Mallach, Efrem G.

Information Systems : What Every Business Student Needs to Know, Second Edition. - 2nd ed. - 1 online resource (391 pages) - Chapman and Hall/CRC Textbooks in Computing Series . - Chapman and Hall/CRC Textbooks in Computing Series .

Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Chapter 1 Why Information Systems Matter in Business-And to You -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 1.1 The Value of Information -- Scenario 1 -- Possible Outcome A -- Possible Outcome B -- Scenario 2 -- Possible Outcome A -- Possible Outcome B -- Scenario 3 -- Possible Outcome A -- Possible Outcome B -- What This Means -- 1.2 Systems and Information Systems -- 1.3 What Is Information, Really? -- Definitions -- How These Work -- Information Quality -- Correctness -- Accuracy -- Precision -- Timeliness -- Consistency -- Conformity to Needs and Expectations -- Completeness -- Cost -- In a Nutshell -- 1.4 Legal and Ethical Information Use -- Using a Computer, or Information, as a Tool to Commit a Crime -- Using a Computer, or Information, as the Object of a Crime -- Using Information Unethically -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors, Inc. -- Khoury Candy Distributors Background -- KCD Today -- KCD's Information Systems -- KCD People -- Questions -- Case 1: Trusting a Spreadsheet -- Questions -- Case 2: Lynn McCallum, MD -- Questions -- Bibliography -- Chapter 2 The Role of Information Systems in Business -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 2.1 A Perspective on Information Systems -- 2.2 Competitive Strategies -- 2.3 The Five Basic Competitive Forces -- Rivalry among Existing Competitors -- The Impact of the Internet and the Web on Rivalry among Existing Competitors -- Bargaining Power of Customers -- The Impact of the Internet and the Web on the Bargaining Power of Customers -- Bargaining Power of Suppliers -- The Impact of the Internet and the Web on the Bargaining Power of Suppliers -- Threat of New Entrants. The Impact of the Internet and the Web on the Threat of New Entrants -- Threat of Substitute Products or Services -- The Impact of the Internet and the Web on the Threat of Substitute Products and Services -- 2.4 The Value Chain -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors: Strategy, Value Chain, Competitive Advantage -- Questions -- Case 1: Using Social Media to Compete -- Questions -- Case 2: Pharmacy Processes and Faxing -- Questions -- Bibliography -- Chapter 3 Information Systems Hardware -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 3.1 Computer Structure -- 3.2 Switches: The Basic Hardware Building Blocks -- 3.3 Computer System Components -- Central Processor -- Hardware Evolution -- Processor Clock Speed -- Multiple Cores, Multiple Threads -- Specialized Processors -- Primary Storage -- Secondary Storage -- Rotating Magnetic Disks -- Optical Disks -- Solid-State Storage -- Magnetic Tape Storage -- Enterprise Storage Subsystems -- Cloud Storage -- Input Devices -- Output Devices -- Displays (Monitors) -- Printers -- Other -- 3.4 Computer Categories -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors Hardware -- Questions -- Case 1: The Green Grid Measures Energy Efficiency -- Questions -- Case 2: Meltin'Pot Deploys Blade Servers -- Questions -- Bibliography -- Chapter 4 Information Systems Software -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 4.1 Software Concepts -- Writing Software -- Open-Source Software -- 4.2 System Software -- Operating System -- Defining the User Interface -- Managing Shared Resources -- Providing Shared Services -- Other System Software -- 4.3 Application Software -- Horizontal versus Vertical Applications -- Off-the-Shelf versus Custom Applications. Open-Source Applications -- 4.4 Embedded Software -- 4.5 Trends in Computing -- Virtualization -- Client/Server Computing -- Cloud Computing -- Artificial Intelligence -- 4.6 Software Licensing -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors Software -- Questions -- Case 1: Security through Open Source -- Questions -- Case 2: Rescuing Food -- Questions -- Bibliography -- Chapter 5 Data, Databases, and Database Management -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 5.1 The Database Concept -- 5.2 Operational Databases -- Relational Database Concepts -- An Example: MyVid Video Site -- Flat Files -- Normalization -- Entity-Relationship Diagramming -- Distributed Databases -- 5.3 Databases for Decision Making -- Dimensional Databases -- "Big Data" -- Hadoop -- 5.4 Database Management Software -- 5.5 Database Security -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors Databases -- Questions -- Case 1: Netflix Moves to Cassandra -- Questions -- Case 2: Homeless in Los Angeles -- Questions -- Bibliography -- Chapter 6 Information Networks -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 6.1 Communication Links and Networks -- 6.2 Communication Links and Devices -- Physical Communication Links -- Wireless Communication Links -- One-Way or Two-Way? -- 6.3 Local Area Networks -- Wired LANs -- Wi-Fi -- Wi-Fi Privacy and Security -- Other Wireless LANs -- Bluetooth -- Radio Frequency ID -- Near Field Communication -- ZigBee -- Personal Area Networks -- 6.4 Wide Area Networks and the Internet -- Packet Switching -- Alternative Switching Methods -- 6.5 Internet Applications -- The World Wide Web -- Web 1.0 -- Web 2.0 -- Streaming -- Internet Telephony -- Streaming Video -- Teleconferencing. Net Neutrality -- The Internet of Things -- Other Internet Applications -- Email -- File Transfer -- Other -- 6.6 Network Security -- Human Aspects of Network Security -- Phishing -- Stolen Email Address Lists -- Ransomware -- Pharming -- Identity Theft -- Privacy -- Security and the Internet of Things -- A Totally Secure System? -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors Networks -- Questions -- Case 1: Connecting Remotest Michigan -- Questions -- Case 2: Helping Mothers Have Healthy Babies in Ghana -- Questions -- Bibliography -- Chapter 7 Integrating the Organization -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 7.1 Ancient History: Information Silos -- 7.2 Functional Information Systems -- Accounting -- Finance -- Sales -- Marketing -- Human Resources -- Purchasing -- Production -- Research and Development -- 7.3 Transaction Processing -- Data Validation -- Batch versus Online Transaction Processing -- 7.4 Enterprise Resource Planning Systems -- Enterprise Resource Planning (ERP) Software -- Business Processes -- Approaches to Using ERP -- Benefits of ERP -- Concerns with ERP -- Business Process Re-Engineering -- 7.5 Enterprise Application Integration (EAI) -- ERP or EAI? -- 7.6 Intranets -- Intranets and the Internet of Things -- 7.7 Integrating Society -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors Chooses an ERP System -- Questions -- Case 1: City of Edinburgh Modernizes -- Questions -- Case 2: Serenic Accounting Software -- Questions -- Bibliography -- Chapter 8 Connecting with Customers and Suppliers -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 8.1 E-Business and E-Commerce -- Categories of E-Commerce and E-Business -- Business-to-Consumer -- Business-to-Business. Consumer-to-Consumer -- Government-to-Consumer -- Government-to-Business -- Finding an E-Commerce Site -- Portals -- Auctions -- Reverse Auctions -- Exchanges -- Getting into E-Commerce -- Mobile Commerce (M-Commerce) -- Mobile Payments -- E-Commerce Issues -- Getting the Word Out -- Disintermediation -- Channel Conflict -- Fulfillment -- Taxation -- 8.2 Customer Relationship Management -- Operational CRM -- Level 1: Contact Management -- Level 2: Sales Management -- Level 3: Opportunity Management -- Regaining the Personal Touch via Operational CRM -- Analytical CRM -- The RFM Method -- Customer Data Strategies -- 8.3 Connecting through Social Networks -- 8.4 Supply Chain Management -- Electronic Ordering -- Providing Insight -- SCM Dashboard -- Automatic Replenishment -- Supply Chain Control Tower -- The Bullwhip Effect -- 8.5 Extranets -- Key Point Recap -- Key Terms -- Review Questions -- Discussion Questions -- Khoury Candy Distributors Customer Segmentation -- Questions -- Case 1: AliMed EDI -- Questions -- Case 2: The Risky Supply Chain -- Questions -- References -- Chapter 9 Making Better Decisions -- Chapter Outline -- Why This Chapter Matters -- Chapter Take-Aways -- 9.1 Decision-Making Concepts -- The Decision-Making System -- Decision Phases -- Decision Structure -- Decision Scope -- Strategic Decisions -- Tactical (Managerial Control) Decisions -- Operational Decisions -- Relationship among Decisions of Different Scope -- Putting the Concepts Together -- 9.2 Model-Driven Decisions -- Simulation Studies -- Simulation Example -- The Simulation Process -- Artificial Intelligence -- 9.3 Data-Driven Decisions -- OLAP -- Data Mining -- Predictive Analytics -- 9.4 Group Decisions -- Group Support Software for the Decision-Making Process -- Group Support Software for Group Communication -- Concerns with Group Decision Making -- 9.5 Dashboards. Key Point Recap.

9780429590436


Management information systems.


Electronic books.

HD30.213 / .M355 2020

658.40380110000001