| |
| |
Preface | |
| |
| |
| |
Introduction | |
| |
| |
| |
The Value of Information | |
| |
| |
Focusing Story: How Information Cost Me (A Lot of) Money | |
| |
| |
| |
A Day in My Technology-Free Life Blog | |
| |
| |
Data Information Knowledge and Wisdom | |
| |
| |
Information Literacy | |
| |
| |
Uses of Information | |
| |
| |
| |
How I Use Information | |
| |
| |
| |
How Businesses Use Information | |
| |
| |
Business Box Promising Information Careers | |
| |
| |
Information and Your Career | |
| |
| |
| |
Introduction to Information Systems | |
| |
| |
Focusing Story: Registering for Classes in 1981 | |
| |
| |
| |
Identifying My Information Systems | |
| |
| |
Why All Business Professionals Need to Be IS Managers | |
| |
| |
| |
Components of a System | |
| |
| |
Overview of Systems | |
| |
| |
| |
Components of a Business Information System | |
| |
| |
Foundations of Information Systems | |
| |
| |
Stats Box Growth of Applications in Apple���s App Store | |
| |
| |
How Information Systems Help Us Deal with Information | |
| |
| |
Business Box How Southwest Airlines Flies High with Information Systems | |
| |
| |
| |
Information Systems and Change | |
| |
| |
How Information Systems Facilitate Organizational Change | |
| |
| |
Process Improvements | |
| |
| |
Automation | |
| |
| |
Control | |
| |
| |
Information Flow | |
| |
| |
Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability | |
| |
| |
Common Information Systems | |
| |
| |
| |
Evaluating Information | |
| |
| |
Focusing Story: Biased Information in a Trusted Outlet | |
| |
| |
| |
How Good is This Information? | |
| |
| |
Being a Smart Information Consumer | |
| |
| |
Stats Box | |
| |
| |
Business Box Resume Fraud | |
| |
| |
| |
My Online Life and Information Overload | |
| |
| |
Information Overload and the Need to Evaluate Information | |
| |
| |
| |
Dimensions of Information Quality | |
| |
| |
Information Quality | |
| |
| |
Business Box Information Quality as an Ethical Issue | |
| |
| |
| |
Evaluating Information Sources | |
| |
| |
Evaluating Information | |
| |
| |
Evaluating Usefulness | |
| |
| |
Evaluating Believability | |
| |
| |
| |
Gaining Strategic Value from Information | |
| |
| |
Focusing Story: Healthcare on My Cell Phone | |
| |
| |
Strategic Information Systems | |
| |
| |
Strategic Planning Process | |
| |
| |
| |
Strategic Business Planning | |
| |
| |
Stats Box | |
| |
| |
| |
Information Systems Assessment | |
| |
| |
| |
Information Systems Vision | |
| |
| |
| |
Information Systems Architecture | |
| |
| |
| |
Strategic Initiatives Identification | |
| |
| |
Advantages of IS Strategic Planning Process | |
| |
| |
Frameworks for Strategic Information Systems | |
| |
| |
Information Systems SWOT Analysis | |
| |
| |
SWOT Analysis of a Person? | |
| |
| |
Porter���s Five Competitive Forces Model | |
| |
| |
Porter���s Value Chain Analysis | |
| |
| |
Virtual Value Chain | |
| |
| |
Evaluating Strategic Initiatives | |
| |
| |
Critical Success Factors | |
| |
| |
CSFS for Implementing Web Portals in Saudi Arabia | |
| |
| |
| |
What Does Yahoo! Need for Success? | |
| |
| |
Priority Matrix | |
| |
| |
| |
Competitive Advantage at Outrigger Hotels and Resorts | |
| |
| |
Hyper-competition: Sustainability of Competitive Advantage | |
| |
| |
| |
Google Vs. Yahoo! | |
| |
| |
| |
Managing Information | |
| |
| |
| |
Storing and Organizing Information | |
| |
| |
Focusing Story: The Database Behind Facebook | |
| |
| |
| |
Data for an Amazon Order | |
| |
| |
Stats Box | |
| |
| |
Overview of Relational Databases | |
| |
| |
Databases and Database Management Systems | |
| |
| |
| |
Connecting Data Elements | |
| |
| |
Databases vs. Spreadsheets (When to Use a DBMS) | |
| |
| |
Relational Databases | |
| |
| |
Database Diagrams | |
| |
| |
| |
Finding Business Databases Online | |
| |
| |
The Compact Disc Database (CDDB) | |
| |
| |
Online Databases | |
| |
| |
| |
Analyzing Information for Business Decision-Making | |
| |
| |
Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money | |
| |
| |
| |
Information and Decision-Making | |
| |
| |
Importance of Good Decision-Making Skills | |
| |
| |
| |
What Kind of Information Do I Need? | |
| |
| |
Using Information for Decision-Making | |
| |
| |
Business Box Why Do Managers Make Bad Decisions? | |
| |
| |
Types of Decisions | |
| |
| |
A Decision-Making Process | |
| |
| |
Identify and Clearly Define the Problem | |
| |
| |
Determine Requirements and Goals | |
| |
| |
Identify Alternatives | |
| |
| |
Define the Criteria | |
| |
| |
| |
Requirements Goals and Criteria | |
| |
| |
Select a Decision-Making Technique/tool | |
| |
| |
Evaluate the Alternatives Using the Criteria | |
| |
| |
Check That the Solution Solves the Problem | |
| |
| |
Information Retrieval and Analysis Tools | |
| |
| |
| |
"What If " I Get a 75% on the Final? | |
| |
| |
Stats Box The Cost of Spreadsheet Errors | |
| |
| |
| |
What- If? Analysis in Business | |
| |
| |
| |
Transmitting Information | |
| |
| |
Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi | |
| |
| |
Introduction and Definitions | |
| |
| |
| |
Online Document Sharing | |
| |
| |
Network Components and Characteristics | |
| |
| |
Types of Networks | |
| |
| |
Wired vs. Wireless Networks | |
| |
| |
Broadband Networks | |
| |
| |
| |
Broadband Penetration in the G7 Countries | |
| |
| |
Network Coverage | |
| |
| |
The Internet | |
| |
| |
Internet Applications | |
| |
| |
Stats Box | |
| |
| |
| |
Internet Application of the Day: Get a Degree Online! | |
| |
| |
Internet vs. Intranet | |
| |
| |
Virtual Private Network (VPN) | |
| |
| |
| |
A Future Internet? Internet2 and Business | |
| |
| |
Networking Architectures | |
| |
| |
Architectural Principles | |
| |
| |
Client/Server Architecture | |
| |
| |
Peer-to-Peer Architecture | |
| |
| |
Wireless Architecture | |
| |
| |
Service Oriented Architecture (SOA) | |
| |
| |
Software as a Service (SaaS) | |
| |
| |
Cloud Computing | |
| |
| |
Virtualization | |
| |
| |
| |
Architecture and Principles | |
| |
| |
Communicating Information in Modern Organizations | |
| |
| |
Web 2.0 | |
| |
| |
Unified Communications (UC) | |
| |
| |
The Power of Wikinomics | |
| |
| |
Stats Box | |
| |
| |
| |
Web 2.0 for Business | |
| |
| |
Web 3.0 | |
| |
| |
| |
Securing Information | |
| |
| |
Focusing Story: My Mac is More Secured than Your Windows-based PC! | |
| |
| |
Introduction and Definitions | |
| |
| |
Information Security Concepts | |
| |
| |
Security Levels | |
| |
| |
| |
How Protected is Your Computer? | |
| |
| |
Information Security Threats | |
| |
| |
Denial of Service | |
| |
| |
Unauthorized Access | |
| |
| |
Stats Box | |
| |
| |
| |
Even Big Technology Companies Can be Hacked | |
| |
| |
| |
Detecting Phishing | |
| |
| |
Theft and Fraud | |
| |
| |
Summary of Security Threats | |
| |
| |
Security Technologies and Solutions | |
| |
| |
Security Goals | |
| |
| |
Preventive Corrective and Detective Controls | |
| |
| |
Physical Security vs. Logical Security | |
| |
| |
User Profiles | |
| |
| |
| |
How Strong is Your Password? | |
| |
| |
Biometrics | |
| |
| |
Firewalls | |
| |
| |
Rendering Data Unreadable: Encryption | |
| |
| |
| |
Breaking the Encryption | |
| |
| |
Types of Cryptography | |
| |
| |
Virus Protection | |
| |
| |
Wireless Security | |
| |
| |
Stats Box | |
| |
| |
Security Policies | |
| |
| |
Business Box 2 How to Respond to a Security Crisis | |
| |
| |
| |
Security Policies Compliance | |
| |
| |
| |
Where���s the Security? | |
| |
| |
Risk Management | |
| |
| |
| |
Protecting the Confidentiality and Privacy of Information | |
| |
| |
Focusing Story: The Reselling of Customer Data: The Choicepoint Story | |
| |
| |
| |
Finding Mindy��� | |
| |
| |
Information Privacy Threats | |
| |
| |
Data Collection | |
| |
| |
Secondary Use of Information | |
| |
| |
| |
Privacy Pizza | |
| |
| |
| |
Concern for Information Privacy | |
| |
| |
Consequences of Privacy Violations | |
| |
| |
Individual Consequences: Identify Theft | |
| |
| |
| |
Fraud Type from Identity Theft | |
| |
| |
Organizational Consequences: Company Reputation | |
| |
| |
| |
Reputation Risks of Social Networking | |
| |
| |
Technologies and Solutions for Information Privacy | |
| |
| |
| |
Surveillance Societies Around the World | |
| |
| |
Cookies and Cookie Managers | |
| |
| |
| |
Privacy Policy Creation | |
| |
| |
Privacy Statement or Policy | |
| |
| |
| |
Privacy and Facebook | |
| |
| |
Privacy Seals | |
| |
| |
Activity 9.4 Why Your Advisor can���t Talk to Your Parents | |
| |
| |
Government Information Privacy Regulations | |
| |
| |
| |
Hippa and Identity Theft | |
| |
| |
Privacy and Ethics | |
| |
| |
| |
Papa Privacy Policies and FERPA | |
| |
| |
Relationship between Security and Privacy | |
| |
| |
| |
Using Information | |
| |
| |
| |
Developing Information Systems | |
| |
| |
Focusing Story: The $6 Billion Software Bug | |
| |
| |
Time Cost and Quality | |
| |
| |
| |
Determining Requirements | |
| |
| |
Software Development Methodologies | |
| |
| |
Traditional Systems Development Life Cycle | |
| |
| |
Planning Phase | |
| |
| |
Requirements Phase | |
| |
| |
Design Phase | |
| |
| |
Development Phase | |
| |
| |
Implementation Phase | |
| |
| |
Maintenance Phase | |
| |
| |
| |
Advantages and Disadvantages of the SDLC | |
| |
| |
Stats Box Standish Chaos Report | |
| |
| |
Alternative Methodologies | |
| |
| |
Prototyping | |
| |
| |
Rapid Application Development (RAD) | |
| |
| |
Spiral Model | |
| |
| |
| |
Comparing the Methods | |
| |
| |
Build or Buy Decision | |
| |
| |
| |
How Open Source Software Impacts Build vs. Buy | |
| |
| |
Using Open Source in Business | |
| |
| |
Business Box Bad Economy Leads to More Open Source Software | |
| |
| |
| |
What to Outsource | |
| |
| |
Outsourcing Information Systems | |
| |
| |
Outsourcing Models | |
| |
| |
Benefits and Risks of Outsourcing | |
| |
| |
Making the Outsourcing Decision | |
| |
| |
Business Box Reversing the Outsourcing Decision | |
| |
| |
Geographic Considerations | |
| |
| |
| |
Information-Based Business Process | |
| |
| |
Focusing Story: Improving Processes is For Everyone! | |
| |
| |
| |
How Many Steps in this Process? | |
| |
| |
What Is a Process? | |
| |
| |
Process Modeling | |
| |
| |
| |
Model This! | |
| |
| |
Business Process Modeling Tools | |
| |
| |
Technology and Processes | |
| |
| |
Process Improvement | |
| |
| |
Levels of Change | |
| |
| |
| |
Importance of Process Redesign | |
| |
| |
| |
Redesign This! | |
| |
| |
| |
Choicecare Physicians: Changing Access to Patient Records | |
| |
| |
| |
Enterprise Information Systems | |
| |
| |
Focusing Story: Supply Chain Innovations at Wal-Mart | |
| |
| |
| |
Finding The Components of an Enterprise System | |
| |
| |
Enterprise Systems | |
| |
| |
Personal vs. Enterprise Systems | |
| |
| |
Integration and Enterprise Systems | |
| |
| |
Characteristics of Enterprise Systems | |
| |
| |
Enterprise Resource Planning (ERP) | |
| |
| |
Benefits and Disadvantages of ERP Systems | |
| |
| |
| |
The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List | |
| |
| |
| |
ERP is not Always a Horror Story: Cisco Implementation on Time and Budget | |
| |
| |
| |
Top Seven Selected ERP Vendors | |
| |
| |
| |
The Online Beer Game | |
| |
| |
Supply Chain Management Systems | |
| |
| |
| |
Supply Chain���s Impact on Company Valuation | |
| |
| |
| |
Customer Relationship Management | |
| |
| |
Customer Relationship Management Systems | |
| |
| |
Customer Service Life Cycle | |
| |
| |
Components of CRM | |
| |
| |
| |
Self-servicing | |
| |
| |
| |
CRM Vendors | |
| |
| |
CRM Implementation Options | |
| |
| |
| |
Not Just Technology: Training People for CRM At British Telecom | |
| |
| |
Benefits and Limitations of CRM | |
| |
| |
Customer Managed Interactions (CMI) | |
| |
| |
| |
Information for Electronic Business | |
| |
| |
Focusing Story: The iPod and The Music Industry | |
| |
| |
| |
Why is E-business Important? | |
| |
| |
Introduction to E-business | |
| |
| |
Types of E-businesses | |
| |
| |
| |
Retail E-commerce in The United States | |
| |
| |
E-business Models | |
| |
| |
What is a Business Model? | |
| |
| |
B2C E-business Models | |
| |
| |
| |
Changing The Business Model: Furniture.com | |
| |
| |
B2C E-business Enablers | |
| |
| |
Technological Enablers | |
| |
| |
Critical Mass | |
| |
| |
B2C E-business Impacts | |
| |
| |
E-channel Compression (Disintermediation) | |
| |
| |
E-channel Expansion | |
| |
| |
| |
Why Would I Trust them or Buy from Them? | |
| |
| |
Design for B2C E-Business | |
| |
| |
Business-to-Business (B2B) | |
| |
| |
| |
B2B vs. B2C E-business | |
| |
| |
B2B E-business Models | |
| |
| |
| |
Where is My Web Page? | |
| |
| |
Search Engine Optimization | |
| |
| |
Trends in E-business | |
| |
| |
Mobile Business | |
| |
| |
| |
Mobile Behaviors | |
| |
| |
Global e-Business | |
| |
| |
| |
E-business in Ontario | |
| |
| |
| |
USA.Gov | |
| |
| |
E-government | |
| |
| |
| |
Information and Knowledge for Business Decision Making | |
| |
| |
Focusing Story: Managing Knowledge by Texting | |
| |
| |
| |
How You Manage Knowledge | |
| |
| |
Knowledge Management | |
| |
| |
Why Managing Knowledge is Important | |
| |
| |
Types of Knowledge | |
| |
| |
Types of Knowledge Resources | |
| |
| |
Main Processes for Knowledge Management | |
| |
| |
Creating Knowledge | |
| |
| |
Capturing and Codifying Knowledge | |
| |
| |
Business Box The Issue of Trust in Knowledge Management | |
| |
| |
Storing and Retrieving Knowledge | |
| |
| |
Transferring and Applying Knowledge | |
| |
| |
| |
Wikis for Managing Knowledge | |
| |
| |
Knowledge Management Technologies | |
| |
| |
Repositories | |
| |
| |
Communication-based Tools | |
| |
| |
Stats Box Linkedin Groups as Communities of Practice | |
| |
| |
Executive Information Systems and Dashboards | |
| |
| |
Expert Systems | |
| |
| |
| |
Using a Decision Support System | |
| |
| |
Decision Support Systems and Group Decision Support Systems | |
| |
| |
Business Intelligence | |
| |
| |
Data Warehousing | |
| |
| |
Data Mining | |
| |
| |
| |
Making Ethical Decisions | |
| |
| |
Ethical Decision-Making | |
| |
| |
Index | |
| |
| |
Online In-Depth Guides (posted at the Instructor and Student Companion Sites: <a href="http://coltrane.wiley.com/db/www.wiley.com/college/belanger"><u>www.wiley.com/college/belanger</u></a>) | |
| |
| |
| |
Hardware | |
| |
| |
| |
Software | |
| |
| |
| |
Networking Basics | |
| |
| |
| |
Advanced database concepts | |
| |
| |
| |
Spreadsheets | |
| |
| |
| |
Funding information systems | |
| |
| |
| |
Managing projects | |
| |
| |
| |
Advanced security privacy and risk management | |