Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Information Systems for Business : An Experiential Approach [ISBN: 9780470903728] for the semester, quarter, and short term or search our site for other textbooks by France Belanger; Craig Van Slyke (Univ. of Central Florida). Renting a textbook can save you up to 90% from the cost of buying.
Preface | p. xv |
Introduction | |
The Value of Information | p. 1 |
Focusing Story: How Information Cost Me (A Lot of) Money | p. 2 |
A Day in My Technology-Free Life Blog | p. 3 |
Data Information Knowledge and Wisdom | p. 3 |
Information Literacy | p. 5 |
Uses of Information | p. 5 |
How I Use Information | p. 6 |
How Businesses Use Information | p. 7 |
Business Box Promising Information Careers | p. 7 |
Information and Your Career | p. 8 |
Introduction to Information Systems | p. 13 |
Focusing Story: Registering for Classes in 1981 | p. 14 |
Identifying My Information Systems | p. 15 |
Why All Business Professionals Need to Be IS Managers | p. 15 |
Components of a System | p. 16 |
Overview of Systems | p. 16 |
Components of a Business Information System | p. 18 |
Foundations of Information Systems | p. 18 |
Stats Box Growth of Applications in AppleâÇÖs App Store | p. 22 |
How Information Systems Help Us Deal with Information | p. 22 |
Business Box How Southwest Airlines Flies High with Information Systems | p. 24 |
Information Systems and Change | p. 25 |
How Information Systems Facilitate Organizational Change | p. 25 |
Process Improvements | p. 25 |
Automation | p. 26 |
Control | p. 26 |
Information Flow | p. 26 |
Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability | p. 27 |
Common Information Systems | p. 28 |
Evaluating Information | p. 33 |
Focusing Story: Biased Information in a Trusted Outlet | p. 34 |
How Good is This Information? | p. 35 |
Being a Smart Information Consumer | p. 35 |
Stats Box | p. 36 |
Business Box Resume Fraud | p. 36 |
My Online Life and Information Overload | p. 37 |
Information Overload and the Need to Evaluate Information | p. 38 |
Dimensions of Information Quality | p. 39 |
Information Quality | p. 40 |
Business Box Information Quality as an Ethical Issue | p. 42 |
Evaluating Information Sources | p. 43 |
Evaluating Information | p. 43 |
Evaluating Usefulness | p. 44 |
Evaluating Believability | p. 45 |
Gaining Strategic Value from Information | p. 51 |
Focusing Story: Healthcare on My Cell Phone | p. 52 |
Strategic Information Systems | p. 53 |
Strategic Planning Process | p. 54 |
Strategic Business Planning | p. 54 |
Stats Box | p. 55 |
Information Systems Assessment | p. 55 |
Information Systems Vision | p. 56 |
Information Systems Architecture | p. 56 |
Strategic Initiatives Identification | p. 57 |
Advantages of IS Strategic Planning Process | p. 57 |
Frameworks for Strategic Information Systems | p. 58 |
Information Systems SWOT Analysis | p. 58 |
SWOT Analysis of a Person? | p. 59 |
PorterâÇÖs Five Competitive Forces Model | p. 60 |
PorterâÇÖs Value Chain Analysis | p. 60 |
Virtual Value Chain | p. 62 |
Evaluating Strategic Initiatives | p. 64 |
Critical Success Factors | p. 64 |
CSFS for Implementing Web Portals in Saudi Arabia | p. 65 |
What Does Yahoo! Need for Success? | p. 66 |
Priority Matrix | p. 66 |
Competitive Advantage at Outrigger Hotels and Resorts | p. 67 |
Hyper-competition: Sustainability of Competitive Advantage | p. 67 |
Google Vs. Yahoo! | p. 69 |
Managing Information | |
Storing and Organizing Information | p. 75 |
Focusing Story: The Database Behind Facebook | p. 76 |
Data for an Amazon Order | p. 77 |
Stats Box | p. 77 |
Overview of Relational Databases | p. 77 |
Databases and Database Management Systems | p. 77 |
Connecting Data Elements | p. 78 |
Databases vs. Spreadsheets (When to Use a DBMS) | p. 78 |
Relational Databases | p. 79 |
Database Diagrams | p. 83 |
Finding Business Databases Online | p. 84 |
The Compact Disc Database (CDDB) | p. 84 |
Online Databases | p. 85 |
Analyzing Information for Business Decision-Making | p. 91 |
Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money | p. 92 |
Information and Decision-Making | p. 93 |
Importance of Good Decision-Making Skills | p. 93 |
What Kind of Information Do I Need? | p. 94 |
Using Information for Decision-Making | p. 94 |
Business Box Why Do Managers Make Bad Decisions? | p. 95 |
Types of Decisions | p. 95 |
A Decision-Making Process | p. 97 |
Identify and Clearly Define the Problem | p. 97 |
Determine Requirements and Goals | p. 98 |
Identify Alternatives | p. 99 |
Define the Criteria | p. 99 |
Requirements Goals and Criteria | p. 99 |
Select a Decision-Making Technique/tool | p. 100 |
Evaluate the Alternatives Using the Criteria | p. 101 |
Check That the Solution Solves the Problem | p. 102 |
Information Retrieval and Analysis Tools | p. 102 |
"What If " I Get a 75% on the Final? | p. 103 |
Stats Box The Cost of Spreadsheet Errors | p. 106 |
What- If? Analysis in Business | p. 107 |
Transmitting Information | p. 113 |
Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi | p. 114 |
Introduction and Definitions | p. 115 |
Online Document Sharing | p. 116 |
Network Components and Characteristics | p. 116 |
Types of Networks | p. 117 |
Wired vs. Wireless Networks | p. 117 |
Broadband Networks | p. 118 |
Broadband Penetration in the G7 Countries | p. 119 |
Network Coverage | p. 120 |
The Internet | p. 121 |
Internet Applications | p. 122 |
Stats Box | p. 123 |
Internet Application of the Day: Get a Degree Online! | p. 124 |
Internet vs. Intranet | p. 125 |
Virtual Private Network (VPN) | p. 125 |
A Future Internet? Internet2 and Business | p. 125 |
Networking Architectures | p. 126 |
Architectural Principles | p. 126 |
Client/Server Architecture | p. 126 |
Peer-to-Peer Architecture | p. 128 |
Wireless Architecture | p. 128 |
Service Oriented Architecture (SOA) | p. 128 |
Software as a Service (SaaS) | p. 129 |
Cloud Computing | p. 130 |
Virtualization | p. 130 |
Architecture and Principles | p. 130 |
Communicating Information in Modern Organizations | p. 131 |
Web 2.0 | p. 132 |
Unified Communications (UC) | p. 132 |
The Power of Wikinomics | p. 134 |
Stats Box | p. 135 |
Web 2.0 for Business | p. 136 |
Web 3.0 | p. 136 |
Securing Information | p. 143 |
Focusing Story: My Mac is More Secured than Your Windows-based PC! | p. 144 |
Introduction and Definitions | p. 146 |
Information Security Concepts | p. 146 |
Security Levels | p. 146 |
How Protected is Your Computer? | p. 147 |
Information Security Threats | p. 148 |
Denial of Service | p. 148 |
Unauthorized Access | p. 150 |
Stats Box | p. 151 |
Even Big Technology Companies Can be Hacked | p. 153 |
Detecting Phishing | p. 154 |
Theft and Fraud | p. 154 |
Summary of Security Threats | p. 155 |
Security Technologies and Solutions | p. 157 |
Security Goals | p. 157 |
Preventive Corrective and Detective Controls | p. 157 |
Physical Security vs. Logical Security | p. 158 |
User Profiles | p. 158 |
How Strong is Your Password? | p. 159 |
Biometrics | p. 160 |
Firewalls | p. 162 |
Rendering Data Unreadable: Encryption | p. 166 |
Breaking the Encryption | p. 166 |
Types of Cryptography | p. 166 |
Virus Protection | p. 169 |
Wireless Security | p. 169 |
Stats Box | p. 170 |
Security Policies | p. 170 |
Business Box 2 How to Respond to a Security Crisis | p. 170 |
Security Policies Compliance | p. 171 |
WhereâÇÖs the Security? | p. 172 |
Risk Management | p. 172 |
Protecting the Confidentiality and Privacy of Information | p. 181 |
Focusing Story: The Reselling of Customer Data: The Choicepoint Story | p. 182 |
Finding MindyâÇÖ | p. 183 |
Information Privacy Threats | p. 185 |
Data Collection | p. 186 |
Secondary Use of Information | p. 187 |
Privacy Pizza | p. 187 |
Concern for Information Privacy | p. 188 |
Consequences of Privacy Violations | p. 188 |
Individual Consequences: Identify Theft | p. 188 |
Fraud Type from Identity Theft | p. 189 |
Organizational Consequences: Company Reputation | p. 190 |
Reputation Risks of Social Networking | p. 191 |
Technologies and Solutions for Information Privacy | p. 191 |
Surveillance Societies Around the World | p. 192 |
Cookies and Cookie Managers | p. 192 |
Privacy Policy Creation | p. 194 |
Privacy Statement or Policy | p. 194 |
Privacy and Facebook | p. 196 |
Privacy Seals | p. 197 |
Activity 9.4 Why Your Advisor canâÇÖt Talk to Your Parents | p. 197 |
Government Information Privacy Regulations | p. 198 |
Hippa and Identity Theft | p. 199 |
Privacy and Ethics | p. 199 |
Papa Privacy Policies and FERPA | p. 200 |
Relationship between Security and Privacy | p. 201 |
Using Information | |
Developing Information Systems | p. 207 |
Focusing Story: The $6 Billion Software Bug | p. 208 |
Time Cost and Quality | p. 209 |
Determining Requirements | p. 210 |
Software Development Methodologies | p. 210 |
Traditional Systems Development Life Cycle | p. 211 |
Planning Phase | p. 212 |
Requirements Phase | p. 212 |
Design Phase | p. 213 |
Development Phase | p. 214 |
Implementation Phase | p. 214 |
Maintenance Phase | p. 215 |
Advantages and Disadvantages of the SDLC | p. 215 |
Stats Box Standish Chaos Report | p. 216 |
Alternative Methodologies | p. 216 |
Prototyping | p. 216 |
Rapid Application Development (RAD) | p. 217 |
Spiral Model | p. 218 |
Comparing the Methods | p. 220 |
Build or Buy Decision | p. 220 |
How Open Source Software Impacts Build vs. Buy | p. 223 |
Using Open Source in Business | p. 223 |
Business Box Bad Economy Leads to More Open Source Software | p. 225 |
What to Outsource | p. 225 |
Outsourcing Information Systems | p. 226 |
Outsourcing Models | p. 226 |
Benefits and Risks of Outsourcing | p. 227 |
Making the Outsourcing Decision | p. 227 |
Business Box Reversing the Outsourcing Decision | p. 228 |
Geographic Considerations | p. 229 |
Information-Based Business Process | p. 235 |
Focusing Story: Improving Processes is For Everyone! | p. 236 |
How Many Steps in this Process? | p. 237 |
What Is a Process? | p. 237 |
Process Modeling | p. 239 |
Model This! | p. 240 |
Business Process Modeling Tools | p. 240 |
Technology and Processes | p. 242 |
Process Improvement | p. 243 |
Levels of Change | p. 245 |
Importance of Process Redesign | p. 245 |
Redesign This! | p. 246 |
Choicecare Physicians: Changing Access to Patient Records | p. 247 |
Enterprise Information Systems | p. 251 |
Focusing Story: Supply Chain Innovations at Wal-Mart | p. 252 |
Finding The Components of an Enterprise System | p. 254 |
Enterprise Systems | p. 254 |
Personal vs. Enterprise Systems | p. 254 |
Integration and Enterprise Systems | p. 256 |
Characteristics of Enterprise Systems | p. 256 |
Enterprise Resource Planning (ERP) | p. 258 |
Benefits and Disadvantages of ERP Systems | p. 259 |
The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List | p. 259 |
ERP is not Always a Horror Story: Cisco Implementation on Time and Budget | p. 261 |
Top Seven Selected ERP Vendors | p. 262 |
The Online Beer Game | p. 262 |
Supply Chain Management Systems | p. 263 |
Supply ChainâÇÖs Impact on Company Valuation | p. 265 |
Customer Relationship Management | p. 265 |
Customer Relationship Management Systems | p. 266 |
Customer Service Life Cycle | p. 266 |
Components of CRM | p. 268 |
Self-servicing | p. 268 |
CRM Vendors | p. 269 |
CRM Implementation Options | p. 269 |
Not Just Technology: Training People for CRM At British Telecom | p. 270 |
Benefits and Limitations of CRM | p. 271 |
Customer Managed Interactions (CMI) | p. 272 |
Information for Electronic Business | p. 279 |
Focusing Story: The iPod and The Music Industry | p. 280 |
Why is E-business Important? | p. 282 |
Introduction to E-business | p. 282 |
Types of E-businesses | p. 282 |
Retail E-commerce in The United States | p. 284 |
E-business Models | p. 285 |
What is a Business Model? | p. 285 |
B2C E-business Models | p. 286 |
Changing The Business Model: Furniture.com | p. 288 |
B2C E-business Enablers | p. 288 |
Technological Enablers | p. 288 |
Critical Mass | p. 289 |
B2C E-business Impacts | p. 290 |
E-channel Compression (Disintermediation) | p. 290 |
E-channel Expansion | p. 291 |
Why Would I Trust them or Buy from Them? | p. 291 |
Design for B2C E-Business | p. 292 |
Business-to-Business (B2B) | p. 293 |
B2B vs. B2C E-business | p. 293 |
B2B E-business Models | p. 294 |
Where is My Web Page? | p. 296 |
Search Engine Optimization | p. 296 |
Trends in E-business | p. 298 |
Mobile Business | p. 299 |
Mobile Behaviors | p. 300 |
Global e-Business | p. 301 |
E-business in Ontario | p. 301 |
USA.Gov | p. 302 |
E-government | p. 302 |
Information and Knowledge for Business Decision Making | p. 309 |
Focusing Story: Managing Knowledge by Texting | p. 310 |
How You Manage Knowledge | p. 311 |
Knowledge Management | p. 312 |
Why Managing Knowledge is Important | p. 312 |
Types of Knowledge | p. 313 |
Types of Knowledge Resources | p. 314 |
Main Processes for Knowledge Management | p. 314 |
Creating Knowledge | p. 315 |
Capturing and Codifying Knowledge | p. 316 |
Business Box The Issue of Trust in Knowledge Management | p. 318 |
Storing and Retrieving Knowledge | p. 318 |
Transferring and Applying Knowledge | p. 319 |
Wikis for Managing Knowledge | p. 319 |
Knowledge Management Technologies | p. 320 |
Repositories | p. 320 |
Communication-based Tools | p. 320 |
Stats Box Linkedin Groups as Communities of Practice | p. 321 |
Executive Information Systems and Dashboards | p. 321 |
Expert Systems | p. 321 |
Using a Decision Support System | p. 323 |
Decision Support Systems and Group Decision Support Systems | p. 323 |
Business Intelligence | p. 326 |
Data Warehousing | p. 327 |
Data Mining | p. 328 |
Making Ethical Decisions | p. 332 |
Ethical Decision-Making | p. 332 |
Index | p. 339 |
Online In-Depth Guides (posted at the Instructor and Student Companion Sites: www.wiley.com/college/belanger) | |
Hardware | |
Software | |
Networking Basics | |
Advanced database concepts | |
Spreadsheets | |
Funding information systems | |
Managing projects | |
Advanced security privacy and risk management | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.