CART

(0) items

Management Information Systems for the Information Age,9780072838466
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Management Information Systems for the Information Age

by ; ;
Edition:
4th
ISBN13:

9780072838466

ISBN10:
0072838469
Format:
Hardcover
Pub. Date:
6/1/2003
Publisher(s):
McGraw-Hill College
List Price: $121.80

Buy New Textbook

Usually Ships in 3-4 Business Days
N9780072838466
$118.76

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $3.94
See Prices

Questions About This Book?

What version or edition is this?
This is the 4th edition with a publication date of 6/1/2003.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.

Related Products


  • Management Information Systems for the Information Age
    Management Information Systems for the Information Age
  • Management Information Systems for the Information Age
    Management Information Systems for the Information Age
  • Management Information Systems for the Information Age
    Management Information Systems for the Information Age
  • Management Information Systems for the Information Age + MIS Info Age Module + MISource V2 CD + PowerWeb
    Management Information Systems for the Information Age + MIS Info Age Module + MISource V2 CD + PowerWeb
  • Management Information Systems for the Information Age w/ ELM CD, MISource 2005, & PowerWeb
    Management Information Systems for the Information Age w/ ELM CD, MISource 2005, & PowerWeb
  • Management Information Systems for the Information Age with CD and MISource
    Management Information Systems for the Information Age with CD and MISource
  • Management Information Systems with student CD and MISource 2007
    Management Information Systems with student CD and MISource 2007
  • MP:  Haag MIS with Simnet MIS (V.2), PowerWeb and CD
    MP: Haag MIS with Simnet MIS (V.2), PowerWeb and CD




Table of Contents

The Information Age in Which You Live: Changing the Face of Business
2(38)
Opening Case Study: Can Technology Catch You Having An Affair?
3(1)
Introduction
4(1)
Today's Economic Environment
5(4)
The Economy
5(1)
The ``Now'' Economy
6(2)
The Global Economy
8(1)
The Arriving Digital Economy
8(1)
Information As A Key Resource
9(4)
Data versus Information
9(1)
Personal Dimensions of Information
9(2)
Organizational Dimensions of Information
11(2)
People As A Key Resource
13(4)
Information and Technology Literacy
14(1)
Your Ethical Responsibilities
15(2)
Information Technology As A Key Resource
17(4)
Key Technology Categories
17(3)
Decentralized Computing and Shared Information
20(1)
Roles and Goals of Information Technology
21(9)
Increase Employee Productivity
21(2)
Enhance Decision Making
23(1)
Improve Team Collaboration
24(1)
Create Business Partnerships and Alliances
25(1)
Enable Global Reach
26(1)
Facilitate Organizational Transformation
27(3)
Closing Case Study One: You and Your Information
30(2)
Closing Case Study Two: How Much of Your Personal Information Do You Want Businesses to Know?
32(5)
Real Hot Electronic Commerce: Using the Internet as a Tool to Find a Job
37(3)
EXTENDED LEARNING MODULE A
40(66)
Computer Hardware and Software
Introduction
41(1)
A Quick Tour of Technology
42(2)
Categories of Computers by Size
44(3)
Personal Digital Assistants (PDAs)
44(1)
Notebook Computers
44(1)
Desktop Computers
44(2)
Minicomputers, Mainframe Computers, and Supercomputers
46(1)
Software: Your Intellectual Interface
47(6)
Application Software
47(3)
System Software
50(3)
Hardware: Your Physical Interface
53(11)
Common Input Devices
54(1)
Common Output Devices
55(2)
Characteristics of CPUs and RAM
57(1)
Common Storage Devices
58(2)
Telecommunications Devices
60(2)
Connecting Devices
62(2)
The Complete Computer At Work
64(6)
Strategic and Competitive Opportunities: Using IT for Competitive Advantage
70(36)
Opening Case Study: Zara: Fashion Fast Forward
71(1)
Introduction
72(1)
Competitive Advantage Examples
73(5)
Federal Express
73(1)
Charles Schwab
74(1)
Dell Computer
74(3)
Cisco Systems
77(1)
Developing a Strategy for the Internet Age
78(9)
The Five Forces Model
78(1)
The Three Generic Strategies
79(1)
Using the Five Forces Model
79(2)
Bridging the Gap between Business People and Technical People
81(1)
Viewing the Business Problem from Another Perspective
82(1)
Using the Three Generic Strategies
82(1)
Demanding a Creative Design
82(2)
The Value Chain
84(2)
Looking Beyond the Four Walls of the Company
86(1)
Key E-Commerce Strategies
87(4)
Mass Customization and Personalization
88(1)
Disintermediation
89(1)
Global Reach
90(1)
The U.S. Airline Industry: A Great Example
91(3)
Airline Reservation Systems
91(1)
Frequent Flyer Programs
91(1)
Yield Management Systems
92(1)
Disintermediating the Travel Agent
92(1)
Utilizing Emerging Technologies
93(1)
Summing It Up
94(3)
Closing Case Study One: GM Tries to Lure Customers with Onstar
97(2)
Closing Case Study Two: Speedpass: Throw Away Your Plastic?
99(5)
Real Hot Electronic Commerce: Ordering Products and Services on the Internet
104(2)
EXTENDED LEARNING MODULE B
106(58)
The World Wide Web and The Internet
Introduction
107(1)
World Wide Web
108(4)
Web Sites, Addresses, and Pages
108(1)
Understanding Addresses
109(1)
Using Web Browser Software
110(2)
Search Engines
112(3)
Using a Directory Search Engine
112(2)
Using a True Search Engine
114(1)
Internet Technologies
115(3)
The Internet Backbone
115(1)
Internet Servers
116(1)
Communications Protocols
117(1)
Connecting to the Internet
118(8)
Communications Software
119(1)
Telecommunications Hardware
120(6)
Databases and Data Warehouses: Building Business Intelligence
126(38)
Opening Case Study: High Tech Battles High School Truancy
127(1)
Introduction
128(1)
Business Intelligence
128(2)
The Relational Database Model
130(4)
Collections of Information
130(1)
Created with Logical Structures
130(2)
With Logical Ties among the Information
132(1)
With Built-in-Integrity Constraints
133(1)
Database Management System Tools
134(10)
Data Definition Subsystem
135(2)
Data Manipulation Subsystem
137(3)
Application Generation Subsystem
140(1)
Data Administration Subsystem
140(4)
Data Warehouses and Data Mining
144(5)
What Is a Data Warehouse?
144(1)
What Are Data Mining Tools?
145(2)
Data Marts: Smaller Data Warehouses
147(1)
Important Considerations in Using a Data Warehouse
148(1)
Managing the Information Resource in an Organization
149(5)
Who Should Oversee the Organization's Information?
149(2)
How Will Changes in Technology Affect Organizing and Managing Information?
151(1)
Is Information Ownership a Consideration?
151(1)
What Are the Ethics Involved in Managing and Organizing Information?
152(2)
Closing Case Study One: We've Got OLTP Covered; Let's Go on to Olap
154(2)
Closing Case Study Two: Mining Dining Data
156(5)
Real Hot Electronic Commerce: Searching Online Databases and Information Repositories
161(3)
EXTENDED LEARNING MODULE C
164(60)
Designing Databases and Entity-Relationship Diagramming
Introduction
165(1)
Designing and Building a Relational Database
165(15)
Defining Entity Classes and Primary Keys
166(2)
Defining Relationships among the Entity Classes
168(6)
Defining Information (Fields) for Each Relation
174(2)
Using a Data Definition Language to Create Your Database
176(4)
Decision Support and Artificial Intelligence: Brainpower for Your Business
180(44)
Opening Case Study: Continental Airlines Flies High with Decision Support
181(1)
Introduction
182(1)
Decisions, Decisions, Decisions
183(2)
How You Make a Decision
183(1)
Types of Decisions You Face
184(1)
Decision Support Systems
185(3)
Components of a Decision Support System
186(2)
Collaboration Systems
188(3)
Enterprisewide Collaboration
189(1)
Supply-Chain Collaboration
189(1)
Web-Based Collaboration
189(2)
Geographic Information Systems
191(2)
Artificial Intelligence
193(1)
Expert Systems
194(6)
Components of an Expert System
196(3)
What Expert Systems Can and Can't Do
199(1)
Neural Networks
200(4)
Types of Neural Networks
202(1)
Inside a Neural Network
202(2)
Genetic Algorithms
204(2)
Intelligent Agents
206(7)
Buyer Agents
207(1)
User Agents
208(1)
Monitoring-and-Surveillance Agents
209(2)
Data-Mining Agents
211(1)
Components of an Intelligent Agent
211(2)
Closing Case Study One: Using Neural Networks to Categorize People
213(2)
Closing Case Study Two: Decision Support and Artificial Intelligence in Health Care
215(5)
Real Hot Electronic Commerce: Finding Investment Opportunities on the Internet
220(4)
EXTENDED LEARNING MODULE D
224(58)
Decision Analysis with Spreadsheet Software
Introduction
225(1)
Lists
226(1)
Basic Autofilter
227(3)
Custom Autofilter
230(2)
Conditional Formatting
232(2)
Pivot Tables
234(5)
Back to Decision Support
239(3)
AutoFilter
239(1)
Conditional Formatting
239(1)
Pivot Table
239(3)
Electronic Commerce: Strategies for the New Economy
242(40)
Opening Case Study: Sodas and Snack Food on the Web
243(1)
Introduction
244(1)
The Growth of E-Commerce
244(2)
Global E-Commerce Growth Projections
245(1)
The Digital Divide
246(1)
The Advantages of Business to Consumer E-Commerce
246(5)
Shopping Can Be Faster and More Convenient
247(2)
Offerings and Prices Can Change Instantaneously
249(1)
Call Centers Can Be Integrated with the Web Site
250(1)
Broadband Telecommunications Will Enhance the Buying Experience
250(1)
Keys to Success in Business to Consumer E-Commerce
251(8)
Commoditylike Items Work Best
251(1)
Digital Products Are the Best of All
252(1)
Attracting and Retaining Customers
253(4)
Remember the Importance of Merchandising
257(1)
You Must Execute Well
258(1)
Watch the Competition
258(1)
Business to Business E-Commerce
259(9)
Value Networks
260(1)
Corporate Purchasing Segments
260(4)
Next-Generation Solutions: XML and Web Services
264(2)
B2B Marketplaces
266(1)
Intranets and Extranets
267(1)
The Role of E-Government
268(1)
E-Commerce Payment Systems
269(4)
Credit Cards and Smart Cards
270(1)
Financial Cybermediaries
271(1)
Electronic Bill Presentment and Payment
271(2)
Closing Case Study One: Ebags: An E-Commerce Success Story
273(1)
Closing Case Study Two: Making Toyota's Vision a Reality
274(5)
Real Hot Electronic Commerce: Getting Your Business on the Internet
279(3)
EXTENDED LEARNING MODULE E
282(46)
Network Basics
Systems Development: Steps, Tools, and Techniques
284(44)
Opening Case Study: Building the Unbelievable---The Hoberman Arch
285(1)
Introduction
286(1)
Seven Phases in the Systems Development Life Cycle
287(7)
Phase 1: Plan
287(2)
Phase 2: Analysis
289(1)
Phase 3: Design
290(1)
Phase 4: Develop
290(1)
Phase 5: Test
291(2)
Phase 6: Implement
293(1)
Phase 7: Maintain
293(1)
Knowledge Workers and Their Roles in the Systems Development Life Cycle
294(4)
Plan
295(1)
Analysis
296(1)
Design
297(1)
Develop
297(1)
Test
297(1)
Implement
297(1)
Maintain
297(1)
IT Specialists and Knowledge Workers Working Together
298(1)
Why Systems Fail
298(3)
Unclear or Missing Requirements
299(1)
Skipping SDLC Phases
299(1)
Failure to Manage Project Scope
300(1)
Failure to Manage Project Plan
300(1)
Changing Technology
301(1)
Selfsourcing
301(4)
The Selfsourcing Process
302(2)
The Advantages of Selfsourcing
304(1)
Potential Pitfalls and Risks of Selfsourcing
304(1)
Outsourcing
305(6)
Developing Strategic Partnerships
305(2)
The Outsourcing Process
307(2)
The Advantages and Disadvantages of Outsourcing
309(2)
Prototyping
311(6)
The Prototyping Process
313(1)
The Advantages of Prototyping
314(1)
The Disadvantages of Prototyping
315(2)
Closing Case Study One: Some Prototypes Hit, Some Miss, and Some We are Just Not Sure About
317(2)
Closing Case Study Two: Al's Barbeque Restaurant
319(5)
Real Hot Electronic Commerce: Finding Freeware and Shareware on the Internet
324(4)
EXTENDED LEARNING MODULE F
328(40)
Building a Web Page with HTML
IT Infrastructures: Business-Driven Technology
330(38)
Opening Case Study: What's the Difference Between Napster and Gnutella?
331(1)
Introduction
332(1)
Organizational Goals and Strategies
333(1)
Increase Employee Productivity
334(6)
Client/Server Network
334(1)
Internet
335(1)
Intranets and Extranets
335(1)
Backup/Recovery
336(1)
Disaster Recovery Plan
337(1)
Factors That Increase Employee Productivity
337(3)
Enhance Decision Making
340(2)
Integration
340(2)
Enterprise Application Integration (EAI)
342(1)
Enterprise Application Integration Middleware
342(1)
Storage Devices
342(1)
Improve Team Collaboration
342(4)
Document Management Systems
343(1)
Enterprise Information Portals
344(1)
Workflow Systems
344(2)
Create Business Partnerships and Alliances
346(3)
Customer Relationship Management Systems
346(1)
Sales Force Automation Systems
346(1)
Electronic Catalog
347(1)
Supply Chain Management System
348(1)
Enable Global Reach
349(3)
Internet Service Provider
350(1)
Application Service Provider
350(1)
Collocation Facilities
351(1)
Server Farm
352(1)
Facilitate Organizational Transformation
352(3)
Enterprise Resource Planning and Enterprise Software
352(3)
Data Warehouse
355(1)
Infrastructure Documentation
355(1)
IT Infrastructures and the Real World
355(3)
Closing Case Study One: University Infrastructures
358(1)
Closing Case Study Two: Document Management Solutions in the Automotive Industry
359(6)
Real Hot Electronic Commerce: Living Life on the Internet
365(3)
EXTENDED LEARNING MODULE G
368(44)
Object-Oriented Technologies
Protecting People and Information: Threats and Safeguards
370(42)
Opening Case Study: Digital Destruction Beyond All Imagination
371(1)
Introduction
372(1)
Ethics
373(5)
Two Factors that Determine How You Decide Ethical Issues
373(1)
Guidelines for Ethical Computer System Use
374(1)
Intellectual Property
375(3)
Privacy
378(12)
Privacy and Other Individuals
378(1)
Privacy and Employees
379(3)
Privacy and Consumers
382(3)
Privacy and Government Agencies
385(2)
Privacy and International Trade
387(2)
Laws on Privacy
389(1)
Information
390(1)
Information as Raw Material
390(1)
Information as Capital
390(1)
Security
391(10)
Security and Employees
391(1)
Security and Collaboration Partners
392(1)
Security and Outside Threats
393(2)
Security Precautions
395(6)
Closing Case Study One: Protecting More Than Health
401(1)
Closing Case Study Two: Is the Safe Harbor Safe for U.S. Businesses?
402(6)
Real Hot Electronic Commerce: Making Travel Arrangements on the Internet
408(4)
EXTENDED LEARNING MODULE H
412(58)
Computer Crime and Forensics
Introduction
413(1)
Computer Crime
414(10)
Outside the Organization
414(6)
Web Defacing
420(1)
The Players
421(2)
Inside the Organization
423(1)
Computer Forensics
424(5)
The Collection Phase
425(2)
The Analysis Phase
427(2)
Recovery and Interpretation
429(9)
Places to Look for Stray Information
430(1)
Ways of Hiding Information
431(2)
A Day in the Life of Computer Forensic Experts
433(5)
Emerging Trends and Technologies: Business, People, and Technology Tomorrow
438(32)
Opening Case Study: Would You Use an Internet-Enabled Toilet?
439(1)
Introduction
440(1)
The Need for Information Filtering
441(2)
Push, Not Pull Technologies
441(1)
Information Supplier Convergence
442(1)
The Movement Toward Intellectual Computing
443(1)
Automatic Speech Understanding
443(1)
People Will Still Make the Decisions
443(1)
The Changing of Physiological Interaction
444(4)
Automatic Speech Recognition
445(1)
Virtual Reality
445(2)
Cave Automatic Virtual Environment
447(1)
Increasing Portability and Mobility
448(3)
Free Internet Phone Calls
448(1)
Micro-Payments and Financial Cybermediaries
449(1)
Wearable Computers
449(1)
Implant Chips
450(1)
The Digital Frontier
451(3)
Three-Dimensional Technology
452(1)
Digital Cash
452(2)
The Rebirth of E-Commerce
454(2)
Broadening of E-Government
454(1)
Explosion of C2C E-Commerce
455(1)
The Most Important Considerations
456(4)
The Necessity of Technology
456(1)
Closing the Great Digital Divide
456(1)
Technology for the Betterment of People and Society
457(1)
Exchanging Privacy for Convenience
457(1)
Ethics, Ethics, Ethics
458(2)
Closing Case Study One: Airtexting: Wave Your Cell Phone Message in the Air
460(1)
Closing Case Study Two: Stadiums of the Future
461(5)
Real Hot Electronic Commerce: Continuing Your Education through the Internet
466(4)
EXTENDED LEARNING MODULE I
470(28)
Building an E-Portfolio
Introduction
471(1)
The Electronic Job Market
471(1)
Preparations Before You Write
471(6)
Start to Network
472(1)
Perform Self-Assessment
473(2)
Research Careers, Industries, and Companies
475(2)
Writing Targeted Resume Content
477(4)
Powerful Objective Statements
478(1)
Important Contact Information
479(1)
Other Valuable Resume Sections
480(1)
Developing E-Portfolio Content
481(4)
Electronic File Formats
481(3)
Gallery
484(1)
Web Design Considerations
485(7)
Basic Web Design Principles
485(3)
Design Your Home Page
488(4)
Preparing Web Content
492(6)
HTML versus Generated Code
492(1)
File Transfer Protocol (FTP)
493(1)
Things to Watch For
494(4)
EXTENDED LEARNING MODULE J
498(20)
Implementing a Database with Microsoft Access
Real Hot Group Projects
500(18)
Case 1: Assessing the Value of Information
500(1)
Case 2: Assessing the Value of Information
501(1)
Case 3: Executive Information System Reporting
502(1)
Case 4: Building Value Chains
503(2)
Case 5: Using Relational Technology to Track Projects
505(1)
Case 6: Building a Decision Support System
506(1)
Case 7: Advertising with Banner Ads
507(1)
Case 8: Outsourcing Information Technology
508(1)
Case 9: Demonstrating How to Build Web Sites
509(1)
Case 10: Making the Case with Presentation Software
510(1)
Case 11: E-Classified@GabbyGazetteer.com
511(1)
Case 12: Should I Buy or Should I Lease?
512(1)
Case 13: Higher Education Planning and Data Processing
513(1)
Case 14: Assessing a Wireless Future
514(1)
Case 15: The Next Generation: Dot-Com ASPs
515(2)
Case 16: Pony Espresso: Analyzing Operating Leverage
517(1)
Glossary 518(13)
Notes 531(6)
Photo Credits 537(2)
Index 539


Please wait while the item is added to your cart...