Management information systems for the information age:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
McGraw-Hill/Irwin
2007
|
Ausgabe: | 6. ed., internat. ed. |
Schlagworte: | |
Online-Zugang: | Table of contents only Publisher description Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references (p. 540-546) and index |
Beschreibung: | XXXII, 558 S. Ill., graph. Darst., Kt. 2 CD-ROMs (12 cm.) |
ISBN: | 9780071106108 0071106103 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022534172 | ||
003 | DE-604 | ||
005 | 20070829 | ||
007 | t | ||
008 | 070730s2007 xxuabd| |||| 00||| eng d | ||
010 | |a 2005053866 | ||
020 | |a 9780071106108 |9 978-0-07-110610-8 | ||
020 | |a 0071106103 |9 0-07-110610-3 | ||
035 | |a (OCoLC)61451697 | ||
035 | |a (DE-599)BVBBV022534172 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-91G | ||
050 | 0 | |a T58.6 | |
082 | 0 | |a 658.4/038/011 | |
084 | |a WIR 546f |2 stub | ||
084 | |a DAT 620f |2 stub | ||
100 | 1 | |a Haag, Stephen |e Verfasser |4 aut | |
245 | 1 | 0 | |a Management information systems for the information age |c Stephen Haag ; Maeve Cummings ; Amy Phillips |
250 | |a 6. ed., internat. ed. | ||
264 | 1 | |a Boston [u.a.] |b McGraw-Hill/Irwin |c 2007 | |
300 | |a XXXII, 558 S. |b Ill., graph. Darst., Kt. |e 2 CD-ROMs (12 cm.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 540-546) and index | ||
650 | 7 | |a Management informatiesystemen |2 gtt | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Information technology | |
650 | 0 | 7 | |a Managementinformationssystem |0 (DE-588)4074518-1 |2 gnd |9 rswk-swf |
653 | |a CD-ROMs | ||
655 | 4 | |a CD-ROMs | |
689 | 0 | 0 | |a Managementinformationssystem |0 (DE-588)4074518-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Cummings, Maeve |e Sonstige |4 oth | |
700 | 1 | |a Phillips, Amy |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0665/2005053866-t.html |3 Table of contents only | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0665/2005053866-d.html |3 Publisher description | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015740706&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015740706 |
Datensatz im Suchindex
_version_ | 1804136644963467264 |
---|---|
adam_text | For Indy. He passed on to a far
greater life after filling ours with 15
wonderful years.
Stephen Haag
To Harry; In the successes of your life
may you find joy and fulfillment: in
your failures, humor and wisdom.
Maeve dimmings
To my father, J. Dale McLeod, with
love. Thank you for being a part of
my life.
Amy Phillips
BRIEF CONTENTS j
j
I
CHAPTER ONE 2 EXTENDED LEARNING MODULE A 3fj
The Information Age in Which You Live: Computer Hardware and Software
Changing the Face of Business 1
i
CHAPTER TWO 70 EXTENDED LEARNING MODULE B 102J
Major Business Initiatives: The World Wide Web and the Internet
Gaining Competitive Advantage with IT
CHAPTER THREE 122 EXTENDED LEARNING MODULE C 160J
Databases and Data Warehouses: Designing Databases and Entity I
Building Business Intelligence Relationship Diagramming I
CHAPTER FOUR 178 EXTENDED LEARNING MODULE D 218
Decision Support and Artificial Decision Analysis with Spreadsheet
Intelligence: Brainpower for Your Business Software
CHAPTER FIVE 238 EXTENDED LEARNING MODULE E 276
Electronic Commerce: Network Basics
Strategies for the New Economy
CHAPTER SIX 278 EXTENDED LEARNING MODULE F 314
Systems Development: Building a Web Page with HTML
Phases, Tools, and Techniques
CHAPTER SEVEN 316 EXTENDED LEARNING MODULE G 352
Enterprise Infrastructure and Integration: Object Oriented Technologies
Building the Dynamic Enterprise
CHAPTER EIGHT 354 EXTENDED LEARNING MODULE H 390
Protecting People and Information: Computer Crime and Forensics
Threats and Safeguards
CHAPTER NINE 432 EXTENDED LEARNING MODULE I 454
Emerging Trends and Technologies: Building an E Portfolio
Business, People, and Technology Tomorrow
EXTENDED LEARNING MODULE J 494
Implementing a Database with Microsoft
Access i
i
I
i
I
EXTENDED LEARNING MODULE A 38
Computer Hardware and Software
EXTENDED LEARNING MODULE B 102J
The World Wide Web and the Internet
EXTENDED LEARNING MODULE C 16O|
Designing Databases and Entity I
Relationship Diagramming I
EXTENDED LEARNING MODULE D 218
Decision Analysis with Spreadsheet
Software
EXTENDED LEARNING MODULE E 276
Network Basics
EXTENDED LEARNING MODULE F 314
Building a Web Page with HTML
EXTENDED LEARNING MODULE G 352
Object Oriented Technologies
EXTENDED LEARNING MODULE H 39C
Computer Crime and Forensics
EXTENDED LEARNING MODULE I 45
Building an E Portfolio
EXTENDED LEARNING MODULE J 49
Implementing a Database with Microsoft
Access
Brief Contents vii
EXTENDED LEARNING MODULE K 496
Careers in Business
EXTENDED LEARNING MODULE L 498
Building Web Sites with FrontPage
EXTENDED LEARNING MODULE M 500
Programming in Excel with VBA
Group Projects 502
Preface xvi
CHAPTER ONE 2
The Information Age in Which You Live:
Changing the Face of Business
OPENING CASE STUDY: DISRUPTIVE TECHNOLOGIES
DISRUPT BLOCKBUSTER LATE FEES 3
INTRODUCTION 4
INFORMATION AS A KEY RESOURCE 6
Data, Information, and Business Intelligence 6
Personal Dimensions of Information 6
Organizational Dimensions of Information 8
PEOPLE AS THE KEY RESOURCE 10
Information and Technology Literacy 10
Your Ethical Responsibilities 13
INFORMATION TECHNOLOGY AS A KEY RESOURCE 14
Key Technology Categories 15
Ubiquitous Computing: Decentralized Computing,
Shared Information, Mobile Computing, and a
Whole Lot More 17
CREATING THE BUSINESS VISION FOR INFORMATION
TECHNOLOGY 18
Top Line versus Bottom Line 18
Databases in Support of Competitive
Advantages 20
Supporting Decision Making for Competitive
Advantage 21
Pursuing Major Business Initiatives
for Competitive Advantage 24
Run, Grow, and Transform 25
INFORMATION TECHNOLOGY IN YOUR LIFE 26
Four Career 26
Ethics, Security, and Privacy 27
Closing Case Study One: You and
Your Information 30
Closing Case Study Two: Technology Metrics
Measuring Efficiency and Effectiveness 32
Electronic Commerce: Using the Internet
as a Tool to Find a Job 36
EXTENDED LEARNING MODULE A
Computer Hardware and Software
INTRODUCTION
A QUICK TOUR OF TECHNOLOGY
CATEGORIES OF COMPUTERS BY SIZE
Personal Digital Assistants (PDAs) 42
Tablet PCs 42
Notebook Computers 43
Desktop Computers 43
Minicomputers, Mainframe Computers, and
Supercomputers 44
SOFTWARE: YOUR INTELLECTUAL INTERFACE
Application Software 45
System Software 48
HARDWARE: YOUR PHYSICAL INTERFACE
Common Input Devices 52
Common Output Devices 54
Common Storage Devices 56
CPU and RAM 59
Connecting the Hardware Outside to the
Hardware Inside 61
CHAPTER TWO
Major Business Initiatives: Gaining
Competitive Advantage with IT
OPENING CASE STUDY: BUSINESS INTELLIGENCE IS KEY
TO THE SUCCESS OF THE MIAMI DOLPHINS
INTRODUCTION
PORTER S FIVE FORCES MODEL
Buyer Power 73
Supplier Power 73
Threat of Substitute Products or Services 74
Threat of New Entrants 75
Rivalry among Existing Competitors 75
THE VALUE CHAIN
Identifying Processes That Add Value 77
Identifying Processes That Reduce Value 77
SUPPLY CHAIN MANAGEMENT
Strategic and Competitive Opportunities
withSCM 80
IT Support for Supply Chain Management 8
USTOMER RELATIONSHIP MANAGEMENT 81
Strategic and Competitive Opportunities
with CRM 83
IT Support for Customer Relationship
Management 84
IUSINESS INTELLIGENCE 85
Strategic and Competitive Opportunities
with BI 86
IT Support for Business Intelligence 87
NTEGRATED COLLABORATION ENVIRONMENTS 88
Strategic and Competitive Opportunities
with ICEs 90
IT Support for Integrated Collaboration
Environments 90
BACK TO THE BEGINNING 92
Closing Case Study One: If We Don t Have It,
You Get It for Free 95
Closing Case Study Two: The Restaurant Business
Eats Up Business Intelligence 96
Electronic Commerce: Ordering Products
and Services on the Internet 100
EXTENDED LEARNING MODULE B 102
The World Wide Web and the Internet
INTRODUCTION 103
WORLD WIDE WEB 104
Web Sites, Addresses, and Pages 104
Understanding Addresses 105
Using Web Browser Software 106
SEARCH ENGINES 108
Using a Directory Search Engine 108
Using a True Search Engine 110
INTERNET TECHNOLOGIES 111
The Internet Backbone 111
Internet Servers 112
Communications Protocols 113
CONNECTING TO THE INTERNET 114
Communications Software 115
Telecommunications Hardware 116
CHAPTER THREE 122
Databases and Data Warehouses: Building
Business Intelligence
OPENING CASE STUDY: KRISPY KREME—SEVEN
DOUGHNUTS FOR EVERY MAN. WOMAN, AND CHILD
IN THE UNITED STATES EVERY YEAR 123
INTRODUCTION 124
THE RELATIONAL DATABASE MODEL 126
Collections of Information 126
Created with Logical Structures 126
With Logical Ties within the Information 128
With Built in Integrity Constraints 129
DATABASE MANAGEMENT SYSTEM TOOLS 130
Data Definition Subsystem 131
Data Manipulation Subsystem 132
Application Generation Subsystem 136
Data Administration Subsystem 136
DATA WAREHOUSES AND DATA MINING 140
What Is a Data Warehouse? 140
What Are Data Mining Tools? 141
Data Marts: Smaller Data Warehouses 143
Data Mining as a Career Opportunity 144
Important Considerations in Using a Data
Warehouse 145
INFORMATION OWNERSHIP 146
Strategic Management Support 146
The Sharing of Information with Responsibility 147
Information Cleanliness 148
Closing Case Study One: Ben Jerry s, Bigelow Teas,
and Business Intelligence 150
Closing Case Study Two: Mining Dining Data 152
Electronic Commerce: Searching Online
Databases and Information Repositories 157
EXTENDED LEARNING MODULE C 160
Designing Databases and Entity
Relationship Diagramming
INTRODUCTION 161
DESIGNING AND BUILDING A RELATIONAL DATABASE 161
Step 1: Defining Entity Classes and Primary
Keys 163
Step 2: Defining Relationships among the Entity
Classes 164
Step 3: Defining Information (Fields) for Each
Relation 172
Step 4: Using a Data Definition Language
to Create Your Database 175
CHAPTER FOUR 178
Decision Support and Artificial
Intelligence: Brainpower for Your Business
OPENING CASE STUDY: DECISION SUPPORT SYSTEM—
THE RESIDENT SECOND OPINION 179
INTRODUCTION 18°
DECISIONS. DECISIONS. DECISIONS 181
How You Make a Decision 181
Types of Decisions You Face 182
DECISION SUPPORT SYSTEMS 183
Components of a Decision Support System 184
GEOGRAPHIC INFORMATION SYSTEMS 187
ARTIFICIAL INTELLIGENCE 189
EXPERT SYSTEMS 190
What Expert Systems Can and Can t Do 192
NEURAL NETWORKS AND FUZZY LOGIC 193
Inside a Neural Network 195
Fuzzy Logic 197
GENETIC ALGORITHMS 197
INTELLIGENT AGENTS 200
Information Agents 200
Monitoring and Surveillance Agents 201
Data Mining Agents 202
User Agents 203
MULTI AGENT SYSTEMS AND AGENT BASED MODELING 204
Ant Colonies and Swarm Intelligence 204
Closing Case Study One: Shuttle Debris, Trees, and
Sniper Attacks 210
Closing Case Study Two: Using Neural Networks to
Categorize People 211
Electronic Commerce: Finding Investment
Opportunities on the Internet 216
EXTENDED LEARNING MODULE D 218
Decision Analysis with Spreadsheet Software
INTRODUCTION 219
LISTS 220
BASIC AUTOFILTER 222
CUSTOM AUTOFILTER 224
CONDITIONAL FORMATTING 226
PIVOT TABLES 228
BACK TO DECISION SUPPORT 235
AutoFilter 235
Conditional Formatting 235
Pivot Table 235
CHAPTER FIVE
Electronic Commerce: Strategies for the
New Economy
OPENING CASE STUDY: IS AMERICA ONUNE (AOL)
INCHING TOWARD BECOMING AN INTERNET BANK?
INTRODUCTION
E COMMERCE BUSINESS MODELS
UNDERSTAND YOUR BUSINESS. PRODUCTS. SERVICES,
AND CUSTOMERS
Who Are Your Customers? 244
What Is the Value of Your Products and
Services as Perceived by Your Customers? ,
FIND CUSTOMERS AND ESTABUSH RELATIONSHIPS
Business to Consumer 250
Business to Business 252
MOVE MONEY EASILY AND SECURELY
Business to Consumer Payment Systems 254
Business to Business Payment Systems 256
Security: The Pervading Concern 258
THE BROADENING OF E GOVERNMENT
Government to Government
(G2G, intra G2G) 262
Government to Business 262
Government to Consumer 263
International Government to Government
(inter G2G) 264
Government Spending on Information
Technology 264
Closing Case Study One: When You re Big, You Can Be
Your Own B2B E Marketplace
Closing Case Study Two: Toting the E Commerce Line
with eBags
Electronic Commerce: Getting Your
Business on the Internet
EXTENDED LEARNING MODULE E
Network Basics (on CD)
CHAPTER SIX
Systems Development: Phases, Tools,
and Techniques
OPENING CASE STUDY: MERCEDES BENZ ONLINE
BUILT TO ORDER TRUCKS
INTRODUCTION
THE SYSTEMS DEVELOPMENT LIFE CYCLE 280
Phase 1: Planning 280
Phase 2: Analysis 282
Phase 3: Design 283
Phase 4: Development 284
Phase 5: Testing 285
Phase 6: Implementation 286
Phase 7: Maintenance 286
SYSTEMS DEVELOPMENT METHODOLOGIES 287
Waterfall Methodology 288
Rapid Application Development Methodology 288
Extreme Programming Methodology 289
Agile Methodology 290
OUTSOURCING 290
Outsourcing Options 293
The Advantages and Disadvantages of
Outsourcing 295
Business Process Outsourcing (BPO) 297
PROTOTYPING 298
The Prototyping Process 300
The Advantages of Prototyping 301
The Disadvantages of Prototyping 301
END USER DEVELOPMENT 302
Which Applications for IT to Offload 303
The Right Tool for the Job 303
Closing Case Study One: Getting Software
Development Right 305
Closing Case Study Two: To Outsource or Not
to Outsource 306
Electronic Commerce: Finding Freeware and
Shareware on the Internet 311
EXTENDED LEARNING MODULE F 314
Building a Web Page with HTML (on CD)
CHAPTER SEVEN 316
Enterprise Infrastructure and Integration:
Building the Dynamic Enterprise
OPENING CASE STUDY: ONE VIEW
FOR DEL MONTE FOODS 317
INTRODUCTION 318
ENTERPRISE SYSTEMS 318
What Are Enterprise Systems? 318
Enterprise Resource Planning (ERP) Systems 320
The Evolution of ERP Systems 323
ERP Vendors and Market Trends 324
DEVELOPING AGILE IT SYSTEMS 326
Availability 326
Accessibility 326
Reliability 327
Scalability 327
Flexibility 327
Performance 327
Capacity Planning 328
INFORMATION SYSTEMS INFRASTRUCTURE 328
Why Architecture Matters 330
Why Infrastructure Matters 330
INFORMATION TECHNOLOGY INFRASTRUCTURE 332
Decentralized Infrastructure 332
Centralized Infrastructure 333
Distributed Infrastructure 334
Client/Server Infrastructure 334
Other types of Infrastructures 335
77ie Infrastructure Investment 336
Supporting an IT Infrastructure 337
JJeaZ WorM 7T Infrastructures 338
INTEGRATING THE ENTERPRISE 339
Why Integration Is Necessary 340
Motives for Integration 341
Benefits of Integration 342
Integration Obstacles 342
Closing Case Study One: Linux Supports
an Infrastructure 344
Closing Case Study Two: Netflix—Transforming the
Entertainment Industry 345
Electronic Commerce: Living Life
on the Internet 349
EXTENDED LEARNING MODULE G 352
Object Oriented Technologies (on CD)
CHAPTER EIGHT 354
Protecting People and Information:
Threats and Safeguards
OPENING CASE STUDY: THEY KNOW ABOUT
96 PERCENT OF AMERICAN HOUSEHOLDS 355
INTRODUCTION 356
ETHICS 356
Two Factors That Determine How You Decide
Ethical Issues 357
Guidelines for Ethical Computer System Use 358
Intellectual Property 359
PRIVACY 361
Privacy and Other Individuals 362
Identity Theft 362
Privacy and Employees 364
Privacy and Consumers 367
Privacy and Government Agencies 371
Laws on Privacy 373
SECURITY 374
Security and Employees 374
Security and Outside Threats 376
Security Precautions 378
Closing Case Study One: Cautionary Tales
of Indiscreet E Mail 383
Closing Case Study Two: The Problem of
Information Protection 384
Electronic Commerce: Making Travel
Arrangements on the Internet 388
EXTENDED LEARNING MODULE H 390
Computer Crime and Forensics
INTRODUCTION 391
COMPUTER CRIME 392
Outside the Organization 392
Web Defacing 399
The Players 400
Inside the Organization 403
COMPUTER FORENSICS 403
The Collection Phase 405
The Analysis Phase 408
RECOVERY AND INTERPRETATION 409
Places to Look for Useful Information 409
Ways of Hiding Information 412
WHO NEEDS COMPUTER FORENSIC INVESTIGATORS? 415
Proactive Computer Forensic Education for
Problem Prevention 415
Reactive Computer Forensics for Incident
Response 416
A Day in the Life of a Computer Forensic
Expert 417
CHAPTER NINE 422
Emerging Trends and Technologies:
Business, People, and Technology Tomorrow
OPENING CASE STUDY: THE FUTURE: TECHNOLOGY OUT,
PRINGLES IN 423
INTRODUCTION 424
THE CHANGING INTERNET
Software as a Service 425
Push, Not Pull, Technologies and
Personalization 426
Voice over Internet Protocol (VoIP) 428
PHYSIOLOGICAL INTERACTION
Automatic Speech Recognition 429
Virtual Reality 429
Cave Automatic Virtual Environments 431
Biometrics 432
INCREASING PORTABILITY AND MOBILITY
Digital Cash 436
Wearable Computers 437
Multi State CPUs and Holographic Storage
Devices 438
THE WIRELESS ARENA
The Next Generation of Cell Phone
Technology 439
RFID (Radio Frequency Identification) 440
MOST IMPORTANT CONSIDERATIONS
The Necessity of Technology 443
Closing the Great Digital Divide 443
Technology for the Betterment of Society 44
Exchanging Privacy for Convenience AAA
Ethics, Ethics, Ethics 445
Closing Case Study One: Wildseed—A Cell Phone
for Every Fashion
Closing Case Study Two: T2C—Not Another New
E Commerce Business Model
Electronic Commerce: Continuing Your
Education Through the Internet
EXTENDED LEARNING MODULE I
Building an E Portfolio
INTRODUCTION
THE ELECTRONIC JOB MARKET—EXTENDING
YOUR REACH
CONVERGENCE OF ONLINE NETWORKING
AND RESUME DEVELOPMENT
Start to Network 457
Perform a Self Assessment 459
Research Careers, Industries, and Companies
RESUME BUILDING—A LIFELONG PROCESS
Content, Content, Content 462
Electronic File Formats 467
What Is the Right Resume Style? 472
DEVELOPING YOUR JOB SEARCH E PORTFOLIO 473
Self Promotion 473
Give Them What They Want 474
The Shape of an E Portfolio 475
E Gallery 475
WEB DESIGN CONSIDERATIONS 476
Basic Web Design Principles 476
Design Your Homepage 481
PREPARING WEB CONTENT 484
HTML versus Generated Code 485
Test, Test, Test 488
EXTENDED LEARNING MODULE J 494
Implementing a Database with Microsoft
Access (on CD)
l
I
I
EXTENDED LEARNING MODULE K 496
Careers in Business (on CD)
EXTENDED LEARNING MODULE L 498
Building Web Sites with FrontPage (on CD)
EXTENDED LEARNING MODULE M 500
Programming in Excel with VBA (on CD)
Glossary 526
Notes 540
Photo Credits 547
Index 548
|
adam_txt |
For Indy. He passed on to a far
greater life after filling ours with 15
wonderful years.
Stephen Haag
To Harry; In the successes of your life
may you find joy and fulfillment: in
your failures, humor and wisdom.
Maeve dimmings
To my father, J. Dale McLeod, with
love. Thank you for being a part of
my life.
Amy Phillips
BRIEF CONTENTS j
j
I
CHAPTER ONE 2 EXTENDED LEARNING MODULE A 3fj
The Information Age in Which You Live: Computer Hardware and Software
Changing the Face of Business 1
i
CHAPTER TWO 70 EXTENDED LEARNING MODULE B 102J
Major Business Initiatives: The World Wide Web and the Internet
Gaining Competitive Advantage with IT
CHAPTER THREE 122 EXTENDED LEARNING MODULE C 160J
Databases and Data Warehouses: Designing Databases and Entity I
Building Business Intelligence Relationship Diagramming I
CHAPTER FOUR 178 EXTENDED LEARNING MODULE D 218
Decision Support and Artificial Decision Analysis with Spreadsheet
Intelligence: Brainpower for Your Business Software
CHAPTER FIVE 238 EXTENDED LEARNING MODULE E 276
Electronic Commerce: Network Basics
Strategies for the New Economy
CHAPTER SIX 278 EXTENDED LEARNING MODULE F 314
Systems Development: Building a Web Page with HTML
Phases, Tools, and Techniques
CHAPTER SEVEN 316 EXTENDED LEARNING MODULE G 352
Enterprise Infrastructure and Integration: Object Oriented Technologies
Building the Dynamic Enterprise
CHAPTER EIGHT 354 EXTENDED LEARNING MODULE H 390
Protecting People and Information: Computer Crime and Forensics
Threats and Safeguards
CHAPTER NINE 432 EXTENDED LEARNING MODULE I 454
Emerging Trends and Technologies: Building an E Portfolio
Business, People, and Technology Tomorrow
EXTENDED LEARNING MODULE J 494
Implementing a Database with Microsoft
Access i
i
I
i
I
EXTENDED LEARNING MODULE A 38
Computer Hardware and Software
EXTENDED LEARNING MODULE B 102J
The World Wide Web and the Internet
EXTENDED LEARNING MODULE C 16O|
Designing Databases and Entity I
Relationship Diagramming I
EXTENDED LEARNING MODULE D 218
Decision Analysis with Spreadsheet
Software
EXTENDED LEARNING MODULE E 276
Network Basics
EXTENDED LEARNING MODULE F 314
Building a Web Page with HTML
EXTENDED LEARNING MODULE G 352
Object Oriented Technologies
EXTENDED LEARNING MODULE H 39C
Computer Crime and Forensics
EXTENDED LEARNING MODULE I 45'
Building an E Portfolio
EXTENDED LEARNING MODULE J 49
Implementing a Database with Microsoft
Access
Brief Contents vii
EXTENDED LEARNING MODULE K 496
Careers in Business
EXTENDED LEARNING MODULE L 498
Building Web Sites with FrontPage
EXTENDED LEARNING MODULE M 500
Programming in Excel with VBA
Group Projects 502
Preface xvi
CHAPTER ONE 2
The Information Age in Which You Live:
Changing the Face of Business
OPENING CASE STUDY: DISRUPTIVE TECHNOLOGIES
DISRUPT BLOCKBUSTER LATE FEES 3
INTRODUCTION 4
INFORMATION AS A KEY RESOURCE 6
Data, Information, and Business Intelligence 6
Personal Dimensions of Information 6
Organizational Dimensions of Information 8
PEOPLE AS THE KEY RESOURCE 10
Information and Technology Literacy 10
Your Ethical Responsibilities 13
INFORMATION TECHNOLOGY AS A KEY RESOURCE 14
Key Technology Categories 15
Ubiquitous Computing: Decentralized Computing,
Shared Information, Mobile Computing, and a
Whole Lot More 17
CREATING THE BUSINESS VISION FOR INFORMATION
TECHNOLOGY 18
Top Line versus Bottom Line 18
Databases in Support of Competitive
Advantages 20
Supporting Decision Making for Competitive
Advantage 21
Pursuing Major Business Initiatives
for Competitive Advantage 24
Run, Grow, and Transform 25
INFORMATION TECHNOLOGY IN YOUR LIFE 26
Four Career 26
Ethics, Security, and Privacy 27
Closing Case Study One: You and
Your Information 30
Closing Case Study Two: Technology Metrics
Measuring Efficiency and Effectiveness 32
Electronic Commerce: Using the Internet
as a Tool to Find a Job 36
EXTENDED LEARNING MODULE A
Computer Hardware and Software
INTRODUCTION
A QUICK TOUR OF TECHNOLOGY
CATEGORIES OF COMPUTERS BY SIZE
Personal Digital Assistants (PDAs) 42
Tablet PCs 42
Notebook Computers 43
Desktop Computers 43
Minicomputers, Mainframe Computers, and
Supercomputers 44
SOFTWARE: YOUR INTELLECTUAL INTERFACE
Application Software 45
System Software 48
HARDWARE: YOUR PHYSICAL INTERFACE
Common Input Devices 52
Common Output Devices 54
Common Storage Devices 56
CPU and RAM 59
Connecting the Hardware Outside to the
Hardware Inside 61
CHAPTER TWO
Major Business Initiatives: Gaining
Competitive Advantage with IT
OPENING CASE STUDY: BUSINESS INTELLIGENCE IS KEY
TO THE SUCCESS OF THE MIAMI DOLPHINS
INTRODUCTION
PORTER'S FIVE FORCES MODEL
Buyer Power 73
Supplier Power 73
Threat of Substitute Products or Services 74
Threat of New Entrants 75
Rivalry among Existing Competitors 75
THE VALUE CHAIN
Identifying Processes That Add Value 77
Identifying Processes That Reduce Value 77
SUPPLY CHAIN MANAGEMENT
Strategic and Competitive Opportunities
withSCM 80
IT Support for Supply Chain Management 8
USTOMER RELATIONSHIP MANAGEMENT 81
Strategic and Competitive Opportunities
with CRM 83
IT Support for Customer Relationship
Management 84
IUSINESS INTELLIGENCE 85
Strategic and Competitive Opportunities
with BI 86
IT Support for Business Intelligence 87
NTEGRATED COLLABORATION ENVIRONMENTS 88
Strategic and Competitive Opportunities
with ICEs 90
IT Support for Integrated Collaboration
Environments 90
BACK TO THE BEGINNING 92
Closing Case Study One: If We Don't Have It,
You Get It for Free 95
Closing Case Study Two: The Restaurant Business
Eats Up Business Intelligence 96
Electronic Commerce: Ordering Products
and Services on the Internet 100
EXTENDED LEARNING MODULE B 102
The World Wide Web and the Internet
INTRODUCTION 103
WORLD WIDE WEB 104
Web Sites, Addresses, and Pages 104
Understanding Addresses 105
Using Web Browser Software 106
SEARCH ENGINES 108
Using a Directory Search Engine 108
Using a True Search Engine 110
INTERNET TECHNOLOGIES 111
The Internet Backbone 111
Internet Servers 112
Communications Protocols 113
CONNECTING TO THE INTERNET 114
Communications Software 115
Telecommunications Hardware 116
CHAPTER THREE 122
Databases and Data Warehouses: Building
Business Intelligence
OPENING CASE STUDY: KRISPY KREME—SEVEN
DOUGHNUTS FOR EVERY MAN. WOMAN, AND CHILD
IN THE UNITED STATES EVERY YEAR 123
INTRODUCTION 124
THE RELATIONAL DATABASE MODEL 126
Collections of Information 126
Created with Logical Structures 126
With Logical Ties within the Information 128
With Built in Integrity Constraints 129
DATABASE MANAGEMENT SYSTEM TOOLS 130
Data Definition Subsystem 131
Data Manipulation Subsystem 132
Application Generation Subsystem 136
Data Administration Subsystem 136
DATA WAREHOUSES AND DATA MINING 140
What Is a Data Warehouse? 140
What Are Data Mining Tools? 141
Data Marts: Smaller Data Warehouses 143
Data Mining as a Career Opportunity 144
Important Considerations in Using a Data
Warehouse 145
INFORMATION OWNERSHIP 146
Strategic Management Support 146
The Sharing of Information with Responsibility 147
Information Cleanliness 148
Closing Case Study One: Ben Jerry's, Bigelow Teas,
and Business Intelligence 150
Closing Case Study Two: Mining Dining Data 152
Electronic Commerce: Searching Online
Databases and Information Repositories 157
EXTENDED LEARNING MODULE C 160
Designing Databases and Entity
Relationship Diagramming
INTRODUCTION 161
DESIGNING AND BUILDING A RELATIONAL DATABASE 161
Step 1: Defining Entity Classes and Primary
Keys 163
Step 2: Defining Relationships among the Entity
Classes 164
Step 3: Defining Information (Fields) for Each
Relation 172
Step 4: Using a Data Definition Language
to Create Your Database 175
CHAPTER FOUR 178
Decision Support and Artificial
Intelligence: Brainpower for Your Business
OPENING CASE STUDY: DECISION SUPPORT SYSTEM—
THE RESIDENT SECOND OPINION 179
INTRODUCTION 18°
DECISIONS. DECISIONS. DECISIONS 181
How You Make a Decision 181
Types of Decisions You Face 182
DECISION SUPPORT SYSTEMS 183
Components of a Decision Support System 184
GEOGRAPHIC INFORMATION SYSTEMS 187
ARTIFICIAL INTELLIGENCE 189
EXPERT SYSTEMS 190
What Expert Systems Can and Can't Do 192
NEURAL NETWORKS AND FUZZY LOGIC 193
Inside a Neural Network 195
Fuzzy Logic 197
GENETIC ALGORITHMS 197
INTELLIGENT AGENTS 200
Information Agents 200
Monitoring and Surveillance Agents 201
Data Mining Agents 202
User Agents 203
MULTI AGENT SYSTEMS AND AGENT BASED MODELING 204
Ant Colonies and Swarm Intelligence 204
Closing Case Study One: Shuttle Debris, Trees, and
Sniper Attacks 210
Closing Case Study Two: Using Neural Networks to
Categorize People 211
Electronic Commerce: Finding Investment
Opportunities on the Internet 216
EXTENDED LEARNING MODULE D 218
Decision Analysis with Spreadsheet Software
INTRODUCTION 219
LISTS 220
BASIC AUTOFILTER 222
CUSTOM AUTOFILTER 224
CONDITIONAL FORMATTING 226
PIVOT TABLES 228
BACK TO DECISION SUPPORT 235
AutoFilter 235
Conditional Formatting 235
Pivot Table 235
CHAPTER FIVE
Electronic Commerce: Strategies for the
New Economy
OPENING CASE STUDY: IS AMERICA ONUNE (AOL)
INCHING TOWARD BECOMING AN INTERNET BANK?
INTRODUCTION
E COMMERCE BUSINESS MODELS
UNDERSTAND YOUR BUSINESS. PRODUCTS. SERVICES,
AND CUSTOMERS
Who Are Your Customers? 244
What Is the Value of Your Products and
Services as Perceived by Your Customers? ',
FIND CUSTOMERS AND ESTABUSH RELATIONSHIPS
Business to Consumer 250
Business to Business 252
MOVE MONEY EASILY AND SECURELY
Business to Consumer Payment Systems 254
Business to Business Payment Systems 256
Security: The Pervading Concern 258
THE BROADENING OF E GOVERNMENT
Government to Government
(G2G, intra G2G) 262
Government to Business 262
Government to Consumer 263
International Government to Government
(inter G2G) 264
Government Spending on Information
Technology 264
Closing Case Study One: When You're Big, You Can Be
Your Own B2B E Marketplace
Closing Case Study Two: Toting the E Commerce Line
with eBags
Electronic Commerce: Getting Your
Business on the Internet
EXTENDED LEARNING MODULE E
Network Basics (on CD)
CHAPTER SIX
Systems Development: Phases, Tools,
and Techniques
OPENING CASE STUDY: MERCEDES BENZ ONLINE
BUILT TO ORDER TRUCKS
INTRODUCTION
THE SYSTEMS DEVELOPMENT LIFE CYCLE 280
Phase 1: Planning 280
Phase 2: Analysis 282
Phase 3: Design 283
Phase 4: Development 284
Phase 5: Testing 285
Phase 6: Implementation 286
Phase 7: Maintenance 286
SYSTEMS DEVELOPMENT METHODOLOGIES 287
Waterfall Methodology 288
Rapid Application Development Methodology 288
Extreme Programming Methodology 289
Agile Methodology 290
OUTSOURCING 290
Outsourcing Options 293
The Advantages and Disadvantages of
Outsourcing 295
Business Process Outsourcing (BPO) 297
PROTOTYPING 298
The Prototyping Process 300
The Advantages of Prototyping 301
The Disadvantages of Prototyping 301
END USER DEVELOPMENT 302
Which Applications for IT to Offload 303
The Right Tool for the Job 303
Closing Case Study One: Getting Software
Development Right 305
Closing Case Study Two: To Outsource or Not
to Outsource 306
Electronic Commerce: Finding Freeware and
Shareware on the Internet 311
EXTENDED LEARNING MODULE F 314
Building a Web Page with HTML (on CD)
CHAPTER SEVEN 316
Enterprise Infrastructure and Integration:
Building the Dynamic Enterprise
OPENING CASE STUDY: ONE VIEW
FOR DEL MONTE FOODS 317
INTRODUCTION 318
ENTERPRISE SYSTEMS 318
What Are Enterprise Systems? 318
Enterprise Resource Planning (ERP) Systems 320
The Evolution of ERP Systems 323
ERP Vendors and Market Trends 324
DEVELOPING AGILE IT SYSTEMS 326
Availability 326
Accessibility 326
Reliability 327
Scalability 327
Flexibility 327
Performance 327
Capacity Planning 328
INFORMATION SYSTEMS INFRASTRUCTURE 328
Why Architecture Matters 330
Why Infrastructure Matters 330
INFORMATION TECHNOLOGY INFRASTRUCTURE 332
Decentralized Infrastructure 332
Centralized Infrastructure 333
Distributed Infrastructure 334
Client/Server Infrastructure 334
Other types of Infrastructures 335
77ie Infrastructure Investment 336
Supporting an IT Infrastructure 337
JJeaZ WorM 7T Infrastructures 338
INTEGRATING THE ENTERPRISE 339
Why Integration Is Necessary 340
Motives for Integration 341
Benefits of Integration 342
Integration Obstacles 342
Closing Case Study One: Linux Supports
an Infrastructure 344
Closing Case Study Two: Netflix—Transforming the
Entertainment Industry 345
Electronic Commerce: Living Life
on the Internet 349
EXTENDED LEARNING MODULE G 352
Object Oriented Technologies (on CD)
CHAPTER EIGHT 354
Protecting People and Information:
Threats and Safeguards
OPENING CASE STUDY: THEY KNOW ABOUT
96 PERCENT OF AMERICAN HOUSEHOLDS 355
INTRODUCTION 356
ETHICS 356
Two Factors That Determine How You Decide
Ethical Issues 357
Guidelines for Ethical Computer System Use 358
Intellectual Property 359
PRIVACY 361
Privacy and Other Individuals 362
Identity Theft 362
Privacy and Employees 364
Privacy and Consumers 367
Privacy and Government Agencies 371
Laws on Privacy 373
SECURITY 374
Security and Employees 374
Security and Outside Threats 376
Security Precautions 378
Closing Case Study One: Cautionary Tales
of Indiscreet E Mail 383
Closing Case Study Two: The Problem of
Information Protection 384
Electronic Commerce: Making Travel
Arrangements on the Internet 388
EXTENDED LEARNING MODULE H 390
Computer Crime and Forensics
INTRODUCTION 391
COMPUTER CRIME 392
Outside the Organization 392
Web Defacing 399
The Players 400
Inside the Organization 403
COMPUTER FORENSICS 403
The Collection Phase 405
The Analysis Phase 408
RECOVERY AND INTERPRETATION 409
Places to Look for Useful Information 409
Ways of Hiding Information 412
WHO NEEDS COMPUTER FORENSIC INVESTIGATORS? 415
Proactive Computer Forensic Education for
Problem Prevention 415
Reactive Computer Forensics for Incident
Response 416
A Day in the Life of a Computer Forensic
Expert 417
CHAPTER NINE 422
Emerging Trends and Technologies:
Business, People, and Technology Tomorrow
OPENING CASE STUDY: THE FUTURE: TECHNOLOGY OUT,
PRINGLES IN 423
INTRODUCTION 424
THE CHANGING INTERNET
Software as a Service 425
Push, Not Pull, Technologies and
Personalization 426
Voice over Internet Protocol (VoIP) 428
PHYSIOLOGICAL INTERACTION
Automatic Speech Recognition 429
Virtual Reality 429
Cave Automatic Virtual Environments 431
Biometrics 432
INCREASING PORTABILITY AND MOBILITY
Digital Cash 436
Wearable Computers 437
Multi State CPUs and Holographic Storage
Devices 438
THE WIRELESS ARENA
The Next Generation of Cell Phone
Technology 439
RFID (Radio Frequency Identification) 440
MOST IMPORTANT CONSIDERATIONS
The Necessity of Technology 443
Closing the Great Digital Divide 443
Technology for the Betterment of Society 44
Exchanging Privacy for Convenience AAA
Ethics, Ethics, Ethics 445
Closing Case Study One: Wildseed—A Cell Phone
for Every Fashion
Closing Case Study Two: T2C—Not Another New
E Commerce Business Model
Electronic Commerce: Continuing Your
Education Through the Internet
EXTENDED LEARNING MODULE I
Building an E Portfolio
INTRODUCTION
THE ELECTRONIC JOB MARKET—EXTENDING
YOUR REACH
CONVERGENCE OF ONLINE NETWORKING
AND RESUME DEVELOPMENT
Start to Network 457
Perform a Self Assessment 459
Research Careers, Industries, and Companies
RESUME BUILDING—A LIFELONG PROCESS
Content, Content, Content 462
Electronic File Formats 467
What Is the Right Resume Style? 472
DEVELOPING YOUR JOB SEARCH E PORTFOLIO 473
Self Promotion 473
Give Them What They Want 474
The Shape of an E Portfolio 475
E Gallery 475
WEB DESIGN CONSIDERATIONS 476
Basic Web Design Principles 476
Design Your Homepage 481
PREPARING WEB CONTENT 484
HTML versus Generated Code 485
Test, Test, Test 488
EXTENDED LEARNING MODULE J 494
Implementing a Database with Microsoft
Access (on CD)
l
I
I
EXTENDED LEARNING MODULE K 496
Careers in Business (on CD)
EXTENDED LEARNING MODULE L 498
Building Web Sites with FrontPage (on CD)
EXTENDED LEARNING MODULE M 500
Programming in Excel with VBA (on CD)
Glossary 526
Notes 540
Photo Credits 547
Index 548 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Haag, Stephen |
author_facet | Haag, Stephen |
author_role | aut |
author_sort | Haag, Stephen |
author_variant | s h sh |
building | Verbundindex |
bvnumber | BV022534172 |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.6 |
callnumber-search | T58.6 |
callnumber-sort | T 258.6 |
callnumber-subject | T - General Technology |
classification_tum | WIR 546f DAT 620f |
ctrlnum | (OCoLC)61451697 (DE-599)BVBBV022534172 |
dewey-full | 658.4/038/011 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/038/011 |
dewey-search | 658.4/038/011 |
dewey-sort | 3658.4 238 211 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 6. ed., internat. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02018nam a2200517zc 4500</leader><controlfield tag="001">BV022534172</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070829 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070730s2007 xxuabd| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005053866</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071106108</subfield><subfield code="9">978-0-07-110610-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071106103</subfield><subfield code="9">0-07-110610-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61451697</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022534172</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.6</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/038/011</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 546f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 620f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haag, Stephen</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Management information systems for the information age</subfield><subfield code="c">Stephen Haag ; Maeve Cummings ; Amy Phillips</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">6. ed., internat. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">McGraw-Hill/Irwin</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXII, 558 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield><subfield code="e">2 CD-ROMs (12 cm.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 540-546) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management informatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Managementinformationssystem</subfield><subfield code="0">(DE-588)4074518-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CD-ROMs</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">CD-ROMs</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Managementinformationssystem</subfield><subfield code="0">(DE-588)4074518-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cummings, Maeve</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phillips, Amy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0665/2005053866-t.html</subfield><subfield code="3">Table of contents only</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0665/2005053866-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015740706&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015740706</subfield></datafield></record></collection> |
genre | CD-ROMs |
genre_facet | CD-ROMs |
id | DE-604.BV022534172 |
illustrated | Illustrated |
index_date | 2024-07-02T18:07:43Z |
indexdate | 2024-07-09T20:59:41Z |
institution | BVB |
isbn | 9780071106108 0071106103 |
language | English |
lccn | 2005053866 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015740706 |
oclc_num | 61451697 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | XXXII, 558 S. Ill., graph. Darst., Kt. 2 CD-ROMs (12 cm.) |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | McGraw-Hill/Irwin |
record_format | marc |
spelling | Haag, Stephen Verfasser aut Management information systems for the information age Stephen Haag ; Maeve Cummings ; Amy Phillips 6. ed., internat. ed. Boston [u.a.] McGraw-Hill/Irwin 2007 XXXII, 558 S. Ill., graph. Darst., Kt. 2 CD-ROMs (12 cm.) txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 540-546) and index Management informatiesystemen gtt Management information systems Information technology Managementinformationssystem (DE-588)4074518-1 gnd rswk-swf CD-ROMs Managementinformationssystem (DE-588)4074518-1 s DE-604 Cummings, Maeve Sonstige oth Phillips, Amy Sonstige oth http://www.loc.gov/catdir/enhancements/fy0665/2005053866-t.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0665/2005053866-d.html Publisher description HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015740706&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Haag, Stephen Management information systems for the information age Management informatiesystemen gtt Management information systems Information technology Managementinformationssystem (DE-588)4074518-1 gnd |
subject_GND | (DE-588)4074518-1 |
title | Management information systems for the information age |
title_auth | Management information systems for the information age |
title_exact_search | Management information systems for the information age |
title_exact_search_txtP | Management information systems for the information age |
title_full | Management information systems for the information age Stephen Haag ; Maeve Cummings ; Amy Phillips |
title_fullStr | Management information systems for the information age Stephen Haag ; Maeve Cummings ; Amy Phillips |
title_full_unstemmed | Management information systems for the information age Stephen Haag ; Maeve Cummings ; Amy Phillips |
title_short | Management information systems for the information age |
title_sort | management information systems for the information age |
topic | Management informatiesystemen gtt Management information systems Information technology Managementinformationssystem (DE-588)4074518-1 gnd |
topic_facet | Management informatiesystemen Management information systems Information technology Managementinformationssystem CD-ROMs |
url | http://www.loc.gov/catdir/enhancements/fy0665/2005053866-t.html http://www.loc.gov/catdir/enhancements/fy0665/2005053866-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015740706&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT haagstephen managementinformationsystemsfortheinformationage AT cummingsmaeve managementinformationsystemsfortheinformationage AT phillipsamy managementinformationsystemsfortheinformationage |