Atjaunināt sīkdatņu piekrišanu

Information Systems: What Every Business Student Needs to Know [Hardback]

(Rhode Island College, Providence, and Kea Company, New Bedford, Massachusetts, USA)
  • Formāts: Hardback, 480 pages, height x width: 254x178 mm, weight: 1050 g
  • Sērija : Chapman & Hall/CRC Textbooks in Computing
  • Izdošanas datums: 02-Aug-2017
  • Izdevniecība: CRC Press
  • ISBN-10: 1138412937
  • ISBN-13: 9781138412934
  • Formāts: Hardback, 480 pages, height x width: 254x178 mm, weight: 1050 g
  • Sērija : Chapman & Hall/CRC Textbooks in Computing
  • Izdošanas datums: 02-Aug-2017
  • Izdevniecība: CRC Press
  • ISBN-10: 1138412937
  • ISBN-13: 9781138412934
Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. Information Systems: What Every Business Student Needs to Know takes a new approach to the required information systems course for business majors.For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students once they are on the job. Review questions, discussion questions, and summaries are also included in each chapter to reinforce learning. The book is presented in four parts:

About Information Systems: covers general information systems concepts that students need to know as they learn about real-world information systems Technology Fundamentals: supplies a foundation in information technology that fills the gaps most students have when they learn through trial and error Information Systems at Work: details the nitty-gritty of how actual companies use information systems in the real word Managing Information Systems: addresses the issues involved in selecting, developing, and managing information systems

The text includes a running case study that follows two management information systems majors in college. As the two main characters study the information systems of a medical practice, students follow along and learn valuable lessons as they see how the case plays out. In addition to the running case study, each chapter also includes two mini cases that illustrate the concepts discussed in that chapter.Maintaining a focus on the essential concepts students must know before entering the business world, this book covers the subject of information systems in a manner that students will find accessible.<
Introduction: Why This Book Matters, xxi
Part I: About Information Systems
Chapter 1 Why Information Systems Matter in Business: And to You
3(32)
Chapter Outline
3(1)
Why This
Chapter Matters
3(1)
Chapter Take-Aways
4(1)
Value Of Information
4(2)
Scenario 1
4(1)
Possible Outcome A
4(1)
Possible Outcome B
4(1)
Scenario 2
4(1)
Possible Outcome A
5(1)
Possible Outcome B
5(1)
Scenario 3
5(4)
Possible Outcome A
5(1)
Possible Outcome B
5(1)
What This Means
6(1)
Systems And Information Systems
6(3)
What Is Information, Really?
9(11)
Definitions
9(1)
How These Work
9(1)
Information Quality
10(10)
Relevance
10(2)
Correctness
12(1)
Accuracy
12(1)
Precision
13(3)
Timeliness
16(1)
Usability
16(1)
Consistency
17(1)
Conformity to Expectations
18(1)
Completeness
19(1)
Accessibility
19(1)
Cost
19(1)
In a Nutshell
20(1)
Legal And Ethical Information Use
20(2)
Using a Computer, or Information, as a Tool to Commit a Crime
20(1)
Using a Computer, or Information, as the Object of a Crime
21(1)
Using Information Unethically
21(1)
Key Point Recap
22(1)
Key Terms
23(1)
Review Questions
24(1)
Discussion Questions
24(3)
Springfield Metro Medical Associates
27(3)
Medical Homes
27(1)
SMMA Background
28(1)
SMMA's Information Systems
29(1)
Questions
30(1)
Case 1: Trusting A Spreadsheet Too Much
30(1)
Questions
30(1)
Case 2: Swissquote
31(2)
Questions
32(1)
References
33(2)
Chapter 2 Role of Information Systems in Business
35(28)
Chapter Outline
35(1)
Why This
Chapter Matters
35(1)
Chapter Take-Aways
36(1)
A Perspective On Information Systems
36(2)
Competitive Strategies
38(3)
Five Basic Competitive Forces
41(7)
Rivalry among Existing Competitors
42(1)
Impact of the Internet and the Web on Rivalry among Existing Competitors
42(1)
Bargaining Power of Customers
43(2)
Impact of the Internet and the Web on the Bargaining Power of Customers
45(1)
Bargaining Power of Suppliers
45(1)
Impact of the Internet and the Web on the Bargaining Power of Suppliers
46(1)
Threat of New Entrants
46(1)
Impact of the Internet and the Web on the Threat of New Entrants
46(1)
Threat of Substitute Products or Services
47(5)
Impact of the Internet and the Web on the Threat of Substitute Products and Services
47(1)
Value Chain
48(2)
Key Point Recap
50(1)
Key Terms
50(1)
Review Questions
51(1)
Discussion Questions
51(1)
Springfield Metro Medical Associates Case
52(4)
Questions
55(1)
Case 1: Using Social Media To Compete
56(1)
Questions
57(1)
Case 2: Pharmacy Processes
57(2)
Questions
58(1)
References
59(4)
Part II: Technology Fundamentals
Chapter 3 Information Systems Hardware
63(46)
Chapter Outline
63(1)
Why This
Chapter Matters
63(1)
Chapter Take-Aways
64(1)
Computer Structure
64(1)
Switches: The Basic Hardware Building Blocks
65(4)
Computer System Components
69(5)
Central Processor
69(9)
Hardware Evolution
70(1)
Processor Clock Speed
70(3)
Multiple Cores, Multiple Threads
73(1)
Specialized Processors
74(1)
Primary Storage
74(4)
Secondary Storage
78(9)
Rotating Magnetic Disks
78(2)
Optical Disks
80(1)
Solid-State Storage
81(1)
Magnetic Tape Storage
81(2)
Enterprise Storage Subsystems
83(2)
Cloud Storage
85(2)
Input Devices
87(1)
Output Devices
88(5)
Displays (Monitors)
88(2)
Printers
90(2)
Other
92(1)
Computer Categories
93(3)
Key Point Recap
96(1)
Key Terms
96(3)
Review Questions
99(1)
Discussion Questions
100(2)
Springfield Metro Medical Associates
102(2)
Questions
103(1)
Case 1: The Green Grid Measures Energy Efficiency
104(1)
Questions
105(1)
Case 2: Meltin' Pot Deploys Blade Servers
105(2)
Questions
106(1)
References
107(2)
Chapter 4 Information Systems Software
109(36)
Chapter Outline
109(1)
Why This
Chapter Matters
109(1)
Chapter Takeaways
110(1)
Software Concepts
110(5)
Writing Software
111(3)
Open-Source Software
114(1)
System Software
115(12)
Operating System
116(4)
Defining the User Interface
116(2)
Managing Shared Resources
118(1)
Providing Shared Services
119(1)
Trends in Computing
120(6)
Virtualization
120(2)
Client/Server Computing
122(2)
Cloud Computing
124(2)
Other System Software
126(1)
Application Software
127(2)
Horizontal versus Vertical Applications
127(1)
Off-the-Shelf versus Custom Applications
128(1)
Open-Source Applications
128(1)
Software Licensing
129(1)
Embedded Software
130(2)
Key Point Recap
132(1)
Key Terms
133(2)
Review Questions
135(1)
Discussion Questions
135(3)
Springfield Metro Medical Associates
138(2)
Questions
140(1)
Case 1: Security Through Open Source
140(1)
Questions
141(1)
Case 2: Rescuing Food
141(1)
Questions
142(1)
References
142(3)
Chapter 5 Data, Databases, and Database Management
145(40)
Chapter Outline
145(1)
Why This
Chapter Matters
145(1)
Chapter Take-Aways
145(1)
The Database Concept
146(2)
Operational Databases
148(12)
Relational Database Concepts
149(1)
Example: MyVid Video Site
150(3)
Flat Files
153(1)
Normalization
154(1)
Entity-Relationship Diagramming
155(4)
Distributed Databases
159(1)
Databases For Decision Making
160(5)
Dimensional Databases
162(1)
"Big Data"
163(13)
Hadoop
164(1)
Database Management Systems
165(2)
Database Security
167(2)
Key Point Recap
169(1)
Key Terms
170(3)
Review Questions
173(1)
Discussion Questions
173(3)
Springfield Metro Medical Associates
176(3)
Questions
178(1)
Case 1: Netflix Moves To Cassandra
179(1)
Questions
180(1)
Case 2: Mapping Aleppo
180(2)
Questions
182(1)
References
182(3)
Chapter 6 Information Networks
185(42)
Chapter Outline
185(1)
Why This
Chapter Matters
185(1)
Chapter Take-Aways
185(1)
Communication Links And Networks
186(1)
Communication Links And Devices
186(4)
Physical Communication Links
186(2)
Wireless Communication Links
188(2)
One Way or Two Way?
