Information Systems for Business : An Experiential Approach

個数:

Information Systems for Business : An Experiential Approach

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 346 p.
  • 言語 ENG
  • 商品コード 9780470903728
  • DDC分類 004

Full Description


A focused delivery on information systems Featuring the model "learn-do-reflect", this invaluable book offers a focused treatment of information systems topics. Packed with engaging exercises throughout the book to enhance your learning, the book aims at looking at how information is analyzed, used for competitive advantage, stored, and more. Each chapter serves as a short, focused examination of the covered topic and includes activities to drive home the material. Also included is an online instructor's web site that provides extensive support to teach with this approach.Offers a focused look at information systems and how information is analyzed, used for competitive advantage, and storedIncludes helpful exercises in each chapter that drill down the lessons learnedReflects the "learn-do-reflect" teaching modelFeatures an instructor's web site that provides extensive supportThis valuable book offers a practical approach to learning the capabilities and potential of information systems.

Contents

Preface xv SECTION I INTRODUCTION1 The Value of Information 1Focusing Story: How Information Cost Me (A Lot of) Money 2Learning Activity 1.1 A Day in My Technology-Free Life Blog 3Data Information Knowledge and Wisdom 3Information Literacy 5Uses of Information 5Learning Activity 1.2 How I Use Information 6Learning Activity 1.3 How Businesses Use Information 7Business Box Promising Information Careers 7Information and Your Career 82 Introduction to Information Systems 13Focusing Story: Registering for Classes in 1981 14Learning Activity 2.1 Identifying My Information Systems 15Why All Business Professionals Need to Be IS Managers 15Learning Activity 2.2 Components of a System 16Overview of Systems 16Learning Activity 2.3 Components of a Business Information System 18Foundations of Information Systems 18Stats Box Growth of Applications in Apple's App Store 22How Information Systems Help Us Deal with Information 22Business Box How Southwest Airlines Flies High with Information Systems 24Learning Activity 2.4 Information Systems and Change 25How Information Systems Facilitate Organizational Change 25Process Improvements 25Automation 26Control 26Information Flow 26Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability 27Common Information Systems 283 Evaluating Information 33Focusing Story: Biased Information in a Trusted Outlet 34Learning Activity 3.1 How Good is This Information? 35Being a Smart Information Consumer 35Stats Box 36Business Box Resume Fraud 36Learning Activity 3.2 My Online Life and Information Overload 37Information Overload and the Need to Evaluate Information 38Learning Activity 3.3 Dimensions of Information Quality 39Information Quality 40Business Box Information Quality as an Ethical Issue 42Learning Activity 3.4 Evaluating Information Sources 43Evaluating Information 43Evaluating Usefulness 44Evaluating Believability 454 Gaining Strategic Value from Information 51Focusing Story: Healthcare on My Cell Phone 52Strategic Information Systems 53Strategic Planning Process 54Step 1: Strategic Business Planning 54Stats Box 55Step 2: Information Systems Assessment 55Step 3: Information Systems Vision 56Step 4: Information Systems Architecture 56Step 5: Strategic Initiatives Identification 57Advantages of IS Strategic Planning Process 57Frameworks for Strategic Information Systems 58Information Systems SWOT Analysis 58SWOT Analysis of a Person? 59Porter's Five Competitive Forces Model 60Porter's Value Chain Analysis 60Virtual Value Chain 62Evaluating Strategic Initiatives 64Critical Success Factors 64CSFS for Implementing Web Portals in Saudi Arabia 65Learning Activity 4.1 What Does Yahoo! Need for Success? 66Priority Matrix 66Learning Activity 4.2 Competitive Advantage at Outrigger Hotels and Resorts 67Hyper-competition: Sustainability of Competitive Advantage 67Learning Activity 4.3 Google Vs. Yahoo! 695 Storing and Organizing Information 75Focusing Story: The Database Behind Facebook 76Learning Activity 5.1 Data for an Amazon Order 77Stats Box 77Overview of Relational Databases 77Databases and Database Management Systems 77Learning Activity 5.2 Connecting Data Elements 78Databases vs. Spreadsheets (When to Use a DBMS) 78Relational Databases 79Database Diagrams 83Learning Activity 5.3 Finding Business Databases Online 84The Compact Disc Database (CDDB) 84Online Databases 856 Analyzing Information for Business Decision-Making 91Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money 92Learning Activity 6.1 Information and Decision-Making 93Importance of Good Decision-Making Skills 93Learning Activity 6.2 What Kind of Information Do I Need? 94Using Information for Decision-Making 94Business Box Why Do Managers Make Bad Decisions? 95Types of Decisions 95A Decision-Making Process 97Identify and Clearly Define the Problem 97Determine Requirements and Goals 98Identify Alternatives 99Define the Criteria 99Learning Activity 6.3 Requirements Goals and Criteria 99Select a Decision-Making Technique/tool 100Evaluate the Alternatives Using the Criteria 101Check That the Solution Solves the Problem 102Information Retrieval and Analysis Tools 102Learning Activity 6.4 "What If " I Get a 75% on the Final? 103Stats Box The Cost of Spreadsheet Errors 106Learning Activity 6.5 What- If? Analysis in Business 1077 Transmitting Information 113Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi 114Introduction and Definitions 115Learning Activity 7.1 Online Document Sharing 116Network Components and Characteristics 116Types of Networks 117Wired vs. Wireless Networks 117Broadband Networks 118Stats Box 1 Broadband Penetration in the G7 Countries 119Network Coverage 120The Internet 121Internet Applications 122Stats Box 123Business Box 1 Internet Application of the Day: Get a Degree Online! 124Internet vs. Intranet 125Virtual Private Network (VPN) 125Learning Activity 7.2 A Future Internet? Internet2 and Business 125Networking Architectures 126Architectural Principles 126Client/Server Architecture 126Peer-to-Peer Architecture 128Wireless Architecture 128Service Oriented Architecture (SOA) 128Software as a Service (SaaS) 129Cloud Computing 130Virtualization 130Learning Activity 7.3 Architecture and Principles 130Communicating Information in Modern Organizations 131Web 2.0 132Unified Communications (UC) 132The Power of Wikinomics 134Stats Box 135Learning Activity 7.4 Web 2.0 for Business 136Web 3.0 1368 Securing Information 143Focusing Story: My Mac is More Secured than Your Windows-based PC! 144Introduction and Definitions 146Information Security Concepts 146Security Levels 146Learning Activity 8.1 How Protected is Your Computer? 147Information Security Threats 148Denial of Service 148Unauthorized Access 150Stats Box 151Business Box 1 Even Big Technology Companies Can be Hacked 153Learning Activity 8.2 Detecting Phishing 154Theft and Fraud 154Summary of Security Threats 155Security Technologies and Solutions 157Security Goals 157Preventive Corrective and Detective Controls 157Physical Security vs. Logical Security 158User Profiles 158Learning Activity 8.3 How Strong is Your Password? 159Biometrics 160Firewalls 162Rendering Data Unreadable: Encryption 166Learning Activity 8.4 Breaking the Encryption 166Types of Cryptography 166Virus Protection 169Wireless Security 169Stats Box 170Security Policies 170Business Box 2 How to Respond to a Security Crisis 170Stats Box 3 Security Policies Compliance 171Learning Activity 8.5 Where's the Security? 172Risk Management 1729 Protecting the Confidentiality and Privacy of Information 181Focusing Story: The Reselling of Customer Data: The Choicepoint Story 182Learning Activity 9.1 Finding Mindy' 183Information Privacy Threats 185Data Collection 186Secondary Use of Information 187Learning Activity 9.2 Privacy Pizza 187Stats Box 1 Concern for Information Privacy 188Consequences of Privacy Violations 188Individual Consequences: Identify Theft 188Stats Box 2 Fraud Type from Identity Theft 189Organizational Consequences: Company Reputation 190Stats Box 3 Reputation Risks of Social Networking 191Technologies and Solutions for Information Privacy 191Stats Box 4 Surveillance Societies Around the World 192Cookies and Cookie Managers 192Learning Activity 9.3 Privacy Policy Creation 194Privacy Statement or Policy 194Business Box 1 Privacy and Facebook 196Privacy Seals 197Activity 9.4 Why Your Advisor can't Talk to Your Parents 197Government Information Privacy Regulations 198Business Box 2 Hippa and Identity Theft 199Privacy and Ethics 199Learning Activity 9.5 Papa Privacy Policies and FERPA 200Relationship between Security and Privacy 201SECTION III USING INFORMATION10 Developing Information Systems 207Focusing Story: The $6 Billion Software Bug 208Time Cost and Quality 209Learning Activity 10.1 Determining Requirements 210Software Development Methodologies 210Traditional Systems Development Life Cycle 211Planning Phase 212Requirements Phase 212Design Phase 213Development Phase 214Implementation Phase 214Maintenance Phase 215Learning Activity 10.2 Advantages and Disadvantages of the SDLC 215Stats Box Standish Chaos Report 216Alternative Methodologies 216Prototyping 216Rapid Application Development (RAD) 217Spiral Model 218Learning Activity 10.3 Comparing the Methods 220Build or Buy Decision 220Learning Activity 10.4 How Open Source Software Impacts Build vs. Buy 223Using Open Source in Business 223Business Box Bad Economy Leads to More Open Source Software 225Learning Activity 10.5 What to Outsource 225Outsourcing Information Systems 226Outsourcing Models 226Benefits and Risks of Outsourcing 227Making the Outsourcing Decision 227Business Box Reversing the Outsourcing Decision 228Geographic Considerations 22911 Information-Based Business Process 235Focusing Story: Improving Processes is For Everyone! 236Learning Activity 11.1 How Many Steps in this Process? 237What Is a Process? 237Process Modeling 239Learning Activity 11.2 Model This! 240Business Process Modeling Tools 240Technology and Processes 242Process Improvement 243Levels of Change 245Stats Box 1 Importance of Process Redesign 245Learning Activity 11.3 Redesign This! 246Business Box 1 Choicecare Physicians: Changing Access to Patient Records 24712 Enterprise Information Systems 251Focusing Story: Supply Chain Innovations at Wal-Mart 252Learning Activity 12.1 Finding The Components of an Enterprise System 254Enterprise Systems 254Personal vs. Enterprise Systems 254Integration and Enterprise Systems 256Characteristics of Enterprise Systems 256Enterprise Resource Planning (ERP) 258Benefits and Disadvantages of ERP Systems 259Business Box 1 The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List 259Business Box 2 ERP is not Always a Horror Story: Cisco Implementation on Time and Budget 261Stats Box 1 Top Seven Selected ERP Vendors 262Learning Activity 12.2 The Online Beer Game 262Supply Chain Management Systems 263Stats Box 2 Supply Chain's Impact on Company Valuation 265Learning Activity 12.3 Customer Relationship Management 265Customer Relationship Management Systems 266Customer Service Life Cycle 266Components of CRM 268Learning Activity 12.4 Self-servicing 268Stats Box 3 CRM Vendors 269CRM Implementation Options 269Business Box 3 Not Just Technology: Training People for CRM At British Telecom 270Benefits and Limitations of CRM 271Customer Managed Interactions (CMI) 27213 Information for Electronic Business 279Focusing Story: The iPod and The Music Industry 280Learning Activity 13.1 Why is E-business Important? 282Introduction to E-business 282Types of E-businesses 282Stats Box 1 Retail E-commerce in The United States 284E-business Models 285What is a Business Model? 285B2C E-business Models 286Business Box 1 Changing The Business Model: Furniture.com 288B2C E-business Enablers 288Technological Enablers 288Critical Mass 289B2C E-business Impacts 290E-channel Compression (Disintermediation) 290E-channel Expansion 291Learning Activity 13.2 Why Would I Trust them or Buy from Them? 291Design for B2C E-Business 292Business-to-Business (B2B) 293Stats Box 2 B2B vs. B2C E-business 293B2B E-business Models 294Learning Activity 13.3 Where is My Web Page? 296Search Engine Optimization 296Trends in E-business 298Mobile Business 299Stats Box 3 Mobile Behaviors 300Global e-Business 301Stats Box 4 E-business in Ontario 301Learning Activity 13.4 USA.Gov 302E-government 30214 Information and Knowledge for Business Decision Making 309Focusing Story: Managing Knowledge by Texting 310Learning Activity 14.1 How You Manage Knowledge 311Knowledge Management 312Why Managing Knowledge is Important 312Types of Knowledge 313Types of Knowledge Resources 314Main Processes for Knowledge Management 314Creating Knowledge 315Capturing and Codifying Knowledge 316Business Box The Issue of Trust in Knowledge Management 318Storing and Retrieving Knowledge 318Transferring and Applying Knowledge 319Learning Activity 14.2 Wikis for Managing Knowledge 319Knowledge Management Technologies 320Repositories 320Communication-based Tools 320Stats Box Linkedin Groups as Communities of Practice 321Executive Information Systems and Dashboards 321Expert Systems 321Learning Activity 14.3 Using a Decision Support System 323Decision Support Systems and Group Decision Support Systems 323Business Intelligence 326Data Warehousing 327Data Mining 328Learning Activity 14.4 Making Ethical Decisions 332Ethical Decision-Making 332Index 339Online In-Depth Guides (posted at the Instructor and Student Companion Sites: www.wiley.com/college/belanger)1. Hardware2. Software3. Networking Basics4. Advanced database concepts5. Spreadsheets6. Funding information systems7. Managing projects8. Advanced security privacy and risk management

最近チェックした商品