Nota de contenido con formato |
CONTENIDO<br/>Module I. Foundation Concepts, 2<br/>Chapter 1. Foundations of Information Systems in Business, 3<br/>Section I: Foundation Concepts: Information Systems in Business, 4<br/>The Real World of Information Systems, 4<br/>The Fundamental Roles of IS in Business, 8<br/>Trends in Information Systems, 10<br/>The Role of e-Business in Business, 11<br/>Types of Information Systems, 13<br/>Managerial Challenges of Information Technology, 16<br/>Section II: Foundation Concepts: The Components of Information Systems, 24<br/>System Concepts: A Foundation, 24<br/>Components of an Information System, 29<br/>Information System Resources, 30<br/>Information System Activities, 33<br/>Recognizing Information Systems, 34<br/>Chapter 2. Competing with Information Technology, 43<br/>Section I: Fundamentals of Strategic Advantage, 44<br/>Strategic IT, 44<br/>Competitive Strategy Concepts, 44<br/>Strategic Uses of Information Technology, 48<br/>Building a Customer-Focused Business, 52<br/>The Value Chain and Strategic IS, 54<br/>Section II: Using Information Technology for Strategic Advantage, 56<br/>Strategic Uses of IT, 56<br/>Reengineering Business Processes, 56<br/>Becoming an Agile Company, 60<br/>Creating a Virtual Company, 62<br/>Building a Knowledge-Creating Company, 63<br/>Module II. Information Technologies, 74<br/>Chapter 3. Computer Hardware, 75<br/>Section I: Computer Systems: End-User and Enterprise Computing, 76<br/>Introduction, 76<br/>A Brief History of Computer Hardware, 76<br/>Types of Computer Systems, 80<br/>Microcomputer Systems, 81<br/>Mainframe Computer Systems, 87<br/>Technical Note: The Computer System Concept, 89<br/>Moore's Law: Where Do We Go from Here?, 91<br/>Section II: Computer Peripherals: Input, Output, and Storage Technologies, 94<br/>Peripherals, 94<br/>Input Technologies, 94<br/>Output Technologies, 102<br/>Storage Trade-Offs, 104<br/>Semiconductor Memory, 107<br/>Magnetic Disks, 109<br/>Magnetic Tape, 110<br/>Optical Disks, 110<br/>Radio Frequency Identification, 112<br/>Predictions for the Future, 115<br/>Chapter 4. Computer Software, 125<br/>Section I: Application Software: End-User Applications, 126<br/>Introduction to Software, 126<br/>Business Application Software, 130<br/>Software Suites and Integrated Packages, 131<br/>Web Browsers and More, 132<br/>Electronic Mail, Instant Messaging, and Weblogs, 132<br/>Word Processing and Desktop Publishing, 134<br/>Electronic Spreadsheets, 135<br/>Presentation Graphics, 136<br/>Personal Information Managers, 137<br/>Groupware, 137<br/>Software Alternatives, 138<br/>Section II: System Software: Computer System Management, 141<br/>System Software Overview, 141<br/>Operating Systems, 141<br/>Other System Management Programs, 150<br/>Programming Languages, 151<br/>Web Languages and Services, 154<br/>Programming Software, 159<br/>Chapter 5. Data Resource Management, 169<br/>Section I: Technical Foundations of Database Management, 170<br/>Database Management, 170<br/>Fundamental Data Concepts, 170<br/>Database Structures, 174<br/>Database Development, 180<br/>Section II: Managing Data Resources, 185<br/>Data Resource Management, 185<br/>Types of Databases, 185<br/>Data Warehouses and Data Mining, 190<br/>Traditional File Processing, 193<br/>The Database Management Approach, 196<br/>Chapter 6. Telecommunications and Networks, 209<br/>Section I: The Networked Enterprise, 210<br/>The Networked Enterprise, 210<br/>The Concept of a Network, 210<br/>Trends in Telecommunications, 213<br/>The Business Value of Telecommunications Networks, 216<br/>The Internet Revolution, 217<br/>The Role of Intranets, 221<br/>The Role of Extranets, 223<br/>Section II: Telecommunications Network Alternatives, 226<br/>Telecommunications Alternatives, 226<br/>A Telecommunications Network Model, 226<br/>Types of Telecommunications Networks, 229<br/>Digital and Analog Signals, 235<br/>Telecommunications Media, 235<br/>Wired Technologies, 236<br/>Wireless Technologies, 237<br/>Telecommunications Processors, 241<br/>Telecommunications Software, 243<br/>Network Topologies, 244<br/>Network Architectures and Protocols, 245<br/>Bandwidth Alternatives, 249<br/>Switching Alternatives, 250<br/>Network Interoperability, 251<br/>Module III. Business Applications, 260<br/>Chapter 7. e-Business Systems, 261<br/>Section I: e-Business Systems, 262<br/>Introduction, 262<br/>Cross-Functional Enterprise Applications, 262<br/>Enterprise Application Integration, 266<br/>Transaction Processing Systems, 268<br/>Enterprise Collaboration Systems, 271<br/>Section II: Functional Business Systems, 274<br/>Introduction, 274<br/>Marketing Systems, 274<br/>Manufacturing Systems, 280<br/>Human Resource Systems, 282<br/>Accounting Systems, 