did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470903728

Information Systems for Business : An Experiential Approach

by ;
  • ISBN13:

    9780470903728

  • ISBN10:

    0470903724

  • Format: Paperback
  • Copyright: 2011-11-01
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $99.40 Save up to $87.66
  • Rent Book $11.74
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS.
    HURRY! ONLY 1 COPY IN STOCK AT THIS PRICE
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

A focused delivery on information systems Featuring the model "learn-do-reflect", this invaluable book offers a focused treatment of information systems topics. Packed with engaging exercises throughout the book to enhance your learning, the book aims at looking at how information is analyzed, used for competitive advantage, stored, and more. Each chapter serves as a short, focused examination of the covered topic and includes activities to drive home the material. Also included is an online instructor's web site that provides extensive support to teach with this approach. Offers a focused look at information systems and how information is analyzed, used for competitive advantage, and stored Includes helpful exercises in each chapter that drill down the lessons learned Reflects the "learn-do-reflect" teaching model Features an instructor's web site that provides extensive support This valuable book offers a practical approach to learning the capabilities and potential of information systems.

Table of Contents

Prefacep. xv
Introduction
The Value of Informationp. 1
Focusing Story: How Information Cost Me (A Lot of) Moneyp. 2
A Day in My Technology-Free Life Blogp. 3
Data Information Knowledge and Wisdomp. 3
Information Literacyp. 5
Uses of Informationp. 5
How I Use Informationp. 6
How Businesses Use Informationp. 7
Business Box Promising Information Careersp. 7
Information and Your Careerp. 8
Introduction to Information Systemsp. 13
Focusing Story: Registering for Classes in 1981p. 14
Identifying My Information Systemsp. 15
Why All Business Professionals Need to Be IS Managersp. 15
Components of a Systemp. 16
Overview of Systemsp. 16
Components of a Business Information Systemp. 18
Foundations of Information Systemsp. 18
Stats Box Growth of Applications in AppleâÇÖs App Storep. 22
How Information Systems Help Us Deal with Informationp. 22
Business Box How Southwest Airlines Flies High with Information Systemsp. 24
Information Systems and Changep. 25
How Information Systems Facilitate Organizational Changep. 25
Process Improvementsp. 25
Automationp. 26
Controlp. 26
Information Flowp. 26
Business Box Coopers Brewery: Using Information Systems for Quality and Sustainabilityp. 27
Common Information Systemsp. 28
Evaluating Informationp. 33
Focusing Story: Biased Information in a Trusted Outletp. 34
How Good is This Information?p. 35
Being a Smart Information Consumerp. 35
Stats Boxp. 36
Business Box Resume Fraudp. 36
My Online Life and Information Overloadp. 37
Information Overload and the Need to Evaluate Informationp. 38
Dimensions of Information Qualityp. 39
Information Qualityp. 40
Business Box Information Quality as an Ethical Issuep. 42
Evaluating Information Sourcesp. 43
Evaluating Informationp. 43
Evaluating Usefulnessp. 44
Evaluating Believabilityp. 45
Gaining Strategic Value from Informationp. 51
Focusing Story: Healthcare on My Cell Phonep. 52
Strategic Information Systemsp. 53
Strategic Planning Processp. 54
Strategic Business Planningp. 54
Stats Boxp. 55
Information Systems Assessmentp. 55
Information Systems Visionp. 56
Information Systems Architecturep. 56
Strategic Initiatives Identificationp. 57
Advantages of IS Strategic Planning Processp. 57
Frameworks for Strategic Information Systemsp. 58
Information Systems SWOT Analysisp. 58
SWOT Analysis of a Person?p. 59
PorterâÇÖs Five Competitive Forces Modelp. 60
PorterâÇÖs Value Chain Analysisp. 60
Virtual Value Chainp. 62
Evaluating Strategic Initiativesp. 64
Critical Success Factorsp. 64
CSFS for Implementing Web Portals in Saudi Arabiap. 65
What Does Yahoo! Need for Success?p. 66
Priority Matrixp. 66
Competitive Advantage at Outrigger Hotels and Resortsp. 67
Hyper-competition: Sustainability of Competitive Advantagep. 67
Google Vs. Yahoo!p. 69
Managing Information
Storing and Organizing Informationp. 75
Focusing Story: The Database Behind Facebookp. 76
Data for an Amazon Orderp. 77
Stats Boxp. 77
Overview of Relational Databasesp. 77
Databases and Database Management Systemsp. 77
Connecting Data Elementsp. 78
Databases vs. Spreadsheets (When to Use a DBMS)p. 78
Relational Databasesp. 79
Database Diagramsp. 83
Finding Business Databases Onlinep. 84
The Compact Disc Database (CDDB)p. 84
Online Databasesp. 85
Analyzing Information for Business Decision-Makingp. 91
Focusing Story: How a Spreadsheet Saved Me (A Lot of) Moneyp. 92
Information and Decision-Makingp. 93
Importance of Good Decision-Making Skillsp. 93
What Kind of Information Do I Need?p. 94
Using Information for Decision-Makingp. 94
Business Box Why Do Managers Make Bad Decisions?p. 95
Types of Decisionsp. 95
A Decision-Making Processp. 97
Identify and Clearly Define the Problemp. 97
Determine Requirements and Goalsp. 98
Identify Alternativesp. 99
Define the Criteriap. 99
Requirements Goals and Criteriap. 99
Select a Decision-Making Technique/toolp. 100
Evaluate the Alternatives Using the Criteriap. 101
Check That the Solution Solves the Problemp. 102
Information Retrieval and Analysis Toolsp. 102
"What If " I Get a 75% on the Final?p. 103
Stats Box The Cost of Spreadsheet Errorsp. 106
What- If? Analysis in Businessp. 107
Transmitting Informationp. 113
Focusing Story: I Want My Own WiFi!: The Emergence of the MiFip. 114
Introduction and Definitionsp. 115
Online Document Sharingp. 116
Network Components and Characteristicsp. 116
Types of Networksp. 117
Wired vs. Wireless Networksp. 117
Broadband Networksp. 118
Broadband Penetration in the G7 Countriesp. 119
Network Coveragep. 120
The Internetp. 121
Internet Applicationsp. 122
Stats Boxp. 123
Internet Application of the Day: Get a Degree Online!p. 124
Internet vs. Intranetp. 125
Virtual Private Network (VPN)p. 125
A Future Internet? Internet2 and Businessp. 125
Networking Architecturesp. 126
Architectural Principlesp. 126
Client/Server Architecturep. 126
Peer-to-Peer Architecturep. 128
Wireless Architecturep. 128
Service Oriented Architecture (SOA)p. 128
Software as a Service (SaaS)p. 129
Cloud Computingp. 130
Virtualizationp. 130
Architecture and Principlesp. 130
Communicating Information in Modern Organizationsp. 131
Web 2.0p. 132
Unified Communications (UC)p. 132
The Power of Wikinomicsp. 134
Stats Boxp. 135
Web 2.0 for Businessp. 136
Web 3.0p. 136
Securing Informationp. 143
Focusing Story: My Mac is More Secured than Your Windows-based PC!p. 144
Introduction and Definitionsp. 146
Information Security Conceptsp. 146
Security Levelsp. 146
How Protected is Your Computer?p. 147
Information Security Threatsp. 148
Denial of Servicep. 148
Unauthorized Accessp. 150
Stats Boxp. 151
Even Big Technology Companies Can be Hackedp. 153
Detecting Phishingp. 154
Theft and Fraudp. 154
Summary of Security Threatsp. 155
Security Technologies and Solutionsp. 157
Security Goalsp. 157
Preventive Corrective and Detective Controlsp. 157
Physical Security vs. Logical Securityp. 158
User Profilesp. 158
How Strong is Your Password?p. 159
Biometricsp. 160
Firewallsp. 162
Rendering Data Unreadable: Encryptionp. 166
Breaking the Encryptionp. 166
Types of Cryptographyp. 166
Virus Protectionp. 169
Wireless Securityp. 169
Stats Boxp. 170
Security Policiesp. 170
Business Box 2 How to Respond to a Security Crisisp. 170
Security Policies Compliancep. 171
WhereâÇÖs the Security?p. 172
Risk Managementp. 172
Protecting the Confidentiality and Privacy of Informationp. 181
Focusing Story: The Reselling of Customer Data: The Choicepoint Storyp. 182
Finding MindyâÇÖp. 183
Information Privacy Threatsp. 185
Data Collectionp. 186
Secondary Use of Informationp. 187
Privacy Pizzap. 187
Concern for Information Privacyp. 188
Consequences of Privacy Violationsp. 188
Individual Consequences: Identify Theftp. 188
Fraud Type from Identity Theftp. 189
Organizational Consequences: Company Reputationp. 190
Reputation Risks of Social Networkingp. 191
Technologies and Solutions for Information Privacyp. 191
Surveillance Societies Around the Worldp. 192
Cookies and Cookie Managersp. 192
Privacy Policy Creationp. 194
Privacy Statement or Policyp. 194
Privacy and Facebookp. 196
Privacy Sealsp. 197
Activity 9.4 Why Your Advisor canâÇÖt Talk to Your Parentsp. 197
Government Information Privacy Regulationsp. 198
Hippa and Identity Theftp. 199
Privacy and Ethicsp. 199
Papa Privacy Policies and FERPAp. 200
Relationship between Security and Privacyp. 201
Using Information
Developing Information Systemsp. 207
Focusing Story: The $6 Billion Software Bugp. 208
Time Cost and Qualityp. 209
Determining Requirementsp. 210
Software Development Methodologiesp. 210
Traditional Systems Development Life Cyclep. 211
Planning Phasep. 212
Requirements Phasep. 212
Design Phasep. 213
Development Phasep. 214
Implementation Phasep. 214
Maintenance Phasep. 215
Advantages and Disadvantages of the SDLCp. 215
Stats Box Standish Chaos Reportp. 216
Alternative Methodologiesp. 216
Prototypingp. 216
Rapid Application Development (RAD)p. 217
Spiral Modelp. 218
Comparing the Methodsp. 220
Build or Buy Decisionp. 220
How Open Source Software Impacts Build vs. Buyp. 223
Using Open Source in Businessp. 223
Business Box Bad Economy Leads to More Open Source Softwarep. 225
What to Outsourcep. 225
Outsourcing Information Systemsp. 226
Outsourcing Modelsp. 226
Benefits and Risks of Outsourcingp. 227
Making the Outsourcing Decisionp. 227
Business Box Reversing the Outsourcing Decisionp. 228
Geographic Considerationsp. 229
Information-Based Business Processp. 235
Focusing Story: Improving Processes is For Everyone!p. 236
How Many Steps in this Process?p. 237
What Is a Process?p. 237
Process Modelingp. 239
Model This!p. 240
Business Process Modeling Toolsp. 240
Technology and Processesp. 242
Process Improvementp. 243
Levels of Changep. 245
Importance of Process Redesignp. 245
Redesign This!p. 246
Choicecare Physicians: Changing Access to Patient Recordsp. 247
Enterprise Information Systemsp. 251
Focusing Story: Supply Chain Innovations at Wal-Martp. 252
Finding The Components of an Enterprise Systemp. 254
Enterprise Systemsp. 254
Personal vs. Enterprise Systemsp. 254
Integration and Enterprise Systemsp. 256
Characteristics of Enterprise Systemsp. 256
Enterprise Resource Planning (ERP)p. 258
Benefits and Disadvantages of ERP Systemsp. 259
The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier Listp. 259
ERP is not Always a Horror Story: Cisco Implementation on Time and Budgetp. 261
Top Seven Selected ERP Vendorsp. 262
The Online Beer Gamep. 262
Supply Chain Management Systemsp. 263
Supply ChainâÇÖs Impact on Company Valuationp. 265
Customer Relationship Managementp. 265
Customer Relationship Management Systemsp. 266
Customer Service Life Cyclep. 266
Components of CRMp. 268
Self-servicingp. 268
CRM Vendorsp. 269
CRM Implementation Optionsp. 269
Not Just Technology: Training People for CRM At British Telecomp. 270
Benefits and Limitations of CRMp. 271
Customer Managed Interactions (CMI)p. 272
Information for Electronic Businessp. 279
Focusing Story: The iPod and The Music Industryp. 280
Why is E-business Important?p. 282
Introduction to E-businessp. 282
Types of E-businessesp. 282
Retail E-commerce in The United Statesp. 284
E-business Modelsp. 285
What is a Business Model?p. 285
B2C E-business Modelsp. 286
Changing The Business Model: Furniture.comp. 288
B2C E-business Enablersp. 288
Technological Enablersp. 288
Critical Massp. 289
B2C E-business Impactsp. 290
E-channel Compression (Disintermediation)p. 290
E-channel Expansionp. 291
Why Would I Trust them or Buy from Them?p. 291
Design for B2C E-Businessp. 292
Business-to-Business (B2B)p. 293
B2B vs. B2C E-businessp. 293
B2B E-business Modelsp. 294
Where is My Web Page?p. 296
Search Engine Optimizationp. 296
Trends in E-businessp. 298
Mobile Businessp. 299
Mobile Behaviorsp. 300
Global e-Businessp. 301
E-business in Ontariop. 301
USA.Govp. 302
E-governmentp. 302
Information and Knowledge for Business Decision Makingp. 309
Focusing Story: Managing Knowledge by Textingp. 310
How You Manage Knowledgep. 311
Knowledge Managementp. 312
Why Managing Knowledge is Importantp. 312
Types of Knowledgep. 313
Types of Knowledge Resourcesp. 314
Main Processes for Knowledge Managementp. 314
Creating Knowledgep. 315
Capturing and Codifying Knowledgep. 316
Business Box The Issue of Trust in Knowledge Managementp. 318
Storing and Retrieving Knowledgep. 318
Transferring and Applying Knowledgep. 319
Wikis for Managing Knowledgep. 319
Knowledge Management Technologiesp. 320
Repositoriesp. 320
Communication-based Toolsp. 320
Stats Box Linkedin Groups as Communities of Practicep. 321
Executive Information Systems and Dashboardsp. 321
Expert Systemsp. 321
Using a Decision Support Systemp. 323
Decision Support Systems and Group Decision Support Systemsp. 323
Business Intelligencep. 326
Data Warehousingp. 327
Data Miningp. 328
Making Ethical Decisionsp. 332
Ethical Decision-Makingp. 332
Indexp. 339
Online In-Depth Guides (posted at the Instructor and Student Companion Sites: www.wiley.com/college/belanger)
Hardware
Software
Networking Basics
Advanced database concepts
Spreadsheets
Funding information systems
Managing projects
Advanced security privacy and risk management
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program