Business driven information systems 6th by baltzan

955 14 0
Business driven information systems 6th by baltzan

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

page i page ii BUSINESS DRIVEN INFORMATION SYSTEMS, SIXTH EDITION Published by McGraw-Hill Education, Penn Plaza, New York, NY 10121 Copyright © 2019 by McGraw-Hill Education All rights reserved Printed in the United States of America Previous editions © 2016, 2014, and 2012 No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of McGraw-Hill Education, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning Some ancillaries, including electronic and print components, may not be available to customers outside the United States This book is printed on acid-free paper LMN 21 20 19 18 ISBN 978-1-260-00471-7 MHID 1-260-00471-6 Portfolio Manager: Brian Sylvester Product Developers: Kelly Delso, David Ploskonka Content Project Managers: Melissa M Leick, Bruce Gin, Karen Jozefowicz Buyer: Laura Fuller Design: Egzon Shaqiri Content Licensing Specialist: Ann Marie Jannette Cover Image: © fuyu Liu/Shutterstock Compositor: SPi Global Printer: LSC Communications All credits appearing on page or at the end of the book are considered to be an extension of the copyright page Library of Congress Cataloging-in-Publication Data Names: Baltzan, Paige, author Title: Business driven information systems / Paige Baltzan Description: Sixth edition | New York, NY : McGraw-Hill Education, [2019] Identifiers: LCCN 2017047684 | ISBN 9781260004717 (alk paper) Subjects: LCSH: Information technology‒Management | Industrial management‒Data processing Classification: LCC HD30.2 B357 2019 | DDC 658.4/03801–dc23 LC record available at https://lccn.loc.gov/2017047684 The Internet addresses listed in the text were accurate at the time of publication The inclusion of a website does not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education does not guarantee the accuracy of the information presented at these sites mheducation.com/highered www.ebookslides.com page iii www.ebookslides.com DEDICATION To Tony, Hannah, Sophie, and Gus: What you always remember? That I Love You! That I’m Proud of You! Paige www.ebookslides.com page iv www.ebookslides.com page v www.ebookslides.com BRIEF CONTENTS MODULE Business Driven MIS Chapter Management Information Systems: Business Driven MIS Chapter Decisions and Processes: Value Driven Business Chapter Ebusiness: Electronic Business Value Chapter Ethics and Information Security: MIS Business Concerns MODULE Technical Foundations of MIS Chapter Infrastructures: Sustainable Technologies Chapter Data: Business Intelligence Chapter Networks: Mobile Business MODULE Enterprise MIS Chapter Enterprise Applications: Business Communications Chapter Systems Development and Project Management: Corporate Responsibility APPENDICES Appendix A Hardware and Software Basics Appendix B Networks and Telecommunications Appendix C Designing Databases Appendix D Emerging Trends and Technologies Apply Your Knowledge Glossary Notes Index www.ebookslides.com www.ebookslides.com page vi 10 www.ebookslides.com Outlier, 259 Output devices, A.8–A.9 Outsourcing, 37, 403–405 P PaaS (Platform as a Service), 212 PacifiCorp, 219 Packet, 286 Packet footers, 286 Packet headers, 286 Packet-switching, B.4 Packet tampering, 158 Page, Larry, 380 Palmer, Shelly, 48 Pandora, 312 PANs (personal area networks), 296 Paradigm shift, 103 Partner relationship management (PRM), 347, 348 Passive RFID tags, 304 Passwords, 161–162, 170 Payless, 28 PayPal, 137 Pay-per-call, 112 Pay-per-click, 112 Pay-per-conversion, 112 Payroll process, 78 PB (Petabyte), A.6 PDA (Personal digital assistant), A.11 Peer-to-peer (P2P) networks, 289, B.3 Pentagon, 168 Perform, 346 Performance, 193 Personal area networks (PANs), 296 Personal computers, A.11 Personal digital assistant (PDA), A.11 Personal information management (PIM) software, A.13 Personalization, 105, 346 PERT (Program Evaluation and Review Technique) chart, 401 Petabyte (PB), A.6 Petraeus, David, 45 P&G (Procter & Gamble), 102, 325–326 Pharming, 160 Pharming attacks, 161 Philippines, 404 Phishing, 160 941 www.ebookslides.com Phishing expedition, 160 Physical security, 152 Physical view of information, 237 Pie chart, 62, 65 PIM (Personal information management) software, A.13 Pirated software, 143 Pivot, 65 PKE (Public key encryption), 163 Plagiarism, 125–126 Planning phase (SDLC), 379 Platform as a Service (PaaS), 212 PMI (Project Management Institute), 380 P&O, 368 Podcasting, 114 Point-of-sale (POS), A.7 Polaroid, 101 Polymorphic viruses and worms, 157 Popbox, 313 Pop-up ads, 108 Portability, 192 Portals, 111 Porter, Michael, 29, 38, 44 Porter’s Five Forces Model, 33, 40 in airline industry, 26–27 buyer power in, 23–24 rivalry among existing competitors in, 25–26 supplier power in, 24–25 and supply chain management, 326–327 threat of new entrants in, 25 threat of substitute products/services in, 25 in value chain analysis, 30, 32, 33 Porter’s three generic strategies, 27, 28, 33, 41 Portland, 340 POS (Point-of-sale), A.7 Powergrid Fitness, A.7 P2P (peer-to-peer) networks, 289, B.3 Predictive analytics, 11 Premier One, 372 Prescriptive analytics, 11 Presentation graphics software, A.13 Preventive maintenance, 388 Priceline.com, 110 Primary key, 234–235, C.7–C.8 Primary value activities, 29 Privacy, 143 Private cloud, 209 942 www.ebookslides.com PRM (Partner relationship management), 347, 348 Process modeling, 382 Procter & Gamble (P&G), 102, 325–326 Procurement, 29 Product differentiation, 26 Production, 16 Production and materials management ERP components, 355 Productivity, 16 Program Evaluation and Review Technique (PERT) chart, 401 Programming software, A.13 Progressive insurance, 82 Project, 53, 380 Project management, 380, 394–406 Project Management Institute (PMI), 380 Project manager, 381 Project plan, 381 Project planning, 399–402 Project planning diagrams, 399–402 Project scope, 381 Project stakeholders, 399 Protocols, 286, B.6 Prototypes, 389 Prototyping, 389 Proxy, 286 Public cloud, 209 Public key encryption (PKE), 163 Pure-play businesses, 110 Q QBE (Query-by-example) tool, 233 Query-by-example (QBE) tool, 233 R Rackspace, 347 Radio-frequency identification (RFID), 303, 333 RAD (Rapid application development) methodology, 390 RAM (Random access memory), A.4 Random access memory (RAM), A.4 Rapid application development (RAD) methodology, 390 Rapid prototyping, 389 Rational unified process (RUP) methodology, 391 Read-only memory (ROM), A.5 Real People magazine, 231 Real Simple Syndication (RSS), 123 943 www.ebookslides.com Real-time adaptive security, D.6 Real-time communication, 114 Real-time information, 229 Real-time systems, 229 Recording Industry Association of America, 173 Records, 234, C.7 Recovery, 185 backup and recovery plan, 219 disaster recovery plan, 219 Redbox, 38 Reduced instruction set computer (RISC) chips, A.3 Redundancy, 79 Reengineering, 80–85, 87, 94 Regional service providers (RSPs), 282 Reidenberg, Joe, 144 Reintermediation, 107 Relational database management systems, 234 Relational database model, 234, C.1–C.3, C.7–C.9 Relational databases, 271 Relational integrity constraints, 238 Reliability, 192 Report, Reputation system, 118 Requirements definition document, 381 Requirements management, 381 Resource sharing, 291 Response time, 56 Retail, 35 Return on investment (ROI), 54 Revamping accounts, 92 RFID (Radio-frequency identification), 303, 333 RFID accelerometer, 304 RFID EPC (RFID’s electronic product code), 333 RFID reader/RFID interrogator, 303 page I.9 RFID’s Electronic product code (RFID EPC), 333 RFID tags, 303–304 RIM, 300 Ring topology, B.5 RISC (Reduced instruction set computer) chips, A.3 Rivalry among existing competitors, 25–26 Robotic process automation (RPA), 79 Robotics, 335 Robots, 48–49, 96, 335 944 www.ebookslides.com Roku, 313 ROM (Read-only memory), A.5 Rosen, Dr., 93 Routers, B.4 Rovi, 313 Rowdii, 104 RSPs (Regional service providers), 282 RSS (Real Simple Syndication), 123 Rubber sheeting, 305 RUP (Rational unified process) methodology, 391 Russia, 168, 174, 404 Ruth, Babe, 369 S SaaS (Software as a Service), 211–212 SABRE Airline Solutions, B.2 Safe mode, A.13 Safeway, 25 Sales, 13–15, 29, 71 Sales force automation (SFA), 344 Salesforce.com, 211 Sales management CRM systems, 345 Samsung, 298, 314 SAP, 110 Satellite access, A.9 Satellite communication systems, 298, 300, B.10 Satellites, 300, 304 Satyam, 404 Scalability, 193 SCEM (Supply chain event management), 336 Schick, David, 35 Schmidt, Eric, 137 Schwartz, Jonathan, 123 SCM; see Supply chain management Scripting language, 385 Script kiddies (Script bunnies), 156 Scrubbing, information, 244–248 Scrum methodology, 391 SDLC (Systems development life cycle), 379 Search engine optimization (SEO), 112 Search engine ranking, 112 Search engines, 112 Sears, 101 Secondary storage, A.5 Secure hypertext transfer protocol (SHTPP, HTTPS), 293 945 www.ebookslides.com Secure sockets layer (SSL), 293 Security; see Information security Seigenthaler, John, Sr., 125 Selling chain management, 336 Semantic web, 126 Semi-passive RFID tags, 304 Semistructured decisions, 53 Sensitive data, 26 Sensitivity analysis, 61 SEO (Search engine optimization), 112 Servers, 183, A.12, B.4 Server virtualization, 202 Serviceabilty, 194 Service-oriented architecture (SOA), 391–394 interoperability, 393 loose coupling, 394 SOA service, 393 web service, 394 XML, 394 Service providers, 114, 282 Services, 14, 15, 29 SFA (Sales force automation), 344 SharePoint, 401 Shopping bot, 69 Shrek films, 198 SHTPP (Secure hypertext transfer protocol), 293 Sign-off, 381 Simple Mail Transfer Protocol (SMTP), B.8 Simple Network Management Protocol (SNMP), B.8 Single-factor authentication, 162 Single tenancy, 206 Single user license, A.12 Single-valued attribute, C.2 Site license, A.14 Skype, 289, 297 Slack, 131–132 Slate, 249 Slice-and-dice, 65 Smart cards, 162 Smart grids, 200–201 Smart machines, D.6 Smartphones, 300, A.11 SMTP (Simple Mail Transfer Protocol), B.8 SNA (Social networking analysis), 120 Snapshot, Sneakware, 152 946 www.ebookslides.com Sniffer, 158 SNMP (Simple Network Management Protocol), B.8 SOA (Service-oriented architecture), 391–394 Socializr, 104 Social media, 120 Social media manager, 151 Social media monitoring, 151 Social media policy, 151 Social networking; see also specific networking sites safety tips for using, 144–148 Social networking analysis (SNA), 120 Social networks, 120, 169–171, 174 Social tagging, 121 Soden, Michael, 151 Software, 183, A.12–A.14 application, A.13 developing, 379–402 pirated, 143 system, A.12–A.13 Software as a Service (SaaS), 211–212 Software customization, 356, 357, 379 Software engineering, 385 Software patches, A.13 Software updates, A.13 Software upgrades, A.13 Solving the Ewaste Problem (StEP), 207 Sony, 101, 136, 313, 314 Source code, 118 Source documents, 59 South Africa, 404 Soviet Union, 37 Spam, 150 Spam blogs, 158 Sparkline, 63 Spatial data, 305 Spear phishing, 160 Speech analytics, 260 Splogs (Spam blogs), 158 Spoofing, 158 Spreadsheet software, A.13 Sprint, 282, 298 Spyware, 158 SQL (Structured query language), 233 Square, 311 SRM (Supplier relationship management), 347, 348 SSL (Secure sockets layer), 293 947 www.ebookslides.com SSL Certificate, 293 Stakeholder, 20 Stamps.com, 43 Standard packet formats, 286 Staples, 96, 222, 336 Starbucks, 44, 123 Star topology, B.5 Start-ups College Hunks Hauling Junk, 95 Start-ups: Rackspace, 346 Ruby receptionists, 340 TED, 381 viruses, 218 WePay, 138 Static information, 239 Static process, 72 Static report, Stealthware, 152 StEP (Solving the Ewaste Problem), 207 Storage: primary, A.3 secondary, A.5 Storage virtualization, 201 Strategic business processes, 80–85 Strategic decisions, 53, 86 Strategic level, 53 Strategic support systems, 61–64, 87 Streaming, 300 Streamlining, 79–80, 87 Structured data, 6, 247 Structured decisions, 51, 86 Structured query language (SQL), 233 page I.10 Study Trends, D.2 StumbleUpon, 121 Stylus, A.7 Supercomputers, A.10 Supplier power, 24–25 Supplier relationship management (SRM), 347, 348 Supply chain, 24, 325–329 Supply chain event management (SCEM), 336 Supply chain execution systems, 328 Supply chain management (SCM), 325–329 948 www.ebookslides.com ERP components for, 354–355 Supply chain planning systems, 328 Supply chain technologies, 329–336 logistics, 329–330 materials management, 331 procurement, 329 Supply chain visibility, 328 Support value activities, 29 Surge pricing, 280 Sustainable MIS, 194 Sustainable MIS disposal, 195 Sustainable MIS infrastructure, 196–210 cloud computing, 204–208 grid computing, 197–201 virtualized computing, 201–204 Sustaining technologies, 128 Sweitzer, Heather, 44 Swim lane, 75 Switching costs, 24 SWOT analysis, 22–23, 33 Synchronous communications, 120 Syntax, A.12, A.13 System, 14 System availability, 56 System clock, A.12 System restore, A.13 Systems; see also specific systems Systems development life cycle (SDLC), 379 System software, A.12 Systems thinking, 16–17 System thinking, 81 T T1 lines, 285, 308 Tableau, 235 Tables, C.7–C.9 Tablet computers, A.11 Tacit knowledge, 119 Tags, 121 Tangible benefits, 395 Taxonomies, 115 Tax policies, 116 TB (Terabyte), A.5 TCP (Transmission control protocol), B.7–B.8 TCP/IP; see Transmission control protocol/Internet protocol 949 www.ebookslides.com Technological innovation, D.4–D.5 Technology, 45 Technology: dependence on, 125 for information security, 154–165 Technology development, 29 Technology, Entertainment, Design (TED), 45, 380 Technology failures, 189 Technology recovery strategies, 189 TED (Technology, Entertainment, Design), 45, 380 Telecommunication protocols, B.7–B.8 Telecommunication systems, B.1 media for, B.9–B.10 protocols for, B.6–B.8 Telecommuting, 285 Telepresence robot, 66 Telnet Protocol, B.8 Telstar, 295 Terabyte (TB), A.5 Terminator movie, 48 Test conditions, 385 Testing phase (SDLC), 385 Texting, 45 Text mining, 260 The Gap, 96 The World Is Flat (Friedman), 37–38, 44 Third-generation (3G), 300 Thompson, Trina, 96 Threat of new entrants, 25 Threat of substitute products/services, 25 Throughput, 56 Tiffany & Co., 28 Tiffany-style, 36 Timeliness of information, 271 Time-series chart, 63, 65 Time-series information, 258 T.J Maxx, 110 T-Mobile, 136, 315 To-Be process models, 73, 74, 87 Tokens, 162 Torvalds Linus, A.12 Toshiba, 314 Touch pad, A.7 Touch screen, A.7 Toys “R” Us, 369 TPS (Transaction processing system), 59, 60 950 www.ebookslides.com Traceroute, 286 Trackur.com, 151 Transactional information, 59, 227 Transaction brokers, 111 Transaction processing system (TPS), 59, 60 Transaction speed, 56 Transmission control protocol (TCP), B.7–B.8 Transmission control protocol/Internet protocol (TCP/IP), 286, B.7 Trek, 310 Trend analysis, D.1 Trend monitoring, D.1 Trend projection, D.1 Triple constraint, 398–399 Trojan-horse virus, 157 Trust, consumer, 116 Twisted-pair cable, B.8 Twitter, 102, 123, 131–133, 150, 151, 247, 273, 307 Two-factor authentication, 162 U UAE (United Arab Emirates), 368–369 UC (Unified communications), 288 Unavailable systems, 191 Unified communications (UC), 288 Uninstaller software, A.13 Union Bank of California, 187 United Arab Emirates (UAE), 368–369 United States, 41, 310, 312, 330, 368, 369, 403 Universal resource locators (URLs), 102 University of Pennsylvania, 316 UNIX, A.13 Unstructured communications, 92 Unstructured data, 7, 247, 250 Unstructured decisions, 53 Uplift modeling, 346 Up-selling, 344 URLs (Universal resource locators), 102 Usability, 56, 194 U.S Bureau of Labor Statistics, 273 U.S Department of Defense (DoD), 304, B.7 User-contributed (-generated) content, 118 User documentation, 386 U.S Postal Service, 43 U.S Secret Service, 62 Utility software, A.12–A.13 951 www.ebookslides.com UUNet/WorldCom, 282 V Value chain, 29, 30, 32 Value chain analysis, 29–32 Variable, 10 Verisign, 293 Verizon, 282 Videoconferencing, 114 Viral marketing, 108, 127 Virtual abandonment, 124 Virtual assistant, D.6 Virtual businesses, 110 Virtual data centers, 203–204 Virtualization, 201, 218, 222–223, 291 Virtual private networks (VPNs), 291 Virtual reality, 69–70, D.5 Virtual workforces, 285 Virtual workplace, 69 Viruses, 156–158 Visa, 68, 148 Vishing (Voice phishing), 160 Visual images, 268 Visualization, 61, 260, 266–267 Visualization tools, 235, 249 Voice over IP (VoIP), 289 page I.11 Voice phishing, 160 VoIP (Voice over IP), 289 Volatile, A.5 Volatility, A.5 VPNs (Virtual private networks), 291 VUDU, 313 W Walgreens, 96, 333 The Wall Street Journal, 411 Walmart, 27, 28, 35, 42, 135, 227–228, 304, 367 Walton, Sam, 369 WANs; see Wide area networks WAPs (Wireless access points), 295 War chalking, 302 952 www.ebookslides.com War driving, 302 Warm sites, 187 Warping, 305 Waterfall methodology, 388 Watson supercomputer process, 78 Watson, Thomas J., 78 Wearable technologies, 89–90 Web 1.0, 137; see also Ebusiness Web 2.0 (Business 2.0), 116–120 advantages of, 116–120 for capacity planning, 193 challenges of, 125–126 collaboration tools with, 122–125 networking communities with, 120–122 Web 3.0, 126–128 Web-based self-service systems, 345 Web browsers, 114 Web conferencing, 114–115 Webinars, 134 Web logs, 122, 152 Website bookmarks, 121 Website personalization, 346 Websites data-driven, 239–241 Website traffic analytics, 108 WEP (wired equivalent privacy), 302 WePay, 138 What-if analysis, 61 White-hat hackers, 156 WHO (World Health Organization), B.11 Wide area networks (WANs), 282, B.2 Wi-Fi (Wireless fidelity), 295 Wi-Fi networks, 296–297, 316 Wi-Fi Protected Access (WPA), 302 Wikipedia, 118, 123–124, 192 Wikis, 123–124 WiMAX (Worldwide Interoperability for Microwave Access), 298 WiMAX technology, 314 Windows Azure, 209 Wipro, 404 Wired equivalent privacy (WEP), 302 Wired magazine, 40 Wireless (LMCS), A.9 Wireless access points (WAPs), 295 Wireless fidelity (Wi-Fi), 295 Wireless LANs (WLANs), 295–297 953 www.ebookslides.com Wireless MANs (WMANs), 298 Wireless media, B.9–B.10 Wireless networking standard 802.11, 296 Wireless networks, 294–309, B.5 business applications of, 302–307 categories of, 281, 294–302 security of, 312 Wireless technologies, 294 Wireless WANs (WWANs), 295, 298–300 Wire media, B.8–B.9 WLANs (wireless LANs), 295–297 WMANs (wireless MANs), 298 Word length, A.4 Word processing software, A.13 Workflow, 75 Workflow control systems, 75 Workplace MIS monitoring, 152 Workplace monitoring policy, 151–154 Workshop training, 387 Workstation computers, A.11 Workstations, A.11 World Future Society, D.2 World Health Organization (WHO), B.11 Worldwide Interoperability for Microwave Access (WiMAX), 298 World Wide Web (WWW), 103 World Wide Web Consortium (W3C), 108 Worms, 156, 157 WPA (Wi-Fi Protected Access), 302 WTC (World Triathlon Corporation), 284 WWANs (wireless WANs), 295, 298–300 WWW (World Wide Web), 103 X Xbox, 313 Xcel Energy, 201 Xerox, 101, B.6 XML (Extensible Markup Language), 394 XP (Extreme programming) methodology, 391 Y Yahoo!, 111, 124, 126, 203 Yahoo! Connected TV, 313 Yale University, 218 Yourdon, Edward, 406 954 www.ebookslides.com YouTube, 111, 118, 133, 150, 173, 287, 292, 294, 371–372 Yuuguu, 104 Z Zappos, 5, 96, 240, 241, 372–373 Zillow.com, 111 Zombie farms, 160 Zombies, 161 Zoomr, 104 Zuckerberg, Mark, page I.12 page I.13 page I.14 955 ... CONTENTS MODULE Business Driven MIS Chapter Management Information Systems: Business Driven MIS Chapter Decisions and Processes: Value Driven Business Chapter Ebusiness: Electronic Business Value... module 1 Business Driven MIS 1 CHAPTER Management Information Systems: Business Driven MIS 2 Opening Case Study: The Internet of Things 3 Section 1.1 Business Driven MIS 5 COMPETING IN THE INFORMATION. .. faculty Although Business Driven Information Systems and the teaching package make no claim of any specific AACSB qualification or evaluation, within Business Driven Information Systems we have

Ngày đăng: 08/09/2021, 10:11

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan