CART

(0) items

Managing Information Technology,9780131454439
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Managing Information Technology

by ; ; ; ;
Edition:
6th
ISBN13:

9780131454439

ISBN10:
0131454439
Format:
Hardcover
Pub. Date:
1/1/2009
Publisher(s):
Prentice Hall
List Price: $184.00
More New and Used
from Private Sellers
Starting at $0.01

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Managing Information Technology
    Managing Information Technology
  • Managing Information Technology
    Managing Information Technology
  • Managing Information Technology : What Managers Need to Know
    Managing Information Technology : What Managers Need to Know
  • Managing Information Technology : What Managers Need to Know
    Managing Information Technology : What Managers Need to Know




Summary

"Managing Information Technology, 4/E focuses on management of information technology topics vital to a successful career as a manager. The book has been completely updated to reflect the rapid changes in information technology and new types of business applications. Up-to-date content includes the latest changes in computer systems and software, such as Windows 2000, Linux, and XML; the growth of cyber-businesses and the e-business activities of traditional companies; and social and ethical issues of information technology. For managers in the field of information technology.

Table of Contents

Preface xvii
Managing IT in an E-World
1(20)
Recent Information Technology Trends
2(3)
Computer Hardware: Faster, Smaller, Cheaper
2(1)
Computer Software: Standardized and Integrated
3(1)
Computer Networks: High Bandwidth, Global, and Wireless
3(1)
Traditional Ways to Compete
4(1)
New Ways to Compete
4(1)
Working in an E-World
5(1)
More Productive Teams
5(1)
Virtual Organizations and Free Agents
6(1)
Living in an E-World
6(1)
The IS Management Role in Organizations
6(5)
Managing the IT Assets
8(2)
People Roles
10(1)
Learning Objectives for This Textbook
11(1)
Review Questions
12(1)
Discussion Questions
12(9)
Case Study 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems
13(8)
Part I Information Technology
21(158)
Computer Systems
23(29)
Evolution of Computer Systems
24(2)
First Generation of Computers
24(1)
Second Generation of Computers
24(1)
Third Generation of Computers
25(1)
Fourth Generation of Computers
25(1)
The Development of Minicomputers
26(1)
The Development of Microcomputers
26(1)
Basic Components of Computer Systems
26(11)
Underlying Structure
28(1)
Input/Output
28(2)
Computer Memory
30(3)
Arithmetic/Logical Unit
33(1)
Computer Files
33(2)
Control Unit
35(2)
The Stored-Program Concept
37(2)
Extensions to the Basic Model
39(3)
Communications within the Computer System
39(1)
Cache Memory
40(1)
Multiple Processor Configurations
41(1)
Types of Computer Systems
42(8)
Microcomputers
43(1)
Workstations/Midrange Systems
44(4)
Mainframe Computers
48(1)
Supercomputers
49(1)
Summary
50(1)
Review Questions
50(1)
Discussion Questions
51(1)
Computer Software
52(43)
Evolution of Computer Programming
53(2)
First and Second Generation Languages
53(1)
Third and Fourth Generation Languages
54(1)
Key Types of Software
55(1)
Applications Software
56(8)
Examples of Applications Packages
57(2)
Personal Productivity Software
59(5)
Support Software
64(26)
The Operating System
65(4)
Third Generation Languages
69(6)
Fourth Generation Languages
75(2)
Markup Languages
77(1)
Object-Oriented Programming
78(5)
Languages for Developing Web Applications
83(4)
Database Management Systems
87(1)
Case Tools
88(1)
Communications Interface Software
88(2)
Utility Programs
90(1)
The Changing Nature of Software
90(2)
More Complexity of Hardware/Software Arrangements
90(1)
Less Concern with Machine Efficiency
90(1)
More Purchased Applications
90(1)
More Programming Using Object-Oriented and Visual Languages
91(1)
More Emphasis on Applications That Run on Intranets and the Internet
91(1)
More User Development
91(1)
More Use of Personal Productivity Software
91(1)
The Software Component of the Information Systems Industry
92(1)
Summary
92(1)
Review Questions
93(1)
Discussion Questions
94(1)
Telecommunications and Networking
95(39)
The Need for Networking
96(1)
Sharing of Technology Resources
96(1)
Sharing of Data
96(1)
Distributed Data Processing and Client/Server Systems
97(1)
Enhanced Communications
97(1)
Marketing Outreach
97(1)
An Overview of Telecommunications and Networking
97(1)
Key Elements of Telecommunications and Networking
98(30)
Analog and Digital Signals
98(2)
Speed of Transmission
100(1)
Types of Transmission Lines
100(1)
Transmission Media
101(5)
Topology of Networks
106(2)
Types of Networks
108(16)
Network Protocols
124(4)
The Exploding Role of Telecommunications and Networking
128(2)
Online Operations
128(1)
Connectivity
128(1)
Electronic Data Interchange and Electronic Commerce
129(1)
Marketing
129(1)
The Telecommunications Industry
130(1)
Summary
131(1)
Review Questions
132(1)
Discussion Questions
132(2)
The Data Resource
134(45)
Why Manage Data?
135(1)
Technical Aspects of Managing the Data Resource
135(5)
The Data Model
135(1)
Data Modeling
136(1)
Database Architecture
137(1)
Tools for Managing Data
138(1)
Data Dictionary/Directory
139(1)
Database Programming
140(1)
Managerial Issues in Managing Data
140(11)
Principles in Managing Data
140(4)
The Data Management Process
144(4)
Data Management Policies
148(3)
Summary
151(1)
Review Questions
151(1)
Discussion Questions
151(28)
Case Study I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform
152(12)
Case Study I-2 Telecommuting at IBM-Indiana
164(6)
Case Study I-3 Midsouth Chamber of Commerce (B): Cleaning up an Information Systems Debacle
170(9)
Part II Applying Information Technology
179(172)
Enterprise Systems
181(31)
Application Areas
181(2)
Critical Concepts
183(3)
Batch Processing versus Online Processing
183(1)
Functional Information Systems
184(1)
Vertical Integration of Systems
184(1)
Distributed Systems and Client/Server Systems
184(2)
Transaction Processing Systems
186(2)
Payroll System
187(1)
Order Entry System
187(1)
Enterprise Resource Planning Systems
188(4)
An Example ERP System: SAP R/3
190(2)
Data Warehousing
192(2)
Customer Relationship Management
194(2)
Office Automation
196(5)
Word Processing and Application Suites
197(1)
Electronic Mail
197(3)
Future Developments
200(1)
Groupware
201(5)
An Example Groupware System: Lotus Notes
202(4)
Intranets
206(1)
Factory Automation
207(3)
Engineering Systems
208(1)
Manufacturing Administration
208(1)
Factory Operations
209(1)
Robotics
209(1)
Summary
210(1)
Review Questions
210(1)
Discussion Questions
211(1)
Managerial Support Systems
212(27)
Decision Support Systems
212(3)
Data Mining
215(2)
Group Support Systems
217(2)
Geographic Information Systems
219(3)
Business Adopts Geographic Technologies
219(1)
What's Behind Geographic Technologies
220(2)
Issues for Information Systems
222(1)
Executive Information Systems/Business Intelligence Systems
222(4)
Knowledge Management Systems
226(3)
Two Recent KMS Initiatives within a Pharmaceutical Firm
227(2)
Artificial Intelligence
229(1)
Expert Systems
229(3)
Obtaining an Expert System
230(1)
Examples of Expert Systems
230(2)
Neural Networks
232(1)
Virtual Reality
233(3)
Summary
236(1)
Review Questions
237(1)
Discussion Questions
238(1)
E-Commerce Applications
239(112)
E-Commerce Technologies
240(4)
Technologies for B2C Applications
240(2)
Technologies for B2B Applications
242(1)
Technologies for IT Security
243(1)
Legal and Regulatory Environment
244(2)
Tax Policies
245(1)
Copyright Laws
245(1)
Antitrust Laws
245(1)
Privacy Issues
245(1)
Strategic Opportunities and Threats
246(2)
E-Business Models
248(4)
B2C Applications
248(1)
B2B Applications
249(1)
Atomic Business Models
250(2)
Direct-to-Customer Examples
252(5)
Amazon.com
252(2)
Dell.com
254(1)
Landsend.com
255(1)
Successful Online Direct-to-Customer Models
256(1)
Intermediary Examples
257(5)
eBay
258(1)
Yahoo!
259(1)
Manheim
260(1)
Successful Online Intermediary Models
261(1)
Special Issue: What Makes a Good Web Site?
262(2)
Summary
264(1)
Review Questions
264(1)
Discussion Questions
265(86)
Case Study II-1 Midstate University Business Placement Office
266(16)
Case Study II-2 The Challenges of Local System Design for Multinationals: The MaxFli Sales Force Automation System at BAT
282(13)
Case Study II-3 CRM Using Data Warehousing at First American Corporation
295(14)
Case Study II-4 Batesville Casket's World Wide Web Site
309(8)
Case Study II-5 E-Business Transformation at the Crossroads: Sears' Dilemma
317(14)
Case Study II-6 The Cliptomania™ Web Store
331(9)
Case Study II-7 Mezzia, Inc.: Deciding Which Information Technology Company to Join
340(11)
Part III Acquiring Information Systems
351(204)
Basic Information Systems Concepts
354(31)
The Systems View
354(7)
What Is a System?
355(1)
Seven Key System Elements
356(3)
Organizations as Systems
359(1)
Systems Analysis and Design
360(1)
Business Processes
361(3)
Identifying Business Processes
361(1)
Business Process Redesign
362(2)
Processes and Techniques to Deliver Information Systems
364(13)
The Information Systems Life Cycle
364(1)
Structured Techniques for Life Cycle Development
364(1)
Procedural-Oriented Techniques
365(2)
Tools for the As-Is Model
367(1)
Tools for the Logical To-Be Model
367(5)
Tools for Documenting the Physical To-Be System
372(2)
Object-Oriented Techniques
374(2)
Core Concepts
376(1)
Unified Modeling Language (UML) for O-O Modeling
376(1)
Information Systems Controls to Minimize Business Risks
377(6)
Types of Control Mechanisms
378(2)
Controls in the Definition and Construction Phases
380(1)
Controls in the Implementation Phase
381(2)
Summary
383(1)
Review Questions
383(1)
Discussion Questions
384(1)
Methodologies for Custom Software Development
385(20)
Systems Development Life Cycle Methodology
385(11)
The SDLC Steps
386(1)
Initiating New Systems Projects
387(1)
Definition Phase
387(2)
Construction Phase
389(1)
Implementation Phase
390(3)
The SDLC Project Team
393(1)
Managing an SDLC Project
394(1)
SDLC Advantages and Disadvantages
394(2)
Prototyping Methodology
396(4)
The Prototyping Steps
396(1)
The Prototyping Project Team
397(1)
Managing a Prototyping Project
398(1)
Prototyping Advantages and Disadvantages
398(1)
Prototyping Within an SDLC Process
399(1)
Newer Approaches
400(2)
Rapid Application Development (RAD)
400(2)
Managing Software Projects Using Outsourced Staff
402(1)
Summary
403(1)
Review Questions
403(1)
Discussion Questions
404(1)
Methodologies for Purchased Software Packages
405(16)
The Make-or-Buy Decision
406(1)
Purchasing Methodology
406(11)
The Purchasing Steps
406(8)
Project Team for Purchasing Packages
414(1)
Managing a Purchased System Project
415(1)
Purchasing Advantages and Disadvantages
416(1)
Special Case: Enterprise System Packages
417(1)
New Purchasing Option: Application Service Providers (ASPs)
418(1)
Summary
419(1)
Review Questions
420(1)
Discussion Questions
420(1)
IT Project Management
421(19)
IT Portfolio Management
422(1)
Project Initiation
423(3)
Project Manager Characteristics
424(1)
Project Sponsor and Champion Roles
425(1)
Project Planning
426(4)
Scheduling
426(1)
Budgeting
427(1)
Staffing
427(2)
Planning Documents
429(1)
Project Execution and Control
430(6)
Managing Project Risks
432(1)
Managing Business Change
433(3)
Project Closing
436(1)
Special Issue: Managing Complex IT Projects
437(1)
Special Issue: Post-Merger IT Integration Projects
438(1)
Summary
438(1)
Review Questions
438(1)
Discussion Questions
439(1)
Facilitating User Computing
440(115)
The Emergence of User Application Development
441(1)
User-Developed Versus IS-Developed Applications
442(4)
Potential Advantages and Disadvantages
442(2)
Assessing the Application Risks
444(2)
User Development Methodology
446(4)
User Development Guidelines
447(3)
User Development Roles
450(1)
Strategies and Tactics for Managing User Computing
450(7)
Strategies for End-User Computing
452(1)
Common Support Tactics
453(2)
Common Control Tactics
455(2)
Special Case: Supporting Telecommuters
457(3)
Summary
460(1)
Review Questions
460(1)
Discussion Questions
461(94)
Case Study III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc.
462(10)
Case Study III-2 Development of an Interorganizational System at Zeus, Inc.
472(8)
Case Study III-3 Purchasing a Student Management System at Jefferson County School System
480(9)
Case Study III-4 A Make-or-Buy Decision at Baxter Manufacturing Company
489(6)
Case Study III-5 ERP Purchase Decision at Benton Manufacturing Company, Inc.
495(5)
Case Study III-6 Naval Surface Warfare Center, Crane Division: Implementing Business Process Reengineering Recommendations
500(15)
Case Study III-7 NIBCO's ``Big Bang'': An SAP Implementation
515(16)
Case Study III-8 BAT Taiwan: Implementing SAP for a Strategic Transition
531(14)
Case Study III-9 A Troubled Project at Modern Materials, Inc.
545(7)
Case Study III-10 Supporting End Users at Grandma Studor's Bakery, Inc.
552(3)
Part IV The Information Management System
555(176)
Setting a Direction for Information Resources
558(24)
Why Set a Direction for Information Resources?
559(1)
The Outputs of the Direction-Setting Process
559(2)
Information Resources Assessment
560(1)
Information Vision and Architecture
560(1)
Information Resources Plans
560(1)
The Process of Setting Direction
561(2)
IS and Business Planning
561(1)
Assessment
561(1)
Vision
561(1)
Strategic Planning
561(1)
Operational Planning
562(1)
Traditional Planning in the IS Organization
562(1)
Assessing Current Information Resources
563(3)
Measuring IS Use and Attitudes
563(1)
Reviewing the IS Organizational Mission
563(2)
Assessing Performance versus Goals
565(1)
Creating an Information Vision
566(1)
Designing the Architecture
567(2)
Components of Architecture
567(2)
The Strategic IS Plan
569(7)
The Strategic IS Planning Process
570(2)
Tools for Identifying IT Strategic Opportunities
572(4)
The Operational IS Plan
576(1)
The Long-Term Operational IS Plan
576(1)
The Short-Term Operational IS Plan
577(1)
Guidelines for Effective Planning
577(1)
Benefits of Information Resources Planning
578(1)
Better IS Resource Allocation
578(1)
Communicating with Top Management
578(1)
Helping Vendors
578(1)
Creating a Context for Decisions
578(1)
Achieving Integration and Decentralization
578(1)
Evaluating Options
579(1)
Meeting Expectations of Management
579(1)
Roles in the Information Resources Planning Process
579(1)
Role of the Business Manager
579(1)
Role of the IS Professional
579(1)
Summary
580(1)
Review Questions
580(1)
Discussion Questions
581(1)
Managing the Information Systems Function
582(29)
The Challenges Facing IS Leadership
582(1)
Rapid Technological Change
583(1)
Exploding Applications and Data
583(1)
Growth in Business Management Understanding of Technology
583(1)
Frequent External Shocks
583(1)
Managing the Assets in an IS Organization
583(7)
Developing Human Resources
584(1)
Improving the Physical Infrastructure
584(4)
Managing the Applications Portfolio
588(2)
Information Technology Management System Issues
590(18)
Agreeing Upon the Role of the IS Organization
591(1)
Selecting Effective IS Leadership
592(3)
Creating an Active Partnership with Business Managers
595(1)
Determining an Outsourcing Strategy
596(1)
Designing an Equitable Financing System
597(3)
Deploying Global Information Systems
600(3)
Designing an Appropriate IS Organization and Governance System
603(3)
Ensuring Regular Performance Measurement
606(2)
Summary
608(1)
Review Questions
609(1)
Discussion Questions
610(1)
Social, Ethical, and Legal Issues
611(120)
The Legal Environment
611(1)
Ethics Frameworks
612(3)
Identifying Ethical Problems
612(1)
Analyzing Ethical Problems
613(2)
Computer Crime
615(4)
Financial Crimes
615(1)
Cyberattacks on Computers
616(2)
Computer Crime Laws
618(1)
Identity Theft
619(1)
Impact of Identity Theft
619(1)
Police and Bank Attitudes
620(1)
Ethical Issues
620(1)
Laws on Identity Theft
620(1)
Privacy
620(11)
Ethics of Invasion of Privacy
621(1)
Laws on Privacy
621(1)
Privacy Problems
622(1)
E-Commerce Privacy Concerns
623(1)
Workplace Privacy
624(1)
Access
625(1)
Freedom of Speech
625(1)
Intellectual Property Rights
626(1)
Software Piracy
627(1)
Digital Entertainment Piracy
628(1)
Internet File Sharing
628(2)
Ethical Questions
630(1)
Accuracy
631(1)
National Crime Database
631(1)
Credit Bureau Databases
631(1)
Other Business Databases
632(1)
Impact on Workers
632(1)
Health Problems
632(1)
Quality of Working Life
632(1)
The Future
633(1)
Review Questions
634(1)
Discussion Questions
634(97)
Case Study IV-1 The Clarion School for Boys, Inc., Milwaukee Division: Developing an Information Systems Plan
635(16)
Case Study IV-2 Teletron, Inc.: Using Information Technology to Transform a Company
651(14)
Case Study IV-3 Advantage 2000 at Owens Corning: Business and IT Transformation
665(16)
Case Study IV-4 Merging Information Technology and Cultures at Compaq-Digital (A): Meeting Day-One Objectives
681(7)
Case Study IV-5 Merging Information Technology and Cultures at Compaq-Digital (B): Becoming a Single Firm
688(6)
Case Study IV-6 FastTrack IT Integration for the Sallie Mae Merger
694(15)
Case Study IV-7 Outsourcing Decision at Schaeffer Corporation
709(5)
Case Study IV-8 Systems Support for a New Baxter Manufacturing Company Plant in Mexico
714(5)
Case Study IV-9 BAT APSS: Shared Services at a Multinational Firm
719(7)
Case Study IV-10 Mary Morrison's Ethical Dilemma
726(2)
Case Study IV-11 A Security Breach on the Indiana University Computer Network
728(3)
Glossary 731(28)
References 759(16)
Index 775


Please wait while the item is added to your cart...