| |
| |
| |
Introduction to Information Systems | |
| |
| |
| |
Why Should I Study Information Systems? | |
| |
| |
| |
Overview of Computer-Based Information Systems | |
| |
| |
| |
How Does IT Impact Organizations? | |
| |
| |
| |
Importance of Information Systems to Society | |
| |
| |
| |
Organizational Strategy, Competitive Advantage, and Information Systems | |
| |
| |
| |
Business Processes | |
| |
| |
| |
Business Process Reengineering and Business Process Management | |
| |
| |
| |
Business Pressures, Organizational Responses, and Information Technology Support | |
| |
| |
| |
Competitive Strategy and Strategic Information Systems | |
| |
| |
| |
Business-Information Technology Alignment | |
| |
| |
| |
Ethics and Privacy | |
| |
| |
| |
Ethical Issues | |
| |
| |
| |
Privacy | |
| |
| |
| |
Information Security | |
| |
| |
| |
Introduction to Information Security | |
| |
| |
| |
Unintentional Threats to Information Systems | |
| |
| |
| |
Deliberate Threats to Information Systems | |
| |
| |
| |
What Organizations Are Doing to Protect Information Resources | |
| |
| |
| |
Information Security Controls | |
| |
| |
| |
Data and Knowledge Management | |
| |
| |
| |
Managing Data | |
| |
| |
| |
The Database Approach | |
| |
| |
| |
Database Management Systems | |
| |
| |
| |
Data Warehouses and Data Marts | |
| |
| |
| |
Knowledge Management | |
| |
| |
| |
Networks | |
| |
| |
| |
What Is a Computer Network? | |
| |
| |
| |
Network Fundamentals | |
| |
| |
| |
The Internet and the World Wide Web | |
| |
| |
| |
Network Applications | |
| |
| |
| |
E-Business and E-Commerce | |
| |
| |
| |
Overview of E-Business and E-Commerce | |
| |
| |
| |
Business-to-Consumer (B2C) Electronic Commerce | |
| |
| |
| |
Business-to-Business (B2B) Electronic Commerce | |
| |
| |
| |
Electronic Payments | |
| |
| |
| |
Ethical and Legal Issues in E-Business | |
| |
| |
| |
Wireless, Mobile Computing, and Mobile Commerce | |
| |
| |
| |
Wireless Technologies | |
| |
| |
| |
Wireless Computer Networks and Internet Access | |
| |
| |
| |
Mobile Computing and Mobile Commerce | |
| |
| |
| |
Pervasive Computing | |
| |
| |
| |
Wireless Security | |
| |
| |
| |
Web 2.0 and Social Networks | |
| |
| |
| |
Web 2.0 Underlying Technologies | |
| |
| |
| |
Web 2.0 Applications | |
| |
| |
| |
Categories of Web 2.0 Sites | |
| |
| |
| |
Information Systems within the Organization | |
| |
| |
| |
Transaction Processing Systems | |
| |
| |
| |
Functional Area Information Systems | |
| |
| |
| |
Enterprise Resource Planning Systems | |
| |
| |
| |
Reports | |
| |
| |
| |
Customer Relationship Management and Supply Chain Management | |
| |
| |
| |
Defining Customer Relationship Management | |
| |
| |
| |
Operational Customer Relationship Management Systems | |
| |
| |
| |
Analytical Customer Relationship Management Systems | |
| |
| |
| |
Other Types of Customer Relationship Management Systems | |
| |
| |
| |
Supply Chains | |
| |
| |
| |
Supply Chain Management | |
| |
| |
| |
Information Technology Support for Supply Chain Management | |
| |
| |
| |
Business Intelligence | |
| |
| |
| |
Managers and Decision Making | |
| |
| |
| |
What Is Business Intelligence? | |
| |
| |
| |
Business Intelligence Applications for Data Analysis | |
| |
| |
| |
Business Intelligence Applications for Presenting Results | |
| |
| |
| |
Business Intelligence in Action: Corporate Performance Management | |
| |
| |
| |
Acquiring Information Systems and Applications | |
| |
| |
| |
Planning for and Justifying IT Applications | |
| |
| |
| |
Strategies for Acquiring IT Applications | |
| |
| |
| |
The Traditional Systems Development Life Cycle | |
| |
| |
| |
Alternative Methods and Tools for Systems Development | |
| |
| |
| |
Vendor and Software Selection | |
| |
| |
Technology | |
| |
| |
Guide | |
| |
| |
| |
Hardware | |
| |
| |
| |
Introduction | |
| |
| |
| |
Strategic Hardware Issues | |
| |
| |
| |
Computer Hierarchy | |
| |
| |
| |
Input and Output Technologies | |
| |
| |
| |
The Central Processing Unit | |
| |
| |
Technology | |
| |
| |
Guide | |
| |
| |
| |
Software | |
| |
| |
| |
Introduction to Software | |
| |
| |
| |
Software Issues | |
| |
| |
| |
Systems Software | |
| |
| |
| |
Application Software | |
| |
| |
Technology | |
| |
| |
Guide | |
| |
| |
| |
Emerging Types of Enterprise Computing | |
| |
| |
| |
Introduction | |
| |
| |
| |
Server Farms | |
| |
| |
| |
Virtualization | |
| |
| |
| |
Grid Computing | |
| |
| |
| |
Utility Computing | |
| |
| |
| |
Cloud Computing | |
| |
| |
| |
Emerging Software Trends | |
| |
| |
Technology | |
| |
| |
Guide | |
| |
| |
| |
Intelligent Systems | |
| |
| |
| |
Introduction to Intelligent Systems | |
| |
| |
| |
Expert Systems | |
| |
| |
| |
Neural Networks | |
| |
| |
| |
Fuzzy Logic | |
| |
| |
| |
Genetic Algorithms | |
| |
| |
| |
Intelligent Agents | |
| |
| |
Technology | |
| |
| |
Guide | |
| |
| |
| |
Protecting Your Information Assets | |
| |
| |
| |
Introduction | |
| |
| |
| |
Behavioral Actions to Protect Your Information Assets | |
| |
| |
| |
Computer-Based Actions to Protect Your Information Assets | |
| |
| |
Index | |