出版社: 机械工业出版社
译者: 颜志军 / 贾琳 / 尹秋菊 / 高慧颖
出版年: 2017-1-12
页数: 561
定价: 89
装帧: 平装
ISBN: 9787111558101
内容简介 · · · · · ·
信息时代,知识成为世界经济发展的动力。本书从管理和决策的角度阐述了当今信息技术发展的前沿领域和最新的系统开发方法,包括互联网和电子商务、多媒体技术、数据仓库与数据挖掘、专家系统与人工智能、CASE开发工具、面向对象的技术以及大数据等。流畅的文字、生动的讲解、翔实的案例和透彻的分析,将读者带入一个变幻莫测的信息世界。
在信息时代,知识已成为世界经济发展的动力。本书从管理和决策的角度阐述了当今信息技术发展的前沿领域和最新的系统开发方法,包括互联网和电子商务、多媒体技术、数据仓库与数据挖掘、专家系统与人工智能、CASE开发工具、面向对象的技术以及大数据等。流畅的文字、生动的讲解、翔实的案例和透彻的分析,将读者带入一个变幻莫测的信息世界。在新版中,为广大师生提供了教与学的教材使用指导或建议,对例题和案例进行了大幅度的更新,增加了一些新的内容,如预测式分析、云...
信息时代,知识成为世界经济发展的动力。本书从管理和决策的角度阐述了当今信息技术发展的前沿领域和最新的系统开发方法,包括互联网和电子商务、多媒体技术、数据仓库与数据挖掘、专家系统与人工智能、CASE开发工具、面向对象的技术以及大数据等。流畅的文字、生动的讲解、翔实的案例和透彻的分析,将读者带入一个变幻莫测的信息世界。
在信息时代,知识已成为世界经济发展的动力。本书从管理和决策的角度阐述了当今信息技术发展的前沿领域和最新的系统开发方法,包括互联网和电子商务、多媒体技术、数据仓库与数据挖掘、专家系统与人工智能、CASE开发工具、面向对象的技术以及大数据等。流畅的文字、生动的讲解、翔实的案例和透彻的分析,将读者带入一个变幻莫测的信息世界。在新版中,为广大师生提供了教与学的教材使用指导或建议,对例题和案例进行了大幅度的更新,增加了一些新的内容,如预测式分析、云计算等。
本书既可作为MBA及相关专业学生的教科书,也可作为中高层管理人员充实技能基础、提高自身知识素养的参考读物。
作者简介 · · · · · ·
斯蒂芬·哈格(Stephen Haag)丹佛大学丹尼尔商学院商业信息和分析专业的教授。斯蒂芬曾任信息技术和电子商务系系主任、信息技术硕士项目主任、MBA项目主任以及学院主管研究生项目的副院长。斯蒂芬在西得克萨斯州立大学获得学士和硕士学位,在得州大学阿灵顿分校获得博士学位。
斯蒂芬作为作者或共同作者出版了众多书籍,包括Computing Concepts in Action(12年级教科书)、与父母共同撰写的Interactions: Teaching English as a Second Language、与Peter Keen编写的Information Technology: Tomorrow抯 Advantage Today、Excelling in Finance、Business Driven Technology以及40多本信息系列书籍...
