Skip to content

Introduction to Information Systems Enabling and Transforming Business

Best in textbook rentals since 2012!

ISBN-10: 1118063341

ISBN-13: 9781118063347

Edition: 4th 2012

Authors: R. Kelly Rainer, Casey G. Cegielski

List price: $160.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Rainer & Cegielski's new edition of Introduction to Information Systems: Enabling and Transforming Business includes updated coverage, refined cases, more illustrations, and a new "Weekly Updates" resource. Its concise chapters, many cases and examples, and online quizzing provide smooth and straightforward information and provide many hands-on activities.  In general, the text is more engaging, compelling and relevant with a broader table of contents, pedagogically innovative structure, integrated activities, Excel and Access projects, and integration with WileyPLUS. 
Customers also bought

Book details

List price: $160.95
Edition: 4th
Copyright year: 2012
Publisher: John Wiley & Sons, Incorporated
Publication date: 1/11/2012
Binding: Paperback
Pages: 480
Size: 8.50" wide x 10.00" long x 0.75" tall
Weight: 1.738
Language: English

Introduction to Information Systems
Why Should I Study Information Systems?
Overview of Computer-Based Information Systems
How Does IT Impact Organizations?
Importance of Information Systems to Society
Organizational Strategy, Competitive Advantage, and Information Systems
Business Processes
Business Process Reengineering and Business Process Management
Business Pressures, Organizational Responses, and Information Technology Support
Competitive Strategy and Strategic Information Systems
Business-Information Technology Alignment
Ethics and Privacy
Ethical Issues
Privacy
Information Security
Introduction to Information Security
Unintentional Threats to Information Systems
Deliberate Threats to Information Systems
What Organizations Are Doing to Protect Information Resources
Information Security Controls
Data and Knowledge Management
Managing Data
The Database Approach
Database Management Systems
Data Warehouses and Data Marts
Knowledge Management
Networks
What Is a Computer Network?
Network Fundamentals
The Internet and the World Wide Web
Network Applications
E-Business and E-Commerce
Overview of E-Business and E-Commerce
Business-to-Consumer (B2C) Electronic Commerce
Business-to-Business (B2B) Electronic Commerce
Electronic Payments
Ethical and Legal Issues in E-Business
Wireless, Mobile Computing, and Mobile Commerce
Wireless Technologies
Wireless Computer Networks and Internet Access
Mobile Computing and Mobile Commerce
Pervasive Computing
Wireless Security
Web 2.0 and Social Networks
Web 2.0 Underlying Technologies
Web 2.0 Applications
Categories of Web 2.0 Sites
Information Systems within the Organization
Transaction Processing Systems
Functional Area Information Systems
Enterprise Resource Planning Systems
Reports
Customer Relationship Management and Supply Chain Management
Defining Customer Relationship Management
Operational Customer Relationship Management Systems
Analytical Customer Relationship Management Systems
Other Types of Customer Relationship Management Systems
Supply Chains
Supply Chain Management
Information Technology Support for Supply Chain Management
Business Intelligence
Managers and Decision Making
What Is Business Intelligence?
Business Intelligence Applications for Data Analysis
Business Intelligence Applications for Presenting Results
Business Intelligence in Action: Corporate Performance Management
Acquiring Information Systems and Applications
Planning for and Justifying IT Applications
Strategies for Acquiring IT Applications
The Traditional Systems Development Life Cycle
Alternative Methods and Tools for Systems Development
Vendor and Software Selection
Technology
Guide
Hardware
Introduction
Strategic Hardware Issues
Computer Hierarchy
Input and Output Technologies
The Central Processing Unit
Technology
Guide
Software
Introduction to Software
Software Issues
Systems Software
Application Software
Technology
Guide
Emerging Types of Enterprise Computing
Introduction
Server Farms
Virtualization
Grid Computing
Utility Computing
Cloud Computing
Emerging Software Trends
Technology
Guide
Intelligent Systems
Introduction to Intelligent Systems
Expert Systems
Neural Networks
Fuzzy Logic
Genetic Algorithms
Intelligent Agents
Technology
Guide
Protecting Your Information Assets
Introduction
Behavioral Actions to Protect Your Information Assets
Computer-Based Actions to Protect Your Information Assets
Index