My Account Log in

1 option

Information systems : what every business student needs to know / by Efrem G. Mallach.

Ebook Central Academic Complete Available online

View online
Format:
Book
Author/Creator:
Mallach, Efrem, 1942- author.
Series:
Chapman & Hall/CRC textbooks in computing.
Chapman & Hall/CRC textbooks in computing
Language:
English
Subjects (All):
Management information systems.
Business--Data processing.
Business.
Business--Information technology.
Information technology--Management.
Information technology.
Physical Description:
1 online resource (391 pages).
Edition:
Second edition.
Place of Publication:
Boca Raton, FL : CRC Press LLC, [2020]
Summary:
Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study. Key features: Single-mindedly for business students who are not technical specialists Doesnt try to prepare IS professionals; other courses will do that Stresses the enabling technologies and application areas that matter the most today Based on the authors real-world experience Up to date regarding technology and tomorrows business needs This is the book the authorand, more importantly, his studentswishes he had when he started teaching. Dr. Mallach holds degrees in engineering from Princeton and MIT, and in business from Boston University. He worked in the computer industry for two decades, as Director of Strategic Planning for a major computer firm and as co-founder/CEO of a computer marketing consulting firm. He taught information systems in the University of Massachusetts (Lowell and Dartmouth) business schools for 18 years, then at Rhode Island College following his retirement. He consults in industry and serves as Webmaster for his community, in between hiking and travel with his wife.
Contents:
Cover
Half Title
Series Page
Title Page
Copyright Page
Contents
Chapter 1 Why Information Systems Matter in Business-And to You
Chapter Outline
Why This Chapter Matters
Chapter Take-Aways
1.1 The Value of Information
Scenario 1
Possible Outcome A
Possible Outcome B
Scenario 2
Scenario 3
What This Means
1.2 Systems and Information Systems
1.3 What Is Information, Really?
Definitions
How These Work
Information Quality
Correctness
Accuracy
Precision
Timeliness
Consistency
Conformity to Needs and Expectations
Completeness
Cost
In a Nutshell
1.4 Legal and Ethical Information Use
Using a Computer, or Information, as a Tool to Commit a Crime
Using a Computer, or Information, as the Object of a Crime
Using Information Unethically
Key Point Recap
Key Terms
Review Questions
Discussion Questions
Khoury Candy Distributors, Inc.
Khoury Candy Distributors Background
KCD Today
KCD's Information Systems
KCD People
Questions
Case 1: Trusting a Spreadsheet
Case 2: Lynn McCallum, MD
Bibliography
Chapter 2 The Role of Information Systems in Business
2.1 A Perspective on Information Systems
2.2 Competitive Strategies
2.3 The Five Basic Competitive Forces
Rivalry among Existing Competitors
The Impact of the Internet and the Web on Rivalry among Existing Competitors
Bargaining Power of Customers
The Impact of the Internet and the Web on the Bargaining Power of Customers
Bargaining Power of Suppliers
The Impact of the Internet and the Web on the Bargaining Power of Suppliers
Threat of New Entrants.
The Impact of the Internet and the Web on the Threat of New Entrants
Threat of Substitute Products or Services
The Impact of the Internet and the Web on the Threat of Substitute Products and Services
2.4 The Value Chain
Khoury Candy Distributors: Strategy, Value Chain, Competitive Advantage
Case 1: Using Social Media to Compete
Case 2: Pharmacy Processes and Faxing
Chapter 3 Information Systems Hardware
3.1 Computer Structure
3.2 Switches: The Basic Hardware Building Blocks
3.3 Computer System Components
Central Processor
Hardware Evolution
Processor Clock Speed
Multiple Cores, Multiple Threads
Specialized Processors
Primary Storage
Secondary Storage
Rotating Magnetic Disks
Optical Disks
Solid-State Storage
Magnetic Tape Storage
Enterprise Storage Subsystems
Cloud Storage
Input Devices
Output Devices
Displays (Monitors)
Printers
Other
3.4 Computer Categories
Khoury Candy Distributors Hardware
Case 1: The Green Grid Measures Energy Efficiency
Case 2: Meltin'Pot Deploys Blade Servers
Chapter 4 Information Systems Software
4.1 Software Concepts
Writing Software
Open-Source Software
4.2 System Software
Operating System
Defining the User Interface
Managing Shared Resources
Providing Shared Services
Other System Software
4.3 Application Software
Horizontal versus Vertical Applications
Off-the-Shelf versus Custom Applications.
Open-Source Applications
4.4 Embedded Software
4.5 Trends in Computing
Virtualization
Client/Server Computing
Cloud Computing
Artificial Intelligence
4.6 Software Licensing
Khoury Candy Distributors Software
Case 1: Security through Open Source
Case 2: Rescuing Food
Chapter 5 Data, Databases, and Database Management
5.1 The Database Concept
5.2 Operational Databases
Relational Database Concepts
An Example: MyVid Video Site
Flat Files
Normalization
Entity-Relationship Diagramming
Distributed Databases
5.3 Databases for Decision Making
Dimensional Databases
"Big Data"
Hadoop
5.4 Database Management Software
5.5 Database Security
Khoury Candy Distributors Databases
Case 1: Netflix Moves to Cassandra
Case 2: Homeless in Los Angeles
Chapter 6 Information Networks
6.1 Communication Links and Networks
6.2 Communication Links and Devices
Physical Communication Links
Wireless Communication Links
One-Way or Two-Way?
6.3 Local Area Networks
Wired LANs
Wi-Fi
Wi-Fi Privacy and Security
Other Wireless LANs
Bluetooth
Radio Frequency ID
Near Field Communication
ZigBee
Personal Area Networks
6.4 Wide Area Networks and the Internet
Packet Switching
Alternative Switching Methods
6.5 Internet Applications
The World Wide Web
Web 1.0
Web 2.0
Streaming
Internet Telephony
Streaming Video
Teleconferencing.
Net Neutrality
The Internet of Things
Other Internet Applications
Email
File Transfer
6.6 Network Security
Human Aspects of Network Security
Phishing
Stolen Email Address Lists
Ransomware
Pharming
Identity Theft
Privacy
Security and the Internet of Things
A Totally Secure System?
Khoury Candy Distributors Networks
Case 1: Connecting Remotest Michigan
Case 2: Helping Mothers Have Healthy Babies in Ghana
Chapter 7 Integrating the Organization
7.1 Ancient History: Information Silos
7.2 Functional Information Systems
Accounting
Finance
Sales
Marketing
Human Resources
Purchasing
Production
Research and Development
7.3 Transaction Processing
Data Validation
Batch versus Online Transaction Processing
7.4 Enterprise Resource Planning Systems
Enterprise Resource Planning (ERP) Software
Business Processes
Approaches to Using ERP
Benefits of ERP
Concerns with ERP
Business Process Re-Engineering
7.5 Enterprise Application Integration (EAI)
ERP or EAI?
7.6 Intranets
Intranets and the Internet of Things
7.7 Integrating Society
Khoury Candy Distributors Chooses an ERP System
Case 1: City of Edinburgh Modernizes
Case 2: Serenic Accounting Software
Chapter 8 Connecting with Customers and Suppliers
8.1 E-Business and E-Commerce
Categories of E-Commerce and E-Business
Business-to-Consumer
Business-to-Business.
Consumer-to-Consumer
Government-to-Consumer
Government-to-Business
Finding an E-Commerce Site
Portals
Auctions
Reverse Auctions
Exchanges
Getting into E-Commerce
Mobile Commerce (M-Commerce)
Mobile Payments
E-Commerce Issues
Getting the Word Out
Disintermediation
Channel Conflict
Fulfillment
Taxation
8.2 Customer Relationship Management
Operational CRM
Level 1: Contact Management
Level 2: Sales Management
Level 3: Opportunity Management
Regaining the Personal Touch via Operational CRM
Analytical CRM
The RFM Method
Customer Data Strategies
8.3 Connecting through Social Networks
8.4 Supply Chain Management
Electronic Ordering
Providing Insight
SCM Dashboard
Automatic Replenishment
Supply Chain Control Tower
The Bullwhip Effect
8.5 Extranets
Khoury Candy Distributors Customer Segmentation
Case 1: AliMed EDI
Case 2: The Risky Supply Chain
References
Chapter 9 Making Better Decisions
9.1 Decision-Making Concepts
The Decision-Making System
Decision Phases
Decision Structure
Decision Scope
Strategic Decisions
Tactical (Managerial Control) Decisions
Operational Decisions
Relationship among Decisions of Different Scope
Putting the Concepts Together
9.2 Model-Driven Decisions
Simulation Studies
Simulation Example
The Simulation Process
9.3 Data-Driven Decisions
OLAP
Data Mining
Predictive Analytics
9.4 Group Decisions
Group Support Software for the Decision-Making Process
Group Support Software for Group Communication
Concerns with Group Decision Making
9.5 Dashboards.
Key Point Recap.
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
OCLC-licensed vendor bibliographic record.
ISBN:
0-429-59237-X
0-429-06101-3
0-429-59043-1
9780429061011
OCLC:
1139942805

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account