CART

(0) items

Management Information Systems, Second Edition,9780760010914
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Management Information Systems, Second Edition

by
Edition:
2nd
ISBN13:

9780760010914

ISBN10:
0760010919
Format:
Hardcover
Pub. Date:
12/1/1999
Publisher(s):
Course Technology
List Price: $72.95

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
N9780760010914
$71.13

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $0.99
See Prices

Questions About This Book?

What version or edition is this?
This is the 2nd edition with a publication date of 12/1/1999.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.

Related Products


  • Management Information Systems
    Management Information Systems
  • Management Information Systems
    Management Information Systems
  • Management Information Systems
    Management Information Systems
  • Management Information Systems
    Management Information Systems
  • Management Information Systems (with Online Student Content Printed Access Card)
    Management Information Systems (with Online Student Content Printed Access Card)
  • Management Information Systems, Sixth Edition
    Management Information Systems, Sixth Edition
  • Management Information Systems, Sixth Edition
    Management Information Systems, Sixth Edition




Summary

This title provides current real business examples, expanded coverage of the Internet and business data communications, and a wider range of end-of-chapter activities that encourage users to use the tools they will encounter and the skills they will need in business every day.

Table of Contents

PART I THE INFORMATION AGE 1(108)
The Bike Guys
1(5)
Business Information Systems: An Overview
6(34)
The Bike Guys: In Search of Business Information
6(2)
Creating Useful Information
6(1)
Getting a Handle on Data
7(1)
Information Dictates Pricing and Training
7(1)
Guaranteeing Their Work
7(1)
A Sound Information System
7(1)
Information Systems
8(1)
Data, Information, and Systems
8(6)
Data vs. Information
8(1)
Data Manipulation
8(1)
Generating Information
9(1)
Information in Context
10(1)
What is a System
10(2)
Information and Managers
12(2)
Why You Should...Be Well-versed in Information Systems
14(4)
The Benefits of Human-Computer Synergy
14(1)
What Are Information Systems?
15(1)
The Four Stages of Processing
16(2)
Ethical and Societal Issues: The Not-so-Bright Side
18(2)
Computer Equipment for Information Systems
20(1)
ISs From Recording Transactions to Providing Expertise
20(3)
Transaction Processing Systems
21(1)
Management Information Systems
21(2)
Information Systems in Business
23(4)
Information Systems in Functional Business Areas
23(1)
Information Systems in Different Business Sectors
24(3)
Shared Data Resources
27(1)
E-Commerce
28(1)
Why Study Information Systems?
29(3)
Degrees in IS
30(1)
Information Systems Careers
31(1)
Summary
32(2)
Case Revisited: The Bike Guys
34(1)
Review Questions
35(2)
From Ideas to Application: Real Cases
37(3)
Strategic Uses of Information Systems
40(34)
The Bike Guys: New Initiatives
40(2)
Testing Information Strategies
40(1)
Saved by Information
41(1)
Information Becomes Strategic
41(1)
Strategic Success
41(1)
Following the Moving Target
41(1)
Strategy and Strategic Moves
42(1)
Achieving a Competitive Advantage
43(7)
Reduce Costs
44(1)
Raise Barriers to Entrants
44(1)
Establish High Switching Costs
45(1)
Create New Products and Services
45(2)
Differentiate Products and Services
47(1)
Enhance Products or Services
47(1)
Establish Alliances
48(1)
Lock In Suppliers or Buyers
49(1)
Strategic Information as a Competitive Weapon
50(6)
Creating an SIS
50(1)
Re-engineering and Organizational Change
51(1)
Competitive Advantage as a Moving Target
52(1)
Sources of Strategic Information Systems
53(3)
Why You Should...Understand the Notion of Strategic Information Systems
56(3)
Improving Existing Services
58(1)
Business Process Redesign
58(1)
Providing New Services
59(1)
MortgagePower Plus: An SIS Failure
59(1)
Identifying the Competitive Advantage
59(1)
Ethical and Societal Issues: The Power of Information
60(3)
The SIS Plan
62(1)
How the SIS Failed
63(1)
Losing Ground
63(1)
Success and Failure on the Web
63(1)
The Bleeding Edge
64(2)
Summary
66(1)
Case Revisited: The Bike Guys
67(1)
Review Questions
68(2)
From Ideas to Application: Real Cases
70(4)
Information Systems in Business Functions
74(35)
The Bike Guys: Beyond Entrepreneurship
74(2)
Expanding Operations
75(1)
Managing Remotely
75(1)
Effectiveness and Efficiency
76(2)
Accounting
78(1)
Finance
79(2)
Cash Management
80(1)
Investment Analysis and Service
80(1)
Why You Should...Know About ISs in Different Business Functions
81(1)
Engineering
82(2)
Manufacturing and Inventory Control
84(2)
Materials Requirement Planning
85(1)
Manufacturing Resource Planning
85(1)
Ethical and Societal Issues: Privacy? What Privacy?
86(3)
Manufacturing Execution Systems
88(1)
Marketing, Sales, and Customer Service
89(4)
Market Research
89(1)
Targeted Marketing
89(2)
The Computer as a Marketing and Selling Medium
91(1)
Sales Force Automation
92(1)
Customer Service
93(1)
Human Resources
93(3)
Employee Record Management
93(1)
Promotion and Recruitment
94(1)
Training
95(1)
Evaluation
95(1)
Compensation and Benefits Management
96(1)
Enterprise Resource Planning
96(1)
Groupware and Collaborative Work
97(3)
Document Control
97(1)
Collaborative Projects
98(1)
Brainstorming
99(1)
Summary
100(1)
Case Revisited: The Bike Guys
101(1)
Review Questions
102(2)
From Ideas to Application: Real Cases
104(5)
PART II INFORMATION TECHNOLOGY 109(224)
Play-it-Again Arcade Games, Inc.
109(5)
Information Technology in Business Hardware
114(44)
Play-it-Again Arcade Games, Inc.: Hardware to the Rescue
114(2)
Changing Gears
115(1)
Working with the Consultant
115(1)
The Central Tool of Modern Information Systems
116(4)
What Is a Computer?
116(1)
Business Evolves with Computing
117(3)
Computers Communicating: Bits and Bytes
120(2)
Encoding Schemes
120(1)
Understanding Computer Processing
120(2)
A Peek Inside the Computer
122(5)
The Central Processing Unit
123(3)
Memory
126(1)
Why You Should...Understand Some Technical Details
127(1)
Ethical and Societal Issues: Computers May Be Hazardous to Your Health
128(2)
Computer Power
130(1)
Input Devices
130(5)
Keyboard
130(1)
Mouse, Trackball, and Track Pad
131(1)
Touch Screen
131(1)
Source Data Input Devices
132(1)
Imaging
133(1)
Speech Recognition
134(1)
Output Devices
135(3)
Soft-copy Output Devices
135(2)
Hard-copy Output Devices
137(1)
External Storage Media
138(6)
Magnetic Tapes
139(1)
Magnetic Disks
139(1)
Optical Discs
140(1)
Optical Tape
141(1)
Business Considerations of Storage Media
142(2)
Classification of Computers
144(4)
Supercomputers and Mainframes
144(1)
Mainframe Computers
144(1)
Minicomputers
145(1)
The Microcomputer Revolution
145(1)
Computers on the Go: Laptop and Handheld Computers
146(2)
Reduced Instruction Set Computing
148(1)
Compatibility
148(1)
Considerations in Purchasing Hardware
148(3)
Summary
151(1)
Case Revisited: Play-it Again Games, Inc.
152(1)
Review Questions
153(2)
From Ideas to Application: Real Cases
155(3)
Information Systems in Business: Software
158(42)
Play-it-Again Takes Control of Its Finances
158(1)
Ground Zero
159(1)
Laying a Foundation
159(1)
Software: Instructions to the Computer
160(1)
What is Software?
160(1)
Levels of Programming Language
161(8)
Machine Languages
161(1)
Assembly Languages
162(1)
Procedural Languages
163(1)
Fourth-generation Languages
164(1)
Visual Programming
165(1)
Object-oriented Programming
165(4)
Levels of Programming Languages: Pluses and Minuses
169(1)
Application Software vs. System Software
169(1)
Application Software
169(10)
Custom-designed Applications
170(1)
Packaged Software
171(6)
Multimedia
177(2)
Virtual Reality
179(1)
System Software
179(5)
Operating Systems
179(5)
Ethical and Societal Issues: Software Piracy?
184(3)
Compilers and Interpreters
185(2)
Why You Should...Be Software Savvy
187(2)
Data Communications Programs
188(1)
Proprietary vs. Open Source
188(1)
From Computers to Appliances
189(1)
Considerations in Purchasing Software
189(2)
The Year 2000 Problem
191(1)
Summary
192(1)
Case Revisited: Play-it Again
193(1)
Review Questions
194(2)
From Ideas to Application: Real Cases
196(4)
Information Technology in Business: Telecommunications and Networks
200(40)
Play-it-Again Arcade Games Inc.: Gets Connected
200(2)
Getting Connected
200(1)
Long-term Benefits
201(1)
Telecommunications in Business
202(1)
Data Communications
203(1)
What is Data Communications?
204(1)
Communication Direction
204(2)
Simplex
205(1)
Half-duplex
205(1)
Full-duplex
205(1)
Synchronization
206(2)
Asynchronous Communication
206(1)
Synchronous Communication
207(1)
Channels and Media
208(5)
Channel Capacity
208(1)
Media
209(1)
Transmission Speeds
209(1)
Twisted Pair
210(1)
Coaxial Cable
210(1)
Microwaves
211(1)
Optical Fiber
212(1)
Modulation
213(1)
Analog vs. Digital
213(1)
Why You Should...Understand Data Communications
214(4)
Amplitude Modulation
214(1)
Frequency Modulation
215(1)
Phase Modulation
215(1)
Modems
215(1)
Multiplexers
216(2)
Networks
218(4)
LANs
218(1)
WANs
218(2)
Network Topology
220(2)
Virtual Private Network
222(1)
Ethical and Societal Issues: Telecommuting: Pros and Cons
222(2)
Protocols
224(4)
LAN Protocols
225(1)
WAN Protocols
226(2)
Switching Techniques and Transfer Modes
228(1)
Circuit Switching
228(1)
Packet Switching
228(1)
A Variety of Services
229(2)
The Changing Business Environment
231(1)
Cellular Phones
231(1)
Teleconferencing
231(1)
Voice Mail
232(1)
Facsimile
232(1)
Summary
232(2)
Case Revisited: Play-it Again
234(1)
Review Questions
235(2)
From Ideas to Application: Real Cases
237(3)
The Internet, Intranets, and Extranets
240(48)
Play-it-Again Arcade Games, Inc.: Play-it-Again-Net
240(1)
Smith Buys In
241(1)
What is the Internet?
242(4)
The Development of the Internet
243(1)
Growth of the Internet
243(3)
Commercial Online Services
246(1)
Internet Domains
246(6)
What's on the Internet?
249(3)
The World Wide Web
252(3)
Browsers
253(1)
Creating Web Files
253(2)
Why You Should...Learn About the Internet
255(4)
Intranets and Extranets
259(2)
Establishing a Web Site
261(1)
Site Name
261(1)
Points of Presence
261(1)
Line Capacity
261(1)
Site Maintenance
262(1)
Business on the Internet
262(2)
Business-to-Business Trading
262(1)
Electronic Data Interchange
263(1)
Exchanges and Auctions
263(1)
Ethical and Societal Issues: Online Controversy
264(9)
Business-to-Consumer Trading
266(6)
Web Demographics
272(1)
Business Considerations
273(5)
Web Costs
273(1)
Rules for Successful Web Sites
274(3)
Risks to Organizations
277(1)
Risks to Consumers
278(1)
The Nations: Who Is on the Net?
278(2)
Summary
280(1)
Case Revisited: Play-it Again
281(1)
Review Questions
282(2)
From Ideas to Application: Real Cases
284(4)
Data and Knowledge Management
288(45)
Play-it-Again Arcade Games Inc.: Pulling It All Together
288(2)
A Database Blueprint
288(1)
Marketing Wants More
289(1)
The Final Stretch
289(1)
Managing Digital Data
290(6)
The Traditional File Approach
290(2)
Moving to Databases
292(3)
Traditional Files vs. Databases: Pros and Cons
295(1)
Database Models
296(6)
The Hierarchical Model
296(2)
The Network Model
298(2)
The Relational Model
300(1)
Keys
301(1)
Why You Should...Know About Data and Knowledge Management
302(2)
The Object-oriented Structure
303(1)
Entity-relationship Diagrams
303(1)
Ethical and Societal Issues: A Too-Risky Info Highway
304(2)
Components of Database Management Systems
306(4)
The Schema
306(2)
The Data Dictionary
308(1)
The Data Definition Language
308(1)
The Data Manipulation Language
309(1)
Relational Operations
310(2)
Data Manipulation
310(2)
Structured Query Language
312(1)
Popular Database Management Systems
312(1)
Database Architecture
313(4)
Distributed Databases
314(1)
Shared Resource and Client/Server Systems
315(2)
Web Databases
317(2)
Databases on the Web
317(1)
Points to Consider
318(1)
Data Warehousing
319(2)
From Database to Data Warehouse
320(1)
Phases in Building a Data Warehouse
321(1)
Data-mining
321(2)
Knowledge Management
323(1)
Summary
324(2)
Case Revisited: Play-it Again
326(1)
Review Questions
327(2)
From Ideas to Application: Real Cases
329(4)
PART III INFORMATION TECHNOLOGY IN MANAGEMENT 333(110)
Secor Enterprises
333(5)
Managers and Their Information Needs
338(34)
Secor Books: Secor and Fixit Get Together
338(2)
Fixit's Information Problem
339(1)
Corporate Reorganization
339(1)
The Information Challenge
339(1)
Managers and Information
340(1)
The Organizational Pyramid
340(2)
Clerical and Shop Floor Workers
341(1)
Operational Management
341(1)
Tactical Management
342(1)
Strategic Management
342(1)
Characteristics of Information at Different Managerial Levels
342(2)
Ethical and Societal Issues: Electronic Monitoring of Employees
344(4)
Data Range
346(1)
Time Span
346(1)
Level of Detail
347(1)
Source: Internal vs. External
347(1)
Structured and Unstructured Data
347(1)
The Web: The Great Equalizer
348(1)
The Nature of Managerial Work
349(4)
Planning
349(2)
Control
351(1)
Decision Making
352(1)
Management by Exception
352(1)
Leadership
353(1)
Organizational Structure
353(3)
IT Flattens the Organization
354(1)
The Matrix Structure
355(1)
Why You Should...Be Information-conscious
356(1)
Characteristics of Effective Information
357(2)
Tabular and Graphical Representation
357(1)
Dynamic Representation
358(1)
Managers and Their Information Systems
359(2)
Transaction-processing Systems
359(1)
Decision Support Systems and Expert Systems
360(1)
Executive Information Systems
361(1)
Information, Politics, and Power
361(3)
Politics
361(1)
Power
362(1)
The Not-invented-here Phenomenon
363(1)
Summary
364(1)
Case Revisited: Secor Books
365(1)
Review Questions
366(3)
From Ideas to Application: Real Cases
369(3)
Organizing Information Systems and Services
372(36)
Secor Books: Secor's Expanding Operation
372(2)
Different Information Styles
372(1)
Making a Choice
373(1)
Paying for IS Services
373(1)
Getting the New System Working
373(1)
Information Systems Architecture and Management
374(8)
Centralized Information Systems Architecture
375(1)
Decentralized Information Systems Architecture
376(1)
Distributed Information Systems
377(1)
Centralized vs. Decentralized ISs: Advantages and Disadvantages
378(3)
Trends in Information Systems Organization
381(1)
Organizing the IS Staff
382(3)
Central IS Organization
382(2)
Functional IS Organization
384(1)
The Best of Both Approaches
385(1)
Challenges for IS Managers and Line Managers
385(1)
Line Managers' Expectations of an IS Unit
385(1)
Why You Should...Be Interested in the Deployment of ISs
386(2)
IS Manager Expectations of Line Managers
387(1)
The Information Center
388(1)
Coordination and Control
388(1)
Support
388(1)
Chargeback Methods
389(1)
Service Charges
389(1)
Ethical and Societal Issues: Gasping for IT Skills
390(3)
Overhead Expenditures
393(1)
Careers in Information Systems
393(5)
The Systems Analyst
393(1)
The Database Administrator
394(1)
The Telecommunications Manager
395(1)
The Webmaster
396(1)
The Chief Information Officer
396(1)
The Chief Knowledge Officer
397(1)
The Independent Consultant
398(1)
Summary
398(3002)
Case Revisited: Secor Books
3400
Review Questions
401(2)
From Ideas to Application: Real Cases
403(5)
Interorganizational and International Information Systems
408(35)
Seor Press: On-Line for Business
408(2)
Electronic Streamlining
408(1)
The Next Step
409(1)
McCourt's Challenges
409(1)
EDI on the Web
409(1)
Sharing Information Systems
410(1)
Vertical Information Interchange
410(2)
Electronic Data Interchange
412(8)
What Is EDI?
413(1)
How Does EDI Work?
414(2)
EDI Standards
416(1)
How to Subscribe to EDI
416(1)
EDI on the Web
416(2)
Legal Problems of EDI
418(2)
Horizontal Information Interchange
420(2)
Why You Should...Learn about Inter-organizational and International ISs
422(1)
International and Multinational Organizations
422(2)
Using the Web for International Commerce
424(1)
Challenges to Global Information Systems
425(3)
Technological Challenges
425(1)
Payment Mechanisms
425(1)
Language Differences
426(1)
Cultural Differences
426(1)
Economic, Scientific, and Security Interests
427(1)
Ethical and Societal Issues: The Electronic Immigrant
428(5)
Political Challenges
428(1)
Standards
429(1)
Legal Barriers to International Data Transfer
430(3)
The Latecomer Benefit
433(1)
Summary
434(1)
Case Revisited: Secor Enterprises
435(1)
Review Questions
436(2)
From Ideas to Application: Real Cases
438(5)
PART IV INFORMATION SYSTEMS IN DECISION MAKING 443(70)
Ross Venture Capital Fund
443(5)
Decision Support, Executive, and Geographic Information Systems
448(32)
Ross Venture Capital Fund: Deciding on Decision Aids
448(2)
A Change of Mind
448(1)
Johnson's Analysis
449(1)
Getting Started
449(1)
Decision Making in Business
450(1)
The Decision-Making Process
450(1)
Structured and Unstructured Problems
451(3)
Structured Problems
452(1)
Unstructured Problems
452(1)
Semistructured Problems
452(1)
Programmable Problems
453(1)
Managers and Semistructured Problems
453(1)
DSS Components
454(4)
The Data Management Module
455(1)
The Model Management Module
456(2)
Ethical and Societal Issues: Decisions by Machines
458(3)
The Dialog Module
459(2)
Types of Decision Support Systems
461(5)
Personal Decision Support Systems
462(2)
Group Decision Support Systems
464(2)
Sensitivity Analysis
466(1)
Executive Information Systems
467(1)
Developing Decision Support Systems
468(2)
When Should a DSS Be Built
468(2)
Why You Should...Be Familiar with Decision Support Systems
470(1)
The Electronic Spreadsheet: A DSS Tool
470(1)
Geographic Information Systems
471(2)
Summary
473(1)
Case Revisited: Ross Venture Capital Fund
474(1)
Review Questions
475(2)
From Ideas to Application: Real Cases
477(3)
Artificial Intelligence and Expert Systems
480(33)
Ross Venture Capital Fund (RVCF): Meet The Ross
480(2)
Intellicision Gets Started
481(1)
Learning More
481(1)
Intellicision Delivers
481(1)
Artificial Intelligence in Business
482(8)
Robotics
483(1)
Artificial Vision
484(1)
Natural Language Processing
484(1)
Expert Systems
485(1)
Neural Networks
486(1)
Fuzzy Logic
487(3)
Ethical and Societal Issues: Too Sophisticated Technology
490(3)
Genetic Algorithms
490(2)
Intelligent Agents
492(1)
Contribution of Expert Systems
493(1)
Development of Expert Systems
494(2)
What is Expertise?
495(1)
Components of Expert Systems
495(1)
Knowledge Representation Methods
496(5)
IF-THEN Rules
496(1)
Frames
497(1)
Semantic Nets
498(1)
Knowledge Engineering
498(1)
Expert System Shells
499(1)
Forward Chaining and Backward Chaining
500(1)
Why You Should...Recognize the Potential of Artificial Intelligence
501(1)
Factors Justifying the Acquisition of Expert Systems
502(1)
Expert Systems in Action
502(3)
Telephone Network Maintenance
502(1)
Credit Evaluation
502(1)
Tax Planning
503(1)
Detection of Insider Securities Trading
503(1)
Mineral Exploration
503(1)
Irrigation and Pest Management
504(1)
Predicting Failure of Diesel Engines
504(1)
Medical Diagnosis
504(1)
Class Selection for Students
505(1)
Limitations of Expert Systems
505(1)
Summary
506(2)
Case Revisited: Ross Venture Capital Fund
508(1)
Review Questions
509(2)
From Ideas to Application: Real Cases
511(2)
PART V PLANNING, ACQUISITION, AND CONTROLS 513(164)
Metropolitan Hospital
513(5)
Planning Information Systems
518(28)
Metropolitan Hospital: Plans for TIMM's Arrival
518(2)
System Devevelopment Begins
518(1)
A Proposal is Born
519(1)
Why Plan?
520(1)
What Is Planning?
520(1)
Business Planning
520(1)
Approaches to Planning
521(3)
Top-down Planning
522(1)
Bottom-up Planning
522(1)
Planning by Critical Success Factors
523(1)
Information Systems Planning
524(6)
Prerequisites for Information Systems Planning
526(1)
The Corporate and IS Mission Statements
527(1)
The IT Vision
528(1)
Strategic and Tactical Information Systems Planning
528(2)
Ethical and Societal Issues: Codes of Ethics for IS Professionals
530(3)
Important Factors in IS Tactical Planning
530(3)
IS Planning Initiatives
533(1)
The Champion
534(2)
Why You Should...Be Involved in IS Planning
536(1)
The Systems Analyst as an Agent of Change
536(2)
Summary
538(1)
Case Revisited: Metropolitan Hospital
539(1)
Review Questions
540(2)
From Ideas to Application: Real Cases
542(4)
Systems Development
546(40)
Metropolitan Hospital: Developing TIMM
546(2)
From Planning to Development
546(1)
The Board Meeting
547(1)
Why Develop an IS?
548(1)
The Systems Development Life Cycle
548(12)
Analysis
549(5)
Design
554(6)
Ethical and Societal Issues: Should IS Professionals be Certified
560(5)
Implementation
562(3)
Why You Should...Understand the Principals of Systems Development
565(1)
Support
565(1)
Prototyping
566(3)
When to Prototype
567(1)
When Not to Prototype
568(1)
Computer-Aided Software Engineering
569(1)
Project Management
570(5)
Project Management Goals
572(1)
Project Management Functions
573(2)
Systems Development Led by End Users
575(2)
JAD: An Example of User-led Systems Development
575(2)
Systems Integration
577(1)
Summary
578(1)
Case Revisited: Metropolitan Hospital
579(1)
Review Questions
580(2)
From Ideas to Application: Real Cases
582(4)
Alternative Avenues for Systems Acquisition
586(32)
Metropolitan Hospital: Looking Outside for Help
586(2)
Regrouping
586(1)
Akers Backs the New Plan
587(1)
Revisiting the Board
587(1)
Finding the Right Software
587(1)
Sources of Information
588(1)
Outsourcing
589(4)
Advantages of Outsourcing
591(1)
Risks of Outsourcing
592(1)
The Information Systems Subsidiary
593(1)
Purchased Applications
594(6)
Why Purchase?
594(1)
Steps in Purchasing Ready-made Software
595(3)
Benchmarking
598(1)
Learning from Experience
599(1)
Ethical and Societal Issues: Computer Use Policies for Employees
600(2)
Purchasing Risks
600(2)
Renting Software
602(3)
On-site Renting
602(1)
Renting Through the Web
602(3)
User Application Development
605(3)
Factors Encouraging User Application Development
605(2)
Managing User-developed Applications
607(1)
Why You Should...Understand Alternative Avenues for the Acquisition of Information Systems
608(3)
Advantages and Risks
609(2)
Summary
611(1)
Case Revisited: Metropolitan Hospital
612(1)
Review Questions
613(2)
From Ideas to Application: Real Cases
615(3)
Controls and Security Measures
618(59)
Metropolitan Hospital: Calling all Guards
618(2)
Resident Skeptic
618(1)
Don't Throw Away the Paper
619(1)
Balancing Access and Operations
619(1)
Goals of Information Security
620(1)
Risks to Information Systems
620(6)
Risks to Hardware
621(2)
Risks to Applications and Data
623(3)
Why You Should...Understand Controls and Security Measures in Information Systems
626(3)
Controls
629(21)
Program Robustness and Data Entry Controls
629(1)
Backup
630(1)
Access Controls
630(2)
Atomic Transactions
632(1)
Audit Trail
633(1)
Integrating Security Measures into Systems Development
634(1)
Security Standards
634(3)
Separation of Duties
637(1)
Network Controls
638(12)
Ethical and Societal Issues: No Smooth Sailing for the Clipper
650
The Downside
646(1)
Recovery Measures
647(3)
The Business Resumption Plan
647(3)
The Economic Aspect of Security Measures
650(2)
Summary
652(1)
Case Revisited: Metropolitan Hospital
653(1)
Review Questions
654(2)
From Ideas to Application: Real Cases
656(4)
Measurement Units
660(1)
Glossary
661(16)
Index
677


Please wait while the item is added to your cart...