The sixth edition of Business Driven Information Systems discusses various business initiatives first and how technology supports those initiatives second. The premise for this unique approach is that business initiatives should drive technology choices, designed to give students the ability to understand how information technology can be a point of strength for an organization. The new edition of Business Driven Information Systems is state of the art in its discussions, presents concepts in an easy-to-understand format, and allows students to be active participants in learning. The dynamic nature of information technology requires all students—more specifically, business students—to be aware of both current and emerging technologies. Students are facing complex subjects and need a clear, concise explanation to be able to understand and use the concepts throughout their careers. By engaging students with numerous case studies, exercises, projects, and questions that enforce concepts, Business Driven Information Systems creates a unique learning experience for both faculty and students.
[wp-embedder-pack url=”https://manual-solution.com/wp-content/uploads/2022/07/Test-bank-for-Business-Driven-Information-Systems-6th-Edition-by-Paige-Baltzan.pdf” width=”100%” height=”400px” download-text=”” download=”off”][/wp-embedder-pack]
Table of Contents
Module 1 Business Driven MIS
Chapter 1 Management Information Systems: Business Driven MIS
Opening Case Study: The Internet of Things
Section 1.1 Business Driven MIS
COMPETING IN THE INFORMATION AGE
Data
Information
Business Intelligence
Knowledge
THE CHALLENGE OF DEPARTMENTAL COMPANIES AND THE MIS SOLUTION
The MIS Solution
Systems Thinking
MIS Department Roles and Responsibilities
Section 1.2 Business Strategy
IDENTIFYING COMPETITIVE ADVANTAGES
Swot Analysis: Understanding Business Strategies
THE FIVE FORCES MODEL—EVALUATING INDUSTRY ATTRACTIVENESS
Buyer Power
Supplier Power
Threat of Substitute Products or Services
Threat of New Entrants
Rivalry among Existing Competitors
Analyzing the Airline Industry
THE THREE GENERIC STRATEGIES—CHOOSING A BUSINESS FOCUS
VALUE CHAIN ANALYSIS—EXECUTING BUSINESS STRATEGIES
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Buy Experiences, Not Things
Closing Case Two: The World Is Flat: Thomas Friedman
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Chapter 2 Decisions and Processes: ValueDriven Business
Opening Case Study: Robots Took My Job
Section 2.1 Decision Support Systems
MAKING ORGANIZATIONAL BUSINESS DECISIONS
The Decision-Making Process
Decision-Making Essentials
MEASURING ORGANIZATIONAL BUSINESS DECISIONS
Efficiency and Effectiveness Metrics
USING MIS TO MAKE BUSINESS DECISIONS
Operational Support Systems
Managerial Support Systems
Strategic Support Systems
USING AI TO MAKE BUSINESS DECISIONS
Expert Systems
Neural Networks
Genetic Algorithms
Intelligent Agents
Virtual Reality
Section 2.2 Business Processes
MANAGING BUSINESS PROCESSES
Business Process Modeling
USING MIS TO IMPROVE BUSINESS PROCESSES
Operational Business Processes—Automation
Managerial Business Processes—Streamlining
Strategic Business Processes—Reengineering
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Business Is Booming for Wearable Technologies
Closing Case Two: Defense Advanced Research Projects Agency (DARPA) Grand Challenge
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Chapter 3 Ebusiness: Electronic Business Value
Opening Case Study: Hello Fresh, Hello Delicious 99
Section 3.1 Web 1.0: Ebusiness
DISRUPTIVE TECHNOLOGY
Disruptive versus Sustaining Technology
The Internet and World Wide Web—The Ultimate Business Disruptors
WEB 1.0: THE CATALYST FOR EBUSINESS
Expanding Global Reach
Opening New Markets
Reducing Costs
Improving Effectiveness
THE FOUR EBUSINESS MODELS
Business-to-Business (B2B)
Business-to-Consumer (B2C)
Consumer-to-Business (C2B)
Consumer-to-Consumer (C2C)
Ebusiness Forms and Revenue-Generating Strategies
EBUSINESS TOOLS FOR CONNECTING AND COMMUNICATING
Email
Instant Messaging
Podcasting
Videoconferencing
Web Conferencing
Content Management Systems
THE CHALLENGES OF EBUSINESS
Identifying Limited Market Segments
Managing Consumer Trust
Ensuring Consumer Protection
Adhering to Taxation Rules
Section 3.2 Web 2.0: Business 2.0
WEB 2.0: ADVANTAGES OF BUSINESS 2.0
Content Sharing through Open Sourcing
User-Contributed Content
Collaboration Inside the Organization
Collaboration Outside the Organization
NETWORKING COMMUNITIES WITH BUSINESS 2.0
Social Tagging
BUSINESS 2.0 TOOLS FOR COLLABORATING
Blogs
Wikis
Mashups
THE CHALLENGES OF BUSINESS 2.0
Technology Dependence
Information Vandalism
Violations of Copyright and Plagiarism
WEB 3.0: DEFINING THE NEXT GENERATION OF ONLINE BUSINESS OPPORTUNITIES
Egovernment: The Government Moves Online
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Slack—Be Less Busy
Closing Case Two: Action Finally
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Chapter 4 Ethics and Information Security: MIS Business Concerns
Opening Case Study: Five Ways Hackers Can Get into Your Business 141
Section 4.1 Ethics
INFORMATION ETHICS
Information Does Not Have Ethics, People Do
DEVELOPING INFORMATION MANAGEMENT POLICIES
Ethical Computer Use Policy
Information Privacy Policy
Acceptable Use Policy
Email Privacy Policy
Social Media Policy
Workplace Monitoring Policy
Section 4.2 Information Security
PROTECTING INTELLECTUAL ASSETS
Hackers: A Dangerous Threat to Business
Viruses: A Dangerous Threat to Business
THE FIRST LINE OF DEFENSE—PEOPLE
THE SECOND LINE OF DEFENSE—TECHNOLOGY
People: Authentication and Authorization
Data: Prevention and Resistance
Attack: Detection and Response
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Targeting Target
Closing Case Two: To Share—Or Not to Share
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Module 2 Technical Foundations of MIS
Chapter 5 Infrastructures: Sustainable Technologies
Opening Case Study: Box Up Your Data
Section 5.1 MIS Infrastructures
THE BUSINESS BENEFITS OF A SOLID MIS INFRASTRUCTURE
SUPPORTING OPERATIONS: INFORMATION MIS INFRASTRUCTURE
Backup and Recovery Plan
Disaster Recovery Plan
Business Continuity Plan
SUPPORTING CHANGE: AGILE MIS INFRASTRUCTURE
Accessibility
Availability
Maintainability
Portability
Reliability
Scalability
Usability
Section 5.2 Building Sustainable MIS Infrastructures
MIS AND THE ENVIRONMENT
Increased Electronic Waste
Increased Energy Consumption
Increased Carbon Emissions
SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS INFRASTRUCTURE
Grid Computing
Virtualized Computing
Cloud Computing
Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud
UTILITY COMPUTING
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PasS)
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Etsy
Closing Case Two: Interest in Pinterest
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Chapter 6 Data: Business Intelligence
Opening Case Study: Big Data, Big Business, Big Opportunities 225
Section 6.1 Data, Information, and Databases
THE BUSINESS BENEFITS OF HIGH-QUALITY INFORMATION
Information Type: Transactional and Analytical
Information Timeliness
Information Quality
Information Governance
STORING INFORMATION USING A RELATIONAL DATABASE MANAGEMENT SYSTEM
Storing Data Elements in Entities and Attributes
Creating Relationships through Keys
Coca Cola Relational Database Example
USING A RELATIONAL DATABASE FOR BUSINESS ADVANTAGES
Increased Flexibility
Increased Scalability and Performance
Reduced Information Redundancy
Increased Information Integrity (Quality)
Increased Information Security
DRIVING WEBSITES WITH DATA
Section 6.2 Business Intelligence
SUPPORTING DECISIONS WITH BUSINESS INTELLIGENCE
Data Marts
Information Cleansing or Scrubbing
BUSINESS INTELLIGENCE
The Problem: Data Rich, Information Poor
The Solution: Business Intelligence
THE POWER OF BIG DATA ANALYTICS
Distributed Computing
Virtualization
Analyzing Big Data
DATA MINING
Data Mining Process Model
Data Mining Analysis Techniques
Data Mining Modeling Techniques for Predictions
DATA ANALYSIS
Advanced Data Analytics
Data Visualization
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Data Visualization: Stories for the Information Age
Closing Case Two: Informing Information
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Chapter 7 Networks: Mobile Business
Opening Case Study: Disrupting the Taxi: Uber 279
Section 7.1 Connectivity: The Business Value of a Networked World
OVERVIEW OF A CONNECTED WORLD
Network Categories
Network Providers
Network Access Technologies
Network Protocols
Network Convergence
BENEFITS OF A CONNECTED WORLD
CHALLENGES OF A CONNECTED WORLD
Security
Social, Ethical, and Political Issues
Section 7.2 Mobility: The Business Value of a Wireless World
WIRELESS NETWORK CATEGORIES
Mbusiness: Supporting Anywhere Business
Personal Area Networks
Wireless LANs
Wireless MANs
Wireless WAN—Cellular Communication System
Wireless WAN—Satellite Communication System
Protecting Wireless Connections
Managing Mobile Devices
BUSINESS APPLICATIONS OF WIRELESS NETWORKS