285<br/>Financial Management Systems, 286<br/>Chapter 8. Enterprise Business Systems, 297<br/>Section I: Getting All the Geese Lined Up: Managing at the Enterprise Level, 298<br/>Customer Relationship Management: The Business Focus, 299<br/>Introduction, 299<br/>What Is CRM?, 299<br/>The Three Phases of CRM, 304<br/>Benefits and Challenges of CRM, 305<br/>Trends in CRM, 307<br/>Section II: Enterprise Resource Planning: The Business Backbone, 309<br/>Introduction, 309<br/>What Is ERP?, 309<br/>Benefits and Challenges of ERP, 313<br/>Trends in ERP, 316<br/>Section III: Supply Chain Management: The Business Network, 319<br/>Introduction, 319<br/>What Is SCM?, 319<br/>The Role of SCM, 324<br/>Benefits and Challenges of SCM, 326<br/>Trends in SCM, 329<br/>Chapter 9. Electronic Commerce Systems, 337<br/>Section I: Electronic Commerce Fundamentals, 338<br/>Introduction to Electronic Commerce, 338<br/>The Scope of e-Commerce, 338<br/>Essential e-Commerce Processes, 343<br/>Electronic Payment Processes, 347<br/>Section II: e-Commerce Applications and Issues, 350<br/>Business-to-Consumer e-Commerce, 350<br/>Web Store Requirements, 356<br/>Business-to-Business e-Commerce, 360<br/>e-Commerce Marketplaces, 361<br/>Clicks and Bricks in e-Commerce, 363<br/>Chapter 10. Decision Support Systems, 377<br/>Section I: Decision Support in Business, 378<br/>Introduction, 378<br/>Decision Structure, 382<br/>Decision Support Trends, 382<br/>Decision Support Systems, 384<br/>Management Information Systems, 387<br/>Online Analytical Processing, 388<br/>Using Decision Support Systems, 395<br/>Executive Information Systems, 399<br/>Enterprise Portals and Decision Support, 401<br/>Knowledge Management Systems, 402<br/>Section II: Artificial Intelligence Technologies in Business, 405<br/>Business and AI, 405<br/>An Overview of Artificial Intelligence, 405<br/>Expert Systems, 411<br/>Developing Expert Systems, 415<br/>Neural Networks, 417<br/>Fuzzy Logic Systems, 418<br/>Genetic Algorithms, 419<br/>Virtual Reality, 421<br/>Intelligent Agents, 422<br/>Module IV. Development Processes, 434<br/>Chapter 11. Developing Business/IT Strategies, 435<br/>Section I: Planning Fundamentals, 436<br/>Introduction, 436<br/>Organizational Planning, 436<br/>The Scenario Approach, 436<br/>Planning for Competitive Advantage, 441<br/>Business Models and Planning, 443<br/>Business/IT Planning, 445<br/>Identifying Business/IT Strategies, 448<br/>Business Application Planning, 449<br/>Section II: Implementation Challenges, 452<br/>Implementation, 452<br/>Implementing Information Technology, 452<br/>End-User Resistance and Involvement, 452<br/>Change Management, 457<br/>Chapter 12. Developing Business/IT Solutions, 471<br/>Section I: Developing Business Systems, 472<br/>IS Development, 472<br/>The Systems Approach, 472<br/>Systems Analysis and Design, 475<br/>The Systems Development Life Cycle, 475<br/>Starting the Systems Development Process, 475<br/>Systems Analysis, 479<br/>Systems Design, 482<br/>End-User Development, 487<br/>Section II: Implementing Business Systems, 490<br/>Implementation, 490<br/>Implementing New Systems, 490<br/>Project Management, 494<br/>Evaluating Hardware, Software, and Services, 496<br/>Other Implementation Activities, 499<br/>Module V. Management Challenges, 514<br/>Chapter 13. Security and Ethical Challenges, 515<br/>Section I: Security, Ethical, and Societal Challenges of IT, 516<br/>Introduction, 516<br/>Ethical Responsibility of Business Professionals, 516<br/>Computer Crime, 522<br/>Privacy Issues, 533<br/>The Current State of Cyber Law, 537<br/>Other Challenges, 537<br/>Health Issues, 539<br/>Societal Solutions, 540<br/>Section II: Security Management of Information Technology, 542<br/>Introduction, 542<br/>Tools of Security Management, 542<br/>Inter-networked Security Defenses, 545<br/>Other Security Measures, 552<br/>System Controls and Audits, 556<br/>Chapter 14. Enterprise and Global Management of Information Technology, 567<br/>Section I: Managing Information Technology, 568<br/>Business and IT, 568<br/>Managing Information Technology, 568<br/>Business/IT Planning, 571<br/>Managing the IT Function, 573<br/>Organizing IT, 574<br/>Outsourcing and Offshoring IT and IS, 578<br/>Failures in IT Management, 580<br/>Section II: Managing Global IT, 586<br/>The International Dimension, 586<br/>Global IT Management, 586<br/>Cultural, Political, and Geoeconomic Challenges, 589<br/>Global Business/IT Strategies, 591<br/>Global Business/IT Applications, 592<br/>Global IT Platforms, 594<br/>Global Data Access Issues, 596<br/>Global Systems Development, 598<br/>Review Quiz Answers, 609<br/>Selected References, 613<br/>Glossary for Business Professionals, 623<br/>Name Index, 643<br/>Company Index, 646<br/>Subject Index, 649 |