Information Systems Concept List¶
A total of 580 concepts spanning the ABET CAC Information Systems program criteria, modern AI integration, and Enterprise Knowledge Graph / Enterprise Nervous System patterns.
- Information System
- Data
- Information
- Knowledge
- DIKW Hierarchy
- Hardware
- Software
- Network
- User
- Business Process
- Organization
- Stakeholder
- Business Value
- Strategy
- Digital Transformation
- IT vs IS Distinction
- Sociotechnical System
- ABET CAC Criteria
- Strategic Alignment
- Value Chain
- Porter Five Forces
- Competitive Advantage
- Business Capability
- IT Governance
- COBIT Framework
- ITIL Framework
- CIO Role
- CTO Role
- CDO Role
- CISO Role
- Enterprise Architect Role
- Business Analyst Role
- Data Steward Role
- IS Ethics
- Professional Responsibility
- Vendor Management
- Application Portfolio
- Three-Tier Architecture
- N-Tier Architecture
- Presentation Tier
- Application Tier
- Data Tier
- Enterprise Architecture
- TOGAF Framework
- Zachman Framework
- Reference Architecture
- Solution Architecture
- Integration Pattern
- Enterprise Service Bus
- API Gateway
- Service-Oriented Architecture
- Microservices Architecture
- Monolithic Architecture
- Event-Driven Architecture
- REST API
- GraphQL API
- Webhooks
- OpenAPI Specification
- API Versioning
- SDLC
- Waterfall Model
- Agile Methodology
- Scrum Framework
- Kanban Method
- Extreme Programming
- Requirements Elicitation
- Functional Requirement
- Non-Functional Requirement
- User Story
- Acceptance Criteria
- Sprint
- Sprint Planning
- Sprint Review
- Sprint Retrospective
- Daily Standup
- Continuous Integration
- Continuous Delivery
- Version Control
- Git Workflow
- Code Review
- Build vs Buy vs SaaS
- Low-Code Platform
- Citizen Developer
- Technical Debt
- Data Modeling
- Conceptual Data Model
- Logical Data Model
- Physical Data Model
- Entity Relationship Diagram
- Entity
- Attribute
- Relationship
- Cardinality
- Primary Key
- Foreign Key
- Database Index
- Database Constraint
- Normalization
- First Normal Form
- Second Normal Form
- Third Normal Form
- Denormalization
- SQL Language
- SELECT Statement
- JOIN Operation
- Subquery
- Window Function
- Stored Procedure
- Database View
- Transaction
- ACID Properties
- Isolation Level
- Concurrency Control
- Database Migration
- Relational Database
- PostgreSQL
- MySQL
- SQL Server
- Analytical Database
- OLTP vs OLAP
- Data Warehouse
- Star Schema
- Snowflake Schema
- Fact Table
- Dimension Table
- Slowly Changing Dimension
- Columnar Storage
- Snowflake Platform
- Amazon Redshift
- Key-Value Store
- Redis
- DynamoDB
- Column-Family Store
- Apache Cassandra
- HBase
- Document Database
- MongoDB
- JSON Document
- XML Document
- Database Selection
- CAP Theorem
- Polyglot Persistence
- Data Lake
- Data Lakehouse
- ETL Process
- ELT Process
- Data Pipeline
- Master Data Management
- Data Quality
- Data Lineage
- Data Catalog
- Data Dictionary
- Metadata Management
- Data Owner
- Data Governance Council
- DAMA DMBOK
- Data Mesh
- Data Product
- Data Contract
- Schema Evolution
- Data Retention Policy
- Records Management
- Descriptive Analytics
- Diagnostic Analytics
- Predictive Analytics
- Prescriptive Analytics
- Key Performance Indicator
- Metric Definition
- Dashboard Design
- Self-Service BI
- OLAP Cube
- Cube Drilldown
- Pivot Table
- Power BI
- Tableau
- Data Visualization
- Chart Selection
- Embedded Analytics
- Balanced Scorecard
- Decision Support System
- Data Storytelling
- Enterprise Resource Planning
- ERP Implementation
- CRM System
- Supply Chain Management
- Inventory Management
- Procurement System
- HRIS
- Payroll System
- Talent Management
- Configuration vs Customization
- Big Bang vs Phased Rollout
- Best of Breed vs Suite
- Implementation Partner
- Industry Cloud
- Post-ERP Review
- Local Area Network
- Wide Area Network
- Internet
- Intranet
- Extranet
- VPN
- SD-WAN
- Bandwidth Capacity Planning
- Latency
- Throughput
- Service Level Agreement
- Cloud Connectivity
- Network Redundancy
- Network Monitoring
- Telecom Procurement
- Cloud Computing
- NIST Cloud Definition
- IaaS
- PaaS
- SaaS
- FaaS
- Public Cloud
- Private Cloud
- Hybrid Cloud
- Multi-Cloud
- CapEx vs OpEx
- Cloud Cost Model
- FinOps
- Reserved Instance
- Container
- Docker
- Kubernetes
- Cloud Migration
- Six Rs of Migration
- Lift and Shift
- Vendor Lock-In
- Cloud Center of Excellence
- CIA Triad
- Confidentiality
- Integrity
- Availability
- AAA Framework
- Authentication
- Authorization
- Multifactor Authentication
- Single Sign-On
- Identity Provider
- SAML
- OAuth 2.0
- OpenID Connect
- Role-Based Access Control
- Attribute-Based Access Control
- Least Privilege
- Zero Trust Architecture
- Encryption at Rest
- Encryption in Transit
- TLS Protocol
- Public Key Infrastructure
- Symmetric Encryption
- Asymmetric Encryption
- Key Management
- Hashing
- Digital Signature
- NIST CSF
- ISO 27001
- CIS Controls
- Threat Modeling
- STRIDE Method
- Vulnerability Management
- Penetration Testing
- SIEM
- Security Operations Center
- Incident Response
- Audit Trail
- GDPR
- CCPA CPRA
- HIPAA
- SOX
- PCI-DSS
- Data Subject Rights
- Right to Erasure
- Data Portability
- Privacy by Design
- Privacy Impact Assessment
- Data Processing Agreement
- Data Residency
- Cross-Border Transfer
- Standard Contractual Clauses
- Schrems II
- Records Retention
- Data Minimization
- Purpose Limitation
- Lawful Basis
- Consent Management
- Data Breach Notification
- Privacy Engineering
- Project Charter
- Scope Statement
- Stakeholder Analysis
- Stakeholder Register
- Work Breakdown Structure
- Project Schedule
- Gantt Chart
- Critical Path Method
- Project Triangle
- Risk Register
- Risk Mitigation
- Issue Log
- Change Control
- Communication Plan
- PMBOK Guide
- PRINCE2
- Agile Project Management
- Waterfall Project Management
- Hybrid Project Management
- Burndown Chart
- Velocity
- Earned Value Management
- Project Closure
- Lessons Learned
- Project Portfolio Management
- Program Management
- PMO
- Resource Leveling
- Estimation Techniques
- Stakeholder Engagement
- Process Modeling
- BPMN Notation
- Pool and Lane
- Process Activity
- Gateway
- Process Event
- As-Is Process
- To-Be Process
- Process Reengineering
- Lean Methodology
- Six Sigma
- DMAIC
- Workflow Automation
- Robotic Process Automation
- RPA Tools
- Process Mining
- Continuous Improvement
- Value Stream Mapping
- Business Rules Engine
- Feasibility Study
- Cost Benefit Analysis
- Use Case
- Use Case Diagram
- Activity Diagram
- Sequence Diagram
- Class Diagram
- State Diagram
- UML for IS
- Joint Application Design
- Prototyping
- Wireframe
- Mockup
- Functional Specification
- Requirements Traceability
- Gap Analysis
- Make or Buy Decision
- RFP Process
- Vendor Evaluation
- System Testing
- User Acceptance Testing
- Test Plan
- Defect Tracking
- Cutover Plan
- Usability Principle
- Nielsen Heuristics
- Accessibility WCAG
- User Research
- Persona
- Journey Map
- Information Architecture
- Interaction Design
- Visual Design
- Form Design
- Error Message Design
- Mobile First Design
- Responsive Design
- Inclusive Design
- ITIL Service Lifecycle
- Service Strategy
- Service Design
- Service Transition
- Service Operation
- Continual Service Improvement
- Incident Management
- Problem Management
- ITIL Change Management
- Configuration Management
- CMDB
- Service Catalog
- Service Level Management
- SLA Metrics
- OLA
- Help Desk
- Service Desk Tier
- Ticket Lifecycle
- Knowledge Management
- Observability
- SLO and SLI
- Error Budget
- On-Call Rotation
- Postmortem
- Blameless Culture
- Artificial Intelligence
- Machine Learning
- Predictive ML
- Generative AI
- Large Language Model
- Foundation Model
- Prompt
- Prompt Engineering
- Retrieval Augmented Generation
- Vector Embedding
- Vector Database
- AI Agent
- Agentic Workflow
- AI in ERP
- AI in CRM
- AI in ITSM
- AI Value Chain
- Build vs Buy AI
- Model API
- Model Card
- System Card
- Hallucination
- Grounding
- Guardrail
- Human in the Loop
- RAG Architecture
- NIST AI RMF
- AI Govern Function
- AI Map Function
- AI Measure Function
- AI Manage Function
- ISO IEC 42001
- Bias Audit
- Algorithmic Fairness
- Explainability
- Transparency
- AI Acceptable Use Policy
- Sanctioned Model List
- Shadow AI
- AI Incident Management
- AI Inventory
- AI Impact Assessment
- Responsible AI Principles
- Trustworthy AI
- AI Ethics Committee
- Human Oversight Tier
- AI Data Provenance
- Training Data Documentation
- Datasheet for Datasets
- AI Sustainability
- AI Labor Impact
- EU AI Act
- AI Risk Tier
- Unacceptable Risk AI
- High Risk AI
- Limited Risk AI
- Minimal Risk AI
- US AI Executive Order
- Colorado AI Act
- NYC AEDT Law
- AI in Healthcare HIPAA
- AI in Lending ECOA
- AI in Education FERPA
- Copyright and Training Data
- AI Procurement Clause
- Vendor System Card Review
- AI Cross-Border Transfer
- Automated Decision-Making
- Right to Explanation
- AI Liability
- AI Disclosure Requirement
- AI Threat Landscape
- Prompt Injection
- Indirect Prompt Injection
- Jailbreaking
- Training Data Poisoning
- Model Inversion
- Membership Inference
- Model Exfiltration
- Adversarial Example
- OWASP LLM Top 10
- MITRE ATLAS
- Secure AI SDLC
- AI Red Teaming
- AI Output Filtering
- AI Input Sanitization
- AI Logging and Audit
- Defensive AI in SOC
- AI Phishing Detection
- AI Code Review Security
- Data Loss Prevention for AI
- AI Sandbox
- Confidential Computing for AI
- Federated Learning
- Differential Privacy
- Synthetic Data
- AI in Help Desk
- Intelligent Ticket Routing
- Virtual Agent
- Knowledge Base Copilot
- Ticket Deflection
- AI in App Development
- Code Completion
- AI Pair Programmer
- AI Test Generation
- AI Code Review
- AI Documentation
- Developer Productivity Metrics
- AI in IT Operations
- AIOps
- Anomaly Detection in Ops
- Automated Remediation
- AI in Business Analysis
- AI Requirements Drafting
- AI Status Synthesis
- AI Risk Identification
- Productivity Measurement
- Baseline and Stop Loss
- AI Change Management
- Workforce Transition
- Reskilling Strategy
- Knowledge Graph
- Property Graph Model
- Node and Edge
- Graph Schema
- Ontology
- Taxonomy in IS
- Schema.org
- Domain Vocabulary
- Cypher Query Language
- GQL Standard
- Neo4j
- Amazon Neptune
- TigerGraph
- Memgraph
- Graph Traversal
- Graph Algorithm
- Shortest Path
- Community Detection
- Centrality
- Entity Resolution
- Identity Reconciliation
- Record Linkage
- Enterprise Knowledge Graph
- Semantic Layer
- Single Source of Meaning
- GraphRAG
- Vector and Graph Hybrid
- KG Construction
- KG from Unstructured Text
- Enterprise Nervous System
- Event Source
- External Signal
- Streaming Platform
- Apache Kafka
- Apache Flink
- Complex Event Processing
- Event Enrichment
- Rule Engine
- Policy Engine
- ENS Actuator
- Sense and Respond Loop
- Real-Time Decisioning
- Competitor Signal Monitoring
- Sentiment Stream Ingestion
- Sustainable IT
- Green Computing
- Circular IT
- Data Mesh Principles
- Federated Data Governance
- Post-Quantum Cryptography
- Crypto Agility
- Edge Computing for IS
- Digital Twin
- Industry 4.0
- AI-Native Organization