信息时代的管理信息系统(英文版·原书第9版)

出版日期:2017-1-12
ISBN:9787111558103
作者:[美]斯蒂芬·哈格(Stephen Haag),[美]梅芙·卡明斯(Maeve Cummings)
页数:561页

作者简介

信息时代,知识成为世界经济发展的动力。本书从管理和决策的角度阐述了当今信息技术发展的前沿领域和最新的系统开发方法,包括互联网和电子商务、多媒体技术、数据仓库与数据挖掘、专家系统与人工智能、CASE开发工具、面向对象的技术以及大数据等。流畅的文字、生动的讲解、翔实的案例和透彻的分析,将读者带入一个变幻莫测的信息世界。
在信息时代,知识已成为世界经济发展的动力。本书从管理和决策的角度阐述了当今信息技术发展的前沿领域和最新的系统开发方法,包括互联网和电子商务、多媒体技术、数据仓库与数据挖掘、专家系统与人工智能、CASE开发工具、面向对象的技术以及大数据等。流畅的文字、生动的讲解、翔实的案例和透彻的分析,将读者带入一个变幻莫测的信息世界。在新版中,为广大师生提供了教与学的教材使用指导或建议,对例题和案例进行了大幅度的更新,增加了一些新的内容,如预测式分析、云计算等。
本书既可作为MBA及相关专业学生的教科书,也可作为中高层管理人员充实技能基础、提高自身知识素养的参考读物。

书籍目录

出版说明
作者简介
前言
致谢
术语表
第1章 我们生存的信息时代:面临商业环境的变化
3
令人惊叹的产业变革 手机使酒店的客房电话收入骤减
3
1.1 引言
4
1.2 信息是一种重要资源
5
1.3 人是一种重要资源
10
1.4 信息技术是一种重要资源
13
1.5 信息技术的财务影响:盈亏平衡分析
15
1.6 信息技术的行业影响:波特的五力模型
19
1.7 信息技术的战略影响:波特的三种一般战略与RGT框架
23
本章小结
26
综合案例1-1 社交媒体传声筒:透明生活加剧
27
综合案例1-2 谷歌和苹果公司也许知道你在哪里
29
关键术语
30
问题思考
31
作业训练
31
问题讨论
32
本章项目
32
第2章 主要的商业策略:应用信息技术获得竞争优势
35
令人惊叹的产业变革 旅行社的衰亡
35
2.1 引言
36
2.2 供应链管理
36
2.3 客户关系管理
40
2.4 企业资源计划:将IT进行集成
45
2.5 社交媒体
51
本章小结
58
综合案例2-1 可口可乐应有尽有:供应链管理、客户关系管理、企业资源计划、社交媒体
59
综合案例2-2 社交媒体和提高投资回报率
60
关键术语
61
问题思考
62
作业训练
62
问题讨论
63
本章项目
63
第3章 数据库和数据仓库:支持分析驱动的组织
65
令人惊叹的产业变革 你知道CD来源于恐龙吗
65
3.1 引言
66
3.2 关系数据库
68
3.3 数据库管理系统工具
72
3.4 数据仓库和数据挖掘
79
3.5 信息所有权
86
本章小结
88
综合案例3-1 什么时候让一个公共信息数据库对公众开放是不好的
89
综合案例3-2 何时将存储私有信息和公司战略信息的数据库向公众开放是合适的
90
关键术语
91
问题思考
92
作业训练
92
问题讨论
93
本章项目
94
第4章 分析学、决策支持和人工智能:企业智囊团
97
令人惊叹的产业变革 在线教育
97
4.1 引言
98
4.2 决策和决策支持
98
4.3 地理信息系统
103
4.4 数据挖掘工具和模型
104
4.5 人工智能
110
4.6 基于代理的技术
114
本章小结
118
综合案例4-1 水晶球、千里眼、占卜……
预测式分析能否预测未来
119
综合案例4-2 决策支持有益于你的健康
121
关键术语
122
问题思考
123
作业训练
123
问题讨论
124
本章项目
125
第5章 电子商务:新经济战略
127
令人惊叹的产业变革 广告资金涌向信息获取的新渠道——互联网
127
5.1 引言
128
5.2 电子商务业务模式
128
5.3 了解你的企业、产品、服务和客户
132
5.4 找到客户并建立客户关系
137
5.5 便捷、安全的货币支付
140
5.6 电子商务的发展趋势
144
本章小结
149
综合案例5-1 当企业发展壮大后,可以建立自己的B2B电子市场
151
综合案例5-2 移动商务的爆发
153
关键术语
154
问题思考
155
作业训练
155
问题讨论
156
本章项目
156
第6章 系统开发:阶段、工具及技术
159
令人惊叹的产业变革 相机使用胶卷?
159
6.1 引言
160
6.2 内包和系统开发生命周期法
160
6.3 基于组件的开发方法
167
6.4 自包(最终用户开发)
170
6.5 原型法
174
6.6 外包
178
本章小结
185
综合案例6-1 足够好的技术经济
186
综合案例6-2 平板电脑在个人电脑市场上找到一席之地
187
关键术语
189
问题思考
189
作业训练
190
问题讨论
191
本章项目
192
第7章 企业架构、云计算、衡量指标和业务可持续计划:构建并维持一家有活力的企业
195
令人惊叹的产业变革 钱的本质从未发生变化
195
7.1 引言
196
7.2 硬件和软件基础设施
199
7.3 云计算:完全不需要基础设施
203
7.4 信息技术成功指标
209
7.5 业务可持续计划
212
本章小结
216
综合案例7-1 面向个人的公有云
218
综合案例7-2 丹佛医疗卫生机构使用“私有云”和“瘦客户端”的运作模式
219
关键术语
220
问题思考
221
作业训练
221
问题讨论
222
本章项目
222
第8章 人与信息的保护:威胁与安全措施
225
令人惊叹的产业变革 医学变革让人们生活得更美好
225
8.1 引言
226
8.2 伦理道德
226
8.3 隐私权
231
8.4 安全
244
本章小结
249
综合案例8-1 发送色情短信变得习以为常
250
综合案例8-2 索尼遭受多次黑客攻击
252
关键术语
253
问题思考
253
作业训练
253
问题讨论
254
本章项目
255
第9章 新兴技术及其发展趋势:未来的商业、人和技术
257
令人惊叹的产业变革 它不再是每个城镇必备的机构
257
9.1 引言
258
9.2 互联网的发展变化
259
9.3 生理交互
264
9.4 无线领域
270
9.5 纯技术
274
9.6 值得思考的重要问题
275
本章小结
278
综合案例9-1 技术对社会的影响有多大
280
综合案例9-2 智能手机和巨大的数字鸿沟
282
关键术语
283
问题思考
283
作业训练
284
问题讨论
284
本章项目
285
小组项目
286
案例1:评估客户关系管理的价值
286
案例2:分析信息的价值
287
案例3:主管信息系统报告
288
案例4:构建价值链
289
案例5:使用关系数据库技术跟踪项目
291
案例6:建立决策支持系统
292
案例7:使用横幅广告进行宣传
293
案例8:评估信息技术外包的价值
294
案例9:演示如何创建网站
295
案例10:运用演示文稿软件
296
案例11:创建网络数据库系统
297
案例12:创建决策支持系统
298
案例13:开发企业资源计划系统
299
案例14:评价无线技术的未来
300
案例15:评估下一代技术
301
案例16:分析战略及竞争优势
303
案例17:创建决策支持系统
304
案例18:进行财务分析
305
案例19:开发调度决策支持系统
306
案例20:开发数据库管理系统
306
案例21:评估信息安全状况
308
案例22:评估供应链管理的价值
309
电子商务项目
310
计算机统计数据和资源网站
310
消费者信息网站
310
面试和谈判技巧
311
元数据
311
美国劳工部
312
人口统计信息
312
免费的租赁存储空间
313
获得竞争情报
313
计算机伦理指南
314
浏览谷歌地球
314
经济援助资源
315
查找主机服务
315
全球统计和资源
316
黄金、白银、利率和现金
316
隐私法律和规定
317
保护你的电脑
317
学习投资
318
找到实习
318
小企业管理局
319
股票行情
319
店面软件研究
320
搜索共享软件和免费软件
320
搜索招聘数据库
321
搜索MBA项目
321
扩展学习模块A 计算机硬件和软件
322
A.1 对技术的快速导览
323
A.2 根据尺寸大小对计算机进行分类
325
A.3 软件:智能化界面
328
A.4 硬件:物理界面
333
本模块小结
345
关键术语
346
问题思考
348
作业训练
348
扩展学习模块B 万维网和互联网
350
B.1 引言
351
B.2 万维网
352
B.3 搜索引擎
356
B.4 Web2.0
357
B.5 互联网技术
359
B.6 互联网的连接
362
本模块小结
365
关键术语
366
问题思考
367
作业训练
367
扩展学习模块C 设计数据库和实体关系图
370
C.1 简介
371
C.2 设计并创建一个关系数据库
371
本模块小结
383
关键术语
384
问题思考
384
作业训练
385
扩展学习模块D 利用电子表格软件进行决策分析
386
D.1 介绍
387
D.2 列表
388
D.3 基本筛选
390
D.4 自定义筛选
392
D.5 条件格式
394
D.6 数据透视表
396
D.7 单变量求解
402
本模块小结
404
关键术语
405
作业训练
405
扩展学习模块E 网络基础知识
408
E.1 前言
409
E.2 家庭网络
410
E.3 网络组件
412
E.4 按距离对网络进行分类
414
E.5 互联网
415
E.6 网络通信介质
422
E.7 网络安全
426
本模块小结
430
关键术语
432
问题思考
432
作业训练
433
扩展模块F 使用HTML创建Web页面
434
扩展模块G 面向对象技术
435
扩展学习模块H 计算机犯罪和数字取证
436
H.1 前言
437
H.2 计算机犯罪
438
H.3 数字取证
448
H.4 谁需要数字取证调查人员
463
本模块小结
467
关键术语
468
问题思考
469
作业训练
469
扩展模块I 创建电子简历
471
扩展学习模块J 运用Microsoft Access创建一个数据库
472
J.1 引言
473
J.2 所罗门公司数据库
473
J.3 定义所罗门企业数据的内部联系
482
J.4 在所罗门数据库中输入信息
484
J.5 利用关系创建简单查询
487
J.6 利用多个关系创建高级查询
489
J.7 生成简单报表
491
J.8 生成含有分组、排序和汇总的报表
494
J.9 创建数据输入窗体
499
本模块小结
500
关键术语
501
作业训练
501
扩展学习模块K 企业中的职业岗位
503
扩展学习模块L 利用FrontPage建立网站
504
扩展学习模块M 运用VBA在Excel中编程
505
注释
506
--------------------------------------------------------------------------------
CHAPTER ONE
The Information Age in Which You Live:Changing the Face of Business  3
OUTRAGEOUS INDUSTRY TRANSFORMATION:CELL PHONES DOOM PHONE REVENUES FOR HOTELS  3
INTRODUCTION  4
MIS RESOURCE NO 1: INFORMATION  5
Defining Information Quality 8
Considering Information from an Organizational Perspective 8
MIS RESOURCE NO 2: PEOPLE  10
Technology Literacy 11
Information Literacy 11
Your Ethical Responsibilities 12
MIS RESOURCE NO 3: INFORMATION TECHNOLOGY 13
Key Technology Categories 13
FINANCIAL IMPACT OF IT: BREAK-EVEN ANALYSIS  15
Reducing Fixed Costs 16
Reducing Variable Costs 17
Increasing Revenue 18
INDUSTRY IMPACT OF IT: PORTER’S FIVE FORCES MODEL  19
Buyer Power 19
Supplier Power 20
Threat of Substitute Products or Services 21
Threat of New Entrants 21
Rivalry among Existing Competitors 22
STRATEGY IMPACT OF IT: PORTER (AGAIN) AND RGT  23
Overall Cost Leadership 23
Differentiation 24
Focus 24
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 26
CLOSING CASE STUDY ONE: THE SOCIAL MEDIA MEGAPHONE: TRANSPARENT LIFE INTENSIFIED  27
CLOSING CASE STUDY TWO: GOOGLE AND APPLE KNOW WHERE YOU ARE, MAYBE  29
KEY TERMS AND CONCEPTS 30
SHORT-ANSWER QUESTIONS 31
ASSIGNMENTS AND EXERCISES 31
DISCUSSION QUESTIONS 32
Chapter Projects 32
CHAPTER TWO
Major Business Initiatives:Gaining Competitive Advantage with IT  35
OUTRAGEOUS INDUSTRY TRANSFORMATION: DEATH OF A TRAVEL AGENT  35
INTRODUCTION  36
SUPPLY CHAIN MANAGEMENT  36
Strategic and Competitive Opportunities with SCM 38
IT Support for Supply Chain Management 39
CUSTOMER RELATIONSHIP MANAGEMENT  40
Strategic and Competitive Opportunities with CRM 42
IT Support for Customer Relationship Management 42
ENTERPRISE RESOURCE PLANNING—BRINGING IT ALL TOGETHER  45
The Evolution of ERP Systems 47
ERP Functionality 48
ERP Software for Market Size 50
SOCIAL MEDIA 51
Social Networking 52
Social Shopping 54
Social Playing 54
Social “Saving the World” 55
Social Locationing 56
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 58
CLOSING CASE STUDY ONE: COCA-COLA IS EVERYTHING: SCM, CRM, ERP, SOCIAL MEDIA, YOU NAME IT   59
CLOSING CASE STUDY TWO: THE BUSINESS OF SOCIAL MEDIA AND MAKING THE ROI CASE 60
KEY TERMS AND CONCEPTS 61
SHORT-ANSWER QUESTIONS 62
ASSIGNMENTS AND EXERCISES 62
DISCUSSION QUESTIONS 63
Chapter Projects 63
CHAPTER THREE
Databases and Data Warehouses:Supporting the Analytics-Driven Organization  65
OUTRAGEOUS INDUSTRY TRANSFORMATION: DID YOU KNOW CDS COME FROM DEAD DINOSAURS?  65
INTRODUCTION  66
THE RELATIONAL DATABASE MODEL  68
Collections of Information 68
Created with Logical Structures 68
With Logical Ties within the Information 70
With Built-In Integrity Constraints 71
DATABASE MANAGEMENT SYSTEM TOOLS 72
Data Definition Subsystem 73
Data Manipulation Subsystem 74
Application Generation Subsystem 77
Data Administration Subsystem 77
DATA WAREHOUSES AND DATA MINING  79
What Is a Data Warehouse? 79
The Tool Set of the Analytics Professional 81
The Analytics Life Cycle 83
Data Marts: Smaller Data Warehouses 84
Important Considerations in Using a Data Warehouse 85
INFORMATION OWNERSHIP  86
Strategic Management Support 86
Sharing Information with Responsibility 87
Information Cleanliness 87
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  88
CLOSING CASE STUDY ONE: WHEN MAKING A DATABASE OF PUBLIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE BAD  89
CLOSING CASE STUDY TWO: WHEN MAKING A DATABASE OF PRIVATE AND COMPANY-STRATEGIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE GOOD  90
KEY TERMS AND CONCEPTS  91
SHORT-ANSWER QUESTIONS  92
ASSIGNMENTS AND EXERCISES  92
DISCUSSION QUESTIONS  93
Chapter Projects  94
CHAPTER FOUR
Analytics, Decision Support, and Artificial Intelligence:Brainpower for Your Business  97
OUTRAGEOUS INDUSTRY TRANSFORMATION: ONLINE LEARNING  97
INTRODUCTION  98
DECISIONS AND DECISION SUPPORT  98
Decisions 98
Decision Support Systems 101
GEOGRAPHIC INFORMATION SYSTEMS 103
DATA-MINING TOOLS AND MODELS 104
Predictive Analytics 105
Text Analytics 108
Endless Analytics 109
ARTIFICIAL INTELLIGENCE 110
Expert Systems 110
Neural Networks and Fuzzy Logic 111
Genetic Algorithms 113
AGENT-BASED TECHNOLOGIES 114
Intelligent Agents 114
Multi-Agent Systems 115
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 118
CLOSING CASE STUDY ONE: CRYSTAL BALL, CLAIRVOYANT, FORTUNE TELLING ... CAN PREDICTIVE ANALYTICS DELIVER THE FUTURE?  119
CLOSING CASE STUDY TWO: DECISION SUPPORT IS GOOD FOR YOUR HEALTH  121
KEY TERMS AND CONCEPTS  122
SHORT-ANSWER QUESTIONS  123
ASSIGNMENTS AND EXERCISES  123
DISCUSSION QUESTIONS  124
Chapter Projects  125
CHAPTER FIVE
Electronic Commerce:Strategies for the New Economy  127
OUTRAGEOUS INDUSTRY TRANSFORMATION: ADVERTISING DOLLARS GO WHERE THE EYES ARE 127
INTRODUCTION 128
E-COMMERCE BUSINESS MODELS 128
Business to Business (B2B) E-Commerce 129
Business to Consumer (B2C) E-Commerce 130
Consumer to Business (C2B) E-Commerce 130
Consumer to Consumer (C2C) E-Commerce 131
UNDERSTAND YOUR BUSINESS, PRODUCTS, SERVICES, AND CUSTOMERS  132
Who Are Your Customers? 132
What Is the Value of Your Products and Services as Perceived by Your Customers? 132
FIND CUSTOMERS AND ESTABLISH RELATIONSHIPS  137
Business to Consumer 137
Business to Business 139
MOVE MONEY EASILY AND SECURELY  140
Business to Consumer Payment Systems 140
Business to Business Payment Systems 142
Security: The Pervading Concern 143
E-BUSINESS TRENDS  144
Long-Tail Economics 145
Crowdsourcing 146
Virtual Goods 147
Mobile Commerce 148
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  149
CLOSING CASE STUDY ONE: WHEN YOU’RE BIG, YOU CAN BE YOUR OWN B2B E-MARKETPLACE  151
CLOSING CASE STUDY TWO: THE MOBILE COMMERCE EXPLOSION  153
KEY TERMS AND CONCEPTS  154
SHORT-ANSWER QUESTIONS  155
ASSIGNMENTS AND EXERCISES  155
DISCUSSION QUESTIONS  156
Chapter Projects  156
CHAPTER SIX
Systems Development:Phases, Tools, and Techniques  159
OUTRAGEOUS INDUSTRY TRANSFORMATION: CAMERAS USE FILM?  159
INTRODUCTION  160
INSOURCING AND THE SYSTEMS DEVELOPMENT LIFE CYCLE  160
Phase 1: Planning 162
Phase 2: Analysis 163
Phase 3: Design 164
Phase 4: Development 164
Phase 5: Testing 165
Phase 6: Implementation 165
Phase 7: Maintenance 166
COMPONENT-BASED DEVELOPMENT 167
Rapid Application Development Methodology 167
Extreme Programming Methodology 168
Agile Methodology 170
Service-Oriented Architecture—An Architecture Perspective 170
SELFSOURCING (END-USER DEVELOPMENT)  170
The Selfsourcing Process 171
The Advantages of Selfsourcing 172
Potential Pitfalls and Risks of Selfsourcing 173
Which Applications for IT to Offload 173
The Right Tool for the Job 174
PROTOTYPING  174
The Prototyping Process 175
The Advantages of Prototyping 177
The Disadvantages of Prototyping 177
OUTSOURCING  178
The Outsourcing Process 180
The Service Level Agreement 182
Geopolitical Outsourcing Options 182
The Advantages and Disadvantages of Outsourcing 184
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  185
CLOSING CASE STUDY ONE: THE GOOD-ENOUGH TECHNOLOGY ECONOMY  186
CLOSING CASE STUDY TWO: TABLETS TAKE THEIR PLACE IN THE PC MARKET  187
KEY TERMS AND CONCEPTS  189
SHORT-ANSWER QUESTIONS  189
ASSIGNMENTS AND EXERCISES  190
DISCUSSION QUESTIONS  191
Chapter Projects 192
CHAPTER SEVEN
Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning:Building and Sustaining the Dynamic Enterprise  195
OUTRAGEOUS INDUSTRY TRANSFORMATION:MONEY WILL ALWAYS BE MONEY  195
INTRODUCTION  196
Customers 196
End Users 197
Software Development 198
Information Needs 198
Hardware Requirements 198
HARDWARE AND SOFTWARE INFRASTRUCTURE  199
Enterprise Resource Planning (ERP) Revisited 199
Supporting Network Infrastructures 201
Cloud Computing: No Infrastructure at All 203
IT SUCCESS METRICS  209
Efficiency and Effectiveness Metrics 209
Web-centric Metrics 211
Call Center Metrics 212
BUSINESS CONTINUITY PLANNING  212
Phase 1: Organizational Strategic Plan 213
Phase 2: Analysis 213
Phase 3: Design 214
Phase 4: Implementation 214
Phase 5: Testing 215
Phase 6: Maintenance 215
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  216
CLOSING CASE STUDY ONE: PUBLIC “PERSONAL” CLOUDS  218
CLOSING CASE STUDY TWO: DENVER HEALTH OPERATES WITH A PRIVATE CLOUD AND THIN CLIENTS  219
KEY TERMS AND CONCEPTS  220
SHORT-ANSWER QUESTIONS  221
ASSIGNMENTS AND EXERCISES  221
DISCUSSION QUESTIONS  222
Chapter Projects 222
CHAPTER EIGHT
Protecting People and Information:  Threats and Safeguards  225
OUTRAGEOUS INDUSTRY TRANSFORMATION: TRANSFORMATIONS IN MEDICINE MEAN BETTER LIVES  225
INTRODUCTION  226
ETHICS  226
Two Factors That Determine How You Decide Ethical Issues 228
Intellectual Property 229
PRIVACY 231
Privacy and Other Individuals 231
Identity Theft 232
Privacy and Employees 235
Privacy and Consumers 237
Privacy and Government Agencies 241
Laws on Privacy 243
SECURITY  244
Security and Employees 244
Security and Outside Threats 245
Security Precautions 247
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  249
CLOSING CASE STUDY ONE: SEXTING NOW ALMOST COMMONPLACE  250
CLOSING CASE STUDY TWO: SONY REELS FROM MULTIPLE HACKER ATTACKS  252
KEY TERMS AND CONCEPTS  253
SHORT-ANSWER QUESTIONS  253
ASSIGNMENTS AND EXERCISES  253
DISCUSSION QUESTIONS  254
Chapter Projects 255
CHAPTER NINE
Emerging Trends and Technologies:Business, People, and Technology Tomorrow  257
OUTRAGEOUS INDUSTRY TRANSFORMATION: THERE IS NO LONGER ONE IN EVERY TOWN  257
INTRODUCTION  258
THE CHANGING INTERNET  259
Personal Software-as-a-Service 259
Push, Not Pull, Technologies and Personalization 260
F2b2C: A New E-Commerce Business Model 261
Voice over Internet Protocol (VoIP) 262
Web 3.0 (Is Web 2.0 Already Old?) 262
E-Society 264
PHYSIOLOGICAL INTERACTION  264
Automatic Speech Recognition 264
Virtual Reality 265
Cave Automatic Virtual Environments 265
Haptic Interfaces 266
Biometrics 267
THE WIRELESS ARENA  270
The Next Generation of Smartphone Technology 270
RFID (Radio Frequency Identification) 271
PURE TECHNOLOGY  274
Nanotechnology 274
Multi-State CPUs 275
Holographic Storage Devices 275
MOST IMPORTANT CONSIDERATIONS 275
The Necessity of Technology 276
Closing the Great Digital Divide 276
Technology for the Betterment of Society 276
Exchanging Privacy for Convenience 276
Ethics, Ethics, Ethics 277
Making Predictions 277
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  278
CLOSING CASE STUDY ONE: JUST HOW BIG IS THE IMPACT OF TECHNOLOGY ON SOCIETY?  280
CLOSING CASE STUDY TWO: SMARTPHONESAND THE GREAT DIGITAL DIVIDE  282
KEY TERMS AND CONCEPTS  283
SHORT-ANSWER QUESTIONS  283
ASSIGNMENTS AND EXERCISES  284
DISCUSSION QUESTIONS  284
Chapter Projects  285
EXTENDED LEARNING MODULE A   322
Computer Hardware and Software A QUICK TOUR OF TECHNOLOGY  323
CATEGORIES OF COMPUTERS BY SIZE  325
Smartphones 325
Tablet PCs, Slates, and E-Readers 325
Notebook Computers 325
Desktop Computers 326
Minicomputers, Mainframe Computers, and Supercomputers 327
SOFTWARE: YOUR INTELLECTUAL INTERFACE  328
Application Software 328
System Software 331
HARDWARE: YOUR PHYSICAL INTERFACE 333
Common Input Devices 334
Common Output Devices 336
Common Storage Devices 338
CPU and RAM 340
Connecting the Hardware Outside to the Hardware Inside 342
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  345
KEY TERMS AND CONCEPTS  346
SHORT-ANSWER QUESTIONS  348
ASSIGNMENTS AND EXERCISES  348
EXTENDED LEARNING MODULE B   350
The World Wide Web and the Internet  INTRODUCTION  351
WORLD WIDE WEB  352
Web Sites, Addresses, and Pages 352
Understanding Addresses 353
Using Web Browser Software 354
SEARCH ENGINES  356
WEB 2.0  357
Wikis 357
Social Networking Sites 358
Blogs 358
RSS Feeds 359
Podcasting 359
INTERNET TECHNOLOGIES  359
The Internet Backbone 359
Internet Servers 360
Communications Protocols 360
CONNECTING TO THE INTERNET  362
Communications Software 362
Telecommunications Hardware 363
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  365
KEY TERMS AND CONCEPTS 366
SHORT-ANSWER QUESTIONS 367
ASSIGNMENTS AND EXERCISES 367
EXTENDED LEARNING MODULE C   370
Designing Databases and Entity-Relationship Diagramming INTRODUCTION  371
DESIGNING AND BUILDING A RELATIONAL DATABASE  371
Step 1: Define Entity Classes and Primary Keys 373
Step 2: Define Relationships among the Entity Classes 374
Step 3: Define Information (Fields) for Each Relation 380
Step 4: Use a Data Definition Language to Create Your Database 383
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  383
KEY TERMS AND CONCEPTS  384
SHORT-ANSWER QUESTIONS  384
ASSIGNMENTS AND EXERCISES  385
EXTENDED LEARNING MODULE D   386
Decision Analysis with Spreadsheet Software  INTRODUCTION  387
LISTS  388
BASIC FILTER  390
CUSTOM FILTER  392
CONDITIONAL FORMATTING  394
PIVOT TABLES  396
GOAL SEEK  402
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  404
KEY TERMS AND CONCEPTS  405
ASSIGNMENTS AND EXERCISES  405
EXTENDED LEARNING MODULE D (on OLC)  Decision Analysis with Spreadsheet Software  407
EXTENDED LEARNING MODULE E   408
Network Basics INTRODUCTION  409
Basic Principles of Networks 409
HOME NETWORKS  410
Network Cards in Each Computer 410
Wired and Wireless Transmission Media 410
Home Internet Service and Broadband Routers 411
Network Software 412
NETWORK COMPONENTS  412
Switches 412
Routers 413
CLASSIFYING NETWORKS BY DISTANCE  414
LANs, WANs, and MANs 414
INTERNET  415
Bandwidth 415
Internet Connection Types 416
Voice over IP 421
NETWORK COMMUNICATIONS MEDIA 422
Wired Communications Media 422
Wireless Communications Media 423
NETWORK SECURITY 426
Principles of Computer Security 426
Firewalls and Intrusion Detection Systems 427
Encrypted Communications: SSL and Virtual Private Networks 428
Other Security Threats: Malware 429
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  430
KEY TERMS AND CONCEPTS  432
SHORT-ANSWER QUESTIONS  432
ASSIGNMENTS AND EXERCISES  433
EXTENDED LEARNING MODULE F  (on OLC)  Building a Web Page with HTML  434
EXTENDED LEARNING MODULE G  (on OLC)  Object-Oriented Technologies  435
EXTENDED LEARNING MODULE H   436
Computer Crime and Digital Forensics INTRODUCTION  437
COMPUTER CRIME  438
Outside the Organization 438
Web Defacing 445
Cyber War 446
The Players 446
DIGITAL FORENSICS 448
The Collection Phase 449
The Analysis Phase 453
Analytics in Forensics 458
Anti-Forensics 460
WHO NEEDS DIGITAL FORENSICS INVESTIGATORS?  463
Proactive Digital Forensics Education for Problem Prevention 464
Reactive Digital Forensics for Incident Response 465
A Day in the Life 465
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 467
KEY TERMS AND CONCEPTS 468
SHORT-ANSWER QUESTIONS 469
ASSIGNMENTS AND EXERCISES 469
EXTENDED LEARNING MODULE I (on OLC)  Building an E-Portfolio 471
EXTENDED LEARNING MODULE J  Implementing a Database with Microsoft Access  472
INTRODUCTION  473
SOLOMON ENTERPRISES DATABASE  473
Implementing the Structure of the Solomon Enterprises Database 474
Implementing the Raw Material Relation Structure 476
Implementing the Concrete Type RelationStructure 479
Implementing the Bill of Material Relation Structure 480
DEFINING RELATIONSHIPS WITHIN THE SOLOMON ENTERPRISES DATABASE  482
ENTERING INFORMATION INTO THE SOLOMON DATABASE  484
Changing the Structure of Information in Relations  487
CREATING A SIMPLE QUERY USING ONE RELATION  487
Simple Query with a Condition (Conditional Query) 488
CREATING AN ADVANCED QUERY USING MORE THAN ONE RELATION  489
GENERATING A SIMPLE REPORT  491
GENERATING A REPORT WITH GROUPING, SORTING, AND TOTALS  494
CREATING A DATA INPUT FORM  499
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED  500
KEY TERMS AND CONCEPTS  501
ASSIGNMENTS AND EXERCISES  501
EXTENDED LEARNING MODULE J  (on OLC)  Implementing a Database with Microsoft Access  502
EXTENDED LEARNING MODULE K  (on OLC)  Careers in Business 503
EXTENDED LEARNING MODULE L  (on OLC)  Building Web Sites with Frontpage  504
EXTENDED LEARNING MODULE M  (on OLC)  Programming in Excel with VBA  505
Notes 506

内容概要

斯蒂芬·哈格(Stephen Haag)丹佛大学丹尼尔商学院商业信息和分析专业的教授。斯蒂芬曾任信息技术和电子商务系系主任、信息技术硕士项目主任、MBA项目主任以及学院主管研究生项目的副院长。斯蒂芬在西得克萨斯州立大学获得学士和硕士学位,在得州大学阿灵顿分校获得博士学位。
斯蒂芬作为作者或共同作者出版了众多书籍,包括Computing Concepts in Action(12年级教科书)、与父母共同撰写的Interactions: Teaching English as a Second Language、与Peter Keen编写的Information Technology: Tomorrow抯 Advantage Today、Excelling in Finance、Business Driven Technology以及40多本信息系列书籍。他还在Communications of the ACM、Socio-Economic Planning Sciences、The International Journal of Systems Science、Managerial and Decision Economics、Applied Economics和The Australian Journal of Management等期刊发表大量文章。斯蒂芬同家人住在科罗拉多的高原牧场。
梅芙·卡明斯(Maeve Cummings)匹兹堡州立大学信息系统专业的教授。她在匹兹堡州立大学获得数学和计算机科学的学士学位及MBA学位,并在得州大学阿灵顿分校获得博士学位。她在Journal of Global Information Management和The Journal of Computer Information Systems期刊发表了多篇论文。她是多个期刊的编委,还是Case Studies in Information Technology以及“信息技术”丛书Computing Concepts and Information Systems Essentials(目前新版本是第2版)的共同作者。梅芙已经从教25年,目前生活在堪萨斯的匹兹堡。


 信息时代的管理信息系统(英文版·原书第9版)下载



发布书评

 
 


 

农业基础科学,时尚,美术/书法,绘画,软件工程/开发项目管理,研究生/本专科,爱情/情感,动漫学堂PDF下载,。 PDF下载网 

PDF下载网 @ 2024