BOOK
Information Systems Today: Managing the Digital World, Global Edition
Joseph Valacich | Christoph Schneider
(2017)
Additional Information
Book Details
Abstract
For undergraduate courses in management information systems
A modern, case study-based exploration of Management Information Systems.
Information Systems Today: Managing in a Digital World opens each chapter with a case study so students can quickly understand how and why information systems are essential in today’s evolving business landscape. The authors selected cases that highlight real-world companies, technologies, and issues that illuminate the chapter topics.
Aligning major concepts with the latest trends, the Eighth Edition explores how the rise of mobile computing, cloud computing, social media, the Internet of Things, and Big Data affect information systems. Valacich and Schneider continue to use real-world examples to further illustrate key points and help students retain valuable insights.
MyLab™ MIS not included. Students, if MyLab MIS is a recommended/mandatory component of the course, please ask your instructor for the correct ISBN and course ID. MyLab MIS should only be purchased when required by an instructor. Instructors, contact your Pearson rep for more information.
MyLab MIS is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Within its structured environment, students practice what they learn, test their understanding, and pursue a personalized study plan that helps them better absorb course material and understand difficult concepts
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
MIS: Engage, Apply, Empower | Inside Front Cover | ||
Title Page | 3 | ||
Copyright Page | 4 | ||
Dedication | 5 | ||
About the Authors | 7 | ||
Brief Contents | 9 | ||
Contents | 11 | ||
Preface | 19 | ||
Chapter\r1: Managing in the Digital World | 30 | ||
Managing in the Digital\rWorld: Open Innovation | 30 | ||
Information Systems Today | 32 | ||
The Emergence of the Digital World | 32 | ||
Globalization and Societal Issues in the Digital World | 35 | ||
Coming Attractions:\rMemory Crystals | 35 | ||
Five IT Megatrends That Shape the Digital Future | 38 | ||
Who's Goinhg Mobile:\rWearable Technologies | 38 | ||
Green It:\rThe Green Internet of Things | 44 | ||
Information Systems Defined | 44 | ||
Data: The Root and Purpose of Information Systems | 46 | ||
Hardware, Software, and Telecommunications Networks: The Components of Information Systems | 46 | ||
People: The Builders, Managers, and Users of Information Systems | 47 | ||
Security Matters:\rRansomware | 52 | ||
Organizations: The Context of Information Systems | 53 | ||
When Things Go Wrong:\rTechnology Addiction | 56 | ||
The Dual Nature of Information Systems | 57 | ||
Case in Point: An Information System Gone Awry: Outages Outrage Gamers | 57 | ||
Case in Point: An Information System That Works: FedEx | 57 | ||
Information Systems for Competitive Advantage | 58 | ||
Ethical Dilemma:\rThe Social and Environmental Costs of the Newest Gadgets | 59 | ||
IS Ethics | 60 | ||
Information Privacy | 60 | ||
Intellectual Property | 64 | ||
The Need for a Code of Ethical Conduct | 65 | ||
Industry Analysis:\rBusiness Career Outlook | 66 | ||
Key Points Review | 67 | ||
Key Terms | 67 | ||
Review Questions | 68 | ||
Self-Study Questions | 68 | ||
Problems and Exercises | 69 | ||
Application Exercises | 70 | ||
