Description
Efnisyfirlit
- Cover
- Series Page
- Title Page
- Copyright
- To The Student
- To The Instructor
- Preface
- Chapter 1: Introduction to Information Systems
- Opening Case
- Introduction
- 1.1 Why Should I Study Information Systems?
- 1.2 Overview of Computer-Based Information Systems
- 1.3 How Does IT Impact Organizations?
- 1.4 Importance of Information Systems to Society
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 2: Organizational Strategy, Competitive Advantage, and Information Systems
- Opening Case
- Introduction
- 2.1 Business Pressures, Organizational Responses, and Information Technology Support
- 2.2 Competitive Advantage and Strategic Information Systems
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 3: Data and Knowledge Management
- Opening Case
- Introduction
- 3.1 Managing Data
- 3.2 The Database Approach
- 3.3 Big Data
- 3.4 Data Warehouses and Data Marts
- 3.5 Knowledge Management
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 4: Telecommunications and Networking
- Opening Case
- Introduction
- 4.1 What Is a Computer Network?
- 4.2 Network Fundamentals
- 4.3 The Internet and the World Wide Web
- 4.4 Network Applications: Discovery
- 4.5 Network Applications: Communication
- 4.6 Network Applications: Collaboration
- 4.7 Network Applications: Educational
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 5: Business Analytics
- Opening Case
- Introduction
- 5.1 Managers and Decision Making
- 5.2 The Business Analytics Process
- 5.3 Business Analytics Tools
- 5.4 Business Analytics Models: Descriptive Analytics, Predictive Analytics, and Prescriptive Analytics
- Summary
- Chapter Glossary
- Discussion Questions
- Closing Case 1
- Closing Case 2
- Chapter 6: Ethics and Privacy
- Opening Case
- Introduction
- 6.1 Ethical Issues
- 6.2 Privacy
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 7: Information Security
- Opening Case
- Introduction
- 7.1 Introduction to Information Security
- 7.2 Unintentional Threats to Information Systems
- 7.3 Deliberate Threats to Information Systems
- 7.4 What Organizations Are Doing to Protect Information Resources
- 7.5 Information Security Controls
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 8: Social Computing
- Opening Case
- Introduction
- 8.1 Web 2.0
- 8.2 Fundamentals of Social Computing in Business
- 8.3 Social Computing in Business: Shopping
- 8.4 Social Computing in Business: Marketing
- 8.5 Social Computing in Business: Customer Relationship Management
- 8.6 Social Computing in Business: Human Resource Management
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 9: E-Business and E-Commerce
- Opening Case
- Introduction
- 9.1 Overview of E-Business and E-Commerce
- 9.2 Business-to-Consumer (B2C) Electronic Commerce
- 9.3 Business-to-Business (B2B) Electronic Commerce
- 9.4 Ethical and Legal Issues in E-Business
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 10: Wireless, Mobile Computing, and Mobile Commerce
- Opening Case
- Introduction
- 10.1 Wireless Technologies
- 10.2 Wireless Computer Networks and Internet Access
- 10.3 Mobile Computing and Mobile Commerce
- 10.4 The Internet of Things
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 11: Information Systems within the Organization
- Opening Case
- Introduction
- 11.1 Transaction Processing Systems
- 11.2 Functional Area Information Systems
- 11.3 Enterprise Resource Planning Systems
- 11.4 ERP Support for Business Processes
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 12: Customer Relationship Management
- Opening Case
- Introduction
- 12.1 Defining Customer Relationship Management
- 12.2 Operational Customer Relationship Management Systems
- 12.3 Other Types of Customer Relationship Management Systems
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 13: Supply Chain Management
- Chapter Opening Case
- Introduction
- 13.1 Supply Chains
- 13.2 Supply Chain Management
- 13.3 Information Technology Support for Supply Chain Management
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Chapter 14: Acquiring Information Systems and Applications
- Opening Case
- Introduction
- 14.1 Planning for and Justifying IT Applications
- 14.2 Strategies for Acquiring IT Applications
- 14.3 Traditional Systems Development Life Cycle
- 14.4 Alternative Methods and Tools for Systems Development
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Closing Case 1
- Closing Case 2
- Plug IT In 1: Business Processes and Business Process Management
- PI1.1 Business Processes
- PI1.2 Business Process Improvement, Business Process Reengineering, and Business Process Management
- Summary
- Chapter Glossary
- Discussion Questions
- Plug IT In 2: Hardware and Software
- Introduction
- PI2.1 Introduction to Hardware
- PI2.2 Introduction to Software
- Summary
- Glossary
- Discussion Questions
- Problem-Solving Activities
- Plug IT In 3: Fundamentals of Relational Database Operations
- Introduction
- PI3.1 Query Languages
- PI3.2 Entity–Relationship Modeling
- PI3.3 Normalization and Joins
- Summary
- Glossary
- Discussion Questions
- Plug IT In 4: Cloud Computing
- PI4.1 Introduction
- PI4.2 What Is Cloud Computing?
- PI4.3 Different Types of Clouds
- PI4.4 Cloud Computing Services
- PI4.5 The Benefits of Cloud Computing
- PI4.6 Concerns and Risks with Cloud Computing
- PI4.7 Web Services and Service-Oriented Architecture
- Summary
- Glossary
- Discussion Questions
- Problem-Solving Activities
- Plug IT In 5: Artificial Intelligence
- PI5.1 Introduction to Artificial Intelligence
- PI5.2 Artificial Intelligence Technologies
- PI5.3 Artificial Intelligence Applications
- Summary
- Chapter Glossary
- Discussion Questions
- Problem-Solving Activities
- Plug IT In 6: Project Management
- PI6.1 Project Management for Information Systems Projects
- PI6.2 The Project Management Process
- PI6.3 The Project Management Body of Knowledge
- Summary
- Glossary
- Discussion Questions
- Collaboration Exercise PI6.1
- Problem-Solving Activities
- Plug IT In 7: Protecting Your Information Assets
- PI7.1 How to Protect Your Assets: The Basics
- PI7.2 Behavioral Actions to Protect Your Information Assets
- PI7.3 Computer-Based Actions to Protect Your Information Assets
- Summary
- Discussion Questions
- Problem-Solving Activities
- Index
- End User License Agreement