Experiencing MIS 9780134319063, 1292163577, 9781292163574, 0134319060

For undergraduate Introductory Management Information Systems courses." Helping Readers Succeed in the Most Importa

512 142 22MB

English Pages 720 [721] Year 2016

Report DMCA / Copyright

DOWNLOAD FILE

Experiencing MIS
 9780134319063, 1292163577, 9781292163574, 0134319060

Table of contents :
Cover ......Page 1
Title Page ......Page 8
Copyright Page ......Page 9
Contents Overview ......Page 11
Contents ......Page 13
Preface......Page 22
This Could Happen to You......Page 34
This Could Happen to You......Page 36
Evolving Capabilities ......Page 38
Moore’s Law ......Page 39
Other Forces Pushing Digital Change ......Page 40
2. How Will MIS Affect Me?......Page 41
How Can I Attain Job Security? ......Page 42
How Can Intro to Mis Help You Learn Nonroutine Skills? ......Page 43
3. Why Are MIS-Related Jobs in High Demand?......Page 44
So What?: Biggest IPO Ever: Alibaba......Page 46
4. What Is MIS?......Page 47
Components of an Information System ......Page 48
Achieving Strategies ......Page 49
Strong Passwords ......Page 50
How does the knowledge in this chapter help you?......Page 51
Ethics Guide: Ethics and Professional Responsibility......Page 53
Guide: Five-Component Careers......Page 55
Case Study 1: zulily......Page 59
This Could Happen to You......Page 64
How Best Bikes Works ......Page 66
The Existing Best Bikes Process ......Page 67
How Best Bikes Processes Must Change to Support 3D Printing......Page 69
What Is Process Quality? ......Page 70
Using Information Systems to Improve Process Quality ......Page 72
Definitions Vary ......Page 73
Where Is Information? ......Page 74
So What?: Augmented Collaboration......Page 75
Accurate ......Page 76
Worth Its Cost ......Page 77
How does the Knowledge in this chapter help You?......Page 78
Ethics Guide: I Know What’s Better, Really......Page 79
Guide: Egocentric Versus Empathetic Thinking......Page 81
Case Study 2: Eating Our Own Dog Food......Page 86
This Could Happen to You......Page 92
2. What Five Forces Determine Industry Structure?......Page 94
3. What Is Competitive Strategy?......Page 96
Primary Activities in the Value Chain ......Page 97
Value Chain Linkages ......Page 98
6. How Do Information Systems Provide Competitive Advantages?......Page 99
So What?: Driving Strategy......Page 101
Competitive Advantage via Products......Page 102
How Can an Organization Use Is to Create Competitive Advantages? ......Page 103
How Does This System Create a Competitive Advantage? ......Page 105
How does the knowledge in this chapter help you?......Page 106
Ethics Guide: Yikes! Bikes......Page 107
Guide: Your Personal Competitive Advantage......Page 109
Case Study 3: The Amazon of Innovation......Page 114
This Could Happen to You......Page 118
This Could Happen to You......Page 120
Types of Hardware ......Page 122
Computer Data ......Page 124
The Internet of Things ......Page 125
Self-Driving Cars......Page 127
So What?: New from CES 2015......Page 130
3D Printing......Page 131
3. What Do Business Professionals Need to Know About Software?......Page 132
What Are the Major Operating Systems? ......Page 133
Virtualization ......Page 136
What Types of Applications Exist, and How Do Organizations Obtain Them? ......Page 138
4. Is Open Source Software a Viable Alternative?......Page 139
How Does Open Source Work? ......Page 140
So, Is Open Source Viable? ......Page 141
How does the Knowledge in this chapter help You?......Page 142
Ethics Guide: Free Apps for Data......Page 143
Guide: Keeping Up to Speed......Page 145
Case Study 4: PSA Cruising with Information System......Page 150
This Could Happen to You......Page 154
What Is the Purpose of a Database? ......Page 156
2. What Is a Database?......Page 158
Relationships Among Rows ......Page 159
Metadata ......Page 160
3. What Is a Database Management System (DBMS)?......Page 161
So What?: Not What the Data Says . . .......Page 162
4. How Do Database Applications Make Databases More Useful?......Page 164
Traditional Forms, Queries, Reports, and Applications ......Page 165
Thin-Client Forms, Reports, Queries, and Applications......Page 166
Multiuser Processing ......Page 168
5. How Can Falcon Security Benefit from a Database System?......Page 169
Need for Faster Processing Using Many Servers ......Page 170
What Do Nonrelational Dbms Mean for You? ......Page 171
How does the Knowledge in this chapter help You?......Page 172
Ethics Guide: Querying Inequality?......Page 173
Guide: Theft by SQL Injection......Page 175
Case Study 5: Searching for Classic and Vintage Car Parts . . .......Page 180
This Could Happen to You......Page 186
What Is the Cloud? ......Page 188
Why Is the Cloud Preferred to In-House Hosting?......Page 190
Why Now? ......Page 191
Cloud Services from Cloud Vendors ......Page 192
Content Delivery Networks ......Page 193
Use Web Services Internally ......Page 194
PaaS Services at Falcon Security......Page 195
Virtual Private Network (VPN)......Page 196
Using a Private Cloud ......Page 197
Using a Virtual Private Cloud ......Page 198
So What?: Net Neutrality Enabled......Page 199
5. What Does the Cloud Mean for Your Future?......Page 200
How does the Knowledge in this chapterhelp You?......Page 202
Ethics Guide: Cloudy Profit?......Page 203
Guide: From Anthem to Anathema......Page 205
Case Study 6: Cloud Solutions that Test for Consumer Risk and Financial Stability......Page 209
This Could Happen to You......Page 212
Chapter 7 Organizations and Information Systems......Page 214
This Could Happen to You......Page 15
Workgroup Information Systems ......Page 216
2. How Do Enterprise Systems Solve the Problems of Departmental Silos?......Page 217
What Are the Problems of Information Silos? ......Page 218
An Enterprise System for Patient Discharge ......Page 220
Business Process Reengineering ......Page 221
Customer Relationship Management (CRM)......Page 222
So What?: Workflow Problems......Page 224
Enterprise Application Integration (EAI)......Page 225
What Are the Challenges When Implementing and Upgrading Enterprise Systems? ......Page 226
4. How Do Inter-enterprise Is Solve the Problems of Enterprise Silos?......Page 228
How does the Knowledge in this chapter help You?......Page 230
Ethics Guide: Dialing for Dollars......Page 231
Guide: One-Stop Shopping......Page 233
Case Study 7: Interorganizational IS - The National Programme for IT in the NHS Experience......Page 238
This Could Happen to You......Page 242
Three SMIS Roles......Page 244
SMIS Components......Page 247
2. How Do SMIS Advance Organizational Strategy?......Page 248
Social Media and the Sales and Marketing Activity ......Page 249
Social Media and Inbound and Outbound Logistics ......Page 250
Social Media and Human Resources ......Page 251
So What?: Facebook for Organizations . . . and Machines?......Page 252
What Is the Value of Social Capital? ......Page 253
How Do Social Networks Add Value to Businesses? ......Page 254
Using Social Networking to Increase the Number of Relationships ......Page 255
Using Social Networks to Connect to Those with More Resources ......Page 256
Revenue Models for Social Media ......Page 258
Does Mobility Reduce Online Ad Revenue? ......Page 259
5. How Can Organizations Address Smis Security Concerns?......Page 260
Managing the Risk of Employee Communication ......Page 261
Managing the Risk of Inappropriate Content ......Page 262
6. Where Is Social Media Taking Us?......Page 264
How does the Knowledge in this chapter help You?......Page 266
Ethics Guide: Synthetic Friends......Page 267
Guide: Digital Is Forever......Page 269
Case Study 8: Sedona Social......Page 273
This Could Happen to You......Page 278
How Do Organizations Use BI?......Page 280
What Are Typical Uses for Business Intelligence? ......Page 281
2. What Are the Three Primary Activities in the Bi Process?......Page 282
Using Business Intelligence to Find Candidate Parts ......Page 283
3. How Do Organizations Use Data Warehouses and Data Marts to Acquire Data?......Page 288
Problems with Operational Data ......Page 289
Data Warehouses Versus Data Marts ......Page 291
Data Mining Analysis ......Page 292
BigData......Page 293
Characteristics of BI Publishing Alternatives......Page 295
So What?: BI for Securities Trading?......Page 296
What Are the Two Functions of a Bi Server? ......Page 297
How does the Knowledge in this chapter help You?......Page 298
Ethics Guide: Unseen Cyberazzi......Page 299
Guide: Semantic Security......Page 301
Case Study 9: Hadoop the Cookie Cutter......Page 305
This Could Happen to You......Page 308
Chapter 10 Information Systems Security......Page 310
The Is Security Threat/Loss Scenario......Page 312
What Types of Security Loss Exist? ......Page 314
2. How Big Is the Computer Security Problem?......Page 317
3. How Should You Respond to Security Threats?......Page 319
4. How Should Organizations Respond to Security Threats?......Page 320
Identification and Authentication ......Page 323
Encryption ......Page 324
Malware Protection ......Page 326
6. How Can Data Safeguards Protect Against Security Threats?......Page 328
Human Safeguards for Employees ......Page 329
Human Safeguards for Nonemployee Personnel ......Page 331
Account Administration ......Page 332
Systems Procedures ......Page 333
Security Monitoring ......Page 334
8. How Should Organizations Respond to Security Incidents?......Page 335
How does the Knowledge in this chapter help You?......Page 336
Ethics Guide: Hacking Smart Things......Page 337
Guide: EMV to the Rescue......Page 339
Case Study 10: Hitting the Target......Page 343
This Could Happen to You......Page 346
How Is the Is Department Organized? ......Page 348
Security Officers ......Page 349
Align Information Systems with Organizational Strategy ......Page 350
Communicate Is Issues to the Executive Group ......Page 352
3. What Are the Advantages and Disadvantages of Outsourcing?......Page 353
Outsourcing Information Systems ......Page 354
What Are the Outsourcing Alternatives? ......Page 356
What Are the Risks of Outsourcing? ......Page 357
Your User Rights ......Page 359
Your User Responsibilities ......Page 360
How does the Knowledge in this chapter help You?......Page 362
Ethics Guide: Privacy versus Productivity: The BYOD Dilemma?......Page 363
Guide: Is Outsourcing Fool’s Gold?......Page 365
Case Study 11: iApp$$$$ 4 U......Page 369
This Could Happen to You......Page 372
2. Why Is Systems Development Difficult and Risky?......Page 374
The Difficulty of Requirements Determination ......Page 375
Diseconomies of Scale ......Page 376
3. What Are the Five Phases of the SDLC?......Page 377
Define System Goals and Scope ......Page 378
Form a Project Team ......Page 379
Determine Requirements ......Page 380
Approve Requirements ......Page 381
6. How Are the Five Components Designed?......Page 382
Hardware Design ......Page 383
Design of Job Descriptions ......Page 384
System Testing ......Page 385
System Conversion ......Page 386
8. What Are the Tasks for System Maintenance?......Page 387
The SDLC Waterfall......Page 388
Scheduling and Budgeting Difficulties ......Page 389
How does the Knowledge in this chapter help You?......Page 390
Ethics Guide: Estimation Ethics......Page 391
Guide: The Final, Final Word......Page 393
Case Study 12: When Will We Learn?......Page 398
Chapter Extensions ......Page 18
Importance of Effective Critical Feedback ......Page 400
Warning! ......Page 402
Meaningful and Satisfying Experience ......Page 403
Becoming Informed ......Page 404
Making Decisions ......Page 405
Solving Problems ......Page 406
Managing Projects ......Page 407
The Five Collaboration System Components ......Page 408
Primary Functions: Communication and Content Sharing ......Page 409
Required Features ......Page 413
Collaboration Tool Characteristics ......Page 414
2. How Can You Use Collaboration Tools to Improve Team Communication?......Page 415
3. How Can You Use Collaboration Tools to Share Content?......Page 417
Shared Content with Version Management on Google Drive ......Page 419
Shared Content with Version Control ......Page 421
Sharing a Task List on Google Drive ......Page 424
Sharing a Task List Using Microsoft Sharepoint ......Page 425
The Minimal Collaboration Tool Set ......Page 426
Choosing the Set for Your Team ......Page 428
Don’t Forget Procedures and People! ......Page 429
2. Why Are Mobile Systems Important?......Page 434
Software ......Page 435
Procedures ......Page 436
Developing Native Mobile Applications ......Page 437
Developing Web Mobile Applications ......Page 439
Which Is Better? ......Page 440
Provide Animation and Lively Behavior ......Page 441
Design to Scale and Share ......Page 442
Use the Cloud ......Page 443
Advantages and Disadvantages of Employee Use of Mobile Systems at Work ......Page 445
Survey of Organizational Byod Policy ......Page 446
1. What Is a Spreadsheet?......Page 450
2. How Do You Get Started with Excel?......Page 451
Key in the Data ......Page 453
Let Excel Add the Data Using a Pattern ......Page 454
4. How Can You Insert and Delete Rows and Columns and Change Their Size?......Page 457
5. How Can You Format Data?......Page 460
6. How Can You Create a (Simple) Formula?......Page 461
7. How Can You Print Results?......Page 463
2. How Are Database Application Systems Developed?......Page 468
Entities ......Page 469
Relationships ......Page 470
4. How Is a Data Model Transformed into a Database Design?......Page 472
Normalization ......Page 473
Representing Relationships ......Page 474
5. What Is the Users’ Role?......Page 476
6. Who Will Volunteer? (Continued)......Page 477
1. How Do You Create Tables?......Page 482
Creating Tables ......Page 483
2. How Do You Create Relationships?......Page 487
3. How Do You Create a Data Entry Form?......Page 489
4. How Do You Create Queries Using the Query Design Tool?......Page 493
5. How Do You Create a Report?......Page 495
2. What Is Import/Export?......Page 502
Import/Export of Text Data......Page 503
Creating a Pie Chart ......Page 506
Creating a Column Chart ......Page 508
4. How Can You Create Group Totals in Access?......Page 509
5. How Can You Use Excel to Graph Access Data?......Page 515
6. How Can You Use Access to Report Excel Data?......Page 518
7. How Can You Combine Excel and Access to Analyze Data?......Page 521
1. What Is a Computer Network?......Page 530
2. What Are the Components of a Lan?......Page 531
Connecting Your LAN to the Internet......Page 532
Carriers and Net Neutrality ......Page 534
Internet Addressing ......Page 535
Processing on a Web Server ......Page 536
4. How Does the Cloud Work?......Page 537
Service-Oriented Architecture (SOA)......Page 538
Protocols Supporting Web Services ......Page 540
1. What Is the Purpose of ERP Systems?......Page 545
Hardware ......Page 548
Procedures: Business Process Procedures ......Page 549
3. How Are ERP Systems Implemented and Upgraded?......Page 551
ERP by Industry Type......Page 552
International ERP......Page 553
ERP Products......Page 554
ERP in the Future......Page 556
2. What Is a Supply Chain?......Page 560
3. What Factors Affect Supply Chain Performance?......Page 562
5. What Is the Bullwhip Effect?......Page 563
6. How Do Information Systems Affect Supply Chain Performance?......Page 565
Step 1: Define Your Goals ......Page 568
Step 2: Identify Success Metrics ......Page 569
Step 4: Define Your Value ......Page 570
2. What Is an Enterprise Social Network (ESN)?......Page 571
Changing Communication ......Page 572
Guide: Developing Your Personal Brand......Page 573
Deploying Successful Enterprise Social Networks ......Page 575
3. What Are the Benefits of Knowledge Management?......Page 576
4. What Are Expert Systems?......Page 577
What Are the Challenges of Content Management? ......Page 578
What Are Content Management Application Alternatives? ......Page 579
2. How Does Rfm Analysis Classify Customers?......Page 583
3. How Does Market-Basket Analysis Identify Cross-Selling Opportunities?......Page 584
A Decision Tree for Student Performance ......Page 586
A Decision Tree for Loan Evaluation ......Page 588
Guide: Data Mining in the Real World......Page 589
2. What Are the Components and Characteristics of Reporting Systems?......Page 594
Report Type ......Page 597
Report Mode ......Page 598
Report Management ......Page 599
4. How Are Olap Reports Dynamic?......Page 600
Why Do Data Breaches Happen? ......Page 606
2. How Do Data Breaches Happen?......Page 607
How Did They Do It? ......Page 608
3. How Should Organizations Respond to Data Breaches?......Page 609
Be Honest About the Breach ......Page 610
4. What Are the Legal Consequences of a Data Breach?......Page 611
5. How Can Data Breaches Be Prevented?......Page 612
1. How Does the Global Economy Affect Organizations and Processes?......Page 617
How Does the Emerging Global Economy Change Competitive Strategy? ......Page 618
2. What Are the Characteristics of International Is Components?......Page 619
What’s Required to Localize Software? ......Page 620
What Are the Problems and Issues of Global Databases? ......Page 621
What Are the Challenges of International Enterprise Applications? ......Page 622
How Do Global Information Systems Affect Supply Chain Profitability? ......Page 623
What Is the Economic Effect of Global Manufacturing? ......Page 624
Legal Environment ......Page 625
Cultural Norms ......Page 626
Why Is International Information Systems Development More Challenging? ......Page 627
What Are the Challenges of International Project Management? ......Page 628
What Are the Challenges of International Is Management? ......Page 630
1. Why Is Formalized Project Management Necessary?......Page 634
2. What Are the Trade-Offs in Requirements, Cost, and Time?......Page 635
3. What Are the Dimensions of Project Management?......Page 636
4. How Does a Work Breakdown Structure Drive Project Management?......Page 638
5. What Is the Biggest Challenge for Planning a Systems Development Project?......Page 640
6. What Are the Biggest Challenges for Managing a Systems Development Project?......Page 641
7. What Is the Single Most Important Task for Users on a Systems Development Project?......Page 642
1. Why Is the Sdlc Losing Credibility?......Page 647
2. What Are the Principles of Agile Development Methodologies?......Page 648
Scrum Essentials ......Page 649
When Are We Done? ......Page 650
Creating Requirements Tasks ......Page 651
Committing to Finish Tasks ......Page 652
Hocus-Pocus?......Page 653
Why Does This Process Need Management? ......Page 656
2. What Are the Stages of Business Process Management (BPM)?......Page 658
3. How Do Business Processes and Information Systems Relate?......Page 659
Business Processes First ......Page 661
Another Factor: Off-the-Shelf Software......Page 662
And the Answer Is . . . ......Page 663
Defining the Process Problem ......Page 664
Implement New Processes ......Page 666
Application Exercises......Page 670
Glossary......Page 685
Index......Page 702

Polecaj historie