Team Work Exercise | 70 | ||
Answers to the Self-Study Questions | 71 | ||
Case 1: Apple | 72 | ||
Case\r2: Healthcare IS | 73 | ||
Chapter\r2: Gaining Competitive Advantage Through Information Systems | 76 | ||
Managing in the Digital World: Startups and New Business Models | 76 | ||
Enabling Organizational Strategy through Information Systems | 78 | ||
Organizational Decision-Making Levels | 78 | ||
Organizational Functional Areas | 80 | ||
Information Systems for Automating: Doing Things Faster | 81 | ||
Information Systems for Organizational Learning: Doing Things Better | 83 | ||
Information Systems for Supporting Strategy: Doing Things Smarter | 84 | ||
Identifying Where to Compete: Analyzing Competitive Forces | 84 | ||
Identifying How to Compete: Choosing a Generic Strategy | 85 | ||
Identifying How to Compete: Resources and Capabilities | 86 | ||
Green It\r: The Electric Navy | 87 | ||
Identifying How to Compete: Analyzing the Value Chain | 88 | ||
The Role of Information Systems in Value Chain Analysis | 88 | ||
The Technology/Strategy Fit | 89 | ||
Business Models in the Digital World | 89 | ||
Who's Goinhg Mobile:\rDigital Nomads | 90 | ||
Revenue Models in the Digital World | 90 | ||
When Things Go Wrong:\rThe Pains of Uber in China | 93 | ||
Platform-Based Business Models and the Sharing Economy | 93 | ||
Service-Based Business Models | 95 | ||
Ethical Dilemma:\rThe Ethics of the Sharing Economy | 96 | ||
Valuing Innovations | 97 | ||
The Need for Constant IS Innovation | 99 | ||
Successful Innovation Is Difficult | 100 | ||
Open Innovation | 101 | ||
Organizational Requirements for Innovation | 102 | ||
Coming Attractions:\rThe CITE Project | 103 | ||
The Innovation Process | 103 | ||
Security Matters:\rThe Bangladesh SWIFT Theft | 106 | ||
Startups and Crowdfunding | 106 | ||
Industry Analysis:\rEducation | 108 | ||
Key Points Review | 109 | ||
Key Terms | 109 | ||
Review Questions | 110 | ||
Self-Study Questions | 110 | ||
Problems and Exercises | 111 | ||
Application Exercises | 112 | ||
Team Work Exercise | 112 | ||
Answers to the Self-Study Questions | 112 | ||
Case 1:\rLinkedIn | 113 | ||
Case 2:\rStreaming Video | 114 | ||
Chapter 3: Managing the Information Systems Infrastructure and Services | 118 | ||
Managing in the Digital World: From Google to Alphabet | 118 | ||
The IS Infrastructure | 120 | ||
Who’s Going Mobile: Mobile Payments Are Transforming Developing Countries | 122 | ||
Applications and Databases Supporting Business Processes | 124 | ||
Ethical Dilemma:\rPutting People’s Lives Online | 125 | ||
IS Infrastructure Components | 126 | ||
Hardware | 126 | ||
System Software | 128 | ||
Storage | 130 | ||
Coming Attractions:\rMaking Death Optional? | 130 | ||
Networking | 131 | ||
Green It:\rAlphabet Renewables | 137 | ||
Data Centers | 139 | ||
Issues Associated with Managing the IS Infrastructure | 140 | ||
Rapid Obsolescence and Shorter IT Cycles | 140 | ||
Big Data and Rapidly Increasing Storage Needs | 143 | ||
Demand Fluctuations | 143 | ||
Increasing Energy Needs | 144 | ||
Cloud Computing | 144 | ||
When Things Go Wrong:\rOld and Dirty Energy Drives Global Internet Growth | 145 | ||
What Is Cloud Computing? | 145 | ||
Managing the Cloud | 149 | ||
Advanced Cloud Applications | 152 | ||
Security Matters:\rCar Hacking | 154 | ||
Green Computing | 157 | ||
Industry Analysis:\rMovie Industry | 158 | ||
Key Points Review | 159 | ||
Key Terms | 159 | ||
Review Questions | 160 | ||
Self-Study Questions | 160 | ||
Problems and Exercises | 161 | ||
Application Exercises | 162 | ||
Team Work Exercise | 162 | ||
Answers to the Self-Study Questions | 163 | ||
Case\r1: DBS Singapore Moves to the Cloud | 163 | ||
Case 2:\rThe Dark Web | 164 | ||
Chapter 4: Enabling Business-to-Consumer Electronic Commerce | 166 | ||
Managing in the Digital World:\rTaobao and the World of E-commerce | 166 | ||
E-Commerce and E-Government | 168 | ||
Types of Electronic Commerce | 168 | ||
E-government | 169 | ||
E-finance | 170 | ||
Business-To-Consumer E-Commerce | 171 | ||
Coming Attractions:\rThe AI Hedge Fund | 172 | ||
E-tailing: Capabilities and Opportunities | 174 | ||
Benefits of E-tailing | 177 | ||
Ethical Dilemma:\rThe Ethics of Reputation Management | 178 | ||
Drawbacks of E-tailing | 179 | ||
Electronic Commerce Websites and Internet Marketing | 179 | ||
Designing Websites to Meet Online Consumers’ Needs | 180 | ||
Security Matters:\rToo Small to Be Hacked? | 180 | ||
Internet Marketing | 182 | ||
When Things Go Wrong:\rBuying Likes | 186 | ||
Mobile Commerce, Consumer-To-Consumer EC, and Consumer-To-Business EC | 187 | ||
C2C EC | 189 | ||
C2B EC | 190 | ||
Securing Payments and Navigating Legal Issues in EC | 191 | ||
Securing Payments in the Digital World | 191 | ||
Green It\r: Green Online Shopping | 192 | ||
Who's Goinhg Mobile:\rMobile Payments | 193 | ||
Legal Issues in EC | 196 | ||
Industry Analysis:\rRetailing | 199 | ||
Key Points Review | 200 | ||
Key Terms | 200 | ||
Review Questions | 201 | ||
Self-Study Questions | 201 | ||
Problems and Exercises | 202 | ||
Application Exercises | 203 | ||
Team Work Exercise | 203 | ||
Answers to the Self-Study Questions | 204 | ||
Case 1:\rWeb Analytics | 205 | ||
Case 2:\rRocket Internet—Cloning Business Models | 206 | ||
Chapter 5:\rEnhancing Organizational Communication and Collaboration Using Social Media | 210 | ||
Managing in the Digital World:\rFacebook | 210 | ||
The Need for Communication and Collaboration | 212 | ||
Virtual Teams | 212 | ||
Groupware | 213 | ||
Videoconferencing | 214 | ||
Green It\r: Green IT Fueling Renewable Energy | 216 | ||
Intranets and Employee Portals | 216 | ||
The Evolving Web | 218 | ||
Coming Attractions:\rDissolvable Electronics | 219 | ||
Evolving Web Capabilities | 219 | ||
Evolving Social Interaction | 220 | ||
The Evolving Workspace | 221 | ||
Future Web Capabilities | 221 | ||
Social Media and the Enterprise | 222 | ||
Enhancing Communication Using Social Media | 222 | ||
Enhancing Cooperation with Social Media | 225 | ||
Security Matters:\rTerrorism Is Winning the Social Media Battle | 228 | ||
Enhancing Collaboration with Social Media | 229 | ||
Who's Going\rMobile: Going SoLoMo: Yelp | 231 | ||
Enhancing Connection with Social Media | 233 | ||
Ethical Dilemma:\rAnonymity, Trolling, and Cyberharassment | 235 | ||
Managing Social Media Applications in the Enterprise | 236 | ||
Organizational Issues | 236 | ||
When Things Go Wrong:\rCrowdfunding Failures | 238 | ||
Downsides and Dangers of using Social Media Applications | 239 | ||
Industry Analysis:\rOnline Travel | 241 | ||
Key Points Review | 242 | ||
Key Terms | 242 | ||
Review Questions | 243 | ||
Self-Study Questions | 243 | ||
Problems and Exercises | 244 | ||
Application Exercises | 244 | ||
Team Work Exercise | 245 | ||
Answers to the Self-Study Questions | 246 | ||
Case 1:\rLiving in a Bubble: Facebook, Newsfeeds, and Journalism | 246 | ||
Case 2:\rLike Farming and Clickbait | 247 | ||
Chapter 6: Enhancing Business Intelligence Using Big Data and Analytics | 252 | ||
Managing in the Digital World:\rIntelligence Through Drones | 252 | ||
Enhancing Organizational Decision Making | 254 | ||
Why Organizations Need Business Intelligence and Advanced Analytics | 254 | ||
Green It\r: Big Data, Internet of Things, and Analytics Fuel Greener Facilities | 257 | ||
Databases: Providing Inputs into Business Intelligence and Advanced Analytics | 257 | ||
When Things Go Wrong:\rTwitter Fever—Look Before You Tweet | 261 | ||
Coming Attractions:\rEmotion Aware Gaming | 267 | ||
Business Intelligence and Advanced Analytics | 267 | ||
Business Intelligence | 268 | ||
Who's Goinhg Mobile:\rIdentifying Malaria Hotspots | 273 | ||
Advanced Analytics | 273 | ||
Ethical Dilemma:\rOrwellian Internet of Things | 275 | ||
Security Matters:\rHacktivists Versus Fembots: The Ashley Madison Case | 281 | ||
Knowledge Management and Geographic Information Systems | 282 | ||
Knowledge Management Systems | 282 | ||
Geographic Information Systems | 285 | ||
Industry Analysis:\rHealthcare | 288 | ||
Key Points Review | 289 | ||
Key Terms | 289 | ||
Review Questions | 290 | ||
Self-Study Questions | 290 | ||
Problems and Exercises | 291 | ||
Application Exercises | 292 | ||
Team Work Exercise | 293 | ||
Answers to the Self-Study Questions | 293 | ||
Case 1:\rData Analytics in HealthCare | 293 | ||
Case\r2: Gathering Social Intelligence | 294 | ||
Chapter 7: Enhancing Business Processes Using Enterprise Information Systems | 298 | ||
Managing in the Digital World\r: Amazon.com | 298 | ||
Core Business Processes and Organizational: Value Chains | 300 | ||
Core Business Processes | 300 | ||
Organizational Activities Along the Value Chain | 302 | ||
Green It\r: Why Your Enterprise Systems Should Be in the Cloud | 305 | ||
Value Systems: Connecting Multiple Organizational Value Chains | 307 | ||
Enterprise Systems | 307 | ||
The Rise of Enterprise Systems | 308 | ||
Supporting Business Processes | 309 | ||
Ethical Dilemma:\rToo Much Intelligence? RFID and Privacy | 310 | ||
Coming Attractions:\rThe Internet of Things Will Transform ERP and Organizations | 313 | ||
Enterprise Resource Planning | 316 | ||
Responding to Compliance and Regulatory Demands | 317 | ||
Choosing an ERP System | 317 | ||
Security Matters:\rTo Update or Not to Update, That Shouldn’t Be the Question | 318 | ||
Enabling Business Processes Using ERP Core Components | 319 | ||
ERP Installation | 322 | ||
ERP Limitations | 322 | ||
Achieving Enterprise System Success | 322 | ||
Who's Goinhg Mobile:\rBig ERP Systems Embracing Small Mobile Devices | 323 | ||
Secure Executive Sponsorship | 323 | ||
Get Help from Outside Experts | 324 | ||
Thoroughly Train Users | 324 | ||
Take a Multidisciplinary Approach to Implementations | 324 | ||
Evolve the Implementation | 324 | ||
When Things Go Wrong:\rSoftware Error Frees Prisoners Early and Is Linked to Killings | 325 | ||
Industry Analysis:\rThe Automobile Industry | 326 | ||
Key Points Review | 327 | ||
Key Terms | 327 | ||
Review Questions | 328 | ||
Self-Study Questions | 328 | ||
Problems and Exercises | 329 | ||
Application Exercises | 330 | ||
Team Work Exercise | 330 | ||
Answers to the Self-Study Questions | 330 | ||
Case 1:\rSoftware as a Service: ERP by the Hour | 331 | ||
Case 2:\rTH Milk Vietnam Adopts Cloud ERP | 332 | ||
Chapter 8:\rStrengthening Business-to-Business Relationships via Supply Chain and Customer Relationship Management | 334 | ||
Managing in the Digital World\r: Walmart | 334 | ||
Supply Chain Management | 336 | ||
What Is a Supply Chain? | 336 | ||
Business-to-Business Electronic Commerce: Exchanging Data in Supply Networks | 336 | ||
Managing Complex Supply Networks | 339 | ||
Benefits of Effectively Managing Supply Chains | 340 | ||
Optimizing the Supply Chain Through Supply Chain Management | 342 | ||
When Things Go Wrong:\rSpaceX Rocket Failure due to Supply Chain Failure | 343 | ||
Developing an SCM Strategy | 344 | ||
Green It:\rNike’s Green Supply Chain | 345 | ||
Supply Chain Planning | 345 | ||
Supply Chain Execution | 346 | ||
Supply Chain Visibility and Analytics | 349 | ||
Customer Relationship Management | 349 | ||
Coming Attractions:\rAugmenting Supply Chain Success | 350 | ||
Security Matters:\rDisclosing the Customer Data of the Most Vulnerable | 353 | ||
Developing a CRM Strategy | 353 | ||
Architecture of a CRM System | 354 | ||
Who's Goinhg Mobile:\rDeveloping a Mobile CRM App for Customers | 358 | ||
Ethical Dilemma:\rWhen Algorithms Discriminate | 362 | ||
Ethical Concerns with CRM | 363 | ||
Industry Analysis:\rManufacturing | 363 | ||
Key Points Review | 364 | ||
Key Terms | 364 | ||
Review Questions | 365 | ||
Self-Study Questions | 365 | ||
Problems and Exercises | 366 | ||
Application Exercises | 367 | ||
Team Work Exercise | 367 | ||
Answers to the Self-Study Questions | 367 | ||
Case 1:\rSupply Chain Havoc | 368 | ||
Case\r2: Efficiently Delivering Products Over the “Last Mile” | 369 | ||
Chapter 9:\rDeveloping and Acquiring Information Systems | 372 | ||
Managing in the Digital World:\rThe Maker Movement | 372 | ||
Making the Business Case | 374 | ||
Business Case Objectives | 374 | ||
The Productivity Paradox | 374 | ||
Making a Successful Business Case | 376 | ||
Green It:\rProject Natick—Microsoft’s Underwater Data Centers | 378 | ||
Coming Attractions:\rHarvesting Human Energy | 380 | ||
Presenting the Business Case | 382 | ||
Ethical Dilemma:\rEthical App Development | 384 | ||
The Systems Development Process | 385 | ||
Custom Versus Off-the-Shelf Software | 385 | ||
Open Source Software | 386 | ||
Systems Integration: Combining Custom, Open Source, and Off-the-Shelf Systems | 387 | ||
IS Development in Action | 387 | ||
The Role of Users in the Systems Development Process | 389 | ||
Systems Development Controls | 389 | ||
Steps in the Systems Development Process | 389 | ||
Who's Goinhg Mobile:\rCreating Mobile Apps | 390 | ||
Phase 1: Systems Planning and Selection | 390 | ||
Phase 2: Systems Analysis | 391 | ||
Phase 3: Systems Design | 394 | ||
Phase 4: Systems Implementation and Operation | 395 | ||
Repeating the SDLC: Systems Maintenance | 397 | ||
Security Matters:\rMobile Cybercrime | 399 | ||
Other Approaches to Designing and Building Systems | 399 | ||
Acquiring Information Systems | 401 | ||
External Acquisition | 401 | ||
When Things Go Wrong:\rTop Security Threats | 402 | ||
Outsourcing Systems Development | 406 | ||
Industry Analysis:\rBroadcasting | 408 | ||
Key Points Review | 409 | ||
Key Terms | 409 | ||
Review Questions | 410 | ||
Self-Study Questions | 410 | ||
Problems and Exercises | 411 | ||
Application Exercises | 412 | ||
Team Work Exercise | 412 | ||
Answers to the Self-Study Questions | 413 | ||
Case\r1: Next Generation Identification: FBI, ICE Databases Expand and Join Forces | 414 | ||
Case\r2: Big Data, Hadoop, Map Reduce | 415 | ||
Chapter\r10: Securing Information Systems | 418 | ||
Managing in the Digital World:\rNot So “Anonymous”—Activists, Hacktivists, or Just Plain Criminals? | 418 | ||
Computer Crime | 420 | ||
Hacking and Cracking | 420 | ||
Types of Computer Criminals and Crimes | 420 | ||
Green It:\rAnonymous Protests the Killing of Dolphins and Whales in Japan | 424 | ||
Computer Viruses and Other Destructive Code | 425 | ||
When Things Go Wrong:\rThe Bug That Almost Killed the Internet | 430 | ||
Cyberharassment, Cyberstalking, and Cyberbullying | 432 | ||
Software Piracy | 432 | ||
Cybersquatting | 434 | ||
Laws Against Computer Crime | 434 | ||
Cyberwar and Cyberterrorism | 435 | ||
Who's Goinhg Mobile:\rBackdoors in Every Mobile Phone? | 436 | ||
Cyberwar | 436 | ||
Cyberterrorism | 437 | ||
Ethical Dilemma:\rEthics and Cyberwar: Just Because We Can, Should We? | 440 | ||
Managing Information Systems Security | 440 | ||
Assessing Risks | 442 | ||
Developing a Security Strategy | 444 | ||
Implementing Controls and Training | 446 | ||
Security Matters:\rBack to the Future: Analog May Be the Future of Securing Critical Infrastructure | 447 | ||
Coming Attractions:\rCan You Become Your Password? | 453 | ||
Monitoring Security | 456 | ||
Industry Analysis:\rCybercops Track Cybercriminals | 459 | ||
Key Points Review | 460 | ||
Key Terms | 460 | ||
Review Questions | 461 | ||
Self-Study Questions | 461 | ||
Problems and Exercises | 462 | ||
Application Exercises | 464 | ||
Team Work Exercise | 464 | ||
Answers to the Self-Study Questions | 465 | ||
Case 1:\rSingPass: E-Government Security | 466 | ||
Case\r2: China’s Great (Fire) Wall | 467 | ||
Technology Briefing:\rFoundations of Information Systems Infrastructure | 470 | ||
Foundational Topics in IS Hardware | 471 | ||
Input Technologies | 471 | ||
Processing: Transforming Inputs into Outputs | 473 | ||
Output Technologies | 477 | ||
Foundational Topics in IS Software | 478 | ||
System Software | 479 | ||
Programming Languages and Development Environments | 479 | ||
Foundational Topics in Networking | 485 | ||
Evolution of Computer Networking | 485 | ||
Types of Networks | 487 | ||
Packet Switching | 490 | ||
Network Standards and Protocols | 490 | ||
Network Technologies | 494 | ||
The Internet | 500 | ||
Foundational Topics in Database Management | 506 | ||
Relational Database Design | 506 | ||
Advanced Database Models | 511 | ||
Key Points Review | 511 | ||
Key Terms | 512 | ||
Review Questions | 513 | ||
Self-Study Questions | 514 | ||
Problems and Exercises | 515 | ||
Answers to the Foundational Hardware Self-Study Questions | 517 | ||
Answers to the Foundational Software Self-Study Questions | 517 | ||
Answers to the Foundational Networking Self-Study Questions | 517 | ||
Answers to the Foundational Database Self-Study Questions | 517 | ||
Acronyms | 519 | ||
Glossary | 521 | ||
Name Index | 541 | ||
Organization Index | 542 | ||
Subject Index | 545 | ||
Back Cover | Back Cover |