Muutke küpsiste eelistusi

Managing Information Technology: International Edition 6th edition [Pehme köide]

  • Formaat: Paperback / softback, 784 pages, kõrgus x laius x paksus: 202x252x29 mm, kaal: 1384 g
  • Ilmumisaeg: 27-Aug-2008
  • Kirjastus: Pearson
  • ISBN-10: 0138146616
  • ISBN-13: 9780138146610
Teised raamatud teemal:
  • Pehme köide
  • Hind: 89,64 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 784 pages, kõrgus x laius x paksus: 202x252x29 mm, kaal: 1384 g
  • Ilmumisaeg: 27-Aug-2008
  • Kirjastus: Pearson
  • ISBN-10: 0138146616
  • ISBN-13: 9780138146610
Teised raamatud teemal:
For upper-level undergraduate and graduate level MIS courses.

 

This MIS text gives students and active managers a thorough and practical guide to IT management practices and issues.
 

Chapter 1, Managing IT in an e-World

Case Study 1, Midsouth Chamber of Commerce (A):  The Role of the Operating
Manager in Information Systems

 

Part I, Information Technology

Chapter 2, Computer Hardware

Chapter 3, Computer Software

Chapter 4, Telecommunications and Networking

Chapter 5, The Data Resource 

Case Study I-1, IMT Custom Machine Company, Inc.: Selection of an Information
Technology Platform 

Case Study I-2, VoIP2.biz: Strategic Steps for a VoIP Supplier

Case Study I-3, VoIP Adoption at Butler University

Case Study I-4, Data Governance at InsuraCorp

Case Study I-5, Midsouth Chamber of Commerce (B): Cleaning Up an IS Debacle

 

Part II, Applying Information Technology

Chapter 6, Enterprise Systems

Chapter 7, Managerial Support Systems

Chapter 8, E-Business Systems

Case Study II-1, Vendor-Managed Inventory at NIBCO

Case Study II-2,The Challenges of Local System Design for Multinationals: 
The MaxFli Sales Force Automation System at BAT

Case Study II-3, Real-Time Business Intelligence at Continental Airlines

 

Case Study II-4, The Cliptomania Web Store

Case Study II-5, Mezzia, Inc.: Deciding Which IT Company to Join

 

Part III, Acquiring Information Systems

Chapter 9, Basic Systems Concepts and Tools

Chapter 10, Methodologies for Custom Software Development

Chapter 11, Methodologies for Purchased Software Packages

Chapter 12, IT Project  Management

Chapter 13, Supporting Computer Users

Case Study III-1, Managing a Systems Development Project at Consumer and
Industrial Products

Case Study III-2, Development of an Interorganizational System at Zeus

Case Study III-3, Make-or-Buy Decision at Baxter Manufacturing Company

Case Study III-4, ERP Purchase Decision at Benton Manufacturing Company

Case Study III-5, The Kuali Financial System: An Open Source Project

Case Study III-6, Naval Surface Warfare Center, Crane Division: Implementing
Business Process Reengineering Recommendations

Case Study III-7, NIBCOs Big Bang:  An SAP Implementation

Case Study III-8, BAT-Taiwan:  Implementing SAP for a Strategic Transition

Case Study III-9, A Troubled Project at Modern Materials

 

Part IV, The Information Management System

Chapter 14, Planning Information Systems Resources

Chapter 15, Leading the Information Systems Function

Chapter 16, Information Security

Chapter 17, Legal, Ethical, and Social Issues

Case Study IV-1, The Clarion School for Boys Milwaukee Division: 
Developing an Information Systems Plan

Case Study IV-2, Teletron, Inc.: Using Information Technology to Transform a
Company

Case Study IV-3, Fast Track IT Integration for the Sallie Mae Merger

Case Study IV-4, IT Infrastructure Outsourcing at Schaeffer (A): The
Outsourcing Decision

Case Study IV-5, IT Infrastructure Outsourcing at Schaeffer (B): Managing the
Outsourcing Contract

Case Study IV-6, Systems Support for a New Baxter Manufacturing Company Plant
in Mexico

Case Study IV-7, BAT-APSS:  Shared Services at a Multinational Firm

Case Study IV-8, Mary Morrisons Ethical Dilemma

Case Study IV-9, A Security Breach on the Indiana University Computer Network