Menu Expand
Using MIS, Global Edition

Using MIS, Global Edition

David M. Kroenke | Randall J. Boyle

(2017)

Additional Information

Book Details

Abstract

For courses in MIS.

 

Help your students master the most important business course they'll take

Technology is rapidly changing the way organizations do business–and knowledge of MIS is critical to keeping up. Comprehensive and up-to-date, Using MIS shows students how organizations use information systems to solve business problems every day. The 10th Edition now includes new content on using virtual reality and artificial intelligence, along with 11 new Career Guides, five new Ethics Guides, and five new Security Guides.  


Pearson MyLabTM MIS not included. Students, if MyLab is a recommended/mandatory component of the course, please ask your instructor for the correct ISBN and course ID. MyLab should only be purchased when required by an instructor. Instructors, contact your Pearson rep for more information.


Pearson MyLabTM MIS is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Within its structured environment, students practice what they learn, test their understanding, and pursue a personalized study plan that helps them better absorb course material and understand difficult concepts.


Table of Contents

Section Title Page Action Price
Cover Cover
Title Page 7
Copyright Page 8
Brief Contents 9
Contents 10
Preface 22
Acknowledgments 30
About the Authors 34
Part 1: Why MIS? 35
1: The Importance of MIS 37
Q1-1. Why Is Introduction to MIS the Most Important Class in the Business School? 39
The Digital Revolution 39
Evolving Capabilities 40
Moore’s Law 40
Metcalfe’s Law 41
Other Forces Pushing Digital Change 42
This Is the Most Important Class in the School of Business 43
Q1-2. How Will MIS Affect Me? 43
How Can I Attain Job Security? 43
How Can Intro to MIS Help You Learn Nonroutine Skills? 44
What Is the Bottom Line? 48
Q1-3. What Is MIS? 48
Components of an Information System 48
Management and Use of Information Systems 49
Achieving Strategies 50
Q1-4. How Can You Use the Five-Component Model? 50
The Most Important Component—You 51
All Components Must Work 51
High-Tech Versus Low-Tech Information Systems 51
So What? A Is for Alphabet 52
Understanding the Scope of New Information Systems 53
Components Ordered by Difficulty and Disruption 53
Q1-5. What Is Information? 53
Definitions Vary 54
Where Is Information? 54
Q1-6. What Are Necessary Data Characteristics? 55
Accurate 55
Timely 55
Relevant 56
Just Barely Sufficient 56
Worth Its Cost 56
Q1-7. 2027? 56
Ethics Guide: Ethics and Professional Responsibility 57
Security Guide: Passwords and Password Etiquette 60
Career Guide: Five-Component Careers 62
Case Study 1: Tesco 67
2: Collaboration Information Systems 71
Q2-1. What Are the Two Key Characteristics Collaboration? 73
Importance of Constructive Criticism 74
Guidelines for Giving and Receiving Constructive Criticism 74
Warning! 75
Q2-2. What Are Three Criteria for Successful Collaboration? 76
Successful Outcome 76
Growth in Team Capability 77
Meaningful and Satisfying Experience 77
Q2-3. What Are the Four Primary Purposes of Collaboration? 77
Becoming Informed 78
Making Decisions 78
Solving Problems 80
Managing Projects 80
Q2-4. What Are the Requirements for a Collaboration Information System? 82
The Five Components of an IS for Collaboration 82
Primary Functions: Communication and Content Sharing 83
Q2-5. How Can You Use Collaboration Tools to Improve Team Communication? 83
Q2-6. How Can You Use Collaboration Tools to Manage Shared Content? 87
Shared Content with No Control 89
Shared Content with Version Management on Google Drive 89
Shared Content with Version Control 92
Ethics Guide: Big Brother Wearables 94
Q2-7. How Can You Use Collaboration Tools to Manage Tasks? 96
Sharing a Task List on Google Drive 96
Sharing a Task List Using Microsoft SharePoint 96
So What? Augmented Collaboration 97
Q2-8. Which Collaboration IS Is Right for Your Team? 99
Three Sets of Collaboration Tools 100
Choosing the Set for Your Team 101
Don’t Forget Procedures and People! 102
Q2-9. 2027? 103
Security Guide: Evolving Security 104
Career Guide: Software Product Manager 106
Case Study 2: Eating Our Own Dog Food 109
3: Strategy and Information Systems 115
Q3-1. How Does Organizational Strategy Determine Information Systems Structure? 117
Q3-2. What Five Forces Determine Industry Structure? 118
Q3-3. How Does Analysis of Industry Structure Determine Competitive Strategy? 119
Ethics Guide: The Lure of Love Bots 120
Q3-4. How Does Competitive Strategy Determine Value Chain Structure? 122
Primary Activities in the Value Chain 122
Support Activities in the Value Chain 123
Value Chain Linkages 123
Q3-5. How Do Business Processes Generate Value? 124
Q3-6. How Does Competitive Strategy Determine Business Processes and the Structure of Information Systems? 126
Q3-7. How Do Information Systems Provide Competitive Advantages? 127
Competitive Advantage via Products 127
So What? The Autonomous Race 128
Competitive Advantage via Business Processes 129
How Does an Actual Company Use IS to Create Competitive Advantages? 130
How Does This System Create a Competitive Advantage? 131
Q3-8. 2027? 133
Security Guide: Hacking Smart Things 134
Career Guide: Director of Architecture 137
Case Study 3: The Amazon of Innovation 140
Part 2: Information Technology 145
4: Hardware, Software, and Mobile Systems 147
Q4-1. What Do Business Professionals Need to Know About Computer Hardware? 149
Hardware Components 149
Types of Hardware 150
Computer Data 151
Q4-2. How Can New Hardware Affect Competitive Strategies? 153
Internet of Things 153
Digital Reality Devices 155
Self-driving Cars 156
3D Printing 159
Q4-3. What Do Business Professionals Need to Know About Software? 160
What Are the Major Operating Systems? 161
Virtualization 163
Own Versus License 165
What Types of Applications Exist, and How Do Organizations Obtain Them? 165
What Is Firmware? 166
Q4-4. Is Open Source Software a Viable Alternative? 167
Why Do Programmers Volunteer Their Services? 167
So What? New from CES 2016 168
How Does Open Source Work? 169
So, Is Open Source Viable? 170
Q4-5. What Are the Differences Between Native and Web Applications? 170
Developing Native Applications 170
Developing Web Applications 171
Which Is Better? 173
Q4-6. Why Are Mobile Systems Increasingly Important? 173
Hardware 174
Software 175
Data 175
Ethics Guide: Free Apps For Data 176
Procedures 178
People 178
Q4-7. What Are the Challenges of Personal Mobile Devices at Work? 179
Advantages and Disadvantages of Employee Use of Mobile Systems at Work 179
Survey of Organizational BYOD Policy 180
Q4-8. 2027? 181
Security Guide: Poisoned App-les 182
Career Guide: Technical Account Manager 184
Case Study 4: PSA: Cruising with Information Systems 189
5: Database Processing 193
Q5-1. What Is the Purpose of a Database? 195
Q5-2. What Is a Database? 197
Relationships Among Rows 198
Metadata 199
Ethics Guide: Querying Inequality? 200
Q5-3. What Is a Database Management System (DBMS)? 202
Creating the Database and Its Structures 202
Processing the Database 203
Administering the Database 203
So What? Slick Analytics 204
Q5-4. How Do Database Applications Make Databases More Useful? 206
Traditional Forms, Queries, Reports, and Applications 206
Browser Forms, Reports, Queries, and Applications 208
Multi-user Processing 209
Q5-5. How Are Data Models Used for Database Development? 210
What Is the Entity-Relationship Data Model? 211
Q5-6. How Is a Data Model Transformed into a Database Design? 214
Normalization 215
Representing Relationships 216
Users’ Role in the Development of Databases 218
Q5-7. How Can Falcon Security Benefit from a Database System? 220
Q5-8. 2027? 221
Security Guide: Big Data . . . Losses 222
Career Guide: Database Engineer 224
Case Study 5: Searching for Classic and Vintage Car Parts . . . 228
6: The Cloud 235
Q6-1. Why Are Organizations Moving to the Cloud? 237
Cloud Computing 238
Why Do Organizations Prefer the Cloud? 239
When Does the Cloud Not Make Sense? 240
Q6-2. How Do Organizations Use the Cloud? 241
Resource Elasticity 241
Pooling Resources 242
Over the Internet 243
Cloud Services from Cloud Vendors 243
Content Delivery Networks 246
Using Web Services Internally 247
Q6-3. What Network Technology Supports the Cloud? 248
What Are the Components of a LAN? 249
Ethics Guide: Cloudy Profit? 250
Connecting Your LAN to the Internet 252
Q6-4. How Does the Internet Work? 254
The Internet and the U.S. Postal System 254
Step 1: Assemble Package (Packets) 255
Step 2: Put Name on Package (Domain Names) 255
Step 3: Look Up Address (IP Address) 255
Step 4: Put Address on Package (IP Address on Packet) 256
Step 5: Put Registered Mail Sticker on Package (TCP) 256
Step 6: Ship Package (Packets Transported by Carriers) 257
Q6-5. How Do Web Servers Support the Cloud? 258
Three-Tier Architecture 259
Watch the Three Tiers in Action! 259
Service-Oriented Architecture (SOA) 260
A SOA Analogy 260
SOA for Three-Tier Architecture 262
Internet Protocols 263
TCP/IP Protocol Architecture 263
Q6-6. How Can Falcon Security Use the Cloud? 265
SaaS Services at Falcon Security 265
PaaS Services at Falcon Security 266
IaaS Services at Falcon Security 266
Q6-7. How Can Organizations Use Cloud Services Securely? 266
Virtual Private Networks (VPNs) 267
Using a Private Cloud 267
Using a Virtual Private Cloud 269
So What? Quantum Learning 270
Q6-8. 2027? 271
Security Guide: From Anthem to Anathema 272
Career Guide: Senior Network Manager 275
Case Study 6: Cloud Solutions and Infrastructure That Safely Test for Consumer Risk and Financial Stability 279
Part 3: Using IS for Competitive Advantage 283
7: Processes, Organizations, and Information Systems 285
Q7-1. What Are the Basic Types of Processes? 287
How Do Structured Processes Differ from Dynamic Processes? 288
How Do Processes Vary by Organizational Scope? 289
Q7-2. How Can Information Systems Improve Process Quality? 291
How Can Processes Be Improved? 292
How Can Information Systems Improve Process Quality? 292
Q7-3. How Do Information Systems Eliminate the Problems of Information Silos? 293
What Are the Problems of Information Silos? 294
How Do Organizations Solve the Problems of Information Silos? 295
An Enterprise System for Patient Discharge 296
Q7-4. How Do CRM, ERP, and EAI Support Enterprise Processes? 296
The Need for Business Process Engineering 297
Emergence of Enterprise Application Solutions 297
Customer Relationship Management (CRM) 298
Enterprise Resource Planning (ERP) 299
So What? Workflow Problems 300
Ethics Guide: Paid Deletion 302
Enterprise Application Integration (EAI) 304
Q7-5. What Are the Elements of an ERP System? 306
Hardware 306
ERP Application Programs 307
ERP Databases 307
Business Process Procedures 307
Training and Consulting 308
Industry-Specific Solutions 309
Which Companies Are the Major ERP Vendors? 310
Q7-6. What Are the Challenges of Implementing and Upgrading Enterprise Information Systems? 310
Collaborative Management 310
Requirements Gaps 310
Transition Problems 311
Employee Resistance 311
New Technology 311
Q7-7. How Do Inter-enterprise IS Solve the Problems of Enterprise Silos? 312
Q7-8. 2027? 313
Security Guide: It’s Not Me . . . It’s You 314
Career Guide: IT Technical Manager 316
Case Study 7: A Tale of Two Interorganizational IS 322
8: Social Media Information Systems 327
Q8-1. What Is a Social Media Information System (SMIS)? 329
Three SMIS Roles 329
SMIS Components 332
Q8-2. How Do SMIS Advance Organizational Strategy? 334
Social Media and the Sales and Marketing Activity 334
Social Media and Customer Service 335
Social Media and Inbound and Outbound Logistics 336
Social Media and Manufacturing and Operations 336
Social Media and Human Resources 337
Q8-3. How Do SMIS Increase Social Capital? 337
What Is the Value of Social Capital? 338
How Do Social Networks Add Value to Businesses? 338
Using Social Networking to Increase the Number of Relationships 339
So What? Enhanced Golf Fan 340
Using Social Networks to Increase the Strength of Relationships 341
Using Social Networks to Connect to Those with More Resources 342
Q8-4. How Do (Some) Companies Earn Revenue from Social Media? 343
You Are the Product 343
Revenue Models for Social Media 343
Does Mobility Reduce Online Ad Revenue? 344
Ethics Guide: Synthetic Friends 346
Q8-5. How Do Organizations Develop an Effective SMIS? 347
Step 1: Define Your Goals 348
Step 2: Identify Success Metrics 348
Step 3: Identify the Target Audience 349
Step 4: Define Your Value 349
Step 5: Make Personal Connections 350
Step 6: Gather and Analyze Data 350
Q8-6. What Is an Enterprise Social Network (ESN)? 351
Enterprise 2.0 351
Changing Communication 352
Deploying Successful Enterprise Social Networks 352
Q8-7. How Can Organizations Address SMIS Security Concerns? 353
Managing the Risk of Employee Communication 353
Managing the Risk of Inappropriate Content 354
Q8-8. 2027? 356
Security Guide: Digital is Forever 359
Career Guide: International Content Director 361
Case Study 8: Sedona Social 364
9: Business Intelligence Systems 369
Q9-1. How Do Organizations Use Business Intelligence (BI) Systems? 372
How Do Organizations Use BI? 373
What Are Typical BI Applications? 373
Q9-2. What Are the Three Primary Activities in the BI Process? 375
Using Business Intelligence to Find Candidate Parts 375
Q9-3. How Do Organizations Use Data Warehouses and Data Marts to Acquire Data? 380
Problems with Operational Data 382
Data Warehouses Versus Data Marts 383
Ethics Guide: MIS-diagnosis 384
Q9-4. How Do Organizations Use Reporting Applications? 386
Basic Reporting Operations 386
RFM Analysis 386
Online Analytical Processing (OLAP) 387
Q9-5. How Do Organizations Use Data Mining Applications? 389
Intelligent Machines 390
Unsupervised Data Mining 391
Supervised Data Mining 391
Market-Basket Analysis 392
Decision Trees 393
Q9-6. How Do Organizations Use Big Data Applications? 395
MapReduce 395
So What? BI for Securities Trading? 396
Hadoop 397
Q9-7. What Is the Role of Knowledge Management Systems? 398
What Are Expert Systems? 398
What Are Content Management Systems? 400
What Are the Challenges of Content Management? 400
What Are Content Management Application Alternatives? 401
How Do Hyper-Social Organizations Manage Knowledge? 401
Hyper-Social KM Alternative Media 402
Resistance to Knowledge Sharing 402
Q9-8. What Are the Alternatives for Publishing BI? 403
Characteristics of BI Publishing Alternatives 403
What Are the Two Functions of a BI Server? 404
Q9-9. 2027? 405
Security Guide: Semantic Security 406
Career Guide: Manager, Data and Analytics 408
Case Study 9: Hadoop the Cookie Cutter 412
Part 4: Information Systems Management 415
10: Information Systems Security 417
Q10-1. What Is the Goal of Information Systems Security? 420
The IS Security Threat/Loss Scenario 420
What Are the Sources of Threats? 421
What Types of Security Loss Exist? 422
Goal of Information Systems Security 424
Q10-2. How Big Is the Computer Security Problem? 424
Q10-3. How Should You Respond to Security Threats? 426
Q10-4. How Should Organizations Respond to Security Threats? 428
So What? New from Black Hat 2015 429
Q10-5. How Can Technical Safeguards Protect Against Security Threats? 430
Identification and Authentication 430
Single Sign-on for Multiple Systems 431
Encryption 431
Ethics Guide: Securing Privacy 432
Firewalls 435
Malware Protection 436
Design for Secure Applications 437
Q10-6. How Can Data Safeguards Protect Against Security Threats? 438
Q10-7. How Can Human Safeguards Protect Against Security Threats? 439
Human Safeguards for Employees 439
Human Safeguards for Nonemployee Personnel 441
Account Administration 441
Systems Procedures 443
Security Monitoring 443
Q10-8. How Should Organizations Respond to Security Incidents? 444
Q10-9. 2027? 445
Security Guide: Exhaustive Cheating 446
Career Guide: Senior Consultant 448
Case Study 10: Hitting the Target 452
11: Information Systems Management 457
Q11-1. What Are the Functions and Organization of the IS Department? 459
How Is the IS Department Organized? 460
Security Officers 461
What IS-Related Job Positions Exist? 461
Q11-2. How Do Organizations Plan the Use of IS? 463
Align Information Systems with Organizational Strategy 463
So What? Managing the IS Department 464
Communicate IS Issues to the Executive Group 465
Develop Priorities and Enforce Them Within the IS Department 465
Sponsor the Steering Committee 465
Q11-3. What Are the Advantages and Disadvantages of Outsourcing? 465
Ethics Guide: Training Your Replacement 466
Outsourcing Information Systems 467
International Outsourcing 469
What Are the Outsourcing Alternatives? 470
What Are the Risks of Outsourcing? 471
Q11-4. What Are Your User Rights and Responsibilities? 473
Your User Rights 473
Your User Responsibilities 474
Q11-5. 2027? 475
Security Guide: Watching the Watchers 476
Career Guide: Senior Data Analyst 478
Case Study 11: Automating Labor 481
12: Information Systems Development 485
Q12-1. How Are Business Processes, IS, and Applications Developed? 487
How Do Business Processes, Information Systems, and Applications Differ and Relate? 488
Which Development Processes Are Used for Which? 489
Q12-2. How Do Organizations Use Business Process Management (BPM)? 491
Why Do Processes Need Management? 491
What Are BPM Activities? 492
Q12-3. How Is Business Process Modeling Notation (BPMN) Used to Model Processes? 494
Need for Standard for Business Processing Notation 494
Documenting the As-Is Business Order Process 494
Q12-4. What Are the Phases in the Systems Development Life Cycle (SDLC)? 497
Define the System 499
Ethics Guide: Estimation Ethics 500
Determine Requirements 502
Design System Components 504
System Implementation 505
Maintain System 506
Q12-5. What Are the Keys for Successful SDLC Projects? 507
Create a Work Breakdown Structure 507
Estimate Time and Costs 508
Create a Project Plan 509
Adjust Plan via Trade-offs 510
Manage Development Challenges 512
Q12-6. How Can Scrum Overcome the Problems of the SDLC? 513
So What? Banking on IoT 514
What Are the Principles of Agile Development Methodologies? 515
What Is the Scrum Process? 516
How Do Requirements Drive the Scrum Process? 518
Q12-7. 2027? 520
Fetch! 520
User-Driven Systems 521
Industry Will Push Change 521
Security Guide: Psst. There’s another Way, You Know… 522
Career Guide: Developing Your Personal Brand 524
Case Study 12: When Will We Learn? 529
The International Dimension 532
Application Exercises 553
Glossary 572
Index 589
Back Cover Back Cover