MIS essentials:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Pearson
2015
|
Ausgabe: | 4. ed., global ed. |
Schriftenreihe: | Pearson Always Learning
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index |
Beschreibung: | 429 S. Ill., graph. Darst. 28 cm |
ISBN: | 9781292065298 129206529X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042000071 | ||
003 | DE-604 | ||
005 | 20140806 | ||
007 | t | ||
008 | 140730s2015 xxuad|| |||| 00||| eng d | ||
010 | |a 013372101 | ||
020 | |a 9781292065298 |9 978-1-292-06529-8 | ||
020 | |a 129206529X |9 1-292-06529-X | ||
035 | |a (OCoLC)887745359 | ||
035 | |a (DE-599)BVBBV042000071 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-384 | ||
050 | 0 | |a T58.6 | |
084 | |a QP 300 |0 (DE-625)141850: |2 rvk | ||
100 | 1 | |a Kroenke, David M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a MIS essentials |c David M. Kroenke |
246 | 1 | 3 | |a Management information systems essentials |
250 | |a 4. ed., global ed. | ||
264 | 1 | |a Boston [u.a.] |b Pearson |c 2015 | |
300 | |a 429 S. |b Ill., graph. Darst. |c 28 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Pearson Always Learning | |
500 | |a Includes index | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Business |x Data processing | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027442147&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027442147 |
Datensatz im Suchindex
_version_ | 1804152409632538624 |
---|---|
adam_text | Titel: MIS essentials
Autor: Kroenke, David M
Jahr: 2015
To the Student 18
About the Author 19
Part 1 ! Why MIS?
This Could Happen to You 21
CHAPTER 1: THE IMPORTANCE
OF MIS 23
This Could Happen to You 23
1. Why Is Introduction to MIS the Most Important Class
in the Business School? 25
What Are Cost-Effective Business Applications of
Facebook, Twitter, and Whatever Will Soon Appear? 26
How Can I Attain Job Security? 26
How Can Intro to MIS Help You Learn Nonroutine Skills? 27
Jobs 28
What Is the Bottom Line? 30
2. What Is an Information System? 30
Experiencing MIS InClass Exercise 1: Information Systems
and Online Dating 31
3. What Is MIS? 32
Management and Use of Information Systems 32
Achieving Strategies 32
4. Why Is the Difference Between Information Technology
and Information Systems Important to You? 33
5. What Is Your Role in IS Security? 34
Strong Passwords 34
Password Etiquette 35
How Does the Knowledge in This Chapter Help You? 35
Ethics Guide: Ethics and Professional Responsibility 3G
Guide: Five-Component Careers 38
Case Study 1: The Amazon of Innovation 42
CHAPTER 2: BUSINESS PROCESSES,
INFORMATION SYSTEMS, AND
INFORMATION 45
This Could Happen to You 45
1. Why Does the AIIRoad Team Need to Understand
Business Processes? 47
2. How Can Business Process Modeling Help
AIIRoad? 47
How AIIRoad Works 47
The Existing AIIRoad Process 48
How AIIRoad Processes Must Change to Support 3D
Printing 50
3. How Can Information Systems Improve Process
Quality? 51
What Is Process Quality? 51
Using Information Systems to Improve Process
Quality 53
4. What Is Information? 54
Definitions Vary 55
Where Is Information? 55
Experiencing MIS InClass Exercise 2: How Much Is a
Quarter Worth? 56
5. What Data Characteristics Are Necessary for Quality
Information? 57
Accurate 57
Timely 57
Relevant 58
Just Barely Sufficient 58
Worth Its Cost 58
How Does the Knowledge inThis Chapter HelpYou? 59
Ethics Guide: I Know What s Better, Really 60
Guide: Understanding Perspectives and Points of
View 62
Case Study 2: Eating Our Own Dog Food 67
CHAPTER 3: ORGANIZATIONAL
STRATEGY, INFORMATION
SYSTEMS, AND COMPETITIVE
ADVANTAGE 71
This Could Happen to You 71
1. How Does Organizational Strategy Determine
Information Systems Requirements? 73
2. What Five Forces Determine Industry
Structure? 73
3. What Is Competitive Strategy? 75
4. How Does Competitive Strategy Determine Value
Chain Structure? 76
Primary Activities in the Value Chain 77
Support Activities in the Value Chain 78
Value Chain Linkages 78
5. How Do Value Chains Determine Business Processes
and Information Systems? 78
6. How Do Information Systems Provide Competitive
Advantages? 80
Competitive Advantage via Products 80
Competitive Advantage via Business Processes 80
Experiencing MIS InClass Exercise 3: Competitive Strategy
Over the Web 81
How Does an Actual Company Use IS to Create
Competitive Advantages? 82
How Does This System Create a Competitive
Advantage? 84
How Does the Knowledge in This Chapter Help You? 85
Ethics Guide: Yikes! Bikes 86
Guide: Your Personal Competitive Advantage 88
Case Study 3: BOSU® Balance Trainer 93
Part [ 2 ] Information
Technology
This Could Happen to You 97
CHAPTER 4: HARDWARE AND
SOFTWARE 99
This Could Happen to You 99
1. What Do Business Professionals Need to Know
About Computer Hardware? 101
Basic Components 101
Computer Data 102
In Fewer than 300 Words, How Does a Computer
Work? 103
Why Does a Business Professional Care How a Computer
Works? 104
What Is the Difference Between a Client and a Server? 105
2. What Do Business Professionals Need to Know
About Operating Systems Software? 106
What Are the Major Operating Systems? 107
Virtualization 109
3. What Do Business Professionals Need to Know
About Applications Software? 111
Experiencing MIS InClass Exercise 4: Place Your Bets Now! 112
How Do Organizations Acquire Application Software? 114
What Is Firmware? 116
4. Is Open Source Software a Viable Alternative? 117
Why Do Programmers Volunteer Their Services? 117
How Does Open Source Work? 118
So, Is Open Source Viable? 119
How Doer, the Knowledge in This Chapter Help You? 119
Ethics Guide: Showrooming:Tho Consequences 120
Guide: Because It s Where the Money Is... 122
Case Study 4: The Apple of Your i 127
CHAPTER 5: DATABASE
PROCESSING 131
This Could Happen to You 131
1. What Is the Purpose of a Database? 133
2. What Is a Database? 134
Relationships Among Rows 135
Metadata 136
3. What Is a Database Management System
(DBMS)? 137
Experiencing MIS InClass Exercise 5: How Much Is a
Database Worth? 138
4. How Do Database Applications Make Databases
More Useful? 141
Traditional Forms, Queries, Reports, and Applications 141
Thin-Client Forms, Reports, Queries, and Applications 143
Multi-User Processing 145
5. What Is a NoSQL DBMS? 146
Need to Store New Data Types 146
Need for Faster Processing Using Many Servers 147
Will NoSQL Replace Relational DBMS Products? 147
NoSQL s Impact on the DBMS Product Market 148
What Do Nonrelational DBMS Mean for You? 148
How Does the Knowledge inThis Chapter
Help You? 149
Ethics Guide: Querying Inequality? 150
Guido: No,Thanks, I ll Use a Spreadsheet 152
Case Study 5: Fail Away with Dynamo, Bigtable,
and Cassandra 157
CHAPTER 6: THE CLOUD 159
This Could Happen to You 159
1. Why Is the Cloud the Future for Most
Organizations? 161
What Is the Cloud? 161
Why Is the Cloud Preferred to In-House Hosting? 163
Why Now? 164
When Does the Cloud Not Make Sense? 165
2. How Do Organizations Use the Cloud? 165
Cloud Services from Cloud Vendors 165
Content Delivery Networks from Cloud Vendors 166
Use Web Services Internally 167
3. How Can AIIRoad Parts Use the Cloud? 168
SaaS Services at AIIRoad 168
PaaS Services at AIIRoad 168
IaaS Services at AIIRoad 169
4. How Can Organizations Use Cloud Services
Securely? 169
Virtual Private Network (VPN) 169
Using a Private Cloud 170
Experiencing MIS InClass Exercise 6: What, Exactly, Does
That Standard Mean? 172
Using a Virtual Private Cloud 172
5. What Does the Cloud Mean forYour Future? 173
How Does the Knowledge inThis Chapter HelpYou? 175
Ethics Guide: Cloudy Profit? 176
Guide: You Said What? About Mo? In Class? 178
Case Study 6: FinQloud Forever... Well, at Least for the
Required Interval... 182
Part 3 Using IS for
Competitive Advantage
This Could Happen to You 185
CHAPTER 7: ORGANIZATIONS AND
INFORMATION SYSTEMS 187
This Could Happen to You 187
1. How Do Information Systems Vary by Scope? 189
Personal Information Systems 189
Workgroup Information Systems 189
Enterprise Information Systems 190
Inter-Enterprise Information Systems 190
2. How Do Enterprise Systems Solve the Problems of
Departmental Silos? 190
What Are the Problems of Information Silos? 191
How Do Organizations Solve the Problems of Information
Silos? 193
An Enterprise System for Patient Discharge 193
Business Process Reengineering 194
3. How Do CRM, ERR and EAI Support Enterprise
Systems? 195
Customer Relationship Management (CRM) 195
Experiencing MIS InClass Exercise 7: Choosing a CRM
Product 197
Enterprise Resource Planning (ERP) 198
Enterprise Application Integration (EAI) 199
What Are the Challenges When Implementing and
Upgrading Enterprise Systems? 200
4. How Do Inter-Enterprise IS Solve the Problems of
Enterprise Silos? 201
How Does the Knowledge in This Chapter HelpYou? 203
Ethics Guide: Dialing for Dollars 204
Guide: The Flavor-of-the-Month Club 206
Case Study 7: Using the PRIDE Database 211
CHAPTER 8: SOCIAL MEDIA
INFORMATION SYSTEMS 215
This Could Happen to You 215
1. What Is a Social Media Information System
(SMIS)? 217
Three SMIS Roles 217
SMIS Components 220
2. How Do SMIS Advance Organizational Strategy? 222
Social Media and the Sales and Marketing Activity 223
Social Media and Customer Service 224
Social Media and Inbound and Outbound Logistics 225
Social Media and Manufacturing and Operations 225
Social Media and Human Resources 226
Experiencing MIS InClass Exercise 8: Any Other Kayakers
Here at the Grand Canyon? 227
3. How Do SMIS Increase Social Capital? 227
What Is the Value of Social Capital? 228
How Do Social Networks Add Value to Businesses? 228
Using Social Networking to Increase the Number of
Relationships 229
Using Social Networks to Increase the Strength of
Relationships 230
Connecting to Those with More Assets 230
4. How Can Organizations Manage the Risks of Social
Media? 231
Managing the Risk of Employee Communication 231
Managing the Risk of User-Generated Content 232
5. Where Is Social Media Taking Us? 234
How Does the Knowledge in This Chapter HelpYou? 235
Ethics Guide: Social Marketing? Or Lying? 236
Guide: Social Recruiting 238
Case Study 8: Sedona Social 242
CHAPTER 9: BUSINESS
INTELLIGENCE SYSTEMS 245
This Could Happen to You 245
1. How Do Organizations Use Business Intelligence (Bl)
Systems? 247
How Do Organizations Use BI? 247
What Are Typical Uses for BI? 248
2. What Are the Three Primary Activities in the BI
Process? 250
Using Business Intelligence to Find Candidate Parts at
AllRoad 250
3. How Do Organizations Use Data Warehouses and
Data Marts to Acquire Data? 256
Problems with Operational Data 257
Data Warehouses Versus Data Marts 259
4. What Are Three Techniques for Processing BI
Data? 260
Reporting Analysis 260
Data Mining Analysis 260
Unsupervised Data Mining 261
Supervised Data Mining 261
BigData 261
MapReduce 262
Hadoop 263
5. What Are the Alternatives for Publishing BI? 263
Characteristics of BI Publishing Alternatives 263
Experiencing MIS InClass Exercise 9: What Singularity Have
We Wrought? 264
What Are the Two Functions of a BI Server? 266
How Does the Knowledge in This Chapter HelpYou? 267
Ethics Guide: Unseen Cyberazzi 268
Guide: Semantic Security 270
Case Study 9: Hadoop the Cookie Cutter 274
2. Why Is Systems Development Difficult
and Risky? 281
The Difficulty of Requirements Determination 282
Changes in Requirements 283
Scheduling and Budgeting Difficulties 283
Changing Technology 283
Diseconomies of Scale 284
Is It Really So Bleak? 284
3. What Are the Five Phases of the SDLC? 284
4. How Is System Definition Accomplished? 285
Define System Goals and Scope 286
Assess Feasibility 286
Form a Project Team 287
5. What Is the Users Role in the Requirements
Phase? 287
Determine Requirements 288
Experiencing MIS InClass Exercise 10: GardenTracker 289
Approve Requirements 290
Role of a Prototype 290
6. How Are the Five Components Designed? 290
Hardware Design 290
Software Design 291
Database Design 291
Procedure Design 291
Design of Job Descriptions 291
7. How Is an Information System Implemented? 292
System Testing 292
System Conversion 293
8. What Are the Tasks for System Maintenance? 294
9. What Are Some of the Problems with the
SDLC? 296
The SDLC Waterfall 296
Requirements Documentation Difficulty 296
Scheduling and Budgeting Difficulties 296
How Does the Knowledge in This Chapter HelpYou? 297
Ethics Guido: Estimation Ethics 298
Guide: The Real Estimation Process 300
Case Study 10: The Cost of PRIDE? 305
Part 4 Information
Systems Management
This Could Happen to You 277
CHAPTER 10: INFORMATION
SYSTEMS DEVELOPMENT 279
This Could Happen to You 279
1. What Is Systems Development? 281
CHAPTER 11: INFORMATION
SYSTEMS MANAGEMENT 307
This Could Happen to You 307
1. What Are the Functions and Organization of the IS
Department? 309
How Is the IS Department Organized? 310
What IS-Related Job Positions Exist? 311
2. How Do Organizations Plan the Use of IS? 313
Align Information Systems with Organizational
Strategy 313
Communicate IS Issues to the Executive Group 313
Develop Priorities and Enforce Them Within the IS
Department 314
Sponsor the Steering Committee 314
3. What Are the Advantages and Disadvantages of
Outsourcing? 314
Experiencing MIS InClass Exercise 11: Setting Up the PRIDE
Systems IS Department 315
Outsourcing Information Systems 315
International Outsourcing 317
What Are the Outsourcing Alternatives? 317
What Are the Risks of Outsourcing? 318
4. What Are Your User Rights and Responsibilities? 321
Your User Rights 321
Your User Responsibilities 322
How Does the Knowledge inThis Chapter Help You? 323
Ethics Guide: Using the Corporate Computer 324
Guide: Is Outsourcing Fool s Gold? 326
Case Study 11: iApp$$$$ 4 U 330
CHAPTER 12: INFORMATION
SECURITY MANAGEMENT 333
This Could Happen to You 333
1. What Is the Goal of Information Systems
Security? 335
The IS Security Threat/Loss Scenario 335
What Are the Sources of Threats? 336
What Types of Security Loss Exist? 337
Goal of Information Systems Security 339
2. How Big Is the Computer Security Problem? 340
3. How Should You Respond to Security Threats? 341
4. How Should Organizations Respond to Security
Threats? 343
Experiencing MIS InClass Exercise 12: Phishingfor Credit
Cards, Identifying Numbers, Bank Accounts 344
5. How Can Technical Safeguards Protect Against
Security Threats? 345
Identification and Authentication 345
Single Sign-on for Multiple Systems 346
Encryption 347
Firewalls 348
Malware Protection 349
Design for Secure Applications 350
6. How Can Data Safeguards Protect Against Security
Threats? 350
7. How Can Human Safeguards Protect Against
Security Threats? 351
Human Safeguards for Employees 352
Account Administration 354
Systems Procedures 355
Security Monitoring 356
8. How Should Organizations Respond to Security
Incidents? 356
How Does the Knowledge inThis Chapter Help You? 357
Ethics Guide: Is It Spying or Just Good
Management? 358
Guide: The Final, Final Word 360
Case Study 12: Will You Trust FIDO? 364
|
any_adam_object | 1 |
author | Kroenke, David M. |
author_facet | Kroenke, David M. |
author_role | aut |
author_sort | Kroenke, David M. |
author_variant | d m k dm dmk |
building | Verbundindex |
bvnumber | BV042000071 |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.6 |
callnumber-search | T58.6 |
callnumber-sort | T 258.6 |
callnumber-subject | T - General Technology |
classification_rvk | QP 300 |
ctrlnum | (OCoLC)887745359 (DE-599)BVBBV042000071 |
discipline | Wirtschaftswissenschaften |
edition | 4. ed., global ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01420nam a2200421 c 4500</leader><controlfield tag="001">BV042000071</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140806 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140730s2015 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013372101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781292065298</subfield><subfield code="9">978-1-292-06529-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">129206529X</subfield><subfield code="9">1-292-06529-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)887745359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042000071</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 300</subfield><subfield code="0">(DE-625)141850:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kroenke, David M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">MIS essentials</subfield><subfield code="c">David M. Kroenke</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Management information systems essentials</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed., global ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Pearson</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">429 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">28 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Pearson Always Learning</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027442147&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027442147</subfield></datafield></record></collection> |
id | DE-604.BV042000071 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:10:15Z |
institution | BVB |
isbn | 9781292065298 129206529X |
language | English |
lccn | 013372101 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027442147 |
oclc_num | 887745359 |
open_access_boolean | |
owner | DE-384 |
owner_facet | DE-384 |
physical | 429 S. Ill., graph. Darst. 28 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Pearson |
record_format | marc |
series2 | Pearson Always Learning |
spelling | Kroenke, David M. Verfasser aut MIS essentials David M. Kroenke Management information systems essentials 4. ed., global ed. Boston [u.a.] Pearson 2015 429 S. Ill., graph. Darst. 28 cm txt rdacontent n rdamedia nc rdacarrier Pearson Always Learning Includes index Datenverarbeitung Wirtschaft Management information systems Business Data processing HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027442147&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kroenke, David M. MIS essentials Datenverarbeitung Wirtschaft Management information systems Business Data processing |
title | MIS essentials |
title_alt | Management information systems essentials |
title_auth | MIS essentials |
title_exact_search | MIS essentials |
title_full | MIS essentials David M. Kroenke |
title_fullStr | MIS essentials David M. Kroenke |
title_full_unstemmed | MIS essentials David M. Kroenke |
title_short | MIS essentials |
title_sort | mis essentials |
topic | Datenverarbeitung Wirtschaft Management information systems Business Data processing |
topic_facet | Datenverarbeitung Wirtschaft Management information systems Business Data processing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027442147&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kroenkedavidm misessentials AT kroenkedavidm managementinformationsystemsessentials |