You are on page 1of 10

Test Bank for Business Driven Technology,

7th Edition Paige Baltzan Amy Phillips


Full version at:
https://testbankbell.com/product/test-bank-for-business-driven-technology-7th-edition-paige-
baltzan-amy-phillips/

Description:
Business Driven Information Systems, 4e discusses various business initiatives first and how
technology supports those initiatives second. The premise for this unique approach is that
business initiatives should drive technology choices. Every discussion first addresses the
business needs and then addresses the technology that supports those needs. This updated edition
provides the foundation that will enable students to achieve excellence in business through its
updated case studies, closing cases, technology plug-ins, expanded IT topics, and new project
management content.
Business Driven Information Systems is designed to give students the ability to understand how
information technology can be a point of strength for an organization, and McGraw-Hill’s online
learning and assessment solution, Connect MIS, helps students apply this knowledge.

 ISBN-10 : 0073376892
 ISBN-13 : 978-1259111082

Table of contents:
1. Cover
2. Title
3. Copyright
4. Dedication
5. Brief Contents
6. Contents
7. Connect
8. Preface
9. Walkthrough
10. Acknowledgments
11. About the Author
12. module 1 Business Driven MIS
13. CHAPTER 1 Management Information Systems: Business Driven MIS
14. opening case study: The Fourth Industrial Revolution: The Backdoor to Reengineering
Reality
15. Section 1.1 Business Driven MIS
16. COMPETING IN THE INFORMATION AGE
17. Data
18. Information
19. Business Intelligence
20. Knowledge
21. THE CHALLENGE OF DEPARTMENTAL COMPANIES AND THE MIS SOLUTION
22. The MIS Solution
23. Systems Thinking
24. MIS Department Roles and Responsibilities
25. Section 1.2 Business Strategy
26. IDENTIFYING COMPETITIVE ADVANTAGES
27. SWOT ANALYSIS: UNDERSTANDING BUSINESS STRATEGIES
28. THE FIVE FORCES MODEL—EVALUATING INDUSTRY ATTRACTIVENESS
29. Buyer Power
30. Supplier Power
31. Threat of Substitute Products or Services
32. Threat of New Entrants
33. Rivalry among Existing Competitors
34. Analyzing the Airline Industry
35. THE THREE GENERIC STRATEGIES—CHOOSING A BUSINESS FOCUS
36. VALUE CHAIN ANALYSIS—EXECUTING BUSINESS STRATEGIES
37. Learning Outcome Review
38. Key Terms
39. Review Questions
40. Closing Case One
41. Closing Case Two
42. Critical Business Thinking
43. Apply Your Knowledge Business Projects
44. Ayk Application Projects
45. CHAPTER 2 Decisions and Processes: Value Driven Business
46. opening case study: The Future of Work
47. Section 2.1 Decision Support Systems
48. MAKING ORGANIZATIONAL BUSINESS DECISIONS
49. The Decision-Making Process
50. Decision-Making Essentials
51. MEASURING ORGANIZATIONAL BUSINESS DECISIONS
52. Efficiency and Effectiveness Metrics
53. USING MIS TO MAKE BUSINESS DECISIONS
54. Operational Support Systems
55. Managerial Support Systems
56. Strategic Support Systems
57. USING AI TO MAKE BUSINESS DECISIONS
58. Machine Learning
59. Neural Networks
60. Virtual Reality
61. Section 2.2 Business Processes
62. MANAGING BUSINESS PROCESSES
63. Business Process Modeling
64. USING MIS TO IMPROVE BUSINESS PROCESSES
65. Operational Business Processes—Automation
66. Managerial Business Processes—Streamlining
67. Strategic Business Processes—Reengineering
68. DATA MINING
69. Data Mining Process Model
70. Data Mining Analysis Techniques
71. Data Mining Modeling Techniques for Predictions
72. Learning Outcome Review
73. Key Terms
74. Review Questions
75. Closing Case One
76. Closing Case Two
77. Critical Business Thinking
78. Apply Your Knowledge Business Projects
79. Ayk Application Projects
80. CHAPTER 3 Ebusiness: Electronic Business Value
81. opening case study: The Warby Parker Way
82. Section 3.1 Web 1.0: Ebusiness
83. DISRUPTIVE TECHNOLOGY
84. Disruptive versus Sustaining Technology
85. The Internet and World Wide Web—The Ultimate Business Disruptors
86. WEB 1.0: THE CATALYST FOR EBUSINESS
87. Expanding Global Reach
88. Opening New Markets
89. Reducing Costs
90. Improving Effectiveness
91. THE FOUR EBUSINESS MODELS
92. Business-to-Business (B2B)
93. Business-to-Consumer (B2C)
94. Consumer-to-Business (C2B)
95. Consumer-to-Consumer (C2C)
96. Ebusiness Forms and Revenue-Generating Strategies
97. Ebusiness Fraud
98. EBUSINESS TOOLS FOR CONNECTING AND COMMUNICATING
99. Email
100. Instant Messaging
101. Podcasting
102. Videoconferencing
103. Web Conferencing
104. Content Management Systems
105. Section 3.2 Web 2.0: Business 2.0
106. WEB 2.0: ADVANTAGES OF BUSINESS 2.0
107. Content Sharing through Open Sourcing
108. User-Contributed Content
109. Collaboration Inside the Organization
110. Collaboration Outside the Organization
111. NETWORKING COMMUNITIES WITH BUSINESS 2.0
112. Social Tagging
113. BUSINESS 2.0 TOOLS FOR COLLABORATING
114. Blogs
115. Wikis
116. Mashups
117. WEB 3.0: DEFINING THE NEXT GENERATION OF ONLINE BUSINESS
OPPORTUNITIES
118. Learning Outcome Review
119. Key Terms
120. Review Questions
121. Closing Case One
122. Closing Case Two
123. Critical Business Thinking
124. Apply Your Knowledge Business Projects
125. Ayk Application Projects
126. CHAPTER 4 Ethics and Information Security: MIS Business Concerns
127. opening case study: Cambridge Analytica: Illegal Data Scraping
128. Section 4.1 Ethics
129. INFORMATION ETHICS
130. Information Does Not Have Ethics, People Do
131. DEVELOPING INFORMATION MANAGEMENT POLICIES
132. Ethical Computer Use Policy
133. Information Privacy Policy
134. Acceptable Use Policy
135. Email Privacy Policy
136. Social Media Policy
137. Workplace MIS Monitoring Policy
138. Section 4.2 Information Security
139. PROTECTING INTELLECTUAL ASSETS
140. Hackers: A Dangerous Threat to Business
141. Viruses: A Dangerous Threat to Business
142. THE FIRST LINE OF DEFENSE—PEOPLE
143. THE SECOND LINE OF DEFENSE—TECHNOLOGY
144. People: Authentication and Authorization
145. Data: Prevention and Resistance
146. Attack: Detection and Response
147. Learning Outcome Review
148. Key Terms
149. Review Questions
150. Closing Case One
151. Closing Case Two
152. Critical Business Thinking
153. Apply Your Knowledge Business Projects
154. Ayk Application Projects
155. module 2 Technical Foundations of MIS
156. CHAPTER 5 Infrastructures: Sustainable Technologies
157. opening case study: Envision 2030: 17 Goals to Transform the World for Persons
with Disabilities
158. Section 5.1 MIS Infrastructures
159. THE BUSINESS BENEFITS OF A SOLID MIS INFRASTRUCTURE
160. SUPPORTING OPERATIONS: INFORMATION MIS INFRASTRUCTURE
161. Backup and Recovery Plan
162. Disaster Recovery Plan
163. Business Continuity Plan
164. SUPPORTING CHANGE: AGILE MIS INFRASTRUCTURE
165. Accessibility
166. Availability
167. Maintainability
168. Portability
169. Reliability
170. Scalability
171. Usability
172. Section 5.2 Building Sustainable MIS Infrastructures
173. MIS AND THE ENVIRONMENT
174. Increased Electronic Waste
175. Increased Energy Consumption
176. Increased Carbon Emissions
177. SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS
INFRASTRUCTURE
178. Grid Computing
179. Virtualized Computing
180. Cloud Computing
181. Public Cloud
182. Private Cloud
183. Community Cloud
184. Hybrid Cloud
185. UTILITY COMPUTING
186. Infrastructure as a Service (IaaS)
187. Software as a Service (SaaS)
188. Platform as a Service (PaaS)
189. Learning Outcome Review
190. Key Terms
191. Review Questions
192. Closing Case One
193. Closing Case Two
194. Critical Business Thinking
195. Apply Your Knowledge Business Projects
196. Ayk Application Projects
197. CHAPTER 6 Data: Business Intelligence
198. opening case study: Bitcoin
199. Section 6.1 Data, Information, and Databases
200. DATA QUALITY
201. Data Type: Transactional and Analytical
202. Data Timeliness
203. Data Quality
204. Data Governance
205. STORING DATA USING A RELATIONAL DATABASE MANAGEMENT
SYSTEM
206. Storing Data Elements in Entities and Attributes
207. Creating Relationships through Keys
208. Coca-Cola Relational Database Example
209. USING A RELATIONAL DATABASE FOR BUSINESS ADVANTAGES
210. Increased Flexibility
211. Increased Scalability and Performance
212. Reduced Data Redundancy
213. Increased Data Integrity (Quality)
214. Increased Data Security
215. Section 6.2 Data Warehouse and Blockchain
216. BUSINESS INTELLIGENCE
217. The Problem: Data Rich, Information Poor
218. The Solution: Data Aggregation
219. DATA WAREHOUSE
220. Data Analysis
221. Data Lake
222. Data Cleansing or Scrubbing
223. Data Visualization
224. BLOCKCHAIN: DISTRIBUTED COMPUTING
225. How Blockchains Work
226. Blockchain Advantages
227. Learning Outcome Review
228. Key Terms
229. Review Questions
230. Closing Case One
231. Closing Case Two
232. Critical Business Thinking
233. Apply Your Knowledge Business Projects
234. Ayk Application Projects
235. CHAPTER 7 Networks: Mobile Business
236. opening case study: Disrupting the Taxi: Uber
237. Section 7.1 Connectivity: The Wireless World
238. OVERVIEW OF A CONNECTED WORLD
239. WIRELESS NETWORKS
240. WIRELESS NETWORK CATEGORIES
241. Personal Area Networks
242. Wireless LANs
243. Wireless MANs
244. Wireless WAN—Cellular Communication System
245. Wireless WAN—Satellite Communication System
246. PROTECTING WIRELESS NETWORKS
247. Section 7.2 Mobility: The Business Value of a Wireless World
248. MOBILE ENTERPRISE MANAGEMENT
249. Mobile Device Management
250. Mobile Application Management
251. Mobile Information Management
252. BUSINESS APPLICATIONS OF WIRELESS TECHNOLOGIES
253. Radio-Frequency Identification (RFID)
254. Global Positioning System (GPS)
255. Geographic Information System (GIS)
256. Learning Outcome Review
257. Key Terms
258. Review Questions
259. Closing Case One
260. Closing Case Two
261. Critical Business Thinking
262. Apply Your Knowledge Business Projects
263. Ayk Application Projects
264. module 3 Enterprise MIS
265. CHAPTER 8 Enterprise Applications: Business Communications
266. opening case study: Blockchain Disrupting the Supply Chain
267. Section 8.1 Supply Chain Management
268. BUILDING A CONNECTED CORPORATION THROUGH INTEGRATIONS
269. Integration Tools
270. SUPPLY CHAIN MANAGEMENT
271. Blockchain Revamping the Supply Chain
272. TECHNOLOGIES REINVENTING THE SUPPLY CHAIN
273. 3D Printing Supports Procurement
274. RFID Supports Logistics
275. Drones Support Logistics
276. Robotics Supports Materials Management
277. Section 8.2 Customer Relationship Management and Enterprise Resource
Planning
278. CUSTOMER RELATIONSHIP MANAGEMENT
279. Evolution of CRM
280. The Power of the Customer
281. Measuring CRM Success
282. OPERATIONAL AND ANALYTICAL CRM
283. Marketing and Operational CRM
284. Sales and Operational CRM
285. Customer Service and Operational CRM
286. Analytical CRM
287. ENTERPRISE RESOURCE PLANNING
288. The Evolution of ERP
289. Core ERP Components
290. Extended ERP Components
291. Measuring ERP Success
292. ORGANIZATIONAL INTEGRATION WITH ERP
293. On-Premise ERP
294. Cloud ERP
295. Hybrid ERP
296. Learning Outcome Review
297. Key Terms
298. Review Questions
299. Closing Case One
300. Closing Case Two
301. Critical Business Thinking
302. Apply Your Knowledge Business Projects
303. Ayk Application Projects
304. CHAPTER 9 Systems Development and Project Management: Corporate
Responsibility
305. opening case study: Let My People Go Surfing: The Education of a Reluctant
Businessman
306. Section 9.1 Developing Enterprise Applications
307. THE SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
308. Phase 1: Planning
309. Phase 2: Analysis
310. Phase 3: Design
311. Phase 4: Development
312. Phase 5: Testing
313. Phase 6: Implementation
314. Phase 7: Maintenance
315. SOFTWARE DEVELOPMENT METHODOLOGY: THE WATERFALL
316. AGILE SOFTWARE DEVELOPMENT METHODOLOGIES
317. Rapid Application Development (RAD) Methodology
318. Extreme Programming Methodology
319. Rational Unified Process (RUP) Methodology
320. Scrum Methodology
321. Section 9.2 Project Management
322. USING PROJECT MANAGEMENT TO DELIVER SUCCESSFUL PROJECTS
323. Unclear or Missing Business Requirements
324. Skipped Phases
325. Changing Technology
326. The Cost of Finding Errors in the SDLC
327. Balance of the Triple Constraint
328. PRIMARY PROJECT PLANNING DIAGRAMS
329. OUTSOURCING PROJECTS
330. Outsourcing Benefits
331. Outsourcing Challenges
332. Learning Outcome Review
333. Key Terms
334. Review Questions
335. Closing Case One
336. Closing Case Two
337. Critical Business Thinking
338. Apply Your Knowledge Business Projects
339. Ayk Application Projects
340. appendices
341. APPENDIX A Hardware and Software Basics
342. INTRODUCTION
343. HARDWARE BASICS
344. Central Processing Unit
345. Primary Storage
346. Secondary Storage
347. Input Devices
348. Output Devices
349. Communication Devices
350. COMPUTER CATEGORIES
351. SOFTWARE BASICS
352. System Software
353. Application Software
354. Distributing Application Software
355. Key Terms
356. Apply Your Knowledge
357. APPENDIX B Networks and Telecommunications
358. INTRODUCTION
359. NETWORK BASICS
360. ARCHITECTURE
361. Peer-to-Peer Networks
362. Client/Server Networks
363. TOPOLOGY
364. PROTOCOLS
365. Ethernet
366. Transmission Control Protocol/Internet Protocol
367. MEDIA
368. Wire Media
369. Wireless Media
370. Key Terms
371. Apply Your Knowledge
372. APPENDIX C Designing Databases
373. INTRODUCTION
374. THE RELATIONAL DATABASE MODEL
375. Entities and Attributes
376. Type of Attributes
377. Business Rules
378. DOCUMENTING ENTITY-RELATIONSHIP DIAGRAMS
379. Basic Entity Relationships
380. Relationship Cardinality
381. RELATIONAL DATA MODEL AND THE DATABASE
382. From Entities to Tables
383. Logically Relating Tables
384. Key Terms
385. Apply Your Knowledge
386. APPENDIX D Emerging Trends and Technologies
387. INTRODUCTION
388. TRENDS SHAPING OUR FUTURE
389. The World’s Population Will Double in the Next 40 Years
390. People in Developed Countries Are Living Longer
391. The Growth in Information Industries Is Creating a Knowledge-Dependent Global
Society
392. The Global Economy Is Becoming More Integrated
393. The Economy and Society Are Dominated by Technology
394. Pace of Technological Innovation Is Increasing
395. Time Is Becoming One of the World’s Most Precious Commodities
396. TECHNOLOGIES SHAPING OUR FUTURE
397. The Digital Mesh
398. Smart Machines
399. The New IT Reality
400. Key Terms
401. Apply Your Knowledge
402. APPENDIX E Connectivity: The Business Value of a Networked World
403. OVERVIEW OF A CONNECTED WORLD
404. Network Categories
405. Network Providers
406. Network Access Technologies
407. Network Protocols
408. Network Convergence
409. BENEFITS OF A CONNECTED WORLD
410. Key Terms
411. Apply Your Knowledge
412. Apply Your Knowledge
413. Glossary
414. Notes
415. Index

Read More

You might also like