For undergraduate Introductory Management Information Systems courses As technology continues to change the way organizations do business, knowledge of MIS is critical. Using MIS shows you how businesses use information systems to solve business problems every day. Illustrative cases, exercises, projects, and other aids ensure you connect concepts to everyday life. Unique Guides in each chapter highlight themes in ethics, security, and other timely topics. With a new edition publishing each year, Using MIS keeps you up to date. Personalize Learning with MyMISLabTM MyMISLab is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Within its structured environment, students practice what they learn, test their understanding, and pursue a personalized study plan that helps them better absorb course material and understand difficult concepts.
Table of Content
About the Authors
Part 1: Why Mis?
The Importance of Mis
Why Is Introduction to Mis the Most Important Class in the Business School?
What Are Cost-effective Business Applications of Facebook or Twitter or Whatever Else Will Soon Appe
How Can I Attain Job Security?
How Can Intro to Mis Help You Learn Nonroutine Skills?
What Is the Bottom Line?
What Is Mis?
Components of an Information System
Management and Use of Information Systems
How Can You Use the Five-component Model?
The Most Important Component—you
All Components Must Work
High-tech Versus Low-tech Information Systems
Understanding the Scope of New Information Systems
Components Ordered by Difficulty and Disruption
Why Is the Difference Between Information Technology and Information Systems Important?
What Is Information?
Where Is Information?
What Are Necessary Data Characteristics?
Just Barely Sufficient
Worth Its Cost
Ethics Guide: Ethics and Professional Responsibility
Security Guide: Passwords and Password Etiquette
Guide: Five-component Careers
Case Study 1: Zulily
Collaboration Information Systems
What Are the Two Key Characteristics of Collaboration?
Importance of Effective Critical Feedback
Guidelines for Giving and Receiving Critical Feedback
What Are Three Criteria for Successful Collaboration?
Growth in Team Capability
Meaningful and Satisfying Experience
What Are the Four Primary Purposes of Collaboration?
What Are the Requirements for a Collaboration Information System?
The Five Components of an Is for Collaboration
Primary Functions: Communication and Content Sharing
How Can You Use Collaboration Tools to Improve Team Communication?
How Can You Use Collaboration Tools to Manage Shared Content?
Shared Content with No Control
Shared Content with Version Management on Google Drive
Ethics Guide: I Know What’s Better, Really
Shared Content with Version Control
How Can You Use Collaboration Tools to Manage Tasks?
Sharing a Task List on Google Grid
Sharing a Task List Using Microsoft Sharepoint
Which Collaboration Is Is Right for Your Team?
Three Sets of Collaboration Tools
Choosing the Set for Your Team
Don’t Forget Procedures and People!
Security Guide: Securing Collaboration
Guide: Egocentric Versus Empathetic Thinking
Case Study 2: Eating Our Own Dog Food
Strategy and Information Systems
How Does Organizational Strategy Determine Information Systems Structure?
What Five Forces Determine Industry Structure?
How Does Analysis of Industry Structure Determine Competitive Strategy?
Ethics: Yikes! Bikes
How Does Competitive Strategy Determine Value Chain Structure?
Primary Activities in the Value Chain
Support Activities in the Value Chain
Value Chain Linkages
How Do Business Processes Generate Value?
How Does Competitive Strategy Determine Business Processes and the Structure of Information Systems?
How Do Information Systems Provide Competitive Advantages?
Competitive Advantage Via Products
Competitive Advantage Via Business Processes
How Does an Actual Company Use Is to Create Competitive Advantages?
How Does This System Create a Competitive Advantage?
Security Guide: Differentiating on Security
Guide: Your Personal Competitive Advantage
Case Study 3: the Amazon of Innovation
Part 2: Information Technology
Hardware, Software, and Mobile Systems
What Do Business Professionals Need to Know About Computer Hardware?
Types of Hardware
How Can New Hardware Affect Competitive Strategies?
Internet of Things
What Do Business Professionals Need to Know About Software?
What Are the Major Operating Systems?
Own Versus License
What Types of Applications Exist, and How Do Organizations Obtain Them?
What Is Firmware?
Is Open Source Software a Viable Alternative?
Why Do Programmers Volunteer Their Services?
How Does Open Source Work?
So, Is Open Source Viable?
What Are the Differences Between Native and Web Applications?
Developing Native Applications
Developing Web Applications
Which Is Better?
Why Are Mobile Systems Increasingly Important?
What Are the Challenges of Personal Mobile Devices at Work?
Advantages and Disadvantages of Employee Use of Mobile Systems at Work
Survey of Organizational Byod Policy
Security Guide: Anatomy of a Heartbleed
Guide: Keeping Up to Speed
Case Study 4: the Apple of Your I
What Is the Purpose of a Database?
What Is a Database?
Relationships Among Rows
Ethics Guide: Querying Inequality?
What Is a Database Management System (dbms)?
How Do Database Applications Make Databases More Useful?
Traditional Forms, Queries, Reports, and Applications
Browser Forms, Reports, Queries, and Applications
How Are Data Models Used for Database Development?
What Is the Entity-relationship Data Model?
How Is a Data Model Transformed into a Database Design?
What Is the Users’ Role in the Development of Databases?
Security Guide: Theft by Sql Injection
Guide: Immanuel Kant, Data Modeler
Case Study 5: Searching for Pianos . . .
Why Is the Cloud the Future for Most Organizations?
What Is the Cloud?
Why Is the Cloud Preferred to In-house Hosting?
When Does the Cloud Not Make Sense?
What Network Technology Supports the Cloud?
Ethics Guide: Cloudy Profit?
What Are the Components of a Lan?
Connecting Your Lan to the Internet
How Does the Cloud Work?
An Internet Example
Carriers and Net Neutrality
Processing on a Web Server
Service-oriented Architecture (soa)
Protocols Supporting Web Services
How Do Organizations Use the Cloud?
Cloud Services from Cloud Vendors
Content Delivery Networks
Using Web Services Internally
How Can Allroad Parts Use the Cloud?
Saas Services at Allroad
Paas Services at Allroad
Iaas Services at Allroad
How Can Organizations Use Cloud Services Securely?
Virtual Private Networks (vpns)
Using a Private Cloud
Using a Virtual Private Cloud
Security Guide: Storm Clouds
Guide: Is It Spying or Just Good Management?
Case Study 6: Finqloud Forever . . . Well, at Least for the Requiredinterval . . .
Part 3: Using IS for Competitive Advantage
Processes, Organizations, and Information Systems
What Are the Basic Types of Processes?
How Do Structured Processes Differ from Dynamic Processes?
How Do Processes Vary by Organizational Scope?
How Can Information Systems Improve Process Quality?
How Can Processes Be Improved?
How Can Information Systems Improve Process Quality?
How Do Information Systems Eliminate the Problems of Information Silos?
What Are the Problems of Information Silos?
How Do Organizations Solve the Problems of Information Silos?
An Enterprise System for Patient Discharge
How Do CRM, ERP, and EAI Support Enterprise Processes?
The Need for Business Process Engineering
Emergence of Enterprise Application Solutions
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Ethics Guide: Dialing for Dollars
Enterprise Application Integration (EAI)
What Are the Elements of an ERP System?
ERP Application Programs
Business Process Procedures
Training and Consulting
Which Companies Are the Major ERP Vendors?
What Are the Challenges of Implementing and Upgrading Enterprise Information Systems?
How Do Inter-enterprise Is Solve the Problems of Enterprise Silos?
Security Guide: One-Stop Shopping
Guide: ERP and the Standard, Standard Blueprint
Case Study 7: A Tale of Two Interorganizational IS
Social Media Information Systems
What Is a Social Media Information System (SMIS)?
Three SMIS Roles
How Do SMIS Advance Organizational Strategy?
Social Media and the Sales and Marketing Activity
Social Media and Customer Service
Social Media and Inbound and Outbound Logistics
Social Media And Manufacturing and Operations
Social Media and Human Resources
How Do SMIS Increase Social Capital?
What Is the Value of Social Capital?
How Do Social Networks Add Value to Businesses?
Using Social Networking to Increase the Number of Relationships
Using Social Networks to Increase the Strength of Relationships
Using Social Networks to Connect to those with More Resources
How Do (Some) Companies Earn Revenue from Social Media?
You Are the Product
Revenue Models for Social Media
Ethics Guide: Social Marketing ? Or Lying?
Does Mobility Reduce Online Ad Revenue?
How Do Organizations Develop an Effective SMIS?
Step 1: Define Your Goals
Step 2: Identify Success Metrics
Step 3: Identify the Target Audience
Step 4: Define Your Value
Step 5: Make Personal Connections
Step 6: Gather and Analyze Data
What Is an Enterprise Social Network (ESN)?
Deploying Successful Enterprise Social Networks
How Can Organizations Address SMIS Security Concerns?
Managing the Risk of Employee Communication
Managing the Risk of Inappropriate Content
Security Guide: Securing Social Recruiting
Guide: Developing Your Personal Brand
Case Study 8: Sedona Social
Business Intelligence Systems
How Do Organizations Use Business Intelligence (BI) Systems?
How Do Organizations Use BI?
What Are Typical BI Applications?
What Are the Three Primary Activities in the BI Process?
Using Business Intelligence to Find Candidate Parts at Allroad
How Do Organizations Use Data Warehouses and Data Marts to Acquire Data?
Problems with Operational Data
Ethics Guide: Unseen Cyberazzi
Data Warehouses Versus Data Marts
How Do Organizations Use Reporting Applications?
Basic Reporting Operations
Online Analytical Processing (OLAP)
How Do Organizations Use Data Mining Applications?
Unsupervised Data Mining
Supervised Data Mining
How Do Organizations Use BigData Applications?
What Is the Role of Knowledge Management Systems?
What Are Expert Systems?
What Are Content Management Systems?
What Are the Challenges of Content Management?
What Are Content Management Application Alternatives?
How Do Hyper-Social Organizations Manage Knowledge?
Hyper-Social KM Alternative Media
Resistance to Hyper-Social Knowledge Sharing
What Are the Alternatives for Publishing BI?
Characteristics of BI Publishing Alternatives
What Are the Two Functions Of a BI Server?
Security Guide: Semantic Security
Guide: Data Mining in the Real World
Case Study 9: Hadoop the Cookie Cutter
Part 4: Information Systems Management
Information Systems Security
What Is the Goal of Information Systems Security?
The Is Security Threat/Loss Scenario
What Are the Sources of Threats?
What Types of Security Loss Exist?
Goal of Information Systems Security
How Big Is the Computer Security Problem?
How Should You Respond to Security Threats?
How Should Organizations Respond to Security Threats?
How Can Technical Safeguards Protect Against Security Threats?
Identification and Authentication
Ethics Guide: Securing Privacy
Single Sign-on for Multiple Systems
Design for Secure Applications
How Can Data Safeguards Protect Against Security Threats?
How Can Human Safeguards Protect Against Security Threats?
Human Safeguards for Employees
Human Safeguards for Nonemployee Personnel
How Should Organizations Respond to Security Incidents?
Security Guide: A Look through NSA’s PRISM
Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts
Case Study 10: Hitting the Target
Information Systems Management
What Are the Functions and Organization of the Is Department?
How Is the Is Department Organized?
What Is-related Job Positions Exist?
How Do Organizations Plan the Use of Is?
Align Information Systems with Organizational Strategy
Communicate Is Issues to the Executive Group
Develop Priorities and Enforce Them Within the Is Department
Sponsor the Steering Committee
Ethics Guide: Using the Corporate Computer
What Are the Advantages and Disadvantages of Outsourcing?
Outsourcing Information Systems
What Are the Outsourcing Alternatives?
What Are the Risks of Outsourcing?
What Are Your User Rights and Responsibilities?
Your User Rights
Your User Responsibilities
Security Guide: Are We Protecting Them from Me or Me from Them?
Guide: Is Outsourcing Fool’s Gold?
Case Study 11: Iapp$$$$ 4 U
Information Systems Development
How Are Business Processes, Is, and Applications Developed?
How Do Business Processes, Information Systems, and Applications Differ and Relate?
Which Development Processes Are Used for Which?
How Do Organizations Use Business Process Management (bpm)?
Why Do Processes Need Management?
What Are Bpm Activities?
How Is Business Process Modeling Notation (bpmn) Used to Model Processes?
Need for Standard for Business Processing Notation
Documenting the As-is Business Order Process
What Are the Phases in the Systems Development Life Cycle (sdlc)?
Define the System
Ethics Guide: Estimation Ethics
Design System Components
What Are the Keys for Successful Sdlc Projects?
Create a Work Breakdown Structure
Estimate Time and Costs
Create a Project Plan
Adjust Plan Via Trade-offs
Manage Development Challenges
How Can Scrum Overcome the Problems of the Sdlc?
What Are the Principles of Agile Development Methodologies?
What Is the Scrum Process?
How Do Requirements Drive the Scrum Process?
Security Guide: Psst. There’s Another Way, You Know . . .
Guide: the Final, Final Word
Case Study 12: When Will We Learn?
The International Dimension
For customer’s satisfaction, we provide free samples for any required Textbook solution or test bank to check and evaluate before making the final purchase..