Using MIS 6th Revised edition [Pehme köide]

(Uuem väljaanne: 9780133546439)
  • Formaat: Paperback, 552 pages, kõrgus x laius x paksus: 276x216x18 mm, kaal: 970 g, colour tables, diagrams, figures
  • Ilmumisaeg: 04-Jan-2013
  • Kirjastus: Prentice Hall
  • ISBN-10: 0133029670
  • ISBN-13: 9780133029673 (Uuem väljaanne: 9780133546439)
Teised raamatud teemal:
  • Pehme köide
  • Hind: 172,89 EUR*
  • Lisa soovinimekirja
  • Lisa ostukorvi
  • Kogus:
  • Tasuta tarne
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • Formaat: Paperback, 552 pages, kõrgus x laius x paksus: 276x216x18 mm, kaal: 970 g, colour tables, diagrams, figures
  • Ilmumisaeg: 04-Jan-2013
  • Kirjastus: Prentice Hall
  • ISBN-10: 0133029670
  • ISBN-13: 9780133029673 (Uuem väljaanne: 9780133546439)
Teised raamatud teemal:
Directed primarily toward undergraduate CIS/MIS college/university majors, this text also provides practical content to current and aspiring industry professionals. Using MIS shows how businesses use information systems and technology to accomplish their goals, objectives, and competitive strategy. With a new edition now publishing each year, Using MIS, 6e, contains fresh, new, and current material to help keep your students up to date. Note: this is the standalone book, if you want the book/access card order the ISBN below: 0133131149 / 9780133131147 Using MIS Plus MyMISLab with Pearson eText -- Access Card Package Package consists of: 0133029670 / 9780133029673 Using MIS 0133049132 / 9780133049138 myMISlab with Pearson eText -- Access Card -- for Using MIS
Part 1 Why MIS?
1(98)
1 The Importance Of Mis
3(28)
Q1 Why Is Introduction to MIS the Most Important Class in the Business School?
5(5)
What Are Cost-Effective Business Applications of Facebook or Twitter or Whatever Else Will Soon Appear?
6(1)
How Can I Attain Job Security?
6(1)
How Can Intro to MIS Help You Learn Nonroutine Skills?
7(2)
What is the Bottom Line?
9(1)
Q2 What Is MIS?
10(2)
Components of an Information System
10(1)
Management and Use of Information Systems
11(1)
Achieving Strategies
12(1)
Q3 How Can You Use the Five-Component Model?
12(3)
The Most Important Component-YOU
13(1)
High-Tech Versus Low-Tech Information Systems
13(1)
Using MIS InClass 1 A Group Exercise
14(1)
Understanding the Scope of New Information Systems
15(1)
Components Ordered by Difficulty and Disruption
15(1)
Q4 Why Is the Difference Between Information Technology and Information Systems Important?
15(1)
Q5 What Is Information?
16(1)
Definitions Vary
16(1)
Where Is Information?
16(1)
Q6 What Are Necessary Data Characteristics?
17(4)
Accurate
17(1)
Ethics Guide: Ethics of Information From Misdirected Data
18(2)
Timely
20(1)
Relevant
20(1)
Just Barely Sufficient
20(1)
Worth Its Cost
20(1)
Q7 2023?
21(10)
Security Guide: Passwords and Password Etiquette
22(2)
Guide: Five-Component Careers
24(5)
Case Study 1 The Amazon of Innovation
29(2)
2 Collaboration Information Systems
31(40)
Q1 What Are the Two Key Characteristics of Collaboration?
33(3)
Importance of Effective Critical Feedback
34(1)
Guidelines for Giving and Receiving Critical Feedback
35(1)
Warning!
35(1)
Q2 What Are Three Criteria for Successful Collaboration?
36(1)
Successful Outcome
36(1)
Growth in Team Capability
36(1)
Meaningful and Satisfying Experience
37(1)
Q3 What Are the Four Primary Purposes of Collaboration?
37(5)
Becoming Informed
38(1)
Making Decisions
38(2)
Problem Solving
40(1)
Project Management
40(2)
Q4 What Are the Components and Functions of a Collaboration Information System?
42(1)
The Five Collaboration System Components
42(1)
Primary Functions: Communication and Content Sharing
42(1)
Q5 How Can You Use Collaboration Tools to Improve Team Communication?
