商家名称 | 信用等级 | 购买信息 | 订购本书 |
信息时代的管理信息系统(英文版·原书第9版) | |||
信息时代的管理信息系统(英文版·原书第9版) |
作者简介斯蒂芬·哈格(Stephen Haag)丹佛大学丹尼尔商学院商业信息和分析专业的教授。斯蒂芬曾任信息技术和电子商务系系主任、信息技术硕士项目主任、MBA项目主任以及学院主管研究生项目的副院长。斯蒂芬在西得克萨斯州立大学获得学士和硕士学位,在得州大学阿灵顿分校获得博士学位。
斯蒂芬作为作者或共同作者出版了众多书籍,包括Computing Concepts in Action(12年级教科书)、与父母共同撰写的Interactions: Teaching English as a Second Language、与Peter Keen编写的Information Technology: Tomorrow抯 Advantage Today、Excelling in Finance、Business Driven Technology以及40多本信息系列书籍。他还在Communications of the ACM、Socio-Economic Planning Sciences、The International Journal of Systems Science、Managerial and Decision Economics、Applied Economics和The Australian Journal of Management等期刊发表大量文章。斯蒂芬同家人住在科罗拉多的高原牧场。
梅芙·卡明斯(Maeve Cummings)匹兹堡州立大学信息系统专业的教授。她在匹兹堡州立大学获得数学和计算机科学的学士学位及MBA学位,并在得州大学阿灵顿分校获得博士学位。她在Journal of Global Information Management和The Journal of Computer Information Systems期刊发表了多篇论文。她是多个期刊的编委,还是Case Studies in Information Technology以及“信息技术”丛书Computing Concepts and Information Systems Essentials(目前新版本是第2版)的共同作者。梅芙已经从教25年,目前生活在堪萨斯的匹兹堡。
目 录
出版说明
作者简介
前言
致谢
术语表
第1章 我们生存的信息时代:面临商业环境的变化3
令人惊叹的产业变革 手机使酒店的客房电话收入骤减3
1.1 引言4
1.2 信息是一种重要资源5
1.3 人是一种重要资源10
1.4 信息技术是一种重要资源13
1.5 信息技术的财务影响:盈亏平衡分析15
1.6 信息技术的行业影响:波特的五力模型19
1.7 信息技术的战略影响:波特的三种一般战略与RGT框架23
本章小结26
综合案例1-1 社交媒体传声筒:透明生活加剧27
综合案例1-2 谷歌和苹果公司也许知道你在哪里29
关键术语30
问题思考31
作业训练31
问题讨论32
本章项目32
第2章 主要的商业策略:应用信息技术获得竞争优势35
令人惊叹的产业变革 旅行社的衰亡35
2.1 引言36
2.2 供应链管理36
2.3 客户关系管理40
2.4 企业资源计划:将IT进行集成45
2.5 社交媒体51
本章小结58
综合案例2-1 可口可乐应有尽有:供应链管理、客户关系管理、企业资源计划、社交媒体59
综合案例2-2 社交媒体和提高投资回报率60
关键术语61
问题思考62
作业训练62
问题讨论63
本章项目63
第3章 数据库和数据仓库:支持分析驱动的组织65
令人惊叹的产业变革 你知道CD来源于恐龙吗65
3.1 引言66
3.2 关系数据库68
3.3 数据库管理系统工具72
3.4 数据仓库和数据挖掘79
3.5 信息所有权86
本章小结88
综合案例3-1 什么时候让一个公共信息数据库对公众开放是不好的89
综合案例3-2 何时将存储私有信息和公司战略信息的数据库向公众开放是合适的90
关键术语91
问题思考92
作业训练92
问题讨论93
本章项目94
第4章 分析学、决策支持和人工智能:企业智囊团97
令人惊叹的产业变革 在线教育97
4.1 引言98
4.2 决策和决策支持98
4.3 地理信息系统103
4.4 数据挖掘工具和模型104
4.5 人工智能110
4.6 基于代理的技术114
本章小结118
综合案例4-1 水晶球、千里眼、占卜
预测式分析能否预测未来119
综合案例4-2 决策支持有益于你的健康121
关键术语122
问题思考123
作业训练123
问题讨论124
本章项目125
第5章 电子商务:新经济战略127
令人惊叹的产业变革 广告资金涌向信息获取的新渠道——互联网127
5.1 引言128
5.2 电子商务业务模式128
5.3 了解你的企业、产品、服务和客户132
5.4 找到客户并建立客户关系137
5.5 便捷、安全的货币支付140
5.6 电子商务的发展趋势144
本章小结149
综合案例5-1 当企业发展壮大后,可以建立自己的B2B电子市场151
综合案例5-2 移动商务的爆发153
关键术语154
问题思考155
作业训练155
问题讨论156
本章项目156
第6章 系统开发:阶段、工具及技术159
令人惊叹的产业变革 相机使用胶卷?159
6.1 引言160
6.2 内包和系统开发生命周期法160
6.3 基于组件的开发方法167
6.4 自包(最终用户开发)170
6.5 原型法174
6.6 外包178
本章小结185
综合案例6-1 足够好的技术经济186
综合案例6-2 平板电脑在个人电脑市场上找到一席之地187
关键术语189
问题思考189
作业训练190
问题讨论191
本章项目192
第7章 企业架构、云计算、衡量指标和业务可持续计划:构建并维持一家有活力的企业195
令人惊叹的产业变革 钱的本质从未发生变化195
7.1 引言196
7.2 硬件和软件基础设施199
7.3 云计算:完全不需要基础设施203
7.4 信息技术成功指标209
7.5 业务可持续计划212
本章小结216
综合案例7-1 面向个人的公有云218
综合案例7-2 丹佛医疗卫生机构使用“私有云”和“瘦客户端”的运作模式219
关键术语220
问题思考221
作业训练221
问题讨论222
本章项目222
第8章 人与信息的保护:威胁与安全措施225
令人惊叹的产业变革 医学变革让人们生活得更美好225
8.1 引言226
8.2 伦理道德226
8.3 隐私权231
8.4 安全244
本章小结249
综合案例8-1 发送色情短信变得习以为常250
综合案例8-2 索尼遭受多次黑客攻击252
关键术语253
问题思考253
作业训练253
问题讨论254
本章项目255
第9章 新兴技术及其发展趋势:未来的商业、人和技术257
令人惊叹的产业变革 它不再是每个城镇必备的机构257
9.1 引言258
9.2 互联网的发展变化259
9.3 生理交互264
9.4 无线领域270
9.5 纯技术274
9.6 值得思考的重要问题275
本章小结278
综合案例9-1 技术对社会的影响有多大280
综合案例9-2 智能手机和巨大的数字鸿沟282
关键术语283
问题思考283
作业训练284
问题讨论284
本章项目285
小组项目286
案例1:评估客户关系管理的价值286
案例2:分析信息的价值287
案例3:主管信息系统报告288
案例4:构建价值链289
案例5:使用关系数据库技术跟踪项目291
案例6:建立决策支持系统292
案例7:使用横幅广告进行宣传293
案例8:评估信息技术外包的价值294
案例9:演示如何创建网站295
案例10:运用演示文稿软件296
案例11:创建网络数据库系统297
案例12:创建决策支持系统298
案例13:开发企业资源计划系统299
案例14:评价无线技术的未来300
案例15:评估下一代技术301
案例16:分析战略及竞争优势303
案例17:创建决策支持系统304
案例18:进行财务分析305
案例19:开发调度决策支持系统306
案例20:开发数据库管理系统306
案例21:评估信息安全状况308
案例22:评估供应链管理的价值309
电子商务项目310
计算机统计数据和资源网站310
消费者信息网站310
面试和谈判技巧311
元数据311
美国劳工部312
人口统计信息312
免费的租赁存储空间313
获得竞争情报313
计算机伦理指南314
浏览谷歌地球314
经济援助资源315
查找主机服务315
全球统计和资源316
黄金、白银、利率和现金316
隐私法律和规定317
保护你的电脑317
学习投资318
找到实习318
小企业管理局319
股票行情319
店面软件研究320
搜索共享软件和免费软件320
搜索招聘数据库321
搜索MBA项目321
扩展学习模块A 计算机硬件和软件322
A.1 对技术的快速导览323
A.2 根据尺寸大小对计算机进行分类325
A.3 软件:智能化界面328
A.4 硬件:物理界面333
本模块小结345
关键术语346
问题思考348
作业训练348
扩展学习模块B 万维网和互联网350
B.1 引言351
B.2 万维网352
B.3 搜索引擎356
B.4 Web2.0357
B.5 互联网技术359
B.6 互联网的连接362
本模块小结365
关键术语366
问题思考367
作业训练367
扩展学习模块C 设计数据库和实体关系图370
C.1 简介371
C.2 设计并创建一个关系数据库371
本模块小结383
关键术语384
问题思考384
作业训练385
扩展学习模块D 利用电子表格软件进行决策分析386
D.1 介绍387
D.2 列表388
D.3 基本筛选390
D.4 自定义筛选392
D.5 条件格式394
D.6 数据透视表396
D.7 单变量求解402
本模块小结404
关键术语405
作业训练405
扩展学习模块E 网络基础知识408
E.1 前言409
E.2 家庭网络410
E.3 网络组件412
E.4 按距离对网络进行分类414
E.5 互联网415
E.6 网络通信介质422
E.7 网络安全426
本模块小结430
关键术语432
问题思考432
作业训练433
扩展模块F 使用HTML创建Web页面434
扩展模块G 面向对象技术435
扩展学习模块H 计算机犯罪和数字取证436
H.1 前言437
H.2 计算机犯罪438
H.3 数字取证448
H.4 谁需要数字取证调查人员463
本模块小结467
关键术语468
问题思考469
作业训练469
扩展模块I 创建电子简历471
扩展学习模块J 运用Microsoft Access创建一个数据库472
J.1 引言473
J.2 所罗门公司数据库473
J.3 定义所罗门企业数据的内部联系482
J.4 在所罗门数据库中输入信息484
J.5 利用关系创建简单查询487
J.6 利用多个关系创建高级查询489
J.7 生成简单报表491
J.8 生成含有分组、排序和汇总的报表494
J.9 创建数据输入窗体499
本模块小结500
关键术语501
作业训练501
扩展学习模块K 企业中的职业岗位503
扩展学习模块L 利用FrontPage建立网站504
扩展学习模块M 运用VBA在Excel中编程505
注释506
CHAPTER ONE
The Information Age in Which You Live:Changing the Face of Business 3
OUTRAGEOUS INDUSTRY TRANSFORMATION:CELL PHONES DOOM PHONE REVENUES FOR HOTELS 3
INTRODUCTION 4
MIS RESOURCE NO 1: INFORMATION 5
Defining Information Quality 8
Considering Information from an Organizational Perspective 8
MIS RESOURCE NO 2: PEOPLE 10
Technology Literacy 11
Information Literacy 11
Your Ethical Responsibilities 12
MIS RESOURCE NO 3: INFORMATION TECHNOLOGY 13
Key Technology Categories 13
FINANCIAL IMPACT OF IT: BREAK-EVEN ANALYSIS 15
Reducing Fixed Costs 16
Reducing Variable Costs 17
Increasing Revenue 18
INDUSTRY IMPACT OF IT: PORTER’S FIVE FORCES MODEL 19
Buyer Power 19
Supplier Power 20
Threat of Substitute Products or Services 21
Threat of New Entrants 21
Rivalry among Existing Competitors 22
STRATEGY IMPACT OF IT: PORTER (AGAIN) AND RGT 23
Overall Cost Leadership 23
Differentiation 24
Focus 24
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 26
CLOSING CASE STUDY ONE: THE SOCIAL MEDIA MEGAPHONE: TRANSPARENT LIFE INTENSIFIED 27
CLOSING CASE STUDY TWO: GOOGLE AND APPLE KNOW WHERE YOU ARE, MAYBE 29
KEY TERMS AND CONCEPTS 30
SHORT-ANSWER QUESTIONS 31
ASSIGNMENTS AND EXERCISES 31
DISCUSSION QUESTIONS 32
Chapter Projects 32
CHAPTER TWO
Major Business Initiatives:Gaining Competitive Advantage with IT 35
OUTRAGEOUS INDUSTRY TRANSFORMATION: DEATH OF A TRAVEL AGENT 35
INTRODUCTION 36
SUPPLY CHAIN MANAGEMENT 36
Strategic and Competitive Opportunities with SCM 38
IT Support for Supply Chain Management 39
CUSTOMER RELATIONSHIP MANAGEMENT 40
Strategic and Competitive Opportunities with CRM 42
IT Support for Customer Relationship Management 42
ENTERPRISE RESOURCE PLANNING—BRINGING IT ALL TOGETHER 45
The Evolution of ERP Systems 47
ERP Functionality 48
ERP Software for Market Size 50
SOCIAL MEDIA 51
Social Networking 52
Social Shopping 54
Social Playing 54
Social “Saving the World” 55
Social Locationing 56
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 58
CLOSING CASE STUDY ONE: COCA-COLA IS EVERYTHING: SCM, CRM, ERP, SOCIAL MEDIA, YOU NAME IT 59
CLOSING CASE STUDY TWO: THE BUSINESS OF SOCIAL MEDIA AND MAKING THE ROI CASE 60
KEY TERMS AND CONCEPTS 61
SHORT-ANSWER QUESTIONS 62
ASSIGNMENTS AND EXERCISES 62
DISCUSSION QUESTIONS 63
Chapter Projects 63
CHAPTER THREE
Databases and Data Warehouses:Supporting the Analytics-Driven Organization 65
OUTRAGEOUS INDUSTRY TRANSFORMATION: DID YOU KNOW CDS COME FROM DEAD DINOSAURS? 65
INTRODUCTION 66
THE RELATIONAL DATABASE MODEL 68
Collections of Information 68
Created with Logical Structures 68
With Logical Ties within the Information 70
With Built-In Integrity Constraints 71
DATABASE MANAGEMENT SYSTEM TOOLS 72
Data Definition Subsystem 73
Data Manipulation Subsystem 74
Application Generation Subsystem 77
Data Administration Subsystem 77
DATA WAREHOUSES AND DATA MINING 79
What Is a Data Warehouse? 79
The Tool Set of the Analytics Professional 81
The Analytics Life Cycle 83
Data Marts: Smaller Data Warehouses 84
Important Considerations in Using a Data Warehouse 85
INFORMATION OWNERSHIP 86
Strategic Management Support 86
Sharing Information with Responsibility 87
Information Cleanliness 87
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 88
CLOSING CASE STUDY ONE: WHEN MAKING A DATABASE OF PUBLIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE BAD 89
CLOSING CASE STUDY TWO: WHEN MAKING A DATABASE OF PRIVATE AND COMPANY-STRATEGIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE GOOD 90
KEY TERMS AND CONCEPTS 91
SHORT-ANSWER QUESTIONS 92
ASSIGNMENTS AND EXERCISES 92
DISCUSSION QUESTIONS 93
Chapter Projects 94
CHAPTER FOUR
Analytics, Decision Support, and Artificial Intelligence:Brainpower for Your Business 97
OUTRAGEOUS INDUSTRY TRANSFORMATION: ONLINE LEARNING 97
INTRODUCTION 98
DECISIONS AND DECISION SUPPORT 98
Decisions 98
Decision Support Systems 101
GEOGRAPHIC INFORMATION SYSTEMS 103
DATA-MINING TOOLS AND MODELS 104
Predictive Analytics 105
Text Analytics 108
Endless Analytics 109
ARTIFICIAL INTELLIGENCE 110
Expert Systems 110
Neural Networks and Fuzzy Logic 111
Genetic Algorithms 113
AGENT-BASED TECHNOLOGIES 114
Intelligent Agents 114
Multi-Agent Systems 115
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 118
CLOSING CASE STUDY ONE: CRYSTAL BALL, CLAIRVOYANT, FORTUNE TELLING ... CAN PREDICTIVE ANALYTICS DELIVER THE FUTURE? 119
CLOSING CASE STUDY TWO: DECISION SUPPORT IS GOOD FOR YOUR HEALTH 121
KEY TERMS AND CONCEPTS 122
SHORT-ANSWER QUESTIONS 123
ASSIGNMENTS AND EXERCISES 123
DISCUSSION QUESTIONS 124
Chapter Projects 125
CHAPTER FIVE
Electronic Commerce:Strategies for the New Economy 127
OUTRAGEOUS INDUSTRY TRANSFORMATION: ADVERTISING DOLLARS GO WHERE THE EYES ARE 127
INTRODUCTION 128
E-COMMERCE BUSINESS MODELS 128
Business to Business (B2B) E-Commerce 129
Business to Consumer (B2C) E-Commerce 130
Consumer to Business (C2B) E-Commerce 130
Consumer to Consumer (C2C) E-Commerce 131
UNDERSTAND YOUR BUSINESS, PRODUCTS, SERVICES, AND CUSTOMERS 132
Who Are Your Customers? 132
What Is the Value of Your Products and Services as Perceived by Your Customers? 132
FIND CUSTOMERS AND ESTABLISH RELATIONSHIPS 137
Business to Consumer 137
Business to Business 139
MOVE MONEY EASILY AND SECURELY 140
Business to Consumer Payment Systems 140
Business to Business Payment Systems 142
Security: The Pervading Concern 143
E-BUSINESS TRENDS 144
Long-Tail Economics 145
Crowdsourcing 146
Virtual Goods 147
Mobile Commerce 148
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 149
CLOSING CASE STUDY ONE: WHEN YOU’RE BIG, YOU CAN BE YOUR OWN B2B E-MARKETPLACE 151
CLOSING CASE STUDY TWO: THE MOBILE COMMERCE EXPLOSION 153
KEY TERMS AND CONCEPTS 154
SHORT-ANSWER QUESTIONS 155
ASSIGNMENTS AND EXERCISES 155
DISCUSSION QUESTIONS 156
Chapter Projects 156
CHAPTER SIX
Systems Development:Phases, Tools, and Techniques 159
OUTRAGEOUS INDUSTRY TRANSFORMATION: CAMERAS USE FILM? 159
INTRODUCTION 160
INSOURCING AND THE SYSTEMS DEVELOPMENT LIFE CYCLE 160
Phase 1: Planning 162
Phase 2: Analysis 163
Phase 3: Design 164
Phase 4: Development 164
Phase 5: Testing 165
Phase 6: Implementation 165
Phase 7: Maintenance 166
COMPONENT-BASED DEVELOPMENT 167
Rapid Application Development Methodology 167
Extreme Programming Methodology 168
Agile Methodology 170
Service-Oriented Architecture—An Architecture Perspective 170
SELFSOURCING (END-USER DEVELOPMENT) 170
The Selfsourcing Process 171
The Advantages of Selfsourcing 172
Potential Pitfalls and Risks of Selfsourcing 173
Which Applications for IT to Offload 173
The Right Tool for the Job 174
PROTOTYPING 174
The Prototyping Process 175
The Advantages of Prototyping 177
The Disadvantages of Prototyping 177
OUTSOURCING 178
The Outsourcing Process 180
The Service Level Agreement 182
Geopolitical Outsourcing Options 182
The Advantages and Disadvantages of Outsourcing 184
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 185
CLOSING CASE STUDY ONE: THE GOOD-ENOUGH TECHNOLOGY ECONOMY 186
CLOSING CASE STUDY TWO: TABLETS TAKE THEIR PLACE IN THE PC MARKET 187
KEY TERMS AND CONCEPTS 189
SHORT-ANSWER QUESTIONS 189
ASSIGNMENTS AND EXERCISES 190
DISCUSSION QUESTIONS 191
Chapter Projects 192
CHAPTER SEVEN
Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning:Building and Sustaining the Dynamic Enterprise 195
OUTRAGEOUS INDUSTRY TRANSFORMATION:MONEY WILL ALWAYS BE MONEY 195
INTRODUCTION 196
Customers 196
End Users 197
Software Development 198
Information Needs 198
Hardware Requirements 198
HARDWARE AND SOFTWARE INFRASTRUCTURE 199
Enterprise Resource Planning (ERP) Revisited 199
Supporting Network Infrastructures 201
Cloud Computing: No Infrastructure at All 203
IT SUCCESS METRICS 209
Efficiency and Effectiveness Metrics 209
Web-centric Metrics 211
Call Center Metrics 212
BUSINESS CONTINUITY PLANNING 212
Phase 1: Organizational Strategic Plan 213
Phase 2: Analysis 213
Phase 3: Design 214
Phase 4: Implementation 214
Phase 5: Testing 215
Phase 6: Maintenance 215
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 216
CLOSING CASE STUDY ONE: PUBLIC “PERSONAL” CLOUDS 218
CLOSING CASE STUDY TWO: DENVER HEALTH OPERATES WITH A PRIVATE CLOUD AND THIN CLIENTS 219
KEY TERMS AND CONCEPTS 220
SHORT-ANSWER QUESTIONS 221
ASSIGNMENTS AND EXERCISES 221
DISCUSSION QUESTIONS 222
Chapter Projects 222
CHAPTER EIGHT
Protecting People and Information: Threats and Safeguards 225
OUTRAGEOUS INDUSTRY TRANSFORMATION: TRANSFORMATIONS IN MEDICINE MEAN BETTER LIVES 225
INTRODUCTION 226
ETHICS 226
Two Factors That Determine How You Decide Ethical Issues 228
Intellectual Property 229
PRIVACY 231
Privacy and Other Individuals 231
Identity Theft 232
Privacy and Employees 235
Privacy and Consumers 237
Privacy and Government Agencies 241
Laws on Privacy 243
SECURITY 244
Security and Employees 244
Security and Outside Threats 245
Security Precautions 247
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 249
CLOSING CASE STUDY ONE: SEXTING NOW ALMOST COMMONPLACE 250
CLOSING CASE STUDY TWO: SONY REELS FROM MULTIPLE HACKER ATTACKS 252
KEY TERMS AND CONCEPTS 253
SHORT-ANSWER QUESTIONS 253
ASSIGNMENTS AND EXERCISES 253
DISCUSSION QUESTIONS 254
Chapter Projects 255
CHAPTER NINE
Emerging Trends and Technologies:Business, People, and Technology Tomorrow 257
OUTRAGEOUS INDUSTRY TRANSFORMATION: THERE IS NO LONGER ONE IN EVERY TOWN 257
INTRODUCTION 258
THE CHANGING INTERNET 259
Personal Software-as-a-Service 259
Push, Not Pull, Technologies and Personalization 260
F2b2C: A New E-Commerce Business Model 261
Voice over Internet Protocol (VoIP) 262
Web 3.0 (Is Web 2.0 Already Old?) 262
E-Society 264
PHYSIOLOGICAL INTERACTION 264
Automatic Speech Recognition 264
Virtual Reality 265
Cave Automatic Virtual Environments 265
Haptic Interfaces 266
Biometrics 267
THE WIRELESS ARENA 270
The Next Generation of Smartphone Technology 270
RFID (Radio Frequency Identification) 271
PURE TECHNOLOGY 274
Nanotechnology 274
Multi-State CPUs 275
Holographic Storage Devices 275
MOST IMPORTANT CONSIDERATIONS 275
The Necessity of Technology 276
Closing the Great Digital Divide 276
Technology for the Betterment of Society 276
Exchanging Privacy for Convenience 276
Ethics, Ethics, Ethics 277
Making Predictions 277
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 278
CLOSING CASE STUDY ONE: JUST HOW BIG IS THE IMPACT OF TECHNOLOGY ON SOCIETY? 280
CLOSING CASE STUDY TWO: SMARTPHONESAND THE GREAT DIGITAL DIVIDE 282
KEY TERMS AND CONCEPTS 283
SHORT-ANSWER QUESTIONS 283
ASSIGNMENTS AND EXERCISES 284
DISCUSSION QUESTIONS 284
Chapter Projects 285
EXTENDED LEARNING MODULE A 322
Computer Hardware and Software A QUICK TOUR OF TECHNOLOGY 323
CATEGORIES OF COMPUTERS BY SIZE 325
Smartphones 325
Tablet PCs, Slates, and E-Readers 325
Notebook Computers 325
Desktop Computers 326
Minicomputers, Mainframe Computers, and Supercomputers 327
SOFTWARE: YOUR INTELLECTUAL INTERFACE 328
Application Software 328
System Software 331
HARDWARE: YOUR PHYSICAL INTERFACE 333
Common Input Devices 334
Common Output Devices 336
Common Storage Devices 338
CPU and RAM 340
Connecting the Hardware Outside to the Hardware Inside 342
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 345
KEY TERMS AND CONCEPTS 346
SHORT-ANSWER QUESTIONS 348
ASSIGNMENTS AND EXERCISES 348
EXTENDED LEARNING MODULE B 350
The World Wide Web and the Internet INTRODUCTION 351
WORLD WIDE WEB 352
Web Sites, Addresses, and Pages 352
Understanding Addresses 353
Using Web Browser Software 354
SEARCH ENGINES 356
WEB 2.0 357
Wikis 357
Social Networking Sites 358
Blogs 358
RSS Feeds 359
Podcasting 359
INTERNET TECHNOLOGIES 359
The Internet Backbone 359
Internet Servers 360
Communications Protocols 360
CONNECTING TO THE INTERNET 362
Communications Software 362
Telecommunications Hardware 363
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 365
KEY TERMS AND CONCEPTS 366
SHORT-ANSWER QUESTIONS 367
ASSIGNMENTS AND EXERCISES 367
EXTENDED LEARNING MODULE C 370
Designing Databases and Entity-Relationship Diagramming INTRODUCTION 371
DESIGNING AND BUILDING A RELATIONAL DATABASE 371
Step 1: Define Entity Classes and Primary Keys 373
Step 2: Define Relationships among the Entity Classes 374
Step 3: Define Information (Fields) for Each Relation 380
Step 4: Use a Data Definition Language to Create Your Database 383
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 383
KEY TERMS AND CONCEPTS 384
SHORT-ANSWER QUESTIONS 384
ASSIGNMENTS AND EXERCISES 385
EXTENDED LEARNING MODULE D 386
Decision Analysis with Spreadsheet Software INTRODUCTION 387
LISTS 388
BASIC FILTER 390
CUSTOM FILTER 392
CONDITIONAL FORMATTING 394
PIVOT TABLES 396
GOAL SEEK 402
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 404
KEY TERMS AND CONCEPTS 405
ASSIGNMENTS AND EXERCISES 405
EXTENDED LEARNING MODULE D (on OLC) Decision Analysis with Spreadsheet Software 407
EXTENDED LEARNING MODULE E 408
Network Basics INTRODUCTION 409
Basic Principles of Networks 409
HOME NETWORKS 410
Network Cards in Each Computer 410
Wired and Wireless Transmission Media 410
Home Internet Service and Broadband Routers 411
Network Software 412
NETWORK COMPONENTS 412
Switches 412
Routers 413
CLASSIFYING NETWORKS BY DISTANCE 414
LANs, WANs, and MANs 414
INTERNET 415
Bandwidth 415
Internet Connection Types 416
Voice over IP 421
NETWORK COMMUNICATIONS MEDIA 422
Wired Communications Media 422
Wireless Communications Media 423
NETWORK SECURITY 426
Principles of Computer Security 426
Firewalls and Intrusion Detection Systems 427
Encrypted Communications: SSL and Virtual Private Networks 428
Other Security Threats: Malware 429
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 430
KEY TERMS AND CONCEPTS 432
SHORT-ANSWER QUESTIONS 432
ASSIGNMENTS AND EXERCISES 433
EXTENDED LEARNING MODULE F (on OLC) Building a Web Page with HTML 434
EXTENDED LEARNING MODULE G (on OLC) Object-Oriented Technologies 435
EXTENDED LEARNING MODULE H 436
Computer Crime and Digital Forensics INTRODUCTION 437
COMPUTER CRIME 438
Outside the Organization 438
Web Defacing 445
Cyber War 446
The Players 446
DIGITAL FORENSICS 448
The Collection Phase 449
The Analysis Phase 453
Analytics in Forensics 458
Anti-Forensics 460
WHO NEEDS DIGITAL FORENSICS INVESTIGATORS? 463
Proactive Digital Forensics Education for Problem Prevention 464
Reactive Digital Forensics for Incident Response 465
A Day in the Life 465
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 467
KEY TERMS AND CONCEPTS 468
SHORT-ANSWER QUESTIONS 469
ASSIGNMENTS AND EXERCISES 469
EXTENDED LEARNING MODULE I (on OLC) Building an E-Portfolio 471
EXTENDED LEARNING MODULE J Implementing a Database with Microsoft Access 472
INTRODUCTION 473
SOLOMON ENTERPRISES DATABASE 473
Implementing the Structure of the Solomon Enterprises Database 474
Implementing the Raw Material Relation Structure 476
Implementing the Concrete Type RelationStructure 479
Implementing the Bill of Material Relation Structure 480
DEFINING RELATIONSHIPS WITHIN THE SOLOMON ENTERPRISES DATABASE 482
ENTERING INFORMATION INTO THE SOLOMON DATABASE 484
Changing the Structure of Information in Relations 487
CREATING A SIMPLE QUERY USING ONE RELATION 487
Simple Query with a Condition (Conditional Query) 488
CREATING AN ADVANCED QUERY USING MORE THAN ONE RELATION 489
GENERATING A SIMPLE REPORT 491
GENERATING A REPORT WITH GROUPING, SORTING, AND TOTALS 494
CREATING A DATA INPUT FORM 499
SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 500
KEY TERMS AND CONCEPTS 501
ASSIGNMENTS AND EXERCISES 501
EXTENDED LEARNING MODULE J (on OLC) Implementing a Database with Microsoft Access 502
EXTENDED LEARNING MODULE K (on OLC) Careers in Business 503
EXTENDED LEARNING MODULE L (on OLC) Building Web Sites with Frontpage 504
EXTENDED LEARNING MODULE M (on OLC) Programming in Excel with VBA 505
Notes 506
网友对信息时代的管理信息系统(英文版·原书第9版)的评论
喜欢信息时代的管理信息系统(英文版·原书第9版)请与您的朋友分享,由于版权原因,读书人网不提供图书下载服务