the knowledge,
design knowledge) can be substituted for another (e.g., or (3) applies the knowledge. (King, 2006a) 4: The process
generalist technology development knowledge) without concerning the transfer of knowledge from a source to
affecting organizational performance. (Nissen & Levitt, a recipient or user. It is the most studied process in the
2006) KM literature. (Bolisani et al., 2006) 5: The sharing of
knowledge within or between individuals, groups, and
Knowledge Supply Network organizations. (Prat, 2006)
An integrated set of manufacturing and distribution
competence, engineering and technology deployment Knowledge Transformation
competence, and marketing and customer service The process in which the learner behaves as a passive
competence that work together to market, design, and information receiver at the beginning of a course, but
deliver end products and services to markets. (Abraham gradually plays an active role in learning and constructing
& Leon, 2006) knowledge midway through the course. (Bodomo,
2005a)
Knowledge Synthesis
The broad process of creating, locating, organizing,
transferring, and using the information and expertise within
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
K now le dge U t ilizat ion K now le dge -Ba se d Orga nizat ion 397
Knowledge Utilization require advanced ICT support. (Maier & Hdrich, 2006)
1: The application of knowledge to business processes. 3: Refers to work conducted by knowledge workersthat
Knowledge has no value per se, but draws its value from is, work that comprises to a large extent the tasks of
K
concrete application to business processes. (Prat, 2006) retrieving, evaluating, integrating, and creating knowledge.
2: The individual or collective process aimed at using (Derballa & Pousttchi, 2006b) 4: The ability to create an
knowledge by one or more of the subprocesses of direction, understanding of nature, organizations, and processes,
routinization, diffusion, application, or exploitation. and to apply this understanding as a means of generating
(Kraaijenbrink & Wijnhoven, 2006) wealth in the organization. (Heavin & Neville, 2006) 5:
Work accomplished through the manipulation of data and
Knowledge Viewing symbols. (Hantula & DeRosa, 2005)
Individually or collectively monitoring the existing
external knowledge base to detect relevant changes. Knowledge Worker
(Kraaijenbrink & Wijnhoven, 2006) 1: Anyone whose work involves tasks that require the
processing of information. These tasks include collecting,
Knowledge Vision analyzing, synthesizing, structuring, storing, retrieving,
A root deinition of what knowledge will give the and using information. (Lindsey, 2006) 2: People who
organization a competitive edge in the knowledge-based look to different repositories or wealth of knowledge to
economy. (Vat, 2006a) ind new solutions to challenges faced in a dynamic and
changing work environment. (Ray, 2006)
Knowledge Visualization
1: A visual (or other sense-based) representation of Knowledge-Based Economy
knowledge; a portrayal via graphical or other sensory 1: A form of modern economy referring to a speciic
means of knowledge, say, of a particular domain, making structural transformation, where the fast creation of new
that knowledge explicit, accessible, viewable, scrutable, knowledge and the improvement of access to various
and shareable. (Alpert, 2006) 2: Designates all graphic knowledge bases increasingly constitute the main resource
means that can be used to develop or convey insights, for greater eficiency, novelty, and competitiveness.
experiences, methods, or skills. (Eppler & Burkhard, (Chochliouros & Spiliopoulou-Chochliourou, 2006) 2:
2006) Economy that thrives because people have the necessary
knowledge and skills. (Gnaniah et al., 2005b)
Knowledge Warrior
A facilitator of information with responsibilities for shaping Knowledge-Based Enterprise
knowledge in response to information requirements to An enterprise that derives the most value from intellectual
speed decision times. (Maule, 2006) rather than physical assets. A knowledge-based enterprise
is a irm that is fully embracing knowledge management
Knowledge Web and committed to fostering continuous learning.
The use of electronic linkages among different teaching and (Wickramasinghe & Sharma, 2005)
learning communities to facilitate information acquisition
and knowledge building. (Neville & Powell, 2005) Knowledge-Based Future
Essentially this relects the new economy whereby
Knowledge Work knowledge sharing and knowledge management are critical
1: Conceptual and analytical practices that require domain- to an organizations success and the achievement of a
speciic knowledge and can be conducted from a variety of sustainable competitive advantage. Knowledge sharing
locations and, thus, are not tied to processes or technologies is also important for the community as a whole. (Pease
of speciic workplace locations. (P.M. Leonardi, 2005) 2: et al., 2005)
Creative work solving unstructured problems that can be
characterized by a high degree of variety and exceptions, Knowledge-Based Organization
strong communication needs, weakly structured processes, An organization that competes on the basis of its differential
teamwork in the form of project teams, networks and knowledge. (Nissen, 2005)
communities, and a high level of skill and expertise that
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
398 K now le dge -Ba se d Pe rsona lizat ion K now le dge m e dia r y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Kohone n Fe at ure M a p Kullba ck -Le ible r Dive rge nc e 399
Kolmogorov Complexity of a String where the sufix indicates the values of the parameters,
The length of shortest program that can generate the given which minimizes the distance with respect to f. (Giudici,
string. (T.Y. Lin, 2005) 2005)
KOM Goals
Integration, adaptation, goals attainment, and pattern
maintenance. (Wijnhoven, 2006)
KOM Means
Information technological and human means, which
support knowledge logistic processes (acquisition, storage,
maintenance, search and retrieval, and dissemination).
(Wijnhoven, 2006)
Kompong Speu
A province of Cambodia; its capital is Kompong Speu.
(Hutchinson, 2005)
Kriging
1: A technique that can be used to develop contour maps
(e.g., maps that show lines of equal value such as DWI
rates) from a limited number of points or areas (which
can be given a value at the centroid). (Lipton et al.,
2005) 2: A geostatistical gridding method that produces
visually appealing maps from irregularly spaced data.
The estimates of kriging are unbiased and have minimum
variance. The method is based on the assumption of spatial
autocorrelation of data, and the autocorrelation structure
(spatial distribution of the data) is addressed through
variogram modeling. The underlying assumption of the
variogram is that two observations close together are more
similar than those further apart. (Ali et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
400 L = P + Q Language of Temporal Ordering Speciications (LOTOS)
L
L=P+Q LAD: See Logical Analysis of Data.
AL is based on the radical concept that signiicant learning
(L) only results when based on routine knowledge in Laity
use (P) and questioning insight (Q) brought together The condition or state of a layman, the body of the people
through a process of personal and communal relection that not in orders; as opposed to the clergy. (Rogers & Howell,
integrates research on what is best practice or obscure with 2005)
practical action to resolve a problem. (Smith, 2006a)
LAN: See Local Area Network.
LAAS: See Local Area Augmentation System.
Land Information System (LIS)
Label A GIS specially designed for use with land information.
A short, ixed-length, physically contiguous, locally Land rights, ownership, boundaries, utility, land cover,
signiicant identiier used to identify a stream. (Gutirrez and zoning data are common layers and attributes in an
& Ting, 2005) LIS. (Velibeyoglu, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
La ngua ge s for Spe c ia l Purpose s (LSP) La ye r 401
been used, for example, to specify the Open Systems connectiongenerally made of a pair of copper wires
Interconnection (OSI) architecture (ISO 7498). (Campos between the subscribers location and the nearest telephone
& Harrison, 2006) exchange. The last mile, which is also called line or
L
subscriber line, coincides with the most restrictive
Languages for Special Purposes (LSP) deinition of local loop. (Arbore, 2005)
The languages used for particular and restricted types of
communication (e.g., for medical reports, scientiic writing, Last-Mile Capabilities
air-trafic control). They are semi-autonomous, complex A new category of e-fulillment capabilities which involves
semiotic systems based on and derived from general all aspects of delivering to customers workplaces or
language; their use presupposes special education and is homes. Quality, cost-effectiveness, and lexibility of such
restricted to communication among specialists in the same deliveries is critical to the success of online retailers but
or closely related ield. (Ahmad & Al-Sayed, 2006) includes a host of problems that must be overcome. Issues
such as payments, security, extended delivery times,
Laptop returns, customer presence, and handling of different-
A portable personal computer small enough to use on temperature and perishable deliveries have catalyzed the
your lap with a QWERTY keyboard and display screen. development of new capabilities such as locked boxes,
It usually has an A4-sized footprint in a clamshell wireless payment devices, and innovative courier networks.
coniguration and may incorporate a variety of peripheral (Alexander & Burn, 2006)
devices (e.g., trackball, CD-ROM, wireless network card,
etc.). (Garrett, 2006b) LATA: See Local Access Transport Area.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
402 La ye r 4 Sw it ch Le a n M e dia
Layer 4 Switch Main research areas are traits of the leading individual,
A switch that can retrieve from the network packets context factors of the situation where leadership takes
L information about the port number they are using, and thus place, and different inluence tactics employed by the
the application that generated them. (Danalis, 2005) leading person. (von Wartburg & Teichert) 2: The ability
to organize and motivate others, overcome problems,
Layered Biometric System and initiate and accept responsibility. (Petska & Berge,
Multi-layered, layered, and multimodal biometric systems 2005) 3: The dynamic phenomenon in group life where
combine more than one physiological or behavioral an individual or individuals consciously or unconsciously
characteristic for veriication or identiication. By promoting inluence and direct the activities and interactions of
multi-layered identification and authenticationthat that group. Leadership may be formally constructed
means parallel use of strong passwords, smart tokens, and and embodied within an organizational role, or emerge
biometricsmany signiicant security problems can be informally from the interactions of the group by tacit
eliminated. The combination of multiple biometric methods processes. (Cargill, 2006a)
such as voice and ingerprints, in conjunction with, for
example, digital certiicates and smart cards, offer the Leadership Behavior
companies an ideal solution to provide a very high level of The various actions that leaders contribute to group and
protection for their sensitive information. (Mezgr, 2005) team life that may be generally categorized as task related
or relationship oriented. Task behaviors aim to structure,
Layered Security Approach direct, and progress the work of the group. Relationship
The use of multiple, overlapping security technologies behaviors aim to address the way the group members
and applications to protect an organizations information feel about and interact with each other, with the leader,
assets. (Wilson et al., 2006b) and with the task they are tackling. The holding and
communicating of a vision for the group is also generally
LBS: See Location-Based Service. acknowledged as a leadership behavior that is both task
related and relationship oriented. (Cargill, 2006a)
LCMS: See Learning Content Management System.
Leadership Style
LCSS: See Longest Common Subsequence Similarity. The manner in which leaders carry out their responsibilities
and the way they interact with others deines their style
LDAP: See Lightweight Directory Access Protocol. of leadership. (Petska & Berge, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a ne r-Le a r ne r I nt e ra c t ion Le a r ne r-Cont e nt I nt e ra c ti on 403
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
404 Le a r ne r-I nst ruc t or I nt e ra c t ion Le a r ning by Doing
Seng 2005) 2: Interactions that occur between the learner learner submissions, feedback, and assessment. (Collis
and the content of the course or activity that they are & Moonen, 2005a)
L pursuing (i.e., textbooks, Web pages, database activities,
etc.). (Day, 2005) Learning Algorithm
The method used to change the weights so that the error
Learner-Instructor Interaction is minimized. Training data is repeatedly presented to
1: Interaction between the learner(s) with the instructor. the MFNN through the input layer, the output of the
(Kung-Ming & Khoon-Seng 2005) 2: Interaction between MFNN is calculated and compared to the desired output.
the various members of the learning community and their Error information is used to determine which weights
relation to the course or activity in which each is involved need to be modiied, and by how much. There are several
(i.e., cohorts, learning teams, collaborative learning parameters involved in the learning algorithm including
community). (Day, 2005) learning rate, momentum factor, initial weights, and so
forth. (Smith, 2005)
Learner-Medium Interaction
Interaction between learners, teachers, and support Learning Allostatic Load
personnel in relation to the method of communications that The accumulation of perceptions and decisions that develop
is being utilized for the course or activity (i.e., Internet, into self-esteem and protective strategies that may or may
intranet, server system, video, or satellite communications). not be beneicial to future learning events. (Molinari et
(Day, 2005) al., 2005c)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning Ce nt e r Le a r ning Flow 405
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
406 Le a r ning Group Le a r ning M a na ge m e nt Syst e m (LM S)
the new knowledge production process (feedforward) and to manage their training needs, from planning through
the use of the knowledge that has already been generated registration and completion. (Waddington et al., 2005)
L (feedback). (Real et al., 2006) 6: An e-learning infrastructure with real-time databases
that deal with user (learner, coach, faculty, and so on)
Learning Group information, including the users learning competencies,
A group of people, often with a luid hierarchy and shifting learning objects for each type of learning style and form,
roles, whose emphasis is learning before eficiency. The and learning activity and performance log tracking. An
focus is on the process (the product being secondary), extended LMS may also support authoring, performance
with the idea that the best learning outcomes will occur assessment, classroom management, competency
when participants take on challenges and unfamiliar tasks management, knowledge management, certiication and
in order to gain competency in new areas. (Graham & compliance training, personalization, mentoring and
Misanchuk, 2005) coaching, and communication. (Kayama & Okamoto,
2005) 7: Includes all the functions for student and course
Learning Infrastructure management, learning assessment, and tracking and
1: The set of physical and digital buildings, applications, reporting on student progress and activity. (Diamadis &
services, and people that provide and support the Polyzos, 2005) 8: Software designed to help administer the
environments for learning. (Boettcher, 2005a) 2: The set teaching/training environment. The LMS registers users,
of physical and digital buildings, applications, services, tracks courses, records data from learners, and provides
and people that provide and support the environments for reports to the instructor. The focus is on managing courses,
learning. (Boettcher, 2005b) not on content creation. (Du Mont, 2005) 9: A collection
of server-side Web tools that help an instructor to create a
Learning Management System (LMS) course Web site. (Bagwell, 2005) 10: A broad term used
1: A Web-based program that manages the administration to describe a wide range of systems that organize and
of training. Typically includes functionality for course provide access to e-learning environments for students,
catalogs, housing courses, launching courses, registering tutors, and administrators. (Clayton, 2006b) 11: Enterprise
students, tracking student progress, and conducting software used to manage learning activities through the
assessments. (Kapp, 2005) 2: A software application ability to catalog, register, deliver, and track learners
used to plan, implement, and assess learning processes. and learning. (Snchez-Segura et al., 2005) 12: Software
Typically, an LMS provides an instructor with a way to that automates the administration of training events by
create and deliver content, monitor student communication registering users, tracking courses, recording the learners
and participation, and assess student performance; it data, and providing reports to management. (Brown,
also provides students with the ability to use interactive 2006) 13: Designed for the delivery and management of
features such as threaded discussions, videoconferencing, e-learning courses. Generally includes a learner interface
and discussion forums. (Chapman, 2005a) 3: A software and some administrative functions such as course setup,
that automates the administration of training events. The learner registration, course assignment, and reporting of
LMS registers users, tracks courses in a catalog, and learners progress. (Ng, 2006) 14: Software environment
records data from learners; it also provides reports to within which students access learning objects provided
management. The database capabilities of the LMS extend by an instructor. An LMS-based course is a framework
to additional functions such as company management, and structure that contains learning objects and directions
online assessments, personalization, and other resources. to students from the instructor regarding how and when
Learning management systems administer and track both they should be accessed. With LMSs, instructors focus
online and classroom-based learning events, as well as their energy and expertise on the creation or utilization of
other training processes (these would need to be manually learning objects and the day-to-day management of their
entered into the system for tracking purposes). (Galitsky, courses. (Reisman, 2006) 15: Refers to an environment
2005b) 4: A system that automates, totally or partially, whose primary focus is the management of the learning
the creation, management, and execution of learning process (i.e., registration and tracking of students,
activities and their related processes of design, auditing, content creation and delivery capability, skill assessment
and assessment. (Sicilia & Snchez-Alonso, 2006) 5: A and development planning, organizational resource
Web-based application designed to enable employees management). (Esmahi, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning M e t a phor Le a r ning Obje c t (LO) 407
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
408 Le a r ning Obje c t M e t a dat a (LOM ) Le a r ning Orga nizati on
contained chunks of training content that can be assembled of educational contents for speciic needs. (Sicilia &
with other learning objects to create courses and curricula, Snchez-Alonso, 2006) 3: Metadata that contain semantic
L much the same way a childs Lego blocks are assembled information about learning objects. The main aim of LOM
to create all types of structures. Learning objects are speciication is to enable the reuse, search, and retrieval
designed to be used in multiple training contexts, aim of learning objects. The standard, developed by the IEEE
to increase the lexibility of training, and make updating Learning Technology Standards Committee (LTSC) in
courses much easier to manage. (Galitsky, 2005b) 4: A 1997, speciies a conceptual data schema that deines
digital entity described by a metadata record that facilitates the structure of metadata instances for a learning object.
its reuse in online learning. (Sicilia & Snchez-Alonso, (Ishaya, 2005) 4: The IEEE standard conceptual schema
2006) 5: An artifact or group of artifacts with learning that speciies the set of attributes required to describe a
objectives that can be used to increase our knowledge. learning object. (Esmahi, 2005)
(Verhaart & Kinshuk 2006) 6: Any entity, digital or non-
digital, that can be used, reused, or referenced during Learning Object Repository
technology-supported learning. (Askar & Halici, 2005) 7: Digital resources within a structure accessible through
An object mainly used to refer to a digital resource that a computer network connection using interoperable
can be reused to support learning. However, the broadest functions. (Luppicini, 2006)
deinition includes any instructional components that
can be reused in different learning contexts. (Esmahi, Learning Object Reusability
2005) 8: Any entity (digital or non-digital) that may be The capability of a learning object to be used in different
used for learning/education/training. A learning object educational contexts. It is commonly agreed that reusability
is usually the smallest unit of instruction managed by an is a property of the design of the learning object and of its
LMS. However, a learning object may grow increasingly associated metadata record. (Sicilia & Snchez-Alonso,
complex, have any internal structure, and may get more 2006)
size or granularity. In order to reuse, learning objects
are described by metadata. (Kayama & Okamoto, 2005) Learning on Demand
9: Chunks of learning content that can be combined to A phrase associated with the concept of Just-in-Time
comprise teaching modules or courses. (ODea, 2005) Learning. It is speciically associated with the learners
10: Available information (usually on the Web) that role in determining what he or she wants or needs to learn
is reusable and applicable to many different learning at any given time. (Iannarelli, 2005)
contexts. (Lindsay, Williams, et al., 2005) 11: Deined
as any entitydigital or non-digitalthat may be used, Learning or Information Ecology
reused, or referenced for learning, education, or training. For preserving the chances of offering the complexity
Examples of learning objects include multimedia content, and potential plurality within the technological shaping
instructional content, learning objectives, instructional of knowledge representation and diffusion, the learning-
software and software tools, people, organizations, and or information-ecology approach is indispensable for
events referenced during technology-supported learning. cultivating practical judgments concerning possible
(Ishaya, 2005) 12: A digital resource that can be reused in alternatives of action in a democratic society, providing the
more than one learning experience. (Chapman, 2005b) critical linguistic essences, and creating different historical
kinds of cultural and technical information mixtures.
Learning Object Metadata (LOM) Noteworthy is the fact that learning or knowledge involves
1: Semantic information attached to learning objects. a dynamic, living, and evolving state. (Kwok Lai-yin &
There are a number of LOM standards. The main aim of Tan Yew-Gee, 2005)
the LOM speciication is to enable the reuse, search, and
retrieval of the LOs content and the integration of LOs Learning Organization
with external systems. (ODea, 2005) 2: The description 1: An enterprise that facilitates the learning of all its
of the contents, technical characteristics, and prospective members and continuously transforms itself. (Brace &
educational usages of a piece of Web content, aimed at Berge, 2006) 2: An organization that continually strives to
its reuse and used as a facilitator for the implementation create a culture and environment that promotes learning,
of advanced resource search and selection services exploration, and innovation, and that continuously
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning Orie nt at ion Le a r ning St yle 409
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
410 Le a r ning St yle Fa c t or Le a r ning Volit ion
and complete practical tasks. (Ally, 2005c) 3: Consists of Learning Technology Standard/Specification
the ways and modes people acquire knowledge, so it helps (LTS)
L greatly in knowledge acquisition and retention. There are 1: A de jure standard for learning/education/training with
four important learning styles identiied: feeling (concrete information technology. This type of standard includes
experience), thinking (abstract conceptualization), a formal accredited normative speciication or set of
watching (relective observation), and doing (active guidelines, typically including conformance criteria. A
experimentation). (Y.J. Zhang, 2005b) 4: Generally standard is created by a formal standards development
accepted to be a students existing learning strengths organization (SDO), like the European Committee on
or preferred manner of learning. (Kaur et al., 2005) 5: Standardization (CEN), the International Organization for
Generally refers to learning dispositions that students adopt Standardization (ISO), and the IEEE Learning Technology
in educational environments; sometimes called learning Standards Committee (IEEE LTSC). (Kayama & Okamoto,
approach or learning orientation. (Berg, 2005d) 2005) 2: Agreement about the characteristics that a
learning element should have in order to be compatible,
Learning Style Factor interchangeable, and interoperable into other learning
Linear combination of the original questions that represent systems. The use of standards ensures instructional
the underlying constructs that summarize the original technologies interoperability and their learning objects for
questions. Actionneed to physically participate in universities and corporations around the globe. Examples
a course; authority dependenceneed for instructor of LTSs are Instructional Management Speciication (IMS),
feedback and direction; avoidancedesire to stay Educational Modeling Language (EML), and IEEE LOM.
away from class; communicationability to write and (Garca et al., 2006)
understand written communication; concreteprefer
concrete rather than abstract; instructor organization Learning Theory
need for clear instructions from the instructor; reading/ 1: One of a range of theoretical models used to facilitate
listeningpreference for reading or listening rather understanding of the process of learning. (Sieber & Andrew,
than talking or interacting; recognitionneed for the 2005) 2: A set of hypotheses or beliefs that explain the
teacher to recognize work; sociabilitythe need for process of learning or acquiring knowledge and skill.
social or face-to-face interactions with peers; and student (Boettcher, 2005a)
organizationability to set up a study schedule and abide
by it. (Witta & Lee, 2005) Learning Tool
A tool included in a Web-based learning environment for
Learning Task managing the course, and geared to facilitating student
One of a set of steps with a deined learning goal addressing learning in the environment. (Lammintakanen & Rissanen,
speciic training needs identiied within business processes 2005a)
driving the deinition of proper instructional design and
e-learning system requirements. (Rentroia-Bonito & Learning Trajectory
Jorge, 2005) An individual or collective learning pattern in a irm geared
to the development of the adequate mix of internal and
Learning Technology (LT) external knowledge from which to extract competitive
1: Media, computing, and telecommunications tools used potential. Knowledge-management initiatives can be
to support the learning process either on or off campus understood, ultimately, as tactical arrangements to support
such as audio and video recorders, fax machines, CD- the proper collection of learning trajectories needed at a
ROMs, video projectors, computers, modems, telephones, given juncture for the development of a irms required
audio and video conferencing systems, satellite systems, knowledge base. (Andreu & Sieber, 2006)
ilm, and television. (Campbell & Berge, 2005) 2: Any
technology that is used with the intention of promoting Learning Volition
learning. (Sieber & Andrew, 2005) There are two types of learning volition: internal and
external. The former has to do with the learners spontaneity
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Le a r ning-Cur ve Effe c t Le ibnizia n Fa c t N e t 411
and interest, the latter one arises from external factors such tasks. Systems that have become outdated, as business
as competition with the others, rewards, and penalties. needs change and the hardware/software available in the
(Barolli & Koyama, 2005b) marketplace have improved. (Bradley, 2005)
L
Learning-Curve Effect Legitimacy in CoPs
Originally, the experience- or learning-curve effect The element that deines the force and authority in relations
describes that each doubling of the accumulated amount within the group, but that legitimacy need not be formal.
of production reduces the production unit costs by (Ranguelov & Rodrguez, 2006)
approximately 20-30%. This effect not only refers to
production, but can appear in all business areas to a certain Legitimate Peripheral Participation (LPP)
degree. (Knust & Hagenhoff, 2005) 1: A conceptual framework that recognizes that different
kinds of learners can contribute to learning in a Virtual
Least Signiicant Bit (LSB) Community of Practice (VCoP). As a consequence, novices
The last or the right-most bit in a binary number. The are welcome to participate in the group even if their
reason it is called LSB is because changing its value will positions in the social network are peripheral and their
not dramatically affect the resulting number. (K. Chen, contributions marginal. Over time, provided opportunities
2005) for situated learning, they are acquiring a growing body of
knowledge and may become core members of the respective
Legacy Data community. (von Wartburg et al., 2006) 2: A complex and
1: Contents of databases that precede the installation composite process through which new members become
and implementation of new systems. Optimally, legacy matured members by acquiring knowledge from the
data are migrated into new data systems; following this group. (Chua, 2006) 3: The process by which a newcomer
process, the older application and data structure may be gradually works his/her way towards full participation in
archived or deleted. Frequently, in an effort to reduce the the community. (Kimble & Hildreth, 2005) 4: When non-
cost of implementation, legacy data remains outside a members are allowed the opportunity to fully participate in
new data store and accessed as foreign data records from community activities and begin to behave as community
the new application. (Horiuchi, 2005a) 2: Data that you members. It is through this membership that knowledge can
already have and use. Most often, this takes the form of be shared with the rest of the community. These individuals
records in an existing database on a system in current use. must have access to the periphery of the practice, which
(Bellatreche & Mohania, 2005) allows for either observation or participation in the practice,
and eventually their participation becomes legitimized.
Legacy System Periphery is not used in the geographical sense, but as the
1: Typically, a database management system in which an degree of involvement an individual may have with the
organization has invested considerable time and money, community. (Paquette, 2006a) 5: States that all members
and which resides on a mainframe or minicomputer. of a community (also the less expert or more peripheral to
(Pang, 2005b) 2: A software system that continues to it) have the same rights and are legitimated in accessing
be used because of the cost of replacing or redesigning all resources and participating in all practices of the
it, despite its poor competitiveness and compatibility community. It is strongly based on Vygotskjis ZPD
with modern equivalents. (Aversano et al., 2005) 3: An concept. (Cartelli, 2006a)
information system from an earlier period of technology
and development. (Mackey, 2005) 4: A mission-critical Leibnizian Fact Net
aging system that supported business functions for many A knowledge store founded on axioms. Leibnizian inquiry
years, however it is no longer considered state-of-the-art does not begin with inputs that are externally given, but with
technology and has limitations in design and use. Within innate ideas where aspects of the symbol stream are under
organizations, the vast majority were replaced pre-Y2K the control of the inquiry system. The truth is the end point
with ERP systems. (Sammon & Adam, 2005) 5: Older of the process of inquiring and is concomitant with internal
computing technology used by an organization over time. consistency, completeness, and comprehensiveness. In this
Legacy systems perform business-critical functions and inquiring system, all sentences are contingent. A candidate
can be integrated with newer systems. (Yoon et al., 2005) 6: sentence becomes a contingent truth if it can be linked
Transaction processing system designed to perform speciic to some sentence in memory. Thus, the memory becomes
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
412 Le sse r Deve lope d Count r y (LDC) Life long Le a r ning
a fact net by which the truth of a sentence is veriied. entities in the future as a result of past transactions or
(Hall & Croasdell, 2006) events. (Tahinakis et al., 2006)
L
Lesser Developed Country (LDC) Library
A class of country in developing, emerging markets with a 1: A group of functions and/or classes stored separately
least developed status; older and more politically incorrect from the main body of the main program; an include
terms for these countries include second and third world, ile consisting of functions and/or classes. (D. Brandon,
and underdeveloped/undeveloped. (Petter et al., 2005) Jr., 2005a) 2: A library generally includes many different
collections, each organized differentlythough there
Lessons Learned is a strong family resemblance in how collections are
Task- or situation-speciic knowledge gained while presented. (Trujillo, 2005)
completing tasks or projects, also referred to as best-known
methods, best practices, and internal benchmarking. LIC: See Low-Intensity Conlict.
(Kulkarni & Freeze, 2006)
Licensing Domain
Level in the Hybrid Network Characterization of the breadth of availability and level
The proposed model of network includes distinct levels of of access to open materials. (Fleming, 2005b)
participation, but the distinction in levels is not based on
the degree of involvement in tasks, but on the personality Life Event
of members, their degree of commitment, and the type of 1: A way to classify information and services in government
tasks to be performed. (Ranguelov & Rodrguez, 2006) Web sites that refer to those moments in peoples lives
when there exists more need for information and service.
Levelwise Discovery For example, moving, dealing with crime, having a baby,
A class of data-mining algorithms that discovers patterns and so on. (Kaufman, 2005) 2: An incident for a service
of a certain size by irst discovering patterns of size 1, then consumer that necessitates the use of a number of services.
using information from that step to discover patterns of (Vassilakis & Lepouras, 2006)
size 2, and so on. A well-known example of a levelwise
algorithm is the Apriori Algorithm used to mine association Life Span
rules. (Koeller, 2005) The time over which a database object is deined. (Ale
& Rossi, 2005)
Leverage
1: Investing with borrowed money as a way to amplify Life Table
potential gains (at the risk of greater losses). (Lubbe, Describing the survival rate as a function of time, referred
2005) 2: Knowing which actions may yield long-lasting to as the survivor function. (Chen, Oppenheim, et al.,
outcomes. Knowing where and when to intervene or 2005)
inluence a system to gain long-lasting desired change
using minimal effort and energy. (Maani, 2005) Lifecycle
Common process identiied in PMMM Level 2 which
Lexical Indices could be broken into ive phases: embryonic, executive
Lexical items, for example, proper names and events, used management acceptance, line management acceptance,
to index texts. (Kulyukin & Nicholson, 2005) growth, and maturity. (Monteiro de Carvalho et al.,
2005)
Lexicographer
A compiler or writer of a dictionary for practical use or for Lifelong Learning
any other purposes. (Ahmad & Al-Sayed, 2006) 1: A process of acquiring knowledge or skills throughout
ones lifetime via education, training, work, and general
Liability experiences. It is a concept of continuous personal
Can be deined as probable future sacriices of economic development through personal learning with an emphasis
beneits arising from present obligations of a particular on independent study determined by contextual personal
business to transfer assets or provide services to other
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Life Shir t Lim it e d-Pe rspe c t ive Bia s (LPB) 413
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
414 Lim it e d-Re sourc e M ode l Link Consist e ncy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Link M ining Lit e ra cy Sk ill 415
Link Mining messages are sent to the program, which then distributes
A method of data mining that combines techniques from to all registered users. (Ridings, 2006a) 4: Mailing list that
link analysis, hypertext and Web mining, relational forwards e-mail messages to everyone who has subscribed
L
learning and inductive logic programming, and graph to the list. Members seldom know each other due to the
mining. Link mining places primary emphasis on links, large size of these lists. (Teigland & Wasko, 2005)
and is used in both predictive and descriptive modeling.
(Banerjee et al., 2005) LITE: See LOTOS Integrated Tool Environment.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
416 Lit e rat ure Revie w Loc a l Are a Ra dio N e t w ork
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Loc a l E-Gove r nm e nt Loc a lizat ion 417
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
418 Loc a lize Loc at ion-De pe nde nt Ca che I nva lidat ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Loc at ion-De pe nde nt Que r y Logic Que r y 419
Location-Dependent Query obtain the preference of each individual user, which could
A query whose results depend on the current location of the be learned from query logs. (Wen, 2005a)
query issuer. For example, the query Which is the nearest
L
gas station? will return different gas stations depending Log-Based Query Clustering
on the current location of a driver. (Leong, 2005a) A technique aiming at grouping users semantically related
queries collected in Web query logs. (Wen, 2005a)
Locational Community
A community that is based on the shared physical location Log-Based Query Expansion
of its members. Villages, towns, and cities are examples A new query expansion method based on query log mining.
of locational communities. (Roberts et al., 2006c) Probabilistic correlations between terms in the user queries
and those in the documents can then be established through
Lockean/Leibnitzian Perspective of Knowledge user logs. With these term-term correlations, relevant
Management expansion terms can be selected from the documents for
Refers to the objective aspects of knowledge management, a query. (Wen, 2005a)
where the need for knowledge is to improve effectiveness
and eficiencies and the search for the correct approach. Logging
(Wickramasinghe, 2006) 1: Creating a record of all employee Internet usage.
(Urbaczewski, 2005) 2: Recording vital information about
Locus of Attention an incident. Recorded information should be suficient
Among all sensory input, the locus of attention is the input to identify the time, origin, target, and if applicable
to which one allocates mental resources. Input that falls characteristics of the attack. (Kayacik et al., 2005)
outside the locus of attention may go absolutely unnoticed.
An example of locus of attention is a speciic section of a Logic Data Mining
computer screen. (Thomas & Roda, 2006a) The application of data-mining techniques where both
data and extracted information are expressed by logic
Locus of Control variables. (Felici & Truemper, 2005)
1: Individuals perceptions of whether they themselves
inluence events and outcomes in their lives (internal Logic of Determination
control), or that events and outcomes are inluenced by Explains organizational change in terms of the variation
factors such as luck, fate, chance, or powerful others of a set of predictor variables. (Saunders, 2006)
(external control). Locus of control is considered a trait
characteristic that is unlikely to change signiicantly in Logic of Opposition
an individuals lifetime. (Kase & Ritter, 2005) 2: Where Explains organizational change by identifying forces
an individuals beliefs about controlling entities are sited. both promoting change and impeding change. (Saunders,
People range from being highly internally controlled, 2006)
that is, they are sure that they inluence what happens to
them, to highly externally controlledthat is, those who Logic Programming
are sure that anything that happens to them is the result A declarative, relational style of programming based on
of fate or work by others. (Wishart, 2005) irst-order logic. The original logic programming language
was Prolog. The concept is based on Horn clauses. (Chang
Log File & Hsu, 2005)
A record of all online activities occurring on a Web site
as captured by the software monitoring the server. (Hin Logic Query
& Subramaniam, 2005b) A disjunctive data log query over a database deines a
mapping from the database to a inite (possibly empty) set
Log-Based Personalized Search of inite (possibly empty) relations for the goal. A query
Personalized search targets to return results related to is a pair <G,P> where G is an atom, called goal, and P is
users preferences. The core task of personalization is to a program. The application of a query Q to a database D
is denoted by Q(D). (Greco & Zumpano, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
420 Logic Synt he sis Logist ic s Suppor t Syst e m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
LOM Low -Cont ex t Cult ure 421
development, acquisition, storage, movement, distribution, second-order extension of probabilistic relaxation labeling.
maintenance, evacuation, and disposition of material; (Caelli, 2005)
movement, evacuation, and hospitalization of personnel;
L
acquisition of construction, maintenance, operation, and Lossless Representation of Frequent Patterns
disposition of facilities; and acquisition of furnishing of Fraction of patterns suficient to distinguish between
services. (Pang, 2005b) frequent and infrequent patterns, and to determine the
supports of frequent patterns. (Kryszkiewicz, 2005)
LOM: See Learning Object Metadata.
Lossy Compression
Long-Lived Transaction A multimedia compression operation that reduces the size
A transaction that runs for so long that it will block access of the media by removing data redundancy or discarding
to the records it has accessed if traditional concurrency some details. The distortion incurred by the operation is
control is used. (Frank, 2005b) permanent. (C.-T. Li, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
422 Low-Deinition Television (LDTV) Lurking
Lower Approximation
In rough sets theory, one of the two sets used to deine
a rough or approximate set. The lower approximation
contains objects that are deinitely in the approximation
set. (Voges, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M /M /1 M ode l M a chine Le a r ning 423
M
M/M/1 Model Machine Learning
Exponential/exponential with one server. The queuing 1: A computer-embedded capability of data analysis
model that assumes an exponential distribution for inter- with the purpose of acquiring selected characteristics
arrival times, an exponential distribution for service times, (attributes, patterns, behavior) of an object or system.
and a single server. (Guster et al., 2005) (Nabuco et al., 2006) 2: A discipline in computer science,
generally considered a subpart of artiicial intelligence,
M-Business: See Mobile Business. which develops paradigms and techniques for making
computers learn autonomously. There are several types of
M-Commerce: See Mobile Commerce. learning: inductive, abductive, and by analogy. Data mining
integrates many techniques from inductive learning,
M-CLIP devoted to learn general models from data. (Hernandez-
A structured, expanded proile of information needs, Orallo, 2005b) 3: A discipline that comprises the study of
used in conjunction with specialized templates to aid how machines learn from experience. (Lodhi, 2005) 4: A
in the identiication of critical intelligence needs, an ield of computer science concerned with the question of
expansion mechanism to help insure that no key concepts how to construct computer programs that automatically
are overlooked, and an adaptive mechanism to remove improve with experience. The key algorithms that form
ineffective topics. (Parker & Nitse, 2006) the core of machine learning include neural networks,
genetic algorithms, support vector machines, Bayesian
M-CRM networks, and Markov models. (Pantic, 2005b) 5: A
Interactions between a company and its customers for research area of artiicial intelligence that is interested
marketing, sales, and support services through the mobile in developing solutions from data or in an interactive
Web and wireless channel. (Chan & Fang, 2005) environment alone. (Kayacik et al., 2005) 6: A study of
how computers can be used automatically to acquire new
M-Government: See Mobile Government. knowledge from past cases or experience, or from the
computers own experiences. (Liu, 2005) 7: A sub-ield of
M-Learning: See Mobile Learning. artiicial intelligence. The idea is that a computing system
could perhaps learn to solve problems in much the same
M-Security: See Mobile Security. way that humans do, that is to say, by example. A program
is needed that learns the concepts of a domain under
MA: See Multiple-Access. varying degrees of supervision from a human teacher.
In one approach, the teacher presents the program with a
MAC: See Medium Access Control; Mandatory Access set of examples of a concept, and the programs task is to
Control. identify what collection of attributes and values deines the
concept. (Hamdi, 2005b) 8: An area of artiicial intelligence
Machine Interactivity involving developing techniques to allow computers to
Interactivity resulting from human-to-machine or learn. More speciically, machine learning is a method
machine-to-machine communications. Typically, the later for creating computer programs by the analysis of data
form is of less interest to most human-computer studies. sets rather than the intuition of engineers. (Denoyer &
(El-Gayar et al., 2005) Gallinari, 2005) 9: An area of artiicial intelligence, the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
424 M a chine Le a r ning Syst e m M a in Dist ribut ion Fra m e (M DF)
goal of which is to build computer systems that can adapt Magic Lantern
and learn from their experience. (Tzanis et al., 2005) 10: An e-mail containing an attachment that, if opened, would
M Artiicial intelligence methods that use a dataset to allow insert a Trojan horse that is activated upon launch of
the computer to learn models that it the data. (Cunningham the popular encryption program, Pretty Good Privacy.
& Hu, 2005) 11: Sub-area of artiicial intelligence that Then it sends all the keystrokes the unwitting user types.
includes techniques able to learn new concepts from a set (Friedman, 2005)
of samples. (de Carvalho et al., 2005)
Magic Set
Machine Learning System Given SQL query with a correlated, nested subquery,
An information system that mimics the human learning the magic set is the set of values that are relevant for the
process and delivers the knowledge to users. (Forgionne, computation of the subquery as parameters. This set is
2005) obtained by computing all conditions in the outer query,
except the one involving the subquery. (Badia, 2005a)
Machine Learning Technique
One of several techniques that can automatically improve Magic Set Technique
computational models based on experiences. (Wen et al., Binding propagation technique based on the rewriting of
2005) the source query, with respect to the query goal, into an
equivalent query which simulates top-down evaluation by
Machine Translation (MT) bottom-up query computation engines so that irrelevant
1: A computer program to translate text written in one facts are not considered. (Greco & Zumpano, 2005b)
natural language into another. (OHagan, 2005) 2: Using
special software programs to translate passages of written Magnitude Response
text from one language to another. (St.Amant, 2005e) 1: Absolute value of the complex frequency response.
(Jovanovic-Dolecek, 2005c) 2: The absolute value of the
Machine Vision Fourier transform of the unit sample response. For a real
A ield of computer science concerned with the question impulse response digital ilter, the magnitude response is
of how to construct computer programs that automatically a real even function of the frequency. (Jovanovic-Dolecek,
analyze images and produce descriptions of what is imaged. 2005a)
(Pantic, 2005b)
Mail Client
Machine-Readable Cataloging Record (MARC) A software process that moves mail from a message store
A standard for the representation and communication of and presents it to a user. (Horiuchi, 2005b)
bibliographic and related information in machine-readable
form, developed by the Library of Congress. (Hnisch, Mail Server
2005) A software process that receives mail from other mail
systems and manages the message store. (Horiuchi,
Macro-Ecology of Information 2005b)
The study of information (cognition) as a whole, and
concerned with aggregates across nations and markets. Mail Survey
(Targowski, 2005) A traditional survey technique in which a multi-part
survey questionnaire is mailed to a randomized sample
Macromedia Flash of individuals (within a larger population) who are asked
Vector-based animation software program produced to complete the questionnaire and return it to the survey
by Macromedia Corporation. (Szabados & Sonwalkar, researcher for tabulation and analysis. (Baim, 2005)
2005)
Main Distribution Frame (MDF)
Macropayment The apparatus in the local concentrator (exchange) building
Any payment typically over $20. (Karnouskos & Vilmos, where the copper cables terminate and where cross-
2006) connection to other apparatuses can be made by lexible
jumpers. (Chochliouros et al., 2005c)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M a in M e m or y M a na ge m e nt I nfor m at ion Syst e m (M I S) 425
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
426 M a na ge m e nt of DE De live r y M a nufa c t uring M ode
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M a nufa c t uring Re sourc e Pla nning (M RP I I ) M a rke t Drive r for Dist a nc e Educ at ion 427
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
428 Market Eficiency Theory Marketing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M a rke t ing Cha nne l M a ss-Spring Syst e m 429
Marketing Channel determines probabilities for the next event, or state, given
The access to the market for product producers and service the result of the previous event. (Guster et al., 2005)
providers. Virtual community is a form of marketing
M
channel in that it provides business with access to reach Markov Random Field (MRF)
and communicate with potential consumers. (Wang, Wei, A set of random variables deined over a graph, where
et al., 2006) dependencies between variables (nodes) are deined by
local cliques. (Caelli, 2005)
Marketing Intelligence
Refers to the act of gathering information about a Markup
speciic audience. Marketing intelligence is an attempt Syntactically delimited characters added to the data of
to quantify potential participants for a speciic program. a document to represent its structure. (Kamthan & Pai,
The information gathered informs program administrators 2006)
as to how they might organize the prospective program,
as well as who they will be trying to sell the program to MAS: See Multi-Agent System.
directly. (Riffee & Sessums, 2005)
Mass Customization
Marketing Optimization 1: Business strategy often applied in e-business that aims at
Delivering the best treatments to the right individuals. satisfying the customers individual needs with near-mass-
(Lo, 2005) production eficiency. In essence, mass customization
describes the ability of a irm that provides customized
Marketing Research goods in high volume for mass markets by deriving a high
An activity carried out among existing customers to number of variants from a single or a few core products.
determine their level of satisfaction with the irms (Blecker, 2006b) 2: Producing basically standardized
products or services. Marketing research is also carried goods, but incorporating some degree of differentiation
out to determine the effectiveness of a irms marketing and customization. (Sarkis & Sundarraj, 2005) 3: The
activities. (Singh, 2006a) customization of products and services for individual
customers, but at a mass-production price. (Anke &
Marketplace Sundaram, 2006)
1: A type of a market that corresponds to a central
location that enables buyers and sellers to rendezvous. Mass Dataveillance
A marketplace is typically implemented as a blackboard Suspicion-less surveillance of large groups of people.
where sellers post information about items being offered. (Cook, 2005)
Buyers make offers to sellers, and sellers respond with
counteroffers. (Dasgupta et al., 2006) 2: Are usually Mass Rebellion
globally organized specifying services or product templates Cyber-identity thieves may use decentralized, mass
that can be offered by different vendors. The marketplace rebellion sites. These peer-to-peer environments (e.g.,
is a matchmaking mechanism that brings potential process Kazaa Media Desktop) allow individuals to share iles over
providers together with potential users of these processes. the Internet. Cyber-identity thieves may use such peer-
(Tahinakis et al., 2006) to-peer networks to install virus software, which records
data such as Web site visitation and any information that
Marketspace is entered to a non-secure site. (Close et al., 2006)
Electronic transaction methods, or electronic markets,
in which businesses and consumers interact. (Dholakia, Mass Value
Zwick, et al., 2005) A positive function of the level of exact belief in the
associated proposition (focal element). (Beynon, 2005a)
Markov Chain
1: A inite state machine with probabilities for each Mass-Spring System
transition, that is, a probability that the next state is sj A set of particles linked by springs. Each particle is
given that the current state is si. (Li, 2005) 2: A model that characterized by a 3D position and a mass, and is linked
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
430 Massiication Materialized View
to its neighbors by springs (with their own physical Material Requirements Planning (MRP)
properties). This method can simulate the different existing MRP, originating in the early 1960s, was a computerized
M mechanical interactions of a deformable object. (Volino approach to the planning of materials acquisition and
et al., 2005) production for more complex manufacturing processes
where interdependencies between components exist.
Massiication The application of computers to MRP was a signiicant
Widespread adoption of technology, bringing with it initial step in the evolution of ERP systems. (Carton &
uniformity. (Laws et al., 2005) Adam, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M at h Anx ie t y M CM C 431
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
432 M CPC M e a sure m e nt Dat a St re a m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M e a sure m e nt T he or y M e diat e d I nt e ra c t ion 433
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
434 M e diat ing St ruc t ure M e doid
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M e ga -U nive rsit y M e nt oring/Tut oring 435
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
436 M e nt oring Progra m M e ssa ging Syst e m
Mereology Messaging
An ontology that examines part-whole relationships and the 1: In the context of an enterprise integration environment,
composition of various levels of matter itself. Mereologies messaging represents a communications system whereby
employ part-of relationships in examining essence, process, important packets of information or messages are sent to
occurrence, and the like. (Buchholz, 2006) and from queues by a software-based system known as a
messaging server. (Karakostas, 2005) 2: The general means
Merge/Purge of unidirectional data transmission. Messages may contain
The process of identifying duplicate records during the requests, responses, or notiications. (Fiege, 2005)
integration of data sources. Related data sources often
contain overlapping information extents, which have Messaging System
to be reconciled to improve the quality of an integrated A system enabling and facilitating communication among
database. (Koeller, 2005) team members. Communication among team members can
be one-to-one, one-to-many, and synchronous (IM and
Merise Approach chat) or asynchronous (e-mail, bulletin boards, discussion
Another way to calculate cardinality constraints. It limits lists). (Ferris & Minielli, 2005)
the participation of an entity in the relationship. (Cuadra
et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ETA Re fre sh M e t a bonom ic s 437
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
438 M e t a busine ss M e t a m orphosis
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M e t a se a rch Engine M e t hod Sche m a 439
Metasearch Engine the case for various statistical ways of data handling, or
1: Conducts a search using several other search engines qualitative, which may be exempliied by grounded
simultaneously and then presents the results in some sort theory. A method (and thus a method schema) consists
M
of integrated format. This lets users see at a glance which of the following three parts: (1) a problem statement or
particular search engine returned the best results for a domain modeling the phenomenon under study; (2) a
query without having to search each one individually. procedure for collecting and analyzing data to understand
(Hu, Yang, Yeh, et al., 2005) 2: A search engine that sends the phenomenon; and (3) a justiication, for example, by
search keywords to different search engines and blends showing its ability to solve designated problems of the
together the search results from these search engines as domain. (Pharo & Jrvelin, 2005) 5: In object-oriented
one resultant list. (Kasi & Jain, 2006) programming, methods are the actions or behaviors that
an object can perform. At the coding level, a method is
Metaskill created by including a procedure (function or sub) within
Skill involved in academic literacy, as well as metacognitive the class. (Westin, 2005)
skill related to planning, monitoring, and regulating
comprehension-related activities. (Muukkonen et al., Method Bias
2005) Refers to when subjects across cultures do not respond
to measurement scales in the same manner. Bias in the
Metateam scores on an instrument can arise due to characteristics
A temporar y group composed of two or more of the instrument or its administration. (Karahanna et
geographically and inter-organizationally dispersed teams, al., 2005)
commercially linked by project-speciic agreements and
primarily enabled by electronic means of communication. Method Breadth
(Fernndez, 2005) Extent to which a usability-evaluation method is capable
of detecting all of a systems usability deiciencies.
Metavante Corporation (Danielson, 2006a)
A inancial service bureau and wholly owned subsidiary
of Marshall and Ilsley Corporation. (Panton, 2005) Method of Explanation-Oriented Data Mining
This method consists of two main steps and uses two data
Metcalfs Law tables. One table is used to learn a pattern. The other table,
1: Developed by Robert Metcalf, states that the value of an explanation table, is used to explain one desired pattern.
a network scales as 2n, where n is the number of persons In the irst step, an unsupervised learning algorithm is used
connected. (Mew, 2006) 2: The value or power of a to discover a pattern of interest. In the second step, by
network increases in proportion to the square of the number treating objects satisfying the pattern as positive instances,
of nodes on the network. (Rollier & Niederman, 2005) 3: and treating the rest as negative instances, one can search
States that the utility of a network rises in proportion to for conditions that explain the pattern by a supervised
the square of the number of its users. This means that as learning algorithm. (Yao & Zhao, 2005)
more users get connected into a network, the marginal
utility perceived by new users increases dramatically. Method Schema
(Kochikar & Suresh, 2005) Any representation deined for one or more methods,
where one or more aspects of the method have been left
Method uninterpreted and represented only through their plain
1: Actions performed by objects. (Lucas, 2005) 2: As name, and where some aspects of the methods may have
information is exchanged, it is manipulated typically been left out (even lacking their naming). Method schemas
by presenting it directly or partially with the intention take the format of a method, but it contains unspeciied
of the learner hypothesizing about the information and components that need to be speciied if it is to reach the
verifying the hypotheses. (Marcinkiewicz & McLean, level of a method. In other words a method schema is an
2005b) 3: A function deined inside of a class, a processing abstract representation of one or more methodsa generic
speciication for an operation. (D. Brandon, Jr., 2005a) 4: model. The difference between a method and a method
A procedure for handling a set of problems. Methods can schema can be said to be a continuum of generality. (Pharo
be categorized as quantitative, which is, for example, & Jrvelin, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
440 M e t hod Se nsit ivit y M ic ro-Busine ss
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ic ro-Ec ology of I nfor m at ion M ic roe c onom ic Com pe t ti ive ne ss I ndex (M I CI ) 441
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
442 M ic roproc e ssor M inim a l Oc c ure nc e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M inim a l Suppor t M ission Obje c t ive 443
ts and te records the starting and ending time of the episode, business customers to improve the organization of retrieved
respectively, and ts te. (Harms, 2005) results and to increase the precision of information retrieval.
(Nayak, 2005c)
M
Minimal Support
A user-given number that speciies the minimal number Mining of Secondary Web Data
of transactions in which an interested pattern should be Assists in capturing the buying and traversing habits of
contained. (Zou & Chu, 2005) customers in an e-business environment. Output of this
mining process can help e-business to predict customer
Minimalist Design behavior in the future, to personalize Web sites, and to
Refers to providing simple and easy-to-read screen designs. promote campaigns by cross-marketing strategies across
When Web designs are not minimalist, they may cause products. (Nayak, 2005c)
cognitive overload, or the presence of too much information
for users to process. Keeping pages uncluttered and Mining Question-Answer Pair
chunking information into categories are examples of ways Analytical method for automatically answering question
to provide a minimalist design. (Chalmers, 2006) e-mails using knowledge that is discovered in question-
answer pairs of past e-mail communication. (Bickel &
Minimization of Energy Expenditure Scheffer, 2005)
A principle of ecology in which a species uses the least
possible amount of energy to achieve its purpose. (Tatnall Mining Sentence
& Davey, 2005) Analytical method for interactively completing incomplete
sentences using knowledge that is discovered in a document
Minimum Description Length (MDL) Principle collection. (Bickel & Scheffer, 2005)
Principle stating that the best theory describing a set of
data is the one minimizing the description length of the Minute Margin Squeeze
theory plus the description length of the data described (or Unit price/unit cost model. (Nugent, 2005)
compressed) by the theory. (Holder & Cook, 2005)
MIPv6: See Mobile IPv6.
Mining
The application of statistical techniques to infer implicit Mirroring
patterns or rules in a collection of data, in order to discover Replication method where all updates to a logical disk
new and useful knowledge. (Loh et al., 2005) volume are copied by the operating system to two or more
physical disk volumes. (Frank, 2005a)
Mining E-Mail
The application of analytical methods and tools to e-mail MIS: See Management Information System.
data for: (1) support of communication by iling e-mails into
folders, iltering spam, answering e-mails automatically, Misconception/Preconception
or proposing completions to sentence fragments; or (2) A wrong idea people manifest while explaining phenomena,
discovery of hidden properties of communication networks with respect to scientiic paradigms (i.e., peoples ideas
by e-mail graph analysis. (Bickel & Scheffer, 2005) are evaluated with respect to scientiic ones). The term
preconception is adopted when the wrong idea appears
Mining Historical XML before people meet curricular disciplines. The term
The process of knowledge discovery from the historical misconception is used to mark the students mistakes in
changes to versions of XML documents. It is the integration phenomena interpretation. (Cartelli, 2005a)
of XML change detection systems and XML data-mining
techniques. (Zhao & Bhowmick, 2005) Mission Objective
States where the organization is headed and how to measure
Mining of Primary Web Data when it has arrivedthat is, what part or parts of the ideal
Assists in effectively interpreting the searched Web vision the organization commits to deliver and move ever
documents. Output of this mining process can help e- closer toward. (Kaufman & Lick, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
444 M isuse De t e c t ion M obile Advise r
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M obile Age nt M obile Com m e rc e (M C) 445
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
446 M obile Com m e rc e Course M obile Devic e
products or services), conduct a transaction, or perform both networking and software applications, that permits
supply chain or demand chain functions. (Lalopoulos et networked devices to be moved freely within the
M al., 2005a) 12: The ability to purchase goods anywhere broadcast coverage area, contacting others and conducting
through a wireless Internet-enabled device (e.g., cellular computations. (Bozanis, 2006) 7: An environment made
phone, pager, PDA, etc.). Mobile commerce refers to any up of a set of devices that interact to give the user the
transaction with monetary value that is conducted via possibility of staying connected while moving from one
a mobile network. (Clarke & Flaherty, 2005) 13: The location to another. (Coratella et al., 2005)
process of buying, selling, or exchanging products and
services wirelessly over mobile communication networks. Mobile Data Service (MDS)
(Chen & Yang, 2006) 14: The use of mobile devices to Delivery of content, for example, music to MP3 players
improve performance, create value, and enable eficient or games to consoles, over wireless networks. (Gilbert,
transactions among businesses, customers, and employees. 2005b)
(Lawson-Body, 2005)
Mobile Database
Mobile Commerce Course 1: A database accessible to mobile clients. There are
Bandwidth, platforms, form factors, mobile data services, appropriate mechanisms to take into account the limitation
and security and transaction models. Web synchronization. of the wireless bandwidth, the use of downlink broadcast
Server-side content management. Wireless Application channel, and the effect of client mobility. (Leong, 2005a)
Protocol (WAP). Wireless Markup Language (WML). 2: Mobile users connected to the wireless network and
Handheld Device Markup Language (HDML). Wireless equipped with database application to conduct activity
user interface design. Wireless Web development tools. like transaction and information retrieval from a central
(Knight & Chan, 2005) database server. (Waluyo et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M obile E-Work M obile Le a r ning (M -Le a r ning) 447
Mobile E-Work: See Mobile Electronic Work. organization to retrieve data or information (e.g., sales
igures or market data). (Derballa & Pousttchi, 2006a)
Mobile Electronic Commerce Transaction
M
An e-commerce transaction that is conducted using a Mobile Information System
mobile terminal (e.g., a PTD) and a wireless network or An information system that includes end-user terminals
link. (Veijalainen & Weske, 2005) that are easily movable in space, is operable independent of
location, and typically has wireless access to information
Mobile Electronic Work (Mobile E-Work) resources and services. (Krogstie, 2005b)
Concept referring to e-working in a mobile mode. The
term mobile e-work can be deined as e-work being done Mobile Internet
while commuting or e-working while commuting. To A part of the Internet whose contents are speciically
be precise, the overall concept of mobile e-work covers designed for mobile users who use Internet-enabled mobile
e-working on other trips as well, not just while commuting handheld devices such as a smart cellular phone to access
to and from the regular workplace. For example, e-working the mobile Internet contents. (Hu, Yang, & Yeh, 2006)
can be done on a persons way to meet clients, to attend
conferences, and so forth, whenever on the move outside Mobile IPv6 (MIPv6)
the regular ofice. The most general case of mobile e-work A protocol developed as a subset of the Internet protocol,
refers to a commuters e-working. To make matters more Version 6 (IPv6), to support mobile connections. MIPv6 is
complicated, mobile e-work also refers to situations that an update of the Internet Engineering Task Force (IETF)
are stationarysuch as sitting on a bench in an airport mobile IP standard designed to authenticate mobile devices
and tele-working with ones laptop. Mobility here means using IPv6 addresses. (Olla, 2005a)
that you have moved away from your ofice, you are on the
move outside the ofice, even if not moving in any vehicle Mobile Knowledge Management
at the moment of e-working. (Heinonen, 2005) The management process in a course of which mobile
communication techniques in conjunction with mobile
Mobile Government (M-Government) devices are employed for the creation, validation,
A subset of e-government that utilizes mobile and wireless presentation, distribution, or application of knowledge. An
technologies like mobile phones, and laptops and PDAs important issue is the integration of knowledge lows and
(personal digital assistants) connected to wireless local mobile business processes to ensure knowledge support
area networks. It makes public information and government for mobile workers. (Derballa & Pousttchi, 2006a)
services available anytime, anywhere to citizens and
oficials. (Yigitcanlar & Baum, 2006b) Mobile Learning (M-Learning)
1: Learning that has emerged to be associated with the
Mobile Handheld Device use of mobile devices and wireless communication in
A small general-purpose, programmable, battery-powered e-learning. In fact, mobility is a most interesting aspect
computer that can be held in one hand by a mobile user. It from an educational viewpoint, which means having
is different from a desktop or notebook computer due to access to learning services independently of location,
the following features: (1) mobility, (2) low communication time, or space. (Esmahi, 2005) 2: Integrating mobile
bandwidth, and (3) limited computing power and resources devices such as PDAs, laptops, and tablet PCs into the
such as memory and batteries. There are two major kinds of learning environment, in order to communicate through
handheld devices: (1) smart cellular phones and (2) personal the wireless network. Mobile learning has a great potential
digital assistants. (Hu, Yeh, Yang, et al., 2006) to provide effective collaborative or individual learning
experiences. (Yang, 2005) 3: The use of mobile devices
Mobile Host (MH) as tools in the computer science discipline of electronic
A mobile computer or device. (Coratella et al., 2005) learning. (Mohamedally et al., 2005) 4: The use of mobile
technology to provide anyone-anytime-anywhere
Mobile Information Exchange learning. (Salter, 2005a) 5: Electronic learning materials
Includes the transfer of data and information using e-mail, with built-in learning strategies for delivery on mobile
as well as the access to operational systems used in an computing devices to allow access from anywhere and
at anytime. (Ally, 2005c)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
448 M obile Loc at ion Se r vic e (M LS) M obile Se r vic e
Mobile Location Service (MLS) database, individual objects of very large size have to
Application provided over a mobile network that utilizes be handled eficiently. Furthermore, the crucial point
M information related to the geographical position of users is that mobile MM-DBMSs should have the QoS-based
to provide added value to them. (Giaglis, 2005) capabilities to eficiently and effectively process the
multimedia data in wireless mobile environments. (Zhang
Mobile Location-Based Service & Chen, 2005) 2: DBMS with enhanced functionalities to
Application that leverages positioning technologies and eficiently organize, store, and retrieve multimedia objects.
location information tools to deliver consumer applications (Chang et al., 2005)
on a mobile device. (Fraunholz et al., 2005)
Mobile Network
Mobile Marketing A system that allows wireless devices to seamlessly interact
All marketing activities conducted via mobile and wireless with traditional telecommunications and other wireless
devices. (Salo & Thtinen, 2006) devices. (Clarke & Flaherty, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M obile Suppor t St at ion (M SS) M oda lit y Fusion 449
Mobile Support Station (MSS) distinct categories are relevant: traveling, visiting, and
1: Equipment that manages mobile devices in terms of wandering. (Derballa & Pousttchi, 2006b)
identifying their physical location and handling their
M
incoming and outgoing messages/calls. A mobile support Mobility Management
station always communicates with mobile users within its A technique that maintains wireless communications of
radio coverage area. (Maamar, 2005) 2: A computer with mobile users. (W. Wang, 2006)
a wireless interface that offers information and services
support to mobile hosts. (Coratella et al., 2005) Mobility Model
To describe user movement in wireless networks. (W.
Mobile Switching Center (MSC) Wang, 2006)
The switching facility of the mobile network performing
the routing function using the information provided by Mobility-Related Exclusion
the different database of the PLMN. (Hackbarth et al., An aspect of social exclusion which derives from lack of
2005) physical access. (Kenyon, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
450 M ode M ode l Che cke r
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Model Checking Model-Oriented Formal Speciication Language 451
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
452 M ode ling M OM
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M om e nt M e a sure M ot ion Pic t ure Ex pe r t Group (M PEG) 453
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
454 M ot ion Pic t ure Ex pe r t Group Com pre ssion M PEG Com pre ssion
MPEG-7, and MPEG-21. (Prteux & Preda, 2005) 2: A in performing public services. Lack of information content
working group of ISO/IEC in charge of the development is another subfactor. (Kalvet, 2005)
M of standards for coded representation of digital audio
and video. Since 1988, the group has designed MPEG-1 Mouse
(used for video CDs and MP3s), MPEG-2 (used in digital In computer terms, this is a hand-operated electronic device
television set-top boxes and DVDs), MPEG-4 (used for that moves the cursor on a computer screen. A mouse is
mobile use cases and networking), MPEG-7 (for the essentially an upside-down trackball, although the former
description of digital content), and MPEG-21 (which needs more room during operation as it moves around a
mainly addresses rights management, digital items, and horizontal surface. (Henley & Noyes, 2006)
adaptation of content). (Di Giacomo et al., 2005) 3: A
group developing standards for coding digital audio and Movement in Transportation Networks
video, as used for example in video CDs, DVDs, and digital Movement (of a moving object) that is conined on
television. This term is often used to refer to media that is a transportation network (such as rails or roads).
stored in the MPEG-1 format. (Sappa et al., 2005) (Vassilakopoulos & Corral, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M PEG-4 M ult i-Age nt Syst e m (M AS) 455
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
456 M ult i-Cha nne l M ult i-Dim e nsiona l Sc a ling
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult i-Fa c e t e d Eva luat ion M ult i-N at iona l Corporat ion 457
graphical way with (x,y) coordinates, presenting a map each network layer. (Castro & Braga, 2006) 2: A layered
of geometrical Euclidean distances among actors in a neural network in which each layer only receives inputs
network. (Assimakopoulos & Yan, 2006) from previous layers. (Yeo, 2005)
M
Multi-Faceted Evaluation Multi-Layered Software Framework
Evaluation that includes a mixed-model approach to A layer-based software environment where each layer is
quantitative and qualitative data collection and analysis. a group of entities dedicated to perform a particular task.
(Neale et al., 2005) (Perrizo, Ding, Serazi, et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
458 M ult i-N at iona l Ent e rprise (M N E) M ult i-Sit e Soft w a re Te a m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult i-St a ge Filt e ring M ult ic a st Prot oc ol 459
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
460 M ult ic a st Rout ing M ult im e dia
Multicast Routing Team members will disband upon the completion of the
For the service of delivering one message to multiple project. (Fong, 2006b)
M destinations over the computer networks. One such
application is the newsgroup. (Hu, 2005) Multilingual Content Management
Process of organizing, categorizing, and structuring
Multicast Routing Protocol information resources for multilingual storage, publishing,
In order to forward the multicast packets, the routers have and reuse. (He, 2006)
to create multicast routing tables using multicast routing
protocols. (Hosszu, 2005a) Multilingual Interface
Interface written in multiple languages. These interfaces
Multicast Transport Protocol may be identical to each other or vary based on differential
To improve the reliability of the multicast delivery, needs. (Gangopadhyay & Huang, 2005)
special transport protocols are used in addition to the
widely used unreliable User Datagram Protocol (UDP). Multilinguality
(Hossz, 2005a) Term used to address the measures now being taken
to provide graphical user interfaces with features for
Multicultural Team internationalizationthat is, support of the character sets
A team composed of members who have spent their and encodings used to represent the information being
formative years in different countries and thus have learned manipulated, and presentation of the data meaningfully.
different values, demeanors, and languages. (Cagiltay et (Valenti, 2005)
al., 2005)
Multimedia
Multiculturality 1: More than one concurrent presentation medium (i.e.,
The term used to address the measures now being taken CD-ROM or a Web site). Although still images are a
to provide graphical user interfaces with ad hoc icons different medium than text, multimedia is typically used
and texts according to the cultural heritage of the user. to mean the combination of text, sound, and/or motion
(Valenti, 2005) video. (Rahman, 2005c) 2: A combination of two or
more media to present information to users. (Ally, 2005c)
Multidatabase 3: A term that originated in the audiovisual industry
1: A distributed database system that allows integrated to describe a computer-controlled, multiple-projector
access to heterogeneous, distributed, and pre-existing slideshow with a sound track. Multimedia is now viewed
databases. (Unal et al., 2006) 2: Integrated database in computer terms as a blending of media types: text,
managed by a local database management system without audio, visual, and data in one convenient computer-based
distributed ACID properties. (Frank, 2005b) delivery system. (Reisman, 2006) 4: A term used to relect
diverse platforms for communicating ideas and meaning
Multidisciplinary Design through a mix of media information that may include text,
A collaborative approach to design that shares research audio, video, and still pictures. (Theng, 2005) 5: Broadly
and design activities among a range of disciplines. (Knight deined, multimedia is the blending of sound, music,
& Jefsioutine, 2006) images, and other media into a synchronized whole. Such
a deinition is perhaps too wide, for it may be taken to
Multidisciplinary Project Team include artistic works, audiovisual presentations, cinema,
1: A group of team members with diverse educational theater, analog television, and other such media forms.
backgrounds, training, skill sets, experience, and A more precise term is digital multimedia, meaning
professional identities working together in a team situation the computer-controlled integration of text, graphics,
in order to tackle a task or project. They will be disbanded still and moving images, animation, sounds, and any
upon the completion of the temporary assignment. They other medium where every type of information can be
can come from different functional departments or represented, stored, transmitted, and processed digitally.
organizations. (Fong, 2006a) 2: A team of people who See also Interactive Digital Multimedia. (M. Lang, 2005)
possess diverse skills, knowledge, and experience, who join 6: Combined use of several media, such as text, audio,
together to work on a project which has a limited duration. and images. The Internet provides the ability to use one,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult im e dia Asse t M ult im e dia Doc um e nt 461
some, or all of them to deliver content. (Daz-Andrade, search them by keywords can be regarded as a multimedia
2005) 7: Communications media that combine multiple database. An electronic encyclopedia such as Microsoft
formats such as text, graphics, sound, and video (e.g., Encarta Encyclopedia, which consists of tens of thousands
M
a video incorporating sound and subtitles or with text of multimedia documents with text descriptions, photos,
attached that is concurrently displayed). (Garrett, 2006b) video clips, and animations, is another typical example
8: Data combining several different media, such as text, of a multimedia database. (Li et al., 2005) 2: A high-
images, sound, and video. (Denoyer & Gallinari, 2005) performance database management system and a database
9: Integration of several media, such as text, audio, video, with a large storage capacity that supports and manages, in
animation, and so forth. (Sharma & Mishra, 2005) addition to alphanumerical data types, multimedia objects
regarding storage, querying, and searching. (Bretschneider
Multimedia Asset & Kao, 2005) 3: A particular challenge for a multimedia
One of the digitized text, audio, video, images, and other database is the ability to deal with multimedia data types.
multimedia materials that can be stored and used. (Leath, Retrieval of structured data from databases is typically
2005) handled by a Database Management System (DBMS),
while retrieval of unstructured data from databases
Multimedia Communication requires techniques developed for Information Retrieval
A new, advanced way of communication that allows (IR). Yet the rigid resource requirement demands more
any of the traditional information forms (including their advanced techniques in dealing with multimedia objects
integration) to be employed in the communication process. in a mobile computing environment. (Parker & Chen,
(Hulicki, 2005) 2005) 4: A repository of different data objects such as text,
graphical images, video clips, and audio. (Hentea, 2005c)
Multimedia Content Adaptation 5: Database storage and retrieval capabilities developed
The process of adapting a multimedia resource to the with respect to multimedia requirements for high-quality,
usage environment. The following factors make up this rapid, queried usage by applications. (Vitolo et al., 2005) 6:
usage environment: users preferences, device, network, Non-conventional databases that store various media such
natural environment, session mobility, adaptation QoS, as images and audio and video streams. (Farag, 2005a)
and resource adaptability. (Knight & Angelides, 2005)
Multimedia Database Object Property
Multimedia Data The properties of a multimedia object refer to the objects
Data that represent continuous objects of the real world QoS-sensitive characteristics. They can be categorized into
(e.g., images, audio), in which searching by exact equality several attributes. The nature of object can be described by
is usually meaningless. (Chvez & Navarro, 2005) frame size, frame rate, color depth, compression, and so
forth; the quality of object presentation can be determined
Multimedia Data Mining by delay variation and loss or error rate. (Zhang & Chen,
1: Extracting interesting knowledge out of correlated 2005)
data contained in audio, video, speech, and images.
(Swierzowicz, 2005) 2: The application of data mining Multimedia Document
to data sets consisting of multimedia data, such as 2D 1: A natural extension of a conventional textual document
images, 3D objects, video, and audio. Multimedia data in the multimedia area. It is deined as a digital document
can be viewed as integral data records, which consist of composed of one or multiple media elements of different
relational data together with diverse multimedia content. types (text, image, video, etc.) as a logically coherent
(Viktor & Paquet, 2005) unit. A multimedia document can be a single picture or a
single MPEG video ile, but more often it is a complicated
Multimedia Database document, such as a Web page, consisting of both text
1: A database system dedicated to the storage, management, and images. (Li et al., 2005) 2: Represents a document
and access of one or more media types, such as text, image, containing not only textual data, but also multimedia
video, sound, diagram, and so forth. For example, an image ones such as images, videos, songs, and so forth. (Chbeir
database such as Corel Image Gallery that stores a large & Yetongnon, 2005)
number of pictures and allows users to browse them or
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
462 M ult im e dia Engine e ring M ult im e dia Se r vic e
Multimedia Engineering order as one singular message. MMS does not support
The employment of a systematic, disciplined, quantiiable attachments as e-mail does. (Roibs, 2006b) 2: Similar
M approach to the development, operation, and maintenance to text messaging (SMS), but allows the transmission of
of multimedia applications. (Uden, 2005) graphics, sound iles, video clips, and text. It is based on
WAP and can be used to send e-mail. (Petrova, 2006) 3:
Multimedia Information Retrieval (System) A service giving the capability to a mobile-phone user to
Storage, indexing, search, and delivery of multimedia send a message containing any combination of images,
data such as images, videos, sounds, 3D graphics, or video clips, text, and audio to another user. (Ververidis &
their combination. By deinition, it includes works on, Polyzos, 2006) 4: A cellular phone service allowing the
for example, extracting descriptive features from images, transmission of multiple media in a single message. As
reducing high-dimensional indexes into low-dimensional such, it can be seen as an evolution of SMS, with MMS
ones, deining new similarity metrics, eficient delivery supporting the transmission of text, pictures, audio, and
of the retrieved data, and so forth. Systems that provide video. (Garrett, 2006b) 5: A form of mobile communication
all or part of the above functionalities are multimedia where each message can contain picture, audio, video,
retrieval systems. The Google image search engine is a and text material with certain data size limitations. A
typical example of such a system. A video-on-demand multimedia message is typically sent from one camera
site that allows people to search movies by their titles is phone to another. (Hkkil & Beekhuyzen, 2006)
another example. (Li et al., 2005)
Multimedia Mining
Multimedia Instruction A new ield of knowledge discovery in multimedia
A presentation using both words and pictures that is documents dealing with non-structured information such
intended to promote learning. (M. Mitchell, 2005c) as texts, images, videos, audio, and virtual data. (Chen
& Liu, 2005)
Multimedia Internetworking
Refers to network infrastructures, protocols, models, Multimedia Normal Form
applications, and techniques that are being currently One of the rules for testing multimedia database schemes
deployed over the Internet to support multimedia in order to prevent possible manipulation anomalies.
applications such as videoconferencing, video on demand, (Chang et al., 2005)
shared workspaces, and so forth. (Fortino, 2005)
Multimedia Object (MMO)
Multimedia Learning System A self-describing manifest of iles used to encapsulate
A system where content is delivered digitally using text, an electronic media element. Consists of media iles
graphics, animation, sound, and video. (Lateh & Raman, conforming to a deined naming standard and an associated
2005) MVML ile. (Verhaart & Kinshuk 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult im e dia St re a m M ult iple Cha nne l Pe r Ca rrie r (MCPC) 463
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
464 M ult iple Conc e pt -Leve l Assoc iat ion Rule M ult irat e Filt e r
Multiple Concept-Level Association Rule seven primary forms are: linguistic, musical, logical-
Extends association rules from single level to multiple mathematical, spatial, body-kinesthetic, intrapersonal
M levels. Database contents are associated together to the (e.g., insight, metacognition), and interpersonal (e.g., social
concepts, creating different abstraction levels. (Yeo, skills). (Burrage & Pelton, 2005)
2005)
Multiple Regression
Multiple Data Sales A statistical technique that predicts values of one variable
Process in which a client organization asks an outsourcing on the basis of two or more other variables. (Yeo, 2005)
employee to compile personal data on behalf of that
organization; the individual compiling this data then Multiple Service Operator (MSO)
proceeds not only to provide the client organization with Synonymous with cable provider. A cable company that
that information, but to sell copies of that data to as many operates more than one TV cable system. (Raisinghani
interested parties as possible. (St.Amant, 2006b) & Ghanem, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
M ult irat e Syst e m M ut ua l Disa m biguat ion 465
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
466 M ut ua l I nfor m at ion (M I ) M ySQL
Mutual Innovation
The process of two organizations striving for product
innovations from the end users of the product, created
from their product knowledge derived from use and
their own needs. This goes beyond just asking for future
requirements, but constructing knowledge that comes
from closely integrated innovation practices. (Paquette,
2006b)
Mutual Knowledge
The common ground or knowledge that a team possesses
and knows that it possesses. (King, 2006a)
MySpace(.com)
Online social networking application. (Mew, 2006)
MySQL
Open source database that organizes information through
tables, and enables interactions between the user and the
Web through the creation of dynamic Web pages. (Boateng
& Boateng, 2006a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N -Dim e nsiona l Cube N a rrat ive K now le dge Re pre se nt ati on La ngua ge (N K RL) 467
N
N-Dimensional Cube Narrative Convention
A group of k-dimensional (k<=n) cuboids arranged by the One of the standard ways and techniques of telling stories
dimension of the data. (Abdulghani, 2005a) expected by readers, viewers, and computer users. (Berg,
2005e)
N-Safe Design
Replication method where all n copies are consistent and Narrative Document or Narrative
up-to-date. (Frank, 2005a) Multimedia document (very often an unstructured, natural
language documents like a memo, policy statement, report,
Naive Bayes minutes, news story, normative and legal text, etc.) that
An extremely simple classiication algorithm based on the constitutes a huge underutilized component of corporate
use of the posterior probability as the deining criterion knowledge. In such narratives, the main part of the
to choose among a set of hypotheses (classes). The Naive information content consists of the description of events
Bayes classiier simpliies calculations by assuming that relate the real or intended behavior of some actors
conditional independence among the dataset attributes, (characters, personages, etc.); these try to attain a speciic
given the class. (Laura, 2005) result, experience particular situations, manipulate some
(concrete or abstract) materials, send or receive messages,
Named Entity buy, sell, deliver, and so forth. Classical ontologies
Lexical phrase that falls into one of the three semantic are inadequate for representing and exploiting narrative
categories: TIMEX, NUMEX, and ENAMEX. TIMEX knowledge in a non-trivial way. (Zarri, 2006c)
includes temporal expressions, for example, March 1st,
noon EST. NUMEX consists of numeric expressions, Narrative Engineering
for example, 7.5%. ENAMEX includes: proper names, The deliberate use of stories and storytelling to bring about
for example, Peter the Great; locations, for example, some organizational outcome. (Connell, 2006)
St. Petersburg; and organizations, for example, Russian
Orthodox Church. (Kulyukin & Nicholson, 2005) Narrative Inquiry
An approach to documenting a research participants story
Namespace about an area of interest. (Hunter, 2006a)
A simple mechanism for creating globally unique names
in domain-speciic vocabularies. It is used to distinguish Narrative Knowledge Representation Language
identical names in different markup languages, allowing (NKRL)
domain-speciic names to be mixed together without Classical ontologies are largely suficient to provide
ambiguity. Each namespace is identiied by a URI reference a static, a priori deinition of the concepts and of their
and easily can be used in XML documents. (Pereira & properties. This is no more true when we consider the
Freire, 2005) dynamic behavior of the conceptsthat is, we want
to describe their mutual relationships when they take
Narrative part in some concrete action, situation, and so forth
A social exchange, within an organizational context, in (events). NKRL deals with this problem by adding to
which events, either actual or imagined, unfold over time. the usual ontology of concept and ontology of events,
(Connell, 2006) a new sort of hierarchical organization where the nodes,
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
468 N a rrat ive Re a soning N at iona l I nfor m at ion Te chnology Policy
called templates, represent general classes of events teaching, and together, the coalition represents over three
like move a physical object, be present in a place, million individuals. The U.S. Department of Education and
N produce a service, send/receive a message, and so the Council for Higher Education Accreditation recognize
forth. (Zarri, 2005a) NCATE as a professional accrediting body for teacher
preparation. (Rhoten, 2006b)
Narrative Reasoning
Speciic, context-dependent reasoning that is open to National Crime Information Center (NCIC)
subjective interpretation, and potentially leads to multiple A national center housed at the FBI that provides 24-
conclusions. (Artz, 2005a) hour-a-day, seven-day-a-week, real-time access to law
enforcement for warrants, stolen vehicles, and other
Narrowband articles. (Holland, 2005)
A transmission path that is capable of 64 kbps transmission
and voice-grade service. (Kelic, 2005) National Digital Government Strategy
A plan for digital government development at the national
Narrowband Speech Signal level which may include infrastructure, training, security
Speech signal with a frequency band equal to that of the and privacy, digital divide, service provision, access, and
telephone channelthat is, with a bandwidth of 300 to publication initiatives. Examples include UK Online, e-
3300 kHz. (Perez-Meana & Nakano-Miyatake, 2005) Japan, and e-Korea. (Knepper & Chen, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N at iona l La w Enforc e m e nt Te le c om m unic at ions Syst e m (N LET S) N CAT E 469
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
470 N CI C N e gat ive Assoc iat ion Rule
NCIC: See National Crime Information Center. Need for Cognition (NFC)
A measure of a persons internal motivation to pursue and
N Near-Far Effect enjoy cognitive tasks and activities. (Crossland, 2005)
The situation where the received power difference between
two CDMA users is so great that discrimination of the low- Need-to-Know Access Policy
power user is impossible even with low cross-correlation Security access policy based on supplying to individual
between the codes. (Iossiides et al., 2005) employees only information necessary to perform their
duties. (Janczewski & Portougal, 2005)
Near-Line Storage
Siloed tape storage where siloed cartridges of tape are Needs
archived, accessed, and managed robotically. (Yao et 1: Essential or required elements which students require
al., 2005) to meet an educational objective. (Hawkins & Baker,
2005) 2: Gaps in results, not gaps in means and resources.
Nearest-Neighbor Algorithm (Kaufman & Lick, 2005) 3: The requirements consumers
1: A recommendation algorithm that calculates the distance have to survive and thrive. (Waterson, 2006)
between users based on the degree of correlations between
scores in the users preference histories. Predictions of Needs Assessment
how much a user will like an item are computed by taking 1: Identifying gaps in results (best at all three levels of
the weighted average of the opinions of a set of nearest results) and placing the needs in priority order on the basis
neighbors for that item. (Schafer, 2005) 2: An algorithm of meeting the needs as compared to the costs of ignoring
that determines and ranks the distance between a target them. (Kaufman & Lick, 2005) 2: Problem identiication
object and any other available object. (Chen & McLeod, process that looks at the difference between what is and
2006) what should be for a particular situation. It is an analysis
that studies the needs of a speciic group, such as employees
Nearest-Neighbor Method or learners, and presents the results detailing those needs,
Simple approach to the classiication problem. It inds for example, training needs and resources needs. Needs
the nearest neighbors of the query in the training set assessment also identiies the actions required to fulill
and then predicts the class label of the query as the most these needs, for the purpose of program development and
frequent one occurring in the neighbors. (Domeniconi & implementation. (Kinuthia, 2005)
Gunopulos, 2005)
Needs Identiication
Nearest-Neighbor Query The process of determining which topics an organization
A similarity query that retrieves the closest elements to must monitor in order to attain or maintain a competitive
some query object. (Chvez & Navarro, 2005) advantage. (Parker & Nitse, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N e gat ive At t it ude N e t Pre se nt Va lue (N PV ) 471
Negligence Nering
A tort theory that applies to conduct that falls below the Changes to game mechanics that are perceived as
standard established by law for the protection of others detrimental from the players perspective. For example,
against unreasonable risk of harm. An action for negligence changes to a spell or weapon effect so that it is effective at
must establish that: one party (the irst party) owed a duty causing damage to an opponent. (Grifiths et al., 2006)
of care to a second party; the irst partys lack of care
(negligence) breached that duty of care; and the irst partys Net Beneit
breach of the duty of care proximately caused the damages A beneit that remains after costs are subtracted. (OLooney,
suffered by the second party. (Sprague, 2005) 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
472 N e t ique t t e N e t w ork I nfra st ruc t ure
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N e t w ork I nfra st ruc t ure Ope rat or N e t w ork T im e Proto c ol (N T P) 473
including television, cable TV, wireless, and satellite but who do not necessarily know one another. (Teigland
networks. (Sharma, 2006a) & Wasko, 2006) 2: People who are not directly connected
to each other but still engage in similar kinds of activities
N
Network Infrastructure Operator are said to belong to a network of practice. NoPs link local
One of the network-facing elements of wireless networks communities whose members have similar interests and
which provide the software and hardware that enable give a minimal coherence to the network. (Kimble &
online communications. (Rlke et al., 2005) Hildreth, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
474 Network Trafic Management Neural Model
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N e ura l N e t w ork N e w Public M a na ge m e nt (N PM ) 475
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
476 N e w sgroup N ode
the eficiency and effectiveness of public organizations, NIC: See Network Interface Card.
customer focus in provision of public services, and market-
N based conditioning frameworks, such as privatization, Niche Product
competition, and contracting out. (Anttiroiko, 2005a) 2: Specialized offering with a limited customer base. (Ortega
Includes initiatives which relate to management of the Egea & Menndez, 2006)
public administration, like management by objectives,
clear standards, and evaluation of the quality of service. It Nick
also includes initiatives that deal with the introduction of The nickname an individual chooses to be known by on
economic incentive structures, like outsourcing of public Internet relay chat. The command /NICK is used to set a
tasks and establishing quasi-markets for public services. nickname and can be used to change the nickname at any
(Jaeger, 2005) 3: A stream of thoughts aiming at applying time. (Roberts et al., 2006a)
a business management concept to public administrations.
(Becker et al., 2006) NII: See National Information Infrastructure.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N ode Type N on-Em be dde d Suppor t Devic e 477
often called a host. (Clayton, 2006a) 5: Unit of data (and Nomadic Computing
navigation) in a hypermedia environment. (Lemahieu, The use of computers while on the move. (Krogstie,
2005) 2005b)
N
Node Type Nomadic Lifestyle
Type-level deinition of properties (layout template, link A mobile lifestyle where a person has adopted a high
types, aspect descriptors) for a group of similar nodes. degree of mobility in his or her life. The person moves
(Lemahieu, 2005) a lot and frequently between various places of housing,
work, errands, hobbies, recreation, and socializing.
NOE: See (Heinonen, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
478 N on-Excluda bilit y N on-Spat ia l Ac c e ssibilit y
Non-Excludability Non-Monotonic
One characteristic of a public good: the inability to exclude A type of system where the addition of new information
N non-contributors from the consumption of the public good. may change old information. (Grant & Minker, 2006)
(Teigland & Wasko, 2006)
Non-Parametric Option Pricing Model
Non-Governmental Organization (NGO) One of several pricing options using inductive or
1: A voluntary, not-for-proit organization, and hence statistically oriented techniques. (Lajbcygier, 2005)
sometimes referred to as a private voluntary organization
(PVO). Although it does not have to have a formal statute, Non-Player Character (NPC)
it should be autonomous from the government. Generally, it A character in a game that is controlled by artiicial
obtains most if not all of its funding from private sources. intelligence or a gamemaster (human controllable character
(Trusler & Van Belle, 2005) 2: An organization that is often employed for guidance and help within the game;
not a part of a government. Although the deinition can i.e., customer services). (Grifiths et al., 2006)
technically include for-proit corporations, the term is
generally restricted to social and cultural groups, whose Non-Precise Data
primary goal is not commercial. Generally, although Data which are not precise numbers or not precise vectors.
not always, these are nonproit organizations that gain (Viertl, 2005)
at least a portion of their funding from private sources.
(Y.-W. Lin, 2005) 3: A private nonproit making body, Non-Repudiation
which operates independently of government. NGOs 1: Guarantees that participants in a transaction cannot deny
normally provide various forms of social services or that they participated in the transaction. (Lowry, Stephens,
community development. (Toland, Purcell, et al., 2005) et al., 2005) 2: Makes sure that the business transactions
4: An association of like-minded people serving society, the parties engaged in are legally binding. (Pierre, 2006b)
especially the downtrodden and vulnerable sections on 3: Service that provides proof of the integrity, origin of
their own or supplementing the organized effort. (Borbora data, and the identity of a person, all in an unforgeable
& Dutta, 2005) 5: A nonproit organization which is not relationship, which can be veriied by any third party at
fully funded or controlled by government, and which is any time. Hence, it determines whether or not a particular
promoting human well-being on a not-for-proit basis. The event occurred or a particular action happened. (Oermann
organization should have a legally established constitution, & Dittmann, 2006) 4: The inability of an individual to
a clear purpose, and visible activities with a governing disavow some action or his or her presence at a particular
body, which has the authority to speak for its members. location at some speciic time. Biometric security systems
(Arkhypska et al., 2005) 6: A nonproit, self-governing have the potential to offer a high degree of non-repudiation
organization with voluntary membership. (Smith & due to the intimately personal nature of biometric data.
Smythe, 2005) (Fleming, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
N on-Spat ia l (At t ribut e ) Dat a N or m a lize d Cla ss Algebra Ex pre ssion 479
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
480 N or m a lize d Ex t e nde d I t e m se t N yquist T he ore m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
OAI -PM H Obje c t Pa r t it ioning 481
O
OAI-PMH: See Open Archives Initiative Protocol for Object Identiier (OID)
Metadata Harvesting. 1: In the object-oriented data model, each object is given
an object identiier. The importance of an OID is that it
OAN: See Optical-Access Network. makes the model work by reference and not by value (i.e.,
if an object changes the values of all its attributes, it still
ObCS: See Object Control Structure. is the same object because of its OID). In the relational
world, an object that changes the value of one attribute
Object is a different object. Unlike keys, OIDs are immutable.
1: A data structure that encapsulates behavior (operations) (Badia, 2005d) 2: An unchangeable value that uniquely
and data (state). (Alhajj & Polat, 2005) 2: An abstraction of a identiies that object and distinguishes it from all other
set of real-world things that has state, behavior, and identity. objects. It is separate from the state and invisible to the
An instance of its class where the values of the attributes user. OIDs can be used to represent associations between
determine the state, and the operations the behavior. objects. (Polese et al., 2005)
(Rittgen, 2005) 3: An entity (e.g., person) or a value
(e.g., phone number). In object-oriented models, it is the Object Modeling of Relational Applications
instance of a class. (Galatescu, 2005) 4: A software bundle (OMAR)
of related variables and methods. Generally, something A software engineering methodology for the object
is an object if it has a name, properties associated with modeling of applications to be implemented over an
it, and messages that it can understand. Object-oriented RDBMS. (Polese et al., 2005)
programming involves modeling the software system
as a set of interacting (conceptual) objects in object- Object Orientation
oriented design, then implementing (coding) the design A view of the world based on the notion that it is made up
using an object-oriented programming language with of objects classiied by a hierarchical superclass-subclass
(programming-language) objects. (Wong & Chan, 2006) structure under the most generic superclass (or root)
5: Something conceivable or perceivable. This subsumes known as an object. For example, a car is a (subclass of)
the object-oriented notion of object. (Gillman, 2006) vehicle, a vehicle is a moving object, and a moving object
is an object. Hence, a car is an object as the relationship is
Object Constraint Language (OCL) transitive and, accordingly, a subclass must at least have
1: A notational language for analysis and design of the attributes and functionality of its superclass(es). Thus,
software systems. It is a subset of the industry standard if we provide a generic user-presentation object with a
UML that allows software developers to write constraints standard interface, then any of its subclasses will conform
and queries over object models. (Riesco et al., 2005) 2: to that standard interface. This enables the plug and play
A language used to express side-effect-free constraints. of any desired subclass according to the users encoding
(Favre et al., 2005) and decoding needs. (Polovina & Pearson, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
482 Obje c t Re c ognit ion Obje c t ive Func t ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Obje c t ive Func t ion-Ba se d Clust e ring Off-Ca le nda r Progra m m ing 483
Objective Function-Based Clustering that it may depend upon many things, like the observer
Cluster analysis is carried on minimizing an objective education or his state of mind, for example. (Analide et
function that indicates a itting error of the clusters to the al., 2006)
O
data. (Klawonn & Georgevia, 2005)
Observed Time Difference of Arrival (OTDOA)
Objective Measurement of PQoS An alternative for the Time of Arrival (TOA) method in
A category of assessment methods that evaluate the which the mobile phone measures the time differences
Perceived Quality of Service (PQoS) level based on between signals from three or more base stations.
metrics that can be measured objectively. (Koumaras et (Ververidis & Polyzos, 2006)
al., 2005)
Occlusion
Objective Measure of Interestingness When one object is in front of another object in the direction
A measure that is data driven and has some element of of observation, a portion of the object that is behind cannot
domain independence. It measures interestingness of a be seen. Then, the second object is occluded by the irst
pattern in terms of its structure and the underlying data one. (Aifanti et al., 2005)
used in the discovery process. Typical examples of such
objective measures of interestingness are support and OCL: See Object Constraint Language.
conidence. Many objective measures of interestingness
trace their origin to traditional statistical, artiicial OCR: See Optical Character Recognition.
intelligence, machine learning, and allied literature.
Objective measures do not capture all the complexities of OCTAVE: See Operationally Critical Threat Asset and
the pattern discovery process and might sometimes bring Vulnerability Evaluation.
out contradictory results. (Natarajan & Shekar, 2006)
OD: See Optimum Distance.
Objective Reality
Essentially, the view that there exists, independently of ODL: See Open and Distance Learning.
human perception, an objective world, and we are able to
gain knowledge of that world by reference to these objects. ODM: See Organizational Data Mining.
(Clarke, 2006)
ODMRP: See On-Demand Multicast Routing Protocol
Objective Social Reality for Mobile Ad Hoc Networks.
An independent existence from any account of it. (Ramos
& Carvalho, 2005) ODS: See Operational Data Store.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
484 Off-Ca m pus Course One vs. All
OLT: See Optical Line Terminal. On-Demand Multicast Routing Protocol for Mobile
Ad Hoc Networks (ODMRP)
OLTP: See Online Transaction Processing. A mesh-based, rather than conventional tree-based,
multicast scheme that uses a forwarding group concept.
OM: See Organizational Memory. (Chakraborty et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
One vs. One Online Ana lyt ic a l Proc e ssing (OLAP) 485
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
486 Online Archit e c t ure Online Com m unit y
of data, usually by means of multi-dimensional views of intellectual project. (Lam et al., 2006) 2: Through the use
data. (Barca et al., 2005) 5: A data-mining technology that of online learning tools, participants interact and work
O uses software tools to interactively and simultaneously together to solve a problem or create a product. Facilitating
analyze different dimensions of multi-dimensional data. successful online collaborative activities is very important
(Nemati & Barko, 2005) 6: Front-end tool that allows for establishing a strong sense of community. (S.-K.
the analysis of multi-dimensional data. It is commonly Wang, 2005)
used in business intelligence systems. (de Carvalho, &
Ferreira, 2006) 7: The process of analyzing a database Online Collaborative Tool
or data warehouse, which consists of heavy queries One of a series of online tools such as e-mail, forum, chat
for constructing reports or showing the information in a room, and whiteboard that allow users to communicate
highly aggregated or complex way. This kind of processing and collaborate with one another. (Gillani, 2005b)
supports information retrieval and data analysis in the form
of complex queries and reports. (Hernandez-Orallo, 2005a) Online Communication Regulation Law
8: A particular form of information system speciically A law to enhance application in the administration, which is
designed for processing, managing, and reporting multi- decided by laws exceeding 50,000, and cover all these laws
dimensional data. (Tininini, 2005b) 9: OLAP tools allow for conducting an application electronically. It is considered
users to analyze different dimensions of multi-dimensional that this communication regulation law has completed the
data. (Athappilly & Rea, 2005) 10: Describes a technology basic legal frameworks necessary for the e-government
that uses a multi-dimensional view of aggregate data such as electronic signature law. (Kitagaki, 2005)
to provide quick access to strategic information for the
purposes of advanced analysis. (Tan, 2005a) 11: Usually Online Communication Strategy
distinguished from Online Transaction Processing One of the strategies and protocols established by learners
(OTP), which is the model associated with transaction- and teachers to make effective use of online communication
oriented databases. (Artz, 2005d) 12: An analysis of data tools. (Bennett, 2005)
characterized by complex queries that aim at uncovering
important patterns and trends in the data in order to answer Online Communication Tool
business questions. (Badia, 2005c) Tool that allows communication through Internet-based
technologies. Communication may be synchronous, in
Online Architecture which communication occurs in real time; or asynchronous,
An organizations online architecture demonstrates the in which there is a gap in time between the sending and
range of functions they perform, or intend to perform, using receipt of a message. (Bennett, 2005)
online or other information technologies. Functions may
pertain to communication, research, promotion, product Online Community
distribution, or enterprise management. (Carson, 2005) 1: Community comprising four important elements: the
people who interact socially as they strive to satisfy their
Online Class own needs or perform special roles, such as leading or
A class offered to students using mostly computing and moderating; a shared purpose such as an interest, need,
Internet-based resources, where a large amount of the information exchange, or service that provides a reason for
interaction with the professor and other students takes the community; policies in the form of tacit assumptions,
place via computer and telecommunication technologies. rituals, protocols, rules, and laws that guide peoples
(Dick, 2005) interactions; and computer systems to support and mediate
social interaction and facilitate a sense of togetherness.
Online Class Component (Vat, 2006b) 2: Consists of members connected by
A resource delivered online that is used as part of the means of ICT, typically the Internet. (Leath, 2005) 3: A
content or activities of a class. (Ryan, 2005) collective group of entities (individual or organizations)
who come together through an electronic medium for a
Online Collaboration common purpose and who are governed by norms and
1: The use of Internet-based communication tools to policies. (Bolisani et al., 2006) 4: A meeting place on
cooperate or work with someone else, especially on an the Internet for people who share common interests and
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Online Com m unit y of I nt e re st Online Dat a ba se 487
needs. Online communities can be open to all or be by course does not require any face-to-face meetings in a
membership only, and may or may not be moderated. physical location. Web-centric courses (also called hybrid
(Petska & Berge, 2005) 5: A system of Internet users or blended courses) are similar to online courses, but
O
sharing interests and interacting frequently in the same require regular-scheduled face-to-face classes or meetings.
areas, such as forums and chat Web sites. (Magnani (Boettcher, 2005a) 2: A Web-based instructional program
et al., 2006) 6: A voluntary group of active users that that organizes the learning of a student in a particular
partake actively in a certain computer-mediated service. subject. Not all learning materials need be online, and
(Kindmller et al., 2005) 7: People who interact through much of an online course involves dynamic interactions
an ICT-based communication environment, recognize a with other participants. (Duchastel, 2005) 3: Delivery of
minimum common goal that holds them together, share class via the World Wide Web. (Witta, 2005) 4: An online
one or more domains of knowledge and shared practices, course may be either a fully online course or a hybrid online
and deine implicit or explicit policies for regulating their course. A fully online course is offered in a format where
interactions. (Ripamonti, 2005) its content, orientation, and assessments are delivered
via the Internet, and students interact with faculty and
Online Community of Interest possibly with one another while using the Web, e-mail,
An online group that grows from a common interest in discussion boards, and other similar aids. A hybrid online
a subject. These groups develop norms based on shared course meets one or more of the following requirements
values and meanings. (Rowe, 2006d) for students: (1) access to the Web to interact with the
course content; (2) access to the Web to communicate
Online Community of Learners with faculty and/or other students in the course; (3) on
A term used to describe a group of individuals that engage campus for orientation and exams, with other aspects of
with, and collaborate in, similar online learning activities the course meeting the requirements for a fully online
over a set period of time. (Teghe & Knight, 2005) course. (Simon et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
488 Online De gre e Progra m Online Le a r ning
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Online Le a r ning Ac t ivit y Online Pa r t ic ipat or y Exerc ise 489
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
490 Online Plat for m Online Tra nsa c t ion Proc e ssing (OLT P)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Online Trust Ont ology 491
for serving the applications of an organization. This kind Ontologically Based Information System
of processing supports the daily operations of the software An information system based upon a domain ontology,
applications, it is read-and-write, and generally performed whereby the ontology provides the semantics inherent
O
through SQL queries. (Hernandez-Orallo, 2005a) 4: within the system. These systems facilitate organizational
A type of software and set of tools that facilitate real- productivity and interorganizational communication.
time processing of transactions for transaction-oriented (Dunn & Grabski, 2005)
applications used in many industries including retails,
airlines, and banking. (Khan et al., 2006) Ontology
1: An explicit, formal specification of a shared
Online Trust conceptualization of a domain of interest. This indicates
An Internet users psychological state of risk acceptance that an ontology should be machine readable (which
based upon the positive expectations of the intentions or excludes natural language). It indicates that it captures
behaviors of an online vendor. (Y.D. Wang, 2005) consensual knowledge that is not private to an individual,
but accepted as a group or committee of practice. The
Online Web Course reference to a domain of interest indicates that domain
Provides all citizens, whenever they want and wherever they ontologies do not model the whole world, but rather model
are, access to high-quality knowledge and know-how in just parts that are relevant to the task at hand. (Ishaya, 2005)
an interactive and custom-made manner. It is based on the 2: A formal and explicit deinition of concepts (classes or
technological progresses and allows the virtual classroom categories) and their attributes and relations. (Loh et al.,
to become a reality. (Y.J. Zhang, 2005b) 2005) 3: A formal speciication in a structured format, such
as XML or RDF, of the concepts that exist within a given
ONSAS: See Online Needs and Skills Assessment area of interest and the semantic relationships among those
Survey. concepts. (Banerjee et al., 2005) 4: A branch of philosophy
that attempts to determine the structure of reality. It can
Onset Detection also refer to a classiication system that organizes particular
The process of inding the start times of notes in an audio things or phenomena. (Artz, 2005c) 5: A collection of
signal. (Dixon, 2005) concepts and inter-relationships. (Chung et al., 2005) 6:
A conceptualization and representation of objects and
ONT: See Optical Network Terminal. phenomena, and the relationships among them in a domain.
(Karimi & Peachavanish, 2005) 7: A consensual and formal
Ontogeny description of shared concepts in a domain. Typically, it
The history of structural changes that a system experiences organizes the objects of a domain in classes and includes
without losing its identity. (Abou-Zeid, 2005b) a hierarchy of classes (e.g., printers are hardware devices).
Ontologies are used to aid human communication and
Ontological Changeability shared understanding, and also communication among
The ability of changing some structures of an information software applications. (Antoniou et al., 2005) 8: A logical
source without producing substantial changes in the theory accounting for the intended meaning of a formal
ontological components of the integrated system. (Buccella vocabularythat is, its ontological commitment to a
et al., 2005) particular conceptualization of the world. The intended
models of a logical language using such a vocabulary are
Ontological Engineering constrained by its ontological commitment. An ontology
The activity of creating models of knowledge and possibly indirectly relects this commitment (and the underlying
deploying them in actual engineering objects. (Cristani conceptualization) by approximating these intended
& Cuel, 2006) models. (Aldana Montes et al., 2005) 9: A representation
of knowledge speciic to some universe(s) of discourse. It
Ontological Reusability is an agreement about a shared conceptualization, which
The ability of creating ontologies that can be used in includes conceptual frameworks for modeling domain
different contexts or systems. (Buccella et al., 2005) knowledge and agreements about the representation of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
492 Ont ology Alignm e nt ON U
particular domain theories. (Ghenniwa & Huhns, 2005) Ontology Web Language (OWL)
10: A set of concepts, and a set of relations among those 1: Language (based on description logics) designed
O concepts. (Kulyukin & Nicholson, 2005) to represent ontologies capable of being processed by
machines. (Alonso-Jimnez et al., 2005) 2: Markup
Ontology Alignment language for sharing ontologies in the World Wide Web.
Mapping between concepts deined in a source ontology OWL builds on RDF and was derived from the Defense
and concepts deined in a target ontology in order to Advanced Research Projects Agency (DARPA) Agent
ind the concepts with similar (or the same) meaning. Markup Language (DAML). (Juszczyszyn, 2006) 3:
(Juszczyszyn, 2006) Ontology representation language recommended by W3C,
and intended for publishing and sharing ontologies in the
Ontology Creation (Editor) Tool Web. It comprises three layers: OWL Lite, OWL DL, and
A tool that enables ontology speciication and creation OWL Full. (Dieng-Kuntz, 2006) 4: The Web Ontology
through some collaborative authoring. It usually requires Language deined by W3C. It was designed for use by
users to be trained in knowledge representation and applications that need to process the content of ontology
predicate logic. They are supposed to offer a server-based information instead of just presenting this the information
environment with support for consistency checking of to humans. It uses the description framework provided by
interconnected ontologies, and a collaborative environment RDF. (Sicilia & Garca-Barriocanal, 2006) 5: Designed to
for model review and reinement. (Kapetanios, 2005) meet the need for a Web ontology language. OWL is part of
the growing stack of W3C recommendations related to the
Ontology Distribution Semantic Web. OWL adds more vocabulary for describing
A mode of semi-autonomous maintenance of ontology properties and classes: among others, relations between
data, according to which each public authority maintains classes (e.g., disjointness), cardinality (e.g., exactly one),
speciic portions of an ontology. (Vassilakis & Lepouras, equality, richer typing of properties, characteristics of
2006) properties (e.g., symmetry), and enumerated classes.
(Kapetanios, 2005) 6: The current W3C standard for
Ontology Merging deining Web ontologies. (Antoniou et al., 2005) 7: A
Creating ontology by joining two or more source ontologies. semantic markup language for publishing and sharing
Corresponding concepts are merged and treated as a single ontologies on the World Wide Web. OWL is developed
concept. (Juszczyszyn, 2006) as a vocabulary extension of RDF and is derived from the
DAML+OIL Web Ontology Language. An OWL ontology
Ontology Methodology is an RDF graph, which is in turn a set of RDF triples.
A sequence of steps to be deployed in order to achieve one OWL includes three speciic sub-languages, characterized
possible goal amongst creating, modifying, re-creating, by an increasing level of complexity and expressiveness:
validating, and evaluating a domain ontology. The very OWL Lite, OWL DL (DL stands for Description Logics,
nature of an ontology methodology is more complex a particular, logic-oriented, knowledge representation
in principle, being able to provide the very same goal language introduced to supply a formal foundation for
achievements by means of true worklows. However, these frame-based systems), and OWL Full. (Zarri, 2006b) 8: A
do not actually appear in the current literature. (Cristani W3C recommendation for modeling complex conceptual
& Cuel, 2006) models and background information in a Web-based
setting. The language extends RDF schema with richer
Ontology vs. Taxonomy operators for deining classes of objects. (Stuckenschmidt,
In a taxonomy (and in the most simple types of ontologies), 2005)
the implicit deinition of a concept derives simply by the
fact of being inserted in a network of speciic/generic Ontology-Management System
relationships (IsA) with the other concepts of the hierarchy. System for querying, storing, creating, modifying,
In a real ontology, we must also supply some explicit loading, accessing, and manipulating ontologies. (Youn
deinitions for the conceptsor at least for a majority & McLeod, 2006)
among them. This can be obtained, for example, by
associating a Frame with these concepts. (Zarri, 2005a) ONU: See Optical Network Unit.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
OOA Ope n Educ at ion 493
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
494 Ope n Educ at iona l Re sourc e Ope n Sourc e
It also means learning in your own time, at your own pace, Open Knowledge Initiative (OKI)
and at your own base, using higher education settings An open source reference system for Web-enabled
O for academic assistance and as a base for facilities and education. It provides a set of resources and an architecture
equipment. Formats include Distance Learning and designed to enable the development of easy-to-use Web-
Online Learning. (Kinuthia, 2005) 2: This is more of a based environments and for assembling, delivering, and
European term, where in the United States it is referred to accessing educational resources. (ODea, 2005)
as Continuing Education. Courses that are being offered
for ones own maintenance of professional currency. Open Learning (OL)
(Kostopoulos, 2005) 1: Denotes a system of education that recognizes prior
learning and permits open entry to its programs. OL
Open Educational Resource programs in general are designed to enable the learner
Term accepted by the international higher education to study at a time, pace, and place to meet the learners
community through UNESCO to refer to such projects as needs and demands. (Taylor et al., 2005) 2: Learning made
MITs OpenCourseWare, Rice Universitys Connexions available, independent of time and place; also open with
Project, and other resources created electronically and respect to methodology and form of presentation. (Haugen
made available worldwide for no cost. (S.M. Johnstone, & Ask, 2005) 3: Learning for all. The central idea is to
2005) grant everybody access to the learning resources. This term
is often confused with lifelong learning or vocational
Open Group training, however, it is broader than those. (Karoulis &
The source does not have to know the members of the Pombortsis, 2005b) 4: A qualitative, value-loaded, and
groups for sending data, and the receivers (members of the highly relative term. Its use is confusing unless the context
group) do not have to know the source. (Hosszu, 2005a) indicates the dimensions of openness that relate to it.
Many scholars attribute to open learning characteristics
Open Hypermedia of extending access to various educational frameworks,
As a more generalized concept addressing interoperability employing lexible schedules, and enhancing self-directed
among hypermedia services, it has the following learning. (Guri-Rosenblit, 2005b)
characteristics: it should be platform independent and
distributed across platforms, and users should be able to Open Loop
ind, update, make links to, and exchange the information, Digital cash issued once can be used for additional
unlike hypermedia titles on CD-ROM. (Suh & Kim, transactions, even if the value does not return to the
2005) issuer. The open loop provides rolling liquidity. (Kurihara,
2006)
Open Knowledge Base Connectivity (OKBC)
Protocol Open Sociotechnical System
A protocol aiming at enforcing interoperability in A complex set of dynamically intertwined and
the construction of knowledge bases. The OKBC interconnected elements, including inputs, processes
knowledge model is very general, in order to include the (throughputs), outputs, feedback loops, and the environment
representational features supported by a majority of frame- in which it operates and interacts. (Cuevas et al., 2005)
based knowledge systems, and concerns general directions
about the representation of constants, frames, slots, facets, Open Source
and so forth. It allows frame-based systems to deine 1: Method and philosophy for software licensing and
their own behavior for many aspects of the knowledge distribution designed to encourage use and improvement
model, for example, with respect to the deinition of the of software written by volunteers by ensuring that anyone
default values for the slots. The most well-known OKBC- can copy the source code and modify it freely. (Lightfoot,
compatible tool for the setup of knowledge bases making 2005) 2: Software that is developed by software engineers
use of the frame model is Protg-2000, developed for many who give users the right to alter the software code in
years at the Medical Informatics Laboratory of Stanford order to develop and improve the software for use and
University, and that represents today a sort of standard in distribution. (Boateng & Boateng, 2006b) 3: Technically,
the ontological domain. (Zarri, 2005a) refers to making the programming instructions used to
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ope n Sourc e Com m unit y Ope n Sourc e U se r 495
write computer software available for scrutiny and reuse by Open Source Licensing Model
others. In practice it also describes a political movement that A statement of the rights granted by the owner of some piece
is concerned with how software and computer technology is of open source software to the user. (Fleming, 2005b)
O
owned and controlled. Open source software is commonly
either in the public domain or copyrighted and licensed by Open Source Software (OSS)
the owner in ways that enforce free access to the source 1: Software for which the source code is distributed
of the original and all derived works. (Marshall, 2005) along with the executable program. (Sahraoui, 2006) 2:
4: There is no universally accepted deinition, but the Computer software distributed under some license that
one given by the Open Source Initiative summarized the permits the user to use, modify (including the creation
concept as: free distribution, source code, derived works, of derived works), and distribute the software and any
integrity of the authors source code, no discrimination derived work, free from royalties. (Fleming, 2005b) 3:
against persons or groups, no discrimination against In general, software available to the general public to
ields of endeavor, distribution of license, license must use or modify free of charge is considered open. It is
not be speciic to a product, license must not restrict other also considered open source because it is software that is
software, and license must be technology neutral. (Zhao typically created in a collaborative environment in which
& Deek, 2005) developers contribute and share their programming openly
with others. (St.Amant & Still, 2005) 4: The software one
Open Source Community can have at his/her disposal together with the source code.
Community of developers that interact virtually to write Its main feature is to be submitted to licenses obliging
code collaboratively. (Sahraoui, 2006) those who want to distribute that software, parts of it, or
changes to its structure, to do it together with the source
Open Source Database code. (Cartelli, 2005b) 5: Software whose source code is
A class of relational database developed and distributed liberally made available for use, modiication, creation
by means of the F/OSS development model. (Sowe et al., of derivative works, and redistribution. (Carillo & Okoli,
2005) 2006) 6: Software with its source code available for
users to inspect and modify to build different versions.
Open Source Developer (Kayacik et al., 2005) 7: Software whose license is free
Software developers who are core members of open and allows unrestricted redistribution of source code.
source projects. They either initiated projects or joined (Wang & Gwebu, 2006) 8: Generally, a program in which
in subsequently as major contributors. (Zhao & Deek, the source code is available to the general public for use
2005) and/or modiication from its original design free of charge.
(Wei & Wang, 2006)
Open Source E-Learning System
E-learning systems developed by the Open Source Open Source Software for E-Government
Community and freely distributed with their own license A viable alternative to commercial proprietary software,
or a GPL (General Purpose License) to use, modify, and with potential signiicant value for money beneits for e-
distribute together with the source code. (Fernando, government. It is based on the principle of software products
2005) made available by the OSS developer community licensed
for use with or without a fee. OSS licenses generally give
Open Source Initiative (OSI) the user the freedom to use, copy, distribute, examine,
1: Group of developers who disseminate information change, and improve the software. (Yigitcanlar & Baum,
on the beneits of open source. (Sahraoui, 2006) 2: An 2006a)
organization dedicated to managing and promoting the
open source deinition for the good of the community. Open Source User
(Curti, 2005) An individual interested in open source software
and willing to contribute by different means. Unlike
Open Source License open source developers, open source users are more
Guarantees the freedom to share and change software heterogeneous in background, less committed to projects,
without any permission from its original owner. (Sahraoui, but provide major impetus to software improvement. (Zhao
2006) & Deek, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
496 Ope n Syst e m Ope ra nt Condit ioning
Open Systems Interconnection Reference Model OpenGL for Embedded Systems (OpenGL ES)
Seven-layer architectural model developed by the A low-level, lightweight API for advanced embedded
International Standards Organization (ISO) to describe graphics using well-deined subset proiles of OpenGL. It
standardized network operations. (Littman, 2006) provides a low-level applications programming interface
between software applications and hardware or software
Open University graphics engines. (Di Giacomo et al., 2005)
1: This term is often used interchangeably with distance
teaching university, though a handful of distance education Openness
providers are entitled as open universities. All of the 1: A measure of the freedom to search, collect, and exchange
open universities employ an open-admission policy. governmental information related to public services or to
(Guri-Rosenblit, 2005b) 2: A university that is open to the bureaucratic structure. (Almazn & Gil-Garca, 2006)
people without formal academic qualiications and where 2: The giving employees willingness to transfer their
teaching is done using distance education means. (Shareef knowledge in a collaborative interaction. This stresses the
& Kinshuk, 2005) 3: A university without traditional attitude of giving employees involved in the knowledge
classrooms; teaching and learning is conducted at a transfer of not hiding their knowledge so that potential
distance through means such as the Internet, TV and radio, learning is facilitated. (Chen, Duan, et al., 2006)
printed materials, and tutoring centers. (Reynolds, 2005)
4: A university, typically employing distance education Open-World Assumption (OWA)
technologies, that provides open access and admission to 1: An assumption made while reasoning with incomplete
all within the country or region. (Laws et al., 2005) 5: This knowledge: all facts that are not implied by the knowledge
term is used to refer to a distance teaching university that base are assumed to be unknown. (Babaian, 2005) 2: The
offers courses through distance learning, employing either fact that the frame of discernment might not be exhaustive.
traditional, technology-integrated, and sometimes entirely (Smets, 2005)
online methods. It is also used to refer to a university with
open admissions. The term is not unequivocal. These Operant Conditioning
universities usually allow for lexibility in curriculum 1: Skinner contributed much to the study of operant
and pace of studies. Open University can also be part conditioning, which is a change in the probability of a
of the name of an institution, often combined with the response due to an event that followed the initial response.
name of the country in which it operates, such as the OUI The theory of Skinner is based on the idea that learning
(Open University of Israel), OUUK (Open University of is a function of change in behavior. When a particular
the United Kingdom), OUHK (Open University of Hong S-R pattern is reinforced (rewarded), the individual is
Kong), and AOU (Arab Open University). (Erlich & Gal- conditioned to respond. Changes in behavior are the
Ezer, 2005) result of an individuals response to events (stimuli) that
occur in the environment. Principles and Mechanisms
Open-Ended Learning Environment (OELE) of Skinners Operant Conditioning include: Positive
1: Multimedia learning environments based on Reinforcement or Reward, Negative Reinforcement,
constructivist principles tend to be open-ended learning Punishment, and Extinction or Nonreinforcement. (I. Chen,
environments. OELEs are open-ended in that they allow the 2005) 2: Learning through immediate positive feedback
individual learner some degree of control in establishing (reinforcement) regarding the correctness of an answer;
learning goals and/or pathways chosen to achieve learning. the student learns to respond in a particular way to a
(Torrisi-Steele, 2005) 2: A learning environment that aims particular question or issue (stimulus). Fading can be used
at fostering complex problem-solving skills by confronting by gradually reducing stimulus cues in subsequent frames
learning with a realistic or authentic problem in a learning when material is repeated. (Owen & Aworuwa, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ope rat ion Ope rat or 497
Operation short term; operational goals are derived from the tactical
1: A function or transformation that may be applied to goals. (Brabston, 2005)
or by objects in a class. The class Account, for example,
O
might have the operations Open, Close, PayIn (Amount), Operational Objective
and Withdraw (Amount). (Rittgen, 2005) 2: A process- A short-term objective, such as maximization of working
related notion in UML; operations cause state changes in time, reduction of duplication, stimulation of creativity,
objects. (D. Brandon, Jr., 2005a) and so forth. (Tremblay, 2006a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
498 Oppor t unism Opt im ist ic T w o-Pha se Lock ing (O2 PL)
as public hotspot operators or wireless Internet service output wavelength of a given optical iber. (Rodrigues et
providers (WISPs). (Efstathiou & Polyzos, 2006) al., 2005)
O
Opportunism Optical Line Terminal (OLT)
In terms of virtual teams, the characteristic of existing 1: A iber-to-the-home terminating device at the providers
to capitalize on a speciic opportunity or meet a speciic, central ofice or point of presence connected to one or more
temporary need. In terms of Transaction Cost Economics Passive Optical Networks that provides connection to the
(TCE), the characteristic of an entity that indicates the providers network. (Kelic, 2005) 2: An OLT is located at
entity will act in its own best interest even at the expense the central ofice and is responsible for the transmission
of other entities in the market. (Morris et al., 2005) of Ethernet frames to Optical Network Units. (Freire et
al., 2005)
Opportunity Cost
The cost of the next best alternative use of time or resources Optical Music Recognition (OMR)
when one choice is made rather than another. The cost of 1: The recognition of images of music notation in such a
doing something always includes the additional cost of way that the meaning is captured. (George, 2005b) 2:
what could have been done if a different choice was made. Optical recognition of music; transcoding of an image score
(Hartoonian & Johnson, 2005) to a symbolic score format by using a speciic algorithm.
(Nesi & Spinu, 2005)
Opt-In/Opt-Out
1: Options for individuals to be included or excluded from Optical Network Terminal (ONT)
a database record. (Dholakia, Zwick, et al., 2005) 2: A A iber-to-the-home terminating device at the customer
strategy that a business may use to set up a default choice premise. (Kelic, 2005)
(opt-in) in a form that forces a customer, for example,
to accept e-mails or give permission to use personal Optical Network Unit (ONU)
information, unless the customer deliberately declines Usually located at the subscriber premises or in a telecom
this option (opt-out). (T. Stern, 2005) 3: Consciously closet and responsible for the transmission of Ethernet
to accept some situation or condition in a contract. For frames to Optical Line Terminal (OLT). (Freire et al.,
example, to opt-in to an e-mail subscription means that 2005)
you want to receive periodic messages, even from third
parties (antonym: opt-out). (Friedman, 2005) Optical Window
A range of wavelengths in which attenuation has the lower
Optical Attenuation value. The criterion to choose the optical source. (Louvros,
The attenuation of transmitted light through optical Iossiides, et al., 2005)
waveguides mostly due to material absorption. (Louvros
et al., 2005a) Optical-Access Network (OAN)
The set of access links sharing the same network-side
Optical Character Recognition (OCR) interfaces and supported by optical-access transmission
1: The electronic identiication and digital encoding of systems. (Chochliouros et al., 2005a)
printed or handwritten characters by means of an optical
scanner and specialized software; the technology involved Optical-Scan Voting System
in this process. (Rhoten, 2006a) 2: The technique of Requires voters to use a pen or pencil to ill in an oval or
automatically translating the content of an image-formatted connect dots on a paper ballot. This is the same system
document into text-formatted materials. (Chan, Ho, et used to record test scores on standardized tests like the
al., 2005) 3: Software that recognizes text and converts SATs. (Gibson & Brown, 2006)
it to a form in which it can be processed by computer.
(McCarthy, 2005a) Optimistic Two-Phase Locking (O2PL)
This is avoidance-based and is more optimistic about the
Optical Cross-Connect (OXC) existence of data contention in the network than Case-Based
Optical device used mainly in long-distance networks Learning (CBL). It defers the write intention declaration
that can shift signals from an incoming wavelength to an until the end of a transactions execution phase. Under the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Opt im izat ion Orga nizat ion 499
ROWA protocol, an interaction with the server is required manages conversations among Web services. (Sethi &
only at client cache-miss or for committing its cache copy Sethi, 2006a)
under the O2PL. As in CBL, all clients must inform the
O
server when they erase a page from their buffer so that the Order Aggregation
server can update its page list. (Parker & Chen, 2005) A group purchase designed to achieve a volume discount
by aggregating orders placed by individual buyers. (I.
Optimization Lee, 2005)
The quantitative study of optima and the methods for
inding them. (Mart, 2005) Order-Execution-Result (OER) Pattern
A basic pattern for business interaction based on order-
Optimization Criterion execution-result phases. (Johannesson, 2005a)
Criterion that gives the quality of a solution of an
optimization problem. (Jourdan et al., 2005) Ordered and Labeled Tree
A tree whose nodes are labeled and in which the left-to-
Optimization Problem right order among siblings is signiicant. (Chen, 2005b)
A computational problem for which an objective function
associates a merit igure with each problem solution, and Ordinal Data
it is asked to identify a feasible solution that minimizes or 1: Data classiied into categories that can be ranked.
maximizes the objective function. (Calvo et al., 2005) However, the differences between the ranks cannot be
calculated by arithmetic. An example is: assignment
Optimization Process evaluation: fail, pass, good, excellent. (Yang & Webb, 2005)
The process used to focus the search (or guide the search) 2: Data that is in order but has no relationship between the
for interesting patterns, as well as to minimize the search values or to an external value. (Morantz, 2005)
efforts on data. (Owrang O., 2006)
Ordit
Optimum Distance (OD) Based on the notions of role, responsibility, and
Appropriate degree of closeness (or distance) among conversations, making it possible to specify, analyze,
the team members achieved through the combination of and validate organizational and information systems
Knowledge Distance (KD) and Professional Distance (PD), supporting organizational change. The Ordit architecture
leading to so-called creative tension. (Choudhary, 2005) can be used to express, explore, and reason about both the
problem and the solution aspects in both the social and
Option technical domains. From the simple building blocks and
1: By deinition, gives the holder the right, but not the modeling language, a set of more complex and structured
obligation, to take ownership of an underlying asset at a models and prefabrications can be constructed and reasoned
future point in time. (Lawson-Body, 2005) 2: The right, about. Alternative models are constructed, allowing the
but not the obligation, to buy or sell an asset by a pre- exploration of possible futures. (Singh & Kotze, 2006)
speciied price on or before a speciied date. (Li, 2005b)
3: A inancial option owes the holder the right, but not Organization
the obligation, to trade in securities at prices ixed earlier. 1: The degree of formal organization of social relationships
Options confer to a irm the rights, but not the obligations, and of a community or network as a whole; low organization
to choose a strategic alternative. (Narayanan, 2005) means informal self-organization. (Meller-Prothmann,
2006a) 2: The deliberate integration of persons in
OR: See Operations Research. order to achieve a goal or outcome. (Murphy, 2005c)
3: The coniguration of relationships among a systems
Orchestration components that deine a system as a unity with distinctive
1: A business uses orchestration in order to deine the identity, and determine the dynamics of interaction and
electronic message interaction with other business transformations that it may undergo as such a unity.
partners in order to fulill its obligations. (Bussler, (Abou-Zeid, 2005b)
2005a) 2: The process that sequences, coordinates, and
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
500 Orga nizat ion for Ec onom ic Coope rat ion a nd Deve lopm e nt (OECD) Orga nizat iona l Cult ure
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Orga nizat iona l Deve lopm e nt Orga nizat iona l Fa c t or 501
feel in relation to those problems. (Zakaria & Yusof, 2005) to innovate, improved coordination of efforts, and reduced
6: Refers to the way people give meaning to their actions redundancy of information/knowledge. (Hsu & Mykytyn,
in an organizational setting. Because of cognitive and 2006)
O
normative diversity within an organization, the attribution
of meaning is complicated and leads to organizational Organizational Elements Model (OEM)
cultural integration as well as fragmentation, and unity A planning framework with three levels of planning
as well as diversity. (Boersma & Kingma, 2006) 7: The and three associated levels of results: (1) mega-level
set of shared values and norms within an organization planningoutcomes: what an organization can deliver
that shape its behaviors, attitudes, and actions. (Jones & for societal value added and impact; (2) macro-level
Gupta, 2005) planningoutputs: what an organization can deliver
outside itself; and (3) micro-level planningproducts: what
Organizational Development an organization produces. (Kaufman & Lick, 2005)
A professional approach to organizational action guided
by careful diagnosis based on social scientiic enquiry. Organizational Encounter
The period between the 1960s and late 1970s was A time for newcomers to learn behaviors, values, and
highly experimental and established the principles of beliefs associated with their jobs and organizations. (Long
organizational development for much of the twentieth et al., 2005)
century. By the end of the twentieth century, new
approaches to organizational development had emerged as a Organizational Environment
result of critiques of functionalist methods and behaviorism Refers to the aims and objectives of the organization in
in particular, and also because of Morgans book, Images the context of the way in which it structures itself and its
of Organization, which gave rise to multiple diagnoses. activities. The structure of the organization is the way in
Increasingly, organizational learning became a focus for which the organization is arranged for the implementation
organizational development activities. (Grieves, 2006b) of authority. Generally, this structure is either a hierarchical
structure, a lat structure, or a management matrix. A
Organizational Data Mining (ODM) hierarchical structure is typically shaped like a pyramid
The process of leveraging data-mining tools and with power or control centralized in a CEO (chief executive
technologies in an organizational setting to enhance oficer) who has managers reporting back. These managers
the decision-making process by transforming data into have subordinates who also exercise delegated authority
valuable and actionable knowledge to gain a competitive over their subordinates. There may be several layers
advantage. (Van Dyke et al., 2006) of authority and delegation depending on the size and
complexity of the organization. Ultimately, power and
Organizational Discourse control lies in the CEO. A management matrix has a series
Collections of organizational texts, such as conversations, of control mechanisms where the workforce may report
stories, dialogues, meetings, and other socially constructed to their direct superior, and additionally to one of a series
exchanges, of which storytelling represents an example of team leaders. This requires a sequence of devolved
of a unit of analysis. (Connell, 2006) authorities and responsibilities. A lat organizational
structure has devolved power and responsibilities without
Organizational Dynamics a cascading series of reporting structures. (Zyngier,
Changing of an organizations structure, where structure 2006)
consists of an organizations (companys) elements and
relations among them along the time parameter, when Organizational Factor
time as a parameter is indispensable for the organizations One of the resources that an organization has available to
structure, or some aspect of the organizations structure, support the adoption of an innovation, such as inancial
description, and analysis. (Cunha & Putnik, 2005) and technological resources, as well as top management
support and top management knowledge. (Cragg & Mills,
Organizational Effectiveness 2005)
Used to evaluate the value-added aspect of organizational
resources. Three concepts are included: improved ability
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
502 Orga nizat iona l I m pa c t Ana lysis Orga nizat iona l M e mor y Syst e m (OM S)
Organizational Impact Analysis learning is descriptive stream, with academics who pursue
A one-off study to determine the ways in which a proposed the question: How does an organization learn? When
O system will affect the organization, in areas such as power, individual and group learning becomes institutionalized,
structure, culture, working practices, and so forth. (Doherty organizational learning occurs. (Xu & Wang, 2006)
& King, 2005)
Organizational Learning Capability
Organizational Intelligence Ability an organization has to learn or the capacity
The collective organizational capacity of achieving goals for increasing its own learning power via the putting
and effectively responding to environmental changes. into practice of the appropriate management activities,
(Tang & Sivaramakrishnan, 2005) structures, and procedures which facilitate and stimulate
the learning. (Real et al., 2006)
Organizational Issue
One of the set of issues that need to be treated during the Organizational Memory (OM)
systems development process to ensure that the individual 1: The processes of storing and retrieving knowledge
human, wider social, and economic impacts of the resultant of the past for present and future use. OM draws from a
computer-based information system are likely to be wide variety of disciplines including organization theory
desirable. (Doherty & King, 2005) and information systems. A better understanding of
OM can assist managers in solving problems regarding
Organizational Learning the retention of knowledge within their organizations.
1: The consistent and constant acquisition and transfer of (Jasimuddin et al., 2006) 2: A learning history that tells
organizational knowledge assets for increased competitive an organization its own story, which should help generate
advantage. (Huq et al., 2006) 2: An organizational process relective conversations among organizational members.
in which the intentional and unintentional processing of Operationally, an organizational memory has come to
knowledge within a variety of structural arrangements be a close partner of knowledge management, denoting
is used to create an enriched knowledge and orientation the actual content that a knowledge management system
base, and a better organizational capacity for the purpose purports to manage. (Vat, 2006) 3: A general term for
of improving organizational action. (Anttiroiko, 2005b) the collection of information and knowledge known to
3: A process of leveraging the collective individual the organization, as well as the knowledge management
learning of an organization to produce a higher-level necessary to acquire, store, and utilize this knowledge.
organization-wide intellectual asset. It is a continuous (Teeni, 2006) 4: Understanding shared by members
process of creating, acquiring, and transferring knowledge, of an organization about its identity, mental maps, and
accompanied by a modiication of behavior to relect routines for thought and action. (Saunders, 2006) 5:
new knowledge and insight, and produce a higher-level When knowledge from the past is brought to bear on
asset. (Vat, 2005b) 4: Dynamic process that is generated present activities, thus affecting the level of organizational
in the heart of the organization via its individuals and effectiveness. (Qayyum, 2005)
the groups they make up, aimed at the generation and
development of knowledge that allows an organization to Organizational Memory Information System
improve its performance and results. (Real et al., 2006) 5: A coherent integration of dispersed know-how from all
Goes beyond individual learning, because it results in the over the organization. (Qayyum, 2005)
development of a knowledge basis which could translate
into a signiicant change within the organization, and not Organizational Memory System (OMS)
only at the individual level. (Tremblay, 2006a) 6: Describes 1: As with the human brain, OMS acts as a repository
an organizations ability to gain insight and understanding for data and accumulated intellectual knowledge. As the
from experience based on experimentation, observation, smart community grows, so does the communitys memory
analysis, and an existing willingness to examine and learn (intelligence). It is expected that the infrastructure will
from both successes and failures. (Zboralski & Gemnden, support self-education long after the formal education
2006) 7: The process of change in individual and shared process has been completed. (Baskin et al., 2005) 2: The
thought and action, which is affected by and embedded system created to capture, store, search, and retrieve
in the institutions of the organization. Organizational knowledge from a repository. (Jennex, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Orga nizat iona l Policy OSI La ye r 7 503
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
504 OSS Out sourc ing Cycle
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ove r Tuit ion Fe e Ove rriding a nd M ult iple I nhe rit anc e 505
Over Tuition Fee important in developing a clearer view of how, when, and
An assessed fee charged for certain classes in addition to why vicarious learning works. (J.R. Lee, 2005)
the current state fees to cover the special expenses such
O
course or program accrued. (Levy & Ramim, 2005a) Overlap Constraint
Constraint that states that the entity types that compose a
Overitting category can (or cannot) have elements in common. (Mani
1: A frequent phenomenon associated to learning, wherein & Badia, 2005)
models do not generalize suficiently. A model can be
overitted to the training data and perform badly on fresh Overlapping
data. This means that the model has internalized not only A particular interschema property. An overlapping exists
the regularities (patterns), but also the irregularities of between two concepts A and B, if they are neither synonyms
the training data (e.g., noise), which are useless for future nor hyponyms of the other, but share a signiicant set of
data. (Hernandez-Orallo, 2005b) 2: Finding a solution to properties; more formally, there exists an overlapping
a supervised learning problem that performs extremely between A and B, if there exist non-empty sets of properties
well on the training set but poorly on the test set. Such a {pA1, pA2, , pAn} of A and {pB1, pB2, , pBn} of B such that,
solution is typically too specialized to the speciic points for 1 i n, pAi is a synonym of pBi. (De Meo, Terracina,
in the training set, and thus misses general relationships. et al., 2005)
(Musicant, 2005) 3: Term referring to the situation where
the discovered rules it too much to the training set Overlay Function
peculiarities. Overitting usually leads to a reduction of The ability to combine multiple layers of information.
the predictive accuracy rate on the test cases. (Parpinelli (Lipton et al., 2005)
et al., 2005) 4: The effect on data analysis, data mining,
and biological learning of training too closely on limited Overlay Network
available data and building models that do not generalize 1: A software-enabled network that operates at the
well to new unseen data. (Huang, 2005) 5: The phenomenon application layer of the TCP/IP (transmission-control
that a learning algorithm adapts so well to a training set that protocol/Internet protocol). (Hughes & Lang, 2005) 2:
the random disturbances in the training set are included A virtual network formed by applications on hosts in the
in the model as being meaningful. Consequently, as these Internet. The applications have one-to-one (unicast) IP
disturbances do not relect the underlying distribution, the connections between them. (Hossz, 2006)
performance on the test set, with its own but deinitively
other disturbances, will suffer from techniques that tend Overriding and Multiple Inheritance
to it well to the training set. (Klawonn & Rehm, 2005) Two among the main theoretical problems that can affect
the construction of well-formed inheritance hierarchies.
Overitting Rule Overriding (or defeasible inheritance, or inheritance
A rule has high performance (e.g., high classiication with exceptions) consists of the possibility of admitting
accuracy) on observed transaction(s) but performs poorly on exceptions to the strict inheritance interpretation of an
future transaction(s). Hence, such rules should be excluded IsA hierarchy. Under the complete overriding hypothesis,
from the decision-making systems (e.g., recommender). the values associated with the different properties of
In many cases overitting rules are generated due to the the concepts, and the properties themselves, must be
noise in data set. (Zhou & Wang, 2005) interpreted simply as defaults, that is, always possible
to modify. An unlimited possibility of overriding can give
Overhearer rise to problems of logical incoherence; Reiters default
In a theoretical position developed by Herbert Clark, logic has been proposed to provide a formal semantics
following among others Erving Goffman, as well as the for inheritance hierarchies with defaults. In a multiple
direct participants in a dialogue situation there may be inheritance situation, a concept can have multiple parents
various kinds of side participants. Overhearers are and can inherit properties along multiple paths. When
technically side participants whose existence is not known overriding and multiple inheritance combine, we can be
to the direct participants. Vicarious learners are often confronted with very tricky situations like that illustrated
overhearers, though in other cases their involvement may by the well-known Nixon diamond. (Zarri, 2005a)
be known to the participants. Theories such as Clarks are
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
506 Ove r t ra ining OXC
Overtraining
When the MFNN performs signiicantly better on the
O training data than an out-of-sample test data, it is considered
to have memorized the training data, and be overtrained.
This can be avoided by following the guidelines presented
above. (Smith, 2005)
Ownership
1: Ownership of a business by the people who work for
it (e.g., partners of a virtual enterprise). (Wong, 2005) 2:
The association of the rights over intellectual property
either with an institution or an individual so as to enable
exploitation of that IP. (Fleming, 2005b)
Ownership by Contract
Transfer or otherwise licensing all or part of copyright
from the owner to one or more other parties covered by
an explicit contract. (Fleming, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
P_Avg PACS 507
P
P_Avg: See Average Precision. within member and associate member countries. PITA
comprises members (telecommunication entities),
P-Problem associate members (suppliers of telecommunication
Where all of the input variables are always relevant to equipment and services), and partner agencies (regional
the classiication. Decision tree methods are unsuitable and international organizations with vested interest in
for P-problems. (Wilson et al., 2006a) telecommunications and its development). (Hassall,
2005)
p-RA: See Resource Allocator.
Packet
p-RM: See Resource Manager. 1: A inite stream of bits sent in one block with header and
trailer bits to perform routing and management functions.
P-Split Mechanism (Guster et al., 2005) 2: A group of bits that includes data
The process of dividing every resource of a physical node (payload) plus source, destination address, and other
into p-equivalent slices, grouping one slice from each routing information (in the header). (Statica & Deek,
resource to form a portion of resource and use each portion 2006) 3: A package of data found at the network layer, and
as a virtual node. (Jong & Mahatanankoon, 2006) containing source and destination address information as
well as control information. (Lawson-Body et al., 2005)
P-Split Virtual Server
One of a group of smaller virtual servers that can be Packet Switching
generated from a physical server through the p-split 1: The type of network in which relatively small units of
mechanism. (Jong & Mahatanankoon, 2006) data called packets are routed through a network based
on the destination address contained within each packet.
P-Tree: See Predicate Tree. Breaking communication down into packets allows the
same data path to be shared among many users in the
P-Tree Algebra network. (Olla, 2005a) 2: A type of communication in
The set of logical operations, functions, and properties of which packets are individually routed between nodes,
P-trees. Basic logical operations include AND, OR, and without a previously established communication path. (Lee
complement. (Perrizo, Ding, Serazi, et al., 2005) & Warkentin, 2006) 3: Packet-switched networks divide
transmissions into packets before they are sent. Each packet
P-Value can be transmitted individually and is sent by network
The P-value for an object is the probability of obtaining routers following different routes to its destination. Once
a false positive if the threshold is set just high enough to all the packets forming the initial message arrive at the
include the object among the set selected as relevant. More destination, they are recompiled. (Kaspar & Hagenhoff,
generally, it is the false positive rate corresponding to an 2005)
observed test statistic. (Mukherjee, 2005)
PACS: See Picture Archiving and Communication
Paciic Islands Telecommunications Association System.
(PITA)
A non-proit organization formed to improve, promote,
enhance, facilitate, and provide telecommunications services
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
508 Pa ge Sc ore Pa ra digm
PageRank Panopticon
1: A Web graph mining algorithm that uses the probability Jeremy Benthams late 18th-century description of an
that a page is visited by a random surfer on the Web as a architectural structure that depicted a circular-type prison
key factor for ranking search results. (Wen, 2005b) 2: An of individual cells arranged around the perimeter. A
algorithm that Google uses to rank Web pages that match a tower rises in the center of the prison allowing one single
given search string. (Kasi & Jain, 2006) 3: The PageRank warden to see any cell at any time. Foucault popularized
algorithm assigns a quality value to each known Web page the use of Panopticon and panoptic constructs as ways
that is integrated into the ranking of search engine results. of characterizing dataveilled social spaces. (Dholakia,
This quality value is based on the number of links that Zwick, et al., 2005)
point to a page. In an iterative algorithm, the links from
high-quality pages are weighted higher than links from Paper Prototyping
other pages. PageRank was originally developed for the The diagram expressing the user environment design is
Google search engine. (Mandl, 2006) used to create paper prototypes, which are then put before
users during paper prototype interviews to validate the
PageRank Algorithm design of the new system. The sixth step in contextual
A Web search technique for ranking Web pages according design. (Notess, 2005)
to relevance to a particular search term or search phrase.
Based on the random surfer model and Web graph, the Paperless Classroom
index, PageRank, is proposed to rate the importance of A classroom where paper documents (textbooks, homework
each Web page to users. (Li, 2005) submissions, grade reports) are replaced by electronic
documents. (Roldan, 2005)
Paging
A technique to locate mobile users in wireless systems. Paraconsistent Logic
(W. Wang, 2006) A logic system that limits, for example, the power
of classical inference relations to retrieve non-trivial
Palm OS 3.5 information of inconsistent sets of formulas. (Alonso-
An operating system developed to operate on handheld Jimnez et al., 2005)
computers. The 3.5 refers to the version number of the
system used in the reported case study. (Woodruff & Paradigm
Nirula, 2005) A set of practices that deine a particular discipline. The
now-standard usage for this term traces back to Thomas
Palm Pilot Kuhn, who used it to refer to the set of assumptions,
Trademark name for a type of handheld computer. methods, and principles that characterized a particular
(Woodruff & Nirula, 2005) scientiic worldview. The term has now crossed over
into much broader usage, and can refer to many different
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pa ra digm Shift Pa r t ia l REALLOCAT E 509
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
510 Pa r t ic ipa nt Equa lit y Pa r t ic ipat or y Le a r ning Approa ch
Participant Equality the rationality and justice of their own social practices.
Each individual facet of a virtual organization is expected Conducting participative action research is to cyclically
P to contribute an equal amount of work toward a given goal, plan, act, observe, and relect more carefully, more
if appropriate. While the equality may not be measured best systematically, and more rigorously than is usually the
in quantity, it can be restated as effort and the successful case in day-to-day living. (Rhodes, 2005) 2: A form of
completion of all tasks assigned to it, be they large or action research where the role of researcher and researched
small. Since every task is considered to be essential as a overlaps. This may mean that the researcher takes on
part of the project, the equality comes in the addition of a participatory role within the group, community, or
that piece to a larger puzzle. (J. Lee, 2005) organization being researched, or that the researched
take a role in the design, conduct, and analysis of the
Participant Observation research. Often participatory action research does both.
This qualitative research method, long a cornerstone of (David, 2005)
ethnography in the tradition of Bronislaw Malinowski,
involves learning another culture by immersing oneself in Participatory Democracy
the daily routines of ones host community. Observation is A broadly inclusive term for many kinds of consultative
not conducted from afar, but from within, by taking part decision making in a democracy, as direct or deliberative
(to the extent allowed) in everyday activities, ceremonies, democracy. (Kozeluh, 2005)
rituals, work tasks, and so forth. Actual forms of participant
observation can vary widely and in accordance with the Participatory Design (PD)
speciic interests adhering to a particular research project. 1: A design approach that focuses on the intended user of a
(Forte, 2005) service or product, and advocates the active involvement of
users throughout the design process. (Zaphiris et al., 2005)
Participation 2: Design method in which users (and other stakeholders)
1: Process in which inluence is exercised and shared provide special expertise and play active and autonomous
among stakeholders, regardless of their formal position roles in design work. (Carroll, 2005)
or hierarchical level in the organization. (Peterson, 2005)
2: The act of taking part in or sharing the development Participatory Development
of something. Participation also implies critical thinking A development approach in which members of the
about that which is being shared or developed. (Crdoba, community are actively involved in the planning,
2006b) 3: The most basic requirement of collaboration; implementation, and evaluation of community development
it may be measured by the number of postings made and programs. (Songan et al., 2005)
read, or by the number of statements contributed to a
discussion. (Ingram, 2005) 4: The surface analysis of group Participatory Evaluation
involvement. It is the easiest to measure by time spent on Evaluation methods in which the subjects of the evaluation
the discussion or amount written, but is uninformative actively participate in planning and carrying out
unless the quality of participation is measured. (Ingram observations. (Carroll et al., 2005)
& Hathorn, 2005a)
Participatory Learning and Action (PLA)
Participation in Communities of Practice Umbrella term for a wide range of similar approaches
The key to understanding these organizations, as it is and methodologies to involve communities in self-help
the most important factor if they are to be managed and development projects. The common theme to all of
satisfactorily. With the active participation of all members, these approaches is the full participation of people in the
the working language can be uniied, the goals pursued processes of learning about their needs and opportunities,
clariied, and the achievement of those goals brought and the action required to address them. (Rambaldi,
closer. (Ranguelov & Rodrguez, 2006) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pa r t ic ipat or y M a na ge m e nt Pa ssba nd 511
solving, and evaluating a problem and its solution. (Bieber Partitioning Clustering
et al., 2005) A clustering method characterized by the division of the
initial dataset in order to ind clusters that maximize the
P
Participatory Management similarity between the objects inside the clusters. (Santos
Management in which the input of employees as well as et al., 2005)
managers is thoughtfully taken into account in setting
organizational policies and developing organizational Partitioning Tree Algorithm
structures. (Oravec, 2005) A recursive algorithm to form disjoint and exhaustive
subgroups of objects from a given group in order to build
Participatory 3D Modeling (P3DM) up a tree structure. (Siciliano & Conversano, 2005)
A participatory mapping method based on the merger of
traditional spatial information (elevation contours) and Partnering Intelligence
peoples spatial knowledge (cognitive maps), the output A measurement of how well we build relationships and
of which are solid terrain models and derived maps. The cultivate trust while accomplishing predetermined tasks
models are used in development and natural resource in an alliance with someone else. A measure of the ability
management contexts, and have proved to be user friendly to succeed in partnership situations. It is measured by how
and relatively accurate data storage and analysis devices well we are able to create and sustain healthy and mutually
and at the same time excellent communication media. beneicial partnerships. (Baer & Duin, 2005)
(Rambaldi, 2005)
Partnership
Partition 1: A relationship between two or more entities involving
1: An image that is divided into blocks for processing. close cooperation where each entity has specific
(Chen, Chen, & Cheng, 2005) 2: Non-empty set of mutually responsibilities. (Baer & Duin, 2005) 2: A group of
exclusive and exhaustive subsets of some other set. The stakeholders that have initiated and contribute to the
number of subsets is not necessarily inite. (Gillman, effective ongoing operations of a smart community,
2006) 3: The Partition of the Indian subcontinent in 1947 including community groups, business, government,
at the end of British rule that resulted in the formation educators, researchers, and students. Shared learning
of India and Pakistan, and displaced six million people. is a fundamental commitment of the total community.
(A.G. Roy, 2005) (Baskin et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
512 Pa ssba nd Ripple Pat ric ia Trie
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pat t e r n Pat t e r n Re pre se nt at ion 513
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
514 Pat t e r n Re c ognit ion Proble m Pe e r
PC++ Pedagogy
Persistent C++ extends C++ language by providing 1: Refers to how teachers perceive the nature of learning
persistence facilities. (Polese et al., 2005) and what they do to create conditions that motivate students
to learn and become critical thinkers. (G. Lang, 2005) 2:
PCA: See Principal Component Analysis. The activities and theory of education, instructing, or
teaching. (Laghos & Zaphiris, 2005a) 3: The art and science
PD: See Participatory Design; Professional Distance. of helping children learn. (Whitield, 2005) 4: The art
and science of teaching, involving an underlying learning
PDA: See Personal Digital Assistant. philosophy and strategies for carrying out the philosophy
in a given learning setting. (Collis & Moonen, 2005b)
PDDP: See Principal Direction Divisive Partitioning.
Peer
PDF: See Portable Document Format. 1: Another node in a network that is like every other node in
the network. (Yee & Korba, 2006) 2: Persons who are equal
PDU: See Professional Development Unit. in social or occupational standing. (Murphy, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe e r Coa ching Pe e r-t o-Pe e r (P2 P) Te chnology 515
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
516 Pe e r-t o-Pe e r Wire le ss N e t w ork Confe de rat ion (P2 PWN C) Pe rc e ive d Risk
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe rc e ive d U se fulne ss (PU ) Pe rfor m a nc e Suppor t 517
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
518 Pe rfor m a nc e Suppor t Tool (PST ) Pe riphe ra lit y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe r m a ne nt V ir t ua l Circ uit (PVC) Pe rsona l Disc ussio n Folde r 519
the community. This situation should not be seen as free of Personal Community
conlicts. Instead, it can be an opportunity for a community Individual social network of informal, interpersonal ties
to develop their practice. (Crdoba, 2006a) ranging from a half-dozen intimates to hundreds of weaker
P
ties. (Fryer & Turner, 2006)
Permanent Virtual Circuit (PVC)
A virtual connection between two communicating devices Personal Data
on a network. (Shuaib, 2005) Any information concerning a natural or legal person that
can identify it. (Cevenini, 2005)
Permission Intensity
Composed of two elements, the amount of information an Personal Digital Assistant (PDA)
individual provides an organization and the permission 1: A handheld, pocket-sized computer, typically operated
to use the information to develop personalized by tapping and writing on its screen with a pen-like stylus.
communications. (Moore et al., 2006) Often used to carry personal information such as schedules,
notes, e-mail, and telephone numbers. (Houser & Thornton,
Permission Marketing 2005) 2: A small handheld wireless computer. (M. Wang,
The act of requesting customer approval before sending a 2006) 3: Refers to any small handheld device that provides
marketing communication. (Moore et al., 2006) computing and data-storage abilities. (Fraunholz et al.,
2005) 4: A small, palm-sized mobile device with increased
Permission-Based Mobile Marketing and processing and viewing capabilities. (Ververidis & Polyzos,
Advertising 2006) 5: A handheld device that combines computing,
All marketing activities conducted with permission of telephone/fax, Internet, and networking features. A typical
the consumer via mobile and wireless devices. (Salo & PDA can function as a cellular phone, fax sender, Web
Thtinen, 2006) browser, and personal organizer. (Hazari, 2006) 6: A small
digital device that is used to store information such as phone
Permutation GA numbers, addresses, schedules, calendars, and so on. A
A type of Genetic Algorithm (GA) where individuals PDA may also be referred to as a handheld device or as a
represent a total ordering of elements, such as cities to Palm. The Palm Pilot was one of the original PDAs and
be visited in a minimum-cost graph tour (the Traveling is now joined by others such as Palm Tungsten, HP IPaq,
Salesman Problem). Permutation GAs use specialized Palm Zire, and the Toshiba Pocket PC. (Kontolemakis
crossover and mutation operators compared to the more et al., 2005) 7: A small handheld computing device with
common bit string GAs. (Hsu, 2005a) data input and display facilities, and a range of software
applications. Small keyboards and pen-based input systems
Persistence are commonly used for user input. (Garrett, 2006b) 8: A
1: Generally refers to whether students inish their degrees handheld computing device that may contain network
or programs. (Lindsay et al., 2005a) 2: Relating to the act of facilities, but generally is used for personalized software
continuing toward an educational goal. Many institutions purposes beyond a standard organizer. (Mohamedally et
track this information to determine who completes their al., 2005) 9: A handheld device that integrates computing,
degree or certiicate on time or within a stated period telephone, Internet, and networking technologies. (Becker,
of time. (Adkins & Nitsch, 2005) 2006) 10: A small handheld computing device with
data input and display facilities, and a range of software
Personal Area Network (PAN) applications. Small keyboards and pen-based input systems
A computer network used for communication among are commonly used for user input. (Garrett, 2006a) 11:
personal devices, such as cell phones, headsets, and PDAs. Portable computing device that provides computing and
The reach of a PAN is typically a few meters. (Costagliola, information storage and retrieval capabilities for personal
Di Martino, & Ferrucci, 2006) or business use. Lacking a full keyboard, the PDA its the
palm. (Gilbert, 2005b)
Personal Area Radio Network
Small-sized local area network can also be named as a Personal Discussion Folder
wireless personal area network or wireless close-range One of the gathering places created within Web-based
network. (Kaspar & Hagenhoff, 2005) educational platforms where personalized threaded
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
520 Pe rsona l Em pow e r m e nt Pe rsona lizat ion
discussions between participants in online courses may Personal Web Usage (PWU) in the Workplace
occur. (Woods & Baker, 2005) Voluntary online Web behaviors during work time where
P employees use any of the organizations resources for
Personal Empowerment activities outside current customary job/work requirements.
Ability to speak up and advocate for oneself. (Crichton, (Mahatanankoon, 2005)
2005)
Personal Wireless Emergency Service
Personal Information A system-initiated wireless emergency service (WES)
1: Information that is personal about an individual that may application that uses wearable sensors to monitor the
be linked with the individual or identify the individual, internal contexts (i.e., body conditions) of mobile users.
(e.g., credit card number, birthdate, home address, Social At the detection of abnormal conditions, WES systems
Security number). (Yee & Korba, 2006) 2: Information mobilize local emergency medical services and send
about, or peculiar to, a certain person or individual. help-guidance messages to users mobile phones. (Sun,
(Szewczak, 2005) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pe rsona lizat ion Engine Pe r t urbat ion 521
packaged for the particular wireless user. (Clarke & Personalized Networking
Flaherty, 2005) 8: From the service providers viewpoint, A type of networking where a range of technologies are
any service provided to a user should be personalized. used to add value to a human network. (Walker, 2006)
P
Personalization is a process through which the system
utilizes the knowledge about a user to tailor the service Personalized Page
to suit the online user with a lavor of the individuality. Personalized view of content and applications assembled by
An automated personalization may promote the service the portal. A personalized page can, for example, highlight
providers image and improve the effectiveness of the a users deadlines across many collaboration server projects
system functions. (Li, 2005a) 9: Matching categorized or the latest resources added to a knowledge directory topic.
content with special customer characteristics such as The page typically also shows the user key services from
desires and preferences in order to individualize an a wide range of applications, such as call center queues
interaction process. (Blecker, 2006b) 10: The approach from a customer support application or expense report
of providing an overall customized, individualized user requests from an employee services application. Such a
experience by taking into account the needs, preferences, page may also include personal productivity services such
and particular characteristics of a user (or group of users). as the users e-mail or stock quotes. Personalized pages
(Koutrika, 2005) 11: Web-based personalization means are assembled from portlets. (Wojtkowski, 2006)
providing customized content to individual users using
Web sites, e-mails, and push technologies. (Seitz, 2005) Personalized Virtual Document
A virtual document is a document for which no persistent
Personalization Engine state exists and for which some or all instances are
A system component that exploits information regarding generated at runtime. It becomes personalized when
user activities to derive user preferences and interests, and one speciies that the document is composed of both
to tailor the content to be delivered according to these. information and the mechanisms required for generation
(Lepouras & Vassilakis, 2006) of the real documentthat is, that to be consulted by the
reader. Thus, having been introduced with the goal of
Personalization Strategy reusing resources available on the Web, the personalized
The personalization strategy (vs. codiication strategy) virtual document inherits its dynamic generation and
focuses on developing networks for linking people so user adaptation abilities from adaptive hypermedia work.
that tacit knowledge can be shared. (Ribire & Romn, (Fortier & Kassel, 2006)
2006)
Personnel Subsystem
Personalized Database System Sociotechnical system component composed of the
A database system that provides personalized answers organizational units members, including individual
in response to a user request by dynamically considering knowledge, skills, and attitudes, and team size and
relevant user information stored in user proiles. Its basic composition. (Cuevas et al., 2005)
modules include a query personalization module, and a
proile creation module. (Koutrika, 2005) Perspective
The combination of interests, values, and viewpoints
Personalized Information Access Approach relected in a Balanced Scorecard (BSC). The sum of
Information is returned to the user, taking into account the different perspectives in a given BSC should relect
the query issued and particular characteristics of a user. all of the critical stakeholder views of an organization.
(Koutrika, 2005) (Keinath, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
522 Pe r va sive a nd Cont ex t -Aw a re Com put ing Philosophy
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Phishing Physc os 523
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
524 Physic a l Ca pit a l Pie zo-Ele c t ric Cr yst a l
such services. The degree of Physco-ness and the range Physical Schema
of capabilities it applies vary for different providers. The technical description of a database; all the physical
P (Alexander & Burn, 2006) constructs (such as indexes) and parameters (such as page
size or buffer management policy) are speciied. The
Physical Capital physical schema of a database is the implementation of
Tangible resources such as tools, transportation vehicles, its logical schema. (Hainaut et al., 2005)
buildings, machines, and equipment that aid in the
production of goods and services. (Ridings, 2006b) Physicalism
The thesis that everything in the universe is physical.
Physical Cost Applied to the mind, physicalism asserts that: (1) all entities
One of the costs associated with production, transportation, in the universe are physical entities and their combinations
and inventory. (Setzekorn et al., 2005) (ontological physicalism); and (2) all properties of any
entity in the universe are physical properties (property
Physical Data physicalism). (Gelepithis, 2005)
Data source for data mining in SQL/MM DM and JDM.
It is mapped to inputs of a data-mining task (referred to PI: See Programmed Instruction.
as logical data). (Zendulka, 2005c)
PIA: See Privacy Impact Assessments.
Physical Dimension
Describes those elements that are necessary in order to PICOLA Project: See Public Informed Citizen On-Line
enable contact between an IT professional and its end Assembly Project.
users. (Leonard, 2005)
Pictorial Query Language
Physical Distribution 1: A general term for a query language, as opposed to a
A transportation service that accepts a shipment from a textual query language. Pictorial languages describe the
shipper, and at destination separates and sorts the packages result to produce characterized by, or composed of, pictures.
and distributes them to many receivers. (Tyan, 2006) (Ferri & Rafanelli, 2005) 2: A specialized query language
devoted to querying a database by a picture. These kinds
Physical Form of languages focus on spatial relationships existing among
The actual physical means by which thoughts, meaning, the elements of the database. (Ferri & Grifoni, 2006)
concepts, and so forth are conveyed. This, therefore, can
take the form of any physical format, such as the writing Picture Archiving and Communication System
or displaying of words, the drawing or displaying of (PACS)
images, spoken utterances or other forms of sounds, the 1: A system for capturing, storing, and distributing medical
carrying out of actions (e.g., bodily gestures), and so forth. images. These systems are fast turning from storing
(Polovina & Pearson, 2006) analog images to storing digital images. (Suomi, 2006)
2: A system used for managing, storing, and retrieving
Physical Interface medical image data. (Tong & Wong, 2005a)
Tangible device for interaction with the game. (Ip &
Jacobs, 2006) Piecemeal Design
A method of designing a system in which each component
Physical Model of a system is developed independently. (Janczewski &
A logical model instantiated in a speciic database Portougal, 2005)
management product in a speciic installation. (Pardede
et al., 2005) Piezo-Electric Crystal
A crystal having the property such that when it is subjected
Physical/Physiological Biometric to mechanical strain (e.g., pressure) it develops electrical
A biometric characterized by a physical characteristic. charge of opposite polarity on opposite faces. Conversely
(Vatsa et al., 2005) when electrical potential of opposite polarity is applied on
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pignist ic Proba bilit y Func t ion Pla usibilit y 525
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
526 Pla usibilit y Func t ion Point -Ba se d M ode l of T im e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Point -Ba se d Solut ion Polling 527
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
528 Poly-T im e Algorit hm Por t a ble Doc um e nt For m at (PDF)
Poly-Time Algorithm often involving splashy colors and loud sound effects.
An algorithm whose complexity evolves polynomially with (Friedman, 2005)
P respect to the envisaged complexity parameter. (Alippi &
Vanini, 2005) Pop-Up Window
A window that suddenly appears (pops up) when a user
Polygraph selects an option. In instant messaging, a pop-up window
Electronic device used for measuring human body signals when a users buddies come online and go
parameters in the hope (never proven) of detecting ofline, while the user is engaged in other computer
deception. (Rowe, 2006b) applications. (Hwang & Stewart, 2005)
Polyline Popularity
Represented by the ordered set of points and the ordered Indicates the importance of a multimedia object. The most
set of lines connecting consecutive points. The direction requested objects are the most popular. As a multimedia
of a polyline is from the start point to the end point. (Ferri object is a set of segments, we distinguish two types of
& Grifoni, 2006) popularity: global popularity and local popularity. (Kacimi
et al., 2005)
Polymorphism
1: One method name can cause different actions to occur, Population Stereotype
depending on the kind of object performing the action. Comprises the well-ingrained knowledge that we have
(Lucas, 2005) 2: The ability of object-oriented programs to about the world, based on our habits and experiences
have multiple implementations of the same method name of living in a particular cultural environment. (Noyes,
in different classes in an inheritance tree. Derived classes 2006)
can override the functionality deined in their base class.
(D. Brandon, 2005a) Population-Level Operator
Unusually parameterized operation that applies method-
Polynomial Range-Aggregate Query level operators (parameter) to a part or whole evolving
A subclass of dot-product queries, where the query is a population. (Leni et al., 2005)
polynomial aggregate query deined over a contiguous
range of data values. (Shahabi et al., 2005) Port
An interface for physically connecting to some other device
Polyphase Decomposition such as a monitor, keyboard, and network connection.
Decomposition of a transfer function in M (L) polyphase (Tassabehji, 2005a)
components that provide sequential processing of the input
signal at the lower sampling rate. (Mili, 2005) Port Scanning
The practice of sending electronic queries to Internet sites in
PON: See Passive Optical Network. order to learn what level of security exists. Often the intent
is to see if it can be compromised. (Friedman, 2005)
POP, POP3: See Post Ofice Protocol.
Portable Device
Pop-Up Computational device that is small and can be carried by
A message or advertisement that shows up on ones its user, such as a smart cell phones, PDAs, and laptops.
computer screen without permission. (Dholakia et al., Unlike stationary devices, the design of portable devices
2005b) typically trades-off CPU speed, memory, I/O facilities,
and so forth for reduced power consumption and size.
Pop-Up Advertisement (Kunz & Gaddah, 2005)
1: A Web-based promotional technique that places a new
window of advertising message or image over an Internet Portable Document Format (PDF)
users current active window. (Gao et al., 2006) 2: A 1: A ile format that is capable of transferring designs across
window that suddenly appears while suring the Web, many different forms of media. PDF iles are universal and
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Por t a l Por t folio Te m plat e 529
independent of the computer systems they are on. (Snyder, The user stays inside the portal interface, which provides
2005) 2: Method of document reproduction, generated by access to remote Web sites on the users behalf. (Braun,
Adobe Acrobat Systems, notable for quality reproduction 2005c) 10: A Web-based environment customized to
P
of both text and accompanying images. (McCarthy, provide users information needs. In contrast to the
2005a) 3: According to Adobe Systems Incorporated, a typical Web page, where a large amount of information
PDF is a universal ile format that preserves the fonts, is available to all, portals provide information speciic
images, graphics, and layout of any source document, to the users need and role. The user is able to customize
regardless of the application and platform used to create what information is revealed and what is hidden. (Howell
it. (Nightingale, 2005) & Wilcken, 2005) 11: A WWW gateway or entrance site
for users when they get connected to the Web or that
Portal users tend to visit as an anchor site. (Buchanan, 2005) 12:
1: A computer desktop environment that provides Access gateway to the World Wide Web (WWW) which
organized aggregated access to the applications, systems, integrates various information sources and services, and
and Web sites used by a community member, based on usually allows users to customize the content, layout, and
their role within the community. (Elshaw, 2006b) 2: A navigation to suit their personal needs. (Vrazalic & Hyland,
gateway serving as a starting point for accessing several 2005) 13: Acts as a channel between the content creator
services offered by a CI (or e-commerce or e-government) and end user. It does not typically have a content of its own.
system. (Kirlidog, 2005) 3: A multi-functional Web site (Lammintakanen & Rissanen, 2005a) 14: An electronic
that forms a gateway to a range of services that usually doorway providing a comprehensive array of resources
includes Web directories, search capabilities, and links and services. Portals typically contain newsletters, e-mail
to other Web resources. (Toland, Purcell, et al., 2005) services, search engines, online shopping, chat rooms,
4: A one-stop site on the Web that provides a range of discussion boards, and personalized links to other sites.
information and services for people. (Hin & Subramaniam, (Dotsika, 2006)
2006) 5: A one-stop, cross-department/business unit and
cross-jurisdictional Web site that serves as an aggregation Portal Model of IPFS
of government services in a given functional area or based A model describing companies that provide no direct,
on user needs. (Schelin, 2005) 6: Any Web site considered transactional services of their own but act as portals
an entry point to other Web sites, often by being or through which consumers can manage all of their inancial
providing access to a search engine. (Nightingale, 2005) services. (Gordon & Mulligan, 2005)
7: A self-addressed information package with the ability
to be pushed or pulled among Internet applications. It is Portfolio
self-contained with metadata for its information structure 1: A repository of information about an individual usually
and presentation. Compared with the concept of datagram used in the context of a education or career activity.
on the Internet, portal can be regarded as a kind of (Wasko, 2005) 2: A well-constructed, purposeful, and
information-gram on the Internet for its properties of self- individualized collection of artifacts which captures the
service, personalization, and real-time delivery. Mostly complexities of learning and teaching, and demonstrates
portals are implemented in XML. (Li, 2005a) 8: A virtual the creators abilities, progress, achievement, and effort
meeting space where irms come together to exchange of what he/she can do. (Wieseman, 2005a) 3: The report
information, trade, or collaborate. There are three different collecting documents, scores, interviews, and so forth, and
types of portals: information portals, transactional portals, demonstrating the students skills, achievements, learning,
and cooperative portals. These types can be classiied and competencies, with respect to: (1) previously deined
according to orientation criteria into vertical portals areas of skill, (2) speciic learning outcomes from these
(irms in the same industry or sub-industry, grouped by areas, (3) appropriate learning strategies that have to be
function), horizontal or functional portals (irms grouped developed by the student, and (4) performance indicators.
according to their shared needs, regardless of sector), and (Cartelli, 2005a)
geographical portals (irms grouped geographically by
region or country). (Moreau et al., 2005) 9: A Web site or Portfolio Template
service that provides access to a wide range of services that A pre-designed Web page used to create an electronic
can be either local or remote, structured or unstructured. portfolio. (Shaw & Slick, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
530 Por t le t Post e rior Proba bilit y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Post ge nom e Era Pow e r La w 531
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
532 Pow e r La w Dist ribut ion Pra gm at ism
predicts that a second-ranked site will be half as successful produce communicative acts in concrete situations.
as a irst-ranked site, and a 10th-ranked site will be a 10th (Marjomaa, 2005) 3: The study of the contribution of
P as successful as the irst-ranked. (Murphy, 2005a) contextual factors to the meaning of what language users
say. (Galitsky, 2005c)
Power Law Distribution
A probability distribution function, P[X=x]~cx, where Pragmatic General Multicast (PGM)
constants c>0 and >0, and f(x)~g(x) represent that the An extreme example of maintaining state information is
limit of the ratios goes to 1 as x grows large. (Li, 2005) the Pragmatic General Multicast protocol, formerly known
as Pretty Good Multicast, which is implemented by Cisco,
Power Law Model where routers maintain state information on a per-packet
A generalization of the classical Poisson model, allowing basis. (Chakraborty et al., 2005)
for changes in the intensity of the arrivals. (Guster et al.,
2005) Pragmatism
1: Derives from the Greek word pragma which means
Power Spectral Density action. Emphasizes the concept of human beings as agents,
The total power of the signal in the speciied bandwidth and focuses on their practical relation to the world. The
divided by the speciied bandwidth. Note: power spectral principle according to which experience forms the basis
density is usually expressed in watts per hertz. (Ragazzi, of all knowledge is shared by pragmatists and empiricists,
2005) these later including positivists and neo-positivists.
Pragmatists contrast with positivists by the former focusing
PPC: See Pay-Per-Click Advertising. on creative inquiring and the latter on passive observation.
At a deeper level, the contrast is even greater because of
PPGIS: See Public Participation GIS. pragmatisms origin in Peirces critique of Descartes, and
the overcoming of precisely those Cartesian dualisms which
PPP: See Purchasing Power Parity. are presupposed by modern western philosophy, including
positivism. Examples of these dualisms are subject and
PQoS: See Perceived Quality of Service. object, body and mind, perception and conceptualization,
theory and fact, fact and value, deduction and induction,
Practical Relection reality and copy, nature and culture, individual and
Relection about assumptions underpinning classroom society, sign and signiied, and so forth. To overcome
practice, and the purposes and consequences of actions these dualisms, pragmatism rejects some of the basic
in the classroom. (Wieseman, 2005b) guiding ideas which inform not only positivism, but also
interpretative and structuralist traditions. Among these
Practice are the notions such as the subject of knowledge as an
1: Shared historical and social resources and perspectives individual, observation as presuppositionless activity,
that help sustain a community through time. (Crdoba truth as a picture or representation corresponding with
& Robson, 2006) 2: The relational interplay between reality, knowledge as being built up of observation and
humans and artifacts that enables work performance. logical inference, social science as being exclusively
(Munkvold, 2006) concerned with culture (and hence the interpretation
and understanding of symbolic meaning), knowledge
Practitioner-Informant as involving an arbitrary or conventional twofold sign
Users who collaborate with designers as domain experts relation, and so on. Pragmatism, by contrast, stresses the
providing information about work practices are called anchorage of knowledge in real collective problems, and
practitioner-informants. This is the initial stage in the knowledge as being dependent on the mediation of signs,
developmental theory of participatory-design relationships which means that it regards knowledge as being social by
between users and designers. (Carroll, 2005) nature. It focuses on the development of knowledge which
it sees as taking place in different ways and in a variety
Pragmatic of contexts. Pragmatism in centered on abduction, not
1: Of practical consequence. (Aarons, 2006) 2: A subield induction nor deduction, and not only on the individual
of linguistics that studies how people comprehend and creativity, but rather on the cooperative search for truth
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pra nk ing/Posing Pre dic t ion 533
within a community through interpretation, discussion, documents in a given query in the set of documents that
and argumentationthat is, through the creative collective are returned by an information retrieval system. (Meng &
overcoming of action problems. (Nobre, 2006a) 2: Having Chen, 2005) 3: The number of relevant images retrieved
P
a basis in practice, but little explicit or implicit theoretical as a percentage of the total number of images retrieved.
underpinning. (Kisielnicki, 2006) 3: The philosophical (Sural et al., 2005) 4: The ratio of the number of correctly
tradition associated with the work of William James, John illed slots to the total number of slots the system illed.
Dewey, and Charles Saunders Peirce, and more recently (Song et al., 2005)
with Richard Rorty. Pragmatism shares its philosophical
roots with naturalism, in that it holds the natural world Precision and Recall
as the inal arbiter of truth. However, it also insists on Measures of retrieval quality, relating the documents
consequences, utility, and practicality as being vital retrieved with those actually relevant to a query. (Navarro,
components of truth. Despite this general approach, there 2005)
are signiicant differences between the ideas of James,
Dewey, and Peirce. Thus in order to distinguish his Predeined Data Type
philosophical approach, C.S. Peirce labeled his doctrine The primitive data type that is built-in by the software
that concepts are to be understood in terms of their practical products. The examples are INTEGER, CHARACTER,
implications as pragmaticism. (Aarons, 2006) 4: The and so forth. (Pardede et al., 2005)
thoroughly practical view of praxis in which theory is not
separate from action but a component of useful action in Predicate Logic
its application to a certain situation. In human-computer Well-established universal declarative data and knowledge
interaction, this takes into account the hermeneutic nature representation language, with capacities of formalizing and
of product or system development and appropriation. automating deductive and other forms of logical reasoning.
(Kettley, 2006b) Its fundamental role for databases and particularly
integrity constraints is undisputed and indispensable.
Pranking/Posing (Decker, 2005)
Cyber-identity theft may also include seemingly
lighthearted pranksa less sinister form of identity Predicate Tree (P-Tree)
theft. Phony e-dating proiles may be a result of an online A lossless tree that is vertically structured and horizontally
prank, causing false expectations for interested e-daters. processed through fast multi-operand logical operations.
Posing as another on Instant Messenger is another prank (Perrizo, Ding, Serazi, et al., 2005)
where users misidentify themselvesoften to obtain
information not privy to the cyber-identity thief. (Close Predicate-Driven Transformation
et al., 2006) A couple <,p> where is a schema transformation and p
a structural predicate that identiies schema patterns. The
Pre-Computation goal of a predicate-based transformation is to apply to
This refers to pre-computing commonly required the patterns that meet p in the current schema. (Hainaut,
aggregates that are expensive to compute on the ly. 2005)
(Deshpande & Ramasamy, 2005)
Predicative Occurrence
In NKRL, a conceptual structure obtained from the
Preceptorship instantiation of templates and used to represent particular
Teaching or tutoring. (Kabene, Takhar, et al., 2005) elementary events. To take into account the Connectivity
Phenomena, conceptual labels denoting predicative
Precision occurrences can be associated within second-order
1: In terms of repeatability, the ability of the measurement structures making use of operators like CAUSE, GOAL,
process to duplicate the same object measurement and and COORD(ination). (Zarri, 2006c)
produce the same result. The high or low precision
that could be obtained is dependent upon the object of Prediction
interest and in many cases could be controlled by working 1: An output interface of a recommender system. Given
harder. (Y.-J. Zhang, 2005c) 2: The percentage of relevant a customer and a product, the system generates a score
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
534 Pre dic t ion Join Pre sc ript ive Ta xonom y
expressing the predicted liking in a scale the same as the Preference-Identiication Agent
ratings. (Sarwar et al., 2005) 2: Consists of approximating Comparison-shopping agent specializing in collecting
P unknown functions. The nets input is the values of the personal product and service review information, for
function variables, and the output is the estimation of the example, epinion.com. (Wan, 2006)
function image. (Mart, 2005)
Preferred Repair
Prediction Join A repair minimizing the value of the evaluation function
An operation in OLE DB for DM that inds the best f applied to the source database. (Greco et al., 2005)
prediction for a given input case and a given data-mining
model. (Zendulka, 2005c) Prefetching
The technique of deducing future client requests for objects
Predictive Judgment based on the current request, and bringing those objects
An assessment (prior to encountering an information into the cache in the background before an explicit request
object) based on existing knowledge, assumptions, or the is made for them. (Katsaros et al., 2005)
information objects surrogate, independent of assessments
based on characteristics of the object (evaluative Preprint
judgments). (Danielson, 2006c) Scientiic work before peer review. (Rennard, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Pre se nc e Prim a r y Ta sk 535
Presence Pretty-Printing
1: A psychological phenomenon enabling the mental state of Rudimentary form of program visualization whose goal is
being there in either technologically mediated or imaginary to make source code easier to read by means of spacing,
P
spaces. (Sas, 2006) 2: The subjective sensation that one indentation, and layout. Pretty-printers are programs that
is present in a three-dimensional environment that is systematically indent the source code of a source program
mediated by digital technology. (Champion, 2006b) according to its syntactic structure and given aesthetic
rules. Sophisticated pretty-printers can also highlight
Presence Practice different parts of a program and even generate a program
Work practice that establishes the presence of a worker publication. (Pareja-Flores & Iturbide, 2005)
in the organization as seen by coworkers and managers.
(P.M. Leonardi, 2005) Pricebot
An intelligent agent that is used by an online seller to
Presentation determine a proit-maximizing price for a product that
1: In GIS, the set of properties of a geographic object that it sells. A pricebot encapsulates the pricing algorithm
deine its visual aspect, that is, the way the object is to used by an online seller and enables a seller to maintain
be shown to the user. Involves aspects such as color, line an edge over its competitors in a dynamically changing
type, line thickness, ill pattern, and others. (Davis et al., market scenario. (Dasgupta et al., 2006)
2005) 2: The sharing of information with others via spoken,
written, or online media. (St.Amant, 2005c) Primary Activity in the Knowledge Chain
One of the set of activities that an organizations knowledge
Presentation Environment processors perform via various practices and technologies
An integrated development environment that displays in manipulating knowledge assets within knowledge
selected patterns to the user when retrieved from the management episodes: acquiring, selecting, generating,
database, and offers different pattern processing and assimilating, and emitting knowledge. (Holsapple &
transformation tools. (Gaffar & Seffah, 2005) Jones, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
536 Prim a r y We b Dat a Princ iple of Good Pra c t ic e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Print Disa bilit y Priva cy a ga inst Dat a M ining 537
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
538 Priva cy I m pa c t Asse ssm e nt (PI A) PRN
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Proa c t ive Com put ing Proble m 539
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
540 Proble m Sc e na rio Proble m -Solving Orie nt e d Le a r ning (PSOL)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Procedural Factor Process Gratiication 541
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
542 Proc e ss Group (PG) Proc e ss-Leve l M ode l
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Proc e ssor Pe r Tra ck /H e a d/Disk Produc t ion 543
Processor Per Track/Head/Disk product should be located in at least one product group,
The last organization corresponds to active disks. and product groups are often compared to classiication
(Thomasian, 2005a) systems because of their similar nature. Both offer a set of
P
categories to arrange items. Product groups are dependent
Procurement on the catalog creator. Normally, each catalog has its own
Arranging for the supply and purchase of goods or services. taxonomy and terminology, and therefore deines its own
(Foley & Samson, 2006) set of groups. Contrary to this, classiication systems are
standardized and do not change from catalog to catalog.
Product (Abels & Hahn, 2006)
A combination of tangible goods, intangible services, and
information that satisies consumers needs and wants. Product Lifecycle
(Waterson, 2006) The evolution of a product from conception onward.
(Knight, 2006a)
Product Brokering
In commerce, a product broker is a party that mediates Product Lifecycle Management (PLM)
between a buyer and a seller. A broker who also acts as a 1: Including Product Data Management (PDM), enables
seller or as a buyer becomes a principal party to the deal. enterprises to bring innovative and proitable products
(Guan, 2006d) to market more effectively, especially in the evolving e-
business environment. PLM enables enterprises to harness
Product Conigurator their innovation process through effective management
Information system that supports customers during (online) of the full product deinition lifecycle in their extended
product customization and the order-taking process, enterprises. (Mller, 2005) 2: An approach whereby
especially in e-business. It has the logic capabilities to engineers and product designers are integrated into
create, maintain, and apply electronic product models in the sales process at one end of the cycle, to allow better
order to deine all of the possible variants of a product and translation of customer requirements, and to manufacturing
to display them to the customer. (Blecker, 2006b) at the other end of the cycle, to facilitate the development
of eficient production processes. The lifecycle is derived
Product Curve from the notion of managing product design from inception
This tool takes a micro view of transitioning requirements through to execution and eventually retirement. (Carton
or attributes that successive solutions must adhere to in & Adam, 2005)
order to win in the future marketplace. (Nugent, 2005)
Product Localization
Product Design Optimization of a product for a speciic target culture; could
An overall term that covers the study and execution also be the development of a product only and alone for
of design pertaining to physical products. (Knight & this speciic target culture (not so often). (Rse, 2006a)
Jefsioutine, 2006)
Product Modularity
Product Evaluation An attribute of the product that characterizes the ability to
The emphasis at this level is on the technical product, mix and match independent and interchangeable product
software, IT solution, or information system. The concern building blocks with standardized interfaces in order to
at this level is to measure to what extent the IT solution create product variants. (Blecker & Abdelkai, 2006)
meets its technical objectives. The emphasis here is on
eficacy: Does the chosen tool work? Does it deliver? Product/Service Quality
(Abu-Samaha, 2005) The totality of features and characteristics of a product or
service that bear on its ability to satisfy stated or implied
Product Group needs. (Shan et al., 2006a)
A group containing several products. Furthermore, it can
contain a set of sub-groups and can therefore be connected Production
to a parent group. Typically, each electronic product Function of (industrial) irms consisting of creating a
catalog contains at least one set of product groups. Each transformation system and combining internal and external
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
544 Produc t ion Conc e pt Profe ssiona l Deve lopm e nt U nit (PDU )
resources by applying technological and conceptual worklows often deal with known items. (Subramanian,
procedures in order to generate goods and services for 2005)
P further possessing and/or as a marketable output for serving
the customer. (Blecker, 2006a) Productivity
A measure of the performance of the production process
Production Concept in transformation of the input of resources to the output
In theory, a well-founded guiding idea based on empirical of goods and services. (Mitchell, 2005b)
knowledge, where it is appropriate, on the organization,
planning, control, and evolution of production systems Productivity Paradox
with the main objective of enhancing the competitiveness 1: Despite large investments in IS/IT over many years,
of the irm. (Blecker, 2006a) there have been conlicting reports as to whether or not
the IS/IT beneits have actually occurred. (Lin & Pervan,
Production Function of Value Chain 2005) 2: Major information technology investments with
One of three functions of a value chain that produce the negative or zero documented returns. (Dykman, 2005)
result that contributes to the accomplishment of its mission. 3: The discussion about the lack of evidence about the
(Chuang, 2006) return of investments on IT in the economy productivity
indicators. (Barbin Laurindo et al., 2005)
Production Portal
The linking of all available information systems into Professional Association
one standardized screen. Production portals aggregate A formal or informal grouping of individuals, for-
heterogeneous systems in manufacturing and provide proit businesses, governmental agencies, or non-proit
secure, structured, and personalized information for organizations that all possess similar levels of skill and
individual users (e.g., based on job functions). (Blecker knowledge regarding one or more topics of mutual interest.
& Graf, 2006) Interactions among members generally serve not only to
enhance individual members skills or knowledge, but
Production Rule also to further the cause of the association as a whole.
A tree path characterized by a sequence of predictor (Baim, 2006c)
interactions yielding to a speciic label class/value of the
response variable. (Siciliano & Conversano, 2005) Professional Community
Collaborative activities among a schools faculty members
Production System that focus on meaningful, shared issues in a school and
Subsystem of the enterprise for the transformation of also emphasize how each individual staff member can take
input factors (e.g., goods and services) into output factors responsibility for its achievement. (Dexter, 2005)
(e.g., tangible goods and services), in order to satisfy a
customer need. The production system itself consists of Professional Development
two basic subsystems: the management subsystem and the 1: A planned, comprehensive, and systemic program of
operation subsystem. These subsystems are interconnected goals-driven, competency-based training activities that
and interwoven by an information system. The operation promotes productive change in individuals and school
subsystem deals with the original transformation processes structures. The activities are interrelated and cumulative,
and includes all facilities, machines, logistical equipment, complement the schools and districts vision/strategic
and employees (blue-collar workers). The management mission, and relect all key constituencies. (Bober, 2005)
subsystem is responsible for the short-run (operational) 2: The National Staff Development Council deines this
design, planning, and control of the entire operation as the term that educators use to describe the continuing
subsystem. (Blecker, 2006a) education of teachers, administrators, and other school
employees. (Dexter, 2005)
Production Worklow
The ability for metadata to be added throughout the lifecycle Professional Development Unit (PDU)
of digital asset handling (captioning, or cataloging), A unit of continuing education for certiied project
with appropriate knowledge management capabilities managers. (D. Brandon, 2005b)
to establish standardization and consistency. Production
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Profe ssiona l Dist a nc e (PD) Progra m Ana lysis 545
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
546 Progra m Exe c ut ion Progre ssive I nquir y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Proje c t Proje c t M a na ge m e nt M at urit y M ode l (PM M M ) 547
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
548 Proje c t M a na ge m e nt M e t hodology Prope r t y
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Prope r t y H ie ra rchy Prot ot ype 549
publishers. The property publishes relates a publisher data set (one table) with derived attribute-value features,
with a particular book. (Antoniou et al., 2005) describing the structural properties of the example. (Perlich
& Provost, 2005)
P
Property Hierarchy
As with classes, properties can be organized in Proprietary Software
generalization/specialization taxonomies. For example, Software, including the source code that is privately owned
the property is CEO of relating persons to companies is and controlled. (St.Amant & Still, 2005)
a more speciic property than the sub-property of works
for. (Antoniou et al., 2005) Prosumerism
The name for an arrangement where a customer ills the
Property-Oriented Formal Speciication dual role of both consumer and producer. Knowledge co-
Language production is generated from role patterns and interactivity,
Based on axiomatic deinitions. Abstract. (Dasso & with both parties sharing the traditional responsibilities
Funes, 2005) of a producer and consumer. (Paquette, 2006b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
550 Prot ot ype Se le c t ion Prox y Ca che
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Prox y Se r ve r Psychodyna m ic s 551
Pruning Psychoanalysis
A top-down or bottom-up selective algorithm to reduce the A term created by Freud in 1896 to name a speciic method
dimensionality of a tree structure in terms of the number of psychotherapy, which was inspired in the cathartic
of its terminal nodes. (Siciliano & Conversano, 2005) process, or treatment through speech, and was based in the
exploration of the unconscious, through free association
PSAP: See Public-Safety Answer Point. and interpretation. Catharses was already used by Aristotle,
who was the son of a physician and thus was inluenced by
PSEO: See Post-Secondary Enrollment Option. Hypocrites thought. The idea was of a therapeutic process
able to free individuals from oppressive experiences and
Pseudo Random Noise (PRN) to let the constraining element emerge. Freud developed a
A noise-like series of bits. Because GNSS depends upon theory, a technique, and a school in order to formalize and
multiple inputs, each satellite produces a predetermined, perpetuate his approach. Freud also developed work on
unique PRN on both the L1 and the L2 carrier signal for the unconsciousness of groups in the early 1920s. Though
use by civil and military receivers. The L2 carrier signal psychoanalysis started as an individual therapy, its insights,
is restricted to military use. (Freeman & Auld, 2005) technique, and concepts have been extended to the domain
of group analysis, family therapy, and organizational
Pseudo-Intent consulting. Its depth and breadth enable a high potential
The set X is a pseudo-intent if X c(X), where c is a for application to the complex ield of community life
closure operator and for all pseudo-intents QX, c(Q)X. within organizational settings. (Nobre, 2006b)
(Dumitriu, 2005)
Psychodynamics
Pseudonym The highly dynamic unconscious forces within individuals
The ictitious name adopted for use within a virtual and between individuals that form and motivate outward
environment. An individual may consistently use the same behavioral manifestations in group life. The group-as-a-
pseudonym or adopt several pseudonyms for use within and whole may develop a collective psychology that mirrors the
between virtual environments. (Roberts et al., 2005) psychological processes of an individual in many respects,
but not that of any one of its members. (Cargill, 2006a)
PSF: See Professional State Forum.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
552 Psychologic a l Type Public Goods
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Public Goods T he or y Public Ke y I nfra st ruc t ure (PKI ) 553
Something that is shared by all members of a community Public Key Infrastructure (PKI)
whether or not they have contributed to the constitution or 1: A system for using public key technology. It provides
maintenance of the good. (King, 2006a) 3: Goods deined a framework to store, sign, validate, and revoke digital
P
by two characteristics: non-rivalry and non-excludability. certiicates. A general PKI consists of a certiication
Typical examples of public goods include tangible goods authority, a registration authority, one or more directories
such as public parks and lighthouses, as well as intangible where the digital certiicates are stored, and a certiicate
or information goods such as public television and radio. management system. (Xu & Korba, 2005) 2: The
(Teigland & Wasko, 2006) 4: Resources that generally are combination of software, encryption technologies, and
(or are perceived to be) of some public value or use, and services that enable enterprises to protect the security of
whose consumption by one member of society does not their communications and business transactions on the
preclude its consumption by others, for example, renewable Internet. (Chim, 2006) 3: A system of digital certiicates,
natural resources such as air, or services such public radio certiicate authorities, and other registration authorities
or TV. (Ekbia & Hara, 2006) that verify and authenticate the validity of each party
involved in an Internet transaction. PKIs are currently
Public Goods Theory evolving, and there is no single PKI. (Pulkkis, Grahn,
A good or service is said to have public characteristics & Karlsson, 2005) 4: A system of computers, software,
if private producers cannot capture all of the beneits and data that relies on certain sophisticated cryptographic
associated with its consumption. Once such a good is techniques to secure online messages or transactions.
produced, people can enjoy the beneits that it provides (Mullen, 2005) 5: A system that enables users of a public
without having to pay for them. Consequently, it is argued network to exchange data securely and privately through
that public goods will either be underproduced in the free the use of a public and private cryptographic key pair,
market or not produced at all. (Kankanhalli et al., 2006) which is obtained and shared through a trusted authority.
It provides for a digital certiicate that can identify an
Public Individual Certiication Law individual or an organization, and director services that
A law to prepare a system to provide individual certiication can store and, when necessary, revoke the certiicates. The
and authorization services in order to process online the comprehensive architecture includes key management, the
public application and notiication online. (Kitagaki, registration authority, certiicate authority, and various
2005) administrative tool sets. (Bose et al., 2005) 6: An Internet
trust model based on public key cryptography (encryption
Public Informed Citizen On-Line Assembly is conducted with a dual key system: a public key known to
(PICOLA) Project everyone and a private key known only to the recipient of
An initiative spearheaded by Carnegie Mellon University the message). PKI offers the advantages of authentication
to develop and implement, through online tools, a virtual and non-repudiation, which SSL lacks. (Lei et al., 2005b)
agora for public consultation regarding public policy issues. 7: Security mechanism based on public key cryptography
(Magnani et al., 2006) used to provide end-to-end security required for the
information, services, and means of access. The core
Public Key Certiicate component of a PKI is the certiication authority. This
The public key of a user, together with some other authority is trusted by the end entities in its administrative
information, rendered unforgeable by encipherment with domain and is responsible for the status of the certiicate it
the private key of the certiication authority that issued issues. (Pierre, 2006b) 8: The architecture, organization,
it. (Trcek, 2005) techniques, practices, and procedures that collectively
support the implementation and operation of a certiicate-
Public Key Cryptography based public key cryptographic system. (Mitrakas, 2005)
Allows the exchange of encrypted messages without prior 9: The public infrastructure that administers, distributes,
key agreement. The receiver of an encrypted message has and certiies electronic keys and certiicates that are
a secret private key and a published public key. The public used to authenticate identity and encrypt information.
key is used by anyone who wishes to send a message to Generally speaking, PKI is a system of digital certiicates,
the receiver. Only by means of the private key of the certiication authorities, and registration authorities that
receiver can the original message be retrieved by decoding. authenticate and verify the validity of the parties involved
(Stickel, 2005) in electronic transactions. (Richter & Roth, 2006) 10: The
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
554 Public La nd M obile N e t w ork (PLM N ) Public Va lue
infrastructure capable of supporting the management of back-end programs) or be oriented towards invocation by
public keys able to support authentication, encryption, information systems (e.g., a Web service). (Vassilakis &
P integrity, or non-repudiation services. (Trcek, 2005) 11: Lepouras, 2006) 2: Information and services provided
The publicly distributed key that, if combined with a by government agencies and other organizations working
private key (derived mathematically from the public key), within the public sphere. (Gil-Garca & Luna-Reyes, 2006)
can be used to effectively encrypt messages and digital 3: Social infrastructure services, delivered wholly or partly
signatures. (Guan, 2005c) with the beneit of public funds and strategically driven
through national or regional administrations. (Wright &
Public Land Mobile Network (PLMN) Taylor, 2005)
Usually the whole network of a GSM operator. (Hackbarth
et al., 2005) Public Services Infrastructure (PSI)
An integrated Web services framework that allows for
Public Library of Science rapid development, deployment, and ease of management
Organization founded in October 2000 committed to make of online services. (Hin & Subramaniam, 2006)
scientiic literature a freely available resource. Nobel Prize
recipient Harold E. Varmus is co-founder and chairman Public Space
of the board. (Rennard, 2005) Off-line, public space refers to geographical areas that are
accessible to the general public (e.g., streets). Online, the
Public Participation GIS (PPGIS) term public space is commonly used to refer to virtual
A spontaneous merger of participatory development environments that do not have restrictions on access.
methods with geo-spatial technologies (P-mapping, P3DM, (Roberts et al., 2005)
GIS, GPS, and remote sensing). PPGIS is usually geared
towards community empowerment through measured, Public Sphere
demand-driven, and user-friendly applications of Jrgen Habermas, an inluential proponent, deines it as
geographic information technologies and systems. PPGIS the sphere of common concern where there is rational
is an integrated practice which has multiple dimensions, debate and universal access. Coffeehouses, salons, and
builds on diverse tools, and highlights the integration of newspapers, which shape public opinion and dissent, are
outsiders with socially differentiated local knowledge, included, while state, economy, and church are excluded.
and builds essentially on high levels of participation at all (Srinivasan, 2006)
stages of project implementation. (Rambaldi, 2005)
Public Switched Telephone Network (PSTN)
Public Printer 1: A regular voice telephone network. (Akhtar, 2005) 2:
The head of the Government Printing Ofice (GPO). (Inoue The well-known classical telephone network. (Shuaib,
& Bell, 2005) 2005) 3: Consists of analog local loops that connect
subscribers to the local central ofice, and digital facilities
Public Relations that link central ofices together via various regional, long-
The planned and sustained effort to build mutually distance, and international backbone. (Phala, 2005) 4: The
beneicial relationships between an organization and those complete network of interconnections between telephone
individuals or groups whose interest or inluence makes subscribers. (Chochliouros et al., 2005c)
them relevant to the organization. (Galloway, 2006)
Public Use Data File
Public Sector One of many electronic computer iles containing the
This refers to the government and its various departments results of federal research and statistical programs that
that serve the citizens of a country. These departments are are made available for public use, often on agency Web
nonproit-making organs of the State. (Singh, 2005) pages. (Mullen, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Public Wire le ss Em e rge ncy Se r vic e Pure -Pla y ASP 555
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
556 Pure ly V ir t ua l M e dia PVC
Push
Mechanisms that deliver information to participants. E-
mail is an obvious example, but notiication via instant
messaging, beeper, fax, or telephone are also in this
category. RSS is a recent expansion of this into Web services
and blogs. (Contrast with Pull.) (Isaak, 2006)
Push/Pull
Distinguishes who initiates data transmission, the producer
or the consumer of data. (Fiege, 2005)
Push Technology
1: A data distribution technology in which selected data
are automatically delivered into the users computer at
prescribed intervals or based on some event that occurs.
(Parikh & Parolia, 2005) 2: Enables people to subscribe to
and have news and information delivered directly to their
e-mail, releasing them from having to search the Internet.
(Nightingale, 2005)
Push-Caching
The technique of pushing data closer to consumers by
making an informed guess as to what the clients may
access in the near future. The concept of push-caching is
closely related to prefetching, but prefetches are always
initiated in response to an on-demand request. (Katsaros
et al., 2005)
Put Option
The right but not the obligation to sell a stock (or inancial
instrument) at a pre-determined price at some time in the
future. (Lajbcygier, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
QAM Qua lit at ive Dat a 557
Q
QAM: See Quadrature Amplitude Modulation. multimedia query result can be displayed on the client site
no matter what the queried object characteristics are and
QBE: See Query by Example/Sketch/Humming. no matter what available network resources have. (Zhang
& Chen, 2005)
QFD: See Quality Function Deployment.
QoS Management: See Qualit y of Ser vice
QIM Watermarking: See Quantization Index Management.
Modulation Watermarking.
QPSK: See Quadrature Phase-Shift Keying.
QoS: See Quality of Service.
QQPPM: See QoS-Based Query Processing Precision
QoS-Based Multimedia Query Processing and Matrix.
Data Retrieval
The current multimedia query processing mechanism QSA R: See Q ua nt ita t ive S t r uct u re -Act ivit y
provides the three procedures in practice. They are: (1) Relationship.
search, (2) browsing, and (3) query reinement. There are
four considerations regarding multimedia data retrieval. Quadratic Program
First, the queried objects are successfully presented in the A mathematical program where the objective is quadratic
client site under the QoS support; second, since the result and the constraints are linear equations or inequalities.
queries may contain long audio segments, large images, or (Musicant, 2005)
long videos, eficient extracting and presenting essential
information for clients to browse and select are required; Quadrature Amplitude Modulation (QAM)
third, the response time that is determined by both the 1: A method of modulating digital signals onto a radio-
network and database search should be eficiently short; frequency carrier signal involving both amplitude and
and fourth, the query reinements are possible to itinerate. phase coding. (Chochliouros et al., 2005b) 2: It is a
(Zhang & Chen, 2005) modulation technique in which two sinusoidal carriers that
have a phase difference of 90 degrees are used to transmit
QoS-Based Query Processing Precision Matrix data over a channel, thus doubling its bandwidth. (Hin &
(QQPPM) Subramaniam, 2005a)
The QQPPM solution covers the speciication of client-
site QoS preferences and their quantitative relationship to Quadrature Phase-Shift Keying (QPSK)
wireless network QoS conditions, and also the speciication A method of modulating digital signals onto a radio-
of the server-site QoS proile and their quantitative frequency carrier signal using four phase states to code
relationship to the real-time wireless network QoS two digital bits. (Chochliouros et al., 2005b)
conditions. QQPPM will be one of the functions in MM-
DBMSs. The objective of QQPPM is to create a smallest Qualitative Data
element as a criterion to reduce queried object quality Also often referred to as categorical data, they are data
between the servers original data quality and actual that can be placed into distinct categories. Qualitative data
quality that the client can access. With the QQPPM, the sometimes can be arrayed in a meaningful order, but no
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
558 Qua lit at ive M e t hod Qua lit y of Se r vic e (QoS)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Qua lit y of Se r vic e (QoS) M a na ge m e nt Qua nt it at ive St ruc t ure -Ac t ivit y Re lat ionship (QSAR) 559
by packet loss probability, available bandwidth, and end- Quality of Work Life (QWL)
to-end delay. (Gutirrez & Ting, 2005) 5: A method of 1: A measure of employee satisfaction with their working
marking certain packets for special handling to ensure environment; can include fairly subjective measures such
Q
high reliability or low delay. (Guster et al., 2005) 6: A as self-empowerment, enjoyment, self-satisicing indices.
networking term that speciies a guaranteed throughput (Burn & Ash, 2006) 2: Workplace hygiene factors that
level. One of the biggest advantages of ATM over competing support the well-being and job satisfaction of employees.
technologies such as Frame Relay and Fast Ethernet is (Mahatanankoon, 2005)
that it supports QoS levels. This allows ATM providers to
guarantee to their customers that end-to-end latency will Quality Plan
not exceed a speciied level. (Wong, 2006) 7: An indicator A plan developed particularly for each software project
of availability and speciies the transmission rates, error that includes all the metrics, measurement guidelines, and
rates, and other network performance metrics which can goals applicable for this project only. (Xenos, 2006)
be measured, improved, and to some extent, guaranteed in
advance. (Wilsdon & Slay, 2005) 8: Guarantees in advance Quality Seal
a speciied level of throughput capacity for multimedia A virtual seal placed on a government Web site or form
transmissions via ATM networks. (Littman, 2005) 9: which allows citizens to know that the item in question
A mixture of several parameters, such as the ratio of is legitimate and not a phishing site designed to gather
server/lost calls, the quality of the service (typically voice information for use in identity theft. (Knepper & Chen,
service) in terms of noise, blur, and so on. In the end, it is 2006)
an objective measure of the satisfaction level of the user.
(Hackbarth et al., 2005) 10: A set of service requirements Quality Standard
that the provider must meet in order to guarantee an A framework, tool, or instrument used to guide the design,
adequate level of service provision. (Jain & Ramesh, 2006) delivery, and evaluation of the online course/program/
11: Represents a guarantee or a commitment not only to a training. This may be a learning model and/or tested
particular quality of network service, but also a particular evaluation instrument/tool that ensures attention to detail
rate or minimum rate of data delivery, as well as maximum in the design process and that provides feedback to the
transmission times among packets. (Rodrigues et al., 2005) course designers and facilitators for redesign and continual
12: The collective term for all demands on the recording improvement of the program. (MacDonald et al., 2005)
and the replaying procedures, which refer to generating
and maintaining a continuous data stream. (Geisler & Kao, Quantitative Association Rule
2005) 13: Allocation of resources to provide a speciied 1: An implication rule containing items of quantitative
level of service. (Swierzowicz, 2005) 14: Parameters to and/or categorical values that shows in a given database.
describe system performance. (W. Wang, 2006) (Shen & Horiguchi, 2005) 2: Shows associations with
numeric and categorical data. Quantitative rules would
Quality of Service (QoS) Management express associations such as: Age: 30 to 39 and Owns
Refers to a set of speciic requirements for a particular car = yes -> Median Income = 40,000. (Imberman &
service provided by a network to users. In general, QoS Tansel, 2006)
requirements are in accordance with the perceived QoS
based on data transmission and application type. These Quantitative Data
requirements are usually described by quantitative igures Are numeric in nature. They can be ranked in order.
that are more or less related to the technology behind the They also admit to meaningful arithmetic operations.
network service, and thus a user will ind limited lexibility Quantitative data can be further classiied into two groups,
in changing the proile after subscription to the service. discrete or continuous. (Yang & Webb, 2005)
In the context of the wireless mobile environment, these
requirements can be categorized mainly into four attributed Quantitative Structure-Activity Relationship
types: (1) bandwidth, (2) timeliness, (3) mobility, and (4) (QSAR)
reliability. (Zhang & Chen, 2005) Illustrates quantitative relationships between chemical
structures and the biological and pharmacological activity
of chemical compounds. (Lodhi, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
560 Qua nt izat ion I ndex M odulat ion Que r y by Ske t ch/Pa int ing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Que r y by V isua l Ex a m ple Que r y Re w rit ing 561
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
562 Que r y Se m a nt ic s QWL
they are processed by the query optimizer. (Badia, 2005a) QuickTime Virtual Reality
2: Process by which a source query is transformed into an 1: Apple software that allows users to merge photos that
Q equivalent one referring (almost exclusively) to a collection were precisely taken for a landscape and create a rich
of materialized views. In multi-dimensional databases, panoramic scene from one static viewpoint. It also permits
query rewriting is fundamental to obtain acceptable users to navigate, for example, to rotate and/or to zoom in
(online) response times. (Tininini, 2005c) and out in such a created pseudo 3D space. (Y.J. Zhang,
2005a) 2: An enhanced version of the standard developed
Query Semantics for displaying content (animation, audio) on computers.
The meaning of a query with an information system as This enhanced version adds the ability to display and
its domain of interpretation. Application of knowledge rotate objects in three dimensions. (Dez-Higuera &
discovery and Chase in query evaluation makes semantics Daz-Pernas, 2005)
operational. (Ras & Dardzinska, 2005)
QWL: See Quality of Work Life.
Query Session
A query submitted to a search engine, together with the
Web pages the user visits in response to the query. Query
session is the basic unit of many query log mining tasks.
(Wen, 2005a)
Query Tool
Structured query language that supports the examination
of the relevancy, usefulness, interestingness, and novelty
of extracted knowledge for interactive data mining. (Wang
& Wang, 2005)
Question Driven
In question-driven or hypothesis-driven approaches, the
analysis is preceded by an identiication of questions of
interest. (Amaravadi, 2005)
Queuing Theory
Mathematical study of waiting lines (queues and
networks of queues) normally applied for designing
telecommunications networks and transports. (Fisteus
& Kloos, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
R-Tree Radio Frequency Identiication (RFID) 563
R
R-Tree Radio Frequency Identiication (RFID)
A spatial indexing method for fast comparison and 1: Devices that transmit identification numbers on
retrieval of spatial objects. It is a spatial object hierarchy request from a compatible reader using radio frequencies.
that is formed by aggregating minimum bounding boxes (Szewczak, 2006) 2: The electromagnetic or electrostatic
of the spatial objects and storing the aggregates in a tree coupling in the RF portion of the electromagnetic spectrum
structure. (Sayal, 2005) is used to transmit signals. An RFID system consists of an
antenna and a transceiver, which read the radio frequency
RA: See Registration Authority. and transfer the information to a processing device, and a
transponder or tag, which is an integrated circuit containing
RAD: See Rapid Application Development. the RF circuitry and information to be transmitted.
(Galanxhi-Janaqi & Nah, 2005) 3: Automatic identiication
Radial Basis Function (RBF) Neural Network system transmitting product data automatically by radio
A kind of artiicial neural network. It usually has three signals (non-contact). RFID systems operate in the free
layersan input layer, a hidden layer, and an output layer. air areas of the wireless communications spectrum (radio
The hidden layer of an RBF neural network contains frequency spectrum) across the regulatory boundaries
some radial basis functions, such as Gaussian functions of countries. (Loebbecke, 2006) 4: Form of automated-
or polynomial functions, to transform input vector space radio-frequency-based identiication of objects. RFID
into a new nonlinear space. An RBF neural network has the systems consist of an antenna, a transceiver for reading
universal approximation ability, that is, it can approximate radio frequency and to transfer information, a processing
any function to any accuracy, as long as there are enough device, and a transponder. (Kotzab, 2005) 5: Small chip
hidden neurons. (Chu & Wang, 2005) used to identify hardware (such as exhibits in a museum or
products in a retail store) by a radio in a PDA. Competes
Radical Innovation with printed barcodes. (Houser & Thornton, 2005) 6: Chips
The generation of new ideas (new knowledge) that leads to can broadcast information presently 3 to 10 meters away
the development of radically new products or services that after being scanned by a special device using ordinary radio
lead to transformations in practices. (Newell, 2006) waves. (Friedman, 2005) 7: A technology used to uniquely
identify objects, often in transit. (M. Rowe, 2005a) 8: Uses
Radio Channel low-powered radio transmitters to read data stored in a
An assigned band of frequencies suficient for radio transponder (tag) at distances ranging from 1 inch to 100
communication. A channel is usually assigned for a feet. RFID tags are used to track assets, manage inventory,
speciied radio service to be provided by a speciied and authorize payments, and they increasingly serve as
transmitter. (Ragazzi, 2005) electronic keys for everything from automobiles to secure
facilities. (Dholakia, Zwick, et al., 2005) 9: The use of
Radio Frequency (RF) radio frequencies to read information on a small device
Refers to the use of radio carrier waves to transmit a known as a tag. (Owens et al., 2005) 10: A technology
broadcast signal. RF is essential in wireless communication, that uses radio frequency waves to communicate data
such as broadcast TV and GPS (Global Positioning System). between a moveable item with a small digital tag and a
(Yang, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
564 Radio Frequency Identiication (RFID) Item-Level Tag Random Walk
reader to identify, track, or locate that item. (Mohamedally RAID: See Redundant Array of Inexpensive Disk.
et al., 2005) 11: This technology uses the electromagnetic
R spectrum radio signals to transmit information from a RAM: See Random Access Memory.
transponder (tag) to a receiver for purposes of identifying
items. This technology has been in development for a Random Access Memory (RAM)
standard to replace the Universal Product Code (UPC) A collection of fast semiconductor elements that store
symbol with the Electronic Product Code (ePC) symbol information transiently for use by a microprocessor.
through the Auto ID Center, formerly of MIT. (Morris- (Strauss, 2005)
Jones & Carter, 2005)
Random Access Instruction
Radio Frequency Identiication (RFID) The principled use of lexible features inherent in computers
Item-Level Tag to produce nonlinear learning environments. (Burrage &
An RFID tag with a unique electronic product codes (ePC) Pelton, 2005)
on each individual item; every jacket has its own ePC.
(Loebbecke, 2006) Random Forest
An ensemble of unpruned trees obtained by introducing
Radio Frequency Identiication (RFID) two bootstrap resampling schema, one on the objects and
Pallet-Level and Case-Level Tag another one on the predictors, such that an out-of-bag
An RFID tag with one electronic product code per pallet or sample provides the estimation of the test set error, and
case integrated into the packaging material or sometimes suitable measures of predictor importance are derived for
attached during the production or logistics process, for the inal interpretation. (Siciliano & Conversano, 2005)
example, as part of a printed label. (Loebbecke, 2006)
Random Forgery
Radio Frequency Identiication (RFID) Reader Forgery in which the forged signature has a totally different
(Interrogator) semantic meaning and overall shape in comparison to the
Device communicating with RFID tags and passing the genuine signature. (Chakravarty et al., 2005b)
tag data in digital form to a computer system. (Loebbecke,
2006) Random Variable
A variable characterized by random behavior in assuming
Radio Frequency Identiication (RFID) Tag its different possible values. (Mukherjee, 2005)
(Transponder)
Key component of RFID technology consisting of a minute Random Visible Scrolling
computer chip with an antenna attached to transport or If a media player and a data format support real-time random
product packages. Tags can be updated and reprogrammed. access to any position within a respective continuous,
(Loebbecke, 2006) time-dependent document, such as a video recording, a
common slider interface can be used to visually browse
Radio Network Controller (RNC) the iles content in a similar way, as a scroll bar is used
The network element that manages the radio part of UMTS to navigate and browse static information, such as text
controlling several Node-Bs. (Iossiides et al., 2005) iles. (Hrst, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ra ndom ize d Algorit hm Rat ing 565
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
566 Ratio Data Real Domain (Particular or Speciic)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re a l M ode l Re c a ll 567
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
568 Re c e ive r Re c om m e nde r Syst e m
correctly to the number of slots in the answer key. (Song themselves and their lifestyle, and to feel recognized by
et al., 2005) 3: The percentage of relevant documents their experiences with them. (Pryor, 2005)
R in a given query in a collection that are returned by an
information retrieval system. (Meng & Chen, 2005) 4: The Recognition Technology
number of relevant images retrieved as a percentage of the One of several technologies such as bar code recognition,
total number of relevant images in the database. (Sural et optical character recognition (OCR), intelligent character
al., 2005) 5: The ratio of the number of relevant documents recognition (ICR), and optical mark recognition (OMR)
retrieved to the total number of relevant documents in the that facilitate document registration and retrieval. (Asprey
document collection. (Fan & Pathak, 2005) et al., 2005)
Receiver Recommendation
The destination of the message or the person who decodes 1: A iltered list of alternatives (items of interest) that
the message. This requires skills, for example, in listening support a decision-making process. (Parmar & Angelides,
or reading. (Jacobson, 2006) 2005) 2: An output interface of a recommender system.
Given a customer, the system recommends a list of products
Reciprocal Communication the customer will be interested in (e.g., top-10 products).
Communication that involves two or more (human or non- (Sarwar et al., 2005) 3: Results of the process of providing
human) participants. The direction of communication may useful resources to a user, like products, services, or
be two way or more. However, this type of communication information. (Loh et al., 2005)
does not necessarily suggest that participants communicate
in any preset order. (El-Gayar et al., 2005) Recommendation System
1: A system that retrieves information based on users
Reciprocity preferences. (Chen & McLeod, 2006) 2: Software that,
Returning favors, which is a major way of building trust. given preferences expressed by a user, select those choices,
(Ridings & Gefen, 2005) from a range of them, that better satisfy these users
preferences. (de Campos et al., 2005)
Reclassiication Process
The reclassiication process has to be performed whenever Recommender System
a product was classiied based on a classiication system A, 1: A computer program that aids people to ind information
but is needed to be classiied based on another classiication by giving recommendations on the searched subject. It is up
system B. The difference between reclassifying and to the user to select useful data among the recommended
classifying a product is the fact that in the reclassiication ones. (Nabuco et al., 2006) 2: A computer program that
process, the existing information of classiication system recommends some sort of resource based on algorithms
A is used to determine the class of classiication system that rely on some sort of user model, some sort of content
B. (Abels & Hahn, 2006) model, and some means of matching the two. (Dron, 2005)
3: A software system that makes recommendations to a
Recognition user, usually analyzing the users interest or need. (Loh et
1: A form of cognitive retrieval in which an individual al., 2005) 4: A system that recommends certain information
is given a list of viable options from which to select. or suggests strategies users might follow to achieve certain
Recognition-based search mechanisms have been found goals. (Nasraoui, 2005) 5: An information-iltering
to outperform those that are based on recall. (Corral et technique based on machine learning and/or statistical
al., 2006) 2: Different professional groups look for and methods. Widely used in Internet commerce nowadays.
require different forms of recognition for their professional (Sarwar et al., 2005) 6: A special type of decision-support
development. Where academic staff focus on publication, system that gives recommendations for further actions or
designers need to develop a portfolio of work, and software related items. (Anke & Sundaram, 2006) 7: Any system
developers receive kudos and build a reputation based on that provides a recommendation, prediction, opinion,
a product that has been developed and the code therein. or user-conigured list of items that assists the user in
(Williamson et al., 2006) 3: The extent to which digital evaluating items. (Schafer, 2005) 8: Assists and augments
media should both enable marginalized people to recognize the transfer of recommendations between members of a
community. (Parmar & Angelides, 2005) 9: System that
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re c om m e nde r Syst e m in E-Com m e rc e Re duc t 569
helps the user to choose products, taking into account backward recovery, the state of the application that has been
his/her preferences. (Lorenzi & Ricci, 2005) modiied by a set of uninished operations is reversed by
restoring it to a previous consistent value. With roll-forward
R
Recommender System in E-Commerce recovery, critical components, processes, or objects are
Set of tools implanted in EC sites for suggesting services replicated on multiple computers so that if one of the replicas
and in order to provide consumers with the needed fails, the other replicas continue to provide service, which
information to decide about services to acquire. They are enables the system to advance despite faults. (Zhao et al.,
usually domain-specialized tools. (Gil & Garca, 2006) 2006) 2: The task of recovery is to return the database to
a consistent state after a crash: the effects of committed
Reconciliation Procedure transactions must be guaranteed to be persistent, and effects
When, in lazy protocols, two conlicting transactions have of not committed transactions must be undone. Recovery
been committed before conlict detection, this procedure requires that all modiications are written to some stable
is needed to adequately reconcile and merge the respective storage as part of a commit, or else these modiications
updates. (Muoz-Esco et al., 2005) would be lost in a crash. (Meixner, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
570 Re dunda nt Arra y of I nex pe nsive Disk s (RAI D) Re fe re nt ia l I nt e grit y Re st ric t ion
criteria have been investigated and used in searching for systems. It is a conceptual framework or blueprint for
relevant patterns in data. (Pawlak et al., 2005) systems development. (Fettke, 2005)
R
Redundant Array of Inexpensive Disks (RAID) Reference Model of Open Distributed Processing
1: Uses the server processor to perform RAID calculations. (RM-ODP)
Host CPU cycles that read and write data from and to disk An ISO and ITU standard for system modeling designed
are taken away from applications. Software RAID is less to model open distributed systems. (Naumenko, 2005)
costly than dedicated hardware RAID storage processors,
but its data protection is less eficient and reliable. (Rahman, Referenceable Table
2005e) 2: A method of accessing multiple individual disks A table row which can be referenced by REF type values.
as if the array were one larger disk, spreading data access The table is based on a structured user-deined type and
out over these multiple disks, thereby reducing the risk comprises one extra column containing row (or object)
of losing all data if one drive fails and improving access identiiers generated automatically when a new row is
time. (Tong & Wong, 2005b) inserted into the table. In Oracle, such a table is called an
object table. (Zendulka, 2005b)
Redundant Association Rule
An association rule is redundant if it can be explained Referendum
based entirely on one or more other rules. (Denton & A public opinion poll, where local, regional, or national
Besemann, 2005) authorities offer citizens the possibility to vote on a speciic
issue, generally on two alternativesyes or no. The
Reeds Law multi-phase referendum uses deliberative agenda setting,
Developed by David P. Reed, states that the utility of large feedback processes, and multiple choices. (Keskinen &
social networks increases exponentially with the size of Kuosa, 2005)
the network. (Mew, 2006)
Referential Action
Reengineering Specialized rule used to automatically maintain referential
1: Activities that seek to radically change business integrity. Defines specific reactions to compensate
processes and support systems in an organization. (Sarkis referential integrity violations. They may be Cascade,
& Sundarraj, 2005) 2: The examination and alteration of Restrict, No Action, Set Default, or Set Null. (Rivero,
a subject system to reconstitute it in a new form and the 2005)
subsequent implementation of the new form. (Aversano
et al., 2005) 3: The redesign of a corporations business Referential Integrity
processes (or part of them) to take place over the Internet. 1: A concept developed as part of relational database
The main goals are reduced costs, lower product cycle management systems. A connecting construct or key
times, faster customer response, and improved service allows a database designer to optimally develop a set
quality. (Scupola, 2005) of tables while retaining links between related data.
With referential integrity, records cannot be updated in
REF isolation in an inconsistent manner. (Horiuchi, 2005a) 2:
A data type value which references a row in a referenceable In hypertext, a measure of the reliability of a reference to
table (or object, in Oracle). (Zendulka, 2005b) its endpoints. A reference has the property of referential
integrity if it is always possible to resolve it. When
Refactoring references are represented as links, it is called link integrity.
A change to a system that leaves its behavior unchanged, (Martnez-Gonzlez, 2005)
but enhances some non-functional quality factors such as
simplicity, lexibility, understanding, and performance. Referential Integrity Restriction
(Favre et al., 2005) A special case of an inclusion dependency, when Z is the
primary key K of S. In this case, X constitutes a foreign key
Reference Model FK for R. This restriction can be stated as R[FK]<<S[K].
A model representing a class of domains, for example, (Rivero, 2005)
a reference model for production planning and control
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Reineable Regional Development 571
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
572 Re giona l E-Forum Re ha bilit at ion Ac t
education and training represent the central device of such in the center-based clustering algorithms are replaced by
development. (Giorgi & Schrch, 2005) regression models. (B. Zhang, 2005)
R
Regional E-Forum Regression Model
A community and citizen engagement process linking A pattern or set of patterns that allows a new instance to
government agencies and community, using ICT as the be mapped to one numerical value. Regression models are
means of communication, and extending across and learned from data where a special attribute is selected as
involving a region. (Sutcliffe, 2005) the output or dependent value. For instance, a model that
predicts the sales of the forthcoming year from the sales
Regional Identity of the preceding years is a regression model. Regression
A linguistic and cultural concept linked to the feeling of models can be learned by many different techniques:
belonging shown by the inhabitants. (Giorgi & Schrch, linear regression, local linear regression, parametric and
2005) nonparametric regression, neural networks, and so forth.
(Hernandez-Orallo, 2005b)
Regional Tourism System (RTS)
1: In the Australian context, a sectoral network of Regression Tree
organizations and institutions that interact or are 1: A decision tree where the dependent attribute is
interdependent, where the hub of such interactions is located numerical. (Gehrke, 2005) 2: An oriented tree structure
outside of major cities. (Taylor, 2005) 2: The combination obtained by a recursive partitioning of a sample on the
of organizations and institutions with an interest in the basis of a sequential partitioning of the predictor space
management of tourism in a given destination. Regions may such to obtain internally homogenous groups and externally
be deined by administrative boundaries or by communities heterogeneous groups of cases with respect to a numerical
of interest. (Carson, 2005) response variable. (Siciliano & Conversano, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Reiication Relational Data 573
into society. It also was enacted to ensure that the federal Unique Names Principle, the Domain Closure Axiom,
government plays a leadership role in promoting the the Completion Axioms, and Equality Axioms. This
employment of individuals with disabilities. (Bursa et formalization permits identiication of the answering with
R
al., 2005) logical consequences. (Alonso-Jimnez et al., 2005)
Reiication Relapse
The use of various ideological strategies for the purpose The tendency for repeated reversions to earlier patterns
of maintaining a particular (social/organizational) order. of the particular activity to recur and for even the most
(Land et al., 2006b) extreme patterns typical of the height of the addiction
to be quickly restored after many years of abstinence or
Reimbursement control. (Grifiths, 2005)
Accepting telemedicine encounters by health insurance
companies as one of the different medical outlets and Relation
accordingly reimbursing doctors and physicians for their 1: A mathematical structure similar to a table in which
encounters with, for example, rural patients, could assist every row is unique, and neither rows nor columns have a
in increasing telemedicine success and diffusion. (Al- meaningful order. (Denton & Besemann, 2005) 2: From a
Qirim, 2005) type point of view, a relation is simply a set of tuples. In most
implementations of the relational model, however, multi-
Reinforcing Ethical Behavior sets (sets with repetitions) are used. (Badia, 2005d)
The frequency of reinforcement is seen as a crucial factor
in maintaining standards. Rewarding ethical conduct and Relational Algebra
punishing unethical behavior is critical to the success of A collection of unary and binary operators that take one
ethical practice. (Grieves, 2006a) or two tables as input and produce a table as output. The
relational algebra operators of Cartesian Product, Selection,
Reinforcing Feedback Projection, set Difference, and Union are considered to be
Visual, auditory, or tactile indications that the student necessary and suficient for extracting any desired subset
stated the correct response. This type of feedback includes of data from a relational database. (Dadashzadeh, 2005)
some form of praise for the correct response. (Lazarus,
2005a) Relational Calculus
A notation founded on predicate calculus dealing
Reinforcing (Positive) Feedback with descriptive expressions that are equivalent to the
A systemic pattern that represents growth and self-feeding operations of relational algebra. Two forms of the relational
processes. It explains the dynamics underlying vicious calculus exist: the tuple calculus and the domain calculus.
and virtuous cycles with downward and upward spiral (Dadashzadeh, 2005)
effects. (Maani, 2005)
Relational Community
Reintermediation A community that forms through the relationships of its
The process of using ICT technologies to identify and members based on common interests or issues, rather
exploit new intermediary roles in the supply chain. than on the basis of a shared physical location. (Roberts
Reintermediation strategies are often based on providing et al., 2006c)
superior service or convenience to buyers. New
intermediaries that have taken advantage of the Internet Relational Completeness
to build large organizations include Amazon.com, eBay, A relational query language is said to be relationally
and iTunes.com. Reintermediation is often seen as the complete if it can express each of the ive principal
opposite of disintermediation. (Fraser, 2005) operations of relational algebra. (Dadashzadeh, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
574 Re lat iona l Dat a M ode l Re lat iona l Trust
relational database. Every table can either capture the called a database engine. (Rahman, 2005e) 2: A software
characteristics of entities of a particular type (e.g., person application for managing databases utilizing the relational
R or product) or relationships between entities (e.g., person data model. (Dadashzadeh, 2005)
bought product). (Perlich & Provost, 2005)
Relational Database Structure
Relational Data Model Information is organized into tables; tables are composed
1: A data model that represents entities in the form of of records; and records are made up of ields (also known
data tables. (Artz, 2005b) 2: A logical way of organizing a as data items or attributes). (Schultz, 2005)
database as a collection of interrelated tables. The logical
relationship between tables representing related data is Relational Learning
accomplished through shared columns, where the primary Learning in relational domains that include information
key column of one table appears as a foreign key column from multiple tables, not based on manual feature
in another. (Dadashzadeh, 2005) construction. (Perlich & Provost, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re lat ionship Re leva nc e 575
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
576 Re leva nc e Fe e dba ck Re m ot e Proc e dure Ca ll (RPC)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re m ot e Worke r Re posit or y 577
servers and ask for data or functionality. (Fiege, 2005) 2: Repertory Grid (RepGrid)
One way of communicating in a client server model. The A cognitive mapping technique that can be used to
client and the server are located in different computers in a describe how people think about a phenomenon in their
R
network. An RPC is a synchronous operation requiring the world. The RepGrid technique, for IS, entails a set
requesting (client) to pass by value all the needed parameters of procedures for uncovering the personal constructs
to the server, then the client is suspended until the server individuals use to structure and interpret events relating
returns back the associated results. (Karoui, 2005) to the development, implementation, use, and management
of IT in organizations. The RepGrid contains three
Remote Worker componentselements, constructs and links. (Tan &
An individual who works at a different location than his/ Hunter, 2005)
her co-workers and/or manager. That person is remote,
in terms of physical presence from his/her colleagues. RepGrid: See Repertory Grid.
(Staples et al., 2005)
Replacement Model of Course Redesign
Rendering This model generally features a reduction in class-meeting
1: A process in which the layout and typography for time, replacing face-to-face time with online, interactive
content is created for a speciic human viewer, program, learning activities for students. (Twigg, 2005)
or output device. (Honkaranta & Tyrvinen, 2005) 2: A
process of producing realistic 3D images. There are four Replicated Database
main rendering methods used in visualization, that is, A regular database in which tables, queries, and reports
ray tracing, volume rendering, radiosity, and polygon cannot be modiied in design. (Parikh & Parolia, 2005)
rendering. (Ozer et al., 2005)
Replication Method
Rendezvous Node A method for managing redundant data in such a way that
A well-known host that simpliies the meeting of a new a system can be optimized in some way. (Frank, 2005a)
candidate with existing members of a multi-party session.
(Hossz, 2006) Replication (Passive, Active, Active with Voting,
Semi-Active)
Rendezvous Point (RP) 1: Multiple copies of an application program execute
PIM-SM constructs a multicast distribution tree around typically as multiple processes on different processors. In
a router called a rendezvous point. This rendezvous point passive replication, only one replica, the primary replica,
plays the same role as the core in the CBT protocol; executes the operations, and one or more backups stand
receivers meet new sources at this rendezvous point. ready to perform the operations if the primary fails. In
(Chakraborty et al., 2005) active replication, all of the replicas execute the operations
and communicate their results. In active replication with
Reorganization voting, all of the replicas execute the operations, and the
Aims at changing the structure, the processes, and the result produced by the majority of the replicas is taken as
policy of an organization. (Becker et al., 2006) the result of the operation. In semi-active replication, both
the primary and the backup replicas execute the operations,
Repair but the backups follow the directives of the primary, and
Minimal set of insert and delete operations which make only the primary outputs the results. (Zhao et al., 2005)
the database consistent. (Greco et al., 2005) 2: The process of creating read-only copies of any data.
Replication is supported by the security, directory, and
Repatriation ile services in a distributed computing environment.
Taking work that had been outsourced back in-house. Replication can improve availability and load balancing.
(Beaumont, 2005) (Bose et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
578 Re pre se nt at ion Re put at ion Effe c t
far as database engineering is concerned, the repository that is being studied. Computer simulation is a form of
includes the schemas of the project database at all the representational decision support system. (McHaney,
R abstraction levels, as well as the correspondence between 2005)
them. All CASE tools rely on some sort of repository.
(Hainaut et al., 2005) 2: A centralized database where Representational Dimension
metadata about database structure, applications, Web The number of coordinates a vector space has. (Chvez
pages, users, and other application components are & Navarro, 2005)
stored and maintained. It provides a set of mechanisms
and structures to achieve seamless data-to-tool and data- Representational Diversity
to-data integration. (Lee, Suh, et al., 2005) 3: Database The practice according to which real-world entities
where researchers self-archive their works, either pre-prints are represented through totally independent and
or post-prints. The Open Archives Initiative proposes unsynchronized models in different information systems,
standards to allow access to different repositories. leading to inconsistencies and maintenance problems.
(Rennard, 2006) 4: In information technology, a central (Lepouras et al., 2006)
place in which an aggregation of data is kept and maintained
in an organized way, usually in computer storage. (Oshri, Representative Region
2006) Area with the most notable characteristics of a multimedia
object. (Hurson & Yang, 2005)
Representation
In GIS, a way to code the location, geometric shape, and Representative Sample
topological behavior of objects. Involves the deinition of A sample whose distribution is the same as that of the
aspects such as resolution, level of detail, spatial dimension. underlying population. (Hou, Guo, et al., 2005)
(Davis et al., 2005)
Represented Knowledge
Representation Language The knowledge that must be represented and understood.
A knowledge representation language is a set of structures It may be relevant, with respect to a certain objective, to
expressed by means of symbols, that is, sequences of represent a given set of data or not to represent another
symbols obeying structural formation rules. Some symbols collection of information. (Analide et al., 2006)
are interpreted as logical operators, whereas others are
treated like objects in a world model. (Fortier & Kassel, Reproductive Digital Skill
2006) The ability of users to assign new meaning to digital works
by reproducing existing pieces of digital information.
Representation Level (Eshet, 2005)
Degree to which the problems faced by managers are well
formalized in their own minds and can be represented Reputation
for the purpose of DSS development. (Pomerol & Adam, 1: The estimated trustworthiness in an agent as derived
2005) from the communicated opinions of other parts (directly or
indirectly received); the resulting and emergent common
Representation Space opinion about the agents trustworthiness. (Falcone &
The representation space is formed with all the attributes Castelfranchi, 2005) 2: The extent to which buyers believe
of a learning problem. In supervised learning, it consists that the selling organization is honest and concerned about
of the representation of the labeled instances in a multi- its customers. (Peszynski, 2005)
dimensional space, where all predictive attributes play
the role of a dimension. (Muhlenbach & Rakotomalala, Reputation Effect
2005) The extent of association of a speciic information
technology with perceived business beneits among a
Representational Decision Support System population of irms over a period of time, fuelling increased
Computer-based information system that combines models visibility and sustaining a mimetic diffusion pattern.
with data in a fashion that closely resembles the system (Grifin, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re put e d Cre dibilit y Re se a rch Pa r t ne rship 579
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
580 Re se a rch Pra c t ic e /Re se a rch De sign Re sourc e De sc ript ion Fra m e w ork (RDF)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re sourc e De sc ript ion Fra m e w ork Sche m a (RDFS) Re sourc e M a na ge m e nt I nit iat ive (RM I ) 581
(Dotsika, 2006) 3: A speciication developed in 2000 by A set of such triples is called an RDF graph. This can be
the World Wide Web Consortium as a foundation for illustrated by a node and directed-arc diagram, in which
processing machine-understandable metadata regarding each triple is represented as a node-arc-node link (hence
R
resources on the Internet, including the World Wide Web. the term, graph). (Kapetanios, 2005)
It uses XML. (Raisinghani & Sahoo, 2006) 4: An example
of metadata language (metadata = data about data) used Resource Description Framework Schema
to describe generic things (resources, according to the (RDFS)
RDF jargon) on the Web. An RDF document is a list of 1: Provides a mechanism for constructing specialized RDF
statements under the form of triples having the classical vocabularies through the description of domain-speciic
format <object, property, value>, where the elements of properties. This is obtained mainly by describing the
the triples can be URIs (universal resource identiiers), properties in terms of the classes of resource to which
literals (mainly, free text), and variables. RDF statements they apply: For example, we could deine the creator
are normally written into XML format (the so-called property saying that it has the resource document as
RDF/XML syntax). (Zarri, 2005b) 5: The basic language domain (document is the value or object of this
of the Semantic Web. It is used for describing Web property) and the resource person as range (this property
resources. (Antoniou et al., 2005) 6: Part of the Semantic must always be associated with a resource person, its
Web, and a way to uniquely identify a resource whether subject). Other basic modeling primitives of RDFS
electronic or not. (Verhaart & Kinshuk 2006) 7: RDF allow setting up hierarchies (taxonomies), both hierarchies
provides means for adding semantics to a document. It of concepts, thanks to the use of class and subclass-
is an infrastructure that enables the encoding, exchange, of statements, and hierarchies of properties, thanks to
and reuse of information-structured metadata. RDF allows the use of property and subproperty-of statements.
multiple metadata schemas to be read by humans as well as Instances of a speciic class (concept) can be declared
machines, providing interoperability between applications making use of the type statement. (Zarri, 2005b) 2:
that exchange machine-understandable information on the Provides the most basic primitives for ontology modeling.
Web. (Ishaya, 2005) 8: RDF provides the foundation for (Dieng-Kuntz, 2006) 3: An explicit representation of the
the processing and exchange of machine-understandable conceptual model underlying an RDF model. The schema
information on the Web. RDF can be used for cataloging, is represented in RDF using a set of properties with a
for resource discovery, and by intelligent software agents standardized interpretation and effect on the interpretation
in content rating. (Hassan & Hietanen, 2006) 9: An XML- of the model. (Stuckenschmidt, 2005) 4: A primitive
based language for deining metadata for Web resources ontology language that is integrated with RDF. Its basic
and relations between them. It is a W3C recommendation operations are the deinition of classes and properties,
and serves as a basis for representing information and their organization in hierarchies, and domain and range
knowledge on the Semantic Web. (Stuckenschmidt, restrictions on properties. (Antoniou et al., 2005)
2005) 10: A language for representing information about
resources in the World Wide Web. (Goh & Kinshuk, 2005) Resource Inluence
11: A mechanism to describe data as a list of triples: One of an entitys resources deployed to execute and
an object (a resource), an attribute (a property), and a affect its conduct of knowledge management. (Holsapple
value (a resource or free text). (Vardaki, 2005) 12: A & Joshi, 2006)
framework deined by W3C for representing information
in the Web that integrates a variety of applications, from Resource Management
library catalogs to syndication and aggregation of news, Set of mechanisms to eficiently control and allocate scarce
software, and content, to personal collections of music, network resources (often bandwidth) to users and trafic
photos, and events, using XML as an interchange syntax. lows. (DaSilva, 2005)
The RDF speciications provide a lightweight ontology
system to support the exchange of knowledge on the Web. Resource Management Initiative (RMI)
(Sicilia & Garca-Barriocanal, 2006) 13: A framework A UK initiative providing clinicians and other hospital
for representing information in the Web. The underlying managers with information required to use resources to
structure of any expression in RDF is a collection of triples, maximum effect, generally by the introduction of new IT.
each consisting of a subject, a predicate, and an object. This was aimed at encouraging clinicians to take more
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
582 Re sourc e M a na ge r (p-RM ) Re t roduc t ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Re t ur n on I nve st m e nt (ROI ) Reve rse Engine e ring 583
which certain outcomes will or will not be realized. the concept of returns to scale is extended to multiple
(Carlsson, 2005) input and multiple output situations. (Chen, Motiwalla,
et al., 2005)
R
Return on Investment (ROI)
1: A technique for measuring the return on investment. Reusable Component
It is calculated by the earnings produced by the assets The aim of reusable components is to provide services
compared to the money invested in the asset. This technique to other components and to require services from others.
is used in ERP contexts to justify ERP adoptions and also There are three concepts associated with them: their
to measure how well an ERP was implemented. (Esteves interfaces, their architectures, and their realizations.
& Pastor, 2005) 2: A technique used for measuring the (Felice & Riesco, 2005)
return on an investment; it is often used in the justiication
of new ERP systems, to measure how well an ERP Reusable Learning Object (RLO)
system has been implemented, or for implementing new 1: Another term for a learning object. (Stavredes, 2005b)
or additional functionality. (Sammon & Adam, 2005) 2: Resources that can be used for facilitating intended
3: An assessment of the value and beneits realized learning outcomes, and can be extracted and reused in
from the training program, traditionally conceived as other learning environments. (Etter & Byrnes, 2005)
[(beneits-cost/cost)]. (Waddington et al., 2005) 4: An
estimate expressed as a ratio comparing the net beneits Reuse
(the return) to its total cost (the investment) for 1: Making use of a (digital) learning resource in a situation
measuring operating performance and eficiency in different from that in which it was originally created or
utilizing the assets of the company. (Rashid, 2005) 5: used. (Collis & Moonen, 2005a) 2: A process where a
Commonly used as an accounting term to indicate how technology asset (such as a function or class) is designed
well an organization has used its investment in resources. and developed following speciic standards, and with the
In a knowledge-management context, ROI describes the intent of being used again. (D. Brandon, Jr., 2005a)
return on both the human and inancial capital invested
in that strategy. Some measures may include sustainable Reuse Process
growth, calculable eficiencies in product development A method having the following steps: the decomposition
cycles, improved decision making, better ability to initiate of the goal speciication, the identiication for each
and integrate new employees, lower rates of staff turnover speciication, the adaptation step using the appropriate
relecting improved employee morale, and better ability to operators, and the composition of the sub-speciications.
retain customers relecting trust in employees expertise. (Felice & Riesco, 2005)
(Zyngier, 2006) 6: Net present value of savings divided
by capital investment expressed as a percentage. (D. Reversal Pattern
Wright, 2005) 7: The revenue generated by a program or A pattern in technical analysis that suggests, on the balance
programs compared to the resources necessary to initiate of probabilities, that price trend will change direction.
and sustain the program. (Robinson, 2005) 8: Traditionally (Vanstone & Tan, 2005)
deined as the increase in inancial value provided by a
new investment. However, this deinition does not work Reverse Auction
well for intangibles, such as e-learning and the effective A ixed-duration auction hosted by a single buyer in which
management of human capital. (Brace & Berge, 2006) 9: multiple sellers compete for business. (I. Lee, 2005)
Typically, a simple calculation based on costs of systems
development and implementation measured against returns Reverse Engineering
on investment. Problems with this include a measure 1: The extraction of higher-level software artifacts,
related to the dificulties of quantifying intangible costs including design, documentation, and so forth, from the
and beneits. (Burn & Ash, 2006) source or binary codes of a software system. (Tan & Zhao,
2005b) 2: The process of analyzing a subject system to: (1)
Returns to Scale (RTS) identify system components and their interrelationships,
Considered to be increasing if a proportional increase in and (2) create representations of the system in another form
all the inputs results in a more than proportional increase or at a higher level of abstraction. (Aversano et al., 2005)
in the single output. In Data Envelopment Analysis (DEA), 3: The process of transforming code into a model through
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
584 Reve rse -Pat h Forw a rding (RPF) Ripping
a mapping from a speciic implementation language. RFID Reader (Interrogator): See Radio Frequency
(Favre et al., 2005) Identiication Reader (Interrogator).
R
Reverse-Path Forwarding (RPF) RFID Tag (Transponder): See Radio Frequency
In multicast, the router forwards the packet away from the Identiication Tag (Transponder).
source to make progress along the distribution tree and
prevent routing loops. The routers multicast forwarding RFP: See Request for Proposal.
state runs more logically by organizing tables based on
the reverse path, from the receiver back to the root of the Rhetoric
distribution tree. (Chakraborty et al., 2005) The process of presenting information in a way that
persuades others to do or to believe something. (St.
Reversible Action Amant, 2006a)
Any action that can be undone. Reversibility is a design
principle that says people should be able to recover from Rich Learning Environment
their inevitable mistakes. (Roibs, 2006a) Learning environment in which the learner is empowered
to create a strong connection with the reality of interest
Reversible Watermarking by directly experiencing it in order to develop mental
A watermarking method that allows the original host media constructs that are deep, complex, pluralist, and
to be perfectly recovered after the marked media passes emotionally rich. (Ramos & Carvalho, 2005)
the authentication process. (C.-T. Li, 2005)
Rich Media
Revolution Ellipsoid Media with greater capacity to carry information, with
Three-dimensional solid obtained from revolving an ellipse face-to-face communication being considered the standard
about one of its axes. (Zelasco et al., 2005) by which others are judged. The more closely a media
can replicate face-to-face communication, the richer it is
Revolutionary Innovation considered to be. (Newberry, 2005)
A type of innovation that provides solutions outside the
conines of contemporary scientiic knowledge and best Rich Site Summary (RSS) Networking
practice in an area, and represents pioneering work. A tool enabling end users to receive instantaneous updates
(Paukert et al., 2006) from Web sites and Weblogs. (Brown, 2006)
RFID: See Radio Frequency Identiication. RIM: See Rational Instrumental Meaning.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Risk RN C 585
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
586 Roa m ing Role Pla ying
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Role -Ba se d Ac c e ss Cont rol (RBAC) Rough Se t 587
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
588 Rough Se t Dat a Ana lysis RSS N e t w ork ing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
RSV P Rule List 589
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
590 Rule M ining Russe lls T he or y of Type s
part) matches the attribute values of the case is then used Rule Transition Granularity
to classify the case; that is, the case is assigned the same A concept used in analyzing the relationship between event
R class as the class predicted by the irst matching rule found occurrences in rule instantiation. (Ale & Espil, 2005)
in the discovered rule list. (Parpinelli et al., 2005)
Rule Triggering
Rule Mining Rule instantiation. (Ale & Espil, 2005)
A computer-intensive task whereby data sets are extensively
probed for useful predictive rules. (Muruzbal, 2005) Rule-Based Expert System
An expert system that applies a knowledge base consisting
Rule Model of if-then statements that can be combined to make more
Describes the structure of a rule (i.e., its event, condition, complex inferences. (Svensson, 2005)
and action parts). (Vargas-Solar, 2005)
Rule-Based Knowledge Representation
Rule Propagation A (symbolic) way of representing knowledge under the
A property that determines how the condition of one rule is form of rules of the type: If B Then A, where B, the
affected by the action of any other. (Ale & Espil, 2005) antecedent or condition, is a conjunction of literals B1
B2 Bn , and A, the consequent or the conclusion,
Rule Quality also can be a disjunction of literals, A1 A2 A n. The
A numerical factor that characterizes a measure of belief in meaning of the rule is then: if the different conditions Bi
the given decision rule, its power, predictability, reliability, are all veriied (TRUE), they imply the conclusion A, or a
and likelihood. (Bruha, 2005) set of alternative conclusions which are expressed by the
different Ai. This type of representation can be reduced to
Rule Scheduling irst-order logic (resolution principle). (Zarri, 2006a)
An activity that determines the order of execution within a
set of rule instances whenever they are ired simultaneously. Rules Repository
(Ale & Espil, 2005) WCDSS information and knowledge base that contains
directions and instructions to help e-shoppers make
Rule Set Conluence informed decisions online. (F. Wang, 2006)
A property that indicates whether the inal database
state after rule processing is independent of the order of Russells Theory of Types
execution. (Ale & Espil, 2005) A theory proposed by British logician Bertrand Russell to
resolve Russells paradox, which appears when the set of
Rule Set Consumption Mode all sets that are not members of themselves is considered
Feature indicating how a set of rule instantiations is reduced in naive set theory. The paradox is that such a set appears
as a consequence of execution. (Ale & Espil, 2005) to be a member of itself if and only if it is not a member
of itself. (Naumenko, 2005)
Rule Set Cycle Policy
Feature indicating whether recursion must be applied when
triggering a rule, or rules must be instantiated only once.
(Ale & Espil, 2005)
Rule Signaling
An activity occurring when some source causes an event.
(Ale & Espil, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
S-Com m e rc e Sa lie nc e 591
S
S-Commerce: See Silent Commerce. Safety
1: Protecting the user from dangerous conditions and
S-Problem undesirable situations. It can mean safety of users, safety
Where the relevance of a particular input variable depends of data, or both. (Yong, 2005) 2: Quality, state, or condition
on the values of other input variables. Back-propagation of being prevented of and/or protected against danger, risk,
neural networks will require inordinate amounts of learning or injury, caused by accidental and unintentional effects
time for these types of problems, so they are unsuitable or actions. Safety further includes the recovery from such
for S-problems. (Wilson et al., 2006a) accidental and unintentional effects or actions. (Oermann
& Dittmann, 2006)
S-Tree
A height-balanced multi-way tree. Each internal node Sales and Operations Planning
corresponds to a page, which contains a set of signatures, The process that facilitates integrated demand and supply
and each leaf node contains a set of entries of the form management among internal departments such as sales,
<s, oid>, where the object is accessed by the oid and s is marketing, and manufacturing through effective and
its signature. (Chen & Shi, 2005) eficient sharing of information across the supply chain to
enhance business performance. (Khan et al., 2006)
S/MIME: See Secure Multi-Purpose Internet Mail
Extension. Sales/Revenue
Receipt of income for the exchange of goods or services.
Saccade (Hunter, 2005)
An eye movement occurring between ixations, typically
lasting for 20 to 35 milliseconds. The purpose of most Sales Tax
saccades is to move the eyes to the next viewing position. An excise tax imposed on the transfer of goods, typically
Visual processing is automatically suppressed during at retail. States vary as to whether the tax is imposed on
saccades to avoid blurring of the visual image. (Poole & the seller of goods or on the buyer; however, sales taxes
Ball, 2006) are almost universally collected from the purchaser at the
time of sale. (Raisinghani & Petty, 2005)
SAD: See Systems Analysis and Design Course.
Salience
Safe Enclave Occurs when the particular activity becomes the most
A social area or community that shelters individuals important activity in the persons life and dominates
from organizational social-political pressures to their thinking (preoccupations and cognitive distortions),
encourage knowledge sharing. They sometimes alter feelings (cravings), and behavior (deterioration of socialized
the organizational climate to provide a safe or desirable behavior). For instance, even if the person is not actually
forum to share knowledge. Often they encompass shared engaged in the behavior, they will be thinking about the
electronic and non-electronic social spaces that allow for next time they will be. (Grifiths, 2005)
underlying or contrary views to be expressed. (Paquette,
2006a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
592 Sa lie nt Obje c t Sc a ffolding
Sanctioning Scaffolding
Punishment adopted upon violation detection. The form 1: A pedagogical structure designed to facilitate the
of sanctioning can vary on the basis of the community increase in knowledge and understanding by students
type and the type of violation committed by the guilty in an educational experience. (Woods & Baker, 2005)
member. (Bertino et al., 2006) 2: A teaching method that provides the learner with
supports or assistance (e.g., hinting, elaborating, nudging,
SAP commenting, simplifying, suggesting, etc.) to complete
Software company based in Walldorf, Germany; market a task or problem when needed, and then removing that
leader in ERP software worldwide. SAP is an abbreviation support as the learner takes more control over the learning
of the companys German name Systeme, Anwendungen, event or situation. (Bonk et al., 2005) 3: An instructional
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sc a la bilit y Sc e na rio 593
technique that chunks out a larger learner project over a Scam within a Scam
timeline or allows a gradual introduction of skills that will Final mention of methods of cyber-identity theft involves a
lead the learner to a more complex learning level or project scam within a scam. For instance, a cyber thief may pose as
S
completion. (Bedard-Voorhees, 2005) 4: Cognitive and an attorney or a governmental employee and mass e-mail a
instructional supports for learning built into course design. database of past identity theft victims, requesting personal
(C. Cavanaugh, 2005) 5: Providing support that enables information for evidence to assist them in a potential court
a learner to carry out a task that would not be possible case. In this way, some theft victims may be victimized
without that support, and enabling the learner gradually in more ways than one. (Close et al., 2006)
to master that task without support. (Muukkonen et al.,
2005) 6: Supporting student learning with assistance at Scanner
the level of learning where it is needed. (Lerch et al., 2005) Electronic device that converts bar-code information into
7: The process by which learners are gradually guided digitized electronic images. (Kotzab, 2005)
from less-effective to more-effective learning strategies.
(OLooney, 2006) Scanning
The activity/performance launched by antivirus software to
Scalability examine iles and to inspect any malicious codes residing
1: The degree to which a protocol or algorithm can be inside the iles according to the softwares deinition iles.
extended to an increasing number of users or network (Luo & Warkentin, 2005)
nodes and continue to function properly. (DaSilva, 2005)
2: The ability to increase enrollment while still remaining Scanpath
proitable, or at least inancially self-sustaining, without An eye-tracking metric, usually a complete sequence of
adversely affecting course and program quality. (Laws ixations and interconnecting saccades. (Poole & Ball,
et al., 2005) 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
594 Sc e na rio-Ba se d I nst ruc t iona l De sign Sche m a I nt e grat ion
of use-case descriptions describes the systems complete reinforcement depends on time, the schedule is called an
functionality. (Rolland & Kaabi, 2006) 3: A narrative interval schedule. (I. Chen, 2005)
S description of a sequence of (inter-)actions performed by
one or more persons in a particular context. Scenarios Scheduling
include information about goals, plans, interpretations, A research ield in which we aim to program the execution
values, and contextual conditions and events. (Nash et al., of a set of tasks on a set of resources. The schedule obtained
2005a) 4: Developed options for action used to consider should respect some constraints and optimize one or many
the implications of one or more choices. (Shambaugh, criteria. (Kacem, 2005)
2005)
Schema
Scenario-Based Instructional Design 1: A deinition of the data available for use by an application
An iterative approach to instructional design where ones or system of applications. (Fulton, 2005) 2: A diagram,
envisioned and designed intent is continually critiqued. outline, or model. (Nightingale, 2005) 3: A diagrammatic
Opportunities and constraints are considered in revised representation; an outline, model, or pattern imposed
and detailed versions of the scenario. The goal is to couple on complex reality or experience to assist in explaining
design-and-relect activity so that ongoing dialogue it. (Askar & Kocak-Usluel, 2005) 4: A notional mental
is maintained between the design team, keeping the structure that houses the knowledge and understanding
needs of the learner forefront in the instructional design. that an individual has of a particular topic. Schemas can
(Shambaugh, 2005) become very large, and are linked through meaning and
experience to many other schemas. (Pritchard, 2005a)
Scenario-Based Learning (SBL) 5: Mental constructs that aid learners in categorizing
The simulation of a scenario that is close to the students problems or situations and selecting appropriate courses
learning or future working environment. Using up-to-date of action for their effective resolution. (Dexter, 2005) 6:
information and multimedia technology, it can simulate An abstract building block of a GA-generated solution,
issues and conditions similar to those encountered in the corresponding to a set of individuals. Schemata typically
real world. For example, students can virtually experience are denoted by bit strings with dont-care symbols # (e.g.,
how the actual computers working environment should be. 1#01#00# is a schema with 23 = 8 possible instances, one
They can also take this opportunity to study how different for each instantiation of the # symbols to 0 or 1). Schemata
accessories of a computer interconnect together and how are important in GA research, because they form the
signals low between different units. Students can use this basis of an analytical approach called schema theory,
virtual environment to better understand the operation and for characterizing building blocks and predicting their
the theory behind it. Further explanation will be displayed proliferation and survival probability across generations,
in hierarchical ways to suit the different backgrounds of thereby describing the expected relative fitness of
students. (Chu, 2005) individuals in the GA. (Hsu, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sche m a M at ching Sc re e n N a m e 595
merged into a global structure representing all of them. innovative, high-growth, technology-based businesses
(De Meo, Terracina, et al., 2005) through the provision of infrastructure and support
services, including: (1) collaborative links with economic
S
Schema Matching development agencies; (2) formal and operational links
The process of identifying an appropriate mapping from with centers of excellence such as universities, higher
the schema of an input data source to the schema of an education institutions, and research establishments; and
integrated database. (Koeller, 2005) (3) management support actively engaged in the transfer
of technology and business skills to small- and medium-
Schema Modiication sized enterprises. (Moodley, 2005)
Ability to make changes in the database schema. The data
corresponding to the past schema are lost or recreated Scientiic and Statistical Data Mining
according the new schema. (Bounif, 2005) The use of data and image analyses to investigate knowledge
discovery of patterns in the data. (Segall, 2005)
Schematic Knowledge Resource
A knowledge resource whose existence depends on the Scientiic Research Process
existence of the organization. (Holsapple & Joshi, 2006) A general model consists of the following phases:
idea generation, problem deinition, procedure design/
Schema/Script planning, observation/experimentation, data analysis,
Mental structure that organizes our knowledge of the results interpretation, and communication. It is possible
world around speciic themes or subjects, and guides our to combine several phases, or to divide one phase into
behavior so that we act appropriately and according to more detailed steps. The division between phases is not
expectation in particular situations. (Noyes, 2006) clear-cut. Iteration of different phrases may be necessary.
(Yao & Zhao, 2005)
Schema Transformation
A transformation is a rewriting rule through which the Scientiic Web Intelligence
instances of some pattern of an abstract or concrete A research ield that combines techniques from data
speciication are replaced with instances of another mining, Web intelligence, and Webometrics to extract
pattern. The concept also applies to database schemas useful information from the links and text of academic-
where the rewriting rule replaces a set of constructs of a related Web pages, principally concerning the impact of
database schema with another set of constructs. Such a information and the relationships among different kinds
transformation comprises two partsa schema rewriting of information. (Thelwall, 2005)
rule (structural mapping) and a data conversion rule
(instance mapping)that transform the data according Scientometrics
to the source schema into data complying with the target The quantitative study of science and scientists, particularly
schema. (Hainaut, 2005) the documentary outputs of science. (Thelwall, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
596 Sc re e n Re a de r Se a rch Engine /I nfor m at ion Re t rieva l Syst e m
to search for a screen name by e-mail address, name, or SDBS: See Spatial Database System.
area of interest. (Hwang & Stewart, 2005)
S SDK: See Software Development Kit.
Screen Reader
Software that interprets the signals sent to the computer SDLC: See System Development Lifecycle.
screen and reads aloud the displayed text with the help of
a speech synthesizer. (Schmetzke, 2005) SDP: See Session-Description Protocol.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se a rch Group, I nc Se c ond-Ge ne rat ion K now le dge M a nage m e nt M ove m e nt 597
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
598 Se c ond-Orde r Effe c t Se c ure Ele c t ronic Tra nsa c t ion (SET )
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se c ure K now le dge M a na ge m e nt Se c urit y 599
SET. Released in 1997, SET v1.0 established a standard Internet. It is one of a few competing security standards.
speciically for handling electronic payments, describing (Bose et al., 2005) 3: A commonly used security protocol
ield formats, message types, protocol handshaking, and designed by Netscape Communications to enable secure
S
encryption mechanisms. The key difference between Internet communications. It provides communication
SET and SSL is that SET has digital certiicates for all encryption, authentication, and message integrity. (Xu
involved parties as an integral part of its design. (Lei et & Korba, 2005) 4: A protocol developed by Netscape for
al., 2005b) transmitting private documents via Internet. SSL works
by using a private key to encrypt data that is transferred
Secure Knowledge Management over the SSL connection. (Chim, 2006)
The management of knowledge while adhering to principles
of security and privacy. Enterprises must ind cost-effective Securities and Exchange Commission (SEC)
solutions to ensure the privacy of electronic customers, The primary federal regulatory agency for the securities
reliably deliver important information only to designated industry, whose responsibility is to promote full disclosure,
recipients, and offer revenue-generating services based on and to protect investors against fraudulent and manipulative
access proiles. (Upadhyaya et al., 2006) practices in the securities markets. (Saha, 2006b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
600 Se c urit y Ana lysis Se gm e nt at ion Eva luat ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Segmented Network (SN) Self-Eficacy Theory 601
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
602 Se lf-Eva luat ion Se lf-Re por t
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se lf-Se r vic e Se m a nt ic Ga p (SG) 603
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
604 Se m a nt ic H e t e roge ne it y Se m a nt ic Que r y Opt im izat ion
Semantic Heterogeneity data with classes of an ontologythat is, the use of ontology
Each information source has a speciic vocabulary for describing data. (Aleman-Meza et al., 2005)
S according to its understanding of the world. The
different interpretations of the terms within each of these Semantic Model
vocabularies cause the semantic heterogeneity. (Buccella The conceptual representation of the problem domain.
et al., 2005) (Hoxmeier, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se m a nt ic Se a rch Se m a nt ic We b Rule 605
The use of integrity constraints to constrain search in that allows data to be shared and reused across application,
answering queries. (Grant & Minker, 2006) enterprise, and community boundaries. It is a collaborative
effort led by W3C with participation from a large number
S
Semantic Search of researchers and industrial partners. It is based on the
A search in natural language text, based on the meaning Resource Description Framework (RDF) and other Web
rather than the syntax of the text. (Navarro, 2005) ontology description languages (OWLs), which integrate a
variety of applications using XML for syntax and Uniform
Semantic Technology Resource Identiiers (URIs) for naming. (Kapetanios,
A software technology that allows the meaning of and 2005) 8: An environment in which human and machine
associations between information to be known and agents will communicate on a semantic basis. It is to be
processed at execution time. For a semantic technology to achieved via semantic markup and metadata annotations
be truly at work within a system, there must be a knowledge that describe content and functions. (Ishaya, 2005) 9:
model of some part of the world that is used by one or more A mesh of information linked up in such a way as to be
applications at execution time. (Kapetanios, 2005) easily processable by machines, on a global scale. You can
think of it as being an eficient way of representing data
Semantic Web on the World Wide Web, or as a globally linked database.
1: A vision of how the World Wide Web could be more (Roldn-Garca et al., 2005) 10: Provides a common
intelligent, based on meta-tagging the content, together framework that allows data to be shared and reused across
with the ability to inference automatically how different application, enterprise, and community boundaries. It is
Web objects are related to one another. (Woods et al., a collaborative effort led by W3C with participation from
2006) 2: A Web that includes documents or portions a large number of researchers and industrial partners. It
of documents describing explicit relationships among is based on the Resource Description Framework, which
things and containing semantic information intended for integrates a variety of applications using XML for syntax
automatic processing by our machines. (Garca et al., 2006) and URIs for naming. (Raisinghani & Sahoo, 2006) 11:
3: An extension of the current Web in which information The vision for a World Wide Web in which resources are
is given well-deined meaning, better enabling computers described with metadata expressed in languages oriented
and people to work in cooperation. Berners-Lee said that to machine- processing, thus enabling advanced services
in the context of the Semantic Web, the word semantic based on those descriptions. (Sicilia & Garca-Barriocanal,
meant machine processable. He explicitly ruled out 2006)
the sense of natural language semantics. For data, the
semantics convey what a machine can do with that data. Semantic Web Architecture
(Aldana Montes et al., 2005) 4: An extension of the current A layered architecture proposed by Berners-Lee for the
Web where information resources are attached with Semantic Web applications. In this architecture, ontologies
metadata to support people and computers as they work occupy a central place: they are built on the top of the
in cooperation. The metadata are intended to give well- Resource Description Framework (RDF) layer, which is
deined meaning to resources and to support automated in turn built on the top of the XML layer. The XML/RDF
reasoning about the meaning and trustworthiness of base constraints the particular format ontologies assume
resources. (Lyytikinen et al., 2005) 5: An extension of the in a Semantic Web context, inheriting, for example, all the
current World Wide Web, proposed by Tim Berners-Lee, well-known XML verbosity. (Zarri, 2006b)
in which information is given a well-deined meaning.
The Semantic Web would allow software agents, as well Semantic Web Rule
as humans, to access and process information content. Still a hot topic in a Semantic Web context. The present
(Banerjee et al., 2005) 6: An extension to the Web where proposals (like RuleML, TRIPLE, or SWRL) are based
information has well-deined meaning. Semantic Web on an expansion of the classical logic programming
services describe Web services capabilities and content paradigm where the inferential properties of Prolog/
in a computer interpretable language, and improve the Datalog are extended to deal with RDF/OWL knowledge
quality of the existing tasks, including Web services bases. Examples of Semantic Web rules in RuleML are the
discovery, invocation, composition, monitoring, and derivation rules (i.e., rules used to automatically deining
recovery. (Zhang, 2006) 7: Provides a common framework derived concepts), the reaction rules (for specifying the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
606 Se m a nt ic We b Se r vic e Se m i-Fra gile Wat e r m a rk ing
reactive behavior of a given system in response to speciic Semantically Modeled Enterprise Database
events), the transformation rules (used to implement A database that is a relection of the reality of the activities in
S translators between different versions of RuleML, and which an enterprise engages, and the resources and people
between RuleML and other rule languages like Jess), and involved in those activities. The semantics are present in
so forth. (Zarri, 2006b) the conceptual model, but might not be readily apparent
in the implemented database. (Dunn & Grabski, 2005)
Semantic Web Service
1: A Web service is a Web site that does not simply Semantics
supply static information, but that also allows automatic 1: In a language, it is the meaning of a string, as opposed
execution of some actions (services), like the sale of a to syntax, which describes how the symbols of the
product or the control of a physical device. To do this, Web language are combined. Most programming languages
services make use of XML-based standards like WSDL, have their syntax deined formally (traditionally in
a description protocol, and SOAP, a messaging protocol, BNF), while formal speciication languages have also
characterized by a low level of semantic expressiveness. their semantics deined formally. (Dasso & Funes, 2005)
For example, WSDL can describe the interface of the 2: Information should be in a form which is intelligible
different services, and how these services are deployed via to those receiving it. (Kisielnicki, 2006) 3: Property that
SOAP, but it is very limited in its ability to express what collects UD speciications and that should be preserved
the overall competences of this service are. Semantic Web in the transformation schemata for all methodology
services are Web services that can specify not only their phases. (Cuadra et al., 2005) 4: Study of meaning. Data
interfaces, but also describe in full, under the form of OWL- semantics is the meaning denoted by some data. (Gillman,
based ontologies, their capabilities and the prerequisites 2006) 5: The branch of linguistics that studies meaning
and consequences of their use. For example, OWL-S is in language. One can distinguish between the study of
a speciication, in the form of an ontology, intended to the meanings of words (lexical semantics) and the study
describe different Semantic Web service features, enabling of how the meanings of larger constituents come about
Web users and software agents to automatically discover, (structural semantics). In the study of language, semantics
invoke, select, compose, and monitor Web-based services. is concerned with the meaning of words, expressions,
(Zarri, 2006b) 2: Web service that incorporates semantic and sentences, often in relation to reference and truth.
metadata that describe Web services and how to use them Meta-semantic theories study key semantic notions such
in a standard way in order to achieve the automation of as meaning and truth, and how these notions are related.
Web services. (Moser & Melliar-Smith, 2006) (Galitsky, 2005c) 6: The meaning of expressions written in
some language, as opposed to their syntax, which describes
Semantic-Based Image Retrieval how symbols may be combined independently of their
A branch of CBIR based on descriptions with semantic meaning. (Ras & Dardzinska, 2005) 7: The purpose of
meaning and considered at a high abstraction level. semantics is to assign a meaning to syntactical elements.
Semantic descriptions are more closely related to the For Web services, it is the agreed-upon meaning of data,
human interpretation and understanding of images. (Y.-J. functions, QoS, and so forth exchanged between two or
Zhang, 2005a) more services. (Cardoso, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se m i-H one st Adve rsa r y Se m iot ic Le a r ning 607
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
608 Se m iot ic s Se nsor a nd Ac t uat or N e t w ork
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se nsor Dat a ba se Se que nt ia l Signat ure File 609
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
610 Se que nt ia l Z e roing of We ight s Se r vic e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se r vic e Ac c e ss Point Se r vic e -Leve l Agre e m e nt (SLA) 611
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
612 Se r vic e -Orie nt e d Archit e c t ure (SOA) Se ssion La ye r
renegotiation. (Beaumont, 2005) 4: A formal agreement management. (Nichols & Chen, 2006) 8: A service is an
(between a service provider and its customers) describing information technology function that is well deined, self-
S the level of service quality (e.g., availability, performance, contained, and does not depend on the context or state
timeliness) that will be provided. (Nichols & Chen, of other services. A service-oriented architecture is an
2006) 5: A contract between a supplier and a customer approach to building information technology systems as a
that identiies: (1) services supported at each of three collection of services which communicate with each other.
layersapplication, host (system), and network; (2) The communication may involve either simple data passing
service parameters for each service; (3) levels of service between services, or it could involve infrastructure services
quality; and (4) liabilities on the part of the supplier and which coordinate service interaction. SOA is seen as a
the customer when service quality levels are not met. (D. core component of ubiquitous computing infrastructures.
Kim, 2005) 6: An agreement between an Internet service (Roussos & Zoumboulakis, 2005) 9: A design pattern for
provide and a customer regarding the type and quality of the construction of information systems. Its value lies in
the provided services. (Shuaib, 2005) the fact that it can abstract enterprise architectures using
the concept of the so-called Service Busthat is, a shared
Service-Oriented Architecture (SOA) communications medium on which services may connect
1: A component model that integrates the different to and use in a plug-and-play manner. This is the equivalent
functional units of an application (services) through well- of a bus in a computer architecture, which provides the
deined interfaces and contracts between those services. foundation for core and peripheral components to connect
The interface is independent of the hardware, operating and communicate transparently with each other. Different
system, and programming language. (Chan & Kellen, internal and external systems may connect to the bus
2006) 2: Allows the designing of software systems that transparently. (Tsekouras & Roussos, 2006)
provide services to other applications through published
and discoverable interfaces, and in which the services Session
can be invoked over a network. (Jain & Ramesh, 2006) 1: A delimited sequence of page views attributed to a single
3: An architectural style, according to which application user during a single visit to a site. (Mobasher, 2005b) 2: A
functionality is not provided by one large monolithic single visit of a user to a Web server. A session consists of
application, but is provided by services that can be all log records of the visit. (Fu, 2005) 3: Flow of IP data
combined to get the required functionality. (Verbraeck packets between the end user and the network. (Louvros
et al., 2006) 4: An abstract pattern that applies to a et al., 2006)
wide variety of Web services situations. SOA deines an
architecture consisting of three roles (service provider, Session-Initiation Protocol (SIP)
service registry, and service requestor) that can be A signaling protocol for Internet conferencing, telephony,
fulilled or implemented by a variety of techniques. SOA presence, events notiication, and instant messaging. (Yang
also deines the contracts between these roles in terms of et al., 2005a)
three operations: publish, ind, and bind. (Zhang, 2006)
5: A software architecture that starts with an interface Session Key
deinition and builds the entire application topology Crypto key intended to encrypt data for a limited period of
as a topology of interfaces, interface implementations, time, typically only for a single communications session
and interface calls. (Protogeros, 2006) 6: Essentially a between a pair of entities. Once the session is over, the
collection of services. These services communicate with key will be discarded and a new one established when
each other. The communication can involve either simple a new session takes place. For performance reasons, a
data passing or it could involve two or more services random session key is generated for use with a symmetric
coordinating some activity. Some means of connecting algorithm to encode the bulk of the data, and only the
services to each other is needed. (Wan et al., 2006) 7: session key itself is communicated using public key
Represents a computational paradigm wherein services encryption. (Chim, 2006)
(commonly Web services) become the basic building blocks
for service compositions that address speciic business Session Layer
process needs. The service-oriented paradigm consists Layer 5 of the OSI model. Manages a logical connection
of three layers of technology, addressing requirements (session) between two communicating processes or
from low-level technical speciication to high-level service applications. (Ngoh & Shankar, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Se ssion Obje c t Sha pe Fe at ure 613
SET: See Secure Electronic Transaction. Setup Message: See Control Packet.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
614 Sha pe -Ba se d Sim ila rit y Se a rch Sha re d Re pe r t oire
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sha re d Whit e boa rd Shor t M e ssa ge Se r vic e (SM S) 615
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
616 Shor t Te r m Signat ure , Ele c t ronic
Teo, 2005) 10: Similar to paging, SMS is a service for Shrinkwrap Agreement
sending short text messages to mobile phones. (Patrick Derives its name from software contained in a box wrapped
S et al., 2006) 11: Allows the sending of short messages to in plastic (shrinkwrapped). The agreement pertaining
and from mobile phones, and by Internet. (D. Stern, 2005) to the software is either printed on the box and readable
12: A text message service that enables users to send short through the plastic, or there is a notice that the agreement is
messages (160 characters) to other users and has the ability contained within the box. In either event, opening the box
to send a message to multiple recipients. This is known and installing and using the enclosed software is considered
as texting. It is a popular service among young people. acceptance of the terms of the agreement. The shrinkwrap
There were 400 billion SMS messages sent worldwide agreement has evolved into the Clickwrap Agreement, as
in 2002 (Garrett, 2006b) 13: Mobile phone text message well as the Browsewrap Agreement. (Sprague, 2005)
protocol. (Whateley et al., 2005) 14: A service giving the
capability to a mobile-phone user to send a text message Signal
to another user. (Ververidis & Polyzos, 2006) 1: Detectable transmitted energy that can be used to carry
information. A time-dependent variation of a characteristic
Short Term of a physical phenomenon, used to convey information.
Timeframe of a year to accomplish recommendations. Since the works of the French mathematician Jean Baptiste
(Raisinghani & Rahman, 2005) Fourier (1768-1830), we know that each signal can be
represented equally well as a time-varying function or as
Short-Term Memory a sum of sinusoids of different frequencies. Therefore, to
1: The place where information is processed before the each signal can be associated a frequency bandthat is,
information is transferred to long-term memory. The the portion of the spectrum comprising all the frequencies
duration of short-term memory is very short, so information of the sinusoidal components of the signal. (Ragazzi, 2005)
must be processed eficiently to maximize transfer to 2: Any physical quantity that varies with changes of one
long-term memory. (Ally, 2005c) 2: A type of memory or more independent variables, which can be any physical
store where conscious mental processing occurs, that is, value, such as time, distance, position, temperature, and
thinking. Short-term memory has a limited capacity and pressure. (Jovanovic-Dolecek, 2005a)
can be overwhelmed by too much information. Also called
Working Memory. (Boechler, 2006b) Signal Compression
Signal coding that allows a reduction of the total number of
Shot bits required to represent a given signal without distortion
A sequence of images in which there is no change of or with negligible distortion. (Perez-Meana & Nakano-
camera. (Swierzowicz, 2005) Miyatake, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Signature Identiier Similarity Relation 617
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
618 Sim ila rit y Tra nsfor m at ion Sim ple Ra ndom Sa m pling
Similarity Transformation includes two main software entity types: managers and
A group of transformations that will preserve the angles agents. (Pulkkis, Grahn, & strm, 2005)
S between any two curves at their intersecting points. It is
also called equi-form transformation, because it preserves Simple Object Access Protocol (SOAP)
the form of curves. A planar similarity transformation 1: A lightweight protocol for exchange of information
has four degrees of freedom and can be computed from a in a distributed computing environment. It is an XML-
two-point correspondence. (Y.-J. Zhang, 2005b) based protocol that consists of three parts: an envelope
that deines a framework for describing what is in a
Simple Average Weighting message and how to process it, a set of encoding rules for
A simple linear average of the forecasts, implying equal expressing instances of application-deined data types,
weights for combination of forecasts. (C.K. Chan, 2005) and a convention for representing remote procedure
calls and responses. SOAP can potentially be used in
Simple Data combination with a variety of other protocols, such as
Data consisting of its identiier and a ield describing a HTTP. (Zhang, 2006) 2: A standard protocol that deines
single attribute (parameter, property, etc.) of an object. the way in which information is formatted and packaged
(Kulikowski, 2005) before it is exchanged. (Moser & Melliar-Smith, 2006) 3:
The communication protocol that satisies the required
Simple Environment characteristics used in Web services. It is based on XML,
Monitoring environments in which the threshold levels and has the GET and POST capabilities of HTTP. (Kasi
either seldom change or only change over the longer term; & Young, 2006) 4: The current industry standard for
the identiication of the variance fulills the conditions XML-based messaging in Web services. SOAP consists
of necessary and suficient evidence to determine an of three parts: an envelope that deines a framework for
instance of non-compliance; and the decisions, needed to describing the contents of a message, a set of encoding
determine if events comply, lie on the structured to highly rules for expressing instances of application-deined
structured portion of the decision-making continuum. data types, and a convention for representing remote
Decision making in this environment is ex-ante, made of procedure calls. (Chan & Kellen, 2006) 5: Describes
a single step, and the constraints are all predetermined. how an application talks to a Web service, and asks it
(Goldschmidt, 2005) to perform a task and return an answer. (Hwang, 2005)
6: A protocol that applications use to communicate in a
Simple Forgery distributed environment. SOAP can be used to exchange
Forgery in which the semantics of the signature are the data between applications created using any programming
same as that of the genuine signature, but the overall shape language and deployed on a computer running on different
differs to a great extent, since the forger has no idea about platforms. (Sethi & Sethi, 2006a) 7: An XML-based
how the signature is done. (Chakravarty et al., 2005b) message protocol used to encode information in Web
service requests and response messages before sending
Simple HTML Ontology Extension (SHOE) them over a network. SOAP messages are independent of
A knowledge representation language that allows Web any operating system or protocol and may be transported
pages to be annotated with semantics. (Kapetanios, using Internet protocols (SMTP, MIME, and HTTP).
2005) (Nicolle et al., 2005) 8: The messaging protocol that
facilitates Web services to invoke a software method in
Simple Mail-Transfer Protocol (SMTP) remote systems. (Nichols & Chen, 2006)
A protocol for sending e-mail messages between servers.
Most e-mail systems that send mail over the Internet use Simple Random Sampling
SMTP to send messages from one server to another. In Selecting at random elements of the population to be
addition, SMTP is generally used to send messages from studied. The sample S is obtained by selecting at random
a mail client to a mail server. (Yang et al., 2005a) single elements of the population P. (Lutu, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sim ple Ra ndom Sa m pling Wit h Re pla c e m e nt (SRSWR) Sim ulat ion Tool 619
Simple Random Sampling With Replacement natural computers. (de Castro, 2005) 5: The process of
(SRSWR) imitating a real phenomenon with sets of mathematical
A method of simple random sampling where an element formulae representing the key determining factors using
S
stands a chance of being selected more than once. (Lutu, a computer. With reference to learning technology, the
2005) user (student) is presented with a range of variables; the
output (usually a graphical display) represents the effect
Simpliication of Integrity Constraints on the underlying formula of altering one or more of these
Steps taken in order to reduce complexity and costs of variables. (Sieber & Andrew, 2005)
integrity checking. (Decker, 2005)
Simulation Environment
Simulacrum A computing environment for realizing and executing a
A Latin word originally meaning a material object simulation model, giving output values corresponding to
that represents or signiies a thing. In Simulacra and states of behavior in the physical, real system. (Vitolo &
Simulations, Jean Baudrillard (1983) used the term to Coulston, 2005)
designate the image that originally signiies a basic
reality, but eventually detaches itself from it and creates Simulation Game
hyperreality. (Park & Lepawsky, 2006) 1: An organized procedure involving particular building
blocks allowing participants to improve communication
Simulated System about complex problems by providing a safe and controlled
A simpliied, computer simulation-based construction environment to experiment with different interventions
(model) of some real-world phenomenon (or the problem under varying circumstances by means of models
task). (Qudrat-Ullah, 2006) representing these complex problems. (Achterbergh,
2005a) 2: Games in which important aspects of a system are
Simulation modeled so that game participants can engage in activities
1: An analysis technique capturing the behavior of a and deal with events that are comparable to those that
system as mathematical and logical algorithms into system participants would encounter. (Oravec, 2005)
a model. The model is represented and realized in
an environment where the resultant behavior of the Simulation in Education
model can be captured, analyzed, and used to further Simulation is an application used to imitate real-life events.
the understanding of the system. Simulation is not an Real-life events are very complex; the more sophisticated
optimization technique, but can be used with sensitivity the simulation application, the more representative the
analysis to probe the parameter space of the underlying simulation. The leaner can use the application to manage
system. The computational execution of a simulation model the event by manipulating factors and observing the
in a simulation environment according to an experimental results of simulation, thus realizing the impact of each
design. (Vitolo & Coulston, 2005) 2: A dynamic model factor on the simulation. It is dificult for the teacher to
of a system focusing on selected aspects of that system. show learners real-life events, and simulation application
(Pendegraft, 2005) 3: Imitation of the behavior of some provides the best opportunity for learners to understand
existing or intended system, or some aspect of that abstract scientiic concepts, such as virus reproduction or
behavior. (Yong & Choo, 2005) 4: Metaphorical model organization management. (Yang, 2005)
that stands for something else and may cover different
levels of idelity or abstraction, which can be performed Simulation Model
by physical modeling, by writing a special-purpose The representation of a system in terms of the fundamental
computer program, or by using a more general simulation components, relationships, and interactions of its behavior,
package that is probably still aimed at a particular kind of captured as mathematical and logical algorithms. (Vitolo
simulation. Computer simulation is pervasive in natural & Coulston, 2005)
computing. It has been used to design problem-solving
techniques that mimic the behavior of several biological Simulation Tool
phenomena; it has served to drive synthetic environments Technology designed to support the modeling of
and virtual worlds, and it has been used to simulate qualitative and quantitative information. The key feature
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
620 Single Cha nne l Pe r Ca rrie r (SCPC) Sit uat iona l Asse ssm e nt
includes the capability to identify potential scenarios and a matrix of eigenvectorsthe same as those obtained
and effectively communicate complex ideas through by PCA. (Thomasian, 2005b) 2: Algorithm able to compute
S graphical representations, animations, and low charts. the eigenvalues and eigenvectors of a matrix; also used
(Chua, 2006) to make principal components analysis. (Liberati et al.,
2005)
Single Channel Per Carrier (SCPC)
In SCPC systems, each communication signal is Sink
individually modulated onto its own carrier, which is A representation of a stock into which lows are leaving
used to convey that signal to the end user. It is a type the boundary of the system. (Casado, 2005)
of Frequency Division Multiplexing/Frequency Time
Division Multiplexing (FDM/FTDM) transmission where SIP: See Session-Initiation Protocol.
each carrier contains only one communications channel.
(Rahman, 2005d) Site Map
1: An electronic representation of the documents in a
Single Instance hypertext and sometimes the links connecting them. Site
A one-time full-ledged company-wide initial operation maps may appear as simple overviews or as interactive
of a system, as opposed to incremental (functionally or tools in which each entry serves as a link to the page
organizationally) or modular implementations. (Sarkis & it represents. (Shapiro, 2006) 2: An overview of all
Sundarraj, 2005) information on the site to help users ind information
faster. (Falk & Sockel, 2005)
Single Nucleotide Polymorphism (SNP)
The same sequence from two individuals can often be Site Organization
single base pair changes. Such change can be useful genetic The structure and navigational ease of a Web site. (Gao,
markers and might explain why certain individuals respond 2005a)
to certain drug while others do not. (Ge & Liu, 2005)
Site Speciication
Single-Channel Hypothesis A design document for a Web site specifying its objectives
A model of attention that assumes that some mechanisms and functionality. (T.S. Chan, 2005)
can process only one task at a time in a serial fashion.
Some mechanisms have structural limitations (e.g., eyes Situated Learning
can only point to one place). Multiple tasks are processed 1: Learning that results from activities taking place in a real-
within some timeframe by attention switching between life particular context. It is a synonym for apprenticeship
tasks. (Owen, 2006b) and emphasizes the real-life learning aspects of knowledge
generation. (von Wartburg et al., 2006) 2: Situated learning
Single-Hop is involved when learning instructions are offered in
Direct communication between two nodes or entities genuine living contexts with actual learning performance
without any intermediate station or network entity. (Erbas, and effective learning outcomes. (Kwok Lai-yin & Tan
2005) Yew-Gee, 2005) 3: The creation of an environment where
groups of students can, and do, explore and analyze, think
Single-Loop Learning: See Double-Loop Learning. and relect, propose and act in the context of everyday
situations. (Askar et al., 2005)
Single-Mode Distance Teaching University
One of several universities that were founded solely for Situation Model
teaching distant students. Most of these universities were The mental representation of text created by readers. It is
established in the early 1970s and have followed the model based on information in the text as well as prior knowledge
of the British Open University. (Guri-Rosenblit, 2005a) and experience. (Ingram & Hathorn, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sit uat iona l Cont ex t Sla nt 621
supporting context, knowledge, information, and data. and memory problems involved and the poor opportunities
(Maule, 2006) for practicing, which in turn breeds the dread that either
the expensive hardware or its user may get damaged in
S
Situational Context one way or another (for instance, money can be transferred
The details that make the situation unique for the user. inadvertently to a wrong account). (Kalvet, 2005)
(Albers, 2006)
Skin Color Estimation
Size A breakthrough in face detection and segmentation was
1: Indicated by counting the members of a community the representation of skin color with a Gaussian model in
or a network; size is always used as a relative measure to a subset of the CrCb space, irrespectively of the actual
compare different social entities and not as an absolute skin color of the subject. (Karpouzis et al., 2005)
one. (Meller-Prothmann, 2006a) 2: The size of a network
is indexed by counting its members (nodes). (Meller- Skinner Box
Prothmann, 2006b) Most of Skinners research was centered around the
Skinner box. A Skinner box is an experimental space
Skeleton, Muscle, and Skin (SMS) that contains one or more operands such as a lever that
An animation framework based on Bone-Based Animation may be pressed by a rat. The box also contained various
(BBA). (Prteux & Preda, 2005) sources of stimuli. Skinner contributed much to the
study of operant conditioning, which is a change in the
Sketch probability of a response due to an event that followed
A basic construct of categorical logic. Roughly, it is a the initial response. Changes in behavior are the result of
directed graph in which some diagrams are marked with an individuals response to events (stimuli) that occur in
predicate symbols taken from a predeined signature. the environment. In his early career, Skinner started with
A sketch morphism is a mapping of the underlying experimenting with animals such as pigeons and rats. He
graphs compatible with marked diagrams. A fact of later turned his research interests from animals to humans,
fundamental importance for generic MMt is that any especially his own daughters. (I. Chen, 2005)
meta-model (relational, XML schema, a speciic sort of
ER or UML diagram) can be speciied by a sketch. Then Skip-Out
the corresponding universe of models (relational schemas, A student who has not enrolled in a course for a small
XML DTDs, ER diagrams) can be presented as the category number of semesters (usually one or two semesters) after
of instances of the corresponding sketch. It allows applying successfully completing at least one course. (Chyung,
many CT ideas and results to MMt. (Diskin, 2005) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
622 Slat e Sm a ll Fir m
calculated using the total number of positive, negative, of assets or turnover. (Iacob et al., 2005) 3: A business
horizontally, or vertically slanted pixels. (Chakravarty enterprise independently owned by contributing most
S et al., 2005a) of the operating capital and managed by the owners or
managers, having fewer than 250 employees and a small-
Slate to-medium market share. (Rashid, 2005) 4: Small and
A tablet PC coniguration where the entire device lays lat medium-sized enterprises are socially and economically
on a table or can be held by a user in the same manner that important, since they represent 99% of all enterprises
a clipboard or notebook would be held. (Roldan, 2005) worldwide and contribute to entrepreneurship; innovation;
and economic, social, and cultural development. Precise
Slice deinitions that separate SMEs from large enterprises
Restricting the area of interest to a single value along a differ between countries and rely on variables such as
given dimension. (Deshpande & Ramasamy, 2005) headcount, turnover, and balance sheet size. (Demediuk,
2005) 5: A company which employs a limited number of
Slice and Dice people and which has a certain turnover, with the numbers
1: Another term for multi-dimensional analysis. When varying among countries. (Hin & Subramaniam, 2005c)
data has three (or more) dimensions, it can be thought 6: Enterprise with a speciic number of staff. A small
of as being arranged in a cube (or hypercube), with each size enterprise generally refers to irms with less than 20
side representing a dimension. When the data is analyzed, employees. (Braun, 2006)
part of the cube can be sliced off or diced to get to an
individual cell. (Raisinghani & Nugent, 2005) 2: Typical Small Business
OLAP operation by which speciic subparts (slices) of 1: Can be measured by number of employees, annual
the data cube are selected and arranged for visualization. turnover, and/or assets. It usually represents those
(Tininini, 2005c) businesses with up to 20, 50, or 100 employees (depending
upon the region being investigated). This term encompasses
Sliding Window micro-businesses. (Burgess, 2005) 2: The commonly
A time series of length n has (n-w+1) subsequences of adopted deinition of a small business is that the irm
length w. An algorithm that operates on all subsequences size should be less than 500 employees. However, there
sequentially is referred to as a sliding window algorithm. are other interpretations of how small a business should
(Denton, 2005) be to be considered a small business, including irm sizes
of less than 100 (The Netherlands), 50 (Ireland), or even
Slope Analysis 20 (Australia). Business turnover, management, and
The plotting and visualization of certain operating organizational structure, as well as other supplementary
functions in order to discern trends, often before others see criteria, are also used by some authors. (Poon, 2005) 3:
them, thereby permitting alteration of strategies in order Various categories may be employed to deine this term.
to gain competitive advantage. (Nugent, 2005) Some examples are as follows: Employees: micro-business:
0-10 employees; small business: 10-50 employees; medium
Small and Medium Enterprise (SME) business: 50-250 employees. (Hunter, 2005)
1: The deinition of small and medium enterprises varies
from country to country. If the deinition is based on Small Firm
number of employees, SMEs in the U.S. have from 1 to There is no universal deinition for this term. Most
499 employees. The dividing line between a small and deinitions are based on the number of employees, but
medium business is variously deined as being either 50 some deinitions include sales revenue. For example, 20
or 100 employees. (Archer, 2005) 2: A heterogeneous employees is the oficial deinition in New Zealand, while
group, including a wide variety of enterprises, having very in North America, a irm with 500 could be deined as
different levels of sophistication (in terms of products and a small irm. Another important aspect of any deinition
services offered, and skills of the workers), and operating of small irm is the irms independence: a small irm
in various markets and institutional environments. The is typically considered to be independent, that is, not a
quantitative deinition of SMEs varies by country and is subsidiary of another irm. (Cragg & Suraweera, 2005)
usually based on the number of employees and the value
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sm a ll For m Fa c t or Sm a r t Phone 623
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
624 Sm a r t Se nsor SOAP
2005b) 3: A term used for the combination of a mobile SMWT: See Self-Managed Work Team.
cellular telephone and PDA in one small portable device.
S These devices usually use a small thumb keyboard or an SN: See Segmented Network.
electronic pen (or stylus) and a touch-sensitive screen for
data input. (Garrett, 2006b) SNCE: See Suspected Non-Compliance Event.
SmartSTOR Snooper
A scheme where the disk array controller for multiple An entity within the organization (vs. a hacker who is
disks assists the host in processing database applications. from the outside) that gains or attempts to gain access to a
(Thomasian, 2005a) system or system resource without having the authorization
to do so. (Wilson et al., 2006b)
SMC
Computes a function f (x1, x2 , x3 xn) that holds inputs Snowlake Model
from several parties, and at the end, all parties know about A variant of the star schema in which dimension tables do
the result of the function f (x1, x2 , x3 xn) and nothing not contain denormalized data. (Kontio, 2005)
else. (Ashrai et al., 2005)
Snowlake Schema
SME: See Small and Medium-Sized Enterprise. 1: A database schema with a fact table and a set of dimension
tables. There are multiple tables per dimension, with
SM IL: See Synchronized Media Integ ration each table storing one level in the dimension hierarchy.
Language. (Deshpande & Ramasamy, 2005) 2: A dimensional
model having some or all of the dimension tables
Smooth-Shading Technique normalized. (Delve, 2005) 3: A schema for organizing
Interpolative technique that restores the smoothness of multi-dimensional data, where we have many levels in
solids whose surfaces are represented by planar polygons. each dimension and there can be alternative paths for
(Cottingham, 2005) aggregation. This schema is the most usual for designing
data marts. (Hernandez-Orallo, 2005a) 4: Star schema in
Smoothing which the dimension tables have been normalized, possibly
Adjustment of mortality rates using a combination of the leading to the creation of several tables per dimension.
knowledge about the rate in each area and the knowledge (Badia, 2005c)
about the rates in surrounding areas. The smoothing
removes the noise in disease maps and allows the SNP: See Single Nucleotide Polymorphism.
assessment of speciic hypotheses concerning incidence
or mortality. (Vidal-Rodeiro et al., 2005) SNR: See Signal-to-Noise Ratio.
SMR: See Standardized Mortality Ratio. SO Provider: See Specialist E-Fulillment Provider.
SMS: See Short Message Service; Skeleton, Muscle, SOA: See Service-Oriented Architecture.
Skin.
SOAP: See Simple Object Access Protocol.
SMTP: See Simple Mail-Transfer Protocol.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soc ia l Ac c e ss Soc ia l Com plex Re sourc e Com binat ion (SRC) 625
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
626 Soc ia l Conne c t ion T he or y Soc ia l Excha nge T he or y
(both outside the company, as well as inside the company), Social Contract
have suficient breadth of knowledge to grasp the overall Tacit and assumed set of conventions about human social
S phenomenon. (Potgieter et al., 2005) involvement that frames all communal associations.
(Skovira, 2005)
Social Connection Theory
Social process theory positing that individuals in online Social Data Mining
problem-solving groups use revealing, tying, and etiquette Analysis and redistribution of information from records
strategies to overcome emotional distance. (Molinari, of social activity such as newsgroup postings, hyperlinks,
2005) or system usage history. (Schafer, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Social Exclusion Social Loaing 627
outsourcing relationship between the irm and vendor by Social Interaction Possibility
taking into account prior relationships, trust, and culture, One of the possible ways to interact with the community,
and their effect on ongoing outsourcing relationships. that is, the vendor and/or other consumers. (Shan et al.,
S
(Gupta & Iyer, 2005) 3: The theory that people contribute 2006a)
to the welfare of others, either individuals, groups, or
organizations, to a degree that is commensurate with their Social Knowledge
perceptions of the contributions that are made by others Knowledge that is available to members of a social entity or
to them (over the long run). (King, 2006a) organization. Thus, it is in contradistinction to individual
knowledge, which is known only to a particular person.
Social Exclusion Thus, individual and social knowledge are opposite poles
1: A shorthand term for the complex process of exclusion of a single dimension. (Ein-Dor, 2006)
from the cultural, economic, political, and social life of the
community in which one lives. (Kenyon, 2005) 2: Term Social Learning
used to refer to all positions of social disadvantage. The 1: Learning arising from social participation, involving
term has come to replace talk of class in much government four components: learning by doing, by participation, by
discussion of social disadvantage. The weak conception of becoming, and by experience. (Wenn, 2006a) 2: Learning
social exclusion suggests that there is a need to include the based on attention, perception, and memory capacities is
excluded. Stronger conceptions of social exclusion seek signiicantly inluenced by the socialization and education
to identify the forms of oppressive inclusion by which context, and particularly by language so as to create
some are excluded from advantageous conditions. human knowledge. (Xodo, 2005) 3: Learning occurring
(David, 2005) in or by a cultural cluster, and including procedures for
transmitting knowledge and practices across different work
Social Identity situations/settings and time. (Ali et al., 2006) 4: Learning
A conception of the self consisting of: (1) self-awareness of through social interaction with other people. (Klobas &
membership in a speciic group, (2) emotional attachment Renzi, 2005b) 5: Process of constructing knowledge by
or involvement with the group, and (3) a positive or negative individuals working in groups. A shared understanding
value connotation attached to this group membership emerges from individual understanding coupled with
(i.e., group-based or collective self-esteem). These are communication or collaborative exploration of an area
sometimes referred to, respectively, as the cognitive, of interest. This style of learning generates intellectual
affective, and evaluative components of social identity. capital (knowledge that is jointly held) and social capital
(Bagozzi & Dholakia, 2005) (trust, mutual respect). (Fleming, 2005c)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
628 Soc ia l M a rke t ing Soc ia l Policy
accountable for the product. (Ingram & Hathorn, 2005b) Social Network Analysis
2: The tendency of members of groups to put in less effort 1: Data acquisition methods and computerized (typically)
S in group activities when group performance is measured techniques that enable visualization of social networks and
than when individual performance is measured. (Lam et articulation of their properties. (Smith, 2006b) 2: Depicts
al., 2006) the communication and relationships between people and/
or groups through diagrams based on social relationships
Social Marketing between a set of actors. (Lambropoulos, 2006a) 3: The
The design, implementation, and control of communication study of uncovering the patterning of peoples interaction.
programs calculated to inluence the acceptability of social (Li et al., 2006) 4: The social network perspective views
ideas and innovations. (Weber & Lim, 2005) organizations as consisting of social units with relatively
stable patterns of relationships over time. There are two
Social Message fundamental dimensions of social networks: transactional
Created to both entertain and educate so that listeners will content and coniguration. (Nelson & Hsu, 2006) 5:
increase their knowledge on educational issues, develop The systematic analysis of empirical data describing
favorable attitudes to the messages, and change their social networks, guided by formal, mathematical, and
behavior. (Craddock & Duncan, 2005) statistical theory. (Dekker, & Hendriks, 2006) 6: Tools
and techniques for identifying the patterns of connections
Social Network among individuals in exchange relations. (Smatt & Wasko,
1: A set of nodes (persons, organizations, etc.) linked 2006)
by a set of social relationships of a speciied type (e.g.,
friendship). (Smith, 2006b) 2: A set of nodes (that represent Social Network Analysis Tool
actors, groups, etc.) and the ties that connect these nodes. One of the software tools that are capable of uncovering
(Dekker, & Hendriks, 2006) 3: Interconnected people the pattern of interaction among a group of users. (Chua,
who directly or indirectly interact with or inluence one 2006)
another. (Smatt & Wasko, 2006) 4: A group of peers,
subordinates, and interconnected people who provide Social Networking
general information about what is going on within the 1: Describes the process of connecting individuals via a
organization, ask speciic advice on how to accomplish personal network such as friends and acquaintances. In QP
assignments, and obtain feedback about the consequences Corporation, social networking has been promoted for the
of different strategies. (Rahman, 2006) 5: A set of social foundation of knowledge exchange on its intranet. Social
entities (or persons) and social relationships which connect networking nurtures a trusting atmosphere for knowledge
them. (Chen, Duan, et al., 2006) 6: A set of people or groups communities on an intranet. (Yamazaki, 2006) 2: The
of people with some pattern of contacts or interactions process of connecting individuals via friends, relatives,
between them. These patterns can be friendships between and acquaintances. These networks can then branch out
individuals, business relationships between companies, and allow friends to connect with people inside their
and intermarriages between families. (Li et al., 2006) accepted social circle. (Y.-W. Lin, 2005) 3: The process
7: Group of people formed through the establishment of connecting individuals via friends, relatives and
and fruition of common interests, as opposed to skill acquaintances to develop a personal social network. See
and practice. (Huq, 2006) 8: The decision to act on any Online Social Networking. (Mew, 2006)
form of knowledge involves an intervention. Thus, to
implement any change through a community of practice Social Network for Reuse
is a micro-political process that operates through internal Organizational mechanism that emphasizes interpersonal
and external social networks. This may be geographical interactions as a source for knowledge reuse between
and/or spatial communities. (Grieves, 2006b) 9: The tight individuals and teams. (Oshri, 2006)
or loose connections between people (family, community,
associations, work, etc.) that are key to sustaining regional Social Policy
connectivity. (Jain & Lyons, 2005) The policies which governments use for welfare and social
protection. (Kenyon, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soc ia l Pre se nc e Soc ia lizat ion 629
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
630 Soc ia lizat ion Cue Soc iot e chnic a l N e t w ork
of the surrounding culture. (Adkins & Nitsch, 2005) 6: Socioemotional Digital Skill
The process by which students internalize the norms and A term describing the ability of cyberspace users to
S values necessary for living in a civilized community. function properly in this communication platform by
(Russell, 2005b) understanding the unwritten rules of knowledge sharing
in this medium. (Eshet, 2005)
Socialization Cue
One of the behaviors and actions that people may recognize Sociology of Translations
in others. Positively, they may make others seem more Another term used to refer to Actor-Network Theory.
sociable or friendly; and negatively, they may make (Tatnall, 2005b)
others seem less friendly. The potential impact for the
distance education environment is the lack of these cues. Sociology of Uses
(Martz & Shepherd, 2005) A domain of Sociology that studies how a given population
uses technical objects. Initiated by telecom operators in
Socially Constructed Process the second part of the 20th century, the ield of research
Socially organized activities undertaken by people in has been enlarged to encompass the use of any type of
organizations. Socially constructed processes may be technical object. (Blandin, 2005)
examined to achieve a greater understanding of social
phenomena by exploring the situated experiences of the Sociotechnical
persons involved in the social situations. Organizational 1: Derives from SociusLatin for associate or
management can be viewed as a socially constructed companionhere meaning society and technicalthat is,
process. (Jasimuddin et al., 2006) a solution produced by technological means, which derives
from TechnologiaGreek for systematic treatment.
Socially Constructed Reality (Coakes & Clarke, 2006b) 2: The integration of social
Created through purposeful human action and interaction, and technological systems to ensure optimal utilization
this reality is shaped by the individuals subjective of information and knowledge-based resources. (Ng &
conceptual structures of meaning. It is reconstructed Pemberton, 2006) 3: The interactive interplay between
by the human interactions that support continuous humans and artifacts in work performances. (Munkvold,
reinterpretations and change of meanings. The social 2006)
institutions are the means through which meanings are
stabilized and the social reality assumes an objective Sociotechnical Approach
appearance. (Ramos & Carvalho, 2005) 1: A paradigm in which both social and technical elements
are integrated to give a holistic view of a phenomenon.
Socialware There is a strong argument for an integrated sociotechnical
Aims to support various social activities on a network. approach to knowledge management (particularly
Rules of interpersonal communication are used and organizational management) which recognizes the active
transferred into community software. (Kindmller et participation of each organizational member in line
al., 2005) with the use of technology. (Jasimuddin et al., 2006) 2:
Sociotechnical approach means that the work practices in
Society for Worldwide Interbank Financial which information systems will be used are the starting
Telecommunications (SWIFT) points for design and implementation of the information
An international body that sets protocols and standards for systems. (Hyrinen & Saranto, 2005)
international payment systems, such as electronic money
transfers. (Saha, 2006b) Sociotechnical Method
Development method that attempts to produce systems
Socio-Organizational Function of a Telecenter that are both technically eficient and organizationally
Set of processes that a telecenter as an open social system sensitive. (Doherty & King, 2005)
carries out to strengthen and support the natural social
groups and organizations that exist in its local community. Sociotechnical Network
(Santos, 2005) The network of associations formed between human and
non-human actants. The actants are persuaded or enrolled
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soc iot e chnic a l Re se a rch Soft Syst e m s M e t hodology (SSM ) 631
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
632 Soft Te chnology Soft w a re Com pone nt
debate perceptions of the real world, taking action in the environment such as operating systems, computer
real world and again relecting on the happenings using applications, databases, networks, and virtual domains.
S systems concepts. The relection and debate is structured (Chang & Hsu, 2005) 5: Computer program characterized
by a number of systemic models of purposeful activities. by reactivity, autonomy, and proactivity. Therefore, the
These are conceived as holistic ideal types of certain software agent interacts with its environment. (Seitz,
aspects of the problem situation rather than as accounts of 2005) 6: Personalized, continuously running, and semi-
it. It is also taken as given that no objective and complete autonomous object. They can play an important role in
account of a problem situation can be provided. (Vat, cooperative telemedicine. Such agents can be programmed
2005c) 2: A general problem-solving tool that provides us for supporting medical diagnostic intelligence, and keep
with the ability to cope with multiple, possibly conlicting a watchful eye to discover patterns and react to pattern
viewpoints based on systems theory, which attempts to changes that usually occur in epidemics, and biological and
study the wider picture; the relation of component parts chemical terrorism. (Murthy & Krishnamurthy, 2005d) 7:
to each other. It uses systems as epistemological devices Piece of code that presents some unique characteristics like
to provoke thinking about the real world. (Abu-Samaha, autonomy, collaboration, and learning. (Protogeros, 2006)
2005) 3: An approach developed by Peter Checkland to 8: Software program that assists humans by automatically
analyze complex problem situations containing social, gathering information from the Internet or exchanging data
organizational, and political activities. (Sharples, 2006) with other agents based on the query provided by users.
(M. Wang, 2006) 9: A computer program that carries out
Soft Technology tasks on behalf of another entity. (Xu et al., 2006c)
Set of instructional innovations, methods, strategies, and
so forth. (Graham et al., 2005) Software Analysis
An analysis of the software in a software warehouse for
Soft Threshold software decision making (Dai, 2005b).
A fuzzy approach to decide the importance of a feature.
This is in contrast to a hard threshold where a yes/no Software Architecture
decision is made. (Sural et al., 2005) Rather like the architecture of a building, software
architecture describes the principled, structural design of
Software computer software. Contemporary software architectures
A computer program that provides instructions that tell a are multi-tier (or n-tier) in nature. Essentially, these stem
computer what to do. (Magagula, 2005) from a two-tier architecture in which user-presentation
components are separated from the information-content
Software Agent components, hence the two overall tiers. Communication
1: A self-contained piece of software that runs on an agent occurs through a standard interface between the tiers.
framework with an intended function to accomplish a This enables the easy swapping in and out of presentation
simple goal. (Zwitserloot & Pantic, 2005) 2: A piece of components, thus enabling information to be encoded into
software that autonomously acts to carry out tasks on a the most appropriate physical form for a given user at any
users behalf. In agent-based applications, it is accepted given time. (Polovina & Pearson, 2006)
that users only need to specify high-level goals instead
of issuing explicit instructions, leaving the decisions Software Capability Maturity Model
of how and when to their respective agent. A software (SW-CMM)
agent exhibits a number of features that make it different Describes a framework that software organizations can
from other traditional components including autonomy, use to determine their ability to develop and maintain
goal-orientation, collaboration, lexibility, self-starting, software. Its use can lead to organizational improvement.
temporal continuity, character, communication, adaptation, SW-CMM can be applied by acquisition organizations to
and mobility. It should be noted that not all these features select a software contractor. (Leung, 2005)
have to embody an agent. (Maamar, 2005) 3: A piece of
autonomous or semi-autonomous, proactive and reactive Software Component
computer software. Many individual communicative A minimum manageable unit of a software warehouse that
software agents may form a multi-agent system. (Guan, can be a class or a sub-routine. (Dai, 2005b)
2006d) 4: An artiicial agent that operates in a software
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soft w a re Cont ra c t Soft w a re Proc e ss 633
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
634 Soft w a re Proje c t Sound Ca rd
building software systems. (Zhao & Deek, 2005) 2: The Software Team
development roadmap followed by an organization to Group of agents which has tasks that are tightly interrelated;
S produce software systems, that is, the series of activities these teams roughly parallel a department of employees.
undertaken to develop and maintain software systems. (Durrett et al., 2005)
(Ferre et al., 2006)
Software Tool
Software Project This term generally refers to a computer program or
An educational activity in which students are required to software package. (Sarkar, 2005)
develop or specify a program following guidelines and
requirements that were previously established. (Moreira Software Warehouse
& da Silva, 2005) The repository of software components that can be in
different languages, collected from multiple sources,
Software Quality stored under a uniform schema, managed using particular
A quality model (ISO/IEC 9126-1, 2001) categorizes strategies, and can provide well-organized services for
software quality attributes into the following six software reuse, thus facilitating automatic software
characteristics that are again subdivided into sub- engineering. (Dai, 2005b)
characteristics. The characteristics are speciied for certain
conditions of the software product: (a) functionality: the Software Warehouse Application Management
software product provides functions which meet needs; (b) System
reliability: the software product maintains performance; A component of a software warehouse system for the
(c) usability: the software product should be understood, management of the application of the software in the
learned, used, and attractive to user; (d) eficiency: the software warehouse. (Dai, 2005b)
software product provides appropriate performance relative
to the amount of resources used; (e) maintainability: the Software Warehouse Architecture
software product should be modiiablemodiications The organization and components of a software warehouse.
include corrections, improvements, or adaptations; and (f) (Dai, 2005b)
portability: the software product can be transferred from
one environment to another. (Hvannberg et al., 2006) Software Warehouse Management System
A component of a software warehouse system for the
Software Quality Assurance management of software in the warehouse. (Dai, 2005b)
Methods and approaches to ensure that a software system
meets speciied requirements, and customer or user needs Solenoid
or expectations. (Zhao & Deek, 2005) A coiled length of wire such that when an electric current
is passed through it, a magnetic ield is developed along
Software Requirement the axis of the coil. This magnetic ield may in turn be
An expression of the needs and constraints that are placed used to attract or repel other magnets or ferro-magnetic
upon a software product that contribute to the satisfaction materials. (Lahiri & Basu, 2005)
of some real-world application. (Ferre et al., 2006)
SOM: See Self-Organizing Map.
Software Requirements Speciication
A document that contains all requirements, for example SONET: See Synchronous Optical Network.
functional and non-functional requirements and project
issues, of the system as agreed upon by customers and SOTrieIT: See Support-Ordered Trie Itemset.
software developers. (Aurum, 2005)
Sound Card
Software System Development Methodology A device that can be attached to a computer in order to
Deines techniques and mechanisms, as well as the process obtain audible sound (e.g., voice or music) other than the
steps to go about developing software systems. (Solberg beeps emitted from the PC speaker. The sound card may
et al., 2005) in turn be connected to external ampliiers and speakers.
(Lahiri & Basu, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Soundsc a pe Spa m 635
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
636 Spa m Ele c t ronic M a il Spat ia l Dat a M ode l
been used in opposition to the term ham, which is wanted Spatial Analysis
e-mail. The term was developed from a Monty Python Using geographic data to mathematically model the
S comedy sketch depicting spam as useless and ham as lovely, relationship between measures such those mentioned
albeit in ironic terms. (de Freitas & Levene, 2006a) 2: above, that is, alcohol outlets and violence. (Lipton et
Unsolicited e-mail that is sent to large numbers of people al., 2005)
to promote products or services. (Rosson, 2006)
Spatial Autocorrelation
Spam Electronic Mail The measure of similarity between values (for a given
Unsolicited and unwanted bulk e-mail. Identifying spam variable, e.g., income) located in space. Similarity of
e-mail is a text classiication task. (Bickel & Scheffer, values in spatial proximity may indicate some underlying
2005) mechanism that is spatial in nature and contributes to the
spatial pattern of the predictor variable. Controlling for
Spamdexing spatial autocorrelation reduces statistical bias in parametric
The promotion of irrelevant commercial pages by taking modeling. (Lipton et al., 2005)
advantage of the search algorithms used by search engines.
(Kasi & Jain, 2006) Spatial Cluster
A greater-than-expected geographically close group of
Spanning Tree (ST) occurrences or events (e.g., deaths, crashes, alcohol outlets).
A virtual path from the source to every receiver, also called (Lipton et al., 2005)
multicast distribution tree. (Hossz, 2006)
Spatial Clustering
Sparse Cube Storage techniques to place data items which have spatio-
A cube is sparse if a high ratio of the cubes possible temporal proximity at neighbored storage locations. Based
cells does not contain any measure value. (Abdulghani, on the assumption that data access patterns convey some
2005a) locality behavior, access performance can be improved.
(Baumann, 2005)
Sparse Data
Data that has metric values for a very small percentage Spatial Consistency
of all possible combinations of the dimension values. Refers to the agreement between data representation and
(Deshpande & Ramasamy, 2005) a model of space. (Rodrguez-Tastets, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Spat ia l Dat a Type Spat ia l Que r y 637
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
638 Spat ia l Que r y Proc e ssing Spe a ke r Cor ne r
Spatial Query Processing the current and past states, and the support of spatial
Focuses on extracting information from a large amount of queries that refer to present and past time-points as well.
S spatial data without actually changing the spatial database. (Tzouramanis, 2005) 2: A spatio-temporal element is a
It is different than the concept of query optimization that inite union of spatio-temporal intervals. Spatio-temporal
focuses on inding the best query evaluation plan that elements are closed under the set theoretic operations of
minimizes the most relevant performance measure (e.g., union, intersection, and complementation. Databases
CPU, I/O, etc.). (Corral & Vassilakopoulos, 2005) that support spatial objects with continuously changing
position and extent. The graphical user interfaces for spatio-
Spatial Regression temporal information, query processing in spatio-temporal
A spatial analytic technique modeling the relationship of databases, and storage structures and indexing techniques
various factors to the geographical distribution of some for spatio-temporal databases could have a strategic
attribute measured on a continuous scale. (Garb & Wait, impact on business applications such as data mining and
2005a) knowledge discovery. (Raisinghani & Klassen, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Speaker Veriication Speech Recognition 639
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
640 Speech Recognition Software Spooing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Spot Sourc ing St a ble M ode l 641
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
642 St a ble St at e St a nda rd Se t t ing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St a nda rd Te chnic a l K now le dge St at e m e nt 643
Standard Technical Knowledge measures of interest are stored in the fact table (e.g., sales,
Standard technical knowledge is task speciic, industry and inventory). For each dimension of the multi-dimensional
irm non-speciic, and involves a wide range of technical, model, there exists a dimensional table (e.g., product, time)
S
operationally oriented knowledge that is generally available that stores the information about the dimension. (Serrano et
to all actors. Examples are knowledge of inancial and al., 2005) 3: A simple database design in which dimensional
management accounting practices, knowledge of computer data are separated from fact or event data. A dimensional
programming and standard software packages, and model is another name for star schema. (Bellatreche &
knowledge of craft and engineering principles and methods. Mohania, 2005) 4: A dimensional model that is composed
(Butler & Murphy, 2006) of a central fact table and a set of constituent dimension
tables. (Pourabbas, 2005b) 5: Relational database schema
Standard User Interface that results from ROLAP; facts and dimensions are stored in
Even as implementation technology changes at any given tables. The fact table is considered the core of the resulting
time, usability is improved by following standards and database, connected to each and every dimension table.
conforming to user expectations, but over time, these When visualized with the fact table in the center and the
standards and expectations have to evolve as the technology dimension tables surrounding it, they create the igure
improves and new interface ideas are invented. (Liu & under which the schema is named. (Badia, 2005c) 6: The
Tucker, 2005) typical logical topology of a data warehouse, where a
fact table occupies the center of the data warehouse and
Standardized Data dimension tables are related to most fact table attributes.
A collection of numeric data is standardized by subtracting (Scime, 2005b)
a measure of central location (mean) and by dividing by
some measure of spread (standard deviation). (Beynon, Star Structure
2005a) Structure of a warehouse for which a fact is directly
connected to several dimensions and can be so analyzed
Standardized Mortality Ratio (SMR) according to these dimensions. It is the most simple and
Ratio of the observed mortality in a group of interest the most used structure. (Schneider, 2005)
to the expected mortality in that group, based on some
standard population. It gives information about regions State Gap and Trend Analysis
with unusually high or low numbers compared to the A tool used to present in a structured format current market
expected numbers. (Vidal-Rodeiro et al., 2005) or technology states as well as future states. This analysis
requires a one for one transitiona this to that view.
Stanford Temporal Prover (STeP) This model calls for no ambiguities. The perilous part of
A tool to support the formal veriication of reactive, real- this tool is determining how to transition the gapwhere
time, and hybrid systems. SteP combines model checking one has to be by when with what. (Nugent, 2005)
with deductive methods to allow for the veriication of a
broader class of systems. (Campos & Harrison, 2006) State Information
Information that describes the state or condition of a
Star Model physical product or information good (i.e., a stock price
A logical structure that has a fact table containing factual or the number of SKUs in inventory). (McIntosh & Siau,
data in the center, surrounded by dimension tables 2005)
containing reference data. (Kontio, 2005)
State Portal
Star Schema Vertical Web site where information refers mostly to the
1: A database schema that consists of a single fact table information of a national, state, or local entity. (Almazn
and a single table per dimension. The dimension table & Gil-Garca, 2006)
stores the entire hierarchy for that dimension. (Deshpande
& Ramasamy, 2005) 2: A relational schema whose design Statement
represents a multi-dimensional data model. A star schema The basic structure found in an RDF speciication. It
consists of one central table and several dimensional The consists of a subject, which is a Web resource represented
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
644 St at e m e nt of Applic a bilit y St e a lt h M a rke t ing
by a unique identiier, and a predicate, which is a property Static-Oriented Formal Speciication Language
that links the subject to an object which is either also a Web Does not include provisions for handling time. (Dasso &
S resource or an atomic value. (Stuckenschmidt, 2005) Funes, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St e a lt h M ode St e re o V ision Syst e m 645
Steganalysis Stemming
Discovering the existence of hidden information. Hence, 1: Finding the root form of related words, for example
its major intent is to discover hidden information and break singular and plural nouns, or present- and past-tense verbs,
the security of the carrier. (Lou et al., 2006) to be used as key terms for calculating occurrences in texts.
(Kroeze, 2005) 2: For text mining purposes, morphological
Steganography variants of words that have the same or similar semantic
1: Covered writing. It is a study of concealing the interpretations can be considered as equivalent. For
existence of a message. (K. Chen, 2005) 2: Hiding the example, the words computation and compute can be
existence of a message by hiding information into various stemmed into comput. (Fung et al., 2005)
carriers. The major intent is to prevent the detection of
hidden information. (Lou et al., 2006) 3: Steganography STeP: See Stanford Temporal Prover.
(literally meaning covered writing) dates back to ancient
Greece. It includes a vast array of methods of secret Step-Wise Regression
communications that conceal the very existence of the An automated procedure on statistical programs that adds
message. In todays computer security, steganography one predictor variable at a time, and if it is not statistically
is the science of hiding information by embedding signiicant, it removes it from the model. Some work in
messages within other seemingly harmless messages. both directions either by adding or removing from the
Steganography works by replacing bits of useless or unused model, one at a time. (Morantz, 2005)
data in regular computer iles (such as graphics, sound,
text, HTML) with bits of different, invisible information. Stereo Images
This hidden information can be plaintext, ciphertext, or Two or more images of a real objects surface obtained
even images. Unlike encryption, steganography cannot be from different points of view. (Zelasco et al., 2005)
detected. Therefore, steganography is used to supplement
encryption. An encrypted ile may still hide information Stereo Vision System
using steganography, so even if the encrypted ile is System devised to extract 3D information of a given scene.
deciphered, the hidden message is not seen. (Mezgr, 2005) Allows recovering a 3D property such as surface shape,
4: Technique that allows secret communication, usually orientation, or curvature. In binocular stereo systems, two
by embedding or hiding the secret information (called images are taken from different viewpoints, allowing the
embedded data) in other, unsuspected data. Steganographic computation of 3D structure. In trifocal, trinocular, and
methods are based on the assumption that the existence of multiple-view stereo, three or more images are available.
the covert communication is unknown, and they are mainly (Aifanti et al., 2005)
used in secret point-to-point communication between
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
646 St e re ot ype St oplist
Stereotype Stigmergy
1: Allows the creation of new types of elements of modeling, The process that mediates the interaction between animals,
S based on the elements that form the goal-pattern UML, and animals through the environment, and provides those
extending its semantics. (Riesco et al., 2005) 2: This is clues from which any agent is able to infer what to do next.
used in contrast to an archetype in that a stereotype is a (Magnani & Bardone, 2006)
way of labeling someone or something and may be positive
or negative. Stereotypes are frequently stock characters or Stochastic Screening
are clichd and lack depth or sympathy. Racial and culture A method to reproduce photographic images in printed
stereotypes are common and nearly always negative. In media by creating a random placement of very small dots
organizational work, stereotypes often occur in respect that change in frequency to create the perception of lighter
to employees, bosses, competition, and/or the customer. and darker tones. (Snyder, 2005)
(Snowden, 2006) 3: Extensions to the UML vocabulary,
allowing additional text descriptions to be applied to Stock and Flow Diagram
the notation. The stereotype is shown between chevron Consists of a set of stocks and lows, stocks representing
brackets <<>>. (Gur u, 2005) resources that either accumulate or deplete over time
through inlows and outlows. Stock and low diagrams
Stereotyping are largely used in system dynamics and rarely in systems
An evaluator bias in analytic methods in which a system is thinking approaches. (Saha, 2005)
evaluated with respect to a homogenous catch-all user not
accounting for a wide-enough range of user characteristics. Stock Ramping
(Danielson, 2006a) Also known as a pump and dump, usually involves an
organized campaign aimed at increasing (decreasing) the
Stewardship price of a particular stock by the rapid dissemination of
Management of anothers property, affairs, or data. For false or excessively optimistic (pessimistic) information
agencies, stewardship includes functions of oficials and through a variety of communication media, including
staff, such as privacy oficers and advocates, disclosure Internet discussion sites. Typically companies with
oficials, and survey managers. Stewardship carries low capitalization are targeted for this type of activity.
responsibility for data subjects personal privacy, as well (Campbell, 2006)
as data conidentiality and security. (Mullen, 2005)
Stop Words Removal
S3 Model A preprocessing step for text mining. Stop words, like
A conceptual framework for measuring the maturity level the and this which rarely help the mining process,
of a community portal. (Vrazalic & Hyland, 2005) are removed from input data. (Fung et al., 2005)
Stickiness Stopband
1: Refers to the likelihood that visitors will stay on the The frequency band that is blocked by the ilter and therefore
site for a while and be inclined to return again and again. eliminated from the output signal. (Jovanovic-Dolecek &
(Liu & Tucker, 2005) 2: The ability of a Web site to create Daz-Carmona, 2005)
both customer attraction and customer retention for the
purpose of maximizing revenue or proit. (Forgionne & Stopband Attenuation
Ingsriswang, 2005) The desired minimum attenuation in the stopband.
(Jovanovic-Dolecek & Daz-Carmona, 2005)
Stickiness of Knowledge
A characteristic of some types of knowledge is to only Stoplist
make sense in a particular or speciic context; attempts Speciic collection of so-called noise words, which tend
to disentangle or isolate such knowledge are thought to to appear frequently in documents. (Fernndez & Layos,
be made more dificult because the knowledge sticks 2005)
to its context, making its transfer more challenging.
(Connell, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St ora ge Bin St rat e gic Func t ion of t he M a na ge m e nt of Online Disc ussions 647
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
648 St rat e gic Goa l St rat e gic V ision for I nfor m at ion Te chnology
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St rat e gic V ision for t he I T Func t ion St re a m ing M edia 649
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
650 St re a m ing T im e Se rie s St ruc t ura l M ode l
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
St ruc t ura l Re st ric t ion St ruc t ure d Que r y La ngua ge (SQL) 651
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
652 St ruc t ure d Que r y La ngua ge (SQL): 1 9 9 9 (SQL: 1 9 9 9 ) Subcla ss
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Subgraph Suficient Test 653
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
654 Sufix Trees and Arrays Supervised Learning
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Supervised Learning (Classiication) Supply Chain 655
consideration of repeated examples (training set) where the managers of utilities to operate the equipment and deliver
labels are known. The goal is to induce a labeling for data services to customers. (Jeong et al., 2006)
points where the labels are unknown (test set). (Musicant,
S
2005) 5: This is performed with feedforward nets, where Supplantive Method
training patterns are composed of an input vector and Explicitly provides a linear approach to learning by
an output vector that are associated with the input and directing the learner speciically in the learning process.
output nodes, respectively. An input vector is presented The purpose is to limit the effort necessary for structuring
at the inputs together with a set of desired responses, one the learning. (Stavredes, 2005a)
for each node. A forward pass is done, and the errors or
discrepancies between the desired and actual response for Supplemental Model of Course Redesign
each node in the output layer are found. These are then This model retains the basic structure of the traditional
used to determine weight changes in the net according to course, usually simply adding technology-based, out-of-
the prevailing learning rule. (R., 2005) class activities. (Twigg, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
656 Supply Cha in M a na ge m e nt (SCM ) Suppor t
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Suppor t Count of a n I t e m se t Suppor t Ve c t or M a chine (SV M ) 657
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
658 Suppor t -Orde re d Trie I t e m se t (SOTrie I T ) Sust a ina bil it y of VC
distance between the hyperplane that represents the than the bare minimum. Surface learners do not fully
classiier and the vectors that represent the documents). understand the subject matter. At best, they are able to
S Different functions for measuring this distance (kernels) recite facts. (Pritchard, 2005a)
can be plugged in and out; when nonlinear kernels are used,
this corresponds to mapping the original vector space into Surface Map
a higher dimensional vector space in which the separation A three-dimensional portrait of the earth surface. Here,
between the examples belonging to different categories the third dimension is the spatial processes of the social
may be accounted for more easily. (Sebastiani, 2005) environment of the study area. (Ali, Ashley, et al.,
2005)
Support-Ordered Trie Itemset (SOTrieIT)
A dual-level trie whose nodes represent itemsets. The Suring
position of a node is ordered by the support count of To navigate the Internet searching for topics of interest,
the itemset it represents; the most frequent itemsets are usually considered an undirected form of browsing.
found on the leftmost branches of the SOTrieIT. (Woon (Hwang & Stewart, 2005)
et al., 2005)
Survey
Supporting Compliance Monitoring Assurance Measurement procedure under the form of questions asked
A process or method supporting human or machine agents by respondents. The questions can be addressed through a
in verifying and assuring the validity of a generated written questionnaire that the respondent has to ill in or
suspected non-compliant event by assuring the necessary through a personal interview (following or not a written
and suficient evidence supporting the hypothesis of non- guideline). The items of the questionnaire can be open or
compliance. (Goldschmidt, 2005) multiple choice. (Pace, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Sust a ina ble Com pe t it ive Adva nt a ge Sym bolic Propa gat ion in Ba ye sia n N e t w ork s 659
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
660 Sym bolic Rule Synchronous
the order of operations in the joint probability distribution. an integrated soundtrack, a separate video and sound ile
(Vargas, 2005) can be used and synchronized via SMIL. This allows
S users to choose difference combinations, for example,
Symbolic Rule to get a different language soundtrack, and permits text
A pattern explicitly comprising an antecedent and a transcripts to be optionally presented; both options have
consequent, usually in the form of IFTHEN. (Zhou, accessibility beneits. (Lin & Chen, 2005)
2005)
Synchronized Multimedia Document
Symbolic Score Multimedia systems usually integrate different types of
A representation of the music notation in symbolic, data streams, including continuous media (e.g., audio and
including a description of music symbols and their video) and discrete media (e.g., text and still images). Media
relationships. (Nesi & Spinu, 2005) data must be presented at precise time instants deined by
the rate of presentation. A media data stream schedules
Symmetric Graphical Model presentation of samples within a given time base. In this
The graph contains only undirected links. They are used way, objects in the same time base are synchronized. (Lin
to model symmetric relations among the variables. They & Chen, 2005)
give rise to the symmetric graphical models. (Giudici &
Cerchiello, 2005) Synchronous
1: A form of online discussion among students, workers,
Symmetric-Key Cryptography or instructors that is scheduled for a speciic time. It may
Sender and receiver agree on a common secret key. This be referred to as a live chat where all participants are
key is used to exchange encrypted messages. (Stickel, online at the same time in a virtual chat room. (Iannarelli,
2005) 2005) 2: At the same time. Live conversation. (Coakes,
2006b) 3: Communication in which interaction between
Syncategorematic Term participants is simultaneous. (Danenberg & Chen, 2005)
A linguistic term that cannot stand as the subject or the 4: Communication that requires both students and faculty
predicate of a proposition. It must be used in conjunction to interact online at the same time, such as in a real-time
with other terms, as it has meaning only in such combination. chat. (Etter & Byrnes, 2005) 5: Occurring at the same
(Andrade Ares, Garca, Rodrguez, & Silva, 2006) time. In the context of communications technologies,
synchronous technologies have communicators engaging
Synchronization in the communication experience or event at the same
1: In multimedia, synchronization is the act of coordinating time or in real time. For example instant messaging or
different media to occur or recur at the same time. chat rooms. (Newberry, 2005) 6: Occurring at the same
(Guan, 2005d) 2: Connects handheld devices to desktop time; typically used to refer to technologies such as chat.
computers, notebooks, and peripherals in order to transfer (Ordonez, 2005) 7: Online communication that is carried
or synchronize data. Other than using serial cables to out with all parties at the same time. For example, a
connect handheld devices and other computing equipment, Webcast and a chat-room discussion are both forms of
many handheld devices use either an infrared port or synchronous communication. (Paoletti, 2005) 8: Refers
Bluetooth technology to send information to other devices. to the ability for members of a learning community to
(Hu, Yeh, Yang, et al., 2006) 3: The harmonization of data complete a task at the same time. Computer whiteboards
on two (or more) digital devices so that both (all) contain and chat tools are examples of synchronous tools used
the same data. Data commonly are synchronized on the in the Web-based environment. (Morphew, 2005) 9: To
basis of the date they were last altered, with synchronization make event/meeting/discussion happen at the scheduled
software facilitating the process and preventing duplication time at different locations for different groups of people.
or loss of data. (Garrett, 2006b) It is basically used to create face-to-face environments.
(Nandavadekar, 2005) 10: Transmission in which the data
Synchronized Media Integration Language character and bits are transmitted at a ixed rate with the
(SMIL) transmitter and receiver being synchronized. (Calzonetti
A markup language designed to present multiple media & deChambeau, 2006)
iles together. For instance, instead of using a video with
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Synchronous a nd Asynchronous Com m unic at ion Synchronous Dist a nc e De live r y 661
Synchronous and Asynchronous 10: Communication that occurs between two or more
Communication people in which the communication is done in sync or at
1: Synchronous communication via the Web is immediate the same time (e.g., instant messaging, phone contact, or
S
communication, such as in chat or instant messaging. videoconferencing). (Day, 2005)
Asynchronous communication is delayed communication
via the Web, such as threaded discussions, forums, or e- Synchronous Communication Channel
mail messages, where each participant does not have to be Communication channel that allows real-time interaction.
online at the same time. (Marold, 2005) 2: Synchronous Includes telephone, videoconferencing, chat, and of course,
communication is when messages are exchanged during face-to-face communication. (Pauleen, 2005)
the same time interval. (Burke et al., 2005)
Synchronous Communication Tool
Synchronous and Asynchronous Learning 1: Communication occurs real time. Conferencing tools
Activity are synchronous. Participants must be together at the same
Event, either in real time or delayed time, in which a time for the communication event to occur. (Schoenfeld &
learner increases his or her skills and knowledge. (Brace Berge, 2005) 2: Tool that facilitatse communication at the
& Berge, 2006) same time. The best example is the telephoneif nobody
answers, no communication channel can be established.
Synchronous Collaboration (Karoulis & Pombortsis, 2005b)
Collaborative interactions, for example, over the Internet,
carried out in real time, such as chat, video/audio Synchronous Computer-Mediated
conferencing, and shared applications. (Carroll et al., Communication (SCMC)
2005) The tools available include chat, desktop videoconferencing,
and GroupWare. Synchronous computer-mediated
Synchronous Communication communication techniques allow participants to contribute
1: Real-time communication requiring all communication from different locations at the same time, although
partners to be present at the same time. Many types GroupWare tools are typically used in a single location.
of chat environments offer synchronous computer- (Salter, 2005a)
mediated communication. (Roberts et al., 2006b) 2:
Communication that occurs in real time. For two or more Synchronous Cooperation
people to communicate synchronously, they need to be Members are present at the same time within the
available at the same time. Synchronous communication cooperation group (co-presence). The communications
utilizes such tools as chats and videoconferencing. (Erlich, among them are interactive and made with live media,
2005). 3: Communication where the relay of information such as videoconferences or application sharing spaces.
is simultaneous and therefore occurs in real time (e.g., (Villemur & Drira, 2006)
chat, audio and videoconferencing). (Stodel et al., 2005)
4: Computer-based communication in which interaction Synchronous Discussion
between parties takes place simultaneously. (Ketelhut et al., 1: Occur when all participants are online and actively
2005) 5: Information exchanges taking place in the same involved in the discussion at the same time. (Ingram, 2005)
space and time, often face-to-face. (Wong-MingJi, 2005) 6: 2: The immediate exchange of messages in real time. It is
Interaction between individuals where information is sent best used for sharing ideas and brainstorming. (Ingram
and received at the same time, as in audio conferencing & Hathorn, 2005b)
or online chat. (Ally, 2005d) 7: Online interactive or real-
time communication between the student and instructor Synchronous Distance Delivery
or among students. (Gold, 2005) 8: Real-time exchange Requires that all involvedstudents, teachers, and
of messages. (Han & Hill, 2006) 9: Tools that enable real- facilitatorsbe connected and participating at the same
time communication in the online environment, such as time with the ability to interact and to transmit messages
chat rooms and videoconferencing. (S.-K. Wang, 2005) and responses simultaneously. (C. Wright, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
662 Synchronous Dist a nc e Le a r ning Synt a c t ic M e t a dat a
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Synt a c t ic Se a rch Syst e m 663
size, and MIME type might all be included as elements correspond to different data sets and scenarios of real-
of syntactic metadata. (Banerjee et al., 2005) world behavior. (Tzouramanis, 2005)
S
Syntactic Search Synthetic Data Set
A text search based on string patterns that appear in the 1: A data set that is generated by some artificial
text, without reference to meaning. (Navarro, 2005) speciications. Synthetic data are of high importance
for the evaluation of the performance behavior of access
Syntax methods in exactly speciied or extreme situations, where
The grammatical arrangement of words in sentences. real data are not available. (Tzouramanis, 2005) 2: A set
(Galitsky, 2005c) of artiicial target concepts. (Maloof, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
664 Syst e m Aspe c t Syst e m Leve l
Systems are being deployed by various political entities 2005) 3: An interdisciplinary method to enhance learning
to form a global network. GLONASS (Global Navigation of complex systems that is based on nonlinear dynamics
S Satellite System) is deployed by the Russian Federation. and feedback control. (Trcek, 2005)
GPS (Global Positioning System) is deployed by the United
States. Galileo is the GPS system being structured by the System Encapsulation
European Union. (Freeman & Auld, 2005) The deinition and implementation of a software interface,
called wrapper, that allows the access to the system, and
System Aspect its subsystems, from other applications. (Aversano et al.,
One of the technological and physical speciicities of the 2005)
e-learning experience at server and data layers, and the
usability and accessibility issues of the presentation layer System Engineering
of the e-learning system. (Rentroia-Bonito et al., 2006) The branch of engineering concerned with the development
of large and complex systems. It includes the deinition and
System Decomposability setup of adequate and controlled processes for the design
The capability to decompose the system into a set of loosely and development of these complex systems. (Villemur &
coupled subsystems. (Aversano et al., 2005) Drira, 2006 CSCW)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Syst e m M igrat ion Syst e m -Wide K now le dge Re c ove r y 665
mix. Finally, a computer-mediated community can also a system interacts with its environment, usability can join
be seen as a social system. An information system can non-functional IS requirements, like security and reliability,
be conceived on four levels: mechanical, informational, as part of system performance. The four advanced system
S
cognitive, and social. Each emerges from the previous, not elements (boundary, internal structure, effectors, and
in some mystical way, but as a different framing of the receptors) can maximize opportunity or minimize risk
same thing. If all levels derive from hardware, why not in a system environment. (Whitworth, 2006a)
just use that perspective? Describing modern computers
by chip and line events is possible but ineficient, like System Quality
describing World War II in terms of atoms and electrons. 1: A global judgment of the degree to which the technical
As higher levels come into play, systems become more components of delivered IS provide the quality of
complex but also offer higher performance eficiencies. information and service as required by stakeholders,
(Whitworth, 2006a) including hardware, software, help screens, and user
manuals. (Wilkin, 2005) 2: The reliability and eficiency
System Migration of an information system. (Shayo & Guthrie, 2005)
The incremental transformation of a legacy system toward
newer and more modern technology. It entails the reuse of System Reengineering
system components through their encapsulation. (Aversano When an existing software system requires major
et al., 2005) changes, typically by altering its original design,
speciic methodologies are used to help modify the
System Model design successfully. This process is referred to as system
A description of a system. Initially, the model describes reengineering. (Gaffar, 2005)
what problem the system should solve, and then it can
be gradually reined to describe how the system solves System Response Time
the problem. Finally, when operational, the system can The amount of time it takes for a computer system to
be viewed as a model of some domain behavior and respond to a command from a user. (Hantula, 2005)
characteristics. (Hvannberg et al., 2006)
System Theory
System of Artifacts Facilitates the illustration of complex and complicated
The system of documents, processes, mental models, relations between different elements. Thus, it enables
and so forth that different organizational units tend to speciic views, suited for the respective purpose of the
(autonomously) develop while satisfying their internal system. (Hofer, 2006)
needs. The choice and usage of these tools is a manifestation
of the units semantic autonomy. This may be for historical System Usage
reasons (e.g., people use old legacy systems that are still The extent of actual use of a speciic information system
effective), but also because different tasks may require (mostly voluntarily). (Shayo & Guthrie, 2005)
the use of different applications and data structures (i.e.,
text documents, audio, or movies) to work out effective System-Initiated Wireless Emergency Service
procedures and to adopt a speciic and often technical A type of wireless emergency service (WES) in which
language. (Cuel et al., 2006) context-aware information systems detect emergency
events and provide necessary help to involved users
System of Innovation when they are still unaware of or unable to report the
A conceptual framework in which networks of irms, events. Depending on whether WES is oriented toward
organizations, and other parties apply tacit and secondary the internal or external user contexts, there are two major
knowledge to interactive learning processes to generate system-initiated WES applications: personal WES and
favorable economic outcomes. (Taylor, 2005) public WES. (Sun, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
666 Syst e m at ic Sourc ing Syst e m s Deve lopm e nt Life cycle
in which particular business rules exist and then extract Systems Acceptance
those rules out from across applications. (Raisinghani, A function of perceived relevance, systems accessibility,
S 2005) and management support. (Ericsson & Avdic, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Systems Engineering Systems-Speciic Security Policy 667
Systems Engineering
The systems engineering discipline covers the development
of total systems, which may or may not include software.
S
Systems engineers focus on transforming customer needs,
expectations, and constraints into product solutions and
supporting those product solutions throughout the product
lifecycle. (Gibson, 2005)
Systems Failure
Systems abandoned before completion; systems completed
but never used, under used, or failing to deliver key aspects
of functionality; and projects that are signiicantly over
budget or schedule. (Doherty & King, 2005)
Systems Implementation
Customization or parameterization and adaptation of
the software application according to the needs of the
organization. (Colmenares & Otieno, 2005)
Systems Integration
The process of tying together two or more computer systems
for sharing data and functionality. (Hwang, 2005)
Systems Model
A comprehensive approach to considering the many
interconnected components within an organization. (Baker
& Schihl, 2005)
Systems Thinking
1: A manner of thinking that takes into account how the
things being studied relate and connect to each other. A key
idea embedded in systems theory is that it can assist us in
understanding of phenomena and that its holistic emphasis
will promote orderly thinking. It is an apt approach to use
when thinking about complex issues and interactions.
(Proctor, 2005) 2: Closely related to system dynamics; a
methodology to model and analyze the dynamic, complex,
and interdependent nature of systems. However, systems
thinking seldom includes developing dynamic simulation
models as in system dynamics. (Saha, 2005) 3: Thinking
holistically and conscientiously about the world by focusing
on the interaction of the parts and their inluence within
and over the system. (Maani, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
668 T-Com m e rc e Ta c it K now le dge
T
T-Commerce: See Television Commerce. the main forms of data entry, and they commonly have
an A4-size footprint. (Garrett, 2006b)
T-1 (or T1)
The T-1 carrier is the most commonly used digital line in Tabu Search
the United States, Canada, and Japan. In these countries, A metaheuristic procedure based on principles of intelligent
it carries 24 pulse code modulation (PCM) signals using search. Its premise is that problem solving, in order to
time-division multiplexing (TDM) at an overall rate of qualify as intelligent, must incorporate adaptive memory
1.544 million bits per second (Mbps). In the T-1 system, and responsive exploration. (Mart, 2005)
voice signals are sampled 8,000 times a second and each
sample is digitized into an 8-bit word. (Rahman, 2005c) TACACS: See Terminal Access-Controller Access-
Control System.
T-1 Access
Provides a data transmission rate of 1.544 megabits per Tacit
second (Mbps). (Butcher-Powell, 2005) From the Latin tacitus, meaning silent. (Zappavigna,
2006)
T-1 Line
A communications link that can be used for digital data Tacit Knowledge
transmission. Provides a data rate (bandwidth) of 1.544 1: Deined as personal, context-speciic knowledge.
million bits per second (Mbps). (Ruppel & Ruppel, It is knowledge acquired by experience and practice.
2005) It is therefore dificult to formally state, codify, and
communicate such knowledge. (Sivakumar, 2006) 2:
T-Test Experiential knowledgethat is, know-how represents
A kind of statistical method that measures how large the knowledge that is gained through experience and through
difference is between two groups of samples. (Chu & doing. (Wickramasinghe, 2006) 3: Highly personal and hard
Wang, 2005) to formalize, making it dificult to communicate or share
with others. Subjective insights, intuitions, and hunches fall
Table Scan into this category of knowledge. Tacit knowledge is deeply
The sequential reading of all the blocks of a relational rooted in an individuals actions and experience, as well
table to select a subset of its attributes based on a selection as in the ideals, values, or emotions he or she embraces.
argument, which is either not indexed (called a sargable (Zeleznikow, 2006) 4: Implicit understanding of which the
argument) or the index is not clustered. (Thomasian, individual is not directly aware and which is involved in his
2005a) or her skillful practice. (Zappavigna-Lee & Patrick, 2005)
5: Knowledge owned by the individual. It is personal, is
Tablet PC developed through life experiences and education, and is
1: A mobile computing device that offers high portability, not readily shared or made explicit. (Mitchell, 2005a) 6:
inking capability, and the slate coniguration. (Roldan, Knowledge possessed by an individual who is unable to
2005) 2: A newer type of format of personal computers. formulate and communicate it verbally. Such knowledge is
It provides all the power of a laptop PC but without a frequently the product of intuition, emotions, and leeting
keyboard for text entry. Tablet PCs use pen-based input, impressions, which form inchoate or incomplete memories.
and handwriting and voice recognition technologies as Tacit knowledge is the partner of explicit knowledge on the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ta c it K now ing/Ta c it I nt e grat ion Ta iloring 669
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
670 Ta iloring Opt ion Ta rge t U se r Group
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ta rsk is T he or y of Trut h Ta sk -Ba se d Pra c t ic e 671
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
672 Ta sk -Dire c t e d Disc ussion (T DD) Tc pdum p
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T DD Te a m 673
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
674 Te a m Cha ra c t e rist ic s T chn
efforts for satisfactory completion. Teams will normally interactions; involves an experience of increased ambiguity
have a deined leadership and authority structure, or deine and artiiciality (i.e., unnatural quality) associated with
T their own in order to address the task. (Cargill, 2006b) distributed interaction, which inherently lacks the rich
4: A small cross-functional group with complementary visual, auditory, and social array of cues traditionally
skills that is responsible for a time-speciic project, set of available to co-located teams. (Cuevas et al., 2005)
performance goals, and approach for which members hold
themselves mutually accountable. (Hustad & Munkvold, Team Paradigm
2006) 5: A small number of people, usually possessing A team perspective or belief which is collectively
complementary skills, who work together toward a common constructed and accepted by members of the team. (Fong,
purpose, with shared performance goals and an approach 2006b)
to work for which they hold themselves and other team
members accountable. (Dara-Abrams, 2006) 6: A social Team Productivity
system of three or more people, whose members perceive Degree to which a group of two or more individuals can
themselves and are perceived by others as team members, successfully coordinate their efforts to perform a task.
and whose members collaborate on a common temporary (Cuevas et al., 2005)
task. (Lettl et al., 2006) 7: To make up a team, members
must have a minimum of: (1) task interdependency among Team-Based Co-Learning
members, (2) shared responsibilities, (3) team identity, and Where two distinct organizations assemble a cross-
(4) power to manage the relationship between the team organizational team with the purpose of learning from
and the organization. (Tremblay, 2006b) one another. This team utilizes the knowledge contained
in each separate organization to create new knowledge
Team Characteristics beneicial for both. Intense interactions with the customer
The composition of the team and the shared beliefs held occur to gain their knowledge on processes and systems
within the team about the team. Team composition includes to facilitate systematic change. (Paquette, 2006b)
such things as the number of team members, the skills the
team members collectively possess, and the stability of TeamBased Organization
team membership. (Wong & Staples, 2005) Organization structure that gives a group of people
responsibility for a coherent part of production, and assigns
Team Charter the associated control responsibilities to that group (self-
A document created when a project team is formed that managing teams). (Hendriks, 2006)
details the teams objectives and rules of engagement,
including items such as the mission statement, team roles Teamwork
and responsibilities, and deliverables to be produced. Working with others interdependently to effectively
(Elshaw, 2006b) achieve a goal. Teamwork involves both task and social/
interpersonal communication aspects among team
Team Diversity members. (Petska & Berge, 2005)
The combined variety of skills, backgrounds, experiences,
ideas, thoughts, abilities, and perspectives that individuals Teamwork Quality (TWQ)
bring to their team. (Staples et al., 2005) A comprehensive concept of the quality of interactions in
teams. It represents how well team members collaborate
Team Effectiveness or interact. (Proserpio & Magni, 2005)
The ability of a team to perform its tasks on time, on budget,
and with acceptable quality, as well as the satisfaction, Tchn
motivation, and commitment of the team members. (Staples 1: Aristotles term for skills-based technical and action-
et al., 2005) oriented knowledge: how to perform a speciic task. The
end result, or realization of tchn, is the production of
Team Opacity something. (Schwartz, 2006) 2: Skills-based technical
Increased level of abstraction forced upon virtual knowledge. The social activity that has as its concern
teams due to the over-reliance on technology-mediated the making or production of social artifacts is called
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te chnic a l Ana lysis Te chnolit e ra cy 675
poiesis and involves the application of tchn. Tchn and competent teachers are technicians who have a certain
is knowledge of how to perform task-based activities in set of skills. (Wieseman, 2005b)
pursuit of some practical end: this end may be tangible or
T
intangible. Thus, tchn provides managers, professionals, Technical Support
craftsmen, laborers, and scientists with an understanding Consists of maintenance of hardware, software and
of the why and the wherefore, the how and with-what of communication infrastructure, archiving collected data,
their concerns. The skills of qualiied craftsmen, artists, providing user support, and at times also providing user
musicians, surgeons, computer programmers, physicists, training for use of technology. (Rugelj, 2005)
accountants, and so on all fall into this categoryas
indeed does the oft-ignored skills of ordinary unskilled Technical Trade Knowledge
workers. (Butler & Murphy, 2006) Knowledge that is task specific, industry specific,
and generally available among irms in an industry.
Technical Analysis Examples of such knowledge are knowledge of automobile
The study of the behavior of market participants, as construction methods, knowledge of the techniques of
relected in the technical data. Used to identify early stages computer hardware construction, and so on. (Butler &
in trend developments, with a view to proiting from price Murphy, 2006)
movements. This style of analysis is generally short term.
(Vanstone & Tan, 2005) Techno-Economic Paradigm
Best-practice model made up of a set of all-pervasive
Technical Data generic technological and organizational principles that
The term used to describe the components of price history represent the most effective way of applying a particular
for a security. These components are open price, low price, technological revolution, and of using it for modernizing
high price, close price, volume traded, and open interest. and rejuvenating the whole economy and social sphere.
(Vanstone & Tan, 2005) When generally adopted, these principles become the
common-sense basis for organizing any activity and for
Technical/Functional Evaluation structuring any institution. (Kalvet, 2005)
This type of evaluation focuses on the technical (IT)
components. The evaluation is concerned with the Techno-Economic Rationality
relationship between inputs and outputs. Its focal point is Logical justiication for making a connection between
on eficiency in terms of the technical performance and technical advances and economic growth. (McPherson,
the control of resources. Further interests lie around the 2005)
increased and improved capacity, fewer errors, greater
reliability, humanpower savings, and so forth, and also Technocratic View of Knowledge
in terms of software performance developments and Knowledge is an organized collection of data and
quality (e.g., TQM). The driving force for the timing of information. (Ericsson & Avdic, 2005)
evaluation is the traditional systems development lifecycle.
(Serafeimidis, 2005) Technolibertarianism
A companion political ideology to digital Darwinism
Technical Indicator that argues in an age of global connectivity for radical
Indicator produced as a result of various computations individualism and no governmental regulation of digital
on technical data. Primarily used to conirm price action. life. (Skovira, 2005)
(Vanstone & Tan, 2005)
Technoliteracy
Technical Relection 1: A shorthand term referring to ones competence level,
Relection concerned with the effective application of skill, and comfort with technology. (Macfadyen, 2006a)
skills and technical knowledge in a classroom; stems 2: The ability to understand, use, critically analyze, and
from a belief system that education serves the needs of an improvise solutions within an information technology
economy, rather than being oriented toward social change, infrastructure. (Hantula & DeRosa, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
676 Te chnologic a l Ac c e ss Te chnology Conve rge nc e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te chnology Cost ing Te chnology-M e diat e d Dist a nc e Educ at ion 677
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
678 Te chnology-M e diat e d I nst ruc t ion Te le c om m unic at ion
students. The use of technology can facilitate or mediate this center equipped with the necessary ICTs and manned
relationship. In this sense, technology provides strategies by adequately skilled staff to allow the community
T to bridge the gap between, or bring closer, teachers and members to connect to the global communications network
learners. (Ching et al., 2005) (telephone, fax, and Internet). Usually additional ofice-
like facilities are offered such as photocopying, printing,
Technology-Mediated Instruction scanning, and multimedia. (Trusler & Van Belle, 2005) 7:
Learning that is aided or entirely accomplished through the Computer-based distance learning centers usually located
use of computer-based technology. (Kaur et al., 2005) in non-educational settings. Sometimes referred to as
telecottages when in a rural location. (David, 2005) 8:
Technology-Mediated Learning Multi-purpose community-based centers equipped with
Learning where the learners interactions with learning computers, Internet- and Web-connected computers,
materials, other students, and/or instructors are mediated audioconferencing, videoconferencing, photocopiers, fax
through information technologies. (Dixon et al., 2005) machines, printers, TV and video, cameras, scanners, and
so forth. (Latchem, 2005)
Technology-Related Assistance: See Assistive
Technology. Teleclass
Voice-only communications linking two or more sites.
Technology-Supported Learning Environment A standard method used is to connect multiple telephone
An environment in which appropriate technology is lines for an audio conference through a phone bridge. A
integrated to support learners and teachers. (Bennett, telephone bridge where the conference is established by
2005) having all of the distant sites call in to a common bridge
telephone number. (T. Cavanaugh, 2005)
Telecare
The use of information and communications technology Telecommunication
to provide medical services and resources directly to a 1: Any transmission, emission, or reception of signs, signals,
patient in his or her home. (Becker, 2006) writings, images, sounds, or information of any nature by
wire, radio, visual, or other electromagnetic systems.
Telecenter (Melkonyan, 2005) 2: A broadly dispersed communications
1: A multi-functional office area outfitted with network involving a transmitter, a medium (line), a channel
communication and information processing equipment imposed upon the medium, and a receiver. (M. Mitchell,
using computer assets with access to telecommunication 2005b) 3: The exchange of information between computers
networks. (Kabene, Leduc, & Burjaw, 2005a) 2: An open via telephone lines. This typically requires a computer, a
social system where people interact among themselves, modem, and communications software. (Luppicini, 2006)
with technology and with their context, exchanging 4: The transmission of data, text, sound, and images
information, materials, ideas, feelings, and so forth. over long distances, and the physical infrastructure that
The purpose of a telecenter is to maintain this low supports such endeavor. (Ochoa-Morales, 2005) 5: The
by: (1) carrying out cultural, pedagogic, distributive, transmission, emission, or reception of signs, signals,
and socio-organizational functions; and (2) providing writings, images, sounds, or information of any nature
access to the necessary technology. (Santos, 2005) 3: by cable, radio, visual, optical, or other electromagnetic
Shared site that provides public access to ICT. (Cecchini, systems. It refers to long-distance communication carried
2005) 4: A public-access facility providing electronic out with the aid of electronic equipment such as the radio,
communications services, especially in marginalized or telegraph, telephone, and television. The information
remote areas where commercial development of ICT is that is transmitted can be in the form of voice, symbols,
not prevalent. (Songan et al., 2005) 5: A public-access pictures, or data, or a combination of these. The physical
facility providing electronic communication services, equipment for a telecommunications system includes
especially in marginalized or remote areas where ICTs a transmitter, one or more receivers, and a channel or
are not prevalent. Computers and networking facilities means of communication such as the air, water, wire,
are normally available in the telecenter. (Gnaniah, Yeo, cable, communications satellite, or some combination of
et al., 2005) 6: A shared, centrally located community these. (Magagula, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te le c om m unic at ions Ac t Te le duc at ion 679
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
680 Te le he a lt h Te le w ork ing
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T ELN ET Te m pora l Full-Tex t I ndex 681
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
682 Te m pora l Loc a lit y Te r m ina l Ac c e ss-Cont rolle r Ac c e ss-Cont rol Syst e m (TACACS)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Te r m ina l De fe nse Tex t I nput Pa ne l (T I P) 683
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
684 Tex t M ining T FI DF Ve c t or M ode l
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T he m at ic Se a rch Engine T hird Ge ne rat ion of M obile Com m unic at ions Te chnology (3 G) 685
Thematic Search Engine posits that an individuals attitude toward a given behavior
A search engine devoted to the construction and is determined by the belief that this behavior will result
management of a database of Web pages that pertain to in a particular outcome. (McHaney, 2005) 2: States that
T
a limited subset of the knowledge or of the Web users. the intention to adopt is affected directly by attitudinal
(Caramia & Felici, 2005) components (beliefs about the outcome of the behavior
and beliefs of the consequences of the behavior) and the
Theory subjective norm component (level of importance or desire
A set of patterns of a pdBf (T, F), such that each data vector to please signiicant others and/or society). (McManus &
in T has a pattern satisfying it. (Boros et al., 2005) Standing, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
686 T hird M ission T hre e -Dim e nsiona l Com put e r-Aide d De sig n (3 D CAD)
the ability to transfer both voice data (a telephone call) Third-Party Logistics
and non-voice data (such as downloading information, The activity of outsourcing activities to an independent
T exchanging e-mail, and instant messaging). (Wong, 2006) company that perform clients management function of
4: Long-awaited digital mobile systems with a maximum the logistic operations. (Tyan, 2006)
data rate of 2 Mbps under stationary conditions and 384
kbps under mobile conditions. This technology is capable Third-Person Perspective
of handling streaming video, two-way voiceover IP, The visualization of the gaming environment through an
and Internet connectivity, with support for high-quality external body of the character. (Ip & Jacobs, 2006)
graphics. (Akhtar, 2005) 5: A wireless communication
technology which supports multimedia, video streaming, Thoroughness
and videoconferencing. (Petrova, 2006) 6: A wireless A measure for assessing usability inspection methods.
system that can provide fairly high-speed (384 Kbps) Determined by dividing the number of real problems found
packet-switched wide-area wireless Internet access to by the Usability Inspection Method (UIM) by the number
support multimedia applications. (Lee, Hu, & Yeh, 2005) of known problems. (Woolrych & Hindmarch, 2006)
7: The generic term used for advanced multimedia wireless
communication. (M. Rowe, 2005a) Thou Relation
Relation where no reciprocal awareness exists among us
Third Mission and our partners, and therefore, understanding involves
The desire of the UK government to extend the remit of UK more anonymous types of meaning. (Shariq & Vendel,
universities beyond their traditional research and teaching 2006)
role to a broader set of commercially oriented activities,
including the establishment of spin-out companies. Threaded Discussion
(Warren, 2006) 1: An asynchronous collaboration medium in which
participants contribute to topics and to contributions under
Third Sector topics, creating a nested discourse structure. (Carroll et al.,
A generic collective name for charity, voluntary, 2005) 2: Asynchronous communication via the Internet
community, and non-government organizations. Third whereby data can be transmitted intermittently or at any
sector refers to a set of civic and social organizations or time and at irregular intervals. An example would be e-mail,
institutions situated between the state (irst sector) and the whereby a message can be sent at any time by the user and
business world (second sector). (Arkhypska et al., 2005) read at any time by the recipient. (Cooper, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
3 G T im e Corre lat ion 687
3G: See Third Generation of Mobile Communications should not be visible to the user, but should be resolved
Technology. internally by the database system. (Baumann, 2005)
T
3GPP: See Third-Generation Partnership Project. TIM: See Tourism Information Marketplace.