43(4)
Q6 How Can You Use Collaboration Tools to Share Content?
47(8)
Shared Content with No Control
47(1)
Ethics Guide: Virtual Ethics?
48(2)
Shared Content with Version Management
50(2)
Shared Content with Version Control
52(2)
Using MIS InClass 2 A Group Exercise
54(1)
Q7 Which Collaboration IS Is Right for Your Team?
55(4)
Three Sets of Collaboration Tools
56(1)
Choosing the Set for Your Team
57(1)
Don't Forget Procedures and People!
58(1)
Q8 2023?
59(12)
Security Guide: Securing Collaboration
60(2)
Guide: Egocentric Versus Empathetic Thinking
62(5)
Case Study 2 Eating Our Own Dog Food
67(4)
3 Strategy And Information Systems
71(28)
Q1 How Does Organizational Strategy Determine Information Systems Structure?
73(1)
Q2 What Five Forces Determine Industry Structure?
74(1)
Q3 How Does Analysis of Industry Structure Determine Competitive Strategy?
75(3)
Ethics Guide: Yikes! Bikes
76(2)
Q4 How Does Competitive Strategy Determine Value Chain Structure?
78(2)
Primary Activities in the Value Chain
78(1)
Support Activities in the Value Chain
79(1)
Value Chain Linkages
80(1)
Q5 How Do Business Processes Generate Value?
80(2)
Q6 How Does Competitive Strategy Determine Business Processes and the Structure of Information Systems?
82(3)
Using MIS InClass 3 A Group Exercise
84(1)
Q7 How Do Information Systems Provide Competitive Advantages?
85(4)
Competitive Advantage via Products
85(1)
Competitive Advantage via Business Processes
85(1)
How Does an Actual Company Use IS to Create Competitive Advantages?
86(1)
How Does This System Create a Competitive Advantage?
87(2)
Q8 2023?
89(10)
Security Guide: Differentiating on Security!
90(2)
Guide: Your Personal Competitive Advantage
92(5)
Case Study 3 Fulfillment by Amazon (FBA)
97(2)
Part 2 Information Technology
99(124)
4 Hardware, Software, And Mobile Systems
101(48)
Q1 What Do Business Professionals Need to Know About Computer Hardware?
103(4)
Hardware Components
104(1)
Types of Hardware
104(1)
Computer Data
105(2)
Q2 What Do Business Professionals Need to Know About Software?
107(9)
What Are the Major Operating Systems?
108(2)
Virtualization
110(2)
Own Versus License
112(1)
What Types of Applications Exist, and How Do Organizations Obtain Them?
112(2)
Using MIS InClass 4 A Group Exercise
114(2)
What Is Firmware?
116(1)
Q3 Is Open Source Software a Viable Alternative?
116(2)
Why Do Programmers Volunteer Their Services?
116(1)
How Does Open Source Work?
117(1)
So, Is Open Source Viable?
117(1)
Q4 What Are the Differences Between Native and Thin-client Applications?
118(6)
Developing Native Applications
118(2)
Developing Thin-client Applications
120(2)
Ethics Guide: "Because It's Where the Money is ..."
122(2)
Which Is Better?
124(1)
Q5 Why Are Mobile Systems Increasingly Important?
124(4)
Hardware
126(1)
Software
126(1)
Data
126(1)
Procedures
127(1)
People
127(1)
Q6 What Characterizes Quality Mobile User Experiences?
128(4)
Feature Content
128(1)
Use Context-sensitive Chrome
129(1)
Provide Animation and Lively Behavior
129(1)
Design to Scale and Share
130(1)
Use the Cloud
130(2)
Q7 What Are the Challenges of Personal Mobile Devices at Work?
132(3)
Advantages and Disadvantages of Employee Use of Mobile Systems at Work
133(1)
Survey of Organizational BYOD Policy
134(1)
Q8 2023?
135(14)
Security Guide: Churn and Burn
138(2)
Guide: Keeping Up to Speed
140(5)
Case Study 4 The Apple of Your i
145(4)
5 Database Processing
149(38)
Q1 What Is the Purpose of a Database?
151(1)
Q2 What Is a Database?
152(6)
Relationships Among Rows
153(2)
Metadata
155(1)
Ethics Guide: Nobody Said I Shouldn't
156(2)
Q3 What Are the Components of a Database Application System?
158(3)
What Is a Database Management System (DBMS)?
158(1)
Using MIS InClass 5 A Group Exercise
159(2)
Q4 How Do Database Applications Make Databases More Useful?
161(3)
What Are Forms, Reports, and Queries?
161(1)
Why Are Database-Application Programs Needed?
162(1)
Multi-User Processing
163(1)
Enterprise DBMS Versus Personal DBMS
164(1)
Q5 How Are Data Models Used for Database Development?
164(4)
What Is the Entity-Relationship Data Model?
165(3)
Q6 How Is a Data Model Transformed into a Database Design?
168(5)
Normalization
168(2)
Representing Relationships
170(3)
Q7 What Is the Users' Role in the Development of Databases?
173(1)
Q8 2023?
173(14)
Security Guide: No, Thanks, I'll Use a Spreadsheet
176(2)
Guide: Immanuel Kant, Data Modeler
178(6)
Case Study 5 Fail Away with Dynamo, Bigtable, and Cassandra
184(3)
6 Data Communication And The Cloud
187(36)
Q1 What Is a Computer Network?
189(1)
Q2 What Are the Components of a LAN?
190(5)
A Typical SOHO LAN
190(2)
Connecting Your LAN to the Internet
192(2)
Using MIS InClass 6 A Group Exercise
194(1)
Q3 What Are the Fundamental Concepts You Should Know About the Internet?
195(9)
An Internet Example
195(1)
The TCP/IP Protocol Architecture
196(1)
Application-Layer Protocols
197(1)
TCP and IP Protocols
198(1)
IP Addressing
198(2)
Virtual Private Network
200(2)
Ethics Guide: Is it Spying or Just Good Management?
202(2)
Q4 What Processing Occurs on a Typical Web Server?
204(4)
Three-Tier Architecture
204(1)
Watch the Three Tiers in Action!
205(1)
Hypertext Markup Language (HTML)
206(2)
Q5 Why Is the Cloud the Future for Most Organizations?
208(3)
Why Is the Cloud Preferred to In-House Hosting?
209(1)
Why Now?
210(1)
When Does the Cloud Not Make Sense?
210(1)
Q6 How Can Organizations Use the Cloud?
211(1)
Q7 2023?
212(11)
Security Guide: You Said What? About Me? In Class?
214(2)
Guide: Thinking Exponentially is Not Possible, But...
216(4)
Case Study 6 Turbulent Air in Those Azure Clouds
220(3)
Part 3 Using IS for Competitive Advantage
223(130)
7 Processes, Organizations, And Information Systems
225(40)
Q1 What Are the Basic Types of Processes?
227(4)
How Do Structured Processes Differ from Dynamic Processes?
227(1)
How Do Processes Vary by Organizational Scope?
228(3)
Q2 How Can Information Systems Improve Process Quality?
231(2)
How Can Processes Be Improved?
231(1)
How Can Information Systems Improve Process Quality?
232(1)
Q3 How Do Enterprise Systems Eliminate the Problem of Information Silos?
233(5)
What Are the Problems of Information Silos?
233(1)
How Do Organizations Solve the Problems of Information Silos?
234(1)
An Enterprise System for Patient Discharge
234(2)
Ethics Guide: Dialing For Dollars
236(2)
Q4 How Do CRM, ERP, and EAI Support Enterprise Processes?
238(8)
The Need for Business Process Engineering
238(1)
Emergence of Enterprise Application Solutions
238(1)
Customer Relationship Management (CRM)
239(1)
Enterprise Resource Planning (ERP)
240(2)
Using MIS InClass 7 A Group Exercise
242(3)
Enterprise Application Integration (EAI)
245(1)
Q5 What Are the Elements of an ERP System?
246(4)
ERP Application Programs
247(1)
ERP Databases
247(1)
Business Process Procedures
247(1)
Training and Consulting
248(1)
Industry-Specific Solutions
249(1)
What Companies Are the Major ERP Vendors?
249(1)
Q6 What Are the Challenges of Implementing New Enterprise Information Systems?
250(1)
Collaborative Management
250(1)
Requirements Gaps
250(1)
Transition Problems
250(1)
Employee Resistance
251(1)
Q7 How Do Inter-enterprise IS Solve the Problems of Enterprise Silos?
251(2)
Q8 2023?
253(12)
Security Guide: One-Stop Shopping
254(2)
Guide: ERP and the Standard, Standard Blueprint
256(6)
Case Study 7 Using the PRIDE Database
262(3)
8 Social Media Information Systems
265(40)
Q1 What Is a Social Media Information System (SMIS)?
267(6)
Three SMIS Roles
267(3)
SMIS Components
270(3)
Q2 How Do SMIS Advance Organizational Strategy?
273(4)
Social Media and the Sales and Marketing Activity
273(2)
Social Media and Customer Service
275(1)
Social Media and Inbound and Outbound Logistics
275(1)
Social Media and Manufacturing and Operations
276(1)
Social Media and Human Resources
277(1)
Q3 How Do SMIS Increase Social Capital?
277(4)
What Is the Value of Social Capital?
277(1)
How Do Social Networks Add Value to Businesses?
278(1)
Using Social Networking to Increase the Number of Relationships
278(1)
Using Social Networks to Increase the Strength of Relationships
279(1)
Connecting to Those with More Assets
280(1)
Q4 What Roles Do SMIS Play in the Hyper-Social Organization?
281(4)
Consumers Become Humans
281(1)
Market Segments Becomes Tribes
282(1)
Channels Become Networks
282(1)
Structure and Control Becomes Messy
283(1)
How Can SMIS Foster Hyper-Social Organizations?
283(2)
Q5 Does Mobility Affect Social Media Economics?
285(4)
Key Characteristics of Web 2.0
285(1)
Ethics Guide: Hiding the Truth?
286(2)
Does Mobility Reduce Online Ad Revenue?
288(1)
Q6 How Can Organizations Manage the Risks of Social Media?
289(4)
Using MIS InClass 8 A Group Exercise
284(7)
Managing the Risk of Employee Communication
291(1)
Managing the Risk of User-Generated Content
292(1)
Q7 2023?
293(12)
Security Guide: Social Recruiting
296(2)
Guide: Blending the Personal and the Professional
298(4)
Case Study 8 Sedona Social
302(3)
9 Business Intelligence Systems
305(48)
Q1 How Do Organizations Use Business Intelligence (BI) Systems?
307(2)
Q2 What Are the Three Primary Activities in the BI Process?
309(6)
Using Business Intelligence for Problem-Solving at GearUp
310(1)
Acquire Data
311(1)
Analyze Data
311(4)
Publish Results
315(1)
Q3 How Do Organizations Use Data Warehouses and Data Marts to Acquire Data?
315(4)
Problems with Operational Data
317(1)
Data Warehouses Versus Data Marts
318(1)
Q4 How Do Organizations Use Reporting Applications?
319(3)
Basic Reporting Operations
319(1)
RFM Analysis
320(1)
Online Analytical Processing (OLAP)
320(2)
Q5 How Do Organizations Use Data Mining Applications?
322(8)
Unsupervised Data Mining
324(1)
Supervised Data Mining
324(1)
Market-Basket Analysis
325(2)
Decision Trees
327(1)
Ethics Guide: The Ethics of Classification
328(2)
Q6 How Do Organizations Use BigData Applications?
330(3)
MapReduce
330(1)
Hadoop
330(2)
Using MIS InClass 9 A Group Exercise
332(1)
Q7 What Is the Role of Knowledge Management Systems?
333(5)
What Are Expert Systems?
333(2)
What Are Content Management Systems?
335(1)
What Are the Challenges of Content Management?
335(1)
What Are Content Management Application Alternatives?
335(1)
How Do Hyper-Social Organizations Share Knowledge?
336(1)
Hyper-social KM Alternative Media
337(1)
Resistance to Hyper-social Knowledge-Sharing
337(1)
Q8 What Are the Alternatives for Publishing BI?
338(2)
Characteristics of BI Publishing Alternatives
338(1)
What Are the Two Functions of a BI Server?
339(1)
Q9 2023?
340(13)
Security Guide: Semantic Security
342(2)
Guide: Data Mining in the Real World
344(5)
Case Study 9 Hadoop the Cookie Cutter
349(4)
Part 4 Information Systems Management
353(112)
10 Development Processes
355(46)
Q1 How Are Business Processes, IS, and Applications Developed?
357(3)
How Do Business Processes, Information Systems, and Applications Differ and Relate?
357(2)
Which Development Processes Are Used for Which?
359(1)
Q2 How Do Organizations Use Business Process Management (BPM)?
360(3)
Why Do Processes Need Management?
361(1)
What Are BPM Activities?
362(1)
Q3 How is Business Process Modeling Notation (BPMN) Used to Model Processes?
363(4)
Need for Standard for Business Processing Notation
364(1)
Documenting the As-Is Business Order Process
365(2)
Q4 What are the Phases in the Systems Development Life Cycle (SDLC)?
367(10)
Define the System
368(2)
Ethics Guide: Estimation Ethics
370(2)
Determine Requirements
372(2)
Design System Components
374(1)
System Implementation
375(2)
Maintain System
377(1)
Q5 What Are the Keys for Successful SDLC Projects?
377(7)
Create a Work-Breakdown Structure
378(1)
Estimate Time and Costs
378(1)
Create a Project Plan
379(1)
Adjust Plan via Trade-offs
380(2)
Manage Development Challenges
382(2)
Using MIS InClass 10 A Group Exercise
384(1)
Q6 How Can Scrum Overcome the Problems of SDLC?
384(6)
What Are the Principles of Agile Development Methodologies?
385(1)
What Is the Scrum Process?
386(2)
How Do Requirements Drive the Scrum Process?
388(2)
Q7 2023?
390(11)
Security Guide: Psst. There's Another Way, You Know...
392(2)
Guide: The Real Estimation Process
394(5)
Case Study 10 The Cost of PRIDE?
399(2)
11 Information Systems Management
401(26)
Q1 What Are the Functions and Organization of the IS Department?
403(4)
How Is the IS Department Organized?
403(2)
What IS-Related Job Positions Exist?
405(2)
Q2 How Do Organizations Plan the Use of IS?
407(2)
Align Information Systems with Organizational Strategy
407(1)
Communicate IS Issues to the Executive Group
407(1)
Develop Priorities and Enforce Them Within the IS Department
407(1)
Using MIS InClass 11 A Group Exercise
408(1)
Sponsor the Steering Committee
408(1)
Q3 What Are the Advantages and Disadvantages of Outsourcing?
409(7)
Outsourcing Information Systems
409(1)
Ethics Guide: Using the Corporate Computer
410(2)
International Outsourcing
412(1)
What Are the Outsourcing Alternatives?
413(1)
What Are the Risks of Outsourcing?
414(2)
Q4 What Are Your User Rights and Responsibilities?
416(2)
Your User Rights
416(1)
Your User Responsibilities
417(1)
Q5 2023?
418(9)
Security Guide: Are We Protecting Them From Me or Me From Them?
420(2)
Guide: Is Outsourcing Fool's Gold?
422(3)
Case Study 11 iApp 4 U
425(2)
12 Information Security Management
427(38)
Q1 What Is the Goal of Information Systems Security?
429(5)
The IS Security Threat/Loss Scenario
429(1)
What Are the Sources of Threats?
430(1)
What Types of Security Loss Exist?
431(2)
Goal of Information Systems Security
433(1)
Q2 How Big is the Computer Security Problem?
434(2)
Q3 How Should You Respond to Security Threats?
436(3)
Using MIS InClass 12 A Group Exercise
438(1)
Q4 How Should Organizations Respond to Security Threats?
439(3)
Ethics Guide: Securing Privacy
440(2)
Q5 How Can Technical Safeguards Protect Against Security Threats?
442(5)
Identification and Authentication
442(1)
Single Sign-on for Multiple Systems
443(1)
Encryption
443(1)
Firewalls
444(1)
Malware Protection
445(1)
Design for Secure Applications
446(1)
Q6 How Can Data Safeguards Protect Against Security Threats?
447(1)
Q7 How Can Human Safeguards Protect Against Security Threats?
447(6)
Human Safeguards for Employees
448(1)
Human Safeguards for Nonemployee Personnel
449(1)
Account Administration
450(1)
Systems Procedures
451(1)
Security Monitoring
452(1)
Q8 How Should Organizations Respond to Security Incidents?
453(1)
Q9 2023?
454(11)
Security Guide: Metasecurity
456(2)
Guide: The Final, Final Word
458(4)
Case Study 12 Moore's Law, One More Time...
462(3)
The International Dimension 465(16)
Application Exercises 481(17)
Glossary 498(16)
Index 514