斯蒂芬·哈格(Stephen Haag)丹佛大学丹尼尔商学院商业信息和分析专业的教授。斯蒂芬曾任信息技术和电子商务系系主任、信息技术硕士项目主任、MBA项目主任以及学院主管研究生项目的副院长。斯蒂芬在西得克萨斯州立大学获得学士和硕士学位,在得州大学阿灵顿分校获得博士学位。
斯蒂芬作为作者或共同作者出版了众多书籍,包括Computing Concepts in Action(12年级教科书)、与父母共同撰写的Interactions: Teaching English as a Second Language、与Peter Keen编写的Information Technology: Tomorrow抯 Advantage Today、Excelling in Finance、Business Driven Technology以及40多本信息系列书籍。他还在Communications of the ACM、Socio-Economic Planning Sciences、The International Journal of Systems Science、Managerial and Decision Economics、Applied Economics和The Australian Journal of Management等期刊发表大量文章。斯蒂芬同家人住在科罗拉多的高原牧场。
梅芙·卡明斯(Maeve Cummings)匹兹堡州立大学信息系统专业的教授。她在匹兹堡州立大学获得数学和计算机科学的学士学位及MBA学位,并在得州大学阿灵顿分校获得博士学位。她在Journal of Global Information Management和The Journal of Computer Information Systems期刊发表了多篇论文。她是多个期刊的编委,还是Case Studies in Information Technology以及“信息技术”丛书Computing Concepts and Information Systems Essentials(目前新版本是第2版)的共同作者。梅芙已经从教25年,目前生活在堪萨斯的匹兹堡。
目录 · · · · · ·
作者简介
前言
致谢
术语表
第1章 我们生存的信息时代:面临商业环境的变化 3
令人惊叹的产业变革 手机使酒店的客房电话收入骤减 3
1.1 引言 4
1.2 信息是一种重要资源 5
1.3 人是一种重要资源 10
1.4 信息技术是一种重要资源 13
1.5 信息技术的财务影响:盈亏平衡分析 15
1.6 信息技术的行业影响:波特的五力模型 19
1.7 信息技术的战略影响:波特的三种一般战略与RGT框架 23
本章小结 26
综合案例1-1 社交媒体传声筒:透明生活加剧 27
综合案例1-2 谷歌和苹果公司也许知道你在哪里 29
关键术语 30
问题思考 31
作业训练 31
问题讨论 32
本章项目 32
第2章 主要的商业策略:应用信息技术获得竞争优势 35
令人惊叹的产业变革 旅行社的衰亡 35
2.1 引言 36
2.2 供应链管理 36
2.3 客户关系管理 40
2.4 企业资源计划:将IT进行集成 45
2.5 社交媒体 51
本章小结 58
综合案例2-1 可口可乐应有尽有:供应链管理、客户关系管理、企业资源计划、社交媒体 59
综合案例2-2 社交媒体和提高投资回报率 60
关键术语 61
问题思考 62
作业训练 62
问题讨论 63
本章项目 63
第3章 数据库和数据仓库:支持分析驱动的组织 65
令人惊叹的产业变革 你知道CD来源于恐龙吗 65
3.1 引言 66
3.2 关系数据库 68
3.3 数据库管理系统工具 72
3.4 数据仓库和数据挖掘 79
3.5 信息所有权 86
本章小结 88
综合案例3-1 什么时候让一个公共信息数据库对公众开放是不好的 89
综合案例3-2 何时将存储私有信息和公司战略信息的数据库向公众开放是合适的 90
关键术语 91
问题思考 92
作业训练 92
问题讨论 93
本章项目 94
第4章 分析学、决策支持和人工智能:企业智囊团 97
令人惊叹的产业变革 在线教育 97
4.1 引言 98
4.2 决策和决策支持 98
4.3 地理信息系统 103
4.4 数据挖掘工具和模型 104
4.5 人工智能 110
4.6 基于代理的技术 114
本章小结 118
综合案例4-1 水晶球、千里眼、占卜……
预测式分析能否预测未来 119
综合案例4-2 决策支持有益于你的健康 121
关键术语 122
问题思考 123
作业训练 123
问题讨论 124
本章项目 125
第5章 电子商务:新经济战略 127
令人惊叹的产业变革 广告资金涌向信息获取的新渠道——互联网 127
5.1 引言 128
5.2 电子商务业务模式 128
5.3 了解你的企业、产品、服务和客户 132
5.4 找到客户并建立客户关系 137
5.5 便捷、安全的货币支付 140
5.6 电子商务的发展趋势 144
本章小结 149
综合案例5-1 当企业发展壮大后,可以建立自己的B2B电子市场 151
综合案例5-2 移动商务的爆发 153
关键术语 154
问题思考 155
作业训练 155
问题讨论 156
本章项目 156
第6章 系统开发:阶段、工具及技术 159
令人惊叹的产业变革 相机使用胶卷? 159
6.1 引言 160
6.2 内包和系统开发生命周期法 160
6.3 基于组件的开发方法 167
6.4 自包(最终用户开发) 170
6.5 原型法 174
6.6 外包 178
本章小结 185
综合案例6-1 足够好的技术经济 186
综合案例6-2 平板电脑在个人电脑市场上找到一席之地 187
关键术语 189
问题思考 189
作业训练 190
问题讨论 191
本章项目 192
第7章 企业架构、云计算、衡量指标和业务可持续计划:构建并维持一家有活力的企业 195
令人惊叹的产业变革 钱的本质从未发生变化 195
7.1 引言 196
7.2 硬件和软件基础设施 199
7.3 云计算:完全不需要基础设施 203
7.4 信息技术成功指标 209
7.5 业务可持续计划 212
本章小结 216
综合案例7-1 面向个人的公有云 218
综合案例7-2 丹佛医疗卫生机构使用“私有云”和“瘦客户端”的运作模式 219
关键术语 220
问题思考 221
作业训练 221
问题讨论 222
本章项目 222
第8章 人与信息的保护:威胁与安全措施 225
令人惊叹的产业变革 医学变革让人们生活得更美好 225
8.1 引言 226
8.2 伦理道德 226
8.3 隐私权 231
8.4 安全 244
本章小结 249
综合案例8-1 发送色情短信变得习以为常 250
综合案例8-2 索尼遭受多次黑客攻击 252
关键术语 253
问题思考 253
作业训练 253
问题讨论 254
本章项目 255
第9章 新兴技术及其发展趋势:未来的商业、人和技术 257
令人惊叹的产业变革 它不再是每个城镇必备的机构 257
9.1 引言 258
