Information systems for business : an experiential approach

書誌事項

Information systems for business : an experiential approach

France Bélanger, Craig Van Slyke

J. Wiley & Sons, c2012

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

A focused delivery on information systems Featuring the model "learn-do-reflect", this invaluable book offers a focused treatment of information systems topics. Packed with engaging exercises throughout the book to enhance your learning, the book aims at looking at how information is analyzed, used for competitive advantage, stored, and more. Each chapter serves as a short, focused examination of the covered topic and includes activities to drive home the material. Also included is an online instructor's web site that provides extensive support to teach with this approach. Offers a focused look at information systems and how information is analyzed, used for competitive advantage, and stored Includes helpful exercises in each chapter that drill down the lessons learned Reflects the "learn-do-reflect" teaching model Features an instructor's web site that provides extensive support This valuable book offers a practical approach to learning the capabilities and potential of information systems.

目次

Preface xv SECTION I INTRODUCTION 1 The Value of Information 1 Focusing Story: How Information Cost Me (A Lot of) Money 2 Learning Activity 1.1 A Day in My Technology-Free Life Blog 3 Data Information Knowledge and Wisdom 3 Information Literacy 5 Uses of Information 5 Learning Activity 1.2 How I Use Information 6 Learning Activity 1.3 How Businesses Use Information 7 Business Box Promising Information Careers 7 Information and Your Career 8 2 Introduction to Information Systems 13 Focusing Story: Registering for Classes in 1981 14 Learning Activity 2.1 Identifying My Information Systems 15 Why All Business Professionals Need to Be IS Managers 15 Learning Activity 2.2 Components of a System 16 Overview of Systems 16 Learning Activity 2.3 Components of a Business Information System 18 Foundations of Information Systems 18 Stats Box Growth of Applications in Apple's App Store 22 How Information Systems Help Us Deal with Information 22 Business Box How Southwest Airlines Flies High with Information Systems 24 Learning Activity 2.4 Information Systems and Change 25 How Information Systems Facilitate Organizational Change 25 Process Improvements 25 Automation 26 Control 26 Information Flow 26 Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability 27 Common Information Systems 28 3 Evaluating Information 33 Focusing Story: Biased Information in a Trusted Outlet 34 Learning Activity 3.1 How Good is This Information? 35 Being a Smart Information Consumer 35 Stats Box 36 Business Box Resume Fraud 36 Learning Activity 3.2 My Online Life and Information Overload 37 Information Overload and the Need to Evaluate Information 38 Learning Activity 3.3 Dimensions of Information Quality 39 Information Quality 40 Business Box Information Quality as an Ethical Issue 42 Learning Activity 3.4 Evaluating Information Sources 43 Evaluating Information 43 Evaluating Usefulness 44 Evaluating Believability 45 4 Gaining Strategic Value from Information 51 Focusing Story: Healthcare on My Cell Phone 52 Strategic Information Systems 53 Strategic Planning Process 54 Step 1: Strategic Business Planning 54 Stats Box 55 Step 2: Information Systems Assessment 55 Step 3: Information Systems Vision 56 Step 4: Information Systems Architecture 56 Step 5: Strategic Initiatives Identification 57 Advantages of IS Strategic Planning Process 57 Frameworks for Strategic Information Systems 58 Information Systems SWOT Analysis 58 SWOT Analysis of a Person? 59 Porter's Five Competitive Forces Model 60 Porter's Value Chain Analysis 60 Virtual Value Chain 62 Evaluating Strategic Initiatives 64 Critical Success Factors 64 CSFS for Implementing Web Portals in Saudi Arabia 65 Learning Activity 4.1 What Does Yahoo! Need for Success? 66 Priority Matrix 66 Learning Activity 4.2 Competitive Advantage at Outrigger Hotels and Resorts 67 Hyper-competition: Sustainability of Competitive Advantage 67 Learning Activity 4.3 Google Vs. Yahoo! 69 SECTION II MANAGING INFORMATION 5 Storing and Organizing Information 75 Focusing Story: The Database Behind Facebook 76 Learning Activity 5.1 Data for an Amazon Order 77 Stats Box 77 Overview of Relational Databases 77 Databases and Database Management Systems 77 Learning Activity 5.2 Connecting Data Elements 78 Databases vs. Spreadsheets (When to Use a DBMS) 78 Relational Databases 79 Database Diagrams 83 Learning Activity 5.3 Finding Business Databases Online 84 The Compact Disc Database (CDDB) 84 Online Databases 85 6 Analyzing Information for Business Decision-Making 91 Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money 92 Learning Activity 6.1 Information and Decision-Making 93 Importance of Good Decision-Making Skills 93 Learning Activity 6.2 What Kind of Information Do I Need? 94 Using Information for Decision-Making 94 Business Box Why Do Managers Make Bad Decisions? 95 Types of Decisions 95 A Decision-Making Process 97 Identify and Clearly Define the Problem 97 Determine Requirements and Goals 98 Identify Alternatives 99 Define the Criteria 99 Learning Activity 6.3 Requirements Goals and Criteria 99 Select a Decision-Making Technique/tool 100 Evaluate the Alternatives Using the Criteria 101 Check That the Solution Solves the Problem 102 Information Retrieval and Analysis Tools 102 Learning Activity 6.4 "What If " I Get a 75% on the Final? 103 Stats Box The Cost of Spreadsheet Errors 106 Learning Activity 6.5 What- If? Analysis in Business 107 7 Transmitting Information 113 Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi 114 Introduction and Definitions 115 Learning Activity 7.1 Online Document Sharing 116 Network Components and Characteristics 116 Types of Networks 117 Wired vs. Wireless Networks 117 Broadband Networks 118 Stats Box 1 Broadband Penetration in the G7 Countries 119 Network Coverage 120 The Internet 121 Internet Applications 122 Stats Box 123 Business Box 1 Internet Application of the Day: Get a Degree Online! 124 Internet vs. Intranet 125 Virtual Private Network (VPN) 125 Learning Activity 7.2 A Future Internet? Internet2 and Business 125 Networking Architectures 126 Architectural Principles 126 Client/Server Architecture 126 Peer-to-Peer Architecture 128 Wireless Architecture 128 Service Oriented Architecture (SOA) 128 Software as a Service (SaaS) 129 Cloud Computing 130 Virtualization 130 Learning Activity 7.3 Architecture and Principles 130 Communicating Information in Modern Organizations 131 Web 2.0 132 Unified Communications (UC) 132 The Power of Wikinomics 134 Stats Box 135 Learning Activity 7.4 Web 2.0 for Business 136 Web 3.0 136 8 Securing Information 143 Focusing Story: My Mac is More Secured than Your Windows-based PC! 144 Introduction and Definitions 146 Information Security Concepts 146 Security Levels 146 Learning Activity 8.1 How Protected is Your Computer? 147 Information Security Threats 148 Denial of Service 148 Unauthorized Access 150 Stats Box 151 Business Box 1 Even Big Technology Companies Can be Hacked 153 Learning Activity 8.2 Detecting Phishing 154 Theft and Fraud 154 Summary of Security Threats 155 Security Technologies and Solutions 157 Security Goals 157 Preventive Corrective and Detective Controls 157 Physical Security vs. Logical Security 158 User Profiles 158 Learning Activity 8.3 How Strong is Your Password? 159 Biometrics 160 Firewalls 162 Rendering Data Unreadable: Encryption 166 Learning Activity 8.4 Breaking the Encryption 166 Types of Cryptography 166 Virus Protection 169 Wireless Security 169 Stats Box 170 Security Policies 170 Business Box 2 How to Respond to a Security Crisis 170 Stats Box 3 Security Policies Compliance 171 Learning Activity 8.5 Where's the Security? 172 Risk Management 172 9 Protecting the Confidentiality and Privacy of Information 181 Focusing Story: The Reselling of Customer Data: The Choicepoint Story 182 Learning Activity 9.1 Finding Mindy' 183 Information Privacy Threats 185 Data Collection 186 Secondary Use of Information 187 Learning Activity 9.2 Privacy Pizza 187 Stats Box 1 Concern for Information Privacy 188 Consequences of Privacy Violations 188 Individual Consequences: Identify Theft 188 Stats Box 2 Fraud Type from Identity Theft 189 Organizational Consequences: Company Reputation 190 Stats Box 3 Reputation Risks of Social Networking 191 Technologies and Solutions for Information Privacy 191 Stats Box 4 Surveillance Societies Around the World 192 Cookies and Cookie Managers 192 Learning Activity 9.3 Privacy Policy Creation 194 Privacy Statement or Policy 194 Business Box 1 Privacy and Facebook 196 Privacy Seals 197 Activity 9.4 Why Your Advisor can't Talk to Your Parents 197 Government Information Privacy Regulations 198 Business Box 2 Hippa and Identity Theft 199 Privacy and Ethics 199 Learning Activity 9.5 Papa Privacy Policies and FERPA 200 Relationship between Security and Privacy 201 SECTION III USING INFORMATION 10 Developing Information Systems 207 Focusing Story: The $6 Billion Software Bug 208 Time Cost and Quality 209 Learning Activity 10.1 Determining Requirements 210 Software Development Methodologies 210 Traditional Systems Development Life Cycle 211 Planning Phase 212 Requirements Phase 212 Design Phase 213 Development Phase 214 Implementation Phase 214 Maintenance Phase 215 Learning Activity 10.2 Advantages and Disadvantages of the SDLC 215 Stats Box Standish Chaos Report 216 Alternative Methodologies 216 Prototyping 216 Rapid Application Development (RAD) 217 Spiral Model 218 Learning Activity 10.3 Comparing the Methods 220 Build or Buy Decision 220 Learning Activity 10.4 How Open Source Software Impacts Build vs. Buy 223 Using Open Source in Business 223 Business Box Bad Economy Leads to More Open Source Software 225 Learning Activity 10.5 What to Outsource 225 Outsourcing Information Systems 226 Outsourcing Models 226 Benefits and Risks of Outsourcing 227 Making the Outsourcing Decision 227 Business Box Reversing the Outsourcing Decision 228 Geographic Considerations 229 11 Information-Based Business Process 235 Focusing Story: Improving Processes is For Everyone! 236 Learning Activity 11.1 How Many Steps in this Process? 237 What Is a Process? 237 Process Modeling 239 Learning Activity 11.2 Model This! 240 Business Process Modeling Tools 240 Technology and Processes 242 Process Improvement 243 Levels of Change 245 Stats Box 1 Importance of Process Redesign 245 Learning Activity 11.3 Redesign This! 246 Business Box 1 Choicecare Physicians: Changing Access to Patient Records 247 12 Enterprise Information Systems 251 Focusing Story: Supply Chain Innovations at Wal-Mart 252 Learning Activity 12.1 Finding The Components of an Enterprise System 254 Enterprise Systems 254 Personal vs. Enterprise Systems 254 Integration and Enterprise Systems 256 Characteristics of Enterprise Systems 256 Enterprise Resource Planning (ERP) 258 Benefits and Disadvantages of ERP Systems 259 Business Box 1 The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List 259 Business Box 2 ERP is not Always a Horror Story: Cisco Implementation on Time and Budget 261 Stats Box 1 Top Seven Selected ERP Vendors 262 Learning Activity 12.2 The Online Beer Game 262 Supply Chain Management Systems 263 Stats Box 2 Supply Chain's Impact on Company Valuation 265 Learning Activity 12.3 Customer Relationship Management 265 Customer Relationship Management Systems 266 Customer Service Life Cycle 266 Components of CRM 268 Learning Activity 12.4 Self-servicing 268 Stats Box 3 CRM Vendors 269 CRM Implementation Options 269 Business Box 3 Not Just Technology: Training People for CRM At British Telecom 270 Benefits and Limitations of CRM 271 Customer Managed Interactions (CMI) 272 13 Information for Electronic Business 279 Focusing Story: The iPod and The Music Industry 280 Learning Activity 13.1 Why is E-business Important? 282 Introduction to E-business 282 Types of E-businesses 282 Stats Box 1 Retail E-commerce in The United States 284 E-business Models 285 What is a Business Model? 285 B2C E-business Models 286 Business Box 1 Changing The Business Model: Furniture.com 288 B2C E-business Enablers 288 Technological Enablers 288 Critical Mass 289 B2C E-business Impacts 290 E-channel Compression (Disintermediation) 290 E-channel Expansion 291 Learning Activity 13.2 Why Would I Trust them or Buy from Them? 291 Design for B2C E-Business 292 Business-to-Business (B2B) 293 Stats Box 2 B2B vs. B2C E-business 293 B2B E-business Models 294 Learning Activity 13.3 Where is My Web Page? 296 Search Engine Optimization 296 Trends in E-business 298 Mobile Business 299 Stats Box 3 Mobile Behaviors 300 Global e-Business 301 Stats Box 4 E-business in Ontario 301 Learning Activity 13.4 USA.Gov 302 E-government 302 14 Information and Knowledge for Business Decision Making 309 Focusing Story: Managing Knowledge by Texting 310 Learning Activity 14.1 How You Manage Knowledge 311 Knowledge Management 312 Why Managing Knowledge is Important 312 Types of Knowledge 313 Types of Knowledge Resources 314 Main Processes for Knowledge Management 314 Creating Knowledge 315 Capturing and Codifying Knowledge 316 Business Box The Issue of Trust in Knowledge Management 318 Storing and Retrieving Knowledge 318 Transferring and Applying Knowledge 319 Learning Activity 14.2 Wikis for Managing Knowledge 319 Knowledge Management Technologies 320 Repositories 320 Communication-based Tools 320 Stats Box Linkedin Groups as Communities of Practice 321 Executive Information Systems and Dashboards 321 Expert Systems 321 Learning Activity 14.3 Using a Decision Support System 323 Decision Support Systems and Group Decision Support Systems 323 Business Intelligence 326 Data Warehousing 327 Data Mining 328 Learning Activity 14.4 Making Ethical Decisions 332 Ethical Decision-Making 332 Index 339 Online In-Depth Guides (posted at the Instructor and Student Companion Sites: www.wiley.com/college/belanger) 1. Hardware 2. Software 3. Networking Basics 4. Advanced database concepts 5. Spreadsheets 6. Funding information systems 7. Managing projects 8. Advanced security privacy and risk management

「Nielsen BookData」 より

詳細情報

ページトップへ