CART

(0) items

Management Information Systems,9780619213220
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Management Information Systems

by
Edition:
4th
ISBN13:

9780619213220

ISBN10:
0619213221
Media:
Hardcover
Pub. Date:
8/16/2004
Publisher(s):
Cengage Learning
List Price: $159.79
More New and Used
from Private Sellers
Starting at $0.99

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Management Information Systems
    Management Information Systems
  • Management Information Systems
    Management Information Systems
  • Management Information Systems
    Management Information Systems
  • Management Information Systems (with Online Student Content Printed Access Card)
    Management Information Systems (with Online Student Content Printed Access Card)
  • Management Information Systems, Second Edition
    Management Information Systems, Second Edition
  • Management Information Systems, Sixth Edition
    Management Information Systems, Sixth Edition
  • Management Information Systems, Sixth Edition
    Management Information Systems, Sixth Edition




Summary

This text has been revised to provide more current real business examples, expanded coverage of the Internet and data communications, more end-of-chapter activities, and five part case (w/Videos).

Table of Contents

PART ONE THE INFORMATION AGE
1(110)
Case I: Eats2Go
1(5)
Business Information Systems: An Overview
6(32)
Eats2Go: Business Systems and Information
7(1)
Information Systems
8(1)
Data, Information, and Systems
9(5)
Data vs. Information
9(1)
Data Manipulation
9(1)
Generating Information
10(1)
Information in Context
10(1)
What is a System?
11(2)
Information and Managers
13(1)
Why You Should...Be Well Versed in Information Systems
14(4)
The Benefits of Human-Computer Synergy
15(1)
Information Systems in Organizations
15(2)
The Four Stages of Processing
17(1)
Ethical & Societal Issues: The Not-so-bright Side
18(3)
Computer Equipment for Information Systems
20(1)
ISs: From Recording Transactions to Providing Expertise
21(2)
Transaction Processing Systems
21(1)
Management Information Systems
21(2)
Information Systems in Business
23(3)
Information Systems in Functional Business Areas
23(1)
Information Systems in Different Business Sectors
24(2)
Shared Data Resources
26(2)
E-commerce
28(1)
Why Study Information Systems?
29(2)
Degrees in IS
30(1)
Information Systems Careers
30(1)
Summary
31(2)
Eats2Go Revisited
33(1)
Key Terms
34(1)
Review Questions
34(1)
Discussion Ques1tions
34(1)
Applying Concepts
35(1)
Hands-on Activities
35(1)
Team Activities
35(1)
From Ideas to Application: Real Cases
36(2)
Strategic Uses of Information Systems
38(34)
Eats2Go: Using Information Strategically
39(1)
Strategy and Strategic Moves
40(1)
Achieving a Competitive Advantage
41(6)
Initiative #1: Reduce Costs
42(1)
Initiative #2: Raise Barriers to Market Entrants
43(1)
Initiative #3: Establish High Switching Costs
44(1)
Initiative #4: Create New Products or Services
44(2)
Initiative #5: Differentiate Products or Services
46(1)
Initiative #6: Enhance Products or Services
46(1)
Why You Should...Understand the Notion of Strategic Information Systems
47(4)
Initiative #7: Establish Alliances
47(3)
Initiative #8: Lock in Suppliers or Buyers
50(1)
Creating and Maintaining Strategic Information Systems
51(3)
Creating an SIS
51(2)
Reengineering and Organizational Change
53(1)
