P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
914 INDEXin North America,V2: 44
theories of,V2:45– 46
Global Internet law,V1:807–808
Global Internet marketing mix,
V1:812–815
Global Internet regulations,V2: 57
Global issues,V2:52–64
Globalization,V1:442;V2:335–336
of business systems,V1: 116
of e-manufacturing,V1: 724
of firms,V1:485– 486
Global marketplace,V1: 110
Global online auctions,V2: 703
Global Positioning System (GPS),V2:27,
28, 31, 633
Global Storage Systems (GSSs),V1:545.
See alsoJava GSS-API
Global System for Mobile Communication
(GSM),V1:667;V2:619–620;V3: 821
Global technology initiatives,
V1: 653
Global Trading Web,V1:126, 127
Global Trust Authority (GTA),
V1: 629
“Glocalization,”V1: 300
GNU Is Not Unix (GNU) Project,V2:488,
492, 494
GNU Library General Public License
(LGPL),V1:174;V2:823, 830
GNU operating system,V2:822–823
Gnutella,V3:29–30
Goals, nonprofit organization,V2: 679
Google,V1:134, 570;V2: 307
Google CGI Web Directory,V1: 226
Google Chat,V1: 667
Gopher software,V2:120;V3: 202
gotostatement, C/C++,V1: 169
Government.See alsoE-government;
United States; U.S. entries
cybersecurity for,V1:364 –365
databases,V1:493, 494
effects of cyberterrorism on,V1: 364
e-procurement and,V1:655–656
GIS applications for,V2:29–30
grant/funding Web sites,V2: 445
Internet hotline to,V3:92–93
online benchmarks,V1:
role in global electronic commerce,
V2:56 –58
role in reducing digital divide,V1: 472
Government Publications from World War
II,V1: 518
Government records, privacy of,V3: 98
Government resources Web sites,V2: 445
Government-to-Business (G2B)
transactions,V1:658, 804
Government Web sites,V1:593;
V2:773–774
Grammar checkers,V1:238–239
Gramm–Leach–Bliley Act of 1999 (GLBA),
V1: 341
Grant/funding Web sites,V2: 445
Granular Neural Network (GNN),
V1:845–846
Graphical User Interface (GUI),
V1: 368
Graphic image files,V1:820, 821
Graphics:
OLAP,V2: 691
rollover,V1:448– 450, 455software,V1: 240
in Web site design,V3: 774
Graphics editors, ActiveX,V1:17–18
Green Book,V3:2–3
Greenstone Digital Library software,
V1:520 –521
Grid-based algorithms, for clustering,
V1: 404
Groove,V3: 31
Gross Domestic Product (GDP),
information technology and,
V1:481– 482
Gross Domestic Product (GDP)/Internet
penetration matrix,V2:54 –55
Group-buying business model,V1: 132
Group calendars,V2: 69
Group collaboration, intranets and,
V2: 348
Grouping, of CSS selectors,V1: 158
Group netiquette,V2:279–280
Group of Pictures (GOP), in video
compression,V3:559–560
Group Policy Objects (GPOs),V3:794 –795
GroupSystems,V2: 70
Groupware,V2:65–75, 437
brainstorming and,V3: 233
classifying,V2:65–67
collaboration tools,V1: 554
management issues related to,V2:74 –75
virtual teams and,V3:604 –605
Groupware functionalities,V2:67–73
mapping to work processes,V2: 72
Groupware Grid,V2:72–73
Group work, levels of,V2: 73
Grzywinski, Ronald,V1: 99
GSM Mobile Application Part (MAP),
V3: 837
Guerilla marketing,V2: 580
Guessing attacks,V1: 48
Gutenberg Project,V2: 478
gxs.com,V1: 122H.323 standard,V3:655–656
Hackers,V1:334, 368.See alsoHacking
cyberspace resources for,V1:361–362
prosecuting,V1:244;V2: 331
security and,V2: 474
Hacking,V1:247, 329;V2: 451
as cyberterrorism,V1:355–356
democratization of,V1: 361
“Hacking community,”V1: 426
“Hacktivism,”V1:358, 368
Ham operators,V1: 666
HandERA mobile device,V2: 630
Handheld Device Markup Language
(HDML),V3: 825
Handheld wireless devices, user input to,
V3:812–813
Handoff, types of,V3: 820
Handshake protocol,V1:51–52;
V3:268–270
four-way,V3: 430
three-way,V3:429– 430
Handspring mobile devices,V2: 630
Haptics,V1: 281
Harassment, on IRC,V2: 316
Hard handoff,V3: 820
Hardware,V1: 368
addresses,V1:182–183
components,V1: 230as a cyberterrorist tool,V1:361–362
for data warehousing,V1:420 – 421
development of,V1:297–299
failure of,V1:537;V3: 67
sabotage of,V1: 427
sound production,V2:654, 659
Hashed Message Authentication Code
(HMAC),V2:321–322
Hash functions, one-way,V3: 4
Hashing,V1:527, 528, 533;V3:3– 4
Perl,V3: 37
Hata model,V3:128–129
Hate, on IRC,V2: 316
Hate speech,V2: 466
Hazardous incidents, first response to,
V3: 80
Hazardous materials.SeeHazmat
documents
Hazards, security challenges associated
with,V3: 68
Hazmat documents,V2: 238
HCFA Privacy Act,V2:94 –95
HDR wireless,V3: 839
Head Mounted Displays (HMDs), for
virtual reality,V3: 591
Health:
GIS applications for,V2: 29
issues related to,V3:72–73
Healthcare applications,V2: 295
Healthcare portals,V2: 308
Health education, online,V2:98–99
Health information:
Internet and,V2:90 –91, 94 –95
online,V2:109–110
privacy of,V2: 92
protection of,V2: 92
Health insurance,V2:89–99
Health insurance industry, adaptability to
e-application,V2:95–100
Health Insurance Portability and
Accountability Act of 1996 (HIPAA),
V1:115, 493, 341;V2:90, 93–94
Health insurance records, privacy of,
V3: 98
Health issues,V2:104 –113
physical,V2: 109
psychological,V2:104 –109
Health Maintenance Organizations
(HMOs),V2:98–99, 101
Health on the Net (HON) Foundation,
V2:98.See alsoHONcode
Health professionals:
Internet use by,V2: 110
impact of Internet on,V2:109–111
Health sites,V2: 773
Hearing-impaired community, instant
messaging and,V1:662–663
“Hello” Web sites,V1: 697
Heuristic evaluations,V3:515–516
Heuristic scanning,V1:257–258, 259
Heuristic solutions, supply chain
management and,V3:393–394
Hewlett-Packard (HP) mobile devices,
V2:631.See alsoHP Utility Data
Center
Hierarchical algorithms, for clustering,
V1: 404
Hierarchical PKI,V3: 158
Hierarchies, multiple,V2: 692
High-Bit-Rate DSL (HDSL),V2: 300