3.5G Timbre
1: Interim system between 3G and 4G allowing a downlink A dimension of music which is deined by negation:
data rate up to 14 Mbps. Also called high-speed downlink timbre is not pitch nor dynamics, and is everything else.
packet access. (Akhtar, 2005) 2: Based on a technology Timbre deines the texture of the sound, and allows one
called high-speed downlink packet access. It will be to differentiate between different instruments playing the
upwardly compatible with 3G W-CDMA systems, but will same note (pitch) at the same volume. (Pachet, 2006)
enable more than 10 times the peak data rate and more than
6 times the capacity of initial 3G systems. (Lei, 2006) Time Activator
Trigger for initiating automatic update of the report in the
Three-Tier Application informationbase. Could be calendar day, month or year,
Consists of clients in the front tier, servers that perform inancial (booking) month, and so forth. So, if the trigger
the application business logic processing in the middle is calendar day, the report is produced automatically each
tier, and databases that store the application data in the day. If the trigger is booking month, the report is produced
backend tier. (Zhao et al., 2006) whenever booking month is changed in the database.
(Dragan, 2005)
Three-Tier Client/Server
Three-tier splits the logic between: (1) clients that run the Time Bank
graphical user interface (GUI) logic, (2) the application A tool for community building. The basic idea is that
server running the business logic, and (3) the database people help each other by exchanging the performance
and/or legacy application. (Galup et al., 2005) of simple, though useful, tasks among them. Examples
include gardening, cooking, simple home repairs, teaching
Three-Tier Model languages, and so forth. (Camarinha-Matos & Ferrada,
A model consisting of a headquarters, and regional and 2006)
student modules. The student module is the interface for
the student and it communicates only with the regional Time Barrier
module. The regional module acts an intermediary between Time is typically the most commonly cited barrier
the student and the headquarters module. The regional by teachers to involvement in staff development and
module also aggregates all the communications from the development of online learning materials. (Salter, 2005b)
individual students before sending them to the headquarters
and vice versa. (Shareef & Kinshuk, 2005) Time Compression
A term that describes the faster replay of continuous
TICCIT: See Time-Shared Interactive Computer media iles, such as audio or video signals. In the context
Controlled Information Television. of speech recordings, time compression usually assumes
that special techniques are used to avoid pitch shifting,
Tie Strength which otherwise results in unpleasant, very high voices.
The strength of a tie is a function of frequency of contact, (Hrst & Lauer, 2006)
affect, and reciprocity. The stronger the tie, the more easy
it is for one actor to inluence and convey complex, multi- Time Constraint
faceted information to another. (Nelson & Hsu, 2006) Refers to the need to catch something just when it takes
place because time lows. (Cirrincione, 2005)
TIFF: See Tagged Image File Format.
Time Correlation
Tiling Time-delayed relationship between two or more time
The technique of decomposing raster data objects into series. Time correlation can be used for identifying causal
smaller raster items (tiles) for storage purposes. Tiling relationships among multiple time series. (Sayal, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
688 T im e De la y T im e St re t ching
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T im e -Ba se d Cont inua l Que r y Top-Dow n Cube Com put at ion 689
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
690 Topic Topologic a l I nva ria nt
aggregating over already computed iner-grade cells in is provided, their topics as well as the associations among
the lattice. (Abdulghani, 2005a) topics are identiied and are used to form a map that guides
T the user through the topics. (Yang & Lee, 2005)
Topic
The object or node in the topic map that represents the Topic Occurrence
subject being referred to. However, the relationship between A topic may be linked to one or more information resources
topics and subjects is (or should be) one to one, with every that are deemed to be relevant to the topic in some way.
topic representing a single subject, and every subject being Such resources are called occurrences of the topic. (Yang
represented by just one topic. (Yang & Lee, 2005) & Lee, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Topologic a l Re lat ion Tourism Supplie r 691
the interior, boundary, and exterior of spatial objects. time, installation, maintenance, training, and so forth.
(Rodrguez-Tastets, 2005a) (Sowe et al., 2005) 3: Developed by the Gartner Group,
an accounting method used by organizations seeking to
T
Topological Relation identify their both direct and indirect systems costs. (Pang,
Describes the intersection and the incidence between 2005a) 4: An evaluation method with a broad perspective
objects. Six basic relations have been identiied in the on the costs of system ownership, including training, lost
literature: disjoint, meet, overlap, cover, contain, and productivity during learning cycles, maintenance, and so
equal. (Chbeir & Yetongnon, 2005) forth. TCO methodologies bring into focus a softer side
of the cost equation. (Dykman, 2005) 5: The total amount
Topological Requivalence of money that the decision of introducing new software
Two representations are said to be topologically equivalent costs. (Sahraoui, 2006)
if one can be mapped into the other by a topological
transformation of the real plane. Examples of topological Total Element Long-Run Incremental Cost
transformations are rotation, scale change, translation, and (TELRIC)
symmetry. (Rodrguez-Tastets, 2005a) The FCC pricing methodology for local loop unbundling.
It is based on forward-looking long-run incremental
Topology costs: essentially, the regulator estimates the overall
The branch of mathematics that deals with the properties additional cost supported by the incumbent when a certain
of geometric conigurations that are not altered by new element is introduced in its network, but under the
homomorphic transformations. In GIS, topology refers to hypothesis that the network is built with the most eficient
a set of techniques that allows us to determine the relative technology available. (Arbore, 2005)
positioning between two spatial objects, regardless of their
exact coordinates. (Davis et al., 2005) Total Information Awareness
A discontinued effort by the federal government to create
Topos a vast database containing public and private information
A category endowed with a certain collection of diagram on individuals to allow for advanced search techniques
operations that allow one to perform many manipulations to uncover suspicious activity or indications of possible
with objects and morphisms. Roughly, in a topos one terrorist links. (Holland, 2005)
can perform all constructive operations with objects:
intersections, unions, and other analogs of common set Toulmin Argument Structure
theoretical operations, including the powerset (forming Toulmin stated that all arguments, regardless of the domain,
the object of all sub-objects of a given object). Typical have a structure that consists of four basic invariants:
examples of toposes are the category of sets and mappings claim, data, warrant, and backing. Every argument makes
between them, the category of graphs, and graph mappings. an assertion. The assertion of an argument stands as the
(Diskin, 2005) claim of the argument. A mechanism is required to act as a
justiication for the claim, given the data. This justiication
Tort is known as the warrant. The backing supports the warrant
A civil wrong committed by another. Tort law recognizes and in a legal argument is typically a reference to a statute
that individuals or businesses may owe a duty of care to or precedent case. (Zeleznikow, 2006)
others with whom they have contact. If that duty of care
is breached, and the breach results in damages, the party Tourism Information Marketplace (TIM)
that owed the duty of care may be liable for the resulting A conceptual model depicting the entities that participate
damages. (Sprague, 2005) and interact in the processes that facilitate the exchange of
tourism information commodities. (Taylor, 2005)
Total Cost of Ownership (TCO)
1: Accounts for all of the costs associated with procuring, Tourism Supplier
deploying, and operating an existing asset like an ERP A business that supplies a tourism product for consumption
system at a given point in time. (Esteves & Pastor, 2005) by tourists. These may take various forms, such as
2: The total cost associated with acquiring software. This transport, attractions, events, accommodations, or
may include, but is not limited to, code downloading hospitality. (Hornby, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
692 T PB Tra dit iona l Te a m /Colloc at e d Te a m
TPB: See Theory of Planned Behavior. or discussion format was used. The same problem occurs
in grouping all distance learners and delivery formats
T TRA: See Theory of Reasoned Action. together, when in reality a great deal of variation exists.
(Lindsay, Howell, et al., 2005a)
Trace
The resultant digital-ink representation made by Traditional Familiarity
movements of the hand using a digital pen on a digital Combines an assumption of continuity with the past
screen. (Mohamed & Ottmann, 2006) experience of a partner. Traditional trust, therefore, relies
on the fact that virtual enterprise partners who could be
Traceability observed as trustworthy in the past will display the same
1: The ability to describe the life of a requirement in both kind of behavior in the future. (Wong, 2005)
backward and forward directions. (Doorn, 2005) 2: The
property of software design and development that makes Traditional Learning
it possible to link any abstract artifact to the technical Occurs in situations where students learn primarily from
artifacts that implement it and conversely. In addition, the instructor (sage-on-the-stage) and/or from resources
this link explains how and why this implementation has such as books, journals, audiotapes, and videotapes.
been chosen. In the database realm, traceability allows a (McInnerney & Roberts, 2005)
programmer to know exactly which conceptual object a
deinite column is an implementation of. Conversely, it Traditional Management Style
informs him/her on how a conceptual relationship type has An approach that maintains dominance and control over
been implemented. The transformational paradigm is one employees and relies on a wait and see policy for new
of the most promising approaches to formally guarantee technology adoption. Employees are encouraged to ignore
traceability. (Hainaut et al., 2005) data that do not it existing frames of reference, focus only
on the job at hand, and comply with established reporting
Traced Forgery relationships and rules. (Winston & Dologite, 2005)
A signature instance or its photocopy is used as a reference
and tried to be forged. (Chakravarty et al., 2005b) Traditional Menu
This type of menu is essentially a series of display screens
Tracking that appear sequentially as the user responds to the requests
The process of estimating the parameters of a dynamic detailed on each screen. (Henley & Noyes, 2006)
system by means of measurements obtained at successive
time instances. An example is the estimation of the position Traditional Modeling Concern
of a moving object based on an image sequence. (Aifanti Traditionally, a modeling concern is related to
et al., 2005) representations for structure (data), behavior (process),
and constraints. (Tobar et al., 2006)
Traction
Successfully putting a business model into operation, Traditional Retail Operation
proving its viability. (Craig, 2006a) The exchange of value directly with consumers through
store locations and facilities. (Bahn, 2006)
Traditional Course
A course taught using in-class, face-to-face instruction. Traditional Systems Development
(Baugher et al., 2005) Systems development carried out according to the
lifecycle model. (Avdic, 2005)
Traditional Education and Students
Usually refers to education and students in the classroom, Traditional Team/Collocated Team
but grouping all types of classroom instruction together A group of individuals who work on interdependent tasks,
makes comparison studies between traditional education who share responsibility for outcomes, and who work
and distance education inexact. As one example, the term together at the same location (i.e., their ofice/work area
traditional education does not specify whether a lecture is in the same general location). (Staples et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Trafic Aggregation Trans-Urbanity 693
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
694 Tra nsa c t ion Tra nsa c t ion-Proc e ssing Syst e m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Tra nsa c t ion-T im e Te m pora l Doc um e nt Dat a ba se Tra nsfe rre d-Out 695
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
696 Tra nsfor m at ion Tra nsm ission Pa ra digm
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Tra nsm ission Prot oc ol Trave l Ca rd 697
a 50-minute lecture, to a group of passive learners in the The principle of iltering is that documents are analyzed
absence of interaction. (Shaw, 2005) only once, hence only new documents are processed by
the system. Transparent iltering can be further divided
T
Transmission Protocol into proiling and iltering. Those two sub-processes are
The communication language used for transmission of mutually independent. (Wecel et al., 2005)
data. For videoconferencing, there are several available
transmission protocols. (Dudding, 2005) Transparent Proxy
A proxy that closely cooperates with either a router or a
Transmissive Pedagogy Layer 4 switch, to intercept Web requests while invisible to
Teaching based on an assumption that students receive the users. Other than being invisible, it works as a regular
information from the teacher and slot it straight into an proxy cache. (Danalis, 2005)
empty ledge base, or at best, work on it later to make it
their own. (Vat, 2005c) Transparent Retrieval
A spontaneous process triggered by data warehouse
Transmultiplexer Filter Bank (TMUX) users each time they launch a data warehouse report. In
Consists of a synthesis ilter bank followed by an analysis this process the data warehouse library is mechanically
ilter bank. This type of ilter bank is used for converting searched for documents that match the current context of
time-multiplexed signals (TDMs) into frequency- a given data warehouse report. The context is extracted
multiplexed signals (FDMs), and vice versa. (Jovanovic- from the report metadata and data. The ranked list of
Dolecek, 2005b) matching documents is compared against the user proile
and presented to the business user as an extension of
Transmutator structured information displayed on the report. (Wecel
Knowledge transformation operator that modiies learner et al., 2005)
knowledge by exploring learner experience. (Leni et
al., 2005) Transparent Technology
Technology that workers use on a daily basis without
Transparency thinking about it. Most often a technology is considered
1: Also known as disappearance, transparency is largely transparent when a worker forgets that he or she uses it.
considered the hallmark of good interaction design, When a worker must think about how and when to use
wherein the user is able to complete tasks without cognitive a speciic technology, it is no longer transparent. (P.M.
interference caused by the interface. The user is said to Leonardi, 2005)
act through the computer rather than to interact with it.
(Kettley, 2006a) 2: Systems supporting decision making Transport Control Protocol (TCP)
in administrative organizations should be transparent to Protocol governing the operation of the transport layer of
users so that it is clear to all actors involved (street-level the Internet. (Pendegraft, 2005)
bureaucrats, clients, legal and administrative supervisors,
appeal boards) how certain conclusions have been reached. Transport Layer
(Svensson, 2005) Layer 4 of the OSI model. Provides reliable, transparent
transfer of data between end points. (Ngoh & Shankar,
Transparency in Government Services 2005)
A mechanism by which citizens know and understand
the different activities of the government. Information on Trap Doors
functioning of different government machineries is made Pieces of code inserted into a program. Trap doors generally
available to the citizens. (Borbora & Dutta, 2005) are used for the purpose of debugging or bypassing standard
access control mechanisms. (Butcher-Powell, 2005)
Transparent Filtering
A continuous process, transparent for business users, in Travel Card
which documents are acquired from Web sources and stored Credit card issued to federal employees to pay for costs
in the data warehouse library with appropriate descriptions. incurred on oficial business travel. (Pang, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
698 Trave l T im e Budge t Trigge r
Travel Time Budget duration, diversity, and intensity. Primary quality measures
The proportion of time allocated by individuals for travel of trend detection include sensitivity and accuracy. (Chen,
T per day. (Jain & Lyons, 2005) Toprani, et al., 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Trigge ring Condit ion Trust 699
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
700 Trust a nd Pa r t ic ipat ive Sa fe t y Trust w or t hy We b Sit e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
T SQL 2 .5 G 701
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
702 2 .5 -Ge ne rat ion Wire le ss Se r vic e (2 .5 G) Typosquat t n
ig
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U a E Approa ch U N /EDI FACT 703
U
UaE Approach: See User-as-Editors Approach. into the environment will enable people to move around
and interact with computers more naturally than they
Ubiquitous Computing currently do. (Dhar, 2005)
1: A vision of the future and a collection of technologies
where information technology becomes pervasive, UCC: See Uniform Commercial Code.
embedded in the everyday environments and thus
invisible to the users. According to this vision, everyday UDDI: See Universal Description, Discovery, and
environments will be saturated by computation and Integration.
wireless communication capacity, and yet they would
be gracefully integrated with human users. (Roussos & UDF: See Unit Development Folder.
Zoumboulakis, 2005) 2: A vision where computers are
made available throughout the physical environment, but UDP: See User Datagram Protocol.
effectively invisible to the users. (Cremonini et al., 2006)
3: An environment where computers are embedded in our UEM: See Usability Evaluation Method.
natural movements and interactions with our environments.
Combines mobile and pervasive computing. (Krogstie, UIL: See User Interface Language.
2005b) 4: Computing technology that is invisible to the
user because of wireless connectivity and transparent user UIM: See Usability Inspection Method.
interface. (Ally, 2005c) 5: Includes computers everywhere,
the wireless technologies wave, and various portable and UM: See Uniied Messaging.
networked technologies in our daily lives. Ubiquitous
computing can help to create an anytime, anywhere UMA: See Universal Media Access.
learning environment that learners, teachers, and parents
can access easily. Ubiquitous computing has been changing UML: See Uniied Modeling Language.
the way teachers and students utilize technologies in the
classroom. (Yang, 2005) 6: Refers to the ability to perform UML Profile: See Unified Modeling Language
computing or communications from anywhere at any given Proile.
time. Thus, untethering individuals from wired networks
creates opportunities but is constrained by other issues UML Stereotype: See Uniied Modeling Language
such as power consumption. (Chen, Sockel, et al., 2005) Stereotype.
7: The evolution of mobile human-computer interation
whereby user-centered principles of hardware and software UMTS: See Universal Mobile Telecommunication
development embed the nature of mobile computing System.
into the background of everyday life. (Mohamedally et
al., 2005) 8: The trend of technological development to UN/EDIFACT
integrate into any kind of object information processing An international EDI standard that is similar to and based
and communication capabilities. (Falcone & Castelfranchi, on X12. Its syntax is somewhat different from X12s, but it
2005) 9: Integrating computation into the environment follows the same basic principles and architecture. (Hawk
rather than having computers that are distinct objects. & Zheng, 2006)
Promoters of this idea hope that embedding computation
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
704 Unbundling of Faculty Roles Uniied Content Model
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Uniied Messaging (UM) Uniform Resource Locator (URL) 705
Uniied Messaging (UM) motivational model, and social cognitive theory. (McManus
Enables access to faxes, voicemail, and e-mail from a & Standing, 2005)
single mailbox that users can reach either by telephone
U
or a computer equipped with speakers. (Lalopoulos et Uniform Commercial Code (UCC)
al., 2005b) A uniform collection of laws relating to commercial
transactions. Speciic provisions of the code which relate
Uniied Modeling Language (UML) to the sale of goods (Article 2) have been enacted by all
1: An industrial standard notation for object-oriented of the states. (Sprague, 2005)
development. It consists of several types of (mostly)
diagrams that enable describing systems from different Uniform Random Sampling
perspectives, including managerial, structural, and A method of simple random sampling where the
behavioral (functional). (Shoval & Kabeli, 2005) 2: The probabilities of inclusion for each element are equal.
standard modeling and design notation to build object- (Lutu, 2005)
oriented applications. UML comprises a set of submodels
that allow a designer to easily express both structural Uniform Resource Identiication (URI)
and dynamic aspects of object societies. UML and its 1: Also known as Universal Resource Identiier, it is a
accompanying process model, the rational uniied process string that unambiguously identiies a resource. A URI
(RUP), cover all steps of the software development process describes the mechanism used to access the resource,
by providing different diagrammatic tools such as use- the speciic computer where the resource is housed,
case diagrams, class diagrams, sequence diagrams, state and the speciic name of the resource. URL (Uniform
models, and so forth. UML is itself described by a meta- Resource Locater), the most common form of URI, and
model and possesses its own extension mechanisms to URN (Uniform Resource Name) are subsets of the URI.
adapt it to speciic application domains. (Rossi & Schwabe, (Pereira & Freire, 2005) 2: A short string that identiies
2005) 3: Adopted by the Object Management Group as a resources on the Web: documents, images, downloadable
modeling language for object-oriented analysis and design iles, services, electronic mailboxes, and others. They make
of software systems. UML includes several sub-languages resources available under a variety of naming schemes
and diagram notations for modeling different aspects of and access methods such as HTTP, FTP, and Internet
software systems. (Halpin, 2005) mail addressable in the same simple way. (Raisinghani
& Sahoo, 2006)
Uniied Modeling Language (UML) Proile
A predeined set of stereotypes, tagged values, constraints, Uniform Resource Identiier (URI)
and notation icons that collectively specialize and tailor Identiies abstract or physical resources. A resource can
the UML for a speciic domain or process. (Zendulka, be a collection of names that has been deined by some
2005b) organizations, or it can be a computer ile that contains
that list. The most familiar form of URI is the uniform
Uniied Modeling Language (UML) Stereotype resource locator (URL). (Sethi & Sethi, 2006a)
One of UML extensibility mechanisms. It is an extension
of the vocabulary of the UML that allows creating new Uniform Resource Locator (URL)
kinds of building blocks that are derived from existing 1: The address of an object accessible on the Internet.
ones. (Zendulka, 2005b) The object could be an HTML document, a text ile, an
image ile, a program such as a common gateway interface
Uniied Model of IPFS application, and so forth. These are mainly used in HTML
A model in which all or most of the inancial services a documents to specify the target of a hyperlink. (Hu, Yang,
consumer might want are provided within a single corporate Yeh, et al., 2005) 2: The address of all Web pages, images,
structure. (Gordon & Mulligan, 2005) and other resources on the World Wide Web. (Scime,
2005b) 3: A system that locates the address of documents
Uniied Theory of Acceptance and Use of and other resources across the WWW. (Maggioni &
Technology (UTAUT) Uberti, 2005) 4: The global address of a Web page or
This model is quite comprehensive as it combines other resource on the Internet. A URL has three basic
TRA, TAM, TPB, the DOI model of PC utilization, the parts: the protocol identiier, IP address or domain name
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
706 U nifor m Sa m pling U nive rsa l De sc ript ion Disc ove r y a nd I nt e grat ion (U DDI )
of the server, and the relative path to the resource on the Unit Price/Unit Cost Model
server. (Manolopoulos et al., 2005) A slope analysis tool used to plot actual unit prices and
U unit costs for several periods in order to discern future
Uniform Sampling trends and likely outcomes. (Nugent, 2005)
1: A random sample of k tuples of a database, where each
subset of k tuples is equally likely to be the sample. (Das, Univariate/Multivariate
2005) 2: All objects or clusters of objects are drawn with A univariate (or monothetic) method processes a particular
equal probability. (Hou, Guo, et al., 2005) attribute independently of the others. A multivariate
(or polythetic) method processes all attributes of the
Uniform Spread Assumption (USA) representation space, so it can ix some problems related
A technique for estimating values inside a bucket by to the interactions among the attributes. (Muhlenbach &
assuming that values are distributed at an equal distance Rakotomalala, 2005)
from each other and that the overall frequency sum is
distributed equally among them. (Buccafurri & Lax, Universal Access
2005) 1: Communal access to telephone and other ICT services
usually measured by indicators such as distance, population,
Uninterrupted Power Supply (UPS) and time. (Frempong & Braimah, 2005) 2: Provision of
1: A mechanical/electronic device used to provide power ICT services to all of a countrys households through
supply without any disruption at the time of power failure. shared facilities. (Cecchini, 2005) 3: The availability of
This is mainly used in computers as a power back up. information and communication technologies such as
(Borbora & Dutta, 2005) 2: System that prevents power telephones, computers, and the Internet to the widest range
surges or lightning strikes that can cause costly damage of potential users. (Mwesige, 2005)
to computer parts and unexpected shutdowns. (Latchem,
2005) Universal Change Principle
Learning must precede change. (Lick & Kaufman,
Uninterruptible Power Supply 2005)
A backup electricity supply, in the form of batteries or
other device, designed to provide continuous power to Universal Description Discovery and Integration
computer or telecommunications equipment in the event (UDDI)
of a power failure. (Dyson, 2005) 1: A set of speciications for a service registry. It is a meta
service for locating Web services. (Zhang, 2006) 2: A
UNION Query standard designed to facilitate a searchable directory of
By inserting the key word UNION between multiple service providers. UDDI resides at the service registry.
SQL SELECT statements, the resulting rows from these (Kasi & Young, 2006) 3: A virtual yellow pages for Web
statements are appended into a single result set (provided services allowing software to discover what Web services
the number and data types of the columns match). (Millet, are available and how to hook up to them. (Hwang, 2005)
2005) 4: A mechanism for holding descriptions of Web services.
UDDI deines a data structure standard for representing
Unique Knowledge Web service description information in XML. It is also
Knowledge that is irm speciic and applies to the possession a mechanism, or a directory, for inding Web services.
by social actors of knowledgeself-knowledge and skills- (Chan & Kellen, 2006) 5: A speciication that provides a
based knowledgeof unique organizational routines, framework for describing and discovering Web services
production processes, and IT infrastructures, to mention based on the idea of a business registry. (Moser & Melliar-
a few. (Butler & Murphy, 2006) Smith, 2006) 6: Initiated by Ariba, IBM, and Microsoft;
an industry standard for registering, publishing, and
Unit Development Folder (UDF) discovering Web services in a central registry called a
A kind of structured report to describe a development UDDI directory. (Sethi & Sethi, 2006a) 7: A directory
process. (Moreira & da Silva, 2005) that enables businesses to list themselves on the Internet
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U nive rsa l De sign U nive rsa l Se r vic e s Age ncy (U SA) 707
and discover each other. It is similar to a traditional phone Universal Mobile Telecommunication System
books yellow and white pages. (Lalopoulos et al., 2005b) (UMTS)
8: A Web-based distributed directory for discovery of 1: The evolution of GSM to higher bandwidth services
U
Web services offered by companies. It is similar to a and multimedia applications. (Louvros, Karaboulas, et
traditional phone books yellow and white pages. (Nicolle al., 2005) 2: One of the third-generation (3G) mobile
et al., 2005) 9: Provides a registry for businesses to list phone technologies. This technology provides the mobile
themselves on the Internet. It functions as an online version phone access to several services, such as videoconference.
of a telephone books white and yellow pages. (Hawk & (Flavin & Guinalu, 2006) 3: A third-generation (3G)
Zheng, 2006) 10: The UDDI speciications deine a way broadband, packet-based transmission of text, digitized
to publish and discover information on Web services. At voice, video, and multimedia at data rates up to 2 Mbps
a conceptual level, the information provided in a UDDI that offers a consistent set of services to mobile computer
business registration consists of three components. First, and phone users no matter where they are located in the
the white pages component includes address, contact, and world. (Olla, 2005a)
known identiiers. Second, the yellow pages component
includes industrial categorization based on standard Universal Resource Locator (URL)
taxonomies. Finally, the green pages component includes 1: An Internet address that includes the protocol required
the technical information about services that a business to open an online or off-line document. (Falk & Sockel,
exposes. At a business level, the UDDI business registry 2005) 2: A text string used as a reference to a Web
can be used for checking whether a given partner has resource. A URL consists of a protocol, a host name,
particular Web service interfaces, inding companies in a and a document name. (Yen, 2005) 3: The address of a
given industry with a given type of service, and locating computer or a document on the Internet that consists of
information about how a partner or intended partner has a communications protocol followed by a colon and two
exposed a Web service. The objective is to become aware slashes (as http://), the identiier of a computer (as www.
of the technical details required for interacting with that m-w.com), and usually a path through a directory to a ile.
service. (Maamar, 2005) Also called Uniform Resource Locator. (Dez-Higuera &
Daz-Pernas, 2005) 4: Identiies the address location of
Universal Design Web pages. (Goh & Kinshuk, 2005)
1: A concept or philosophy for designing and delivering
products and services that are usable by people with the Universal Serial Bus (USB)
widest possible range of functional capabilities. (Zaphiris A plug-and-play interface between a computer and add-
& Kurniawan, 2005) 2: A concept similar to accessible on devices (such as audio players, joysticks, keyboards,
design. Its meaning is broader in that it refers to design telephones, scanners, and printers). With USB, a new
that strives to create products that are usable by all people, device can be added to a computer without having to add
regardless of age, gender, (dis)ability, handedness, and so an adapter card or even having to turn the computer off.
forth. Its meaning is narrower in that it seeks one solution (Bochicchio & Fiore, 2005)
to accommodate the needs of all people. (Schmetzke, 2005)
3: An approach to the design of products and environments Universal Serial Bus (USB) Port
fostering usability by as many people as possible, without A standard external bus that can be used to connect multiple
adaptation. (Newell & Debenham, 2005) types of peripherals (including modems, mice, and network
adapters) to a computer. (Lawson-Body, 2005)
Universal Emotions
Mainly after the inluence of Ekman, these six emotions Universal Service
are considered to be universal, in the sense that they are 1: Provision of ICT services to all of a countrys households
uniformly recognized across different cultures. (Karpouzis within their homes. (Cecchini, 2005) 2: Widespread access
et al., 2005) to telephone and other ICT services normally related to
household access. (Frempong & Braimah, 2005)
Universal Media Access (UMA)
How users can access the same media resources with Universal Services Agency (USA)
different terminal equipment and preferences. (Knight U.S. agency established u nder South Af r ican
& Angelides, 2005) Telecommunications Act 103 of 1996 with the mission of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
708 U nive rsa l U sa bilit y U ppe r Approx im at ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U ppe r Approx im at ion of a Rough Se t U sa bilit y 709
contains objects that may or may not be in the approximation with which speciied users can achieve speciied goals
set. It can be formally deined as the union of the in a particular environment. (Yong, 2005) 6: Generally
lower approximation and the boundary region. It is the regarded as ensuring that interactive products, such as
U
complement of the set of objects deinitely not in the set. e-commerce applications, are easy to learn, effective to
(Voges, 2005) use, and enjoyable from the users perspective. It involves
the optimization of user interaction with these interactive
Upper Approximation of a Rough Set products. (Singh, 2005b) 7: How easy an interface design
Minimum definable set containing the rough set. is to understand and use. A user-friendly document will
(Grzymala-Busse & Ziarko, 2005) let the user read or play any content at will; it will have
unambiguous interactive controls and a clear navigational
UPS: See Uninterrupted Power Supply. scheme. (Liu & Tucker, 2005) 8: How effectively site
visitors can access a sites informationthings enacted
Urbanity to make a Web site easier to use. (Falk & Sockel, 2005) 9:
A set of people, institutions, and interdependent relations Usability of hypertext/Web is commonly measured using
that exist collectively in a city, and all the individual established usability dimensions covering these categories
or collective interests and existences that belong and of usability defects such as screen design, terminology
constitute the city. (Matta, 2005) and system information, system capabilities and user
control, navigation, and completing tasks. (Theng, 2005)
URI: See Uniform Resource Identiication; Uniform 10: Study of the usefulness of technology as it relates to
Resource Identiier. an individual being able to successfully perform his or her
task with ease. Usability is measured through the ability of
URL: See Uniform Resource Locator; Universal Resource the technology to do the right job and to do the job right.
Locator. (Carstens, 2005) 11: The ease and speed with which the user
can ind and understand material on the Web site without
USA: See Uniform Spread Assumption; Universal assistance. (Stodel et al., 2005) 12: The ease with which
Services Agency. a user can accomplish a desired task within a Web site.
One also talks of a site being user friendly. (Duchastel,
Usability 2005) 13: The ease with which a user can learn to operate,
1: The ability of a system to interact natural and prepare inputs for, and interpret outputs of a system or
transparent with its users. Natural in this context is the component. (Proserpio & Magni, 2005) 14: The extent to
way the user is used to acting and transparent means which a product or system can be used by speciied users
not interfering with the performed task. (Athanasis & to achieve speciied goals with effectiveness, eficiency,
Andreas, 2005) 2: The ISO 9241-11 standard deinition for and satisfaction in a speciied context of use. (De Troyer,
usability identiies three different aspects: (1) a speciied 2005) 15: The external quality factor that is deined as a
set of users; (2) speciied goals (tasks) which have to be set of attributes that bear on the effort needed for the use
measurable in terms of effectiveness, eficiency, and and on the individual assessment of such use by a stated
satisfaction; and (3) the context in which the activity or implied set of users. (Xenos, 2006) 16: The capacity
is carried out. (Singh, 2006) 3: A measure of how well of an object to be used within a given course of action. It
someone can use something. Usability, in comparison to includes the ease of use of the object for the action and
accessibility, looks at factors such as ease of use, eficiency, its usefulness or utility for the user to achieve the
effectiveness, and accuracy. It concentrates on factors of action. (Blandin, 2005) 17: Addresses the full spectrum
an interaction other than whether someone can perform of impacts upon user success and satisfaction. Usability
something, access information, and so forth, which are all is accomplished through user-centered (not necessarily
handled by accessibility. (Polovina & Pearson, 2006) 4: A user-driven) design. The usability engineer provides a
measure of quality of a users experience when interacting point of view that is not dependent upon designers goals
with a product or a system. It is described by the ease of because the usability engineers role is to act as the users
learning, eficiency of use, memorability, error frequency advocate. (Y.-W. Lin, 2005) 18: Refers to how well an
and severity, and subjective satisfaction. (Rowe, 2006d) 5: application is designed for users to perform desired tasks
A measure of the effectiveness, eficiency, and satisfaction easily and effectively. (Chan & Fang, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
710 U sa bilit y Ba rrie r U se Ca se
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U se Ca se Dia gra m U se r Ac c e pt a nc e 711
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
712 U se r Ac t ivit y Re c ord U se r M ode l
when certain conditions are met: (1) users are motivated User Focus
to use the system; (2) users have convenient access to the The set of documents corresponding to a user-deined
U system; and (3) users understand the system and what it composition of concepts; initially, the entire knowledge
can do. (Chen & Lou, 2005) base. (Sacco, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U se r M ode ling U se r Te st ing 713
information about users characteristics and preferences. proile may be used as a resource of business intelligence.
(Gaudioso & Montero, 2006) 4: A quantitative description (Li, 2005a)
of a users interaction behavior that can be used to describe,
U
predict, and/or simulate user performance on speciic tasks. User Proile Data
(Keates et al., 2006) 5: Representation of the preferences Data that provide information about the users of a Web site,
and the state of knowledge of the user (to be used as a such as the demographic information and the interests or
basis for adaptation). (Houben et al., 2006) preference of the users. (Lee-Post & Jin, 2005b)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
714 U se r Tra ck ing U se r-I nit iat e d Wire le ss Em e rge ncy Ser vic e
User Tracking drive development and designs, and to improve the usability
An automated logging mechanism that stores and retrieves and usefulness. (Y.-W. Lin, 2005)
U information on a users progress as he or she advances
through the courses on an e-learning system. (Quah, User-Centered Evaluation
Leow, Soh, 2006) An evaluation carried out with users in mind. (Zaphiris
& Zacharia, 2005)
User View
A subset of the external schema for querying the course- User-Centered Web Design
material knowledge base; the subset is usually deined The requirements of the users of a Web site play a central
based on the corresponding user proile for extracting role in the design process. (De Troyer, 2005)
relevant data and information. (Leung & Li, 2005)
User-Centered Web Site Engineering Course
User-as-Editors (UaE) Approach Web site engineering lifecycle and user-centered design.
The community members are responsible for supplying new Site goals, business models, value propositions, user
content and for the quality assurance of existing content, analysis, information architecture, interface and navigation
as well as for creating and maintaining the etiquette of design, usability guidelines, database, testing, hosting
the community. (Kindmller et al., 2005) strategies, usage metrics, and collaborative development.
(Knight & Chan, 2005)
User-Centered Design
1: A client or user-centered philosophy in which the User-Deined Type
individual is at the center of an iterative design process 1: Any type as deined through the use of some basic
encompassing multiple factors in an interaction between constructors, such as CREATE TYPE. The object-
user and information product. UCD considers cognitive, relational model provides user-deined type in an attempt
sociocultural, political, and technological factors involved to make the system more customizable for applications
in deining user tasks and goals that drive the design and with particular requirements of the data representation.
development of software, Web sites, information systems, (Badia, 2005d) 2: A named data type deined by a user.
and processesanything with which people interact. UCD It can contain a list of attributes, in which case it is said
is concerned with the usefulness, usability, desirability, to be a structured type (or object type, in Oracle). It is
legibility, learnability, accessibility, and meaningfulness an abstraction of a real-world entity. It can also provide
of an information product. (Campbell, 2005) 2: A method explicitly deined methods that implement operations with
for designing ease of use into a product by involving end the entity. (Zendulka, 2005b) 3: Any data type formed
users at every stage of design and development. (Keates by the users contained of any other data type and usually
et al., 2006) 3: A well-established process of designing including the routines. (Pardede et al., 2005)
technology that meets users expectations or that involves
potential users in the design process. (Sharples, 2006) 4: User-Developed Application
An approach to the design of system interfaces that seeks An information system developed by a user-developer. The
to ensure technology matches users needs and supports system is often small and dedicated to a speciic task in the
the tasks that users would like to perform. (Porter, 2006) user-developers working environment. (Avdic, 2005)
5: A philosophy that places the person (as opposed to the
thing) at the center of the design process. (Zaphiris & User-Developer
Kurniawan, 2005) 6: Puts the user into the center of the A person who develops user-developed applications that
software design process. (Zaphiris et al., 2005) 7: The support the user-developer in his work. The user-developer
real users and their goals, not just technology, should be has deep (often tacit) knowledge about, and is often (partly)
the driving force behind the development of a product. responsible for (part of) the organization the system is to
(Singh, 2005b) 8: An approach to software development serve. (Avdic, 2005)
that advocates maintaining a continuous user focus
during development, with the aim of producing a software User-Initiated Wireless Emergency Service
system with a good usability level. (Ferre et al., 2006) 9: A type of wireless emergency service that responds to the
A software process that seeks to answer questions about service requests made by users when they report emergency
users and their tasks and goals, then uses the indings to
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
U TAU T U WEP 715
events with mobile phones. The main application is over the Internet, and are charged according to resource
wireless emergency call service (WECS), in which usage. (Feuerlicht & Vorisek, 2006)
wireless carriers pinpoint mobile users when they dial
U
emergency numbers and deliver their emergency calls as Utopia
well as location information to local public-safety answer 1: A real or imagined society, place, or state that is
points. (Sun, 2005) considered to be perfect or ideal. (Macfadyen, 2006b) 2:
Imaginary place or state of things in which everything is
UTAUT: See Uniied Theory of Acceptance and Use of perfect. (Signoret, 2006)
Technology.
UUCP: See Unix-to-Unix Copy.
UTF-8
Unicode Transformation Format 8 bits; the byte-oriented UUID: See Universally Unique ID.
encoding form of Unicode. (T.S. Chan, 2005)
UWEP
Utilitarian An incremental association rule algorithm. Such algorithms
Plain, practical, useful. (Bridges et al., 2006) use the information obtained in previous association rule
processing to reduce the amount of dataset scans when new
Utilitarian/Economic Consumer transactions are added. (Imberman & Tansel, 2006)
Consumer who considers the shopping expedition as a
task to be fulilled; the consumer is goal oriented, does
not derive pleasure from the act of shopping, and values
quick shopping expeditions. (Scarpi & DallOlmo-Riley,
2006)
Utilitarianism
The philosophical view that the moral act is the one that
results in the greatest good or happiness for the greatest
number of people. (Gilbert, 2005)
Utile
Numerical utility value, expressing the true worth of
information. Such values are obtained by constructing a
special utility function. (Sundaram & Portougal, 2005b)
Utility
1: The extent to which the system provides the right kind
of functionality so that users can do what they need or
want to do. (Yong, 2005) 2: The quality or condition of
being useful (usefulness). (Croasdell & Wang, 2006) 3:
Measures the degree of usefulness of an object. Classical
economical theories consider that the utility of an object
and the available quantity of this object determine its
price. (Blandin, 2005)
Utility Computing
Computing services are provided on demand by a provider
organization that uses its computers and facilities.
Customers access the computers via a private network or
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
716 V M ode l Va lidat ion Tool
V
V Model Valid Time
1: A modified system development lifecycle which 1: Designates when data values become valid. (Tansel,
emphasizes quality assurance. (Steinbach & Knight, 2005) 2005) 2: The time when a fact (i.e., a statement with
2: A model for training that aligns the business context an associated truth value) is true in the modeled reality.
and needs with the evaluation strategy. (Waddington et (Rodrguez-Tastets, 2005b)
al., 2005)
Valid XML Document
V-CARD To be valid, an XML document additionally must conform
A metadata format that enables a person to be described. (at least) to an explicitly associated document schema
This is used extensively in commercial e-mail systems and deinition. (Nayak, 2005b)
can be thought of as an electronic business card. (Verhaart
& Kinshuk 2006) Valid-Time Temporal Document Database
Every document that is stored is explicitly given a time
VA: See Vulnerability Assessment. period in which it is valid. The start and end timestamps of
this period can be in the past, present, or future. (Nrvg,
Vague/Fluid/Permeable Boundary 2005)
As a continuation of lexibility, the virtual organization is
characterized by vague boundaries as to the extent of its Validation
use and purpose. Since small tweaks can easily and largely 1: The process of determining whether an expert system to
affect the overall organization, it is quite possible to extend be used in an administrative process is correct. This involves
the boundaries of an organization so that they encompass a combination of methods of which the most important
new purpose, people, or control. (J. Lee, 2005) are: letting domain experts verify the knowledge in the
knowledge base, using automated procedures to check the
VAI: See Value Activity Interaction. system for consistency, and applying the system to a larger
number of test cases. (Svensson, 2005) 2: The process of
Valence showing the correspondence between the physical system
The strength of an experienced emotion. (Byl & Toleman, and the simulated system is within acceptable tolerances
2005) of output performance. Validation relies on statistical
conirmation of the simulated output to it the behavior
Valence Model exhibited by a target, physical system. (Vitolo & Coulston,
Model showing that the overall attractiveness of an 2005) 3: Ensuring that the assumptions used in developing
application to a user is the summation of the products of the model are reasonable in that, if correctly implemented,
the attractiveness of those outcomes associated with the the model would produce results close to that observed
application and the probability that the application will in real systems. Model validation consists of validating
produce those outcomes. (Chen & Lou, 2005) assumptions, input parameters and distributions, and output
values and conclusions. (Al-Hanbali & Sadoun, 2006)
Valid Scope
The area within which the data instance is the only answer Validation Tool
with respect to a location-dependent query. (Xu, 2006) One of the tools available for semi-automatic validation
of Web site accessibility. Such tools test only the code
Valid Scope Distribution syntax and style sheets, without considering semantic
The collective set of valid scopes for a data item. (Xu, aspects where the human control is needed. (Costagliola,
2006) Di Martino, Ferrucci, et al., 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Va lidit y Va lue Cre at ion Wa y 717
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
718 Va lue De live r y Va ria nc e
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Va ria nc e Est im at ion Ve ndor-Originat e d ERP M a int e nanc e Re que st 719
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
720 Ve nt ure Ca pit a l Ve r t ic a l Dim e nsion
vendors maintenance-support strategy and upgrade one matching process for determining whether the user is
path availability, and provide additional enhancement to indeed the one he/she claims he/she is. (Li, 2006)
V business process functionality and meet user requirements.
(Ng, 2005) Version
A set of variations of an object with a high degree of
Venture Capital similarity. Document versions are never completely equal,
A general term to describe inancing and investing for startup but they are similar enough so as to be recognizable as the
and early stage businesses. (Hwang & Stewart, 2006) same document. (Martnez-Gonzlez, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Ve r t ic a l Disint e grat ion V ide o I ndex ing 721
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
722 V ide o M a pping V ie w
Video Mapping to connect two or more sites together in such a way that both
A system is allowing the mapping of an audio, video movie, ends see and hear each other synchronously. (Baxendale,
V or animation on to the surface of a 3D object. A progressive 2005) 7: Two-way, interactive communication of audio-
video mapping system allows a user to collect color video video data that occurs in real time between participants
and infrared data which includes exact location information located in two or more locations. (Dudding, 2005) 8: The
on every recorded frame via GPS (global positioning use of information and communications technology to
system), and links this to computerized graphical allow people at different locations to hear, see, and speak
information systems. (Modrk & Marcn, 2006) to one another. It often includes the sharing of documents
and textual communications. (Chan, Tan, et al., 2005) 9: A
Video on Demand (VoD) video communications session among three or more people
1: Technology that allows you to order a video broadcast, who are geographically separated. (Parikh & Parolia, 2005)
for example, a Hollywood movie, at the exact moment 10: Engages communication and transmission between two
you want to watch it, with no pre-set start times. VoD also or more persons/parties in different geographical locations
allows you to control the broadcast you are watching just as via video and audio through a private network or Internet.
it would be possible with a VCR, for example, the ability It allows face-to-face conversations. (Nandavadekar, 2005)
to fast-forward, rewind, and pause your movie at any time. 11: This technology allows people in two or more distance
(Papagiannidis et al., 2005) 2: A planned system using locations to speak with each other simultaneously. It allows
compressed video streams to supply programs to viewers users to discuss ideas when face-to-face interaction is
when requested, via a network. (Fortino, 2005) desired but not possible. (Gillani, 2005b) 12: A conference
between two or more participants at different sites by
Video Shot using computer networks to transmit audio and video data.
A sequence of contiguous video frames taken using the (Hazari, 2006)
same camera. (Farag, 2005b)
Videoconferencing for Supervision
Video Streaming The use of two-way interactive videoconferencing for the
A video sequence that is sent in compressed form over purpose of live supervision of graduate students. (Dudding,
the Internet and displayed by the viewer as they arrive. 2005)
(Bochicchio & Fiore, 2005)
Videoconferencing over IP
Videoconference Recording on-Demand The use of the Internet Protocol for transmission of audio-
(VCRoD) video data during a videoconference. (Dudding, 2005)
A VoD system which is also able to dump and archive
networked media streams. (Fortino, 2005) Videogame
An interactive game played on a stand-alone arcade machine
Videoconferencing or home console. (Ip & Jacobs, 2006)
1: A synchronous audio-visual connection where two or
more geographically separated parties can see and hear Videotext
each other, which usually involves a TV and/or computer, Text graphically superimposed on video imagery, such as
speakers, microphones, and one or more cameras; a video caption text, headline news, speaker identity, location, and
phone. (Dell, 2005) 2: Conducting a conference between so on. (Aradhye & Dorai, 2005)
two or more participants at different sites by using computer
networks to transmit audio and video data. (Kabene et al., View
2005a) 3: Electronic technique used to allow three or more 1: A collection of data whose values either have to be derived
people at two or more or more locations to communicate. from other data (when the view is not materialized), or have
(Lateh & Raman, 2005) 4: Information technology tool been pre-computed from other data and stored (when it is
that transfers video (closed-circuit television) as well as materialized). (Lu, 2005) 2: A named query. (Theodoratos
audio, and is used by two or more people working together & Simitsis, 2005) 3: A logical representation of information
at different physical locations for collaboration in real contained in a database. It is an abstract vision of source data.
time. (Ribire & Romn, 2006) 5: The use of multimedia (Cannataro et al., 2005) 4: A view V on S is an assignment
elements, digital cameras, and microphones to capture of values to the elements of the set. If the assignment holds
video and sound, and transmit it live to other users who will for the dimensions and measures in a given cell X, then
receive it using their display units and speakers. (Laghos & V is a view for X on the set S. (Abdulghani, 2005b) 5: In
Zaphiris, 2005a) 6: The use of video and audio technologies multiview learning, the available attributes are partitioned
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
View Deinition Virtual Class/Virtual Lecture/Virtual Seminar/Virtual Tutorial 723
into two disjoint subsets, or views, which are required to Viral Marketing
be independent and compatible. (Scheffer, 2005) 1: A recent contribution to the marketing mix that uses
technical networks such as the Internet or mobile phone V
View Deinition network, to start an epidemic that spreads an idea or message
Maps the view schema into view domain (data sources) (the virus infection) through social networks. (Foth,
using a view deinition language. Typically an SQL-like 2005) 2: When individuals forward information online to
query language is used to map data from sources to views. each other so that it spreads exponentially like a virus or
(Cannataro et al., 2005) rumor. (Goldsmith, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
724 V ir t ua l Cla ssroom V ir t ua l Com m unit y
learners to interact in pursuit of an instructional objective participants work in their own computers but share data
and to access supporting materials such as books and and information by means of a users interface. (Xodo,
V blackboards. The use of linked computers makes it possible 2005)
for such interaction to take place without the physical
presence of teachers and learners, or any instructional Virtual College: See Virtual School.
materials or devices such as books and blackboards. The
Internet now provides a global infrastructure for this so Virtual Community
that the terms have become synonymous with holding 1: A group of people that for all practical purposes have
classes, lectures, seminars, and tutorials on the Internet. common interests and needs, and are connected to one
(Rajasingham & Tifin, 2005) another via an online means such as the Internet. (Kardaras
& Karakostas, 2006) 2: A term that describes the groups of
Virtual Classroom people with shared interests that communicate socially via
1: A classroom without physical space; a classroom deined computer networks. (De, 2006) 3: Group of people with
by its participants, content, and afiliation. (Reilly, 2005) similar (business) interests who interact, collaborate, and
2: A set of tools for communication support that allows communicate via the Internet. (Averweg, 2006) 4: Group
collaboration between participants in the educational of people, formed through the establishment of common
process (i.e., lecturers, tutors, learners) and gives them an skills and practice, who communicate in cyberspace without
impression of learning in a community. (Rugelj, 2005) 3: physical contact, and in differing spaces and time. (Huq,
An Internet-mediated forum for distribution of learning 2006) 5: Mediated social space in the online environment
materials, classroom discussion, and collaborative working. that allows collections of people to form and be sustained
(Grasso & Leng, 2005) 4: An online learning space where through ongoing communication processes. (Bagozzi
students and instructors interact. (Soh & Jiang, 2006) 5: A & Dholakia, 2005) 6: A broader concept than that of
Web-based environment that allows students to participate Internet-mediated communities, since it is applied to any
in live training events without the need to be physically in technology for information exchange. (Porto Bellini &
the same place. In a virtual classroom, one listens to lectures, Vargas, 2006) 7: A cyberspace supported by computer-based
participates in lab exercises, asks questions to teachers or information technology, centered upon the communication
students, and receives feedback just as you would do in a and interaction of participants to generate member-driven
conventional classroom. (Agosti, 2005) contents, resulting in relationships being built up. (Hassan et
al., 2006) 8: A featureless and, therefore, often misleading
Virtual Coffee Pot/Virtual Water Cooler term usually regarded as synonymous to online community.
Using electronic communication (such as e-mail or instant The term online community is preferable, as it denotes the
messaging) to conduct informal interactions (personal or character of the community more accurately. (Kindmller
non-work conversations) that would normally be discussed et al., 2005) 9: A social aggregation on the Internet when
around the ofice water cooler in a face-to-face work people interact long enough to form personal relationships.
environment. (Staples et al., 2005) (Suomi, 2006) 10: A social and technical construct that
exists to coordinate the group-based activity of a number
Virtual Collaboration: See Electronic Collaboration/ of individuals who share a common interest or sense of
Collaborative Commerce. purpose. Virtual communities are maintained in the online
world and supported by communication technology to
Virtual Collaborative Design support geographically separated groups. (Fleming, 2005c)
1: Refers to two or more designers working together 11: An online forum or discussion group through which
irrespective of time and place to deliver a common members may interact either in real time or asynchronously.
design product with the use of networked information Most virtual communities use discussion groups and
and communication technology tools. (Barima, 2006b) message boards that are accessible online to all members.
2: The process of combining ideas, expertise, and forces Members correspond by posting messages back and forth
by using computer-based technology, which supports within the forum. Membership in a virtual community
synchronous or asynchronous distributed collaboration indicates that the user shares one or more common interests
between the participants or stakeholders. (Aurum & with others in the same forum. (Baim, 2005) 12: Computer-
Demirbilek, 2006) mediated communication, particularly long term, taking
place among large groups, such that social relationships
Virtual Collaborative Environment are formed among the participants through repeated
Computing applications that include systems of groupware contact within a speciied boundary or place symbolically
in order to assist work groups with a common goal, where delineated by a topic of interest. (Shan et al., 2006b) 13: A
community of users that has the following characteristics:
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Com m unit y K now le dge Ba se V ir t ua l Ent e rpris e 725
(1) it exists in cyberspace, and the communication between Virtual Community Sponsor
the members of the community is computer mediated; (2) it An individual or organization providing inancial, technical,
uses communication technologies, such as e-mail, message and/or ideological support to a virtual community in an V
boards, blogging, and online chatting, for communication; effort to keep it vibrant and active or to increase its ability to
(3) it develops largely through the activeness and interests address issues on behalf of its members. (Baim, 2006d)
of their participants. The content of virtual communities is
formed through the communication between the members Virtual Community Stage
of such communities; and (4) it leads its members to form Level of virtual communitys maturity or developmentthat
sustained relationships as a result of their interaction. is, nascent, formative, or mature. (Shan et al., 2006a)
(Hassan & Hietanen, 2006)
Virtual Design Team
Virtual Community Knowledge Base A stream of research focused on developing computational
The collective body of knowledge pulled together by methods and tools to enable the design of organizations in
members of a virtual community in an effort to provide a manner similar to how complex physical artifacts such
members with information on topics of primary interest to as airplanes, bridges, and computers are designed (i.e., via
the community. The knowledge base may exist primarily in computer models). (Nissen & Levitt, 2006)
the minds of the membership, or it be formally documented
and archived electronically for searching by individual Virtual Document
members as needed. (Baim, 2006a) A document (intellectual entity) that exists in the conscience
of individuals, but of which there is no physical copy
Virtual Community of Interest available. (Martnez-Gonzlez, 2005)
A group of individuals brought together around shared
values and purposes through an Internet-mediated Virtual E-Hospital (or Hospital Without Walls)
communication media, noting that the original purpose of A telemedical facility that provides continuous monitoring
individual virtual communities evolves and changes over of patients staying in their homes and enjoying family
time as relationships are built. The evolution of the virtual support, and creates a psychological satisfaction to the
community into an individual social network of informal, patients that they are receiving immediate attention and care
interpersonal ties is characterized by the development of as if they are in a real hospital. (Murthy & Krishnamurthy,
both intimate and weak ties that provide an important source 2005d)
of information, support, companionship, trust, and sense
of personal attachment or community over time. (Fryer Virtual Education
& Turner, 2006) 1: A distance education system that has the virtue to
improve the learning process exclusively using new
Virtual Community of Practice (VCoP) information and communication technologies. (Barrera,
1: Group of people that relies primarily on networked 2005) 2: Includes aspects of both online and e-learning,
communication media to communicate and connect in but goes somewhat further. While it is largely Web-centric,
order to: discuss problems and issues associated with their it does not necessarily limit itself to learners outside a
profession; share documents, solutions, or best practices; conventional classroom. It uses multimedia and, besides
collaborate on projects; plan for face-to-face meetings; delivering content, also enables a high level of interaction
or continue relationships and work beyond face-to-face among learners, content, teachers, peers, and administration
events (www.educause.edu/vcop). (Louis, 2006) 2: both synchronously and asynchronously. (Torres-Coronas,
Informal cluster of employees who work togethersharing 2005)
knowledge, solving common problems, and exchanging
insights, stories, and frustrationsand who do this working Virtual Enterprise
from a distance, rather than face-to-face. (Tremblay, 2006b) 1: A temporary alliance of existing enterprises or
3: Community of practice in which members interact organizations that share skills, competencies, and resources
supported by collaborative technologies in order to bridge in order to better respond to some common business
time and/or geographical distances. VCoPs are partly self- goals and whose cooperation is supported by computer
organized, deliberate groups of people who share common networks. (Rolland & Kaabi, 2006) 2: A temporary business
practices, interests, or aims on behalf of the organization organization set up between trading partners operating
they belong to, and who want to advance their knowledge. from geographically dispersed sites for the duration of
(von Wartburg et al., 2006) a common project. The design and manufacture of new
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
726 V ir t ua l Ent it y V ir t ua l Le a r ning
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Le a r ning Com m unit y (V LC) V ir t ua l M e 727
simulation of Paradise, perhaps in a virtual reality or 3D the e-learning application that delivers the course to the
gaming space. (Schrum, 2005) learner. (ODea, 2005) 5: A set of teaching and learning
tools designed to enhance a students learning experience by V
Virtual Learning Community (VLC) including computers and the Internet in the learning process.
1: A learning community based not on actual geography, The principal components of a VLE package include
but on shared purpose. Through technology, learners can curriculum mapping, student tracking, online support for
be drawn together from almost anywhere, and they can both teacher and student, electronic communication, and
construct their own formal or informal groups. As such, a Internet links to outside curriculum resources. There are a
VLC is separated by space, but not time, as communication number of commercial VLE software packages available,
can be facilitated by technology in real time, partially including Blackboard, WebCT, Lotus LearningSpace, and
overcoming geographical inhibitions. (Blackmore et al., COSE. (Torres-Coronas, 2005) 6: Groupware system that
2006) 2: A community of people who come together has been developed to replace or supplement conventional
online to learn a particular subject matter. (Swan, 2005) classroom-based education. (Diamadis & Polyzos, 2005)
3: Traditionally, the concept of community refers to 7: System on the Internet whose functions enable learning
a group of people bound together with close ties and situations through information and communication
personal relationships, based typically on a kinship and technologies. (Beuschel et al., 2005)
on reciprocity. More recently, the concept has extended
to virtual environments; its members linked globally Virtual Learning Model
by information and communication technologies. In A model that, irrespective of time or distance barriers,
educational context, community practices take place in coupled with the differences in organizational structures
virtual learning environments, where learning processes and norms, can accommodate its logistics and procedures
and learning support are often blended in face-to-face to delivery knowledge in different parts of the world.
and technology-based learning environments. (Pys & (Kamel, 2005b)
Lowyck, 2005) 4: Variant of the above where individuals
come together, often in connection with a course of study or Virtual Library
academic activity, to study or investigate problems related 1: The aggregated digital learning resources and associated
to a theme or area of shared interest. (Fleming, 2005c) 5: librarian-assisted services that support the curricula and
An intentionally developed network of individuals who degree programs of online, virtual universities. (Garten,
share similar experiences, goals, and interests, and who 2005) 2: More than just a means of collocating electronic
congregate for purpose of learning. The primary mode of resources (full-text materials, databases, media, and
communication and interaction is electronic; the community catalogs), a virtual library also provides user assistance
may elect to use synchronous or asynchronous technologies services, such as reference, interlibrary loan, technical
to facilitate ongoing learning. (McCracken, 2005) assistance, and so forth. (Burke et al., 2005) 3: Services
and resources that are provided in a digital or electronic
Virtual Learning Environment (VLE) format and accessed via a computer either in a library or
1: A Web-based, designed learning environment where the remotely from another workstation. (Hanson, 2005)
information and social spaces are explicitly represented.
VLEs may vary from text-based to three-dimensional Virtual Machine
environments. Often, VLEs integrate various technological A software system that enables a collection of heterogeneous
tools and pedagogical approaches where physical and computers to be used as a coherent and lexible concurrent
virtual interaction overlaps. (Pys & Lowyck, 2005) 2: computational resource. (Yow & Moertiyoso, 2005)
Internal or external site, often organized around a tightly
focused topic, which contains technologies (ranging from Virtual Marketplace
chat rooms to groupware) that enable users to submit A simulation of the real marketplace where buyers and
and retrieve information. (Blackmore et al., 2006) 3: sellers meet to negotiate transactions. (Guan, 2006h)
Technology-mediated venue for learning; typically includes
asynchronous as well as synchronous facilities. (Coakes Virtual Me
& Willis, 2005) 4: Deals with the actual delivery of the A framework that uses Internet technologies to structure
learning material or content, including assessment, tutor- a personal portfolio and allows external users to add
to-learner communication, and tracking of student progress annotations. A sniplet is its basic unit, and digital assets
and activity, as well as linking to any student record or are structured as multimedia objects. (Verhaart & Kinshuk
management information system. A VLE may also, often, 2006)
include a content authoring facility. In essence, a VLE is
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
728 V ir t ua l M obilit y V ir t ua l Orga nizat ion
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Orga nizat ion Cont ra c t V ir t ua l Re a lit y M ode ling La ngua ge (V RM L) 729
that share common value chains and business processes computer modeling and simulation to enable a person
supported by distributed information technology. (Wei & to interact with an artiicial three-dimensional visual or
Wang, 2006) 13: An electronic transformation process for other sensory environment. VR applications immerse the V
any organization transitioning from a bricks-and-mortar user in a computer-generated environment that simulates
entity to its clicks-and-mortar counterpart, emphasizing reality through the use of interactive devices, which send
the appropriate use of information technologies in the and receive information and are worn as goggles, headsets,
three vectors of virtual encountering the organization, gloves, and so forth. (Dez-Higuera & Daz-Pernas, 2005)
virtual sourcing the tangible and intangible assets of 3: 3D digital world, simulating the real one, allowing a user
the organization, and virtual expertizing (managing) to interact with objects as if inside it. (Sappa et al., 2005)
the knowledge of the organization. (Vat, 2006b) 14: An 4: A term often used interchangeably to refer to technical
integrated approach to becoming an extended organization systems and their effects that simulate real and imagined
by focusing on customer assets, supplier alliances, and worlds, especially visually, by creating an apparently
employee empowerment through ICT-enabled knowledge immersive environment for the user(s). (Lepawsky & Park,
management. (Burn & Ash, 2006) 2006) 5: Computer-generated environment that simulates
three-dimensional reality. (Arya, 2005) 6: Immersive,
Virtual Organization Contract interactive, illustrative, and intuitive representation of the
A contract between the cooperating parties that establishes real world based on visualization and computer graphic.
the relationships and responsibilities among the virtual (Viktor & Paquet, 2005) 7: A modern technology that gives
organization members. (Unal et al., 2006) to its users the illusion of being immersed in a computer-
generated virtual world with the ability to interact with it.
Virtual Private Network (VPN) (Sala, 2005b) 8: Simulation of a real environment where
1: A virtual network constructed for users within a single users can have feelings of seeing, touch, hearing, and smell.
administrative unit (e.g., a company or university), (Terashima, 2005) 9: Uses computer-based technology
making use of public communication links. Encryption that creates the illusion of reality, and the user interacts
and bandwidth guarantees may be supported over a VPN. with that environment. The objective is to provide as
(DaSilva, 2005) 2: Method of communicating information realistic an environment for the user as possible. (Aurum
from one private secure network to another using the & Demirbilek, 2006)
Internet or telephone lines as a transport mechanism.
Tunneling protocols are used to authenticate users, provide Virtual Reality Education for Assisted Learning
error control, and encrypt and decrypt data. (Calzonetti & System (VREFALS)
deChambeau, 2006) 3: Software run on a client computer A virtual reality, computer-based training for people with
that allows it to connect to a remote network and appear as disabilities, including deaf persons. Also known as VREAL.
if connected locally. (Bagwell, 2005) 4: A private network (Rhoten, 2006b)
that provides access to various locations via a public network
carrier. (Butcher-Powell, 2005) Virtual Reality Markup Language (VRML)
1: Used to model three-dimensional worlds and data sets on
Virtual Professional Community the Internet. (M. Lang, 2005) 2: Oficially called ISOIEC
Community of professionals whose collaboration on 14772, this standard is the irst attempt to provide a uniied
activities required to realize shared goals is mostly or representation for 3D objects and 3D scenes. (Prteux &
completely computer enabled. (Signoret, 2006) Preda, 2005) 3: A platform-independent language for virtual
reality scene description. (Sappa et al., 2005) 4: An open
Virtual Public 3D description language, whose irst version became an
Symbolically delineated computer-mediated space whose international standard in 1995. Developed by the Web3D
existence is relatively transparent and open, allowing consortium, its goal is to allow shared virtual worlds and
groups of individuals to attend and contribute to a set of 3D media on the Web. (Di Giacomo et al., 2005)
computer-mediated interpersonal interactions. (Shan et
al., 2006b) Virtual Reality Modeling Language (VRML)
A programming language for the creation of virtual worlds.
Virtual Reality (VR) Using a VRML viewer, you can take a virtual tour of a 3D
1: A technology which provides an interactive interface model building, or manipulate animations of 3D objects.
between human and computer that involves using multiple Hyperlinks to other sites and iles can be embedded in the
senses, typically sound, vision, and touch in the computer- world you visit. (Dez-Higuera & Daz-Pernas, 2005)
generated environment. (OHagan, 2005) 2: The use of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
730 V ir t ua l Re a lit y Tool V ir t ua l Supply Cha in
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ua l Te a ching V ir t ua l Te a m Le a de r 731
as though the various entities in the chain were all part of formally designated, and formally controlled group that
the same company. (Aigbedo, 2005) generally works together through text-based computer-
mediated means, for example, e-mail, listservs, and so forth. V
Virtual Teaching (Wasko & Teigland, 2006a) 12: A social system of three
Students in the virtual teaching environment are given or more people, whose members perceive themselves and
instructions by the lecturer on the requisite technology are perceived by others as team members, whose members
necessary to accomplish the virtual format of instruction. collaborate on a common temporary task, and whose
This technology includes instruction through accessing members rarely meet in person, but communicate mainly
Web pages, e-mail, the World Wide Web, and newsgroups. through telecommunication and information technologies.
To assure student competency, the virtual class may meet (Lettl et al., 2006) 13: Consists of members who are
sometimes to review the previous instructions, thereby scatted in different locations that are across geographical
maximizing the ability to carry out the class in the virtual boundaries, and who are working together mainly based
setting. (Chu & Lam, 2006) upon information technology. (Chuang et al., 2005) 14: A
team constructed of collaborative relationships supported
Virtual Team by information technology to overcome boundaries of
1: A team with members that are not co-located and so time, location, and organizational boundaries. (Morris et
use technology to communicate and conduct their work. al., 2005) 15: A work unit that is created for the purpose
(This term is predominantly used in the corporate literature of contributing some function, project, or other output
and means the same thing as computer-mediated team.) to an organizations mission, but which does not exist
(Graham & Misanchuk, 2005) 2: A given number of people in a particular location or place. Remotely located team
at distributed locations communicating and working to some members are obliged to interact with each other via codiied
degree via information and communication technologies and acknowledged authority structures, each contributing
on a set project or task, which may be of a limited or to the team output by means of electronic and/or telephonic
unlimited duration. Face-to-face meetings at the start-up linkages. These connect the team and enable the shared task
of the team or at regular intervals are possible in a virtual to be progressed. Virtual teams are often multi-location
team. (Pauleen, 2005) 3: A group of geographically and and international in nature. (Cargill, 2006b) 16: An
organizationally dispersed workers brought together across organizational unit that is unconstrained by geographical,
time and space through information and communication temporal, organizational, and/or national boundaries, and
technologies. (Long et al., 2005) 4: A group of individuals whose members rely upon electronic communication
who work on interdependent tasks, who share responsibility processes to work together both synchronously (e.g.,
for outcomes, and who work together from different videoconferencing) and asynchronously (e.g., electronic
locations (i.e., they are geographically dispersed, in terms mail) to accomplish their tasks. (Cuevas et al., 2005) 17:
of their normal work location). (Staples et al., 2005) 5: In addition to a common purpose as a team, these groups
A group of people and subteams who interact through are geographically dispersed with no or a moderate level
interdependent tasks guided by a common purpose and of physical proximity, who share a common virtual space
work across space, time, and organizational boundaries where they collaborate by means of ICT to fulill the goal
with links strengthened by information, communication, of the project. (Hustad & Munkvold, 2006) 18: Team of
and transport technologies. (Hassan et al., 2006) 6: A group people who work interdependently across space, time, and
of people brought together from different locations who organizational boundaries through the use of technology
do not meet face-to-face, but work as a team. (Elshaw, to facilitate communication and collaboration. (Hantula
2006b) 7: A group of people who are geographically & DeRosa, 2005) 19: Team that works without bounds of
separated and who work across boundaries of space and time or space, and often with the support of synchronous
time by utilizing computer-driven technologies such as and asynchronous technologies. Team members are often
desktop videoconferencing, collaborative software, and located in different geographic regions from the manager
Internet/intranet systems. How these teams interact deines as well as other team members. (Schaffer & Schmidt,
them as virtual. (Torres-Coronas & Gasc-Hernndez, 2006)
2005) 8: A group of people who are located in different
physical locations, who work together to achieve shared Virtual Team Leader
goals, supported by technology. (Dara-Abrams, 2006) 9: A The person who functions as the hub of the team, holding it
group of people working on the same project from different together. In the literature, this person may be termed a team
locations linked by computer networks. (OHagan, 2005) facilitator, (virtual) project manager, coordinator, or coach
10: A group of remotely situated individuals who rely depending on the nuances of the role, the perspective of the
primarily on electronic communication to work together researcher, and organizational terminology. The team leader
on group tasks. (Lam et al., 2006) 11: A relatively small, responsibilities may include all or some of the following:
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
732 V ir t ua l Te chnology-Ba se d U nive rsit y V ir t ue
selecting team members; setting team tasks and team Virtual Work
member roles; ensuring project or task completion; liaising 1: The combination of task-based, relational, and presence
V with stakeholders and clients; establishing communication practices conducted by workers who work from a remote
and team protocols, facilitating interpersonal and team location. (P.M. Leonardi, 2005) 2: Work environments
communication, handling conlict, managing technology, where individuals spend some time working in a non-face-
and in general ensuring effective participation of all the to-face (FTF) mode, using information and communication
team members. (Pauleen, 2005) technologies to perform work activities. (Blanger,
2005)
Virtual Technology-Based University
University that teaches students mainly through the new Virtual World
information and communication technologies. (Guri- The computer-based, digitally generated, and Internet-
Rosenblit, 2005a) connected network space of which principal features
include spatiality, temporality, interactivity, physicality,
Virtual Textbook and persistence. (Park & Lepawsky, 2006)
A collection of multimedia learning materials with some
additional functionalities, such as interactive computer- Virtual World Generator
supported examination and access to dynamically changing A system component that uses space elements and digital
information resources. (Rugelj, 2005) item representations to dynamically create a virtual
environment, which is sent to the user. (Lepouras &
Virtual University: See Virtual School. Vassilakis, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V ir t ue Chip V isua l At t e nt ion 733
Virtue Chip virus patterns into the software, to enable easy updating.
The hardware chip that contains the standard table for the (Luo & Warkentin, 2005)
virtue nets (virtue map). (Croasdell & Wang, 2006) V
Virus Signature
Virtue Link A unique string of bits, or the binary pattern, of a virus. The
The connection or bond between data nodes dictated by the virus signature is like a ingerprint in that it can be used to
types of virtues they possess. (Croasdell & Wang, 2006) detect and identify speciic viruses. Antivirus software uses
the virus signature to scan for the presence of malicious
Virtue Manager code. (Luo & Warkentin, 2005)
A module within the operating system that manages
the virtue net and learns the preferences of the user(s). Visibility
(Croasdell & Wang, 2006) 1: Points and quality of presence on where potential
customers can ind a Web site. (T.S. Chan, 2005) 2: The
Virtue Map perception of the actual visibility of the innovation itself as
A table used to store virtue-net pathways. Table values opposed to the visibility of outputs. (Green et al., 2005)
relect attributes in the table. It is dynamically updated in
programmable virtue chips. (Croasdell & Wang, 2006) Visibility of Location
In the ield of Web usability, visibility of location refers to
Virtue Net letting users know where they are in a Web site, as well as
A set of weighted pathways between data nodes based on the status of their inputs and navigation. Examples of ways
various attributes they have in common within a cognitive to increase visibility of location include providing a site
nodes control. (Croasdell & Wang, 2006) map, headers, and navigation paths. (Chalmers, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
734 V isua l Com plex it y V LCC
which human sensory and cognitive systems regulate what Visual Modeling Language
we see. (Thomas & Roda, 2006a) A diagrammatic modeling language. (Krogstie, 2005a)
V
Visual Complexity Visual Query Language
Graphical effects that evoke curiosity to see more. (Wishart, A language that allows the user to specify its goals in a two-
2005) (or more) dimensional way with visual expressionsspatial
arrangements of textual and graphical symbols. (Ferri &
Visual Data Browsing Rafanelli, 2005)
A term generally used to summarize all kinds of interactions
involved in visually skimming, browsing, and navigating Visual Reconstruction
visual data in order to quickly consume or identify the Computing for each corresponding point pair in the images
corresponding content or to localize speciic information. a point in space. (Ozer et al., 2005)
Visual data in this context can be a static document, such
as a text ile, graphics, or an image, as well as a continuous Visual Speech Recognition
data stream, such as the visual stream of a video recording. Computer vision techniques are used to extract information
(Hrst, 2006) about the lips shape. This information is compared with
information extracted from the speech acoustic signal to
Visual Data Mining determine the most probable speech recognition output.
1: Data-mining process through data visualization. The (Bourguet, 2006)
fundamental concept of visual data mining is the interaction
between data visual presentation, human graphics cognition, Visualization
and problem solving. (S. Wang & Wang, 2005) 2: The 1: Graphical display of data and models facilitating
integration of data visualization and data mining. Visual the understanding and interpretation of the information
data mining is closely related to computer graphics, contained in them. (Tzanis et al., 2005) 2: Graphically
multimedia systems, human-computer interfaces, pattern displayed data from simple scatter plots to complex
recognition, and high-performance computing. (Viktor & multi-dimensional representations to facilitate better
Paquet, 2005) 3: The use of computer-generated graphics understanding. (Zhu, 2005) 3: The graphical expression of
in both 2D and 3D for the use in knowledge discovery of data or information. (Viktor & Paquet, 2005) 4: To make
patterns in data. (Segall, 2005) something visible by means of some representation. A
visualization consists of two elements: a mental process
Visual Interface and a graphical language. Note that to visualize is
Visual on-screen elements that can be altered or that provide different from to see. (Pareja-Flores & Iturbide, 2005) 5:
information to the user during interaction with the game. Viewing data in picture form in an attempt to gain a further
(Ip & Jacobs, 2006) understanding of the trends and relationships it contains.
(Cottingham, 2005) 6: Visualization tools to graphically
Visual Language display data in order to facilitate better understanding of
Language characterized by a set of visual sentences, their meanings. Graphical capabilities range from simple
each composed of icons spatially arranged over a two- scatter plots to three-dimensional virtual reality systems.
dimensional space. (Polese et al., 2005) (Liu, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
V LE Vor t a l 735
VLE: See Virtual Learning Environment. 2005) 7: Standard for making telephone calls via an Internet
connection. It enables the lexible use of different input
VO Broker devices, including video telephone applications. (Blecker V
A subject who acts as an intermediary for the setting up of & Graf, 2006) 8: Web-based telephone service. (Bedard-
the virtual organization by identifying a possible business Voorhees, 2005) 9: Application sending telephone voice
opportunity, contacting the potential partners, and proposing calls over the Internet inexpensively, by transforming
agreement templates. (Cevenini, 2005) peoples voices into packet-based data. (Phala, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
736 Vot e Ac c ura cy V ygot sk ia n
Vulnerability
1: This makes a system more prone to attack by a threat,
or makes an attack more likely to have some success or
impact. For example, for ire, a vulnerability would be the
presence of inlammable materials (e.g., paper). (Tong &
Wong, 2005a) 2: A systems weakness or error that might
allow to penetrate the security barriers. (Weippl, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
W-CDM A Wat e r m a rk 737
W
W-CDMA War Game
1: A w ideba nd spre a d- sp e ct r u m 3G mobi le Learning event that allows simulating the battleield in
telecommunication air interface that utilizes code division advance, either in order to test various scenarios or to train
multiple access (or CDMA, the general multiplexing decision makers at all levels. (Ariely, 2006b)
scheme). (Wong, 2006) 2: Wideband CDMA is a technology
for wideband digital radio communications of multimedia Wardriving
and other capacity-demanding applications. It is adopted Also termed WiLDingWireless Lan Driving, it is an
by ITU under the name IMT-2000 direct spread. (Akhtar, activity whereby individuals drive around an area detecting
2005) Wi-Fi wireless networks, which they then can access with
a laptop. (de Freitas & Levene, 2006a)
WAAS: See Wide Area Augmentation System.
Warranty
WAI: See Web Accessibility Initiative. A representation by a vendor regarding the quality of the
product. (Sprague, 2005)
WAN: See Wide Area Network.
Waste Exchange System
WAP: See Wireless Application Protocol. An e-commerce system for exchanging industrial residues
in the form of waste-related information exchange among
WAP Gap waste generators, waste recyclers, waste users, and possibly
A security weakness in WAP. It is caused by the inclusion landill managers, which can beneit the society by reducing
of the WAP gateway in a security session such that the total waste volume and facilitating waste reuse, recycle,
encrypted messages sent by end systems might temporarily and disposal. (Chen, Li, et al., 2006)
become clear text on the WAP gateway when messages
are processed. (Lee, Kou, et al., 2005) Waterfall Model
A modiied system development lifecycle which allows
WAP Stack some overlap and splashback between phases. (Steinbach
A set of protocols that covers the whole process of & Knight, 2005)
wireless content delivery, from the deinition of WML and
WMLScript for creating and layout of the actual content, Watermark
and the speciication of security measures in the WTLS The code hidden into a digital or analog object containing
to the lowest parts of the stack dealing with the actual an ID (identiication) code or other pieces of information.
transport of content. (Yow & Mittal, 2006) The watermark is used for identifying the ields of
embedded data (serial numbers, logos, etc.) that tell us
WAPS who is the owner of the object or supply an ID in order
A reusable W2000 interpreter to prototype Web to identify data connected with the digital object. (Nesi
applications. (Paiano, 2005) & Spinu, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
738 Wat e r m a rk Em be dding We a ra ble Com put ing
Watermark Embedding the small detail as noise), or such that the small luctuations
A technique to hide the watermark in the original are emphasized (with the larger scale luctuations as
W unwatermarked image, that is, host image. (Sattar & Yu, background). (George, 2005b)
2006)
Wavelet Transform
Watermark Extraction A method to transform data so that it can be represented
A process to retrieve/recover the hidden watermark from compactly. (Thomasian, 2005b)
the received watermarked image. (Sattar & Yu, 2006)
Wayinding
Watermark Reading The cognitive element of navigation dealing with
Process of extracting the watermarked code into the developing and using a cognitive map. (Sadeghian et al.,
watermarked object. (Nesi & Spinu, 2005) 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We a ra ble Com put ing Devic e We b Confe re nc ing 739
perception of the environment. (Oulasvirta & Salovaara, metrics (e-metrics) to determine the effectiveness of the
2006) site content and organization, and to understand the online
purchasing decisions of customers. (Mobasher, 2005c)
W
Wearable Computing Device
Device that is attached to the human body so that the hands Web Application
are free to complete other tasks. (Ally, 2005c) An application that presents the characteristics and the
issues of both hypermedia applications and traditional
Wearable Device applications. In other words, this kind of application has
May include a microprocessor worn as a wristwatch or as the navigational issues of Web sites joint to the traditional
part of clothing. (de Freitas & Levene, 2006b) operation issues. (Paiano, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
740 We b Cont e nt Ac c e ssibilit y Guide line s (WCAG 1 .0 ) We b I m pa c t Fa c t or
uses the telephone or voice over IP, a workstation, and a Web Electronic Data Interchange
Web browser. It provides the capability to individuals in The electronic data interchange made through Internet
W multiple locations to have online meetings and training Web pages. (de Medeiros et al., 2006)
sessions using features such as whiteboarding, screen
sharing, and polling. (Panton, 2005) 3: Communication Web Enabled
that allows audio participation with simultaneous visual Business systems that are supported by Internet
presentation through a Web browser. (C. Wright, 2005) technologies. (Braun, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We b I nfor m at ion Ex t ra c t ion We b Pe rsona lizat ion 741
Web Information Extraction field that supports knowledge workers who try to
The class of mining methods to pull out information from a extract information in our data rich, information poor
collection of Web pages and converting it to a homogeneous environment. Its name stems from the idea of mining
W
form that is more readily digested and analyzed for both knowledge from large amounts of data. Any method used
humans and machines. (Wen, 2005b) to extract patterns from a given data source is considered to
be a data-mining technique. When the data resides on the
Web Information System Web, the process is that of Web mining. (Hamdi, 2005b)
An information system that is accessed through the 3: The application of data-mining techniques to extract
Internet and usually tightly integrated with databases and knowledge from the content, structure, and usage of Web
transaction-processing systems. (Steinbach & Knight, resources. It is generally subdivided into three independent
2005) but related areas: Web usage mining, Web content
mining, and Web structure mining. (Mobasher, 2005a)
Web Initiative 4: The use of data-mining techniques for discovering and
Any use of the World Wide Web for a speciic purpose. extracting information from Web documents and services.
(Craig, 2005) It is distinguished as Web content, structure, or usage
mining depending on which part of the Web is mined.
Web Link Web usage mining examines usage data typically in the
Hyperlink (hot link) to another Web site that is embedded form of server logs. (Markellou et al., 2006) 5: The use
in the active pages of a Web-based education course. of data-mining techniques to automatically discover and
(Marold, 2005) extract information from Web documents and services.
(Lee-Post & Jin, 2005a) 6: Using data-mining techniques
Web Log to automatically discover and extract information from
1: An online diary, typically authored by an individual, Web data and services. (Zhao & Bhowmick, 2005) 7: The
where unstructured comments are made and annotations integration of information gathered by traditional data-
can be attached. (Verhaart & Kinshuk 2006) 2: A ile in mining methodologies and techniques with information
which a Web server records requests for pages. (Artz, gathered over the World Wide Web. Web mining is used
2005d) 3: File stored by the Web server containing data to capture customer behavior, evaluate the effectiveness
on users accesses to a Web site. (Meo & Psaila, 2005) 4: of a particular Web site, and help quantify the success of
A Web log ile records activity information when a Web a marketing campaign. (Lee, Suh, et al., 2005)
user submits a request to a Web server. A log ile can
be located in three different places: (1) Web servers, (2) Web Pad (or Handheld PC)
Web proxy servers, and (3) client browsers. (Hu, Yang, Device connected via wireless technology to an intranet
Lee, & Yeh, 2005) 5: Generally used as a frequent and (WLAN, Bluetooth, GPRS/UMTS) and offering a full-
chronological publication of personal thoughts, ideas, and featured operating system with a Web browser. (Blecker
Web links. To facilitate the process of learning, relaying & Graf, 2006)
information to students, and enhancing communications
between students and faculty, teachers are increasingly Web Page
using Web logs. (Brown, 2006) 1: A ile that is on the Web and is accessible by its URL.
(Scime, 2005b) 2: A hypermedia document that expresses
Web Marketing the knowledge content in an artistic and dynamic fashion,
The dissemination of information, promotion of products combining text, graphics, audio, and video formats.
and services, execution of sales transactions, and (Handzic & Lin, 2005) 3: The basic unit of information
enhancement of customer support via a companys Web visualized on the Web. (Caramia & Felici, 2005)
site. (Gao, 2005b)
Web Personalization
Web Mining 1: A personalized Web view or site. From a users
1: Concerned with the mechanism for discovering the perspective, a personalized Web view is the one that is
correlations among the references to various iles that are customized to the users preferences. From the server
available on the server by a given client visit to the server. perspective, a personalized Web site provides services
(Y.-J. Zhang, 2005b) 2: Data mining is a multidisciplinary tailored to its users. (Fu, 2005) 2: Customizing Web
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
742 We b Por t a l We b Se r ve r
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Web Server Log Web Service Deinition Language (WSDL) 743
URL and that houses objects. Objects include Web pages messages transferred over the Internet. Web services allow
(HTML iles), JPEG images, and other applications or for the loose integration of service components, and have
programs. (Dasgupta & Chandrashekaran, 2005) the distinct advantage of employing widely available and
W
standardized Web technologies. (Tsekouras & Roussos,
Web Server Log 2006) 8: Integration of Web-based applications using
Each time a user looks at a page on a Web site, a request common standards over an Internet protocol backbone.
is sent from the users client computer to the server. These (Hazari, 2006) 9: A modular business service, with each
requests are for iles (HTML pages, graphic elements, module fully implemented in software and delivered
or scripts). The log ile is a record of these requests. over the Internet. The modules can be combined, can
(Nasraoui, 2005) come from any source, and can eventually be acquired
dynamically and without human intervention when
Web Service needed. (Protogeros, 2006) 10: Modular Internet-based
1: A software application identiied by a URI whose business function that performs speciic business tasks
interfaces and bindings are capable of being deined, to facilitate business interactions within and beyond the
described, and discovered using XML, and that supports organization. (Ratnasingam, 2006) 11: Self-contained,
direct interactions with other software applications self-describing, modular application that has an open,
using XML-based messages via an Internet protocol. Internet-oriented, standards-based interface and can be
Web services provide a standard way of integrating published, located, and invoked across the Web. (Nichols
Web-based applications using XML, SOAP, WSDL, and & Chen, 2006) 12: Software component that is a self-
UDDI over the Internet. (Moser & Melliar-Smith, 2006) containing, self-describing, modular application that can
2: A software system designed to support interoperable be published to, located on, and invoked across the Web.
machine-to-machine interaction over a network. It has Allows applications to interoperate in a loosely coupled
an interface described in a machine-readable format environment, discovering and connecting dynamically to
(speciically, WSDL). Other systems interact with the Web services without any previous agreements having been
service in a manner prescribed by its description using established between them. (Rolland & Kaabi, 2006)
SOAP messages, typically conveyed using HTTP with an
XML serialization in conjunction with other Web-related Web Service Deinition Language (WSDL)
standards. (Nicolle et al., 2005) 3: Describes a standardized 1: An XML-based language that is used to provide
way of integrating Web-based applications using open information about a Web service to requesting applications.
standards. A Web service is deined as a remotely callable This information includes a description of the Web service,
function or procedure which communicates via the a location of the Web service, binding information, a method
HTTP (HyperText Transfer Protocol) using standardized for accessing the Web service, and a way to exchange
protocols. (Cardoso, 2006) 4: Data provided over the data by using the Web service. (Sethi & Sethi, 2006a)
Internet, usually in a WSDL (Web service description 2: Describes services offered by businesses, providing
language), meant as communication between computer mechanisms for accessing these services. WSDL is used
software. (Barone, 2005) 5: An accessible application that by UDDI. (Hawk & Zheng, 2006) 3: Provides a model and
other applications and humans can discover and trigger. The an XML format for describing Web services. It enables
following properties deine a Web service: (1) independent one to separate the description of the abstract functionality
as much as possible from speciic platforms and computing offered by a service from concrete details of the service
paradigms; (2) developed mainly for inter-organizational description such as how and where that functionality is
situations rather than for intra-organizational situations; offered. (Jain & Ramesh, 2006) 4: An XML-formatted
and (3) easily composable so that its composition with language used to describe a Web services capabilities
other Web services does not require developing complex as collections of communication endpoints capable of
adapters. (Maamar, 2005) 6: A modular self-describing exchanging messages. WSDL is an integral part of UDDI,
software service universally accessible in a standardized an XML-based worldwide business registry. WSDL is the
and platform-independent way. (De Lucia et al., 2006) 7: A language that UDDI uses. WSDL was developed jointly
software system identiied by its location on the World Wide by Microsoft and IBM. (Lalopoulos et al., 2005b) 5:
Web, whose interface and supported modes of interaction Deines Web services for distributed systems to support
are described using XML. Interaction between systems the automatic creation of client-side stubs or proxies, and
using the Web service also is also carried out using XML the binding to the Web services. It describes the interfaces
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
744 We b Se r vic e s Com posit ion We b St ruc t ure (d) M ining
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We b St ude nt We b-Ba se d Cust om izat ion 745
can be divided further into two kinds, based on the kind Web Visibility
of structural data used: hyperlinks connecting Web pages The popularity of a Web site among online shoppers.
and the document structure in semi-structured Web pages. (Wan, 2006)
W
(Mobasher, 2005a) 4: The discovery of useful information
from the underlying hyperlink structures of the Web. Web-Assisted Instruction
(Lee-Post & Jin, 2005a) A course that uses the Internet to provide a signiicant
amount of course content on the Web to learners outside
Web Student of class time. Materials may be supplemental in nature or
A student that plans to take the majority, if not all, of his provide content in an alternative form that may be viewed
or her classes in a particular program of study over the at the learners convenience. Learners interact with other
Internet. (Benrud, 2005) learners outside of class through e-mail, message boards,
or chat. (Kinuthia, 2005)
Web Technology
1: Refers to the combination of the Internet communication Web-Based Class
protocols (TCP/IP), networks, Web server (e.g., IIS), and Class offered via the World Wide Web. (Witta, 2005)
client (e.g., Opera) software, and the languages that can
be used to develop Web applications. (R. Zhang, 2005) Web-Based Classroom
2: The set of all instruments that allows people to use the The application of a selection of intellectually stimulating
Web and its protocols for improving communication and lessons implemented within a creative and collaborative
acquiring information. These are based on hardware, which learning environment that utilizes the resources of the
are mostly networks of computers, and software resources, World Wide Web. (Neville & Powell, 2005)
which are mostly Web servers using the HTTP protocol
for communicating, interfaced with relational data base Web-Based Control
management systems. (Cartelli, 2005a) The control of instruments or apparatuses through the
Internet. (Ko et al., 2005)
Web Television/TV
Movies, interviews, or shows transmitted via the Internet. Web-Based Course
(de Medeiros et al., 2006) 1: A course that is delivered entirely by electronic methods,
such as the Internet. (Nantz, 2005) 2: A course, typically
Web Usability delivered by a higher education institution, which is
1: The part of human-computer interaction that deals with delivered at a distance utilizing Internet technology.
the World Wide Web. It is a quality attribute that assesses (Ordonez, 2005)
how easy user interfaces are to use. (Askar et al., 2005) 2:
Refers to the user satisfaction associated with a Web site. Web-Based Course Management System
It typically includes the effectiveness of the site in meeting A learning management system designed to facilitate
the needs of the user. It also includes the sites performance, online learning. Blackboard, WebCT, and Prometheus are
reliability, and overall eficiency in supporting speciied the most frequently used Web-based course management
user goals. (Becker, 2005a) systems. (S.-K. Wang, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
746 We b-Ba se d Disc ussion We b-Ba se d Syst e m
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
We b-Ba se d Te a ching We bom e t ric s 747
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
748 We ight Whole Course Re de sign
the virtual world of the WWW. This technique refers New England (NEBE), the South (SREB), and the Midwest
to the quantitative analysis of the nature, the structures, (MHEC). WICHE runs a vast network of student exchange
W and the properties of Web pages and sites. (Maggioni & programs among the 15 western United States, conducts
Uberti, 2005) 2: The study of quantitative aspects of Web national research projects, and is active in higher education
publishing and use. (Thelwall, 2006) policy. (S.M. Johnstone, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Whole N e t w ork Ana lysis Wik i 749
goals of avoiding duplication of effort while achieving through leased lines or satellites. (Velibeyoglu, 2005) 2:
greater course consistency. (Twigg, 2005) Refers to a network that spans a large geographical area
or distance. (Shuaib, 2005) 3: The oldest type of network
W
Whole Network Analysis that extends to large geographical areas such as a state,
In a whole network analysis, the network members are nation, or the world. (Butcher-Powell, 2005)
completely deined from the beginning, and people
are asked to identify their individual connections of Wide Area Radio Network
some speciic content to the other members. (Meller- Consists of several radio transmitters with overlapping
Prothmann, 2006b) transmission ranges. (Kaspar & Hagenhoff, 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
750 WiM a x Wire le ss Applic at ion Prot oc ol (WAP)
by other users. (Wiki comes from the Hawaiian term for voice, data, Internet, and video signals. (Calzonetti &
quick or super-fast.) (Waterson, 2006) deChambeau, 2006)
W
WiMax: See Worldwide Interoperability for Microwave Wireless Ad-Hoc Sensor Network
Access. A number of sensors spread across a geographical area.
Each sensor has wireless communication capability and
WIMP: See Windows, Icons, Menus, and Pointing. some computing capabilities for signal processing and
data networking. (Vargas, 2005)
Window
An event subsequence, ei, ei+1, ei+d in an event Wireless Application
sequence, where the width of the window, denoted d, An application running on a wireless device that transmits
is the time interval of interest. In algorithms that use and receives data over a wireless network. (K.J. MacGregor,
sliding windows, the frequency of an episode is deined 2005)
as the fraction of windows in which the episode occurs.
(Harms, 2005) Wireless Application Protocol (WAP)
1: A protocol used with small handheld devices and small
Window on World System ile sizes. (Roibs, 2006b) 2: An open, extensible, and
Conventional computer monitor for displaying the virtual uniied global standard for delivering information and
world. Somtimes also called desktop virtual reality. providing interactive services over cellular networks
(Modrk & Marcn, 2006) to mobile devices. (Tan & Teo, 2005) 3: A standard for
providing cellular phones, pagers, and other handheld
Windows, Icons, Menus, and Pointing (WIMP) devices with secure access to e-mail and text-based Web
1: A classical interaction technique found in most window pages. (Parikh & Parolia, 2005) 4: A set of standards
managers like Microsoft Windows. (Bastide et al., 2006) which enable data display for handheld devices, and
2: A style of graphic user interface that involves windows, support Web and e-mail access. (Petrova, 2006) 5: A
icons, menus, and pointers. It replaced the older textual protocol for providing Internet-connectivity access to
command-style interface, and the term is now of historical thin-client devices, such as mobile phones. (Ververidis &
interest only. (Duchastel, 2006) 3: A form of GUI. (Henley Polyzos, 2006) 6: A protocol for implementing advanced
& Noyes, 2006) telecommunications services for accessing Internet pages
from mobile devices. (Mohamedally et al., 2005) 7: The
Wire-Frame Drawing leading application standard to deliver information for
Only the lines deining the edges of patches are drawn, wireless devices, such as cell phones. WAP is similar to
which is useful as a quick previewing tool. (Cottingham, the HTTP (HyperText Transport Protocol) for the Web,
2005) and it is based on other Internet standards such as HTML,
XML, and so forth. (Chen, Sockel, et al., 2005) 8: Deines
Wired Equivalent Privacy (WEP) the use of TCP/IP and Web browsing for mobile systems.
1: A security protocol for wireless local area networks (Akhtar, 2005) 9: A secure speciication that allows users
deined in the 802.11b standard. WEP is designed to to access information instantly via handheld devices such
provide the same level of security as that of a wired LAN. as mobile phones, pagers, two-way radios, and so forth.
WEP is used at the two lowest layers of the OSI model. It is supported by most wireless networks (i.e., GSM,
(Pulkkis, Grahn, & Karlsson, 2005) 2: The data link-level CDMA, TETRA, etc.). WAP supports HTML and XML.
protocol that provides security for the IEEE 802.11 WLAN (Lalopoulos et al., 2005a) 10: An open, global speciication
standards. The encryption algorithm used in WEP is a that allows users with mobile devices to easily access and
stream cipher based on RC4. (Lee, Kou, et al., 2005) interact with information and services instantly. (Lee, Hu,
et al., 2005) 11: A secure speciication that allows users
Wireless to access information instantly via handheld wireless
1: Refers to transmission through air, vacuum, or water by devices such as mobile phones, pagers, two-way radios,
means of an antenna. (Ngoh & Shankar, 2005) 2: Using smartphones, and communicators. (Lee & Warkentin,
the radio-frequency spectrum or microwave network for 2006) 12: Advanced intelligent messaging service for
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Wire le ss Ce ll Wire le ss Fide lit y (Wi-Fi) 751
digital mobile phones and other mobile terminals that Engineers (IEEE) and including Wi-Fi (802.11) and
allows Internet content to be viewed in text format on Bluetooth (802.15). (Garrett, 2006b)
special WAP-enabled GSM mobile phones. (Latchem &
W
Maru, 2005) 13: An approach to link wireless devices to Wireless Device
the Internet by optimizing Internet information so it can be A communication device with computing power connected
displayed on the small screen of a portable device. (Nayak, to a network via a wireless network adapter using, for
2005d) 14: An open, global speciication that empowers instance, wireless LAN or Bluetooth standards. (Kao &
mobile users with wireless devices to easily access and Rerrer, 2006)
interact with information and services instantly. The
WAP is a standard for providing cellular phones, pagers, Wireless Emergency Service (WES)
and other handheld devices with secure access to e-mail 1: A non-interactive mode of context-aware applications
and text-based Web pages. (Lei et al., 2005a) 15: A suite that provide necessary services in response to emergency
of open, global speciications developed by the WAP contexts. Corresponding to the internal and external
Forum. It is for developing applications that operate over need contexts of mobile consumers, there are two types
wireless communication networks, and it allows users of WES: personal WES and public WES. (Sun & Poole,
with mobile handheld devices to easily access and interact 2005) 2: Wireless network-based services that respond to
with information and services instantly. (Hu, Yang, & Yeh, emergency events, either reported by people or detected
2006) 16: An application-level communication protocol by information systems, with immediate help to those
that is used to access services and information by handheld who are involved. (Sun, 2005)
devices with low-resolution displays and low bandwidth
connections, such as mobile cell phones. (Melliar-Smith Wireless Environment
& Moser, 2005) More and more people are equipped with handheld devices
such as cell phones, PDAs, and laptops. To manage all these
Wireless Cell devices, a computing model is deployed. It consists of two
The radio coverage area in which a mobile client can entities: mobile clients and ixed hosts. Some of the ixed
communicate with the wireless infrastructure. (Xu, hosts, called mobile support stations, are augmented with
2006) wireless interfaces. A mobile support station communicates
with the mobile clients within its radio coverage area called
Wireless Commerce wireless cell. Each cell has an identiier that is periodically
The buying and selling of goods and services through broadcasted to each mobile client residing in the cell.
wireless handheld devices such as cellular phones and The aim is to be fully aware of the mobile clients that
personal digital assistants (PDAs). (Galanxhi-Janaqi & are under the management of the cell. Mobile clients get
Nah, 2005) information from information servers, through the mobile
support stations. As long as a mobile client stays in the
Wireless Communication coverage area of the same mobile support station, there
1: Data communication that does not require a wired are no major issues in pushing information to the clients
connection between communicating peers, typically mobile device. As soon as the client leaves that coverage
using radio or infrared transmissions. (Kunz & Gaddah, area, another mobile support system has to be in charge
2005) 2: Interaction through a wireless device (e.g., of the information transfer. (Maamar, 2005)
cellular phone, pager, PDA, etc.). (Clarke & Flaherty,
2005) 3: To communicate with or send communications Wireless Fidelity (Wi-Fi)
by wireless means, relating to radio or communication by 1: Any 802.11 product (including 802.11b, 80.211a, and
radiotelegraphy or radiotelephony. (Hanson, 2005) 802.11g). This term is promulgated by the Wi-Fi Alliance.
Wi-Fi offers broadband access without the physical
Wireless Connectivity restraint, and the users can accis installed, for example, in
The communication of digital devices between one a coffee shop. (Yang, 2005) 2: A popular term for 802.11b,
another using data transmission by radio waves. A variety a wireless local area network (WLAN) speciied by the
of standards for wireless data transmission now exist, Institute of Electrical and Electronic Engineers (IEEE),
established by the Institute of Electrical and Electronics and based on the Ethernet protocol and CSMA/CA (carrier
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
752 Wire le ss Fide lit y Prot e c t e d Ac c e ss (WPA) Wire le ss N e t w ork
sense multiple access with collision avoidance) for path that uses radio waves as its carrier. (Cremonini et al., 2006)
sharing. Wi-Fi supports a range of about 150 feet and data 3: A wireless network installed in a local area such as a
W rates up to 11mbps. (Lei, 2006) 3: A popular wireless building. (Yang, 2005) 4: A wireless network that provides
networking technology, also known as Wireless Ethernet. access to subscribers with end-to-end IP connections.
(Efstathiou & Polyzos, 2006) 4: A wireless network that (Louvros, Karaboulas, et al., 2005)
provides high-speed data connections over short distances,
allowing visitors with laptops to connect to the Internet at Wireless Local Loop (WLL)
so-called hot spots, such as airport terminals or cafs. (D. 1: A system that connects subscribers to the public
Stern, 2005) 5: A set of product compatibility standards switched telephone network (PSTN) using radio signals
for WLAN based on the IEEE 802.11 speciications. Wi-Fi as a substitute for the usual copper phone lines for all, or
was intended to be used for mobile devices and LANs, but part, of the connection between the telephone subscriber
is now often used for Internet access. It enables a person and the switch. This includes cordless access systems,
with a wireless-enabled computer or PDA to connect to proprietary ixed radio access, and ixed cellular systems.
the Internet when in proximity of an access point. (Wong, WLL technology is an eficient as well as cost-effective way
2006) 6: Involves the use of wireless communication to deploy telephony services to subscribers in remote and
technologies to access the Internet or the World Wide Web. regional areas without the expense of burying tons of copper
(St. Amant, 2005e) 7: IEEE 802.11b (Wi-Fi) is a wireless wire. WLL services enable newer telecommunications
local area network standard. It operates in an unlicensed companies such as Norlink to bypass Telstras wireline
radio frequency band at 2.4 GHz and provides data access networks to deliver more affordable telephony and data
at 11 Mbps. (Lee, Hu, et al., 2005) 8: A set of product access services. (De Weaver, 2005) 2: System connecting
compatibility standards for wireless local area networks. subscribers to the public-switched telephone network
(Flavin & Guinalu, 2006) 9: A technology that covers (PSTN) using radio signals for all or part of the connection.
certain types of wireless local area networks, enabling users Includes cordless access systems, proprietary ixed radio
to connect wirelessly to a system or wired local network access, and ixed cellular systems. Also known as radio in
and use speciications in the 802.11 family. (Sofokleous the loop (RITL) or ixed-radio access (FRA). (Latchem,
et al., 2005) 10: Wi-Fi networks use small, low-power 2005)
antennas to carry voice and data communications between
a backbone and users at schools, businesses, households, Wireless Markup Language (WML)
and public places, all without laying a single wire, thus 1: A Web page description language derived from XML
greatly reducing the cost of traveling the last mile. (Phala, and HTML, but speciically designed to support the display
2005) 11: Wireless idelity technology allows devices to of pages on low-resolution devices over low-bandwidth
connect to the Internet without the need for landlines. connections. (Melliar-Smith & Moser, 2005) 2: Medium-
Wi-Fi-enabled computers can send and receive data from power radio communication technology, similar to cordless
anywhere within the range of their base station. (Toland, phones, used to connect computers over a distance of
Purcell, et al., 2005) several dozen meters. These networks can be either ad
hoc groups of peers or a set of mobile clients connecting
Wireless Fidelity Protected Access (WPA) to the Internet through a hardware access point. Competes
A system to secure wireless networks, created to patch the with IR and Bluetooth. (Houser & Thornton, 2005) 3: A
security of the previous system, WEP. WPA implements part markup language inherited from HTML and XML. WML
of the IEEE 802.11i standard. In addition to authentication is used to create Web pages speciically for micro browsers
and encryption, WPA also provides improved payload in mobile devices. (Chen, Sockel, et al., 2005)
integrity. (Pulkkis, Grahn, & Karlsson, 2005)
Wireless Markup Language (WML) Script
Wireless LAN: See Wireless Local Area Network. Scripting for micro browsers. WMLScript is used with
WML to offer some dynamic effects on WAP Web pages.
Wireless Local Area Network (Wireless LAN, (Chen, Sockel, et al., 2005)
WLAN)
1: Refers to a local area network that uses either infrared Wireless Network
or radio frequencies rather than physical cable as the Computer networking that permits users to transmit
transmission medium. (Sarkar, 2005) 2: Local area network data through a wireless modem connecting the remote
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Wire le ss Se nsor N e t w ork Work Group 753
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
754 Work Modeling Worklow
Focus is on the outcome and productivity, with the idea Work-Conserving Scheduling
that the best product will be most eficiently created when A work-conserving scheduler allows the link to go idle
W everyone works using their present strengths. (Graham only when there is no packet of any service class awaiting
& Misanchuk, 2005) 2: A relatively small, formally service. (DaSilva, 2005)
designated, and formally controlled group that generally
works together in face-to-face situations. (Wasko & Work-Integrated Learning
Teigland, 2006a) 3: A group of individuals who share A hybrid approach that achieves learning outcomes
network resources in order to collaborate and communicate through a combination of alternating periods of traditional
with each other while they work together on a common academic pedagogy, with extended periods of practical
project. (Dara-Abrams, 2006) 4: People, usually from the experience in the professional workplace. Work-integrated
same department with a shared responsibility for a product learning is a mature pedagogical strategy that is often
or service. (Hustad & Munkvold, 2006) referred to as sandwich and end-on courses. (Lowry
& Turner, 2005)
Work Modeling
Data gathered by contextual inquiry is used to create Working Group
diagrammatic representations of the work practice. Work A group of individuals with a common working practice
models include sequence models, low models, cultural who do not constitute a formal work team. The group
models, physical models, and artifact models. The second cuts across traditional organizational boundaries and
step in contextual design. (Notess, 2005) enables individuals to acquire new knowledgeotherwise
unavailableat a faster rate. (Ribire & Romn, 2006)
Work Motivation
Involves the restriction to those motivation elements that Working Memory
relate to the work situation; concerns the individuals Denotes the memory capable of transient preservation
degree of willingness to work towards organizational of information, which is functionally different from the
targets. (Hendriks & Sousa, 2006) memory that stores historical information (long-term
memory). See also Short-Term Memory. (Lin & Kinshuk,
Work Practice 2005)
The way in which people accomplish their intentional
activities, including their motivations, pressures, habits, Working Relationship
sequences, collaborations, artifacts, environments, and The kind of relationship exempliied by people who work
so forth. (Notess, 2005) together toward the completion of work-based tasks. It
involves communication related to sharing information,
Work Redesign coordinating tasks, meeting timelines, and so forth.
The consolidated models and insights gained are used to (Pauleen, 2005)
generate ideas for improving work practice. The redesigned
work practice is expressed in storyboards. The fourth step Workaround
in contextual design. (Notess, 2005) Informal or unauthorized changes to a computer system
to bypass a problem. (Brady, 2005)
Work Relationship
The task connections or interdependencies involved in Worklow
input-output combinations: output of one task gets used 1: A collection of tasks organized to accomplish
as input for another. The concept of work relationships some business activity between the customer and the
focuses on the content side to these combinations, and trader supported by suitable protocols. (Murthy &
involves an abstraction from the personal elements in Krishnamurthy, 2005c) 2: A recurring unit of work of
work-related cooperations. (Hendriks, 2006) which the coordination, control, and execution can be
partially or completely automated. (Signoret, 2006) 3:
Work System Comprises cases, resources, and triggers that relate to
That part of the assumed real world that attempts to change a particular process. (Dustdar, 2005) 4: Systems which
an application domain to achieve the work systems goals. are meant to automatize and control business processes.
(Diaper, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Worklow Engine World Wide Web (WWW) 755
Among its functions are task assignment, alerts, common Worklow Technology
tasks cooperation, align resources with the strategy, A software component that provides the languages and
automatization of business processes, and tracking and interpreters to implement process management. (Bussler,
W
oversight. (Xodo, 2005) 5: Term used to describe the 2005b)
tasks, procedural steps, organizations or people involved,
required input and output information, and tools needed for Workload
each step in a business process. The worklow management The log of all queries that execute on a database system.
focuses on processes rather than documents. (Sarmento, Workloads often are used by database administrators as
2005) 6: The automation of a business process, in whole well as by automated systems (such as AQA systems) to
or part, during which documents, information, or tasks are tune various parameters of database systems for optimal
passed from one participant to another for action, according performance, such as indexes and physical design, and in
to a set of procedural rules (WFMC.org) (sometimes also the case of AQA, the set of sample tables. (Das, 2005)
used as a synonym for business process). (Heucke et al.,
2005) 7: The automation of a business process, in whole Workload Model
or part, during which documents, information, or tasks In a database benchmark, a database and a set of read
are passed from one participant to another for action, and write operations to apply on this database. (Darmont,
according to a set of procedural rules. (De Lucia et al., 2005)
2006) 8: The result of automation, in whole or part, of a
business process. (Berztiss, 2006b) Workplace Learning
A process of developing the employees knowledge, skills,
Worklow Engine values, attitudes, and actions in relation to the workplace
A software component deined by WfMC. Worklow environment. It is the main means by which the employee
engine is application independent. When a worklow plan improves work, and it is a key strategic element in achieving
is executed, there may be multiple worklow instances organizational objectives and goals. (Rugelj, 2005)
concurrently running at different states. Worklow engine is
responsible for resolving the problems such as resource/data Workstation
dependency, process dependency, live-lock or deadlock, A computer that performs tasks for an individual. (Maris,
event-trigger handling, and so forth. (Li, 2005a) 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
756 World Wide We b Consor t ium (W3 C) World Wide We b U sa ge M ining
standards for storing, retrieving, formatting, and displaying Japan, which are responsible for core development and local
knowledge in a networked environment. (Handzic & Lin, support. The W3C has around 350 member organizations
W 2005) 3: An application that runs on the Internet, and a from all over the world and has earned international
collection of electronic documents, or Web pages, that recognition for its contributions to the growth of the
can be viewed on your computer using a Web browser. Web. W3C was established initially in collaboration with
The words Internet and Web are used synonymously, CERN (European Organization for Nuclear Research),
although by deinition they are very different. (Singh, DARPA (Defense Advanced Research Projects Agency),
2006a) 4: A hypertext-based client-server system that and the European Commission. (Pereira & Freire, 2005)
is one component of the larger Internet. The hypertext- 2: An international consortium of companies involved
based format of the WWW allows users to navigate with the Internet and the Web. (Mohamed & Ottmann,
through the system by using graphical user interface 2006) 3: Develops interoperable technologies such as:
software known as browsers. (Hinnant & Sawyer, 2005) speciications, guidelines, software, and tools to lead the
5: A system of Internet servers that support specially Web to its full potential. W3C is a forum for information,
formatted documents. The documents are formatted in commerce, communication, and collective understanding.
a markup language called HyperText Markup Language (Yu, 2005a) 4: A part of the Internet where documents and
(HTML) that supports links to other documents. (Sala, other resources are accessible through hyperlinks. Using
2005a) 6: An Internet client-server, hypertext-distributed, the Web for teaching materials diffusion places the onus
information-retrieval system that originated from the on the student to download iles. (El Louadi, 2005a) 5:
CERN High-Energy Physics laboratories in Switzerland. An international organization devoted to the development
(Vician & Buche, 2005) 7: Computer network consisting of interoperable technologies, such as speciications,
of a collection of Internet sites that offer text, graphics, guidelines, software, and tools, to lead the Web to its full
sound, and animation resources through the hypertext potential. (Fagan, 2005) 6: The international body that
transfer protocol. (Barolli & Koyama, 2005b) 8: Worldwide governs Internet standards. It was created in 1994 and
collection of electronic documents on the Internet that have is open to all interested organizations. It has about 500
built-in hyperlinks to other related documents. Also called organization members from the world that jointly develop
the Web. (Inoue & Bell, 2005) 9: A popular application protocols that promote the evolution of the Web while
of the Internet sometime known as the the Web. The ensuring interoperability. The W3C holds speciications
WWW is a software tool that uses hypertext links to for many of the Web technologies such as HTML, XML,
allow computers to easily retrieve and add information and RDF, as well as many Web services standards such as
from different computer sources. (Escalante, 2005) 10: SOAP and WSDL. (Zhang, 2006) 7: A consortium that uses
Originally created as an online information tool for high- relatively simple technologies with suficient scalability,
energy physics research at CERN (the European Center eficiency, and utility that it has resulted in a remarkable
for Nuclear Physics Research in Geneva, Switzerland), information space of interrelated resources, growing across
information is organized as a series of documents referring languages, cultures, and media. (Signoret, 2006)
to each other with links of search and retrieval of text,
images, sound, and video. Based on its likeness to a spiders World Wide Web Data Mining
web, this world of hypertext links is also called the Web. Attempts to extract knowledge from the World Wide
(Theng, 2005) 11: Resources on the Internet that are using Web, producing some useful results from the knowledge
the HyperText Transfer Protocol (HTTP). (Ortega Egea extracted, and applies the results to certain real-world
& Menndez, 2006) problems. (Hu, Yang, Lee, & Yeh, 2005)
World Wide Web Consortium (W3C) World Wide Web Usage Mining
1: An industry consortium that was created in October The application of data-mining techniques to the usage
1994 to lead the Web to its full potential by developing logs of large Web data repositories in order to produce
common protocols that promote its evolution and ensure results that can be applied to many practical subjects, such
its interoperability. The consortium is international, jointly as improving Web sites/pages, making additional topic
hosted by the MIT Laboratory for Computer Science in the or product recommendations, studying user/customer
United States, ERCIM (European Research Consortium behavior, and so forth. (Hu, Yang, Lee, & Yeh, 2005)
in Informatics and Mathematics), and Keio University of
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Wor m WYSI WYG V isua l De sign Tool 757
Wrapper Induction
Learning (highly accurate) rules that extract data from a
collection of documents that share a similar underlying
structure. (Muslea, 2005)
Write Performance
The maximum number of write operations per time unit.
Replication will normally decrease write performance and
give rise to possible inconsistency between the replicated
data. (Frank, 2005a)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
758 X -Group M e t hodology X Que r y
X
X-Group Methodology: See Extraction Group Schema.
Research Methodology.
XML Structural Change: See Extensible Markup
X-Machine Language Structural Change.
A deterministic stream X-machine is an 8-tuple (, , Q,
M, , F, q0, m0), where , is the input and output inite XML Structural Clarification Mining: See
alphabet, respectively; Q is the inite set of states; M is Extensible Markup Language Clariication Mining.
the (possibly) ininite set called memory; is the type of
the machine, that is, a inite set of partial functions that X M LDB: See Extensible Mark up Lang uage
map an input and a memory state to an output and a new Database.
memory state, : MM; F is the next state partial
function that, given a state and a function from the type XPath
, denotes the next stateF is often described as a state 1: A language designed to access the different elements
transition diagram, F: QQ; q0 and m0 are the initial of an XML document. (de Campos et al., 2005) 2: A
state and memory, respectively. (Kefalas et al., 2005) language for addressing parts of an XML document. It is
used together with XSLT and XPointer. (Goh & Kinshuk,
XBRL: See Extensible Business Reporting Language. 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
X SL X yle m e 759
XSL
Extensive Stylesheet Language is a W3C standard that
speciies how a program should render XML document
X
data. (Goh & Kinshuk, 2005)
X3D
1: eXtensible 3D graphics. X3D is an open standard for
Web 3D-Graphics, whose primary goal is to express the
geometry and behavior capabilities of VRML, using
XML for description and encoding. (Di Giacomo et al.,
2005) 2: Open Standards XML (Extensible Markup
Language) enabling 3D (dimensional) ile format, real-
time communication of 3D data across all applications
and network applications. (Swierzowicz, 2005)
X12
The X12 EDI standard deines the data structure and
content for business transactions transmitted between
information systems with dictionaries that specify name,
length of data ield, description, data type, and meaning.
(Hawk & Zheng, 2006)
Xyleme
A dynamic warehouse for XML data of the Web supporting
query evaluation, change control, and data integration. The
Xyleme Project ended in 2001, and the system is now owned
by Xyleme S.A. company. (Cannataro et al., 2005)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
760 Ya hoo V ir t ua l Com m unit y Ya re n (Y re n, Ya ra n) Ta lk s
Y
Yahoo Virtual Community
One of a number of virtual Internet communities facilitated
by the Internet service product provider Yahoo! Inc.
(Fryer & Turner, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Z -Tra nsfor m at ion Z PD 761
Z
Z-Transformation Zone of Proximal Development (ZPD)
With the z-transformation, you can transform the values of 1: The individual learning areas marked by the distance
any variable into values of the standard normal distribution. between the skill and the knowledge a subject has in a
(Klawonn & Rehm, 2005) given ield, and the same kind of skill and knowledge
of a more clever member in the community. (Cartelli,
Zero-Knowledge Protocol 2006a) 2: The difference between the childs capacity to
A cryptographic technique to provide identiication to solve problems on his or her own, and his or her capacity
a third party. In contrast to other techniques, no secret to solve them with the assistance of someone else. (Kwok
information is transmitted between the communicating Lai-yin & Tan Yew-Gee, 2005)
partners. Nor is any secret information stored on the third
partys server. Zero-knowledge protocols try to prove that Zoom
the client knows a secret without revealing this secret to 1: A user interface operation that deines a new user focus
a third party. (Stickel, 2005) by ORing user-selected concepts and ANDing them with
the previous focus; a reduced taxonomy is then computed
0-1 Distance and shown to the user. (Sacco, 2006) 2: Changes the
The 0-1 distance between a vector of predicted values, Xg, fraction of an image being displayed when that image is
and a vector of observed values, Xf, is: taken from a larger one. (N.C. Rowe, 2005a)
d = 1(X fr X gr )
n
ZPD: See Zone of Proximal Development.
0 1
r =1
0-Safe Design
Replication method where none of the copies are consistent
and up to date. (Frank, 2005a)
Zone
Can encompass an expansive desert or be a city. Zoning
usually implies a small delay or pause to the game, as
additional data from the server is needed to update a
characters geographic point and to load up the new area
of play. (Grifiths et al., 2006)
Zone of Inluence
The network of people affected by patients participating
in the online discussion, although many in the network
might not participate directly in the online discussion.
(Rada, 2006)
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.