• +353-1-415-1241(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)
Management Information Systems. 2nd Edition - Product Image

Management Information Systems. 2nd Edition

  • Published: July 2013
  • Region: Global
  • 672 Pages
  • John Wiley and Sons Ltd

From best-selling author Kelly Rainer, and coauthors, Brad Prince and Hugh Watson, the Second Edition of Management Information Systems promotes active learning like no other text on the market. Each chapter is comprised of tightly coupled concepts and section-level student activities that transport your students from passively learning about IS to doing IS in a realistic context. The integration of Microsoft Excel and Access exercises at the end of every chapter enables students to practice their Microsoft application skills in the context of the chapter material. Through WileyPLUS, each small section of concept and the accompanying activities can be assigned separately, which provides a uniquely flexible offering for instructors.

WileyPLUS sold separately from text.

Chapter 1 Introduction to Information Systems 2

1.1 Why Should I Study Information Systems? 5

1.2 Overview of Computer-Based Information Systems 12

1.3 How Does IT Impact Organizations? 22

1.4 Why Are Information Systems Important to Society? 25

Chapter 2 Organizational Strategy, Competitive Advantage, and Information Systems 42

2.1 Business Pressures, Organizational Responses, and IT Support 45

2.2 Competitive Advantage and Strategic Information Systems 56

2.3 Business–IT Alignment 63

Chapter 3 Data and Knowledge Management 78

3.1 Managing Data 81

3.2 The Database Approach 85

3.3 Database Management Systems 91

3.4 Data Warehouses and Data Marts 97

3.5 Knowledge Management 105

Chapter 4 Telecommunications and Networking 122

4.1 What Is a Computer Network? 125

4.2 Network Fundamentals 128

4.3 The Internet and the World Wide Web 134

4.4 Network Applications 140

Chapter 5 Business Intelligence 168

5.1 Managers and Decision Making 171

5.2 What Is Business Intelligence? 176

5.3 Business Intelligence Applications for Data Analysis 180

5.4 Business Intelligence Applications for Presenting Results 183

5.5 Business Intelligence in Action: Corporate

Performance Management 190

Chapter 6 Ethics and Privacy 202

6.1 Ethical Issues 204

6.2 Privacy 209

Chapter 7 Information Security 226

7.1 Introduction to Information Security 229

7.2 Unintentional Threats to Information Systems 231

7.3 Deliberate Threats to Information Systems 235

7.4 What Organizations Are Doing to Protect Information Resources 243

7.5 Information Security Controls 245

Chapter 8 Social Computing 272

8.1 Web 2.0 275

8.2 Fundamentals of Social Computing in Business 283

8.3 Social Computing in Business: Shopping 286

8.4 Social Computing in Business: Marketing 293

8.5 Social Computing in Business: Customer

Relationship Management 301

8.6 Social Computing in Business: Human Resource Management 303

8.7 Crowdsourcing 307

Chapter 9 E-Business and E-Commerce 324

9.1 Overview of E-Business and E-Commerce 328

9.2 Business-to-Consumer (B2C) Electronic Commerce 335

9.3 Business-to-Business (B2B) Electronic Commerce 346

9.4 Ethical and Legal Issues in E-Business 348

Chapter 10 Wireless, Mobile Computing, and Mobile Commerce 364

10.1 Wireless Technologies 367

10.2 Wireless Computer Networks and Internet Access 374

10.3 Mobile Computing and Mobile Commerce 383

10.4 Pervasive Computing 390

10.5 Wireless Security 395

Chapter 11 Information Systems Within the Organization 408

11.1 Transaction Processing Systems 410

11.2 Functional Area Information Systems 412

11.3 Enterprise Resource Planning Systems 419

11.4 Reports 424

Chapter 12 Extending the Organization to Customers 436

12.1 Defining Customer Relationship Management 439

12.2 Operational Customer Relationship Management Systems 443

12.3 Analytical Customer Relationship Management Systems 449

12.4 Other Types of Customer Relationship Management Systems 450

Chapter 13 Extending the Organization Along the Supply Chain 466

13.1 Supply Chains 468

13.2 Supply Chain Management 471

13.3 Information Technology Support for Supply Chain Management 476

Chapter 14 Acquiring Information Systems and Applications 490

14.1 Planning for and Justifying IT Applications 493

14.2 Strategies for Acquiring IT Applications 497

14.3 The Traditional Systems Development Life Cycle 503

14.4 Alternative Methods and Tools for Systems Development 511

14.5 Vendor and Software Selection 517

Plug IT In 1 Business Processes and Business Process Management 530

PI1.1 Business Processes 530

PI1.2 Business Process Reengineering and Business Process Management 535

Plug IT In 2 Hardware and Software 539

PI2.1 Introduction to Hardware 540

PI2.2 Introduction to Software 551

Plug IT In 3 Cloud Computing 561

PI3.1 Introduction 562

PI3.2 What Is Cloud Computing? 563

PI3.3 Different Types of Clouds 568

PI3.4 Cloud Computing Services 569

PI3.5 Cloud Computing Benefits 573

PI3.6 Concerns and Risks with Cloud Computing 576

PI3.7 Web Services and Service-Oriented Architecture 579

Plug IT In 4 Intelligent Systems 586

PI4.1 Introduction to Intelligent Systems 586

PI4.2 Expert Systems 589

PI4.3 Neural Networks 593

PI4.4 Fuzzy Logic 595

PI4.5 Genetic Algorithms 595

PI4.6 Intelligent Agents 596

Plug IT In 5 Project Management 601

PI5.1 Project Management for Information Systems Projects 601

PI5.2 The Project Management Process 603

PI5.3 The Project Management Body of Knowledge 605

Plug IT In 6 Protecting Your Information Assets 612

PI6.1 How to Protect Your Assets: The Basics 612

PI6.2 Behavioral Actions to Protect Your Information Assets 613

PI6.3 Computer-Based Actions to Protect Your Information Assets 616

Photo Credits 635

Index 636

R. Kelly Rainer
Hugh J. Watson
Brad Prince

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos