Information systems today managing in the digital world 8th global edition by valacich

562 272 0
Information systems today managing in the digital world 8th global edition by valacich

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Giáo trình Information systems today managing in the digital world 8th global edition by valacich Giáo trình Information systems today managing in the digital world 8th global edition by valacich Giáo trình Information systems today managing in the digital world 8th global edition by valacich Giáo trình Information systems today managing in the digital world 8th global edition by valacich Giáo trình Information systems today managing in the digital world 8th global edition by valacich Giáo trình Information systems today managing in the digital world 8th global edition by valacich

GLOBAL EDITION Information Systems Today Managing in the Digital World For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students with the best possible learning tools This Global Edition preserves the cutting-edge approach and pedagogy of the original, but also features alterations, customization, and adaptation from the North American version GLOBAL EDITION EIGHTH EDITION Valacich Schneider Managing in the Digital World    E IGHTH EDITION Joseph Valacich • Christoph Schneider G LO B A L EDITION This is a special edition of an established title widely used by colleges and universities throughout the world Pearson published this exclusive edition for the benefit of students outside the United States and Canada If you purchased this book within the United States or Canada, you should be aware that it has been imported without the approval of the Publisher or Author Information Systems Today Pearson Global Edition Valacich_08_1292215976_Final.indd 08/06/17 3:00 PM MIS: Engage, Apply, Empower COMMUNICATION DECISION MAKING TEAMWORK ABILITY TO APPLY KNOWLEDGE NEWE HIR CRITICAL THINKING PROBLEM SOLVING • Writing Space—Better writers make better communicators— who become better managers Designed to help develop and assess concept mastery and critical thinking, the Writing Space offers assisted auto-graded writing assignments so students can receive meaningful, personalized feedback quickly and easily And because of Intergration with Turnitin , Writing Space can check students’ work for improper citation or plagiarism ® Valacich_08_1292215976_ifc_ibc_Final.indd Information systems have become pervasive Mobile devices, social media, and cloud computing have transformed organizations and society The Internet of Things can generate a wealth of potentially useful Big Data The rapid development of transportation and telecommunication technologies, national and global infrastructures, and information systems as well as a host of other factors has created a number of pressing societal issues that tremendously influence the world we live in These issues include demographic changes, urbanization, shifts in economic power, resource scarcity, and climate change As a consequence, sustainable development will become an ever increasingly important aspect for organizations Throughout this revision, we discuss how organizations can harness radical innovations and other technological developments, as well as the role of information systems in influencing and addressing pressing societal issues; further, we added a new chapter element about the role of Green IT We designed the book’s cover to emphasize how IT resides within and influences various societal issues 13/06/17 1:06 PM • Dynamic Study Modules—help students learn the language of MIS by continuously assessing their activity and performance in real time by adapting to the student's knowledge and confidence on each concept These are available as graded assignments prior to class, and accessible on smartphones, tablets, and computers • • Learning Catalytics™—is an interactive, student response tool that uses students’ smartphones, tablets, or laptops to engage them in more sophisticated tasks and critical thinking as well as collaboration with other class members Included with MyLab with eText, Learning Catalytics enables you to generate classroom discussion, guide your lecture, and promote peer-to-peer learning with real-time analytics Reporting Dashboard—View, analyze, and report learning outcomes clearly and easily, and get the information needed to keep students on track throughout the course with the new Reporting Dashboard Available via the MyLab Gradebook and fully mobile-ready, the Reporting Dashboard presents student performance data at the class, section, and program levels in an accessible, visual manner • Pearson eText—keeps students engaged in learning on their own time, while helping them achieve greater conceptual understanding of course material Combining resources that illuminate content with accessible self-assessment, MyLab with Pearson eText provides students with a complete digital learning experience—all in one place • Accessibility (ADA)—Pearson is working toward WCAG 2.0 Level AA and Section 508 standards, as expressed in the Pearson Guidelines for Accessible Educational Web Media Moreover, our products support customers in meeting their obligation to comply with the Americans with Disabilities Act (ADA) by providing access to learning technology programs for users with disabilities Please email our Accessibility Team at disability.support@pearson.com for the most up-to-date information • LMS Integration—You can now link from Blackboard Learn, Brightspace by D2L, Canvas, or Moodle to MyLab IS Professors can acess assignments, rosters, and resources, and synchronize grades with your LMS gradebook Single sign-on provides students access to all the personalized learning resources that make studying more efficient and effective ALWAYS LEARNING A01_VALA5976_08_GE_FM.indd 16/06/17 11:29 am This page intentionally left blank EIGHTH EDITION G LO B AL E D I T I O N INFORMATION SYSTEMS TODAY MANAGING IN THE DIGITAL WORLD Joseph Valacich University of Arizona Christoph Schneider City University of Hong Kong Harlow, England • London • New York • Boston • San Francisco • Toronto • Sydney • Dubai • Singapore • Hong Kong Tokyo • Seoul • Taipei • New Delhi • Cape Town • Sao Paulo • Mexico City • Madrid • Amsterdam • Munich • Paris • Milan A01_VALA5976_08_GE_FM.indd 20/04/17 9:54 am VP Editorial Director: Andrew Gilfillan Senior Portfolio Manager: Samantha Lewis Content Development Team Lead: Laura Burgess Program Monitor: Ann Pulido/SPi Global Editorial Assistant: Madeline Houpt Managing Editor, Global Edition: Steven Jackson Acquisitions Editor, Global Edition: Tahnee Wager Senior Project Editor, Global Edition: Daniel Luiz Manager, Media Production, Global Edition: M Vikram Kumar Senior Manufacturing Controller, Global Edition: Trudy Kimber Product Marketing Manager: Kaylee Carlson Project Manager: Katrina Ostler/ Cenveo® Publisher Services Text Designer: Cenveo Publisher Services Cover Designer: Lumina Datamatics, Inc Cover Art: pogonic/Shutterstock Full-Service Project Management: Cenveo Publisher Services Composition: Cenveo Publisher Services Unattributed figures in text: Joseph Valacich, Christoph Schneider, Information Systems Today, 8Ed., © 2018 Pearson Education, Inc., New York, NY Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose All such documents and related graphics are provided “as is” without warranty of any kind Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services The documents and related graphics contained herein could include technical inaccuracies or typographical errors Changes are periodically added to the information herein Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time Partial screen shots may be viewed in full within the software version specified Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Microsoft corporation in the U.S.A and other countries This book is not sponsored or endorsed by or affiliated with the Microsoft corporation Pearson Education Limited KAO Two KAO Park Harlow CM17 9NA United Kingdom and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2018 The rights of Joseph Valacich and Christoph Schneider to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Information Systems Today: Managing in the Digital World, 8th edition, ISBN 978-0-13-463520-0, by Joseph Valacich and Christoph Schneider, published by Pearson Education © 2018 All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners ISBN 10: 1-292-21597-6 ISBN 13: 978-1-292-21597-6 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 10 14 13 12 11 10 Typeset in Times LT Pro-Roman by Cenveo Publisher Services Printed and bound by Vivar, Malaysia A01_VALA5976_08_GE_FM.indd 17/07/17 4:33 pm Dedication To my mother Mary, you are the best —Joe To Birgit for your love and support —Christoph A01_VALA5976_08_GE_FM.indd 20/04/17 9:54 am www.downloadslide.net This page intentionally left blank www.downloadslide.net About the Authors Joseph (Joe) Valacich is an Eller Professor of MIS within the Eller College of Management at the University of Arizona, a Fellow of the Association for Information Systems (2009), and the Chief Science Officer (CSO) of Neuro-ID, Inc He was previously on the faculty at Indiana University, Bloomington, and Washington State University, Pullman He has had visiting faculty appointments at City University of Hong Kong, Buskerud College (Norway), the Helsinki School of Economics and Business, the Norwegian University of Life Sciences, and Riga Technical University (Latvia) He received a PhD degree from the University of Arizona (MIS) and MBA and BS (Computer Science) degrees from the University of Montana Prior to his academic career, Dr Valacich worked in the software industry in Seattle in both large and startup organizations Dr Valacich has served on various national task forces designing model curricula for the information systems discipline, including IS ‘97, IS 2002, and IS 2010: The Model Curriculum and Guidelines for Undergraduate Degree Programs in Information Systems, where he was co-chairperson He also served on the task force that designed MSIS 2000 and 2006: The Master of Science in Information Systems Model Curriculum He served on the executive committee, funded by the National Science Foundation, to define the IS Program Accreditation Standards and served on the board of directors for CSAB (formally the Computing Sciences Accreditation Board) representing the Association for Information Systems (AIS) He was the general conference co-chair for the 2003 International Conference on Information Systems (ICIS) and the 2012 Americas Conference on Information Systems (AMCIS); both were held in Seattle Dr Valacich has conducted numerous corporate training and executive development programs for organizations, including AT&T, Boeing, Dow Chemical, EDS, Exxon, FedEx, General Motors, Microsoft, and Xerox He has served in a variety of editorial roles within various academic journals and conferences His primary research interests include human–computer interaction, deception detection, technology-mediated collaboration, mobile and emerging technologies, and e-business He is a prolific scholar, having published more than 200 scholarly articles in numerous prestigious journals and conferences, including: MIS Quarterly, Information Systems Research, Management Science, Academy of Management Journal, Journal of MIS, Decision Sciences, Journal of the AIS, Communications of the ACM, Organizational Behavior and Human Decision Processes, and Journal of Applied Psychology He is a coauthor of the leading textbooks Modern Systems Analysis and Design (8th ed.) and Essentials of Systems Analysis and Design (6th ed.), both published by Pearson In 2016, Dr Valacich was awarded the University of Arizona, Tech Launch Arizona, “Innovation & Impact Award” for Information Technology He was awarded the “Distinguished Alumnus Award” from the University of Montana Alumni Association in 2012 and the “Outstanding Alumnus Award” from the University of Montana’s School of Business Administration in 2009 Dr Valacich is also ranked as one of the most prolific authors in the history of MIS Quarterly—his discipline’s top journal—over the life of the journal (1977–2016) (see misq.org) Throughout his career, he has also won numerous teaching, service, and research awards Christoph Schneider is an assistant professor in the Department of Information Systems at City University of Hong Kong and previously held a visiting faculty appointment at Boise State University He earned a Swiss Higher Diploma in Hotel Management at the University Centre César Ritz in Brig, Switzerland, a BA in Hotel and Restaurant Administration at Washington State University, and a PhD in Business Administration (Management Information Systems) at Washington State University His teaching interests include the management of information systems and web design A01_VALA5976_08_GE_FM.indd 20/04/17 9:54 am www.downloadslide.net 8    ABOUT THE AUTHORS Dr Schneider is an active researcher His primary research interests include human–computer interaction, electronic commerce, and computer-mediated collaboration His research has appeared in peer-reviewed journals, such as Information Systems Research, Management Information Systems Quarterly, Management Science, and IEEE Transactions on Professional Communication; further, he has presented his research at various international conferences, such as the International Conference on Information Systems, the European Conference on Information Systems, and the Hawaii International Conference on System Sciences He serves as a member of the International Steering Committee of the International Conference on Information Systems Development (ISD) and as senior editor at Information Systems Journal A01_VALA5976_08_GE_FM.indd 20/04/17 9:54 am www.downloadslide.net 546  SUBJECT INDEX Broadcasting, 408 Brokerage, online, 171 BSI See British Standards Institute Budgets, backward looking, 256 Bullwhip effect, 341 Business analytics, 254 Business case See Making the business case Business competency, 50 Business continuity plan, 445, 454 Businesses ERP requirements of, 318, 327 internet connectivity of, 505 IS value to, 81, 335 mobile device dependence of, 97 outsourcing used by, 36 technology changing, 51 Business intelligence (BI), 143, 294 advanced analytics and, 254 core concepts in, 289 database inputs to, 257–258, 289 digital dashboards, 270–271 DSSs and, 268 information visualization in, 270–272 mobile, 272 OLAP, 269 visual analytics in, 271–272 Business/IT alignment, 89 Business models, 89, 113 cloning, 206 components of, 91 in digital world, 89–97 platform-based, 93–95 service-based, 95–96 service-oriented, 43 technology-enabled, 76–77 Business processes, 78, 353 conditions for improvement of, 315 core, 300–302 databases supporting, 124–126 enterprise systems in, 312–316 ERP core components in, 318–320 of organizations, 327 streamlining of, 314–315 supporting, 309–316 sustainable, 342 Business process management (BPM), 89, 314–315 Business process reengineering (BPR), 314 Business rules, 262 Business-to-business (B2B), 169, 338 EC, 336–337, 348–349 financial transactions in, 348–349 SCM improving processes of, 364 Business-to-business marketplaces, 338 Business-to-consumer (B2C), 166, 169, 171–179, 194–196, 200, 349 Bus network, 494 Buyer agents, 280 BYOD See Bring your own device Bytes, 415, 474 Bytes per inch (BPI), 477 Z06_VALA5976_08_GE_SIDX.indd 546 C C2B See Consumer-to-business C2C See Consumer-to-consumer Cable modems, 504 Cables, networking, 494–497 Cache, 474, 475 CAD See Computer-aided design Call centers, 357 Campus area network (CAN), 134, 488 CAN See Campus area network Canvas, 32 Capabilities, 86 Capital expenditure, 379 CAPTCHA, 429 Carbon footprint, 342, 345 Cardiac monitors, 41 Card security code, 195 Careers computer-related, 43–44 IS used by, 34 opportunities for, 47–53, 66 Carrier sense multiple access/collision avoidance (CSMA/CA), 494 Cascading style sheets (CSS), 483 CASE See Computer-aided software engineering Cathode ray tubes (CRT), 478 CCTV See Closed-circuit television systems CD-R (compact disc-recordable), 477 CD-RW (compact disc-rewritable), 477 Cells, 497 Cellular phones, 122, 497–498 Center for Innovation, Testing, and Evaluation (CITE), 103 Centralized computing, 485–486 Central processing unit (CPU), 141–142, 473–474 Certificate authority, 452 CGI See Computer-generated imagery Change request management, 398 Character recognition, 471 Characters per inch, 477 Chargeback rates, 195 Chatbots, 224, 280, 281 China, 166–167, 187, 340, 467 CITE See Center for Innovation, Testing, and Evaluation Classification, 275–276 Click-and-mortar business strategy, 172–173, 179 Clickbait, 234, 247 Click fraud, 185 Click-only business strategy, 172–174 Clickstream data, 277 Click-through rate, 186, 408 Click-wrap licenses, 405 Clients, 133–134 Client-server networks, 133 Climate change, 38, 216 Clock speed, 473, 474 Clock tick, 474 Cloning, business models, 206 Closed-circuit television (CCTV) systems, 454 Cloud-based architectures, 305 Cloud-based collaboration tools, 229 Cloud computing, 33, 41–42, 163, 332 application advances in, 152–157 characteristics of, 147–148 costs of, 151 data warehouses and, 267 defining, 145–147 external acquisition through, 406 freemium approach in, 92 grid computing in, 153–155 managing, 149–151 openness in, 151 overview of, 144–145 security and privacy in, 150–151 telecommunications in, 155–156 types of, 149 Cloud security, 452 Clustering, 275–276 CMS See Content management system Coaxial cable, 495 COBIT See Control objectives for information and related technology Code of conduct, 65–66, 384 Cold backup site, 446 Collaboration, 212, 231, 336 cloud-based, 229 defining, 212 employee portals for, 137, 216–218 groupware for, 214–215 intranet for, 216–218 social media enhancing, 229–230, 242 tools for, 213 videoconferencing for, 215–216 virtual teams for, 212–213 web-based, 230 Collaborative computing, 486–487 Collaborative CRM, 354–355, 361–363 Collaborative economy, 94 Collaborative computing, 486 Collective intelligence, 230 Collector, 431 College education, 33 Collocation facilities, 455 Combination primary key, 507 Commercial off-the-shelf (COTS) software, 386, 387 Commercial software, 318 Communications asynchronous and synchronous, 213 collaborative CRM enhancing, 361–363 human, 131–132 internal, 212 near-field, 193, 199 outsourcing and costs of, 36 personalized, 363 protocols for, 132 27/06/17 4:02 PM www.downloadslide.net SUBJECT INDEX  547  social media enhancing, 222–224, 242 telecommunications and, 44–45, 155–156 Competitive advantage, 58, 87 from databases, 124–126 enterprise-wide information systems for, 298–299 through innovation, 102 with IS, 58–59 resources and capabilities in, 86 Competitive forces, 84–85 Competitive intelligence, 276 Compilers, 480 Compliance, 317 Computer Abuse Amendments Act, 435 Computer-aided design (CAD), 363 Computer-aided software engineering (CASE), 484–485 Computer-assisted audit tools, 457 Computer cluster, 511 Computer crime, 194–196, 418–419, 420 criminal types committing, 421–422 cyberbullying, 419, 432 cybercriminals, 180, 399, 402, 459 cyberharassment, 235, 432 cybersquatting, 434 cyberstalking, 432 DoS attacks, 426 federal laws against, 434–435 hackers and crackers as, 420 malware and, 425–431 software piracy, 432–434 types of, 460 unauthorized access and, 422–423 unauthorized data modification and, 423 Computer ethics, 60, 65–66 Computer fluency, 44 Computer forensics, 458–459 Computer Fraud and Abuse Act, 434, 435 Computer-generated imagery (CGI), 158 Computer literacy, 43 Computer networking, 132, 133 Computers brief history of, 141 centralized, 485–486 classes of, 126–127 functioning of, 473–478 grid computing using, 153 occupations related to, 43–44 personal, 127 responsible use of, 65–66 software utilities for, 480 super, 126, 153 zombie, 426–427, 430 Computer viruses, 425–431 Computing, green, 157–158 Computing, serverless, 149 Confidential information policy, 445 Connections, 233–236 Consumerization of IT, 40, 142 Consumers hierarchy of needs of, 181 privacy of, 63–64 websites meeting needs of, 180–182 Z06_VALA5976_08_GE_SIDX.indd 547 Consumer-to-business (C2B), 169, 190–191 Consumer-to-consumer (C2C), 166, 169, 189–190 Content delivery networks, 152, 155 Content management system (CMS), 230 Continuous planning process, 256, 257, 258 Continuous process improvement, 315 Control objectives for information and related technology (COBIT), 458 Control unit, 474 Conversion rate, 186 Conversion strategies, 396–397 Cookies, 64, 429–430 Cooperation, 225–228 Coordination, 336 Copyright, 197, 433 Core activities, 303–304 Core business processes, 300–302 Core competencies, 49 Corporate social responsibility, 341–342 Corporations See Businesses; Organizations Corrections industry, 325 Corrective controls, 444 Corrective maintenance, 397 Cost-benefit analysis, 380–382 Costs of cloud computing, 151 of education, 108 of enterprise systems, 315–316 intangible and tangible, 379 leadership strategy, 85 marginal, 92 non-recurring and recurring, 379 outsourcing and communications, 36 outsourcing savings of, 37 technology and environmental, 59 technology and social, 59 types of, 379 COTS See Commercial off-the-shelf Counterfeit goods, 167 Countries, developing, 122 CPU See Central processing unit Crackers, 420, 430, 460 Criminal types, 421–422 Critical mass, 237–238 CRM See Customer relationship management CRM systems, 362 Cross-channel retailing, 173 Cross docking, 334 Crowdfunding, 107–108 Crowdsourcing, 233 CRT See Cathode ray tubes Cryptocurrencies, 171, 193–194 Cryptography, 451 CSI effect, 459 CSMA/CA See Carrier sense multiple access/collision avoidance CSS See Cascading style sheets Culture, 237 Customer engagement centers, 357 Customer-focused organizations, 360 Customer portal, 338 Customer relationship management (CRM) system, 124, 312, 349–351, 352 analytical, 354–355 applications for, 352 architecture of, 354–358 benefits of, 352 collaborative, 354–355 customer mobile, 358 developing strategy for, 353–354 ethical concerns in, 363 longterm relationships from, 364 operational, 354–359 social, 360 Customers information, 263 mobile CRM for, 358 portals, 338–339 Customer service, 304–305, 353 Customer service and support, 356–358 Customization, 312–313 Custom software, 312, 385–386 Cyberattacks, 418–419, 430–431 Cyberbullying, 419, 432 Cybercriminals, 180, 399, 402, 459 Cyber-espionage, 420 Cyberharassment, 235, 432 Cyberspace, 438 Cybersquatting, 434 Cyberstalking, 432 Cyberterrorism, 421, 435, 437–440, 460 Cybertheft, 106 Cyberwar, 435, 436, 437–438, 460 D Dark net, 458 Dark web, 136, 164, 458 Data See also Information clickstream, 277 collection of, 354 in Information Age, 43 IoT expanding, 275, 415 in IS, 46 master data management, 262 mirrored, 446 mobile devices generating, 271 modeling, 392 OLAP cube of, 269 organizations driven by, 254–255 semistructured, 256 slicing and dicing of, 269 structured, 256 types of, 130 unauthorized modification of, 423 unstructured, 256 unstructured analysis of, 276 Data analytics, in healthcare, 293–294 27/06/17 4:02 PM www.downloadslide.net 548  SUBJECT INDEX Database management systems (DBMSs), 125, 259–260 Database of Intentions, 61–62 Databases, 124 ad hoc queries and reports of, 263–264 advanced models of, 511 advantages of, 260 application software and, 257–258 as BI application inputs, 257–258, 289 business processes supported by, 124–126 competitive advantage from, 124–126 data marts, 267 data warehouses, 266 designing, 394 electronic commerce and, 125, 257–258 entering and querying, 262–263 foundation concepts of, 259 informational systems and, 265 interactive websites using, 258–259 IoT and, 260–262 management of, 262, 506–511 master data management, 262 MySQL, 387 NoSQL, 261–262, 511 online transaction processing, 264–265 operational systems of, 265 organizations using, 125–126 privacy and, 61–62 sample table of, 259 types of, 260–262 Data centers, 139–140, 144, 299, 378 Data center security, 453 Data cleansing, 266 Data dictionary, 262 Data-driven organization, 264 Data entry form, 395 Data flows, 392 Data marts, 267 Data mining, 274, 275, 289 Data mining agent, 280 Data models, 262 Data packet, 492 Data privacy statements, 63 Data quality, 46 Data reduction, 274 Data redundancy, 511 Data science, 273 Data structures, 508 Data type, 262 Data warehouses, 53, 266, 267 DBMSs See Database management systems Deceptive business practices, 281 Decision making GIS used in, 285–287 IT investment, 382–383 managerial level, 79–80 organizational level, 78 Decision support systems (DSSs), 268 Dedicated grid, 155 Z06_VALA5976_08_GE_SIDX.indd 548 Deep web, 136, 164  Defense Advanced Research Projects Agency (DARPA), 500 Demand fluctuations, 143–144 Demographic changes, 37 Denial-of-service (DoS) attacks, 426 Density, 477 Desktop videoconferencing, 215 Desktop virtualization, 133 Destructive agents, 280 Detective controls, 444 Developing countries, 122 Developmental testing, 396 Device drivers, 128 Dial-up, 503 Differentiation strategy, 85 Digital dashboards, 79, 270–271, 359 Digital divide, 34–35 Digital infrastructure, 121 Digital media, 64 Digital nomads, 90 Digital products, 169 Digital rights management (DRM), 197–198 Digital signals, 503 Digital subscriber line (DSL), 504 Digital video discs, 477 Digital watermark, 198 Digital world business models in, 89–97 payments secured in, 191–196 radical innovations in, 38–44 revenue models in, 90–93 social commerce in, 176–177 societal issues in, 35–38 technological changes in, 32–35, 65 Digitized, 474 Dimensions, 269 Directory services, 487 Disaster planning, 445–446 Disaster recovery plan, 445 Discount rate, 380 Discriminating algorithms, 362 Discussion forums, 214–215 Disintermediation, 94, 171, 174, 200 Disk-based storage media, 131 Display advertising, 184 Disruptive growth engine, 104 Disruptive innovation cycle, 104–105 Disruptive innovations, 97 Distinctive competency, 86 Distributed computing, 486–487 Distribution planning, 346 DIWO See Do-it-with-others DIY See Do-it-yourself DNA testing, 459 DNS See Domain Name System Document analysis, 391 Documentation, 396 Do-it-with-others (DIWO), 372 Do-it-yourself (DIY), 372 Domain names, 135–136 Domain Name System (DNS), 502 DoS See Denial-of-service attacks Downstream information flow, 307, 311, 364 Doxing, 432 Drill-down, 264, 269 Drill-down report, 264 Drive-by hacking, 450 Driverless cars, 326 DRM See Digital rights management Drone technology, 252–253, 298, 369 DSL See Digital subscriber line DSSs See Decision support systems Dumb terminals, 486 Dumpster diving, 422 DVD-ROM (digital versatile disc-readonly memory), 477 Dynamic pricing models, 176 E e-auctions, 190, 200 e-business, 34 EC See Electronic commerce EC2 See Elastic Compute Cloud e-commerce, 125, 171–179 Economic opportunities, 105 Economics, 37 ECPA See Electronic Communications Privacy Act EDI See Electronic Data Interchange Education, 108 EEG See Electroencephalogram Effectiveness, 79 Efficiency, 78 e-finance, 170–171 e-government security, 466 EFT See Electronic funds transfer e-government, 169–170 EHR See Electronic health record EKG See Electrocardiogram Elastic Compute Cloud (EC2), 146 Electric cars, 326 Electric delivery vans, 192 Electrocardiogram (EKG), 288 Electroencephalogram (EEG), 288 Electromagnetic interference (EMI), 495 Electronic bill pay, 171 Electronic commerce (EC), 168 B2B, 336–337, 348–349 C2B, 190–191 C2C, 189–190 click-and-mortar business strategy in, 172–173 database technology and, 125, 257–258 legal issues in, 196–199, 200 with mobile devices, 168–169 online, 181–182 payments secured in, 191–196 systems for, 55 taxation in, 196–197 types of, 168–169 27/06/17 4:02 PM www.downloadslide.net SUBJECT INDEX  549  Electronic Communications Privacy Act (ECPA), 62, 434 Electronic Data Interchange (EDI), 337 Electronic devices, 59 Electronic funds transfer (EFT), 193 Electronic health record (EHR), 73 Electronic meeting system, 214–215 Electronics, dissolvable, 219 e-mail, 90, 428–429 addresses, 196 confirmation, 64 marketing, 184–185 privacy, 62–63 productivity loss from, 374–375 Sarbanes-Oxley Act and, 458 Embedded systems, 127 EMI See Electromagnetic interference Employee portals, 137, 216–218 Employee self-service, 218 Enabling technologies, 105 Encryption, 451–452 Encyclopaedia Britannica, 219 End-to-end encryption, 452 Energy, 144 Energy consumption, 216 Enterprise-level systems, 305 Enterprise license, 405 Enterprise marketing management, 358–359 Enterprise resource planning (ERP), 316, 332 business requirements in, 318, 327 choosing, 317 compliance and regulatory demands in, 317 core components of, 318–320 extended components in, 319 installation of, 322 limitations of, 322 make-to-stock/order process in, 321 mobile devices and, 323 order-to-cash process in, 320 procure-to-pay process in, 320–321 Enterprise search, 217 Enterprise software, 313 Enterprise systems, 54, 309, 327 achieving success in, 322–323 benefits and costs of, 315–316 in business processes, 312–316 executive sponsorship of, 323–324 implementing, 323, 324–326 information integration from, 309 outside experts assisting, 324 rise of, 308–309 user training of, 324 Enterprise WAN, 488 Enterprise-wide information systems, 298–299, 309 Entertainment industry, 198 Entity, 259 Entity-relationship diagram (ERD), 392, 509 Z06_VALA5976_08_GE_SIDX.indd 549 Environment, 454 green computing and, 157–158, 305 green supply chain and, 345 online shopping influencing, 192 renewable energy and, 216 sustainable business practices and, 342 technological costs to, 59 technologies impact on, 44 underwater data center and, 378 U.S Navy and, 87 ERD See Entity-relationship diagram ERP See Enterprise resource planning ERP core components, 318 ERP extended components, 319 e-tailing, 172, 200 benefits of, 177–179 disintermediation in, 174 drawbacks of, 179 group buying in, 176 long tail in, 174–175 mass customization in, 175–176 revenue and pricing models in, 176 social commerce in, 176–177 Ethernet, 492 Ethernet card, 492 Ethics AI, 280 app development, 384 code of conduct, 65–66 computer, 60, 65–66 CRM with concerns of, 363 cyberwar and, 438 digital divide and, 34 of discriminating algorithms, 362 electronic device use, 59 in IS, 60–66 online product reviews and, 239 reputation management and, 178 in sharing economy, 96 of software piracy, 433–434 of sustainable business practices, 342 of text mining, 276 of unauthorized IT use, 455 Evaluation criteria, 405 Evernote, 229 Exception reports, 264 Executable, 480 Executive level, 80 Executive sponsorship, 323–324 Exit rate, 186 Expedia, 220 Expenditures, non-capital, 379 Explicit knowledge assets, 282 Extensible Business Reporting Language (XBRL), 348 Extensible Markup Language (XML), 347–348 External acquisition, 401–406, 409 Externally focused systems, 311 Extraction, transformation, and loading, 266 Extranet, 137–139 eXtreme Programming (XP), 401 F Facebook Live, 226 Facility security, 454–455 Fact, 269 Facts, arguments based on, 379 Fair Information Practice Principles, 63 Faith, arguments based on, 377–378 Fear, arguments based on, 378–379 Federal laws, 434–435 Fiber-optic cable, 496–497 Fiber to the home (FTTH), 505 Fiber to the premises, 505 Filter bubble, 234 Financial flow, 348 Financial management, 318–319 Financial services, 171 Financial transactions, 348–349 Fingerprint readers, 449 Fintech, 171 FireChat, 467 Firefox browser, 164, 185, 232, 386, 430 Firewall, 136, 450 First-call resolution, 351 First-mover advantage, 84 Five dimensions (5D), 35 Flappy Bird, 390 Flash animation, 484 Flash drive, 477 Flash memory, 476 Flat-file databases, 510 Flickr, 220 Folksonomy, 227 Ford Model T, 175 Forecasting, 345 Foreign key, 507 Forms, 263 Foursquare, 220 Foxconn, 340 Fraud, 196 Freecycling, 190 Freemium models, 90, 92–93 FTTH See Fiber to the home Fulfillment centers, 299 Functional area information system, 80–81 Functional convenience, 180–181 Fuzzy logic, 278 G G2B See Government-to-business G2C See Government-to-citizen G2G See Government-to-government Gamergate, 235 Gaming, 57 GB See Gigabytes Generation gap, 238 Generic top-level domains (gTLDs), 135 27/06/17 4:02 PM www.downloadslide.net 550  SUBJECT INDEX Geneva Conventions, 438 Geographical information system (GIS), 285–287 Geographic information, 285 Geospatial metadata, 226, 286 Geotag, 226–227 GFS See Google File System Ghz See Gigahertz Gigabytes (GB), 476 Gigahertz (Ghz), 474 Gig economy, 94 GIS See Geographical information system Global culture, 66 Globalization challenges to, 36–37 education, 108 organizational challenges of, 37, 255 skills needed in, 66 societal issues in, 35–38 software piracy and, 433–434 terrorism and, 368 Global network, 489 Global positioning system (GPS), 34, 187, 231, 339 Global supply chain, 368 Gmail, 42, 119, 149, 169, 218, 467 Google Adwords, 184, 206 Google Alerts, 361 Google Apps, 55, 229 Google Calendar, 42 Google Docs, 42, 119 Google File System (GFS), 415 Google Glass, 98 Google Gmail, 119 Google Hangouts, 36, 156–157 Google Maps, 125, 220, 227, 285, 287 Google Play, 114 Google Scholar, 467 Google Chromecast, 114 Google Street View, 125 Google Wallet, 191 Government-to-business (G2B), 170 Government-to-citizen (G2C), 170 Government-to-government (G2G), 170 GPS See Global positioning system Graphical user interface (GUI), 264, 271, 481 Green computing, 157–158, 424 Green IT, 44, 144, 305, 342, 378 Green shopping, 192 Green supply chain, 345 Grid computing, 134, 153–155, 486 Group buying, 176 Groupware, 213, 214–215 gTLDs See Generic top-level domains GUI See Graphical user interface H Hackers, 106, 154, 180, 281, 420, 437, 450 Hacktivist, 418–420 Z06_VALA5976_08_GE_SIDX.indd 550 Hadoop cluster, 511 Hadoop Distributed File System (HDFS), 386, 415 Hard drives, 131, 475–476 Hardware, 44, 47 in information systems, 126–128 obsolescence and, 140–143 software cycle with, 142 Hashtag, 224 HCI See Human-computer interface HD See High-definition HDFS See Hadoop Distributed File System Head crash, 476 Healthcare, 44, 73, 212, 288, 293–294 Healthcare IS, 44 Health Insurance Portability and Accountability Act (HIPAA), 150 Heartbleed security bug, 430 Hedge funds, 172 Help desks, 357 High-definition (HD), 100–101 High-frequency radio signals, 497–498 HIPAA See Health Insurance Portability and Accountability Act HITs See Human intelligence tasks Home automation, 41 Honeypot, 458 Hootsuite, 361 Hot backup site, 446 Hot-button issues, 384–385 HP Supplier portal, 338 HSPA+ (High Speed Packet Access), 498 HTML See Hypertext Markup Language HTML editors, 482 HTML tags, 482–483 HTTP See Hypertext Transfer Protocol Human-based computing, 233 Human body movement, 380 Human communication, 131–132 Human-computer interface (HCI), 394–395 Human controls, 455 Human intelligence tasks (HITs), 233 Human resource activities, 306 Human resource management, 318 Hurricanes, 272 Hyper-stimulation, 56 Hyperlink, 134 Hypertext, 134 Hypertext Markup Language (HTML), 134, 347, 482 Hypertext Transfer Protocol (HTTP), 134–135 I IaaS See Infrastructure as a Service IAFIS See Integrated Automated Fingerprint Identification System IBM Connections, 223 ICANN See Internet Corporation for Assigned Names and Numbers ICPs See Internet content providers IDENT See Automated Biometric Identification System Identification, 447 Identity theft, 191, 431 IIoT See Industrial Internet of Things Impact Team, 281 Impression-based models, 185 In-app purchases, 93 Inbound logistics activities, 304 Incident handling procedures, 445 Incident response, 458 Indiegogo, 107 Industrial espionage, 421 Industrial Internet of Things (IIoT), 41, 97 Industrial Revolution, 34 Industry automobile, 326 corrections, 325 entertainment, 198 GIS used in, 286 movie, 158 pharmaceutical, 219 using data warehouses, 266 Influencers, on social media, 361 Information, 41 customer, 263 digital dashboards representing, 270–271 downstream flow of, 307 enterprise systems integrating, 309 integrated, 254 from mobile devices, 188–189 organization flow of, 311 real-time access to, 217 scanners inputting, 472 from social media, 294 standalone systems with flow of, 308 upstream flow of, 307, 311 visualization of, 270–272, 289 Information Age data in, 43 privacy in, 60 responsible computer use in, 65–66 Informational systems, 265 Information flow, 307, 311, 347, 348 Information privacy, 60–64 Information property, 61–62 Information Sharing and Analysis Centers (ISAC), 456 Information system audit, 457 Information system risk assessment, 442 Information systems (IS), 32, 44 acquiring, 401–408 approaches to building, 399–401 auditing of, 457 automation with, 81 business case arguments for, 377–382 business value from, 81, 335 career opportunities in, 47–53 competitive advantage with, 58–59 27/06/17 4:02 PM www.downloadslide.net SUBJECT INDEX  551  components of, 46–47 core competencies in, 49 data in, 46 defining, 44–45 development in, 387–389, 393 dual nature of, 57–59 enterprise-wide, 298–299, 309 ethics in, 60–66 geographical, 285–287 hardware in, 126–128 healthcare, 44 job titles and descriptions in, 49 maintenance of, 397–399 measuring productivity of, 375–376 mobile devices and, 127 networking in, 131–139 occupations using, 34 organizational functions, 82 organizational strategy with, 84 organizations using, 54, 83–84 organizing functions of, 55–56 personnel value in, 48 quantifying productivity gains from, 374–376 risk assessment of, 442–444 touchpoints in, 173 types of, 53–55 users in, 51–53 value chain analysis, 88–89 Information systems architecture, 123 Information systems controls, 444 Information systems infrastructure, 121 analog for securing, 425, 447 components of, 159 data centers, 139–140 demand fluctuations in, 143–144 energy needs in, 144 facility security of, 454–455 hardware in, 126–128 influence of, 121–123 issues managing, 140–144, 159 networking, 131–139 overview, 120–124 storage in, 130–131 system software in, 128–130 Information systems planning, 390 Information systems risk assessment, 442 Information systems security, 441 access-control software in, 449–450 biometrics in, 449 cloud computing and, 150–151 controls for, 446–456 data center security for, 453 disaster planning for, 445–446 encryption in, 451–452 firewalls for, 450 human controls for, 455 incident response in, 458 MDM and, 455 monitoring, 456–459 physical access restrictions in, 447–448 strategy for, 444–446 Z06_VALA5976_08_GE_SIDX.indd 551 systems development control in, 455 threats to, 424–425, 440–442 training for, 456 two-factor authentication in, 449 VPNs in, 450 WLANs and, 450 Information technology (IT), 45 businesses alignment with, 89 consumerization of, 40, 142 ethics of unauthorized use of, 455 green, 44, 144, 305, 342, 378 investment decision making in, 382–383 Infrared line of sight, 497 Infrastructure, 120 Infrastructure activities, 305–306 Infrastructure as a Service (IaaS), 148, 159 Initial public offering (IPO), 205 In-memory computing, 269, 325 Innovations, 97 competitive advantage through, 102 difficult choices in, 101 in digital world, 38–44 disruptive, 97, 104–105 investments in radical, 97, 105–106 open, 101 organizational requirements for, 99, 102–103 process of, 103–105 riskiness of, 100–101 risk tolerance in, 103 value of, 97–99 The Innovator’s Solution (Christensen and Raynor), 104 Input technologies, 471 Insider threats, 422 Instant messaging, 224 Intangible benefits, 379 Intangible costs, 379 Integrated Automated Fingerprint Identification System (IAFIS), 414 Integrated information, 254 Integrated services digital network (ISDN), 503–504 Intel Core i7 Extreme CPU, 142 Intellectual property (IP), 64–65, 197 Intelligent agent, 280–282 Intelligent systems, 279–280 Interactive voice response (IVR), 472 Interexchange carriers, 505 Internal communications, 212 Internally focused systems, 309 International Space Station (ISS), 343 Internet, 134 anonymous behaviors on, 235 backbone, 496, 503 broad access to, 147 businesses connecting to, 505 characteristics of, 139 competitive forces influenced by, 85 connecting to, 502–505 domain names on, 135–136 as global network, 134 Heartbleed bug on, 430 management of, 501–502 marketing, 182–187 marketing performance on, 185–187 mobile device traffic on, 145 net neutrality on, 198–199 network connections in, 500–501 networking and, 131 payment models on, 185 renewable energy and, 145 roots of, 500 TCP/IP used for, 491–492 terrorism changed by, 438–439 text mining of, 276–277 Web 2.0 and, 218–219 Internet backbone, 496 Internet content providers (ICPs), 467 Internet Corporation for Assigned Names and Numbers (ICANN), 135 Internet exchange points (IXPs), 503 Internet hoax, 427 Internet hosts, 505–506 Internet of Everything (IoE), 41 Internet of Things (IoT), 40, 81, 127, 169, 256, 287 Big Data and, 257 databases and, 260–262 data expanding in, 275, 415 enterprise software and, 313 green IT and, 44 maker movement and, 372–373 physical objects networked in, 40–41 service-based model in, 95–96 servitization through, 43 supply chain indicators in, 349 wearable technology, 38 Internet over satellite (IoS), 504–505 Internet protocol (IP) addresses, 135–136 convergence, 152, 156 Internet service providers (ISP), 467 Internet Tax Freedom Act, 197 Internet troll, 235 Internetworking, 54 InterNIC, 502 Interorganizational systems, 311 Interpreters, 480 Interviews, 391 Intranet, 136–137, 139, 216–218 Inventory management systems, 78 Investments comparing competing, 381–382 for competitive advantage, 97–98 IT decision making for, 382–383 in radical innovations, 97, 105–106 IoE See Internet of Everything iOS, 128, 189, 231 IoS See Internet over satellite IoT See Internet of Things IP, 491 See also Intellectual property; Internet protocol IP address, 135 27/06/17 4:02 PM www.downloadslide.net 552  SUBJECT INDEX IP convergence, 156 IP datagram, 492 IPO See Initial public offering IPv6, 502 IS See Information systems ISAC See Information Sharing and Analysis Centers ISDN See Integrated services digital network ISS See International Space Station IVR See Interactive voice response IXPs See Internet exchange points J JAD See Joint Application Design Jailbreaking, 424, 455 Java, 483 JavaScript, 484 JD Edwards EnterpriseOne, 319 JIT See Just in time Job titles and descriptions, 49 Joint Application Design (JAD), 391 Journalism, 223 Just-in-time (JIT), 340–341 K Kbps See Kilobits per second Key generator, 433 Key-indicator reports, 264 Keyloggers, 422 Key performance indicators (KPIs), 79–80 Kickstarter, 107–108 Kilobits per second (Kbps), 133 Knowledge, 46 Knowledge assets, 282 Knowledge economy, 34 Knowledge management, 282–285 Knowledge management systems, 283–285 Knowledge portals, 284 Knowledge society, 33–34 Knowledge workers, 33–34 KPIs See Key performance indicators Kunming Train Station, 467 L LAN See Local area network Languages, 66, 479–485 HTML, 134, 347, 482 SQL, 263 XBRL, 348 XML, 347–348 Law of unintended consequences, 103 Layers, 285 LCD See Liquid crystal display Learning, organizational, 83–84 Learning management systems, 230 Leased lines, 505 Least permissions, 444 Z06_VALA5976_08_GE_SIDX.indd 552 Least privileges, 444 Legacy systems, 308 Legal issues, 196–199, 200 Licensing, of software, 405–406 Like farming, 247 Linux operating system, 128, 232, 386 Liquid crystal display (LCD), 478 Loading, 266 Loan application process, 82–83 Local area network (LAN), 133, 134, 488, 490 Location analytics, 285 Location-aware, 231 Location-based services, 187–188 Logic bombs, 426 Long tail, 174–175 Lotus Notes, 55, 214 Low-cost leadership strategy, 85 M Machine language, 480 Machine learning, 276, 277–278 Magnetic ink character recognition, 471 Maharajas, 51 Mahout, 415 Mainframes, 126 Mainstream wants, 174–175 Maintenance, 397–399 Maker movement, 372–373 Make-to-order process, 302, 321 Make-to-stock process, 302, 321 Making the business case, 374 arguments for, 376–382 objectives in, 374 productivity paradox in, 374–376 Malicious software, 52, 399, 402 Malware, 425 analog equipment not influenced by, 425, 447 attackers using, 106 car hacking using, 154 clickbait, 247 computer crime and, 425–431 mobile devices infected by, 399 phishing, 428–431 ransomware as, 426 zombie computers spreading, 426 Management See also Customer relationship management business process, 89, 314–315 change request, 398 of cloud computing, 149–151 of databases, 262, 506–511 digital rights, 197–198 enterprise marketing, 358–359 financial, 318–319 hot-button issues of, 384–385 human resource, 318 of internet, 501–502 of IS infrastructure issues, 140–144, 159 knowledge, 282–285 master data, 262 mobile device, 455 operations, 318 reputation, 178 software asset, 405 supply chain, 311, 336–338, 340–345, 364 Total Quality, 315 Management Information Systems (MIS), 53, 306 Managerial level, 79–80 Managers, 79, 388–389 Manufacturing activities, 304 Manufacturing process, 363 MapReduce, 415 Marginal costs, 92 Marketing activities, 204 affiliate, 90 e-mail, 184–185 enterprise, 358–359 internet, 182–187 Internet and performance of, 185–187 mobile, 185 search, 183 social media, 185 viral, 236, 240 Marketplace Fairness Act, 197 Marketplaces, 166–167, 191, 197, 338 Markets, 174, 339 Mashups, 219–220 Mass customization, 175–176, 200 Massively open online courses (MOOCs), 108 Mass market, 174 Master data, 262 Master data management, 262 Mbps See Megabit per second McAfee Labs, 426 MDM See Mobile device management measured service, 148 Measures, 269 metropolitan area network, 134 Media access control, 494 Media sharing, 225–226 Megabit per second (Mbps), 133 Megatrends, 35, 38–39 Megaupload.com, 418 Memory, 475 Memory, non-volatile, 475 Memory crystals, 35 Menu-driven pricing models, 176 Mesh network, 494 Metadata, 226 Metropolitan area network, 134, 488 Microblogging, 223–224, 239 Microprocessor, 473 Microsoft Access, 264, 394 Microsoft Cortana, 280 Microsoft Dynamics, 317, 320, 361 Microsoft Exchange, 55 Microsoft HoloLens, 98 Microsoft.NET, 483 Microsoft Office, 55, 124, 317, 348, 385 27/06/17 4:02 PM www.downloadslide.net SUBJECT INDEX  553  Microsoft Office 365, 229 Microsoft OneNote, 229 Microsoft Outlook, 55, 133 Microsoft SharePoint, 230, 231 Microsoft web service, 399 Microsoft Xbox, 57 Micro-task marketplaces, 191, 233 Microwave transmission, 499 Midlevel managers, 79 Mirror, 446 MIS See Management Information Systems Mobile apps, creating, 390 Mobile banking, 171, 193 Mobile business intelligence, 272 Mobile commerce (m-commerce), 169, 187–188, 200 Mobile CRM, 358 Mobile device management (MDM), 455 Mobile devices, 210 app development ethics for, 384 backdoors to, 436 businesses depending on, 97 in China, 187 click-and-mortar approach, 172–173 CRM on, 358 cybercrime on, 399, 432 data generation of, 271 EC with, 168–169 e-finance on, 170–171 ERP systems embracing, 323 geographic information and, 285 growth in, 32 information from, 188–189 internet traffic from, 145 IS infrastructure and, 127 malicious software infecting, 399 management of, 455 in networking, 131, 134 payments using, 193 product sales on, 189 QR codes, 182 security threats on, 424–425 social networking on, 233–236 supply networks on, 339–340 trends in, 39–40 video calls on, 215 webcasts on, 225 wireless media for, 497–499 Yelp on, 231 Mobile marketing, 185 Mobile operating system, 52, 128 Mobile payments, 122 Mobile technology, 90 Mobile wireless, 505 Modeling, predictive, 278–279, 359 Modeling data, 392 Models, 268 cloning business, 206 data, 262 dynamic pricing, 176 freemium, 90, 92–93 Z06_VALA5976_08_GE_SIDX.indd 553 impression based, 185 internet payment, 185 menu-driven pricing, 176 payment, 185 pay-per-click, 184, 185 platform-based business, 93–95 pricing, 176, 279, 408 revenue, 90–93 revenue and pricing, 176, 408 service, 148 service-based business, 95–96 service-oriented business, 43 technology-enabled business, 76–77 utility computing, 146 Modem (MOdulator/DEModulator), 503–504 Modules, 312 Monitoring and sensing agent, 280 Monitoring security, 456–459 Monitors, 477–478 MOOCs See Massively open online courses Moodle, 32 Moore’s law, 101, 141–142, 341, 438, 496 Motherboard, 473 Movie industry, 158 Mule herder, 431 Multichannel retailing, 173 Multi-core processor, 474 MyBoeingFleet, 338 MyDoom, 426 MySQL database, 387 N Nanoscale laser, 35 National Science Foundation (NSF) 500 National Science Foundation Network (NSFNET), 500 Nation primary key, 507 Near-field communication (NFC), 193, 199 Nest Learning Thermostat, 41 Netflix, 36 Net neutrality, 198–199 Net-present-value analysis, 380 Netscape browser, 452 Network, 133 Network adapter, 492 Network effect, 40 Networking cables, 494–497 computer, 132 evolution of, 485–487 hardware, 495 human communication in, 131–132 in information systems, 131–139 internet and, 131 mobile devices in, 131, 134 physical objects in, 40–41 servers, clients and peers in, 133–134 Network interface card (NIC), 492 Networks bus, 494 client-server, 133 computer, 133 content delivery, 152, 155 global, 489 Internet as global, 134 internet connecting independent, 500– 501 local area, 133–134 mesh, 494 neural, 278–279 P2P, 133–134 personal area, 134 ring, 493–494 social, 224, 233–234, 239–240 standards and protocols of, 490–494 star, 492–493 technology, 494–499 telecommunications, 44–45 types of, 134, 487–490 virtual private, 137, 217, 450 wide area, 134 Wi-Fi (wireless fidelity), 134, 187 wireless local area, 134, 450 Network services, 487 Network topology, 492–494 Neural networks, 278–279 Next Generation Identification (NGI), 414 NFC See Near-field communication NGI See Next Generation Identification NIC See Network interface card Niche market, 174 Nintendo Wii, 57 Non-capital expenditure, 379 Non-recurring costs, 379 Nonvolatile memory, 475 Normalization, 510–511 NoSQL, 261, 511 NoSQL databases, 261–262, 511 NSA See National Security Agency O Object-oriented language, 480–481 Observations, 391 Obsolescence, 140–143 Occupational Outlook Handbook, 47 Oculus Rift, 98 Office automation systems, 55 Off-the-shelf software, 312, 385–386 OLAP See Online analytical processing OLAP cube, 269 OLAP server, 269 OLED See Organic light-emitting diodes Omni-channel retailing, 173 Onboard systems, 154 On-demand services, 77 Online advertising, 408 Online analytical processing (OLAP), 269 27/06/17 4:02 PM www.downloadslide.net 554  SUBJECT INDEX Online banking, 171 Online brokerage, 171 Online classifieds, 190 Online community, 219 Online conversations, 360 Online predators, 432 Online privacy, 63–64 Online product reviews, 239 Online shopping, 192, 195 Online transaction processing, 264–265 Online travel, 241 Open innovation, 31, 101 Open source software, 232, 386–387 Open Systems Interconnection (OSI) model, 491 Opentable, 220 Operating systems, 128, 473 Android, 52, 128, 147, 189, 287, 386, 467 functions of, 129–130 iOS, 128, 189, 231, 484 Linux, 128, 232, 386, 484 mobile, 52, 128 OS X, 128 types of, 479 Ubuntu, 128 Windows 10, 52, 128, 142 Windows XP, 142 Operational CRM, 354–359 Operational expenditure, 379 Operational level, 78 Operational systems, 264, 265 Operation Darknet, 419 Operations and manufacturing activities, 304 Operations management, 318 Optical character recognition, 471 Optical disks, 477 Optical mark recognition, 471 Opt in, 63 Opt out, 63 OpWhales campaign, 424 Order-to-cash process, 300–301, 303, 320 Organic light-emitting diodes (OLED), 478 Organizational activities, 302–306 Organizational context, 237 Organizational learning, 83–84 Organizational level decision making, 78 Organizational strategy, 84, 86 Organizations Big Data available to, 255–256 business processes of, 327 continuous planning of, 256–258 customer-focused, 360 databases used by, 125–126 data-driven, 254–255 decision making of, 78 executive level, 80 extranets benefiting, 138–139 functional areas in, 80–81 globalization challenges to, 37, 255 information flows of, 311 innovation requirements of, 99, 102–103 Z06_VALA5976_08_GE_SIDX.indd 554 IS functions in, 82 IS strategy of, 84 IS used in, 54, 83–84 social media issues of, 236–239 social networks used by, 234 technology in, 56–57, 89 using knowledge portals, 284 value chain activities of, 88, 302–306 value chain connecting, 307 OSI See Open Systems Interconnection model Outbound logistics activities, 304 Output technologies, 477–478 Outsourcing, 36, 409 communication costs influencing, 36 companies, 36 cost savings from, 37 in systems development, 406–408 Ownership, 95 P P2P See Peer-to-peer networks Paas See Platform as a Service Package delivery system, 298 Packaged software, 312 Packet sniffers, 422 Packet switching, 490 Paid inclusion, 184 Paid search, 184 PAN See Personal area network Pandora, 32 PAPA See Privacy, accuracy, property, and accessibility Parental Intelligence System, 384 Passive tags, 128 Passwords, 448 Patch management systems, 398 Patents, 432–433 Patriot hackers, 437 Pay by fingerprint system, 199 Payment Card Industry Data Security Standard, 150 Payment models, 185 Payments digital world securing, 191–196 internet models for, 185 mobile, 122 ransom, 180 systems for, 199 using mobile devices, 193 PayPal, 399 Pay-per-click models, 184, 185 PBX See Private branch exchange PCs See Personal computers Peer, 133 Peer production, 230 Peers, 133–134 Peer-to-peer (P2P) networks, 133–134 PEP See Priority Enforcement Program Perfective maintenance, 397 Peripherals, 128 Personal area network (PAN), 134, 489 Personal computers (PCs), 127 Personalization, of websites, 60 Personalized communications, 363 Personnel, qualified, 51 Pharmaceutical industry, 219 Phishing, 428–431 PHP, 484 Physical access restrictions, 447–448 Physical objects, IoT networking, 40–41 Physician’s Desk Reference, 288 PIN numbers, 448 Piracy, 167, 418 Pivotal Cloud Foundry, 163 Plain old telephone service (POTS), 503 Planned obsolescence, 142 Platform, 93 Platform as a Service (PaaS), 148–149, 159 Platform-based business models, 93–95 Playstation, 57, 58 PLCs See Programmable logic controllers Podcast, 225 Point-of-sale inventory system, 199 Policies, 199, 445 Porn bot, 261 Port, 477 Portals, 337 customer, 338–339 employee, 137, 216–218 HP Supplier, 338 knowledge, 284 supplier, 338 in supply chain management, 337–338 POTS See Plain old telephone service Power supply, 477 Predictive modeling, 278–279, 359 Preventive controls, 444 Preventive maintenance, 397 Price-matching policy, 199 Pricing models, 176, 279, 408 Primary key, 507 Primary storage, 475 Printers, 477 Priority Enforcement Program (PEP), 414 Privacy cloud computing and, 150–151 of consumers, 63–64 databases and, 61–62 e-mail, 62–63 information, 60–64 in Information Age, 60 online, 63–64 security debate versus, 436 tracking devices and, 310 Privacy, accuracy, property, and accessibility (PAPA), 60 Private branch exchange (PBX), 488 Private cloud, 149 Problem decomposition, 388 Processing logic, 392–393 Processing technologies, 473 Procurement activities, 306 Procure-to-pay process, 301, 320–321 Product flow, 346–347 27/06/17 4:02 PM www.downloadslide.net SUBJECT INDEX  555  Production scheduling, 346 Productivity loss, 374–375 Productivity paradox, 374, 375, 376 Product recalls, 341–342 Products delivery and return of, 179 digital, 169 mobile devices sales of, 189 websites offering, 177–178 Programmable logic controllers (PLCs), 127 Programmers, 260, 395–396, 401, 430, 458, 479–480 Programming languages, 479–485 Project manager, 388–389 Project Natick, 378 Propagation delay, 499 Proprietary software systems, 308 Propulsion systems, 87 Protocols, 132, 490–491 Prototyping, 400 Proxy variables, 383–384 Pseudocode, 392 PSTN See Public switched telephone network Public cloud, 149 Public key encryption, 452 Public switched telephone network (PSTN), 503 Pulling sequence, 302 Pushing sequence, 302 Q QR codes, 182, 189 Quadcopters, 252 Quantified self, 38 Query, 263 Questionnaires, 391 R RAD See Rapid Application Development Radical innovations, 97, 105–106 Radio frequency identification (RFID), 127 199, 310 overview of, 127–128 tags, 128 Radio stations, 408 RAID See Redundant array of independent disks Random-access memory (RAM), 475 Range International Information Hub, 378 Ransom payments, 180 Ransomware, 52, 402, 426 Rapid Application Development (RAD), 401 Raspberry Pi, 372 RDBMSs See Relational database management systems Read-only memory (ROM), 475 Read/write heads, 476 Z06_VALA5976_08_GE_SIDX.indd 555 Record, 259 Recovery point objectives, 446 Recovery time objectives, 446 Recurring costs, 379 Redistribution, 376 Redundant array of independent disks (RAID), 476 Registers, 475 Regulatory demands, 317 Reintermediation, 174 Relational database design, 506–509 Relational database management systems (RDBMSs), 260, 263 Relational database model, 509–510 Relationships, 507–508 Reliability, 150 Removable storage media, 476–477 Renewable energy, 87, 137, 145, 216 Report generators, 263 Reports, 263–264 Representational delight, 180–182 Reputation management, 178 Request for proposal (RFP), 403–404 Requirements collection, 391 Research and development, 30–31 Resources, 86, 147–148 Resource scarcity, 38 Responsible computer use, 65–66 Retailing, 199 Revenue and pricing models, 176, 408 Revenue models, 90–93 Reverse engineering, 433 Reverse logistics, 346, 347 RFID tag, 128 RFP See Request for proposal Ride-sharing platforms, 190 Ring network, 493–494 Riot Games, 139 Risk B2C transaction, 194–196 innovation and tolerance of, 103 of innovations, 100–101 IS and assessment of, 442–444 Risk acceptance, 443 Risk avoidance, 443 Risk reduction, 443 Risk transference, 443 Robotics, 43 Roll up, 269 ROM See Read-only memory Router, 491, 500 RSS (Real Simple Syndication), 225 S S3 See Simple Storage Service SaaS See Software as a Service Safety stock planning, 346 Sakai, 32 Sales activities, 304 Sales beacons, 173 Sales force automation (SFA), 355–356 Samsung Galaxy, 155, 187 Samsung Galaxy Gear, 38 Sarbanes-Oxley Act, 130, 150, 239, 317, 457–458 Satellite transmission, 499–500, 504–505 Scalability, 149–150, 261 Scammers, 247 Scanners, 422, 472 Scheduled reports, 264 Schengen Agreement, 368 SCM See Supply chain management Scripting languages, 483 SDLC See Systems development life cycle SDSL See Symmetric digital subscriber line Search advertising, 184 Search engine optimization (SEO), 183–184 Search engines, 120–121, 234–235 Search marketing, 183 Secondary keys, 507 Secondary storage, 475–476 Secure Sockets Layer (SSL), 452 Secure tunnel, 450 Security cloud, 452 cloud computing with privacy and, 150–151 data center, 453 e-government, 466 facility, 454–455 IS and analog, 425, 447 mobile devices threats of, 424–425 monitoring, 456–459 privacy debate versus, 436 social media, 239 Security policy, 445 Security strategy, 444–446 Security threats, 402 Self-driving cars, 277 Semantic web, 221–222 Semistructured data, 256 Semistructured decisions, 79 Sensitivity analysis, 268 Sensors, 40 Sentiment analysis, 276 SEO See Search engine optimization Sequence discovery, 274 Serverless computing, 149 Servers, 126, 133–134 Service, 152 Service-based business models, 95–96 Service industries, 306 Service-level agreements (SLAs), 151 Service models, 148 Service-oriented architecture (SOA), 152–153 Service-oriented business models, 43 SFA See Sales force automation Sharing economy, 43, 94–95, 96 Shifts in economic power, 37 Shopping bot, 280 Shopping, tax-free, 197 Shoulder surfing, 422 27/06/17 4:02 PM www.downloadslide.net 556  SUBJECT INDEX Showrooming, 189, 199 Shrink-wrap licenses, 405 Simple Storage Service (S3), 146, 163 Sina Weibo, 467 Skype, 36, 399 SLAs See Service-level agreements Slicing and dicing, 269 Smart cards, 472 Smart home technology, 41 Smartphones See Mobile devices Smart technology, 103 Smartwatches, 38 SnapChat, 224 SOA See Service-oriented architecture Social bookmarking, 227 Social cataloging, 227 Social commerce, 176–177 Social CRM, 360 Social engineering, 422 Social intelligence, 294–295 Social intranets, 218 Social media, 40, 176, 186, 233, 384 algorithms prioritization on, 246–247 Big Data generated by, 220 bookmarking on, 227 cataloging on, 227 collaboration enhanced on, 229–230, 242 communications enhanced using, 222–224, 242 connections enhanced by, 233–236, 242 cooperation enhanced by, 225–228, 242 critical mass on, 237–238 dangers of, 239–241 generation gap on, 238 geotagging on, 226–227 impact of, 240–241 influencers on, 361 information from, 294 marketing, 185 media sharing on, 225–226 organizational issues, 236–239 security, 239 tagging on, 226 terrorism battle on, 228 web 2.0 and, 220, 242 workspace using, 221 Social Media Listening Command Center, 361 Social media monitoring, 360–361 Social network analysis, 283–284 Social networking, 224, 233–234, 239–240 Social online communities, 233 Social search, 234, 235, 236 Social Security number, 422, 431 Social Software, 220 Societal issues, in digital world, 35–38 Society for Worldwide Interbank Financial Telecommunication (SWIFT), 106 Z06_VALA5976_08_GE_SIDX.indd 556 Software, 44, 47, 159, 478 access-control, 449–450 application, 124, 152–157, 257–258, 308, 352, 384 best practices, 313–314 commercial, 318 commercial off-the-shelf, 386, 387 conversion strategies for, 396–397 corrections industry error of, 325 custom, 312, 385–386 custom compared to off-the-shelf, 385–386 customization of, 312–313 customized or vanilla version of, 312– 313 enterprise, 313 hardware cycle with, 142 licensing of, 405–406 malicious, 52, 399, 402 obsolescence of, 142–143 off-the-shelf, 312, 385–386 open source, 232, 386–387 packaged, 312 programming and testing, 395–396 proprietary systems of, 308 system, 128–130, 479 in systems development process, 385– 387 text recognition, 471 third-party, 455 upgrading, 318 voice-to-text, 472 Software as a Service (SaaS), 149 Software asset management, 405 Software bug, 389 Software piracy, 432–434 Solar energy, 121 Solid-state drive (SSD), 476 SoLoMo, 231 Source code, 480 Sourcing plan, 346 Space Exploration Technologies Corporation (SpaceX), 343 Spam, 427–429 Spam filters, 427 Spear phishing, 428–429 Speech recognition, 472 Spiral development approach, 400 Sponsored search, 184 Spotify, 32 Sprints, 400 Spyware, 426–427 SQL See Structured Query Language Square Reader, 107, 191–192 SSD See Solid-state drive SSL See Secure Sockets Layer Standalone applications, 308 Star network, 492–493 Startups, 106–107 Stickiness, 277 Storage, 35, 130–131, 143, 146, 163 types of, 474–477 Strategic, 58 Strategic necessity, 89, 376 Strategic planning, 84 Streaming audio, 473 Streaming media, 473 Streaming video, 114, 473 Structural firmness, 180 Structured data, 256 Structured decisions, 78 Structured Query Language (SQL), 263 Stuxnet, 437 Subscription-based services, 76–77 Supercomputers, 126, 153 Supplier portals, 338 Supply chain, 303, 336, 344, 430–431 augmented reality and, 350 defining, 336 global, 368 green, 345 IoT indicators of, 349 terrorism influencing, 368 Supply chain analytics, 349 Supply chain effectiveness, 344 Supply chain efficiency, 344 Supply chain execution, 346–349 Supply chain management (SCM) system, 311, 336, 342 B2B processes improved by, 364 benefits of, 340–342 developing strategies in, 344–345 optimizing, 342–344 portals in, 337–338 Supply chain planning, 345–346 Supply chain visibility, 349 Supply network, 336–339 managing, 339–340 on mobile devices, 339–340 optimizing, 343 Support activities, 303, 305 Surface web, 136, 164 Surge pricing mechanism, 279 Sustainable business practices, 342 Sustainable development, 38 SWIFT See Society for Worldwide Interbank Financial Telecommunication Switch, 495 Symmetric digital subscriber line (SDSL), 504 Symmetric encryption, 452 Synchronous, 212 Synchronous communications, 213 System clock, 474 System conversion, 396 Systems analysis, 388, 391 Systems analysis and design, 385 Systems analyst, 385 Systems benchmarking, 404 Systems competency, 50–51 Systems design, 394–395 Systems development controls, 389, 455 Systems development life cycle (SDLC), 389, 409 27/06/17 4:02 PM www.downloadslide.net SUBJECT INDEX  557  Systems development process, 385–387 outsourcing in, 406–408 project managers in, 388–389 steps in, 389–397 users in, 389 Systems implementation, 395–397 Systems integration, 54–55, 387 Systems maintenance, 397–399 System software, 128–130, 479 Systems planning and selection, 390–391 T T1 lines, 505 T3 lines, 505 Tables, 259, 508–509 Tablets, 187 Tacit knowledge assets, 282 Tag, 226 Tag cloud, 226 Tangible benefits, 379 Tangible costs, 379 Taobao Marketplace, 166–167 Tapes, 477 Taxation, 196–197 Tax-free shopping, 197 TB See Terabytes TCO See Total cost of ownership TCP, 492 See Transmission Control Protocol/Internet Protocol Technical competency, 50 Technological integration, 238–239 Technology, 87 See also Information technology algorithms prioritization and, 246–247 businesses changing through, 51 competitive advantage and investments in, 97–98 digital world changes in, 32–35, 65 drone, 252–253, 298, 369 enabling, 105 environmental and social costs of, 59 environmental impact of, 44 input, 471 memory crystals, 35 mobile, 90 networks, 494–499 new, 100 in organizations, 56–57, 89 output, 477–478 processing, 473 RFID, 127–128, 199, 310 smart, 103 smart home, 41 streaming video, 114 3D, 459 virtual hold, 357 wearable, 38 Technology development activities, 306 Technology-enabled business models, 76–77 Telecommunication lines, 506 Telecommunications, 155–156 Z06_VALA5976_08_GE_SIDX.indd 557 Telecommunications networks, 44–45 Telegram, 224 Television stations, 408 Ten Types of Innovation (Keeley), 97 Terabytes (TB), 476 Terminals, 486 Terrorism, 228, 368, 438–439 Text mining, 276–277 Text recognition software, 471 Thin clients, 133 Third-party software, 455 Threats, 442 3D printing, 65, 363, 373 3D technology, 459 Time bomb, 426 Time lags, 376 Token passing, 494 Top-level domain, 135 Tor (The Onion Router), 164 Total cost of ownership (TCO), 379 Total Quality Management, 315 Touchpoints, IS, 173 Touch screen, 478 TPS See Transaction processing systems Tracking devices, 310 Trademarks, 197 Training employee, 354 of enterprise systems, 324 for information system security, 456 of users, 396–397 Transaction patterns, 196 Transaction processing systems (TPS), 53 Transactions, 78 Transformation, 266 Transmission Control Protocol/Internet Protocol (TCP/IP), 136, 491–492 Transmission media, 132 Transportation planning, 346 Travel, online, 241 Treasury and Markets (T&M) business, 163 Trending, 224 Trojan horses, 425–426 Trolling, 235 Trust, 179 Tumblr, 224 Tunneling, 450 Twisted-pair cable, 494–495 Twitter, 223–224 Twitterbots, 261 Two-factor authentication, 449, 466 U UAVs See Unmanned aerial vehicles Ubuntu Linux, 128 Unauthorized access, 422–423 Unauthorized data modification, 423 Underwater data center, 378 Unicode, 474 Uniform Resource Locator (URL), 135 Unmanned aerial vehicles (UAVs), 369 Unstructured data, 256, 276 Unstructured decisions, 80 Upstream information flow, 307, 311 Urbanization, 37 URL See Uniform Resource Locator Usability, 395 User agents, 280 User-generated content, 218 User policy, 445 Users, IS, 51–53 User training, 396–397 Use tax, 197 Utilities, 479 Utility computing, 146 Utility programs, 479, 480 V Value-added networks (VANs), 488 Value chain, 88 core activities in, 303–304 multiple organizations connected in, 307 organizational activities along, 88, 302–306 in service industries, 306 Value chain analysis, 88 Value creation, 86 Value proposition, 89 Value system, 307 Vanilla version, 312–313 VANs See Value-added networks Vendor-managed inventory (VMI), 341 Vendor selection, 405 Vertical markets, 339 Viber, 224 Video, 472 Videoconferencing, 215–216 Videoconferencing over IP, 156–157 Video data, 473 Vine, 224 Viral marketing, 236, 240 Viral meeting, 212 Virtual companies, 172 Virtual hold technology, 357 Virtualization, 133, 157 Virtual meetings, 213 Virtual private networks (VPNs), 137, 217, 450 Virtual reality (VR) headsets, 97, 98, 326 Virtual teams, 212–213 Virus, 425 Virus prevention, 453 Visual analytics, 271–272 Visual Basic.NET, 482 Visual data discovery, 272 Visualization, 270–272, 289 Visual programming languages, 480, 481, 482 VMI See Vendor-managed inventory Voice over IP (VoIP), 156 Voice recognition, 172 Voice-to-text software, 472 VoIP See Voice over IP Volatile memory, 475 27/06/17 4:02 PM www.downloadslide.net 558  SUBJECT INDEX Volume license, 405 VPNs See Virtual private networks VR See Virtual reality headsets Vulnerability, 442 Vulnerability scanners, 422 W WAN See Wide area network Warez, 433 Watermark, 198 Wearable technology, 38 Web 2.0, 218–219 capabilities of, 219–220 social media and, 220, 242 Web 3.0, 222 Web analytics, 187, 205 Web-based collaboration, 230 Web browsers, 134 Webcam, 215 Webcasts, 225 Web content mining, 276–277 Web crawler, 276, 280 Web development languages, 480 WebMD, 288 Web page builders, 482 Web pages, 134 Websites, 53, 134, 219 consumer needs met by, 180–182 databases used by interactive, 258–259 EC on, 181–182 Z06_VALA5976_08_GE_SIDX.indd 558 monitoring of, 64 personalization of, 60 products offered by, 177–178 representational delight of, 180–182 SEO of, 183–184 Web server, 134 Web spiders, 280 Web usage mining, 277 Web vandalism, 437 WeChat, 192, 224 Weighted multicriteria analysis, 381 What-if analysis, 268 WhatsApp, 36, 40, 224, 399, 451 White-collar productivity, 374 Wide area network (WAN), 488 Wide area networks, 134 Wi-Fi hotspots, 154, 273, 455 Wi-Fi networks, 187 Wi-Fi (wireless fidelity) networks, 134 Wiki, 232 WikiLeaks, 419, 423 Wikipedia, 220 Windows 10, 52, 128, 142 Windows Azure, 148–149 Windows XP, 142 Wireless access point, 495 Wireless broadband, 505 Wireless controller, 495 Wireless LAN control, 450 Wireless local area networks (WLANs), 134, 450, 498 Wireless media, 497–499, 500 WLANs See Wireless local area networks Workspace, 221 Workstations, 127 World Wide Web (WWW), 134–135, 136 Worm, 425 Wunderlist, 229 WWW See World Wide Web X XaaS, 95 XBRL See Extensible Business Reporting Language XML See Extensible Markup Language XML tag, 347 XP See eXtreme Programming Y Yammer, 234 Yelp, 231 Z Zero-day, 423 Zettabytes, 42 Zombie computers, 426–427, 430 Zotero, 227–228 Zuse Z1 Computer, 141 27/06/17 4:02 PM www.downloadslide.net MIS: Engage, Apply, Empower COMMUNICATION DECISION MAKING TEAMWORK ABILITY TO APPLY KNOWLEDGE NEWE HIR CRITICAL THINKING PROBLEM SOLVING • Writing Space—Better writers make better communicators— who become better managers Designed to help develop and assess concept mastery and critical thinking, the Writing Space offers assisted auto-graded writing assignments so students can receive meaningful, personalized feedback quickly and easily And because of Intergration with Turnitin , Writing Space can check students’ work for improper citation or plagiarism ® Valacich_08_1292215976_ifc_ibc_Final.indd Information systems have become pervasive Mobile devices, social media, and cloud computing have transformed organizations and society The Internet of Things can generate a wealth of potentially useful Big Data The rapid development of transportation and telecommunication technologies, national and global infrastructures, and information systems as well as a host of other factors has created a number of pressing societal issues that tremendously influence the world we live in These issues include demographic changes, urbanization, shifts in economic power, resource scarcity, and climate change As a consequence, sustainable development will become an ever increasingly important aspect for organizations Throughout this revision, we discuss how organizations can harness radical innovations and other technological developments, as well as the role of information systems in influencing and addressing pressing societal issues; further, we added a new chapter element about the role of Green IT We designed the book’s cover to emphasize how IT resides within and influences various societal issues 13/06/17 1:06 PM www.downloadslide.net GLOBAL EDITION Information Systems Today Managing in the Digital World For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students with the best possible learning tools This Global Edition preserves the cutting-edge approach and pedagogy of the original, but also features alterations, customization, and adaptation from the North American version GLOBAL EDITION EIGHTH EDITION Valacich Schneider Managing in the Digital World    E IGHTH EDITION Joseph Valacich • Christoph Schneider G LO B A L EDITION This is a special edition of an established title widely used by colleges and universities throughout the world Pearson published this exclusive edition for the benefit of students outside the United States and Canada If you purchased this book within the United States or Canada, you should be aware that it has been imported without the approval of the Publisher or Author Information Systems Today Pearson Global Edition Valacich_08_1292215976_Final.indd 08/06/17 3:00 PM ... Chapter Managing in the Digital World 30 MANAGING IN THE DIGITAL WORLD: Open Innovation  30 Information Systems Today 32 The Emergence of the Digital World 32 Globalization and Societal Issues in. .. by creating new and innovative business models Chapter 3: Managing the Information Systems Infrastructure and Services—With the ever-increasing complexity of maintaining a solid information systems. .. by the “IS 2010 Curriculum Guidelines for Undergraduate Degree Programs in Information Systems 1; these guidelines, written by prominent information systems scholars, define the information systems

Ngày đăng: 16/08/2018, 16:54

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan