Skip to content

Information Systems Concept List

A total of 580 concepts spanning the ABET CAC Information Systems program criteria, modern AI integration, and Enterprise Knowledge Graph / Enterprise Nervous System patterns.

  1. Information System
  2. Data
  3. Information
  4. Knowledge
  5. DIKW Hierarchy
  6. Hardware
  7. Software
  8. Network
  9. User
  10. Business Process
  11. Organization
  12. Stakeholder
  13. Business Value
  14. Strategy
  15. Digital Transformation
  16. IT vs IS Distinction
  17. Sociotechnical System
  18. ABET CAC Criteria
  19. Strategic Alignment
  20. Value Chain
  21. Porter Five Forces
  22. Competitive Advantage
  23. Business Capability
  24. IT Governance
  25. COBIT Framework
  26. ITIL Framework
  27. CIO Role
  28. CTO Role
  29. CDO Role
  30. CISO Role
  31. Enterprise Architect Role
  32. Business Analyst Role
  33. Data Steward Role
  34. IS Ethics
  35. Professional Responsibility
  36. Vendor Management
  37. Application Portfolio
  38. Three-Tier Architecture
  39. N-Tier Architecture
  40. Presentation Tier
  41. Application Tier
  42. Data Tier
  43. Enterprise Architecture
  44. TOGAF Framework
  45. Zachman Framework
  46. Reference Architecture
  47. Solution Architecture
  48. Integration Pattern
  49. Enterprise Service Bus
  50. API Gateway
  51. Service-Oriented Architecture
  52. Microservices Architecture
  53. Monolithic Architecture
  54. Event-Driven Architecture
  55. REST API
  56. GraphQL API
  57. Webhooks
  58. OpenAPI Specification
  59. API Versioning
  60. SDLC
  61. Waterfall Model
  62. Agile Methodology
  63. Scrum Framework
  64. Kanban Method
  65. Extreme Programming
  66. Requirements Elicitation
  67. Functional Requirement
  68. Non-Functional Requirement
  69. User Story
  70. Acceptance Criteria
  71. Sprint
  72. Sprint Planning
  73. Sprint Review
  74. Sprint Retrospective
  75. Daily Standup
  76. Continuous Integration
  77. Continuous Delivery
  78. Version Control
  79. Git Workflow
  80. Code Review
  81. Build vs Buy vs SaaS
  82. Low-Code Platform
  83. Citizen Developer
  84. Technical Debt
  85. Data Modeling
  86. Conceptual Data Model
  87. Logical Data Model
  88. Physical Data Model
  89. Entity Relationship Diagram
  90. Entity
  91. Attribute
  92. Relationship
  93. Cardinality
  94. Primary Key
  95. Foreign Key
  96. Database Index
  97. Database Constraint
  98. Normalization
  99. First Normal Form
  100. Second Normal Form
  101. Third Normal Form
  102. Denormalization
  103. SQL Language
  104. SELECT Statement
  105. JOIN Operation
  106. Subquery
  107. Window Function
  108. Stored Procedure
  109. Database View
  110. Transaction
  111. ACID Properties
  112. Isolation Level
  113. Concurrency Control
  114. Database Migration
  115. Relational Database
  116. PostgreSQL
  117. MySQL
  118. SQL Server
  119. Analytical Database
  120. OLTP vs OLAP
  121. Data Warehouse
  122. Star Schema
  123. Snowflake Schema
  124. Fact Table
  125. Dimension Table
  126. Slowly Changing Dimension
  127. Columnar Storage
  128. Snowflake Platform
  129. Amazon Redshift
  130. Key-Value Store
  131. Redis
  132. DynamoDB
  133. Column-Family Store
  134. Apache Cassandra
  135. HBase
  136. Document Database
  137. MongoDB
  138. JSON Document
  139. XML Document
  140. Database Selection
  141. CAP Theorem
  142. Polyglot Persistence
  143. Data Lake
  144. Data Lakehouse
  145. ETL Process
  146. ELT Process
  147. Data Pipeline
  148. Master Data Management
  149. Data Quality
  150. Data Lineage
  151. Data Catalog
  152. Data Dictionary
  153. Metadata Management
  154. Data Owner
  155. Data Governance Council
  156. DAMA DMBOK
  157. Data Mesh
  158. Data Product
  159. Data Contract
  160. Schema Evolution
  161. Data Retention Policy
  162. Records Management
  163. Descriptive Analytics
  164. Diagnostic Analytics
  165. Predictive Analytics
  166. Prescriptive Analytics
  167. Key Performance Indicator
  168. Metric Definition
  169. Dashboard Design
  170. Self-Service BI
  171. OLAP Cube
  172. Cube Drilldown
  173. Pivot Table
  174. Power BI
  175. Tableau
  176. Data Visualization
  177. Chart Selection
  178. Embedded Analytics
  179. Balanced Scorecard
  180. Decision Support System
  181. Data Storytelling
  182. Enterprise Resource Planning
  183. ERP Implementation
  184. CRM System
  185. Supply Chain Management
  186. Inventory Management
  187. Procurement System
  188. HRIS
  189. Payroll System
  190. Talent Management
  191. Configuration vs Customization
  192. Big Bang vs Phased Rollout
  193. Best of Breed vs Suite
  194. Implementation Partner
  195. Industry Cloud
  196. Post-ERP Review
  197. Local Area Network
  198. Wide Area Network
  199. Internet
  200. Intranet
  201. Extranet
  202. VPN
  203. SD-WAN
  204. Bandwidth Capacity Planning
  205. Latency
  206. Throughput
  207. Service Level Agreement
  208. Cloud Connectivity
  209. Network Redundancy
  210. Network Monitoring
  211. Telecom Procurement
  212. Cloud Computing
  213. NIST Cloud Definition
  214. IaaS
  215. PaaS
  216. SaaS
  217. FaaS
  218. Public Cloud
  219. Private Cloud
  220. Hybrid Cloud
  221. Multi-Cloud
  222. CapEx vs OpEx
  223. Cloud Cost Model
  224. FinOps
  225. Reserved Instance
  226. Container
  227. Docker
  228. Kubernetes
  229. Cloud Migration
  230. Six Rs of Migration
  231. Lift and Shift
  232. Vendor Lock-In
  233. Cloud Center of Excellence
  234. CIA Triad
  235. Confidentiality
  236. Integrity
  237. Availability
  238. AAA Framework
  239. Authentication
  240. Authorization
  241. Multifactor Authentication
  242. Single Sign-On
  243. Identity Provider
  244. SAML
  245. OAuth 2.0
  246. OpenID Connect
  247. Role-Based Access Control
  248. Attribute-Based Access Control
  249. Least Privilege
  250. Zero Trust Architecture
  251. Encryption at Rest
  252. Encryption in Transit
  253. TLS Protocol
  254. Public Key Infrastructure
  255. Symmetric Encryption
  256. Asymmetric Encryption
  257. Key Management
  258. Hashing
  259. Digital Signature
  260. NIST CSF
  261. ISO 27001
  262. CIS Controls
  263. Threat Modeling
  264. STRIDE Method
  265. Vulnerability Management
  266. Penetration Testing
  267. SIEM
  268. Security Operations Center
  269. Incident Response
  270. Audit Trail
  271. GDPR
  272. CCPA CPRA
  273. HIPAA
  274. SOX
  275. PCI-DSS
  276. Data Subject Rights
  277. Right to Erasure
  278. Data Portability
  279. Privacy by Design
  280. Privacy Impact Assessment
  281. Data Processing Agreement
  282. Data Residency
  283. Cross-Border Transfer
  284. Standard Contractual Clauses
  285. Schrems II
  286. Records Retention
  287. Data Minimization
  288. Purpose Limitation
  289. Lawful Basis
  290. Consent Management
  291. Data Breach Notification
  292. Privacy Engineering
  293. Project Charter
  294. Scope Statement
  295. Stakeholder Analysis
  296. Stakeholder Register
  297. Work Breakdown Structure
  298. Project Schedule
  299. Gantt Chart
  300. Critical Path Method
  301. Project Triangle
  302. Risk Register
  303. Risk Mitigation
  304. Issue Log
  305. Change Control
  306. Communication Plan
  307. PMBOK Guide
  308. PRINCE2
  309. Agile Project Management
  310. Waterfall Project Management
  311. Hybrid Project Management
  312. Burndown Chart
  313. Velocity
  314. Earned Value Management
  315. Project Closure
  316. Lessons Learned
  317. Project Portfolio Management
  318. Program Management
  319. PMO
  320. Resource Leveling
  321. Estimation Techniques
  322. Stakeholder Engagement
  323. Process Modeling
  324. BPMN Notation
  325. Pool and Lane
  326. Process Activity
  327. Gateway
  328. Process Event
  329. As-Is Process
  330. To-Be Process
  331. Process Reengineering
  332. Lean Methodology
  333. Six Sigma
  334. DMAIC
  335. Workflow Automation
  336. Robotic Process Automation
  337. RPA Tools
  338. Process Mining
  339. Continuous Improvement
  340. Value Stream Mapping
  341. Business Rules Engine
  342. Feasibility Study
  343. Cost Benefit Analysis
  344. Use Case
  345. Use Case Diagram
  346. Activity Diagram
  347. Sequence Diagram
  348. Class Diagram
  349. State Diagram
  350. UML for IS
  351. Joint Application Design
  352. Prototyping
  353. Wireframe
  354. Mockup
  355. Functional Specification
  356. Requirements Traceability
  357. Gap Analysis
  358. Make or Buy Decision
  359. RFP Process
  360. Vendor Evaluation
  361. System Testing
  362. User Acceptance Testing
  363. Test Plan
  364. Defect Tracking
  365. Cutover Plan
  366. Usability Principle
  367. Nielsen Heuristics
  368. Accessibility WCAG
  369. User Research
  370. Persona
  371. Journey Map
  372. Information Architecture
  373. Interaction Design
  374. Visual Design
  375. Form Design
  376. Error Message Design
  377. Mobile First Design
  378. Responsive Design
  379. Inclusive Design
  380. ITIL Service Lifecycle
  381. Service Strategy
  382. Service Design
  383. Service Transition
  384. Service Operation
  385. Continual Service Improvement
  386. Incident Management
  387. Problem Management
  388. ITIL Change Management
  389. Configuration Management
  390. CMDB
  391. Service Catalog
  392. Service Level Management
  393. SLA Metrics
  394. OLA
  395. Help Desk
  396. Service Desk Tier
  397. Ticket Lifecycle
  398. Knowledge Management
  399. Observability
  400. SLO and SLI
  401. Error Budget
  402. On-Call Rotation
  403. Postmortem
  404. Blameless Culture
  405. Artificial Intelligence
  406. Machine Learning
  407. Predictive ML
  408. Generative AI
  409. Large Language Model
  410. Foundation Model
  411. Prompt
  412. Prompt Engineering
  413. Retrieval Augmented Generation
  414. Vector Embedding
  415. Vector Database
  416. AI Agent
  417. Agentic Workflow
  418. AI in ERP
  419. AI in CRM
  420. AI in ITSM
  421. AI Value Chain
  422. Build vs Buy AI
  423. Model API
  424. Model Card
  425. System Card
  426. Hallucination
  427. Grounding
  428. Guardrail
  429. Human in the Loop
  430. RAG Architecture
  431. NIST AI RMF
  432. AI Govern Function
  433. AI Map Function
  434. AI Measure Function
  435. AI Manage Function
  436. ISO IEC 42001
  437. Bias Audit
  438. Algorithmic Fairness
  439. Explainability
  440. Transparency
  441. AI Acceptable Use Policy
  442. Sanctioned Model List
  443. Shadow AI
  444. AI Incident Management
  445. AI Inventory
  446. AI Impact Assessment
  447. Responsible AI Principles
  448. Trustworthy AI
  449. AI Ethics Committee
  450. Human Oversight Tier
  451. AI Data Provenance
  452. Training Data Documentation
  453. Datasheet for Datasets
  454. AI Sustainability
  455. AI Labor Impact
  456. EU AI Act
  457. AI Risk Tier
  458. Unacceptable Risk AI
  459. High Risk AI
  460. Limited Risk AI
  461. Minimal Risk AI
  462. US AI Executive Order
  463. Colorado AI Act
  464. NYC AEDT Law
  465. AI in Healthcare HIPAA
  466. AI in Lending ECOA
  467. AI in Education FERPA
  468. Copyright and Training Data
  469. AI Procurement Clause
  470. Vendor System Card Review
  471. AI Cross-Border Transfer
  472. Automated Decision-Making
  473. Right to Explanation
  474. AI Liability
  475. AI Disclosure Requirement
  476. AI Threat Landscape
  477. Prompt Injection
  478. Indirect Prompt Injection
  479. Jailbreaking
  480. Training Data Poisoning
  481. Model Inversion
  482. Membership Inference
  483. Model Exfiltration
  484. Adversarial Example
  485. OWASP LLM Top 10
  486. MITRE ATLAS
  487. Secure AI SDLC
  488. AI Red Teaming
  489. AI Output Filtering
  490. AI Input Sanitization
  491. AI Logging and Audit
  492. Defensive AI in SOC
  493. AI Phishing Detection
  494. AI Code Review Security
  495. Data Loss Prevention for AI
  496. AI Sandbox
  497. Confidential Computing for AI
  498. Federated Learning
  499. Differential Privacy
  500. Synthetic Data
  501. AI in Help Desk
  502. Intelligent Ticket Routing
  503. Virtual Agent
  504. Knowledge Base Copilot
  505. Ticket Deflection
  506. AI in App Development
  507. Code Completion
  508. AI Pair Programmer
  509. AI Test Generation
  510. AI Code Review
  511. AI Documentation
  512. Developer Productivity Metrics
  513. AI in IT Operations
  514. AIOps
  515. Anomaly Detection in Ops
  516. Automated Remediation
  517. AI in Business Analysis
  518. AI Requirements Drafting
  519. AI Status Synthesis
  520. AI Risk Identification
  521. Productivity Measurement
  522. Baseline and Stop Loss
  523. AI Change Management
  524. Workforce Transition
  525. Reskilling Strategy
  526. Knowledge Graph
  527. Property Graph Model
  528. Node and Edge
  529. Graph Schema
  530. Ontology
  531. Taxonomy in IS
  532. Schema.org
  533. Domain Vocabulary
  534. Cypher Query Language
  535. GQL Standard
  536. Neo4j
  537. Amazon Neptune
  538. TigerGraph
  539. Memgraph
  540. Graph Traversal
  541. Graph Algorithm
  542. Shortest Path
  543. Community Detection
  544. Centrality
  545. Entity Resolution
  546. Identity Reconciliation
  547. Record Linkage
  548. Enterprise Knowledge Graph
  549. Semantic Layer
  550. Single Source of Meaning
  551. GraphRAG
  552. Vector and Graph Hybrid
  553. KG Construction
  554. KG from Unstructured Text
  555. Enterprise Nervous System
  556. Event Source
  557. External Signal
  558. Streaming Platform
  559. Apache Kafka
  560. Apache Flink
  561. Complex Event Processing
  562. Event Enrichment
  563. Rule Engine
  564. Policy Engine
  565. ENS Actuator
  566. Sense and Respond Loop
  567. Real-Time Decisioning
  568. Competitor Signal Monitoring
  569. Sentiment Stream Ingestion
  570. Sustainable IT
  571. Green Computing
  572. Circular IT
  573. Data Mesh Principles
  574. Federated Data Governance
  575. Post-Quantum Cryptography
  576. Crypto Agility
  577. Edge Computing for IS
  578. Digital Twin
  579. Industry 4.0
  580. AI-Native Organization