1 option
Information systems : what every business student needs to know / by Efrem G. Mallach.
- Format:
- Book
- Author/Creator:
- Mallach, Efrem, 1942- author.
- Series:
- Chapman & Hall/CRC textbooks in computing.
- Chapman & Hall/CRC textbooks in computing
- Language:
- English
- Subjects (All):
- Management information systems.
- Business--Data processing.
- Business.
- Business--Information technology.
- Information technology--Management.
- Information technology.
- Physical Description:
- 1 online resource (391 pages).
- Edition:
- Second edition.
- Place of Publication:
- Boca Raton, FL : CRC Press LLC, [2020]
- Summary:
- Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study. Key features: Single-mindedly for business students who are not technical specialists Doesnt try to prepare IS professionals; other courses will do that Stresses the enabling technologies and application areas that matter the most today Based on the authors real-world experience Up to date regarding technology and tomorrows business needs This is the book the authorand, more importantly, his studentswishes he had when he started teaching. Dr. Mallach holds degrees in engineering from Princeton and MIT, and in business from Boston University. He worked in the computer industry for two decades, as Director of Strategic Planning for a major computer firm and as co-founder/CEO of a computer marketing consulting firm. He taught information systems in the University of Massachusetts (Lowell and Dartmouth) business schools for 18 years, then at Rhode Island College following his retirement. He consults in industry and serves as Webmaster for his community, in between hiking and travel with his wife.
- Contents:
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Contents
- Chapter 1 Why Information Systems Matter in Business-And to You
- Chapter Outline
- Why This Chapter Matters
- Chapter Take-Aways
- 1.1 The Value of Information
- Scenario 1
- Possible Outcome A
- Possible Outcome B
- Scenario 2
- Scenario 3
- What This Means
- 1.2 Systems and Information Systems
- 1.3 What Is Information, Really?
- Definitions
- How These Work
- Information Quality
- Correctness
- Accuracy
- Precision
- Timeliness
- Consistency
- Conformity to Needs and Expectations
- Completeness
- Cost
- In a Nutshell
- 1.4 Legal and Ethical Information Use
- Using a Computer, or Information, as a Tool to Commit a Crime
- Using a Computer, or Information, as the Object of a Crime
- Using Information Unethically
- Key Point Recap
- Key Terms
- Review Questions
- Discussion Questions
- Khoury Candy Distributors, Inc.
- Khoury Candy Distributors Background
- KCD Today
- KCD's Information Systems
- KCD People
- Questions
- Case 1: Trusting a Spreadsheet
- Case 2: Lynn McCallum, MD
- Bibliography
- Chapter 2 The Role of Information Systems in Business
- 2.1 A Perspective on Information Systems
- 2.2 Competitive Strategies
- 2.3 The Five Basic Competitive Forces
- Rivalry among Existing Competitors
- The Impact of the Internet and the Web on Rivalry among Existing Competitors
- Bargaining Power of Customers
- The Impact of the Internet and the Web on the Bargaining Power of Customers
- Bargaining Power of Suppliers
- The Impact of the Internet and the Web on the Bargaining Power of Suppliers
- Threat of New Entrants.
- The Impact of the Internet and the Web on the Threat of New Entrants
- Threat of Substitute Products or Services
- The Impact of the Internet and the Web on the Threat of Substitute Products and Services
- 2.4 The Value Chain
- Khoury Candy Distributors: Strategy, Value Chain, Competitive Advantage
- Case 1: Using Social Media to Compete
- Case 2: Pharmacy Processes and Faxing
- Chapter 3 Information Systems Hardware
- 3.1 Computer Structure
- 3.2 Switches: The Basic Hardware Building Blocks
- 3.3 Computer System Components
- Central Processor
- Hardware Evolution
- Processor Clock Speed
- Multiple Cores, Multiple Threads
- Specialized Processors
- Primary Storage
- Secondary Storage
- Rotating Magnetic Disks
- Optical Disks
- Solid-State Storage
- Magnetic Tape Storage
- Enterprise Storage Subsystems
- Cloud Storage
- Input Devices
- Output Devices
- Displays (Monitors)
- Printers
- Other
- 3.4 Computer Categories
- Khoury Candy Distributors Hardware
- Case 1: The Green Grid Measures Energy Efficiency
- Case 2: Meltin'Pot Deploys Blade Servers
- Chapter 4 Information Systems Software
- 4.1 Software Concepts
- Writing Software
- Open-Source Software
- 4.2 System Software
- Operating System
- Defining the User Interface
- Managing Shared Resources
- Providing Shared Services
- Other System Software
- 4.3 Application Software
- Horizontal versus Vertical Applications
- Off-the-Shelf versus Custom Applications.
- Open-Source Applications
- 4.4 Embedded Software
- 4.5 Trends in Computing
- Virtualization
- Client/Server Computing
- Cloud Computing
- Artificial Intelligence
- 4.6 Software Licensing
- Khoury Candy Distributors Software
- Case 1: Security through Open Source
- Case 2: Rescuing Food
- Chapter 5 Data, Databases, and Database Management
- 5.1 The Database Concept
- 5.2 Operational Databases
- Relational Database Concepts
- An Example: MyVid Video Site
- Flat Files
- Normalization
- Entity-Relationship Diagramming
- Distributed Databases
- 5.3 Databases for Decision Making
- Dimensional Databases
- "Big Data"
- Hadoop
- 5.4 Database Management Software
- 5.5 Database Security
- Khoury Candy Distributors Databases
- Case 1: Netflix Moves to Cassandra
- Case 2: Homeless in Los Angeles
- Chapter 6 Information Networks
- 6.1 Communication Links and Networks
- 6.2 Communication Links and Devices
- Physical Communication Links
- Wireless Communication Links
- One-Way or Two-Way?
- 6.3 Local Area Networks
- Wired LANs
- Wi-Fi
- Wi-Fi Privacy and Security
- Other Wireless LANs
- Bluetooth
- Radio Frequency ID
- Near Field Communication
- ZigBee
- Personal Area Networks
- 6.4 Wide Area Networks and the Internet
- Packet Switching
- Alternative Switching Methods
- 6.5 Internet Applications
- The World Wide Web
- Web 1.0
- Web 2.0
- Streaming
- Internet Telephony
- Streaming Video
- Teleconferencing.
- Net Neutrality
- The Internet of Things
- Other Internet Applications
- File Transfer
- 6.6 Network Security
- Human Aspects of Network Security
- Phishing
- Stolen Email Address Lists
- Ransomware
- Pharming
- Identity Theft
- Privacy
- Security and the Internet of Things
- A Totally Secure System?
- Khoury Candy Distributors Networks
- Case 1: Connecting Remotest Michigan
- Case 2: Helping Mothers Have Healthy Babies in Ghana
- Chapter 7 Integrating the Organization
- 7.1 Ancient History: Information Silos
- 7.2 Functional Information Systems
- Accounting
- Finance
- Sales
- Marketing
- Human Resources
- Purchasing
- Production
- Research and Development
- 7.3 Transaction Processing
- Data Validation
- Batch versus Online Transaction Processing
- 7.4 Enterprise Resource Planning Systems
- Enterprise Resource Planning (ERP) Software
- Business Processes
- Approaches to Using ERP
- Benefits of ERP
- Concerns with ERP
- Business Process Re-Engineering
- 7.5 Enterprise Application Integration (EAI)
- ERP or EAI?
- 7.6 Intranets
- Intranets and the Internet of Things
- 7.7 Integrating Society
- Khoury Candy Distributors Chooses an ERP System
- Case 1: City of Edinburgh Modernizes
- Case 2: Serenic Accounting Software
- Chapter 8 Connecting with Customers and Suppliers
- 8.1 E-Business and E-Commerce
- Categories of E-Commerce and E-Business
- Business-to-Consumer
- Business-to-Business.
- Consumer-to-Consumer
- Government-to-Consumer
- Government-to-Business
- Finding an E-Commerce Site
- Portals
- Auctions
- Reverse Auctions
- Exchanges
- Getting into E-Commerce
- Mobile Commerce (M-Commerce)
- Mobile Payments
- E-Commerce Issues
- Getting the Word Out
- Disintermediation
- Channel Conflict
- Fulfillment
- Taxation
- 8.2 Customer Relationship Management
- Operational CRM
- Level 1: Contact Management
- Level 2: Sales Management
- Level 3: Opportunity Management
- Regaining the Personal Touch via Operational CRM
- Analytical CRM
- The RFM Method
- Customer Data Strategies
- 8.3 Connecting through Social Networks
- 8.4 Supply Chain Management
- Electronic Ordering
- Providing Insight
- SCM Dashboard
- Automatic Replenishment
- Supply Chain Control Tower
- The Bullwhip Effect
- 8.5 Extranets
- Khoury Candy Distributors Customer Segmentation
- Case 1: AliMed EDI
- Case 2: The Risky Supply Chain
- References
- Chapter 9 Making Better Decisions
- 9.1 Decision-Making Concepts
- The Decision-Making System
- Decision Phases
- Decision Structure
- Decision Scope
- Strategic Decisions
- Tactical (Managerial Control) Decisions
- Operational Decisions
- Relationship among Decisions of Different Scope
- Putting the Concepts Together
- 9.2 Model-Driven Decisions
- Simulation Studies
- Simulation Example
- The Simulation Process
- 9.3 Data-Driven Decisions
- OLAP
- Data Mining
- Predictive Analytics
- 9.4 Group Decisions
- Group Support Software for the Decision-Making Process
- Group Support Software for Group Communication
- Concerns with Group Decision Making
- 9.5 Dashboards.
- Key Point Recap.
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- OCLC-licensed vendor bibliographic record.
- ISBN:
- 0-429-59237-X
- 0-429-06101-3
- 0-429-59043-1
- 9780429061011
- OCLC:
- 1139942805
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.