Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Systems for Business - France Bélanger  PhD, Craig Van Slyke

Information Systems for Business

An Experiential Approach
Buch | Softcover
368 Seiten
2012
John Wiley & Sons Ltd (Verlag)
978-0-470-90372-8 (ISBN)
CHF 136,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Belanger & Van Slyke′s
Information Systems: A Practical Introduction offers a "learner–centered" approach featuring the model "learn–do–reflect. " The chapters provide very short, focused treatment of the topics and then offer engaging activities for every topic.
A focused delivery on information systems
Featuring the model "learn–do–reflect", this invaluable book offers a focused treatment of information systems topics. Packed with engaging exercises throughout the book to enhance your learning, the book aims at looking at how information is analyzed, used for competitive advantage, stored, and more. Each chapter serves as a short, focused examination of the covered topic and includes activities to drive home the material. Also included is an online instructor′s web site that provides extensive support to teach with this approach.




Offers a focused look at information systems and how information is analyzed, used for competitive advantage, and stored
Includes helpful exercises in each chapter that drill down the lessons learned
Reflects the "learn–do–reflect" teaching model
Features an instructor′s web site that provides extensive support


This valuable book offers a practical approach to learning the capabilities and potential of information systems.

Preface xv
SECTION I INTRODUCTION


1 The Value of Information 1


Focusing Story: How Information Cost Me (A Lot of) Money 2


Learning Activity 1.1 A Day in My Technology–Free Life Blog 3


Data Information Knowledge and Wisdom 3


Information Literacy 5


Uses of Information 5


Learning Activity 1.2 How I Use Information 6


Learning Activity 1.3 How Businesses Use Information 7


Business Box Promising Information Careers 7


Information and Your Career 8


2 Introduction to Information Systems 13


Focusing Story: Registering for Classes in 1981 14


Learning Activity 2.1 Identifying My Information Systems 15


Why All Business Professionals Need to Be IS Managers 15


Learning Activity 2.2 Components of a System 16


Overview of Systems 16


Learning Activity 2.3 Components of a Business Information System 18


Foundations of Information Systems 18


Stats Box Growth of Applications in Apple’s App Store 22


How Information Systems Help Us Deal with Information 22


Business Box How Southwest Airlines Flies High with Information Systems 24


Learning Activity 2.4 Information Systems and Change 25


How Information Systems Facilitate Organizational Change 25


Process Improvements 25


Automation 26


Control 26


Information Flow 26


Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability 27


Common Information Systems 28


3 Evaluating Information 33


Focusing Story: Biased Information in a Trusted Outlet 34


Learning Activity 3.1 How Good is This Information? 35


Being a Smart Information Consumer 35


Stats Box 36


Business Box Resume Fraud 36


Learning Activity 3.2 My Online Life and Information Overload 37


Information Overload and the Need to Evaluate Information 38


Learning Activity 3.3 Dimensions of Information Quality 39


Information Quality 40


Business Box Information Quality as an Ethical Issue 42


Learning Activity 3.4 Evaluating Information Sources 43


Evaluating Information 43


Evaluating Usefulness 44


Evaluating Believability 45


4 Gaining Strategic Value from Information 51


Focusing Story: Healthcare on My Cell Phone 52


Strategic Information Systems 53


Strategic Planning Process 54


Step 1: Strategic Business Planning 54


Stats Box 55


Step 2: Information Systems Assessment 55


Step 3: Information Systems Vision 56


Step 4: Information Systems Architecture 56


Step 5: Strategic Initiatives Identification 57


Advantages of IS Strategic Planning Process 57


Frameworks for Strategic Information Systems 58


Information Systems SWOT Analysis 58


SWOT Analysis of a Person? 59


Porter’s Five Competitive Forces Model 60


Porter’s Value Chain Analysis 60


Virtual Value Chain 62


Evaluating Strategic Initiatives 64


Critical Success Factors 64


CSFS for Implementing Web Portals in Saudi Arabia 65


Learning Activity 4.1 What Does Yahoo! Need for Success? 66


Priority Matrix 66


Learning Activity 4.2 Competitive Advantage at Outrigger Hotels and Resorts 67


Hyper–competition: Sustainability of Competitive Advantage 67


Learning Activity 4.3 Google Vs. Yahoo! 69


SECTION II MANAGING INFORMATION


5 Storing and Organizing Information 75


Focusing Story: The Database Behind Facebook 76


Learning Activity 5.1 Data for an Amazon Order 77


Stats Box 77


Overview of Relational Databases 77


Databases and Database Management Systems 77


Learning Activity 5.2 Connecting Data Elements 78


Databases vs. Spreadsheets (When to Use a DBMS) 78


Relational Databases 79


Database Diagrams 83


Learning Activity 5.3 Finding Business Databases Online 84


The Compact Disc Database (CDDB) 84


Online Databases 85


6 Analyzing Information for Business Decision–Making 91


Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money 92


Learning Activity 6.1 Information and Decision–Making 93


Importance of Good Decision–Making Skills 93


Learning Activity 6.2 What Kind of Information Do I Need? 94


Using Information for Decision–Making 94


Business Box Why Do Managers Make Bad Decisions? 95


Types of Decisions 95


A Decision–Making Process 97


Identify and Clearly Define the Problem 97


Determine Requirements and Goals 98


Identify Alternatives 99


Define the Criteria 99


Learning Activity 6.3 Requirements Goals and Criteria 99


Select a Decision–Making Technique/tool 100


Evaluate the Alternatives Using the Criteria 101


Check That the Solution Solves the Problem 102


Information Retrieval and Analysis Tools 102


Learning Activity 6.4 "What If " I Get a 75% on the Final? 103


Stats Box The Cost of Spreadsheet Errors 106


Learning Activity 6.5 What– If? Analysis in Business 107


7 Transmitting Information 113


Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi 114


Introduction and Definitions 115


Learning Activity 7.1 Online Document Sharing 116


Network Components and Characteristics 116


Types of Networks 117


Wired vs. Wireless Networks 117


Broadband Networks 118


Stats Box 1 Broadband Penetration in the G7 Countries 119


Network Coverage 120


The Internet 121


Internet Applications 122


Stats Box 123


Business Box 1 Internet Application of the Day: Get a Degree Online! 124


Internet vs. Intranet 125


Virtual Private Network (VPN) 125


Learning Activity 7.2 A Future Internet? Internet2 and Business 125


Networking Architectures 126


Architectural Principles 126


Client/Server Architecture 126


Peer–to–Peer Architecture 128


Wireless Architecture 128


Service Oriented Architecture (SOA) 128


Software as a Service (SaaS) 129


Cloud Computing 130


Virtualization 130


Learning Activity 7.3 Architecture and Principles 130


Communicating Information in Modern Organizations 131


Web 2.0 132


Unified Communications (UC) 132


The Power of Wikinomics 134


Stats Box 135


Learning Activity 7.4 Web 2.0 for Business 136


Web 3.0 136


8 Securing Information 143


Focusing Story: My Mac is More Secured than Your Windows–based PC! 144


Introduction and Definitions 146


Information Security Concepts 146


Security Levels 146


Learning Activity 8.1 How Protected is Your Computer? 147


Information Security Threats 148


Denial of Service 148


Unauthorized Access 150


Stats Box 151


Business Box 1 Even Big Technology Companies Can be Hacked 153


Learning Activity 8.2 Detecting Phishing 154


Theft and Fraud 154


Summary of Security Threats 155


Security Technologies and Solutions 157


Security Goals 157


Preventive Corrective and Detective Controls 157


Physical Security vs. Logical Security 158


User Profiles 158


Learning Activity 8.3 How Strong is Your Password? 159


Biometrics 160


Firewalls 162


Rendering Data Unreadable: Encryption 166


Learning Activity 8.4 Breaking the Encryption 166


Types of Cryptography 166


Virus Protection 169


Wireless Security 169


Stats Box 170


Security Policies 170


Business Box 2 How to Respond to a Security Crisis 170


Stats Box 3 Security Policies Compliance 171


Learning Activity 8.5 Where’s the Security? 172


Risk Management 172


9 Protecting the Confidentiality and Privacy of Information 181


Focusing Story: The Reselling of Customer Data: The Choicepoint Story 182


Learning Activity 9.1 Finding Mindy’ 183


Information Privacy Threats 185


Data Collection 186


Secondary Use of Information 187


Learning Activity 9.2 Privacy Pizza 187


Stats Box 1 Concern for Information Privacy 188


Consequences of Privacy Violations 188


Individual Consequences: Identify Theft 188


Stats Box 2 Fraud Type from Identity Theft 189


Organizational Consequences: Company Reputation 190


Stats Box 3 Reputation Risks of Social Networking 191


Technologies and Solutions for Information Privacy 191


Stats Box 4 Surveillance Societies Around the World 192


Cookies and Cookie Managers 192


Learning Activity 9.3 Privacy Policy Creation 194


Privacy Statement or Policy 194


Business Box 1 Privacy and Facebook 196


Privacy Seals 197


Activity 9.4 Why Your Advisor can’t Talk to Your Parents 197


Government Information Privacy Regulations 198


Business Box 2 Hippa and Identity Theft 199


Privacy and Ethics 199


Learning Activity 9.5 Papa Privacy Policies and FERPA 200


Relationship between Security and Privacy 201


SECTION III USING INFORMATION


10 Developing Information Systems 207


Focusing Story: The $6 Billion Software Bug 208


Time Cost and Quality 209


Learning Activity 10.1 Determining Requirements 210


Software Development Methodologies 210


Traditional Systems Development Life Cycle 211


Planning Phase 212


Requirements Phase 212


Design Phase 213


Development Phase 214


Implementation Phase 214


Maintenance Phase 215


Learning Activity 10.2 Advantages and Disadvantages of the SDLC 215


Stats Box Standish Chaos Report 216


Alternative Methodologies 216


Prototyping 216


Rapid Application Development (RAD) 217


Spiral Model 218


Learning Activity 10.3 Comparing the Methods 220


Build or Buy Decision 220


Learning Activity 10.4 How Open Source Software Impacts Build vs. Buy 223


Using Open Source in Business 223


Business Box Bad Economy Leads to More Open Source Software 225


Learning Activity 10.5 What to Outsource 225


Outsourcing Information Systems 226


Outsourcing Models 226


Benefits and Risks of Outsourcing 227


Making the Outsourcing Decision 227


Business Box Reversing the Outsourcing Decision 228


Geographic Considerations 229


11 Information–Based Business Process 235


Focusing Story: Improving Processes is For Everyone! 236


Learning Activity 11.1 How Many Steps in this Process? 237


What Is a Process? 237


Process Modeling 239


Learning Activity 11.2 Model This! 240


Business Process Modeling Tools 240


Technology and Processes 242


Process Improvement 243


Levels of Change 245


Stats Box 1 Importance of Process Redesign 245


Learning Activity 11.3 Redesign This! 246


Business Box 1 Choicecare Physicians: Changing Access to Patient Records 247


12 Enterprise Information Systems 251


Focusing Story: Supply Chain Innovations at Wal–Mart 252


Learning Activity 12.1 Finding The Components of an Enterprise System 254


Enterprise Systems 254


Personal vs. Enterprise Systems 254


Integration and Enterprise Systems 256


Characteristics of Enterprise Systems 256


Enterprise Resource Planning (ERP) 258


Benefits and Disadvantages of ERP Systems 259


Business Box 1 The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List 259


Business Box 2 ERP is not Always a Horror Story: Cisco Implementation on Time and Budget 261


Stats Box 1 Top Seven Selected ERP Vendors 262


Learning Activity 12.2 The Online Beer Game 262


Supply Chain Management Systems 263


Stats Box 2 Supply Chain’s Impact on Company Valuation 265


Learning Activity 12.3 Customer Relationship Management 265


Customer Relationship Management Systems 266


Customer Service Life Cycle 266


Components of CRM 268


Learning Activity 12.4 Self–servicing 268


Stats Box 3 CRM Vendors 269


CRM Implementation Options 269


Business Box 3 Not Just Technology: Training People for CRM At British Telecom 270


Benefits and Limitations of CRM 271


Customer Managed Interactions (CMI) 272


13 Information for Electronic Business 279


Focusing Story: The iPod and The Music Industry 280


Learning Activity 13.1 Why is E–business Important? 282


Introduction to E–business 282


Types of E–businesses 282


Stats Box 1 Retail E–commerce in The United States 284


E–business Models 285


What is a Business Model? 285


B2C E–business Models 286


Business Box 1 Changing The Business Model: Furniture.com 288


B2C E–business Enablers 288


Technological Enablers 288


Critical Mass 289


B2C E–business Impacts 290


E–channel Compression (Disintermediation) 290


E–channel Expansion 291


Learning Activity 13.2 Why Would I Trust them or Buy from Them? 291


Design for B2C E–Business 292


Business–to–Business (B2B) 293


Stats Box 2 B2B vs. B2C E–business 293


B2B E–business Models 294


Learning Activity 13.3 Where is My Web Page? 296


Search Engine Optimization 296


Trends in E–business 298


Mobile Business 299


Stats Box 3 Mobile Behaviors 300


Global e–Business 301


Stats Box 4 E–business in Ontario 301


Learning Activity 13.4 USA.Gov 302


E–government 302


14 Information and Knowledge for Business Decision Making 309


Focusing Story: Managing Knowledge by Texting 310


Learning Activity 14.1 How You Manage Knowledge 311


Knowledge Management 312


Why Managing Knowledge is Important 312


Types of Knowledge 313


Types of Knowledge Resources 314


Main Processes for Knowledge Management 314


Creating Knowledge 315


Capturing and Codifying Knowledge 316


Business Box The Issue of Trust in Knowledge Management 318


Storing and Retrieving Knowledge 318


Transferring and Applying Knowledge 319


Learning Activity 14.2 Wikis for Managing Knowledge 319


Knowledge Management Technologies 320


Repositories 320


Communication–based Tools 320


Stats Box Linkedin Groups as Communities of Practice 321


Executive Information Systems and Dashboards 321


Expert Systems 321


Learning Activity 14.3 Using a Decision Support System 323


Decision Support Systems and Group Decision Support Systems 323


Business Intelligence 326


Data Warehousing 327


Data Mining 328


Learning Activity 14.4 Making Ethical Decisions 332


Ethical Decision–Making 332


Index 339


Online In–Depth Guides (posted at the Instructor and Student Companion Sites: www.wiley.com/college/belanger)


1. Hardware


2. Software


3. Networking Basics


4. Advanced database concepts


5. Spreadsheets


6. Funding information systems


7. Managing projects


8. Advanced security privacy and risk management

Verlagsort Chichester
Sprache englisch
Maße 153 x 227 mm
Gewicht 408 g
Themenwelt Informatik Office Programme Outlook
Mathematik / Informatik Informatik Theorie / Studium
ISBN-10 0-470-90372-4 / 0470903724
ISBN-13 978-0-470-90372-8 / 9780470903728
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich