gogogo
Syndetics cover image
Image from Syndetics

Information systems for business : an experiential approach / France Bélanger, Craig Van Slyke.

By: Contributor(s): Material type: TextTextPublication details: Hoboken, NJ : John Wiley & Sons, c2012.Description: xxii, 346 p. : ill. ; 23 cmISBN:
  • 9780470903728 (pbk. : alk. paper)
  • 0470903724 (pbk. : alk. paper)
Subject(s): DDC classification:
  • 658.4038 BEL
Summary: "Information systems for Business: An Experiential Approach" is an entirely new, brief, affordable paperback alternative for professors who want an experiential approach for the undergraduate or first year graduate level Intro to Information Systems course. Offering a learner-centered approach and using a learn-do-reflect model, Drs. France Bélanger and Craig Van Slyke provide a focused treatment of topics with highly engaging activities -- P. 4 of cover.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 658.4038 BEL (Browse shelf(Opens below)) 1 Available 39002100505776

Enhanced descriptions from Syndetics:

Information Systems: An Experiential Approach is a brief,inexpensive, paperback alternative for professors who want anexperiential approach for the undergraduate or first year graduatelevel Intro to IS course. Offering a learner-centered approach and using a learn-do-reflect model,Bélanger/Van Slyke provides a focused treatment of topics andengaging activities. The authors have used this model in theirclasses to great success. The authors found that students performedbetter on exams, class discussions became more animated andattendance improved as engagement with the material increased.

Includes bibliographical references and index.

Includes bibliographical references.

"Information systems for Business: An Experiential Approach" is an entirely new, brief, affordable paperback alternative for professors who want an experiential approach for the undergraduate or first year graduate level Intro to Information Systems course. Offering a learner-centered approach and using a learn-do-reflect model, Drs. France Bélanger and Craig Van Slyke provide a focused treatment of topics with highly engaging activities -- P. 4 of cover.

Table of contents provided by Syndetics

  • Preface (p. xv)
  • Section I Introduction
  • 1 The Value of Information (p. 1)
  • Focusing Story: How Information Cost Me (A Lot of) Money (p. 2)
  • Learning Activity 1.1 A Day in My Technology-Free Life Blog (p. 3)
  • Data Information Knowledge and Wisdom (p. 3)
  • Information Literacy (p. 5)
  • Uses of Information (p. 5)
  • Learning Activity 1.1 How I Use Information (p. 6)
  • Learning Activity 1.1 How Businesses Use Information (p. 7)
  • Business Box Promising Information Careers (p. 7)
  • Information and Your Career (p. 8)
  • 2 Introduction to Information Systems (p. 13)
  • Focusing Story: Registering for Classes in 1981 (p. 14)
  • Learning Activity 2.2 Identifying My Information Systems (p. 15)
  • Why All Business Professionals Need to Be IS Managers (p. 15)
  • Learning Activity 2.2 Components of a System (p. 16)
  • Overview of Systems (p. 16)
  • Learning Activity 2.2 Components of a Business Information System (p. 18)
  • Foundations of Information Systems (p. 18)
  • Stats Box Growth of Applications in AppleâÇÖs App Store (p. 22)
  • How Information Systems Help Us Deal with Information (p. 22)
  • Business Box How Southwest Airlines Flies High with Information Systems (p. 24)
  • Learning Activity 2.2 Information Systems and Change (p. 25)
  • How Information Systems Facilitate Organizational Change (p. 25)
  • Process Improvements (p. 25)
  • Automation (p. 26)
  • Control (p. 26)
  • Information Flow (p. 26)
  • Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability (p. 27)
  • Common Information Systems (p. 28)
  • 3 Evaluating Information (p. 33)
  • Focusing Story: Biased Information in a Trusted Outlet (p. 34)
  • Learning Activity 3.3 How Good is This Information? (p. 35)
  • Being a Smart Information Consumer (p. 35)
  • Stats Box (p. 36)
  • Business Box Resume Fraud (p. 36)
  • Learning Activity 3.3 My Online Life and Information Overload (p. 37)
  • Information Overload and the Need to Evaluate Information (p. 38)
  • Learning Activity 3.3 Dimensions of Information Quality (p. 39)
  • Information Quality (p. 40)
  • Business Box Information Quality as an Ethical Issue (p. 42)
  • Learning Activity 3.3 Evaluating Information Sources (p. 43)
  • Evaluating Information (p. 43)
  • Evaluating Usefulness (p. 44)
  • Evaluating Believability (p. 45)
  • 4 Gaining Strategic Value from Information (p. 51)
  • Focusing Story: Healthcare on My Cell Phone (p. 52)
  • Strategic Information Systems (p. 53)
  • Strategic Planning Process (p. 54)
  • Step 1 Strategic Business Planning (p. 54)
  • Stats Box (p. 55)
  • Step 2 Information Systems Assessment (p. 55)
  • Step 3 Information Systems Vision (p. 56)
  • Step 4 Information Systems Architecture (p. 56)
  • Step 5 Strategic Initiatives Identification (p. 57)
  • Advantages of IS Strategic Planning Process (p. 57)
  • Frameworks for Strategic Information Systems (p. 58)
  • Information Systems SWOT Analysis (p. 58)
  • SWOT Analysis of a Person? (p. 59)
  • PorterâÇÖs Five Competitive Forces Model (p. 60)
  • PorterâÇÖs Value Chain Analysis (p. 60)
  • Virtual Value Chain (p. 62)
  • Evaluating Strategic Initiatives (p. 64)
  • Critical Success Factors (p. 64)
  • CSFS for Implementing Web Portals in Saudi Arabia (p. 65)
  • Learning Activity 4.4 What Does Yahoo! Need for Success? (p. 66)
  • Priority Matrix (p. 66)
  • Learning Activity 4.4 Competitive Advantage at Outrigger Hotels and Resorts (p. 67)
  • Hyper-competition: Sustainability of Competitive Advantage (p. 67)
  • Learning Activity 4.4 Google Vs. Yahoo! (p. 69)
  • Section II Managing Information
  • 5 Storing and Organizing Information (p. 75)
  • Focusing Story: The Database Behind Facebook (p. 76)
  • Learning Activity 5.5 Data for an Amazon Order (p. 77)
  • Stats Box (p. 77)
  • Overview of Relational Databases (p. 77)
  • Databases and Database Management Systems (p. 77)
  • Learning Activity 5.5 Connecting Data Elements (p. 78)
  • Databases vs. Spreadsheets (When to Use a DBMS) (p. 78)
  • Relational Databases (p. 79)
  • Database Diagrams (p. 83)
  • Learning Activity 5.5 Finding Business Databases Online (p. 84)
  • The Compact Disc Database (CDDB) (p. 84)
  • Online Databases (p. 85)
  • 6 Analyzing Information for Business Decision-Making (p. 91)
  • Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money (p. 92)
  • Learning Activity 6.6 Information and Decision-Making (p. 93)
  • Importance of Good Decision-Making Skills (p. 93)
  • Learning Activity 6.6 What Kind of Information Do I Need? (p. 94)
  • Using Information for Decision-Making (p. 94)
  • Business Box Why Do Managers Make Bad Decisions? (p. 95)
  • Types of Decisions (p. 95)
  • A Decision-Making Process (p. 97)
  • Identify and Clearly Define the Problem (p. 97)
  • Determine Requirements and Goals (p. 98)
  • Identify Alternatives (p. 99)
  • Define the Criteria (p. 99)
  • Learning Activity 6.6 Requirements Goals and Criteria (p. 99)
  • Select a Decision-Making Technique/tool (p. 100)
  • Evaluate the Alternatives Using the Criteria (p. 101)
  • Check That the Solution Solves the Problem (p. 102)
  • Information Retrieval and Analysis Tools (p. 102)
  • Learning Activity 6.6 "What If " I Get a 75% on the Final? (p. 103)
  • Stats Box The Cost of Spreadsheet Errors (p. 106)
  • Learning Activity 6.6 What- If? Analysis in Business (p. 107)
  • 7 Transmitting Information (p. 113)
  • Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi (p. 114)
  • Introduction and Definitions (p. 115)
  • Learning Activity 7.7 Online Document Sharing (p. 116)
  • Network Components and Characteristics (p. 116)
  • Types of Networks (p. 117)
  • Wired vs. Wireless Networks (p. 117)
  • Broadband Networks (p. 118)
  • Stats Box 1 Broadband Penetration in the G7 Countries (p. 119)
  • Network Coverage (p. 120)
  • The Internet (p. 121)
  • Internet Applications (p. 122)
  • Stats Box (p. 123)
  • Business Box 1 Internet Application of the Day: Get a Degree Online! (p. 124)
  • Internet vs. Intranet (p. 125)
  • Virtual Private Network (VPN) (p. 125)
  • Learning Activity 7.7 A Future Internet? Internet2 and Business (p. 125)
  • Networking Architectures (p. 126)
  • Architectural Principles (p. 126)
  • Client/Server Architecture (p. 126)
  • Peer-to-Peer Architecture (p. 128)
  • Wireless Architecture (p. 128)
  • Service Oriented Architecture (SOA) (p. 128)
  • Software as a Service (SaaS) (p. 129)
  • Cloud Computing (p. 130)
  • Virtualization (p. 130)
  • Learning Activity 7.7 Architecture and Principles (p. 130)
  • Communicating Information in Modern Organizations (p. 131)
  • Web 2.0 (p. 132)
  • Unified Communications (UC) (p. 132)
  • The Power of Wikinomics (p. 134)
  • Stats Box (p. 135)
  • Learning Activity 7.7 Web 2.0 for Business (p. 136)
  • Web 3.0 (p. 136)
  • 8 Securing Information (p. 143)
  • Focusing Story: My Mac is More Secured than Your Windows-based PC! (p. 144)
  • Introduction and Definitions (p. 146)
  • Information Security Concepts (p. 146)
  • Security Levels (p. 146)
  • Learning Activity 8.8 How Protected is Your Computer? (p. 147)
  • Information Security Threats (p. 148)
  • Denial of Service (p. 148)
  • Unauthorized Access (p. 150)
  • Stats Box (p. 151)
  • Business Box 1 Even Big Technology Companies Can be Hacked (p. 153)
  • Learning Activity 8.8 Detecting Phishing (p. 154)
  • Theft and Fraud (p. 154)
  • Summary of Security Threats (p. 155)
  • Security Technologies and Solutions (p. 157)
  • Security Goals (p. 157)
  • Preventive Corrective and Detective Controls (p. 157)
  • Physical Security vs. Logical Security (p. 158)
  • User Profiles (p. 158)
  • Learning Activity 8.8 How Strong is Your Password? (p. 159)
  • Biometrics (p. 160)
  • Firewalls (p. 162)
  • Rendering Data Unreadable: Encryption (p. 166)
  • Learning Activity 8.8 Breaking the Encryption (p. 166)
  • Types of Cryptography (p. 166)
  • Virus Protection (p. 169)
  • Wireless Security (p. 169)
  • Stats Box (p. 170)
  • Security Policies (p. 170)
  • Business Box 2 How to Respond to a Security Crisis (p. 170)
  • Stats Box 3 Security Policies Compliance (p. 171)
  • Learning Activity 8.8 WhereâÇÖs the Security? (p. 172)
  • Risk Management (p. 172)
  • 9 Protecting the Confidentiality and Privacy of Information (p. 181)
  • Focusing Story: The Reselling of Customer Data: The Choicepoint Story (p. 182)
  • Learning Activity 9.9 Finding MindyâÇÖ (p. 183)
  • Information Privacy Threats (p. 185)
  • Data Collection (p. 186)
  • Secondary Use of Information (p. 187)
  • Learning Activity 9.9 Privacy Pizza (p. 187)
  • Stats Box 1 Concern for Information Privacy (p. 188)
  • Consequences of Privacy Violations (p. 188)
  • Individual Consequences: Identify Theft (p. 188)
  • Stats Box 2 Fraud Type from Identity Theft (p. 189)
  • Organizational Consequences: Company Reputation (p. 190)
  • Stats Box 3 Reputation Risks of Social Networking (p. 191)
  • Technologies and Solutions for Information Privacy (p. 191)
  • Stats Box 4 Surveillance Societies Around the World (p. 192)
  • Cookies and Cookie Managers (p. 192)
  • Learning Activity 9.9 Privacy Policy Creation (p. 194)
  • Privacy Statement or Policy (p. 194)
  • Business Box 1 Privacy and Facebook (p. 196)
  • Privacy Seals (p. 197)
  • Activity 9.4 Why Your Advisor canâÇÖt Talk to Your Parents (p. 197)
  • Government Information Privacy Regulations (p. 198)
  • Business Box 2 Hippa and Identity Theft (p. 199)
  • Privacy and Ethics (p. 199)
  • Learning Activity 9.9 Papa Privacy Policies and FERPA (p. 200)
  • Relationship between Security and Privacy (p. 201)
  • Section III Using Information
  • 10 Developing Information Systems (p. 207)
  • Focusing Story: The $6 Billion Software Bug (p. 208)
  • Time Cost and Quality (p. 209)
  • Learning Activity 10.10 Determining Requirements (p. 210)
  • Software Development Methodologies (p. 210)
  • Traditional Systems Development Life Cycle (p. 211)
  • Planning Phase (p. 212)
  • Requirements Phase (p. 212)
  • Design Phase (p. 213)
  • Development Phase (p. 214)
  • Implementation Phase (p. 214)
  • Maintenance Phase (p. 215)
  • Learning Activity 10.10 Advantages and Disadvantages of the SDLC (p. 215)
  • Stats Box Standish Chaos Report (p. 216)
  • Alternative Methodologies (p. 216)
  • Prototyping (p. 216)
  • Rapid Application Development (RAD) (p. 217)
  • Spiral Model (p. 218)
  • Learning Activity 10.10 Comparing the Methods (p. 220)
  • Build or Buy Decision (p. 220)
  • Learning Activity 10.10 How Open Source Software Impacts Build vs. Buy (p. 223)
  • Using Open Source in Business (p. 223)
  • Business Box Bad Economy Leads to More Open Source Software (p. 225)
  • Learning Activity 10.10 What to Outsource (p. 225)
  • Outsourcing Information Systems (p. 226)
  • Outsourcing Models (p. 226)
  • Benefits and Risks of Outsourcing (p. 227)
  • Making the Outsourcing Decision (p. 227)
  • Business Box Reversing the Outsourcing Decision (p. 228)
  • Geographic Considerations (p. 229)
  • 11 Information-Based Business Process (p. 235)
  • Focusing Story: Improving Processes is For Everyone! (p. 236)
  • Learning Activity 11.11 How Many Steps in this Process? (p. 237)
  • What Is a Process? (p. 237)
  • Process Modeling (p. 239)
  • Learning Activity 11.11 Model This! (p. 240)
  • Business Process Modeling Tools (p. 240)
  • Technology and Processes (p. 242)
  • Process Improvement (p. 243)
  • Levels of Change (p. 245)
  • Stats Box 1 Importance of Process Redesign (p. 245)
  • Learning Activity 11.11 Redesign This! (p. 246)
  • Business Box 1 Choicecare Physicians: Changing Access to Patient Records (p. 247)
  • 12 Enterprise Information Systems (p. 251)
  • Focusing Story: Supply Chain Innovations at Wal-Mart (p. 252)
  • Learning Activity 12.12 Finding The Components of an Enterprise System (p. 254)
  • Enterprise Systems (p. 254)
  • Personal vs. Enterprise Systems (p. 254)
  • Integration and Enterprise Systems (p. 256)
  • Characteristics of Enterprise Systems (p. 256)
  • Enterprise Resource Planning (ERP) (p. 258)
  • Benefits and Disadvantages of ERP Systems (p. 259)
  • Business Box 1 The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List (p. 259)
  • Business Box 2 ERP is not Always a Horror Story: Cisco Implementation on Time and Budget (p. 261)
  • Stats Box 1 Top Seven Selected ERP Vendors (p. 262)
  • Learning Activity 12.12 The Online Beer Game (p. 262)
  • Supply Chain Management Systems (p. 263)
  • Stats Box 2 Supply ChainâÇÖs Impact on Company Valuation (p. 265)
  • Learning Activity 12.12 Customer Relationship Management (p. 265)
  • Customer Relationship Management Systems (p. 266)
  • Customer Service Life Cycle (p. 266)
  • Components of CRM (p. 268)
  • Learning Activity 12.12 Self-servicing (p. 268)
  • Stats Box 3 CRM Vendors (p. 269)
  • CRM Implementation Options (p. 269)
  • Business Box 3 Not Just Technology: Training People for CRM At British Telecom (p. 270)
  • Benefits and Limitations of CRM (p. 271)
  • Customer Managed Interactions (CMI) (p. 272)
  • 13 Information for Electronic Business (p. 279)
  • Focusing Story: The iPod and The Music Industry (p. 280)
  • Learning Activity 13.13 Why is E-business Important? (p. 282)
  • Introduction to E-business (p. 282)
  • Types of E-businesses (p. 282)
  • Stats Box 1 Retail E-commerce in The United States (p. 284)
  • E-business Models (p. 285)
  • What is a Business Model? (p. 285)
  • B2C E-business Models (p. 286)
  • Business Box 1 Changing The Business Model: Furniture.com (p. 288)
  • B2C E-business Enablers (p. 288)
  • Technological Enablers (p. 288)
  • Critical Mass (p. 289)
  • B2C E-business Impacts (p. 290)
  • E-channel Compression (Disintermediation) (p. 290)
  • E-channel Expansion (p. 291)
  • Learning Activity 13.13 Why Would I Trust them or Buy from Them? (p. 291)
  • Design for B2C E-Business (p. 292)
  • Business-to-Business (B2B) (p. 293)
  • Stats Box 2 B2B vs. B2C E-business (p. 293)
  • B2B E-business Models (p. 294)
  • Learning Activity 13.13 Where is My Web Page? (p. 296)
  • Search Engine Optimization (p. 296)
  • Trends in E-business (p. 298)
  • Mobile Business (p. 299)
  • Stats Box 3 Mobile Behaviors (p. 300)
  • Global e-Business (p. 301)
  • Stats Box 4 E-business in Ontario (p. 301)
  • Learning Activity 13.13 USA.Gov (p. 302)
  • E-government (p. 302)
  • 14 Information and Knowledge for Business Decision Making (p. 309)
  • Focusing Story: Managing Knowledge by Texting (p. 310)
  • Learning Activity 14.14 How You Manage Knowledge (p. 311)
  • Knowledge Management (p. 312)
  • Why Managing Knowledge is Important (p. 312)
  • Types of Knowledge (p. 313)
  • Types of Knowledge Resources (p. 314)
  • Main Processes for Knowledge Management (p. 314)
  • Creating Knowledge (p. 315)
  • Capturing and Codifying Knowledge (p. 316)
  • Business Box The Issue of Trust in Knowledge Management (p. 318)
  • Storing and Retrieving Knowledge (p. 318)
  • Transferring and Applying Knowledge (p. 319)
  • Learning Activity 14.14 Wikis for Managing Knowledge (p. 319)
  • Knowledge Management Technologies (p. 320)
  • Repositories (p. 320)
  • Communication-based Tools (p. 320)
  • Stats Box Linkedin Groups as Communities of Practice (p. 321)
  • Executive Information Systems and Dashboards (p. 321)
  • Expert Systems (p. 321)
  • Learning Activity 14.14 Using a Decision Support System (p. 323)
  • Decision Support Systems and Group Decision Support Systems (p. 323)
  • Business Intelligence (p. 326)
  • Data Warehousing (p. 327)
  • Data Mining (p. 328)
  • Learning Activity 14.14 Making Ethical Decisions (p. 332)
  • Ethical Decision-Making (p. 332)
  • Index (p. 339)
  • Online In-Depth Guides (posted at the Instructor and Student Companion Sites: www.wiley.com/college/belanger )
  • 1 Hardware
  • 2 Software
  • 3 Networking Basics
  • 4 Advanced database concepts
  • 5 Spreadsheets
  • 6 Funding information systems
  • 7 Managing projects
  • 8 Advanced security privacy and risk management

Powered by Koha