Competitive Advantage as a Moving Target
54(1)
Jetblue: A Success Story
54(3)
Massive Automation
55(1)
Away from Tradition
56(1)
Enhanced Service
56(1)
Impressive Performance
57(1)
Late Mover Advantage
57(1)
Ford on the Web: A Failure Story
57(2)
The Ideas
57(1)
Hitting the Wall
58(1)
The Retreat
58(1)
Success and Failure on the Web
59(1)
Ethical & Societal Issues: The Power of Information
60(2)
The Bleeding Edge
62(1)
Summary
63(2)
Eats2Go Revisited
65(1)
Key Terms
66(1)
Review Questions
66(1)
Discussion Questions
66(1)
Applying Concepts
67(1)
Hands-on Activities
68(1)
Team Activities
68(1)
From Ideas to Application: Real Cases
69(3)
Information Systems in Business Functions
72(39)
Eats2Go: Continued Growth and Specialization
73(1)
Effectiveness and Efficiency
74(3)
Accounting
77(1)
Why You Should...Know about ISs in Different Business Functions
78(1)
Finance
79(2)
Cash Management
79(1)
Investment Analysis and Service
80(1)
Engineering
81(2)
Manufacturing and Inventory Control
83(3)
Materials Requirement Planning
84(1)
Manufacturing Resource Planning
85(1)
Manufacturing Execution Systems
86(1)
Monitoring and Control
86(1)
Marketing, Sales, and Customer Service
86(4)
Market Research
87(1)
Targeted Marketing
88(1)
The Internet as a Marketing and Selling Medium
89(1)
Ethical & Societal Issues: Consumer Privacy
90(2)
Sales Force Automation
91(1)
Customer Relationship Management
92(1)
Human Resources
92(4)
Employee Record Management
92(1)
Promotion and Recruitment
93(1)
Training
94(1)
Evaluation
95(1)
Compensation and Benefits Management
96(1)
Enterprise Resource Planning
96(2)
Groupware and Collaborative Work
98(3)
Document Control
98(1)
Collaborative Projects
99(1)
Brainstorming
100(1)
Summary
101(2)
Eats2Go Revisited
103(1)
Key Terms
103(1)
Review Questions
104(1)
Discussion Questions
104(1)
Applying Concepts
105(1)
Hands-on Activity
105(1)
Team Activities
105(1)
From Ideas to Application: Real Cases
106(5)
PART TWO INFORMATION TECHNOLOGY
111(246)
Case II: QuickBiz Messengers
111(5)
Information Technology in Business: Hardware
116(50)
QuickBiz Messengers: Hardware Streamlines Processes
117(1)
The Central Tool of Modern Information Systems
118(2)
Hardware Components
119(1)
How Computers Communicate: Bits and Bytes
120(3)
Encoding Schemes
121(1)
Understanding Computer Processing
121(2)
Classification of Computers
123(4)
Supercomputers
123(1)
Mainframe Computers
124(1)
Midrange Computers
124(1)
Microcomputers
124(1)
Computers on the Go: Notebook, Handheld, and Tablet Computers
125(1)
Internet Appliances
126(1)
Business Evolves with Computing
127(2)
From Mainframe to PC: Networking Businesses
127(1)
Trends in Computing
127(2)
A Peek Inside the Computer
129(5)
The Central Processing Unit
130(3)
Memory
133(1)
Why You Should...Understand Some Technical Details
134(2)
Computer Power
135(1)
Input Devices
136(5)
Keyboard
136(1)
Mouse, Trackball, and Trackpad
137(1)
Touch Screen
137(1)
Source Data Input Devices
137(2)
Imaging
139(1)
Speech Recognition
139(2)
Output Devices
141(1)
Soft-Copy Output Devices
141(1)
Ethical & Societal Issues: Computers May Be Hazardous to Your Health
142(3)
Hard-Copy Output Devices
145(1)
External Storage Media
145(8)
Modes of Access
146(1)
Magnetic Tapes
147(1)
Magnetic Disks
147(2)
Optical Discs
149(1)
Optical Tape
150(1)
Flash Memory and Thumb Drives
150(1)
Business Considerations in Evaluating Storage Media
151(2)
Considerations in Purchasing Hardware
153(3)
Updating Hardware
155(1)
Summary
156(2)
QuickBiz Messengers Revisited
158(1)
Key Terms
158(1)
Review Questions
159(1)
Discussion Questions
159(1)
Applying Concepts
160(1)
Hands-on Activities
161(1)
Team Activity
162(1)
From Ideas to Application: Real Cases
163(3)
Information Technology in Business: Software
166(42)
QuickBiz Messengers: Software Steers Path to Stability
167(1)
Software: Instructions to the Computer
168(1)
Programming Languages
169(9)
First Generation: Machine Languages
171(1)
Second Generation: Assembly Languages
171(1)
Third Generation: Procedural Languages
172(1)
Fourth-Generation Languages
172(1)
Visual Programming
173(1)
Object-Oriented Programming
174(2)
Levels of Programming Languages: Pluses and Minuses
176(1)
Language Translation: Compilers and Interpreters
176(2)
Bugs
178(1)
Application Software
178(2)
Custom-Designed Applications
179(1)
Why You Should...Be Software Savvy
180(10)
Packaged Software
181(8)
Multimedia
189(1)
Ethical & Societal Issues: Software Piracy
190(2)
Virtual Reality
191(1)
System Software
192(7)
Operating Systems
192(5)
Data Communications Programs
197(1)
Linux and the Open Source Revolution
197(2)
Considerations in Purchasing Software
199(1)
Summary
200(2)
QuickBiz Messengers Revisited
202(1)
Key Terms
202(1)
Review Questions
203(1)
Discussion Questions
203(1)
Applying Concepts
204(1)
Hands-on Activities
204(1)
Team Activities
204(1)
From Ideas to Application: Real Cases
205(3)
Information Technology in Business: Telecommunications and Networks
208(46)
QuickBiz Messengers: Communication is Key
209(1)
Telecommunications in Business
210(1)
Telecommunications in Daily Use
211(4)
Cellular Phones
212(1)
Videoconferencing
212(1)
Voice Mail
212(1)
Facsimile
213(1)
Information Kiosks
213(1)
Pay at the Pump
213(1)
Easy Passing
213(1)
Web-Based Electronic Commerce
213(1)
Worldwide Peer-to-Peer File Sharing
213(2)
Data Communications
215(2)
Parallel and Serial Data Communications
215(1)
Communication Direction
216(1)
Error Detection
217(1)
Bandwidth and Media
218(5)
Bandwidth
218(1)
Media
219(1)
Twisted Pair
220(1)
Coaxial Cable
221(1)
Microwaves
222(1)
Why You Should...Understand Telecommunications
223(1)
Optical Fiber
223(1)
Modulation
224(2)
Analog vs. Digital
224(1)
Amplitude Modulation
224(1)
Frequency Modulation
225(1)
Phase Modulation
225(1)
Modems
225(1)
Networks
226(5)
LANs
227(1)
WANs
227(1)
Network Topology
228(2)
Networking Hardware
230(1)
Virtual Private Networks
230(1)
Protocols
231(3)
LAN Protocols
232(1)
WAN Protocols
232(2)
Switching Techniques
234(2)
Circuit Switching
235(1)
Packet Switching
235(1)
Ethical & Societal Issues: Telecommuting: Pros and Cons
236(2)
A Variety of Services
238(4)
Cable
238(1)
Digital Subscriber Line (DSL)
238(2)
T1 and T3 Lines
240(1)
Satellite
241(1)
Fixed Wireless
241(1)
Gigabit Ethernet
241(1)
Optical Carrier
241(1)
The Wireless Revolution
242(3)
Popular Wireless Technologies
242(1)
Would You Like Wi-Fi with That?
243(2)
Combining Technologies
245(1)
Summary
245(2)
QuickBiz Messengers Revisited
247(1)
Key Terms
247(1)
Review Questions
248(1)
Discussion Questions
248(1)
Applying Concepts
249(1)
Hands-on Activities
249(1)
Team Activities
250(1)
From Ideas to Application: Real Cases
251(3)
E-Commerce: The Internet, Intranets, and Extranets
254(56)
QuickBiz Messengers: Moving to the Web
255(1)
What is the Internet?
256(4)
The Development of the Internet
257(1)
Growth of the Internet
258(2)
How the Internet Works
260(4)
Domain Names and IP Numbers
262(1)
Static and Dynamic IP Numbers
263(1)
Common Internet Applications
264(5)
E-mail
264(1)
File Transfer
265(1)
Newsgroups and Blogs
265(1)
Instant Messaging
266(2)
Internet Telephoning
268(1)
Why You Should...Know More about the Internet
269(1)
Web Browsers
269(1)
The World Wide Web
270(7)
Web Software
270(7)
Intranets and Extranets
277(2)
Establishing an E-Commerce Web Site
279(5)
Dedicated Server
280(1)
ISP Site
280(1)
Web Portal
280(1)
Electronic Storefront
280(1)
Web Hosting Service
281(1)
Virtual Web Server
281(1)
Subdomain
281(1)
Considerations in Selecting a Web Service Provider
282(1)
More than Meets the Eye
283(1)
E-Commerce Practices on the Internet
284(8)
Business-to-Business Trading
284(3)
Business-to-Consumer Trading
287(5)
Ethical & Societal Issues: Online Annoyances
292(8)
Rules for Successful Online Business Transactions
294(2)
Successful Business Models
296(1)
Rules for Successful Business Web Page Design
297(1)
E-Government
297(2)
M-Commerce
299(1)
Management Challenges and Solutions
300(1)
Reduced Control over Information Resources
300(1)
Reduced Budgetary Control
300(1)
Cost/Benefit Analysis
300(1)
Scalability
301(1)
Security
301(1)
Education
301(1)
E-Commerce is Every Commerce
301(1)
Summary
302(2)
QuickBiz Messengers Revisited
304(1)
Key Terms
304(1)
Review Questions
305(1)
Discussion Questions
305(1)
Applying Concepts
306(1)
Hands-on Activities
307(1)
Team Activities
307(1)
From Ideas to Application: Real Cases
308(2)
Data and Knowledge Management
310(47)
QuickBiz Messengers: The Value and Uses of Databases
311(1)
Managing Digital Data
312(4)
The Traditional File Approach
313(1)
Moving to Databases
314(2)
Why You Should...Know about Data and Knowledge Management
316(2)
Database Models
318(5)
The Hierarchical Model
318(1)
The Network Model
319(1)
The Relational Model
320(1)
The Object-Oriented Model
321(2)
Relational Databases: Design and Keys
323(3)
Data Modeling
323(2)
Keys
325(1)
Components of Database Management Systems
326(5)
The Schema
327(1)
The Data Dictionary
328(1)
The Data Definition Language
329(1)
The Data Manipulation Language
329(2)
Relational Operations
331(1)
Data Manipulation
331(1)
Structured Query Language
331(1)
Database Architecture
332(3)
Distributed Databases
333(1)
Client/Server Systems
334(1)
Web Databases
335(2)
Databases on the Web
335(1)
Points to Consider
336(1)
Data Warehousing
337(1)
Ethical & Societal Issues: Every Move You Make
338(4)
From Database to Data Warehouse
340(1)
Phases in Building a Data Warehouse
341(1)
Who is Using Data Warehouses?
342(1)
Data Mining and Online Analysis
342(3)
Data Mining
342(3)
Online Analytical Processing
345(1)
Knowledge Management
345(2)
Summary
347(2)
QuickBiz Messengers Revisited
349(1)
Key Terms
349(1)
Review Questions
350(1)
Discussion Questions
350(1)
Applying Concepts
351(1)
Hands-on Activities
351(1)
Team Activities
352(1)
From Ideas to Application: Real Cases
353(4)
PART THREE INFORMATION TECHNOLOGY IN MANAGEMENT
357(116)
Case III: Urban Scene
357(5)
Managers and Their Information Needs
362(38)
Urban Scene: Slicing and Dicing the Information
363(1)
Managers and Information
364(1)
The Traditional Organizational Pyramid
365(2)
Clerical and Shop Floor Workers
365(1)
Operational Management
366(1)
Tactical Management
366(1)
Strategic Management
366(1)
Characteristics of Information at Different Managerial Levels
367(3)
Data Scope
368(1)
Time Span
368(1)
Level of Detail
369(1)
Source: Internal vs. External
369(1)
Structured and Unstructured Data
369(1)
The Nature of Managerial Work
370(1)
Planning
370(1)
Why You Should...Be Information Conscious
371(4)
Controlling
373(1)
Decision Making
373(1)
Managing by Exception
374(1)
Leading
374(1)
Trends in Organizational Structure
375(2)
IT Flattens the Organization
375(1)
The Matrix Structure
376(1)
Characteristics of Effective Information
377(5)
Tabular and Graphical Representation
377(2)
Online Analytical Processing
379(2)
Business Intelligence
