Menu Expand
Using MIS, Global Edition

Using MIS, Global Edition

David M. Kroenke | Randall J. Boyle

(2016)

Additional Information

Book Details

Abstract

For undergraduate Introductory Management Information Systems courses.

 

Help Your Students Succeed in the Most Important Course They'll Take

As technology continues to change the way organizations do business, knowledge of MIS is critical. Using MIS shows students how organizations use information systems to solve business problems every day. Illustrative cases, exercises, projects, and other aids ensure your students connect concepts to everyday life. Unique guides in each chapter highlight themes in ethics, security, and other timely topics. The 2026? feature hypothesizes how the concepts, technology, and systems will change over the next decade to help students anticipate changes in technology and think about how those affect business.

 

Every year brings important new technology to organizations and the Ninth Edition reflects these trends, providing the latest MIS content available, keeping your students up to date and knowledgeable on how to apply emerging technologies to better achieve their organizations’ strategies.

 

MyMISLab™ not included. Students, if MyMISLab is a recommended/mandatory component of the course, please ask your instructor for the correct ISBN and course ID. MyMISLab should only be purchased when required by an instructor. Instructors, contact your Pearson representative for more information.


MyMISLab is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Within its structured environment, students practice what they learn, test their understanding, and pursue a personalized study plan that helps them better absorb course material and understand difficult concepts.

Table of Contents

Section Title Page Action Price
Cover Cover
Title Page 7
Copyright Page 8
Brief Contents 10
Contents 11
Part 1: Why MIS? 35
Chapter 1: The Importance of MIS 37
Q1-1 Why Is Introduction to MIS the Most Important Class in the Business School? 39
The Digital Revolution 39
Evolving Capabilities 40
Moore’s Law 40
Metcalfe’s Law 41
Other Forces Pushing Digital Change 42
This Is the Most Important Class in the School of Business 42
Q1-2 How Will MIS Affect Me? 43
How Can I Attain Job Security? 43
How Can Intro to MIS Help You Learn Nonroutine Skills? 43
What Is the Bottom Line? 46
Q1-3 What Is MIS? 47
Components of an Information System 48
Management and Use of Information Systems 48
Achieving Strategies 49
Q1-4 How Can You Use the Five-Component Model? 50
The Most Important Component—You 50
All Components Must Work 50
So What? Biggest IPO Ever: Alibaba 51
High-Tech Versus Low-Tech Information Systems 52
Understanding the Scope of New Information Systems 52
Components Ordered by Difficulty and Disruption 52
Q1-5 What Is Information? 53
Definitions Vary 53
Where Is Information? 53
Q1-6 What Are Necessary Data Characteristics? 54
Accurate 54
Timely 55
Relevant 55
Just Barely Sufficient 55
Worth Its Cost 55
Ethics Guide: Ethics and Professional Responsibility 56
Q1-7 2026? 58
Security Guide: Passwords and Password Etiquette 60
Guide: Five-Component Careers 62
Case Study 1: zulily 67
Chapter 2: Collaboration Information Systems 71
Q2-1 What Are the Two Key Characteristics of Collaboration? 73
Importance of Effective Critical Feedback 74
Guidelines for Giving and Receiving Critical Feedback 74
Warning! 75
Q2-2 What Are Three Criteria for Successful Collaboration? 76
Successful Outcome 76
Growth in Team Capability 77
Meaningful and Satisfying Experience 77
Q2-3 What Are the Four Primary Purposes of Collaboration? 77
Becoming Informed 78
Making Decisions 78
Solving Problems 80
Managing Projects 80
Q2-4 What Are the Requirements for a Collaboration Information System? 82
The Five Components of an IS for Collaboration 82
Primary Functions: Communication and Content Sharing 83
Q2-5 How Can You Use Collaboration Tools to Improve Team Communication? 83
Q2-6 How Can You Use Collaboration Tools to Manage Shared Content? 87
Shared Content with No Control 88
Shared Content with Version Management on Google Drive 89
Ethics Guide: I Know What’s Better, Really 92
Shared Content with Version Control 94
Q2-7 How Can You Use Collaboration Tools to Manage Tasks? 96
Sharing a Task List on Google Drive 96
So What? Augmented Collaboration 97
Sharing a Task List Using Microsoft SharePoint 98
Q2-8 Which Collaboration IS Is Right for Your Team? 100
Three Sets of Collaboration Tools 100
Choosing the Set for Your Team 101
Don’t Forget Procedures and People! 102
Q2-9 2026? 103
Security Guide: Evolving Security 104
Guide: Egocentric Versus Empathetic Thinking 106
Case Study 2: Eating Our Own Dog Food 110
Chapter 3: Strategy and Information Systems 117
Q3-1 How Does Organizational Strategy Determine Information Systems Structure? 119
Q3-2 What Five Forces Determine Industry Structure? 120
Q3-3 How Does Analysis of Industry Structure Determine Competitive Strategy? 121
Ethics Guide: Yikes! Bikes 122
Q3-4 How Does Competitive Strategy Determine Value Chain Structure? 124
Primary Activities in the Value Chain 124
Support Activities in the Value Chain 125
Value Chain Linkages 125
Q3-5 How Do Business Processes Generate Value? 126
Q3-6 How Does Competitive Strategy Determine Business Processes and the Structure of Information Systems? 128
Q3-7 How Do Information Systems Provide Competitive Advantages? 129
Competitive Advantage via Products 129
So What? Driving Strategy 130
Competitive Advantage via Business Processes 131
How Does an Actual Company Use IS to Create Competitive Advantages? 132
How Does This System Create a Competitive Advantage? 134
Q3-8 2026? 135
Security Guide: Hacking Smart Things 136
Guide: Your Personal Competitive Advantage 138
Case Study 3: The Amazon of Innovation 142
Part 2: Information Technology 147
Chapter 4 Hardware, Software, and Mobile Systems 149
Q4-1 What Do Business Professionals Need to Know About Computer Hardware? 151
Hardware Components 152
Types of Hardware 152
Computer Data 153
Q4-2 How Can New Hardware Affect Competitive Strategies? 155
Internet of Things 155
Self-driving Cars 157
3D Printing 159
Q4-3 What Do Business Professionals Need to Know About Software? 161
What Are the Major Operating Systems? 161
Virtualization 164
Own Versus License 166
What Types of Applications Exist, and How Do Organizations Obtain Them? 166
What Is Firmware? 167
Q4-4 Is Open Source Software a Viable Alternative? 168
Why Do Programmers Volunteer Their Services? 168
How Does Open Source Work? 168
So What? New from CES 2015 169
So, Is Open Source Viable? 171
Q4-5 What Are the Differences Between Native and Web Applications? 171
Developing Native Applications 171
Developing Web Applications 172
Which Is Better? 174
Q4-6 Why Are Mobile Systems Increasingly Important? 174
Ethics Guide: Free Apps for Data 176
Hardware 178
Software 178
Data 179
Procedures 179
People 179
Q4-7 What Are the Challenges of Personal Mobile Devices at Work? 180
Advantages and Disadvantages of Employee Use of Mobile Systems at Work 180
Survey of Organizational BYOD Policy 181
Q4-8 2026? 182
Security Guide: Anatomy of a Heartbleed 184
Guide: Keeping Up to Speed 186
Case Study 4: PSA Cruising with Information System 191
Chapter 5 Database Processing 195
Q5-1 What Is the Purpose of a Database? 197
Q5-2 What Is a Database? 199
Relationships Among Rows 200
Metadata 201
Ethics Guide: Querying Inequality? 202
Q5-3 What Is a Database Management System (DBMS)? 204
So What? Not What the Data Says . . . 205
Q5-4 How Do Database Applications Make Databases More Useful? 206
Traditional Forms, Queries, Reports, and Applications 208
Browser Forms, Reports, Queries, and Applications 209
Multi-user Processing 211
Q5-5 How Are Data Models Used for Database Development? 212
What Is the Entity-Relationship Data Model? 212
Q5-6 How Is a Data Model Transformed into a Database Design? 215
Normalization 216
Representing Relationships 217
Users’ Role in the Development of Databases 219
Q5-7 How Can Falcon Security Benefit from a Database System? 221
Q5-8 2026? 222
Security Guide: Theft by SQL Injection 224
Guide: Immanuel Kant, Data Modeler 226
Case Study 5: Searching for Classic and Vintage Car Parts . . . 231
Chapter 6 The Cloud 237
Q6-1 Why Is the Cloud the Future for Most Organizations? 239
What Is the Cloud? 239
Why Is the Cloud Preferred to In-House Hosting? 242
Why Now? 243
When Does the Cloud Not Make Sense? 243
Q6-2 What Network Technology Supports the Cloud? 243
Ethics Guide: Cloudy Profit? 244
What Are the Components of a LAN? 246
Connecting Your LAN to the Internet 248
Q6-3 How Does the Cloud Work? 249
An Internet Example 249
Carriers and Net Neutrality 250
Internet Addressing 250
Processing on a Web Server 252
Service-Oriented Architecture (SOA) 253
Protocols Supporting Web Services 256
Q6-4 How Do Organizations Use the Cloud? 259
Cloud Services from Cloud Vendors 259
Content Delivery Networks 260
Using Web Services Internally 261
Q6-5 How Can Falcon Security Use the Cloud? 261
SaaS Services at Falcon Security 261
PaaS Services at Falcon Security 262
IaaS Services at Falcon Security 262
Q6-6 How Can Organizations Use Cloud Services Securely? 263
Virtual Private Networks (VPNs) 263
Using a Private Cloud 264
Using a Virtual Private Cloud 265
Q6-7 2026? 266
So What? Net Neutrality Enabled 267
Security Guide: From Anthem to Anathema 270
Guide: Is It Spying or Just Good Management? 272
Case Study 6: Cloud Solutions that Test for Consumer Risk and Financial Stability 277
Part 3: Using IS for Competitive Advantage 281
Chapter 7 Processes, Organizations, and Information Systems 283
Q7-1 What Are the Basic Types of Processes? 285
How Do Structured Processes Differ from Dynamic Processes? 286
How Do Processes Vary by Organizational Scope? 286
Q7-2 How Can Information Systems Improve Process Quality? 289
How Can Processes Be Improved? 290
How Can Information Systems Improve Process Quality? 290
Q7-3 How Do Information Systems Eliminate the Problems of Information Silos? 291
What Are the Problems of Information Silos? 291
How Do Organizations Solve the Problems of Information Silos? 293
An Enterprise System for Patient Discharge 293
Q7-4 How Do CRM, ERP, and EAI Support Enterprise Processes? 294
The Need for Business Process Engineering 294
Emergence of Enterprise Application Solutions 295
Customer Relationship Management (CRM) 295
Enterprise Resource Planning (ERP) 297
So What? Workflow Problems 298
Ethics Guide: Dialing for Dollars 300
Enterprise Application Integration (EAI) 303
Q7-5 What Are the Elements of an ERP System? 304
Hardware 305
ERP Application Programs 305
ERP Databases 305
Business Process Procedures 306
Training and Consulting 306
Industry-Specific Solutions 308
Which Companies Are the Major ERP Vendors? 308
Q7-6 What Are the Challenges of Implementing and Upgrading Enterprise Information Systems? 309
Collaborative Management 309
Requirements Gaps 309
Transition Problems 310
Employee Resistance 310
New Technology 310
Q7-7 How Do Inter-enterprise IS Solve the Problems of Enterprise Silos? 311
Q7-8 2026? 312
Security Guide: One-Stop Shopping 314
Guide: ERP and the Standard, Standard Blueprint 316
Case Study 7: Interorganizational IS – The National Programme for IT in the NHS Experience 322
Chapter 8 Social Media Information Systems 325
Q8-1 What Is a Social Media Information System (SMIS)? 328
Three SMIS Roles 328
SMIS Components 330
Q8-2 How Do SMIS Advance Organizational Strategy? 332
Social Media and the Sales and Marketing Activity 333
Social Media and Customer Service 334
Social Media and Inbound and Outbound Logistics 334
Social Media and Manufacturing and Operations 334
Social Media and Human Resources 335
Q8-3 How Do SMIS Increase Social Capital? 335
What Is the Value of Social Capital? 336
How Do Social Networks Add Value to Businesses? 337
Using Social Networking to Increase the Number of Relationships 337
So What? Facebook for Organizations . . . and Machines 338
Using Social Networks to Increase the Strength of Relationships 339
Using Social Networks to Connect to Those with More Resources 340
Q8-4 How Do (Some) Companies Earn Revenue from Social Media? 341
You Are the Product 341
Revenue Models for Social Media 342
Does Mobility Reduce Online Ad Revenue? 343
Ethics Guide: Synthetic Friends 344
Q8-5 How Do Organizations Develop an Effective SMIS? 346
Step 1: Define Your Goals 347
Step 2: Identify Success Metrics 347
Step 3: Identify the Target Audience 348
Step 4: Define Your Value 348
Step 5: Make Personal Connections 349
Step 6: Gather and Analyze Data 349
Q8-6 What Is an Enterprise Social Network (ESN)? 349
Enterprise 2.0 350
Changing Communication 350
Deploying Successful Enterprise Social Networks 351
Q8-7 How Can Organizations Address SMIS Security Concerns? 352
Managing the Risk of Employee Communication 352
Managing the Risk of Inappropriate Content 353
Q8-8 2026? 355
Security Guide: Digital Is Forever 358
Guide: Developing Your Personal Brand 360
Case Study 8: Sedona Social 364
Chapter 9 Business Intelligence Systems 369
Q9-1 How Do Organizations Use Business Intelligence (BI) Systems? 371
How Do Organizations Use BI? 372
What Are Typical BI Applications? 373
Q9-2 What Are the Three Primary Activities in the BI Process? 374
Using Business Intelligence to Find Candidate Parts 375
Q9-3 How Do Organizations Use Data Warehouses and Data Marts to Acquire Data? 380
Problems with Operational Data 381
Data Warehouses Versus Data Marts 383
Ethics Guide: Unseen Cyberazzi 384
Q9-4 How Do Organizations Use Reporting Applications? 386
Basic Reporting Operations 386
RFM Analysis 386
Online Analytical Processing (OLAP) 387
Q9-5 How Do Organizations Use Data Mining Applications? 390
Unsupervised Data Mining 390
Supervised Data Mining 391
Market-Basket Analysis 391
Decision Trees 393
Q9-6 How Do Organizations Use BigData Applications? 394
MapReduce 394
So What? BI for Securities Trading? 395
Hadoop 396
Q9-7 What Is the Role of Knowledge Management Systems? 397
What Are Expert Systems? 398
What Are Content Management Systems? 399
What Are the Challenges of Content Management? 399
What Are Content Management Application Alternatives? 400
How Do Hyper-Social Organizations Manage Knowledge? 401
Hyper-Social KM Alternative Media 401
Resistance to Knowledge Sharing 402
Q9-8 What Are the Alternatives for Publishing BI? 402
Characteristics of BI Publishing Alternatives 402
What Are the Two Functions of a BI Server? 403
Q9-9 2026? 404
Security Guide: Semantic Security 406
Guide: Data Mining in the Real World 408
Case Study 9: Hadoop the Cookie Cutter 413
Part 4: Information Systems Management 417
Chapter 10 Information Systems Security 419
Q10-1 What Is the Goal of Information Systems Security? 422
The IS Security Threat/Loss Scenario 422
What Are the Sources of Threats? 423
What Types of Security Loss Exist? 424
Goal of Information Systems Security 426
Q10-2 How Big Is the Computer Security Problem? 427
Q10-3 How Should You Respond to Security Threats? 428
Q10-4 How Should Organizations Respond to Security Threats? 430
So What? New from Black Hat 2014 431
Q10-5 How Can Technical Safeguards Protect Against Security Threats? 433
Identification and Authentication 433
Ethics Guide: Securing Privacy 434
Single Sign-on for Multiple Systems 436
Encryption 436
Firewalls 437
Malware Protection 438
Design for Secure Applications 440
Q10-6 How Can Data Safeguards Protect Against Security Threats? 440
Q10-7 How Can Human Safeguards Protect Against Security Threats? 441
Human Safeguards for Employees 441
Human Safeguards for Nonemployee Personnel 443
Account Administration 444
Systems Procedures 445
Security Monitoring 446
Q10-8 How Should Organizations Respond to Security Incidents? 447
Q10-9 2026? 448
Security Guide: EMV to the Rescue 450
Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts 452
Case Study 10: Hitting the Target 456
Chapter 11 Information Systems Management 461
Q11-1 What Are the Functions and Organization of the IS Department? 463
How Is the IS Department Organized? 464
Security Officers 465
What IS-Related Job Positions Exist? 465
Q11-2 How Do Organizations Plan the Use of IS? 467
Align Information Systems with Organizational Strategy 467
So What? Managing the IS Department 468
Communicate IS Issues to the Executive Group 469
Develop Priorities and Enforce Them Within the IS Department 469
Sponsor the Steering Committee 469
Q11-3 What Are the Advantages and Disadvantages of Outsourcing? 469
Ethics Guide: Privacy Versus Productivity: The BYOD Dilemma? 470
Outsourcing Information Systems 472
International Outsourcing 473
What Are the Outsourcing Alternatives? 474
What Are the Risks of Outsourcing? 474
Q11-4 What Are Your User Rights and Responsibilities? 477
Your User Rights 477
Your User Responsibilities 478
Q11-5 2026? 478
Security Guide: Selling Privacy 480
Guide: Is Outsourcing Fool’s Gold? 482
Case Study 11: iApp$$$$ 4 U 486
Chapter 12 Information Systems Development 489
Q12-1 How Are Business Processes, IS, and Applications Developed? 491
How Do Business Processes, Information Systems, and Applications Differ and Relate? 492
Which Development Processes Are Used for Which? 493
Q12-2 How Do Organizations Use Business Process Management (BPM)? 494
Why Do Processes Need Management? 495
What Are BPM Activities? 496
Q12-3 How Is Business Process Modeling Notation (BPMN) Used to Model Processes? 497
Need for Standard for Business Processing Notation 498
Documenting the As-Is Business Order Process 499
Q12-4 What Are the Phases in the Systems Development Life Cycle (SDLC)? 501
Define the System 502
Ethics Guide: Estimation Ethics 504
Determine Requirements 506
Design System Components 508
System Implementation 508
Maintain System 510
Q12-5 What Are the Keys for Successful SDLC Projects? 511
Create a Work Breakdown Structure 511
Estimate Time and Costs 511
Create a Project Plan 512
Adjust Plan via Trade-offs 514
Manage Development Challenges 515
Q12-6 How Can Scrum Overcome the Problems of the SDLC? 517
What Are the Principles of Agile Development Methodologies? 517
So What? Using This Knowledge for Your Number-One Priority 518
What Is the Scrum Process? 519
How Do Requirements Drive the Scrum Process? 521
Q12-7 2026? 523
Security Guide: Psst. There’s Another Way, You Know . . . 526
Guide: The Final, Final Word 528
Case Study 12: When Will We Learn? 533
The International Dimension 536
Application Exercises 554
Glossary 572
Index 588