Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
116Activity

Table Of Contents

Chapter 1The Modern Organization in the Global, Web-Based Environment2
Chapter 2Information Systems: Concepts and Management34
2.1Types of Information Systems38
Chapter 3Ethics, Privacy, and Information Security70
3.2Threats to Information Security83
3.3Protecting Information Resources99
Chapter 4Data and Knowledge Management122
4.2The Database Approach128
4.3Database Management Systems132
Chapter 5Network Applications158
5.1Network Applications162
5.3E-Learning and Distance Learning185
Chapter 6E-Business and E-Commerce196
6.5Ethical and Legal Issues in E-Business223
Chapter 7Wireless, Mobile Computing, and Mobile Commerce236
7.1Wireless Technologies241
7.5Wireless Security266
Chapter 8Organizational Information Systems276
8.1Transaction Processing Systems280
8.2Functional Area Information Systems282
8.3Enterprise Resource Planning Systems292
Chapter 9Customer Relationship Management304
Chapter 10Supply Chain Management330
Chapter 11Managerial Support Systems352
Chapter 12Acquiring Information Systems and Applications388
The Modern Organization in the Global, Web-Based Environment
1.1Business Processes and Business Process Management 7
1.1Business Processes and Business Process Management
1.2Information Systems: Concepts and Definitions
1.3The Global Web-Based Platform
1.4Business Pressures, Organizational Responses, and IT Support 15
1.4Business Pressures, Organizational Responses, and IT Support
1.5Why Are Information Systems Important to Me? 23
1.5Why Are Information Systems Important to Me?
1.6The Plan of the Book 27
1.6The Plan of the Book
2.1Types of Information Systems
2.2Competitive Advantage and Strategic Information Systems 45
2.2Competitive Advantage and Strategic Information Systems
2.3Why Are Information Systems So Important to Organizations and Society?
2.4Managing Information Resources
3.1Ethical Issues 75
3.2Threats to Information Security 83
3.2 Threats to Information Security
3.3Protecting Information Resources 99
3.3 Protecting Information Resources
4.2 The Database Approach
4.3 Database Management Systems
4.4Data Warehousing 139
4.6 Knowledge Management
5.1 Network Applications
5.3E-Learning and Distance Learning 185
5.3 E-Learning and Distance Learning
6.1Overview of E-Business and E-Commerce
6.2Business-to-Consumer (B2C) Electronic Commerce
6.3Business-to-Business (B2B) Electronic Commerce
6.4Electronic Payments
6.4Electronic Payments 217
6.5Ethical and Legal Issues in E-Business 223
6.5Ethical and Legal Issues in E-Business
7.1Wireless Technologies 241
7.1Wireless Technologies
7.2Wireless Computer Networks and Internet Access
7.3Mobile Computing and Mobile Commerce 255
7.3Mobile Computing and Mobile Commerce
7.4Pervasive Computing 261
7.4Pervasive Computing
7.5Wireless Security
8.1Transaction Processing Systems
8.2Functional Area Information Systems
8.3Enterprise Resource Planning Systems
9.1Defining Customer Relationship Management 307
9.1Defining Customer Relationship Management
9.2Operational CRM
9.3Analytical CRM
9.4Other Types of CRM 319
9.4Other Types of CRM
10.1Supply Chains
10.2Supply Chain Management 335
10.2Supply Chain Management
10.3Information Technology Support for Supply Chain Management 341
10.3Information Technology Support for Supply Chain Management
11.1 Managers and Decision Making
11.2 Business Intelligence
11.3Data Visualization Technologies 369
11.3 Data Visualization Technologies
11.4 Intelligent Systems
12.1Information Technology Project Management
12.2Planning for and Justifying IT Applications
12.2Planning for and Justifying IT Applications 395
12.3Strategies for Acquiring IT Applications
12.4The Traditional Systems Development Life Cycle
12.5Alternative Methods and Tools for Systems Development
12.6Vendor and Software Selection 411
12.6Vendor and Software Selection
TG1.1Introduction
TG1.2Strategic Hardware Issues
TG1.3Innovations in Hardware Utilization 423
TG1.3Innovations in Hardware Utilization
TG1.4Computer Hierarchy
TG1.5Input and Output Technologies
TG1.6The Central Processing Unit
TG1.7Computer Memory 437
TG1.7Computer Memory
TG2.1 Significance of Software
TG2.2Software Issues 453
TG2.3Systems Software 457
TG2.4 Application Software
TG2.5 Programming Languages
TG3.2 Behavioral Actions
TG3.3 Computer-Based Actions
TG3.3Computer-Based Actions 475
TG4.1The Telecommunications System
TG4.2Types of Networks
TG4.2Types of Networks 507
TG4.3Network Fundamentals 509
TG4.3Network Fundamentals
TG5.1The Internet
TG5.2The World Wide Web
0 of .
Results for:
No results containing your search query
P. 1
Introduction to Information Systems 3rd

Introduction to Information Systems 3rd

Ratings:

5.0

(1)
|Views: 16,576 |Likes:
Published by jwagnre4321

More info:

Published by: jwagnre4321 on Aug 28, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/05/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 232 are not shown in this preview.
You're Reading a Free Preview
Pages 234 to 580 are not shown in this preview.

Activity (116)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Nyakochieng liked this
Mahmoud Fawzy liked this
Dineth Neranjana liked this
Suman Adhikari liked this
Suman Adhikari liked this
Bhishma J Karki liked this
Josh Jr Robert liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->