9.2 互联网的发展变化 259
9.3 生理交互 264
9.4 无线领域 270
9.5 纯技术 274
9.6 值得思考的重要问题 275
本章小结 278
综合案例9-1 技术对社会的影响有多大 280
综合案例9-2 智能手机和巨大的数字鸿沟 282
关键术语 283
问题思考 283
作业训练 284
问题讨论 284
本章项目 285
小组项目 286
案例1:评估客户关系管理的价值 286
案例2:分析信息的价值 287
案例3:主管信息系统报告 288
案例4:构建价值链 289
案例5:使用关系数据库技术跟踪项目 291
案例6:建立决策支持系统 292
案例7:使用横幅广告进行宣传 293
案例8:评估信息技术外包的价值 294
案例9:演示如何创建网站 295
案例10:运用演示文稿软件 296
案例11:创建网络数据库系统 297
案例12:创建决策支持系统 298
案例13:开发企业资源计划系统 299
案例14:评价无线技术的未来 300
案例15:评估下一代技术 301
案例16:分析战略及竞争优势 303
案例17:创建决策支持系统 304
案例18:进行财务分析 305
案例19:开发调度决策支持系统 306
案例20:开发数据库管理系统 306
案例21:评估信息安全状况 308
案例22:评估供应链管理的价值 309
电子商务项目 310
计算机统计数据和资源网站 310
消费者信息网站 310
面试和谈判技巧 311
元数据 311
美国劳工部 312
人口统计信息 312
免费的租赁存储空间 313
获得竞争情报 313
计算机伦理指南 314
浏览谷歌地球 314
经济援助资源 315
查找主机服务 315
全球统计和资源 316
黄金、白银、利率和现金 316
隐私法律和规定 317
保护你的电脑 317
学习投资 318
找到实习 318
小企业管理局 319
股票行情 319
店面软件研究 320
搜索共享软件和免费软件 320
搜索招聘数据库 321
搜索MBA项目 321
扩展学习模块A 计算机硬件和软件 322
A.1 对技术的快速导览 323
A.2 根据尺寸大小对计算机进行分类 325
A.3 软件:智能化界面 328
A.4 硬件:物理界面 333
本模块小结 345
关键术语 346
问题思考 348
作业训练 348
扩展学习模块B 万维网和互联网 350
B.1 引言 351
B.2 万维网 352
B.3 搜索引擎 356
B.4 Web2.0 357
B.5 互联网技术 359
B.6 互联网的连接 362
本模块小结 365
关键术语 366
问题思考 367
作业训练 367
扩展学习模块C 设计数据库和实体关系图 370
C.1 简介 371
C.2 设计并创建一个关系数据库 371
本模块小结 383
关键术语 384
问题思考 384
作业训练 385
扩展学习模块D 利用电子表格软件进行决策分析 386
D.1 介绍 387
D.2 列表 388
D.3 基本筛选 390
D.4 自定义筛选 392
D.5 条件格式 394
D.6 数据透视表 396
D.7 单变量求解 402
本模块小结 404
关键术语 405
作业训练 405
扩展学习模块E 网络基础知识 408
E.1 前言 409
E.2 家庭网络 410
E.3 网络组件 412
E.4 按距离对网络进行分类 414
E.5 互联网 415
E.6 网络通信介质 422
E.7 网络安全 426
本模块小结 430
关键术语 432
问题思考 432
作业训练 433
扩展模块F 使用HTML创建Web页面 434
扩展模块G 面向对象技术 435
扩展学习模块H 计算机犯罪和数字取证 436
H.1 前言 437
H.2 计算机犯罪 438
H.3 数字取证 448
H.4 谁需要数字取证调查人员 463
本模块小结 467
关键术语 468
问题思考 469
作业训练 469
扩展模块I 创建电子简历 471
扩展学习模块J 运用Microsoft Access创建一个数据库 472
J.1 引言 473
J.2 所罗门公司数据库 473
J.3 定义所罗门企业数据的内部联系 482
J.4 在所罗门数据库中输入信息 484
J.5 利用关系创建简单查询 487
J.6 利用多个关系创建高级查询 489
J.7 生成简单报表 491
J.8 生成含有分组、排序和汇总的报表 494
J.9 创建数据输入窗体 499
本模块小结 500
关键术语 501
作业训练 501
扩展学习模块K 企业中的职业岗位 503
扩展学习模块L 利用FrontPage建立网站 504
扩展学习模块M 运用VBA在Excel中编程 505
注释 506
--------------------------------------------------------------------------------
CHAPTER ONE
The Information Age in Which You Live:Changing the Face of Business 3
OUTRAGEOUS INDUSTRY TRANSFORMATION:CELL PHONES DOOM PHONE REVENUES FOR HOTELS 3
INTRODUCTION 4
MIS RESOURCE NO 1: INFORMATION 5
Defining Information Quality 8
Considering Information from an Organizational Perspective 8
MIS RESOURCE NO 2: PEOPLE 10
Technology Literacy 11
Information Literacy 11
Your Ethical Responsibilities 12
MIS RESOURCE NO 3: INFORMATION TECHNOLOGY 13
Key Technology Categories 13
FINANCIAL IMPACT OF IT: BREAK-EVEN ANALYSIS 15
Reducing Fixed Costs 16
Reducing Variable Costs 17
Increasing Revenue 18
INDUSTRY IMPACT OF IT: PORTER’S FIVE FORCES MODEL 19
Buyer Power 19
Supplier Power 20
Threat of Substitute Products or Services 21
Threat of New Entrants 21
Rivalry among Existing Competitors 22
STRATEGY IMPACT OF IT: PORTER (AGAIN) AND RGT 23
Overall Cost Leadership 23
Differentiation 24
Focus 24
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 26
CLOSING CASE STUDY ONE: THE SOCIAL MEDIA MEGAPHONE: TRANSPARENT LIFE INTENSIFIED 27
CLOSING CASE STUDY TWO: GOOGLE AND APPLE KNOW WHERE YOU ARE, MAYBE 29
KEY TERMS AND CONCEPTS 30
SHORT-ANSWER QUESTIONS 31
ASSIGNMENTS AND EXERCISES 31
DISCUSSION QUESTIONS 32
Chapter Projects 32
CHAPTER TWO
Major Business Initiatives:Gaining Competitive Advantage with IT 35
OUTRAGEOUS INDUSTRY TRANSFORMATION: DEATH OF A TRAVEL AGENT 35
INTRODUCTION 36
SUPPLY CHAIN MANAGEMENT 36
Strategic and Competitive Opportunities with SCM 38
IT Support for Supply Chain Management 39
CUSTOMER RELATIONSHIP MANAGEMENT 40
Strategic and Competitive Opportunities with CRM 42
IT Support for Customer Relationship Management 42
ENTERPRISE RESOURCE PLANNING—BRINGING IT ALL TOGETHER 45
The Evolution of ERP Systems 47
ERP Functionality 48
ERP Software for Market Size 50
SOCIAL MEDIA 51
Social Networking 52
Social Shopping 54
Social Playing 54
Social “Saving the World” 55
Social Locationing 56
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 58
CLOSING CASE STUDY ONE: COCA-COLA IS EVERYTHING: SCM, CRM, ERP, SOCIAL MEDIA, YOU NAME IT 59
CLOSING CASE STUDY TWO: THE BUSINESS OF SOCIAL MEDIA AND MAKING THE ROI CASE 60
KEY TERMS AND CONCEPTS 61
SHORT-ANSWER QUESTIONS 62
ASSIGNMENTS AND EXERCISES 62
DISCUSSION QUESTIONS 63
Chapter Projects 63
CHAPTER THREE
Databases and Data Warehouses:Supporting the Analytics-Driven Organization 65
OUTRAGEOUS INDUSTRY TRANSFORMATION: DID YOU KNOW CDS COME FROM DEAD DINOSAURS? 65
INTRODUCTION 66
THE RELATIONAL DATABASE MODEL 68
Collections of Information 68
Created with Logical Structures 68
With Logical Ties within the Information 70
With Built-In Integrity Constraints 71
DATABASE MANAGEMENT SYSTEM TOOLS 72
Data Definition Subsystem 73
Data Manipulation Subsystem 74
Application Generation Subsystem 77
Data Administration Subsystem 77
DATA WAREHOUSES AND DATA MINING 79
What Is a Data Warehouse? 79
The Tool Set of the Analytics Professional 81
The Analytics Life Cycle 83
Data Marts: Smaller Data Warehouses 84
Important Considerations in Using a Data Warehouse 85
INFORMATION OWNERSHIP 86
Strategic Management Support 86
Sharing Information with Responsibility 87
Information Cleanliness 87
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 88
CLOSING CASE STUDY ONE: WHEN MAKING A DATABASE OF PUBLIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE BAD 89
CLOSING CASE STUDY TWO: WHEN MAKING A DATABASE OF PRIVATE AND COMPANY-STRATEGIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE GOOD 90
KEY TERMS AND CONCEPTS 91
SHORT-ANSWER QUESTIONS 92
ASSIGNMENTS AND EXERCISES 92
DISCUSSION QUESTIONS 93
Chapter Projects 94
CHAPTER FOUR
Analytics, Decision Support, and Artificial Intelligence:Brainpower for Your Business 97
OUTRAGEOUS INDUSTRY TRANSFORMATION: ONLINE LEARNING 97
INTRODUCTION 98
DECISIONS AND DECISION SUPPORT 98
Decisions 98
Decision Support Systems 101
GEOGRAPHIC INFORMATION SYSTEMS 103
DATA-MINING TOOLS AND MODELS 104
Predictive Analytics 105
Text Analytics 108
Endless Analytics 109
ARTIFICIAL INTELLIGENCE 110
Expert Systems 110
Neural Networks and Fuzzy Logic 111
Genetic Algorithms 113
AGENT-BASED TECHNOLOGIES 114
Intelligent Agents 114
Multi-Agent Systems 115
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 118
CLOSING CASE STUDY ONE: CRYSTAL BALL, CLAIRVOYANT, FORTUNE TELLING ... CAN PREDICTIVE ANALYTICS DELIVER THE FUTURE? 119
CLOSING CASE STUDY TWO: DECISION SUPPORT IS GOOD FOR YOUR HEALTH 121
KEY TERMS AND CONCEPTS 122
SHORT-ANSWER QUESTIONS 123
ASSIGNMENTS AND EXERCISES 123
DISCUSSION QUESTIONS 124
Chapter Projects 125
CHAPTER FIVE
Electronic Commerce:Strategies for the New Economy 127
OUTRAGEOUS INDUSTRY TRANSFORMATION: ADVERTISING DOLLARS GO WHERE THE EYES ARE 127
INTRODUCTION 128
E-COMMERCE BUSINESS MODELS 128
Business to Business (B2B) E-Commerce 129
Business to Consumer (B2C) E-Commerce 130
Consumer to Business (C2B) E-Commerce 130
Consumer to Consumer (C2C) E-Commerce 131
UNDERSTAND YOUR BUSINESS, PRODUCTS, SERVICES, AND CUSTOMERS 132
Who Are Your Customers? 132
What Is the Value of Your Products and Services as Perceived by Your Customers? 132
FIND CUSTOMERS AND ESTABLISH RELATIONSHIPS 137
Business to Consumer 137
Business to Business 139
MOVE MONEY EASILY AND SECURELY 140
Business to Consumer Payment Systems 140
Business to Business Payment Systems 142
Security: The Pervading Concern 143
E-BUSINESS TRENDS 144
Long-Tail Economics 145
Crowdsourcing 146
Virtual Goods 147
Mobile Commerce 148
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 149
CLOSING CASE STUDY ONE: WHEN YOU’RE BIG, YOU CAN BE YOUR OWN B2B E-MARKETPLACE 151
CLOSING CASE STUDY TWO: THE MOBILE COMMERCE EXPLOSION 153
KEY TERMS AND CONCEPTS 154
SHORT-ANSWER QUESTIONS 155
ASSIGNMENTS AND EXERCISES 155
DISCUSSION QUESTIONS 156
Chapter Projects 156
CHAPTER SIX
Systems Development:Phases, Tools, and Techniques 159
OUTRAGEOUS INDUSTRY TRANSFORMATION: CAMERAS USE FILM? 159
INTRODUCTION 160
INSOURCING AND THE SYSTEMS DEVELOPMENT LIFE CYCLE 160
Phase 1: Planning 162
Phase 2: Analysis 163
Phase 3: Design 164
Phase 4: Development 164
Phase 5: Testing 165
Phase 6: Implementation 165
Phase 7: Maintenance 166
COMPONENT-BASED DEVELOPMENT 167
Rapid Application Development Methodology 167
Extreme Programming Methodology 168
Agile Methodology 170
Service-Oriented Architecture—An Architecture Perspective 170
SELFSOURCING (END-USER DEVELOPMENT) 170
The Selfsourcing Process 171
The Advantages of Selfsourcing 172
Potential Pitfalls and Risks of Selfsourcing 173
Which Applications for IT to Offload 173
The Right Tool for the Job 174
PROTOTYPING 174
The Prototyping Process 175
The Advantages of Prototyping 177
The Disadvantages of Prototyping 177
OUTSOURCING 178
The Outsourcing Process 180
The Service Level Agreement 182
Geopolitical Outsourcing Options 182
The Advantages and Disadvantages of Outsourcing 184
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 185
CLOSING CASE STUDY ONE: THE GOOD-ENOUGH TECHNOLOGY ECONOMY 186
CLOSING CASE STUDY TWO: TABLETS TAKE THEIR PLACE IN THE PC MARKET 187
KEY TERMS AND CONCEPTS 189
SHORT-ANSWER QUESTIONS 189
ASSIGNMENTS AND EXERCISES 190
DISCUSSION QUESTIONS 191
Chapter Projects 192
CHAPTER SEVEN
Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning:Building and Sustaining the Dynamic Enterprise 195
OUTRAGEOUS INDUSTRY TRANSFORMATION:MONEY WILL ALWAYS BE MONEY 195
INTRODUCTION 196
Customers 196
End Users 197
Software Development 198
Information Needs 198
Hardware Requirements 198
HARDWARE AND SOFTWARE INFRASTRUCTURE 199
Enterprise Resource Planning (ERP) Revisited 199
Supporting Network Infrastructures 201
Cloud Computing: No Infrastructure at All 203
IT SUCCESS METRICS 209
Efficiency and Effectiveness Metrics 209
Web-centric Metrics 211
Call Center Metrics 212
BUSINESS CONTINUITY PLANNING 212
Phase 1: Organizational Strategic Plan 213
Phase 2: Analysis 213
Phase 3: Design 214
Phase 4: Implementation 214
Phase 5: Testing 215
Phase 6: Maintenance 215
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 216
CLOSING CASE STUDY ONE: PUBLIC “PERSONAL” CLOUDS 218
CLOSING CASE STUDY TWO: DENVER HEALTH OPERATES WITH A PRIVATE CLOUD AND THIN CLIENTS 219
KEY TERMS AND CONCEPTS 220
SHORT-ANSWER QUESTIONS 221
ASSIGNMENTS AND EXERCISES 221
DISCUSSION QUESTIONS 222
Chapter Projects 222
CHAPTER EIGHT
Protecting People and Information: Threats and Safeguards 225
OUTRAGEOUS INDUSTRY TRANSFORMATION: TRANSFORMATIONS IN MEDICINE MEAN BETTER LIVES 225
INTRODUCTION 226
ETHICS 226
Two Factors That Determine How You Decide Ethical Issues 228
Intellectual Property 229
PRIVACY 231
Privacy and Other Individuals 231
Identity Theft 232
Privacy and Employees 235
Privacy and Consumers 237
Privacy and Government Agencies 241
Laws on Privacy 243
SECURITY 244
Security and Employees 244
Security and Outside Threats 245
Security Precautions 247
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 249
CLOSING CASE STUDY ONE: SEXTING NOW ALMOST COMMONPLACE 250
CLOSING CASE STUDY TWO: SONY REELS FROM MULTIPLE HACKER ATTACKS 252
KEY TERMS AND CONCEPTS 253
SHORT-ANSWER QUESTIONS 253
ASSIGNMENTS AND EXERCISES 253
DISCUSSION QUESTIONS 254
Chapter Projects 255
CHAPTER NINE
Emerging Trends and Technologies:Business, People, and Technology Tomorrow 257
OUTRAGEOUS INDUSTRY TRANSFORMATION: THERE IS NO LONGER ONE IN EVERY TOWN 257
INTRODUCTION 258
THE CHANGING INTERNET 259
Personal Software-as-a-Service 259
Push, Not Pull, Technologies and Personalization 260
F2b2C: A New E-Commerce Business Model 261
Voice over Internet Protocol (VoIP) 262
Web 3.0 (Is Web 2.0 Already Old?) 262
E-Society 264
PHYSIOLOGICAL INTERACTION 264
Automatic Speech Recognition 264
Virtual Reality 265
Cave Automatic Virtual Environments 265
Haptic Interfaces 266
Biometrics 267
THE WIRELESS ARENA 270
The Next Generation of Smartphone Technology 270
RFID (Radio Frequency Identification) 271
PURE TECHNOLOGY 274
Nanotechnology 274
Multi-State CPUs 275
Holographic Storage Devices 275
MOST IMPORTANT CONSIDERATIONS 275
The Necessity of Technology 276
Closing the Great Digital Divide 276
Technology for the Betterment of Society 276
Exchanging Privacy for Convenience 276
Ethics, Ethics, Ethics 277
Making Predictions 277
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 278
CLOSING CASE STUDY ONE: JUST HOW BIG IS THE IMPACT OF TECHNOLOGY ON SOCIETY? 280
CLOSING CASE STUDY TWO: SMARTPHONESAND THE GREAT DIGITAL DIVIDE 282
KEY TERMS AND CONCEPTS 283
SHORT-ANSWER QUESTIONS 283
ASSIGNMENTS AND EXERCISES 284
DISCUSSION QUESTIONS 284
Chapter Projects 285
EXTENDED LEARNING MODULE A 322
Computer Hardware and Software A QUICK TOUR OF TECHNOLOGY 323
CATEGORIES OF COMPUTERS BY SIZE 325
Smartphones 325
Tablet PCs, Slates, and E-Readers 325
Notebook Computers 325
Desktop Computers 326
Minicomputers, Mainframe Computers, and Supercomputers 327
SOFTWARE: YOUR INTELLECTUAL INTERFACE 328
Application Software 328
System Software 331
HARDWARE: YOUR PHYSICAL INTERFACE 333
Common Input Devices 334
Common Output Devices 336
Common Storage Devices 338
CPU and RAM 340
Connecting the Hardware Outside to the Hardware Inside 342
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 345
KEY TERMS AND CONCEPTS 346
SHORT-ANSWER QUESTIONS 348
ASSIGNMENTS AND EXERCISES 348
EXTENDED LEARNING MODULE B 350
The World Wide Web and the Internet INTRODUCTION 351
WORLD WIDE WEB 352
Web Sites, Addresses, and Pages 352
Understanding Addresses 353
Using Web Browser Software 354
SEARCH ENGINES 356
WEB 2.0 357
Wikis 357
Social Networking Sites 358
Blogs 358
RSS Feeds 359
Podcasting 359
INTERNET TECHNOLOGIES 359
The Internet Backbone 359
Internet Servers 360
Communications Protocols 360
CONNECTING TO THE INTERNET 362
Communications Software 362
Telecommunications Hardware 363
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 365
KEY TERMS AND CONCEPTS 366
SHORT-ANSWER QUESTIONS 367
ASSIGNMENTS AND EXERCISES 367
EXTENDED LEARNING MODULE C 370
Designing Databases and Entity-Relationship Diagramming INTRODUCTION 371
DESIGNING AND BUILDING A RELATIONAL DATABASE 371
Step 1: Define Entity Classes and Primary Keys 373
Step 2: Define Relationships among the Entity Classes 374
Step 3: Define Information (Fields) for Each Relation 380
Step 4: Use a Data Definition Language to Create Your Database 383
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 383
KEY TERMS AND CONCEPTS 384
SHORT-ANSWER QUESTIONS 384
ASSIGNMENTS AND EXERCISES 385
EXTENDED LEARNING MODULE D 386
Decision Analysis with Spreadsheet Software INTRODUCTION 387
LISTS 388
BASIC FILTER 390
CUSTOM FILTER 392
CONDITIONAL FORMATTING 394
PIVOT TABLES 396
GOAL SEEK 402
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 404
KEY TERMS AND CONCEPTS 405
ASSIGNMENTS AND EXERCISES 405
EXTENDED LEARNING MODULE D (on OLC) Decision Analysis with Spreadsheet Software 407
EXTENDED LEARNING MODULE E 408
Network Basics INTRODUCTION 409
Basic Principles of Networks 409
HOME NETWORKS 410
Network Cards in Each Computer 410
Wired and Wireless Transmission Media 410
Home Internet Service and Broadband Routers 411
Network Software 412
NETWORK COMPONENTS 412
Switches 412
Routers 413
CLASSIFYING NETWORKS BY DISTANCE 414
LANs, WANs, and MANs 414
INTERNET 415
Bandwidth 415
Internet Connection Types 416
Voice over IP 421
NETWORK COMMUNICATIONS MEDIA 422
Wired Communications Media 422
Wireless Communications Media 423
NETWORK SECURITY 426
Principles of Computer Security 426
Firewalls and Intrusion Detection Systems 427
Encrypted Communications: SSL and Virtual Private Networks 428
Other Security Threats: Malware 429
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 430
KEY TERMS AND CONCEPTS 432
SHORT-ANSWER QUESTIONS 432
ASSIGNMENTS AND EXERCISES 433
EXTENDED LEARNING MODULE F (on OLC) Building a Web Page with HTML 434
EXTENDED LEARNING MODULE G (on OLC) Object-Oriented Technologies 435
EXTENDED LEARNING MODULE H 436
Computer Crime and Digital Forensics INTRODUCTION 437
COMPUTER CRIME 438
Outside the Organization 438
Web Defacing 445
Cyber War 446
The Players 446
DIGITAL FORENSICS 448
The Collection Phase 449
The Analysis Phase 453
Analytics in Forensics 458
Anti-Forensics 460
WHO NEEDS DIGITAL FORENSICS INVESTIGATORS? 463
Proactive Digital Forensics Education for Problem Prevention 464
Reactive Digital Forensics for Incident Response 465
A Day in the Life 465
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 467
KEY TERMS AND CONCEPTS 468
SHORT-ANSWER QUESTIONS 469
ASSIGNMENTS AND EXERCISES 469
EXTENDED LEARNING MODULE I (on OLC) Building an E-Portfolio 471
EXTENDED LEARNING MODULE J Implementing a Database with Microsoft Access 472
INTRODUCTION 473
SOLOMON ENTERPRISES DATABASE 473
Implementing the Structure of the Solomon Enterprises Database 474
Implementing the Raw Material Relation Structure 476
Implementing the Concrete Type RelationStructure 479
Implementing the Bill of Material Relation Structure 480
DEFINING RELATIONSHIPS WITHIN THE SOLOMON ENTERPRISES DATABASE 482
ENTERING INFORMATION INTO THE SOLOMON DATABASE 484
Changing the Structure of Information in Relations 487
CREATING A SIMPLE QUERY USING ONE RELATION 487
Simple Query with a Condition (Conditional Query) 488
CREATING AN ADVANCED QUERY USING MORE THAN ONE RELATION 489
GENERATING A SIMPLE REPORT 491
GENERATING A REPORT WITH GROUPING, SORTING, AND TOTALS 494
CREATING A DATA INPUT FORM 499
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 500
KEY TERMS AND CONCEPTS 501
ASSIGNMENTS AND EXERCISES 501
EXTENDED LEARNING MODULE J (on OLC) Implementing a Database with Microsoft Access 502
EXTENDED LEARNING MODULE K (on OLC) Careers in Business 503
EXTENDED LEARNING MODULE L (on OLC) Building Web Sites with Frontpage 504
EXTENDED LEARNING MODULE M (on OLC) Programming in Excel with VBA 505
Notes 506
· · · · · · (收起)
信息时代的管理信息系统(英文版·原书第9版)的书评 · · · · · · ( 全部 0 条 )
论坛 · · · · · ·
在这本书的论坛里发言这本书的其他版本 · · · · · · ( 全部3 )
-
机械工业出版社 (2011)7.8分 31人读过
-
机械工业出版社 (2004)暂无评分 24人读过
以下书单推荐 · · · · · · ( 全部 )
- 巴别塔 (中雪君)
谁读这本书? · · · · · ·
二手市场
· · · · · ·
- 在豆瓣转让 有7人想读,手里有一本闲着?
订阅关于信息时代的管理信息系统(英文版·原书第9版)的评论:
feed: rss 2.0
0 有用 中雪君 2017-12-16 17:13:13
17年第六十五本。教材。废话太多干活太少,Mindset又过于抽象,在快速变化的MIS行业中几乎没有指导意义。于是本课就成为了办公软件的高端应用教学…