381(1)
Dynamic Representation
381(1)
Managers and Their Information Systems
382(3)
Transaction Processing Systems
382(1)
Decision Support Systems and Expert Systems
383(1)
Executive Information Systems
383(1)
Customer Relationship Management Systems
384(1)
Information, Politics, and Power
385(1)
Politics
385(1)
Ethical & Societal Issues: Electronic Monitoring of Employees
386(3)
Power
388(1)
The Not-Invented-Here Phenomenon
389(1)
Summary
389(2)
Urban Scene Revisited
391(1)
Key Terms
391(1)
Review Questions
392(1)
Discussion Questions
392(1)
Applying Concepts
393(1)
Hands-on Activities
393(1)
Team Activities
394(1)
From Ideas to Application: Real Cases
395(5)
Organizing Information Technology Resources
400(34)
Urban Scene: Reorganizing Systems and Staff
401(1)
Management of Information Technology Resources
402(1)
Centralized vs. Decentralized Management
403(4)
Organizing the IS Staff
407(3)
Central IS Organization
407(2)
Dispersed IS Organization
409(1)
A Hybrid Approach
410(1)
Challenges for IS Managers and Business Managers
410(1)
Why You Should...Be Interested in the Deployment of ISs
411(2)
Business Managers' Expectations of an IS Unit
411(2)
IS Managers' Expectations of Business Managers
413(1)
Charge-Back Methods
413(3)
Service Charges
414(1)
Overhead Expenditures
415(1)
Careers in Information Systems
416(2)
The Systems Analyst
416(1)
The Database Administrator
417(1)
Ethical & Societal Issues: Gasping for IT Skills
418(8)
The Network Administrator
420(1)
The Webmaster
421(1)
The Chief Information Officer and the Chief Technology Officer
422(2)
The Chief Security Officer
424(1)
The Chief Knowledge Officer
425(1)
The Independent Consultant
425(1)
Summary
426(1)
Urban Scene Revisited
427(1)
Key Terms
427(1)
Review Questions
427(1)
Discussion Questions
428(1)
Applying Concepts
428(1)
Hands-on Activities
429(1)
Team Activities
429(1)
From Ideas to Application: Real Cases
430(4)
Supply Chain Management and Global Information Systems
434(39)
Urban Scene: Creating Virtual Links for Real Business
435(1)
Sharing Information Systems: The Rise of E-Commerce
436(1)
Vertical Information Systems
437(1)
Horizontal Information Systems
438(2)
Why You Should...Learn about Supply Chain Management and Global ISs
440(1)
Electronic Data Interchange
441(5)
Value-Added Network EDI
444(1)
Web EDI
444(2)
Supply Chain Management
446(5)
The Importance of Trust
448(1)
The Musical Chairs of Inventory
449(1)
The Future of SCM: RFID
450(1)
Collaborative Logistics
450(1)
Multinational Organizations
451(1)
Using the Web for International Commerce
452(1)
Challenges to Global Information Systems
453(7)
Technological Challenges
453(1)
Regulations and Tariffs
454(1)
Differences in Payment Mechanisms
455(1)
Language Differences
455(1)
Cultural Differences
456(1)
Conflicting Economic, Scientific, and Security Interests
456(1)
Political Challenges
457(1)
Different Standards
457(1)
Legal Barriers
458(2)
Ethical & Societal Issues: Legal Jurisdictions in Cyberspace
460(2)
Summary
462(2)
Urban Scene Revisited
464(1)
Key Terms
464(1)
Review Questions
464(1)
Discussion Questions
465(1)
Applying Concepts
466(1)
Hands-on Activities
466(1)
Team Activities
467(1)
From Ideas to Application: Real Cases
468(5)
PART FOUR INFORMATION SYSTEMS IN DECISION MAKING
473(72)
Case IV: DeBoer Farms
473(5)
Decision Support Systems
478(34)
DeBoer Farms: Decisions, Decisions
479(1)
Decision Support Aids
480(1)
The Decision-Making Process
480(1)
Structured and Unstructured Problems
481(4)
Structured Problems
482(1)
Unstructured Problems
483(1)
Semistructured Problems
483(1)
Managers and Semistructured Problems
484(1)
Decision Support System Components
485(2)
The Data Management Module
485(2)
Why You Should...Be Familiar with Decision Support Systems
487(4)
The Model Management Module
488(2)
The Dialog Module
490(1)
Types of Decision Support Systems
491(4)
Personal Decision Support Systems
492(1)
Group Decision Support Systems
493(2)
Sensitivity Analysis
495(1)
Executive Information Systems
496(1)
Developing Decision Support Systems
497(1)
When Should a DSS Be Built?
497(1)
Ethical & Societal Issues: Decisions by Machines
498(2)
The Electronic Spreadsheet: A DSS Tool
500(1)
Geographic Information Systems
501(2)
Summary
503(2)
DeBoer Farms Revisited
505(1)
Key Terms
505(1)
Review Questions
506(1)
Discussion Questions
506(1)
Applying Concepts
507(1)
Hands-on Activities
507(1)
Team Activities
508(1)
From Ideas to Application: Real Cases
509(3)
Artificial Intelligence and Expert Systems
512(33)
DeBoer Farms: Harvesting Technology's Benefits
513(1)
Artificial Intelligence in Business
514(8)
Robotics
515(1)
Artificial Vision
516(1)
Natural Language Processing
516(1)
Expert Systems
517(1)
Neural Networks
518(2)
Fuzzy Logic
520(2)
Genetic Algorithms
522(1)
Why You Should...Recognize the Potential of Artificial Intelligence
522(3)
Intelligent Agents
524(1)
Contribution of Expert Systems
525(1)
Development of Expert Systems
526(2)
What is Expertise?
526(1)
Components of Expert Systems
527(1)
Construction of Expert Systems
528(4)
IF-THEN Rules
528(1)
Knowledge Engineering
529(1)
Expert System Shells
529(1)
Forward Chaining and Backward Chaining
530(1)
Factors Justifying the Acquisition of Expert Systems
531(1)
Expert Systems in Action
532(4)
Medical Management
532(1)
Telephone Network Maintenance
532(1)
Credit Evaluation
532(1)
Detection of Insider Securities Trading
533(1)
Detection of Common Metals
533(1)
Mineral Exploration
533(1)
Irrigation and Pest Management
534(1)
Medical Diagnosis
534(1)
Diagnosis and Prediction of Mechanical Failure
535(1)
Ethical & Societal Issues: Too Sophisticated Technology
536(1)
Class Selection for Students
537(1)
Limitations of Expert Systems
537(1)
Summary
537(2)
DeBoer Farms Revisited
539(1)
Key Terms
539(1)
Review Questions
539(1)
Discussion Questions
540(1)
Applying Concepts
541(1)
Hands-on Activities
541(1)
Team Activities
541(1)
From Ideas to Application: Real Cases
542(3)
PART FIVE PLANNING, ACQUISITION, AND CONTROLS
545(158)
Case V: Worldwide Host
545(5)
Planning Information Systems
550(28)
Worldwide Host: A Vision for the Future
551(1)
Why Plan?
552(2)
What is Planning?
552(1)
Business Planning
553(1)
Approaches to Planning
554(2)
Top-Down Planning
554(1)
Bottom-Up Planning
555(1)
Planning by Critical Success Factors
555(1)
Information Systems Planning
556(5)
Prerequisites for Information Systems Planning
559(1)
The Corporate and IS Mission Statements
560(1)
The IT Vision
560(1)
Strategic and Tactical Information Systems Planning
561(1)
Why You Should...Be Involved in IS Planning
561(4)
Important Factors in IS Tactical Planning
563(2)
IS Planning Initiatives
565(1)
Dealing with Legacy Systems
566(1)
The Champion
567(1)
Ethical & Societal Issues: Codes of Ethics for IT Professionals
568(1)
The Systems Analyst as an Agent of Change
569(2)
Summary
571(1)
Worldwide Host Revisited
572(1)
Key Terms
572(1)
Review Questions
572(1)
Discussion Questions
573(1)
Applying Concepts
574(1)
Hands-on Activities
574(1)
Team Activities
575(1)
From Ideas to Application: Real Cases
576(2)
Systems Development
578(42)
Worldwide Host: A Bumpy Road to the World Wide Web
579(1)
Why Develop an IS?
580(1)
The Systems Development Life Cycle
581(6)
Analysis
582(5)
Why You Should...Understand the Principles of Systems Development
587(7)
Design
587(7)
Ethical & Societal Issues: Should IS Professionals Be Certified?
594(5)
Implementation
595(3)
Support
598(1)
Prototyping
599(2)
When to Prototype
600(1)
When Not to Prototype
601(1)
Agile Methods
601(1)
Project Management
602(5)
Project Management Goals
604(1)
Project Management Functions and Tools
605(2)
The Project Management Office
607(1)
Systems Development Led By End Users
607(2)
JAD: An Example of User-Led Systems Development
608(1)
Systems Integration
609(2)
Summary
611(1)
Worldwide Host Revisited
612(1)
Key Terms
612(1)
Review Questions
613(1)
Discussion Questions
613(1)
Applying Concepts
614(1)
Hands-on Activities
614(1)
Team Activities
615(1)
From Ideas to Application: Real Cases
616(4)
Alternative Avenues for Systems Acquisition
620(34)
Worldwide Host: Tapping Others' Expertise
621(1)
Sources of Information
622(1)
Outsourcing
623(6)
Advantages of Outsourcing
626(1)
Risks of Outsourcing
627(2)
Purchased Applications
629(1)
Why You Should...Understand Alternative Avenues for the Acquisition of Information Systems
629(7)
The Benefits of Purchasing Software
630(1)
Steps in Purchasing Ready-Made Software
631(3)
Benchmarking
634(1)
Learning from Experience
635(1)
Purchasing Risks
635(1)
Ethical & Societal Issues: Computer Use Policies for Employees
636(1)
Application Service Providers
637(4)
The ASP Industry
639(1)
Caveat Emptor
639(2)
User Application Development
641(4)
Factors Encouraging User Application Development
641(3)
Managing User-Developed Applications
644(1)
Advantages and Risks
644(1)
Summary
645(2)
Worldwide Host Revisited
647(1)
Review Questions
647(1)
Discussion Questions
648(1)
Applying Concepts
649(1)
Hands-on Activities
649(1)
Team Activities
649(1)
From Ideas to Application: Real Cases
650(4)
Risks, Security, and Disaster Recovery
654(49)
Worldwide Host: Battling Back from Attacks
655(1)
Goals of Information Security
656(1)
Risks to Information Systems
657(5)
Risks to Hardware
657(2)
Risks to Applications and Data
659(3)
Why You Should...Understand Risks, Controls, and Disaster Recovery Planning
662(4)
Risks to Online Operations
666(3)
Denial of Service
667(1)
Hijacking
667(1)
Spoofing
668(1)
Controls
669(7)
Program Robustness and Data Entry Controls
670(1)
Backup
671(1)
Access Controls
672(2)
Atomic Transactions
674(1)
Audit Trail
675(1)
Security Measures
676(4)
Firewalls
676(2)
Encryption
678(2)
Ethical & Societal Issues: Terrorism, Carnivores, and Echelons
680(8)
Digital Signatures and Digital Certificates
684(4)
The Downside of Security Measures
688(1)
Recovery Measures
688(4)
The Business Recovery Plan
689(2)
Recovery Planning Providers
691(1)
The IS Security Budget
692
How Much Security is Enough Security?
693(1)
Calculating Downtime
694
Summary
659(38)
Worldwide Host Revisited
697(1)
Key Terms
697(1)
Review Questions
698(1)
Discussion Questions
698(1)
Applying Concepts
699(1)
Hands-on Activities
700(1)
Team Activities
700(1)
From Ideas to Application: Real Cases
701(2)
Measurement Units 703(1)
Glossary 704(20)
Subject Index 724(28)
Name & Company Index 752(4)
MIS Companion CD Information 756


Please wait while the item is added to your cart...