Radio-Frequency Identification (RFID)
Global Positioning System (GPS)
Geographic Information Systems (GIS)
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Wireless Bikes
Closing Case Two: Square: Wireless Payments to an iPhone, Android, or iPad
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Module 3 Enterprise MIS
Chapter 8 Enterprise Applications: Business Communications
Opening Case Study: Dream It, Design It, 3D Print It 321
Section 8.1 Supply Chain Management
BUILDING A CONNECTED CORPORATION THROUGH INTEGRATIONS
Integration Tools
SUPPLY CHAIN MANAGEMENT
Visibility into the Supply Chain
TECHNOLOGIES REINVENTING THE SUPPLY CHAIN
3D Printing Supports Procurement
RFID Supports Logistics
Drones Support Logistics
Robotics Supports Materials Management
The Extended Supply Chain
Section 8.2 Customer Relationship Management and Enterprise Resource Planning
CUSTOMER RELATIONSHIP MANAGEMENT
The Power of the Customer
Measuring CRM Success
OPERATIONAL AND ANALYTICAL CRM
Marketing and Operational CRM
Sales and Operational CRM
Customer Service and Operational CRM
Analytical CRM
EXTENDING CUSTOMER RELATIONSHIP MANAGEMENT
ENTERPRISE RESOURCE PLANNING
The Benefits of ERP
Core ERP Components
Extended ERP Components
Measuring ERP Success
ORGANIZATIONAL INTEGRATION WITH ERP
On-Premise ERP
Cloud ERP
Hybrid ERP
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Amazon Drone Knocking
Closing Case Two: Five Famous ERP Failures
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Chapter 9 Systems Development and Project Management: Corporate Responsibility
Opening Case Study: Gamer Delight 377
Section 9.1 Developing Enterprise Applications
THE SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
Phase 1: Planning
Phase 2: Analysis
Phase 3: Design
Phase 4: Development
Phase 5: Testing
Phase 6: Implementation
Phase 7: Maintenance
SOFTWARE DEVELOPMENT METHODOLOGY: THE WATERFALL
AGILE SOFTWARE DEVELOPMENT METHODOLOGIES
Rapid Application Development (RAD) Methodology
Extreme Programming Methodology
Rational Unified Process (RUP) Methodology
Scrum Methodology
DEVELOPING A SERVICE-ORIENTED ARCHITECTURE
Service
Interoperability
Loose Coupling
Section 9.2 Project Management
USING PROJECT MANAGEMENT TO DELIVER SUCCESSFUL PROJECTS
Unclear or Missing Business Requirements
Skipped Phases
Changing Technology
The Cost of Finding Errors in the SDLC
Balance of the Triple Constraint
PRIMARY PROJECT PLANNING DIAGRAMS
OUTSOURCING PROJECTS
Outsourcing Benefits
Outsourcing Challenges
Learning Outcome Review
Opening Case Questions
Key Terms
Review Questions
Closing Case One: Disaster at Denver International Airport
Closing Case Two: Reducing Ambiguity in Business Requirements
Critical Business Thinking
Apply Your Knowledge Business Projects
AYK Application Projects
Appendices
Appendix A Hardware and Software Basics
INTRODUCTION
HARDWARE BASICS
Central Processing Unit
Primary Storage
Secondary Storage
Input Devices
Output Devices
Communication Devices
COMPUTER CATEGORIES
SOFTWARE BASICS
System Software
Application Software
Distributing Application Software
Key Terms
Apply Your Knowledge
Appendix B Networks and Telecommunications
INTRODUCTION
NETWORK BASICS
ARCHITECTURE
Peer-to-Peer Networks
Client/Server Networks
TOPOLOGY
PROTOCOLS
Ethernet
Transmission Control Protocol/Internet Protocol
MEDIA
Wire Media
Wireless Media
Key Terms
Apply Your Knowledge
Appendix C Designing Databases
INTRODUCTION
THE RELATIONAL DATABASE MODEL
Entities and Attributes
Business Rules
DOCUMENTING ENTITY RELATIONSHIP DIAGRAMS
Basic Entity Relationships
Relationship Cardinality
RELATIONAL DATA MODEL AND THE DATABASE
From Entities to Tables
Logically Relating Tables
Key Terms
Apply Your Knowledge
Appendix D Emerging Trends and Technologies
INTRODUCTION
TRENDS SHAPING OUR FUTURE
The World’s Population Will Double in the Next 40 Years
People in Developed Countries Are Living Longer
The Growth in Information Industries Is Creating a Knowledge-Dependent Global Society
The Global Economy Is Becoming More Integrated
The Economy and Society Are Dominated by Technology
Pace of Technological Innovation Is Increasing
TECHNOLOGIES SHAPING OUR FUTURE
The Digital Mesh
Smart Machines
The New IT Reality
For customer’s satisfaction, we provide free samples for any required Textbook solution or test bank to check and evaluate before making the final purchase..
Nolan (verified owner) –
Happy with the book, Its a digital Files good for student and not expansive
Ryker (verified owner) –
Good quality and very well worth the money.