Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Technology for Management: Driving Digital Transformation to Increase Local and Global Performance, Growth and Sustainability

3.29/5 (13 ratings by Goodreads)
(Canisius College), (Canisius College), (California State University at Long Beach)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 22-Mar-2021
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119702917
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 43,96 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 22-Mar-2021
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119702917
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Information Technology for Management, 12th Edition, provides students with a comprehensive understanding of the latest technological developments in IT and the critical drivers of business performance, growth, and sustainability. Integrating feedback from IT managers and practitioners from top-level organizations worldwide, the newest edition of this well-regarded textbook features thoroughly revised content throughout to present students with a realistic, up-to-date view of IT management in the current business environment.

The text offers a flexible, student-friendly presentation of the material through a pedagogy that is designed to help students with different learning styles easily comprehend and retain information. This blended learning approach combines visual, textual, and interactive content—featuring numerous real-world case studies of how businesses use IT to increase efficiency and productivity, strengthen collaboration and communication, and maximize their competitive advantage. Students learn how IT is leveraged to reshape enterprises, engage and retain customers, optimize systems and processes, manage business relationships and projects, and more.

Preface xiii
Acknowledgments xviii
Part 1 Emphasizing Local and Global Sustainability in the on-Demand and Sharing economies
1 Digital Transformation Disrupts Companies, Competition, and Careers Locally and Globally
1(30)
Case 1.1 Opening Case: Uber and Airbnb Innovative Digital Business Models Facilitate Global Expansion and Operational Resilience During the COVID-19 Pandemic
2(3)
Introduction
4(1)
1.1 Doing Business in the On-Demand and Sharing Economies
5(5)
Disruptive Digital Business Models
7(1)
IT's Role in the On-Demand and Sharing Economies
8(1)
IT-Business Objectives
8(2)
1.2 Business Process Improvement and Competition
10(5)
What Is a Business Process?
11(1)
Improving Business Processes
12(1)
Don't Automate, Obliterate!
12(1)
Competition
13(2)
1.3 IT Innovation and Disruption
15(5)
Social-Mobile-Analytics-Cloud (SMAC) Model
15(1)
Technology Mega Trends
16(2)
COVID-19 Accelerates Digital Transformation
18(1)
Lessons Learned
19(1)
1.4 IT and You
20(9)
On-Demand 'Gig' Workers
21(1)
IT Adds Value to Your Performance and Career
22(1)
Managing and Interpreting Big Data Are High Demand Skills
23(3)
Becoming an Informed IT User
26(3)
Case 1.2 Business Case: The loT Comes to Sports
29(1)
Case 1.3 Video Case: Creating a Digital Vision to Transform a Company and Improve the Customer Experience
30(1)
2 Information Systems, IT Infrastructure, and the Cloud
31(35)
Case 2.1 Opening Case: The Amazing Story of Tommy Flowers-Creator of the First Programmable Computer
32(2)
Introduction
33(1)
2.1 IS Concepts and Classification
34(9)
IT Adds Value
34(1)
Six Components of an IS
35(1)
Data, Information, Knowledge, and Wisdom
36(1)
Types of Information Systems
37(1)
Transaction Processing System
38(2)
Management Information System
40(1)
Decision Support Systems
40(1)
Executive Information System
41(2)
ISs Exist within Corporate Culture
43(1)
2.2 IT Infrastructure, IT Architecture, and Enterprise Architecture
43(5)
Adding Value with an EA
44(1)
Measuring EA Success
45(1)
EA and Sustainability
46(1)
Developing an EA
47(1)
EA Must Be Dynamic and Evolving
48(1)
2.3 Data Centers and Cloud Computing
48(11)
Data Centers
49(1)
Data Virtualization
50(3)
Cloud Computing
53(1)
Cloud Infrastructure
53(1)
Moving Workloads from the Enterprise to the Cloud
53(1)
Cloud Services
54(1)
Anything-as-a-Service (XaaS) Models
54(3)
Selecting a Cloud Vendor
57(2)
2.4 Virtualization and Virtual Machines
59(5)
Case 2.2 Business Case: Grupo AGORA Upgrades IT to Quench the Thirst of Millions Throughout Spain
64(2)
3 Data Management, Data Warehouses, and Data Governance
66(41)
Case 3.1 Opening Case: ThyssenKrupp Elevator Saves $1.5 Million and 900 Trees by Digitizing Documents
67(2)
Introduction
68(1)
3.1 Data Management
69(12)
Database Technologies
69(1)
Databases
70(1)
Centralized Databases
71(1)
Distributed Databases
72(1)
Database Management System (DBMS)
73(1)
Elements of a DBMS
73(6)
Benefits of a DBMS
79(1)
DBMS Vendor Rankings
80(1)
3.2 Data Warehouses and Data Marts
81(4)
Moving Data from a Database to a Data Warehouse or a Data Mart
81(1)
Building and Using a Data Warehouse
82(1)
Real-Time Support from an Active Data Warehouse
83(2)
Data Lakes
85(1)
3.3 Data Governance and Master Data Management (MDM)
85(11)
Data Governance
85(2)
Master Data and Master Data Management (MDM)
87(2)
Benefits of Data Governance and Master Data Management
89(1)
Information Management
90(1)
Data Life Cycle and Data Principles
90(1)
Harnessing Scattered Data
91(1)
Breaking Down Data Silos
91(1)
Culture Must Change
92(1)
Garbage In, Garbage Out
93(1)
The Cost of Dirty Data
94(2)
3.5 Electronic Document, Record, and Content Management
96(8)
Electronic Document Management
97(1)
Electronic Document Management Systems
97(1)
Electronic Records Management
97(1)
Legal Duty to Retain Business Records
98(1)
Electronic Records Management Systems
99(1)
Enterprise Content Management
100(1)
Enterprise Content Management Systems
100(1)
Choosing an EDMS, ERMS, or ECMS
100(4)
Case 3.2 Business Case: Dirty Data Jeopardize University Fundraising Efforts
104(3)
4 Networks, the Internet of Things (loT), and Edge Computing
107(42)
Case 4.1 Opening Case: Cedar Park, Texas Improves Customer Communications to Empower Them to Conserve Water through Its New Smart Water Network
108(1)
Introduction
109(1)
4.1 Network Fundamentals
109(8)
Business Functions Supported by Computer Networks
110(1)
Types of Networks
111(1)
Local Area Network (LAN)
111(1)
Wide Area Network (WAN)
112(1)
Intranets, Extranets, and Virtual Private Networks
113(1)
Transmission Media and Speed
114(1)
Network Components
115(1)
Circuit Switching vs. Packet Switching
115(1)
Network Applications
116(1)
4.2 Wireless Networks and Standards
117(10)
Differences Between 4G and 5G Networks
118(1)
Advantages and Disadvantages of 5G
118(1)
There Is a Growing Need for 5G
118(1)
Wireless Network Standards
119(1)
Wireless Connectivity
120(2)
Wireless Networks Use Different Transmission Media
122(1)
Wireless Network Technologies
123(4)
4.3 Mobile Computing and the Internet of Things (loT)
127(15)
Mobile Network Drivers
127(1)
More Smartphone Use
128(1)
More High-Capacity Networks
128(1)
Faster Broadband Speeds
128(1)
More Mobile Video
129(1)
Benefits of Mobile Computing
129(1)
Mobile Technologies
129(2)
Examples of NFC Applications and Their Potential Business Value
131(1)
The Internet of Things
132(1)
Factors Driving loT
133(1)
loT Architecture
133(1)
The Growth of loT
134(2)
Advantages and Disadvantages of loT
136(1)
Edge Computing
137(1)
Edge Architecture and Apps
138(1)
Industry Applications of Edge Computing
138(1)
Choosing Mobile Computing Solutions
138(1)
Networks Support Communication, Search, Collaboration and Relationships
139(3)
4.4 Network Quality of Service
142(5)
Net Neutrality
142(1)
Quality of Service Models
143(4)
Case 4.2 Business Case: Carnival Seeks to Keep Passengers Happier at Sea with loT, NFC, and Edge Computing
147(2)
5 Data Privacy and Cyber Security
149(50)
Case 5.1 Opening Case: Yahoo Is Fined $117.5 Million for Worst Data Hacks in History
150(2)
Introduction
151(1)
5.1 Data Privacy Concerns and Regulations
152(6)
Confused, Concerned, and Out of Control
152(2)
The Privacy Paradox
154(1)
Privacy Rights Are Civil Rights
154(1)
U.S. Consumer Protection Data Privacy Regulations
154(1)
U.S. State-Level Privacy Laws
155(1)
European Union's General Data Protection Rules (GDPR)
156(1)
The EU-U.S. Privacy Shield
157(1)
Public Lack of Understanding
157(1)
5.2 Extent and Cost of Cyberattacks and Cyber Threats
158(18)
Unintentional Cyber Threats
161(1)
Intentional Cyber Threats
161(8)
How Much Does a Cyberattack Really Cost an Organization?
169(1)
Cyberattack Targets and Consequences
170(1)
Most Prevalent and Deadly Cyber attack Targets
170(6)
5.4 Defending Against Cyberattacks and Managing Risk
176(8)
Cyber Defense Strategies
177(1)
Managing Risk
178(1)
Securing Systems
179(2)
Backup and Recovery
181(1)
Business Continuity Planning
182(1)
Disaster Recovery Services
183(1)
5.5 Regulatory Controls, Frameworks, and Models
184(11)
General Defense Controls
185(1)
Application Defense Controls
186(1)
Auditing Information Systems
186(1)
Government Regulations
187(1)
Risk Management and IT Governance Frameworks
187(2)
Industry Security Standards
189(1)
IT Security Defense-In-Depth Model
189(6)
Case 3.2 Business Case: Multi-National Marriott Hotels Could Face Consumer Backlash and up to $1 Billion in Regulatory Fines and Litigation Costs for Massive Data Breach
195(4)
Part 2 Maximizing Growth with Data Analytics, Social Media and Omni-Channel Technology
6 Business Intelligence, Data Science, and Data Analytics
199(50)
Case 6.1 Opening Case: NASCAR Pushes the Envelope by Combining Big Data with Augmented Reality in the World of Live Customer Engagement
200(2)
Introduction
201(1)
6.1 Business Intelligence and Data Science
202(15)
Four Phases of Decision-Making
202(1)
Data Driven Decision-Making with Data Analytics
203(1)
Traditional and Modern Business Intelligence (BI)
204(2)
Adding Value with Traditional and Modern BI
206(1)
Finding and Hiring BI Professionals
207(1)
Software to Support BI Professionals
208(2)
Data Science
210(2)
Adding Value with Data Science
212(1)
Building a Data Science Team
213(2)
Software to Support the Data Science Team
215(2)
6.2 Big Data and Advanced Data Analytics
217(7)
Big Data
217(1)
The Four Vs of Big Data
218(2)
Big Data Goals and Challenges
220(1)
Predictive Data Analytics
221(2)
Prescriptive Data Analytics
223(1)
6.3 Descriptive Data Analytics Tools
224(10)
Adding Value with Data Mining
224(2)
Adding Value through Learning, Exploration, and Discovery with Data Visualization
226(5)
Dashboards Are Real Time
231(1)
Adding Value with Digital Dashboards
231(2)
Enterprise Mashup Architecture
233(1)
Adding Value with Mashups
233(1)
6.4 Predictive and Prescriptive Data Analytics Methods and Techniques
234(11)
Adding Value with Text Mining
235(1)
Spatial Data Mining
235(1)
Geocoding
236(1)
GIS Is Not Your Grandfather's Map
237(1)
Infrastructure and Location-Aware Collection of Geospatial Data
238(1)
Adding Value with Spatial Data Mining
238(1)
Geospatial Data Analysis Software
238(1)
Regression Modeling
238(1)
Time-Series Regression
239(1)
Adding Value with Regression
240(1)
Adding Value with Optimization and Rules-Based Decision-Making
241(1)
Adding Value with Machine Learning
241(4)
Case 6.2 Business Case: London Heathrow Airport Launches BI and Machine Learning to Improve Airfield Management, Predict Passenger Flow, and Transform Airport Security
245(1)
Case 6.3 Video Case: The Beauty of Data Visualization
246(3)
7 Social Media and Semantic Web Technology
249(45)
Case 7.1 Opening Case: The Darkside of Digital Campaigns: Disinformation and Foreign Influence
250(2)
Introduction
251(1)
7.1 Web 2.0-The Social Web Technologies
252(6)
The Constantly Changing Web
252(1)
A Platform for Services and Social Interaction
252(1)
Emergence of Social Applications, Networks, and Services
253(2)
Why Managers Should Understand Web Technology
255(1)
Communicating on the Web
255(2)
Challenges and Opportunities for Business
257(1)
7.2 Social Web Tools and Applications
258(12)
Social Networking Services (SNS)
259(1)
How Businesses Use Social Networking Services
260(1)
E-commerce 2.0 and Social Commerce
261(1)
Private Social Networks
262(1)
Engaging Consumers with Blogs and Microblogs
262(1)
What Is the Purpose of a Blog?
262(1)
Blogging and Public Relations
262(1)
Reading and Subscribing to Blogs
263(1)
Blogging Platforms
263(1)
Microblogs
263(1)
Twitter
263(1)
Consumer Mashups and RSS Technology
264(1)
RSS Technology
264(1)
Social Metrics and Monitoring Tools
264(2)
Enterprise 2.0: Workplace Collaboration and Knowledge Sharing
266(1)
Collaboration Tools
266(1)
Social Tools for Information Retrieval, Knowledge Management, and Sharing
266(1)
Social Bookmarking Tools
267(1)
Content Creation and Sharing
267(1)
Shared Content Creation with Wikis
267(1)
Leveraging the Power of the Crowd: Crowdsourcing and Crowdfunding
268(1)
Crowdfunding
268(1)
Social Media Is More Than Facebook, YouTube, and Twitter
269(1)
7.3 Using Search Technology for Business Success
270(8)
How Search Engines Work
270(1)
How Crawler Search Engines Work
271(3)
Why Search Is Important for Business
274(1)
Enterprise Search
274(1)
Recommendation Engines
275(1)
Search Marketing
275(1)
Web Search for Business
276(1)
Emerging Search Technologies
277(1)
7.4 A Search for Meaning-Web 3.0 and Semantic Technology
278(5)
What Is the Semantic Web?
278(1)
The Language(s) of Web 3.0
279(1)
Semantic Web and Semantic Search
280(2)
Semantic Web for Business
282(1)
7.5 Recommendation Engines
283(7)
Case 7.2 Business Case: Facebook Helps Songkick Rock the Ticket Sales Industry
290(1)
Case 7.3 Video Case: Power Searching with Google
291(3)
8 Omnichannel Retailing, E-commerce, and Mobile Commerce Technology
294(36)
Case 8.1 Opening Case: Amazon Pioneers New In-Store Retail Concept
295(2)
Introduction
296(1)
8.1 Omnichannel Retailing
297(6)
Keeping Up with Consumer Demands and Behavior
297(2)
Digital Connections
299(1)
Consumers Still Love to Shop in Stores
299(1)
Supply Chain Is More Important Than Ever
300(1)
The Omnichannel Retailing Concept
301(2)
8.2 In-Store Retail Technology
303(3)
Changes in Consumer Shopping Behavior
303(1)
In-Store Retailing Trends
303(1)
In-Store Tech Improves Convenience and Enhances the Shopping Experience
304(2)
8.3 E-commerce-Online Retailing
306(7)
Types of E-commerce Markets
306(6)
Challenges to E-commerce
312(1)
E-commerce Business and Strategic Planning
313(1)
8.4 Mobile Commerce
313(6)
Mobile Advertising
314(1)
Mobile Apps
315(1)
Information: Competitive Advantage in Mobile Commerce
315(1)
QR Codes in Mobile Marketing
316(1)
Mobile Entertainment
317(1)
Hotel Services and Travel Go Wireless
317(1)
Mobile Social Networking
318(1)
8.5. Mobile Payment and Financial Services
319(7)
Mobile Payment Systems
319(1)
Mobile Banking and Financial Services
320(1)
Short Codes
321(1)
Security Issues Questions
322(4)
Case 8.2 Business Case: eBay-An E-commerce Pioneer Faces New Challenges
326(1)
Case 8.3 Video Case: Searching with Pictures Using Mobile Visual Search
327(3)
Part 3 Optimizing Performance and Growth with Business-Driven Systems, Artificial Intelligence and IT Strategy
9 Functional Business Systems
330(33)
Case 9.1 Opening Case: Business Case: Equifax Data Breach Highlights Need for Regulatory Compliance Changes in Financial Management
331(1)
Introduction
332(1)
9.1 Functional and Cross-Functional Business Processes
332(4)
Information Systems to Support Functional Business Units
333(3)
9.2 Production and Operations Management Systems
336(8)
Inventory Control Systems
337(2)
Quality Management Systems (QMS)
339(1)
Computer-Integrated Manufacturing Systems
340(1)
Manufacturing Execution Systems
341(1)
Transportation Management Systems
342(1)
Other POM Technologies
343(1)
9.3 Sales and Marketing Management Systems
344(4)
Sales Management Systems
345(1)
Marketing Management Systems
346(1)
Social Media as a Marketing Management Strategy
347(1)
9.4 Accounting, Finance, and Regulatory Compliance Systems
348(7)
Accounting Systems
349(1)
Financial Planning and Budgeting Systems
349(2)
Regulatory Compliance Systems
351(4)
9.5 Human Resource Information Systems (HRIS)
355(6)
Employee Development
356(1)
HR Planning, Control, and Management
356(1)
HRIS Move to the Cloud
357(4)
Case 9.2 Business Case: MAHLE GmbH Partners with SAP and MHP to Digitalize Its Logistics and Product Development Processes
361(1)
Case 9.3 Video Case: Fuze Increases Its Sales and Marketing Success with an Account-Based Marketing System
361(2)
10 Enterprise Systems
363(46)
Case 10.1 Opening Case: High-Profile Food Recalls Prompt Walmart to Create a Safer, More Transparent, and More Efficient Global Food Supply Chain
364(2)
Introduction
365(1)
10.1 Intro to Enterprise Systems
366(4)
Types of Enterprise Systems
366(2)
Integrating Legacy Systems
368(2)
10.2 Enterprise Resource Planning
370(8)
Automating ERP
370(1)
ERP and the IT Infrastructure
371(2)
ERP Implementation Critical Success Factors
373(1)
Lessons Learned
374(1)
What's New in ERP Systems?
375(1)
Selecting an ERP Vendor, Value-Added Reseller or Consultant
376(2)
10.3 Supply Chain Management
378(9)
Automating the Supply Chain
378(1)
Managing the Three Supply Chain Flows
379(1)
Electronic Data Interchange in the Order Fulfillment and Logistics Process
380(2)
Virtual Collaboration in the Supply Chain
382(1)
Achieving a Fully Digitized Supply Chain
382(1)
Four Technology Stages of Digital Adoption
383(3)
Lessons Learned
386(1)
Leading SCM Systems Developers
387(1)
10.4 Customer Relationship Management
387(6)
The CRM Process
388(2)
Automating CRM
390(1)
Customer Acquisition and Retention
390(1)
CRM for a Competitive Edge
391(1)
Implementing a CRM System
391(1)
Lessons Learned
392(1)
10.5 Communicating and Collaborating with Enterprise Knowledge Management Systems, Enterprise Content Management Systems, and Enterprise Social Platforms
393(13)
What Is Knowledge Management?
393(1)
Koenig's Three Stages of KM Development
394(1)
Automating EKM
394(1)
Benefits of EKM System
395(1)
Techniques for Managing Knowledge in Group Work
396(2)
Enterprise Content Management (ECM)
398(1)
Purpose and Benefits of an ECM System
398(1)
Using an ECM System
399(1)
Enterprise Social Platforms
399(1)
Growth in the ESP Market
400(1)
Evolution of ESPs
401(5)
Case 10.2 Business Case: Lowe's Integrates Augmented Reality and Robot Assistants into Its SCM and CRM Programs
406(1)
Case 10.3 Video Case: P&G-Creating Conversations with Global Consumers
407(2)
11 Artificial Intelligence, Robotics, and Quantum Computing Technology
409(35)
Case 11.1 Opening Case: HSBC Adopts Machine Learning Artificial Intelligence to Fight Money Laundering
410(1)
Introduction
411(1)
11.1 How AI Works
411(8)
Stages of Artificial Intelligence Development
412(1)
Types of Artificial Intelligence Machines
413(1)
The Six Branches of Artificial Intelligence
414(5)
11.2 Al Applications in Business and Society
419(7)
Adoption of AI Business Applications
419(1)
Al Maturity in Organizations
419(2)
Current AI Use in Business and Society
421(2)
Do All Businesses Need to Invest in AI?
423(1)
Al Use in the Public Sector
424(1)
Barriers to Al Adoption and Use
425(1)
11.3 Al and Society (Ethics)
426(4)
Major Issues of Concern
426(1)
Work Automation and Job Loss
426(1)
Privacy, Civil Rights, and Government Use of Artificial Intelligence
427(1)
Unexpected Results When Bias Creeps into the Learning Process
428(2)
11.4 Robotics
430(6)
Types of Robotic Machines
430(6)
11.5 Quantum Computing (QC)
436(5)
What Is Quantum Mechanics?
436(1)
Quantum Computers
436(1)
Challenges in Quantum Computing
437(4)
Case 11.2 Business Case: Recommendation Systems Powered by AI-Still Room for Improvement
441(3)
12 IT Strategy, Sourcing, and Strategic Technology Trends
444(46)
Case 12.1 Openin Case: San Diego County's 20-Year Outsourcing Journey
445(2)
Introduction
446(1)
12.1 IT Strategy and Competitive Advantage
447(10)
Aligning IT Strategy and Business Strategy
447(1)
The Open Group Architecture Framework (TOGAF)
448(1)
Resistance to Business-IT alignment
449(1)
Achieving and Sustaining a Competitive Advantage-Locally and Globally
449(1)
Competitive Advantage Tools
450(3)
Competing Globally
453(3)
IT-Enabled Service-Based Comparative Advantage
456(1)
12.2 IT Strategic Planning, Process, and Tools
457(11)
The Five Components of an IT Strategy
457(1)
Identifying Value Drivers
458(1)
A Reactive Approach to IT Investments Will Fail
458(1)
Developing an IT Strategic Plan
458(1)
IT Strategic Planning Process and Tools
459(2)
Strategic Planning Tools
461(7)
12.3 IT Sourcing Strategies and IT Service Management
468(13)
IT Offshoring
468(1)
IT Onshoring
469(1)
Cloud Services
469(1)
IT Service Management
470(1)
Levels and Types of IT Services
471(4)
Benefits of Using a Structured ITSM Strategy
475(1)
The Outsourcing Life Cycle
476(2)
Ask for "Proof of Concept" or a Trial Run
478(1)
Establishing and Managing IT Vendor Relationships
478(2)
Outsourcing Benefits
480(1)
Outsourcing Risks and Hidden Costs
480(1)
12.4 Strategic Technology Trends
481(6)
Scanning for Strategic Technology Trends
482(5)
Case 12.2 Business Case: Department of Defense (DOD) Evaluates Technology to Gain Help for Crisis Victims and Protect First Responders
487(3)
Part 4 Building, Operating and Managing Systems to Support Sustainable Business Practices During and After the COVID-19 Pandemic
13 Systems Development, IT Service Management and Project, Program and Portfolio Management
490(47)
Case 13.1 Opening Case: VELCO Outsources Project Management and Brings in Politically Sensitive Capital Project $6 Million Under Budget
491(2)
Introduction
492(1)
13.1 Systems Development
493(4)
The Systems Development Life Cycle
494(3)
13.2 Systems Development Methodologies
497(9)
Waterfall Model
497(1)
Object-Oriented Analysis and Design
498(1)
Agile Systems Development Methodology
499(2)
The DevOps Approach to Systems Development
501(2)
Systems Development Tools and Techniques
503(2)
Choosing a Systems Methodology or Tool
505(1)
13.3 Project, Program and Portfolio Management (PPPM)
506(11)
Project Management
506(1)
The Role of the Project Manager
507(2)
Program Management
509(1)
Portfolio Management
510(1)
Putting It All Together
511(1)
Why Projects Fail
512(1)
The Project Management Office
513(1)
PPPM Frameworks
514(1)
The Project Triple Constraint
515(1)
Five Phases of the Project Management Life Cycle
516(1)
13.4 Initiating, Planning, and Executing Projects
517(5)
Phase One: Project Initiating
517(3)
Phase Two: Project Planning
520(1)
Phase Three: Project Execution
521(1)
13.5 Monitoring/Controlling and Closing Projects
522(10)
Phase Four: Project Monitoring and Controlling
523(3)
Phase Five: Project Closing
526(1)
Achieving a High PMTQ
527(5)
Case 13.2 Business Case: It Took 10 Years and More Than $600 Million to Realize That Big Muscles, Not Computer, Can Best Move Baggage
532(1)
Case 13.3 Demo Case: Mavenlink Project Management and Planning Software
533(4)
14 IT Ethics and Local and Global Sustainability
537
Case 14.1 Opening Case: Royal Bank of Scotland Leverages Technology to Fulfill Its Strategy to Build a More Sustainable Bank
538(2)
Introduction
539(1)
14.1 An Introduction to Ethics
540(19)
The Three Basic Tenets of Business and IT Ethics
541(1)
Code of Ethics
542(1)
IT Professionals' Code of Ethics
543(1)
Developing an Ethics and Compliance Program
544(1)
Ethics Training in the Workplace
545(1)
IT-Related Unethical Behavior
545(7)
Discrimination in Social Media Recruiting
552(2)
Recruiting Regulations
554(1)
Proving Social Media Discrimination
555(1)
Protecting Companies and Candidates from Social Media Discrimination
556(1)
Providing a Secure and Respectful Workplace
557(1)
The Ethical Dilemma of Competing Responsibilities
558(1)
14.2 ICT and Local Sustainability
559(10)
The Triple Bottom Line and Sustainable Development
560(1)
Profits: "Green IT" Trumps Greenbacks
561(1)
People: Preserving Quality of Life
562(7)
14.3 ICT and Global Sustainability
569(19)
The Link between ICT and Climate Change
573(1)
Climate Change Mitigation
574(1)
Formal Climate Change Initiatives and Agreements
575(1)
Beyond Climate Change
576(1)
ICT and Sustainability in Developing Countries
577(5)
Barriers to ICT Acquisition, Implementation, and Use in Developing Countries
582(1)
Taking a People-First Approach to Technology
583(1)
Sustaining Business in a Post-COVID-19 World
583(5)
Case 14.2 Business Case: Spies vs. Pirates-La Liga Fined Over Mobile App That Spied on Illegal Match Screenings
588(1)
Case 14.3 Video Case: IT Ethics in the Workplace
589
Glossary G-1
Organization Index I-1
Name Index I-3
Subject Index I-4