190(1)
Local Area Networks
190(6)
Wired LANs
191(1)
Wi-Fi
192(2)
Wi-Fi Privacy and Security
193(1)
Other Wireless LANs
194(2)
Bluetooth
194(1)
Radio frequency ID
194(1)
Near-Field Communication
195(1)
ZigBee
195(1)
Personal Area Networks
196(1)
Wide Area Networks And The Internet
196(3)
Packet Switching
198(1)
Alternative Switching Methods
198(1)
Internet Applications
199(7)
World Wide Web
199(3)
Web 1.0
199(2)
Web 2.0
201(1)
Streaming
202(3)
Internet Telephony
202(1)
Streaming Video
203(1)
Teleconferencing
204(1)
Net Neutrality
205(1)
Other Internet Applications
205(1)
E-Mail
205(1)
File Transfer
205(1)
Others
206(1)
Network Security
206(6)
Human Aspects of Network Security
208(4)
Phishing
208(1)
Stolen E-Mail Address Lists
209(1)
Ransomware
209(1)
Pharming
210(1)
Identity Theft
210(1)
Privacy
211(1)
A Totally Secure System?
212(1)
Key Point Recap
212(1)
Key Terms
213(3)
Review Questions
216(1)
Discussion Questions
217(1)
Springfield Metro Medical Associates
218(2)
Questions
219(1)
Case 1: Connecting Remote Areas In Michigan
220(1)
Questions
221(1)
Case 2: Helping Mothers Have Healthy Babies In Ghana
221(1)
Questions
222(1)
References
222(5)
Part III: Information Systems at Work
Chapter 7 Integrating the Organization
227(38)
Chapter Outline
227(1)
Why This
Chapter Matters
227(1)
Chapter Takeaways
227(1)
History: Information Silos
228(1)
Functional Information Systems
229(5)
Accounting
230(1)
Finance
230(1)
Sales
230(1)
Marketing
231(1)
Human Resources
231(1)
Purchasing
231(1)
Production
232(1)
Research and Development
233(1)
Transaction Processing
234(6)
Data Validation
238(1)
Batch versus Online Transaction Processing
239(1)
Enterprise Resource Planning Systems
240(6)
ERP Software
241(1)
Business Processes
241(2)
Approaches to Using ERP
243(1)
Benefits of ERP
243(1)
Concerns with ERP
244(1)
Business Process Re-engineering
245(1)
Enterprise Application Integration
246(3)
ERP Or EAI?
248(1)
Intranets
249(1)
Integrating Society
250(2)
Key Point Recap
252(1)
Key Terms
252(2)
Review Questions
254(1)
Discussion Questions
254(2)
Springfield Metro Medical Associates
256(2)
Questions
258(1)
Case 1: City Of Edinburgh Modernizes
258(2)
Questions
260(1)
Case 2: Serenic Accounting Software
260(3)
Questions
262(1)
References
263(2)
Chapter 8 Connecting with Customers and Suppliers
265(42)
Chapter Outline
265(1)
Why This
Chapter Matters
265(1)
Chapter Take-Aways
265(1)
E-Business And E-Commerce
266(11)
Categories of E-Commerce
266(3)
Business to Consumer
266(2)
Business to Business
268(1)
Consumer to Consumer
268(1)
Government to Consumer
269(1)
Government to Business
269(1)
Finding an E-Commerce Site
269(3)
Portals
269(2)
Auctions
271(1)
Reverse Auctions
271(1)
Exchanges
271(1)
Getting into E-Commerce
272(1)
Mobile Commerce (M-Commerce)
273(1)
Mobile Payments
274(1)
E-Commerce Issues
274(3)
Getting the Word Out
274(1)
Disintermediation
275(1)
Channel Conflict
276(1)
Fulfillment
276(1)
Taxation
277(1)
Customer Relationship Management
277(8)
Operational CRM
277(3)
Level 1: Contact Management
278(1)
Level 2: Sales Management
278(1)
Level 3: Opportunity Management
278(1)
Regaining the Personal Touch via Operational CRM
279(1)
Analytical CRM
280(6)
RFM Method
281(1)
Customer Data Strategies
282(3)
Connecting Through Social Networks
285(1)
Supply Chain Management
286(6)
Electronic Ordering
288(1)
Providing Insight
289(10)
SCM Dashboard
289(1)
Automatic Replenishment
289(2)
Supply Chain Control Tower
291(1)
Bullwhip Effect
292(1)
Extranets
292(1)
Key Point Recap
293(1)
Key Terms
294(2)
Review Questions
296(1)
Discussion Questions
296(3)
Springfield Metro Medical Associates
299(1)
Questions
300(1)
Case 1: AliMed EDI
300(2)
Questions
301(1)
Case 2: The Risky Supply Chain
302(1)
Questions
303(1)
References
303(4)
Chapter 9 Making Better Decisions
307(38)
Chapter Outline
307(1)
Why This
Chapter Matters
307(1)
Chapter Take-Aways
307(1)
Decision-Making Concepts
308(4)
The Decision-Making System
308(1)
Decision Phases
309(1)
Decision Structure
310(1)
Decision Scope
311(1)
Strategic Decisions
311(1)
Tactical (Managerial Control) Decisions
311(1)
Operational Decisions
311(1)
Relationship among Decisions of Different Scope
312(1)
Putting the Concepts Together
312(1)
Model-Driven Decisions
312(3)
Simulation Studies
313(2)
Simulation Example
314(1)
The Simulation Process
315(1)
Data-Driven Decisions
315(12)
Online Analytical Processing
317(6)
Data Mining
323(1)
Predictive Analytics
324(3)
Group Decisions
327(2)
Group Support Software for the Decision-Making Process
327(1)
Group Support Software for Group Communication
328(1)
Concerns with Group Decision Making
329(1)
Dashboards
329(2)
Key Point Recap
331(1)
Key Terms
331(2)
Review Questions
333(1)
Discussion Questions
334(1)
Springfield Metro Medical Associates
335(3)
Questions
337(1)
Case 1: Predictive Analytics And Yogurt
338(2)
Questions
340(1)
Case 2: Data Warehousing At Volvo
340(2)
Questions
342(1)
References
342(3)
Part IV: Managing Information Systems
Chapter 10 Planning and Selecting Information Systems
345(32)
Chapter Outline
345(1)
Why This
Chapter Matters
345(1)
Chapter Takeaways
346(1)
The Information Systems Steering Committee
346(1)
Setting Priorities
347(6)
Consistency with Corporate Strategy
349(1)
Balanced Portfolio
349(3)
Infrastructure Considerations
352(4)
Proposals That Fit into the Existing Infrastructure
352(1)
Proposals That Extend the Existing Infrastructure
352(1)
Proposals Whose Purpose Is to Modify the Existing Infrastructure
352(1)
Make Or Buy?
353(3)
Selecting Software
356(9)
Establish Requirements
356(2)
Develop a List of Potential Suppliers
358(1)
Reduce the Long List to a Short List
358(1)
Request for Proposals
359(1)
RFP Response Evaluation
359(5)
Functional Evaluation
360(1)
Financial Evaluation
361(2)
Check References
363(1)
Benchmark Test
363(1)
Demonstration
364(1)
Negotiation
364(1)
After The Contract Is Signed
365(1)
Key Point Recap
365(1)
Key Terms
366(1)
Review Questions
367(1)
Discussion Questions
368(2)
Springfield Metro Medical Associates
370(3)
Questions
372(1)
Case 1: Muddle Through Or Replace?
373(1)
Questions
374(1)
Case 2: Planning For Data Growth
374(2)
Questions
375(1)
References
376(1)
Chapter 11 Developing Information Systems
377(42)
Chapter Outline
377(1)
Why This
Chapter Matters
377(1)
Chapter Takeaways
378(1)
Overview Of Software Development
378(2)
The System Development Life Cycle Approach
380(17)
How the SDLC Works
380(2)
SDLC Stages
382(11)
Stage 1: Preliminary Investigation
382(2)
Stage 2: Systems Analysis
384(3)
Stage 3: System Design
387(1)
Stage 4: System Development and Test
388(1)
Stage 5: Implementation
389(3)
Stage 6: Operation
392(1)
Stage 7: Maintenance
392(1)
User's Job: The Overall Picture
393(1)
What If We Bought Our Software?
394(1)
How the SDLC Differs for Software Products
395(1)
SDLC Strengths and Weaknesses
396(1)
Strengths
396(1)
Weaknesses
397(1)
Other System Development Approaches
397(4)
The Prototype Concept
398(1)
Alternative Development Methods
399(2)
Joint Application Design
399(1)
Rapid Application Development
399(1)
Agile Development
400(1)
In Summary
401(1)
Managing The Development Process
401(5)
Project Management
401(3)
Late Projects and Brooks's Law
404(1)
Estimating and Pitfalls
405(1)
Key Point Recap
406(1)
Key Terms
406(4)
Review Questions
410(1)
Discussion Questions
410(2)
Springfield Metro Medical Associates
412(2)
Questions
414(1)
Case 1: The Gendarmes Move To Linux
414(1)
Questions
415(1)
Case 2: Moody's And Aaron's Go Agile
415(2)
Questions
417(1)
References
417(2)
Chapter 12 Managing Information Systems
419(29)
Chapter Outline
419(1)
Why This
Chapter Matters
419(1)
Chapter Take-Aways
420(1)
Linking Strategy
420(3)
Information Systems Department
423(4)
CIO
423(1)
Where the IS Department Fits
424(1)
IS Department Structure
424(4)
Centralized IS Department Structure
425(1)
Decentralized IS Department Structure
425(1)
Matrix IS Department Structure
426(1)
Hybrid IS Department Structure
426(1)
Information Systems Jobs And Careers
427(1)
Managing Information Systems Security
428(10)
Security versus Privacy
429(1)
Types of Security
429(1)
Categories of Security
430(1)
Budgeting for Security
430(2)
Nontechnology Security Precautions
432(3)
Hardware Failures: Data Backup
432(1)
Physical Outages: Power Protection
433(1)
Physical Outages: Backup Sites
433(1)
Physical Access Control
434(1)
Social Engineering
434(1)
Technology-Based Security Precautions
435(1)
The Information Security Policy
436(1)
BYOD: Complicating the Picture
437(1)
Key Point Recap
438(1)
Key Terms
438(2)
Review Questions
440(1)
Discussion Questions
441(1)
Springfield Metro Medical Associates
442(2)
Questions
444(1)
Case 1: Underwater Data Centers: Should You Worry?
444(2)
Questions
445(1)
Case 2: Snoops On The Inside
446(2)
Questions
447(1)
References 448(1)
Index 449
Efrem G. Mallach , Adjunct Professor, Computer Information Systems, Rhode Island College; and Research Director, Kea Company.