Cover
Copyright
About the Authors
Brief Contents
Contents
Preface
1: Managing in the Digital World
Managing in the Digital World: Open Innovation
Information Systems Today
The Emergence of the Digital World
Globalization and Societal Issues in the Digital World
Coming Attractions: Memory Crystals
Five IT Megatrends That Shape the Digital Future
Who's Going Mobile: Wearable Technologies
Green IT: The Green Internet of Things
Information Systems Defined
Data: The Root and Purpose of Information Systems
Hardware, Software, and Telecommunications Networks: The Components of Information Systems
People: The Builders, Managers, and Users of Information Systems
Security Matters: Ransomware
Organizations: The Context of Information Systems
When Things Go Wrong: Technology Addiction
The Dual Nature of Information Systems
Case in Point: An Information System Gone Awry: Outages Outrage Gamers
Case in Point: An Information System That Works: FedEx
Information Systems for Competitive Advantage
Ethical Dilemma: The Social and Environmental Costs of the Newest Gadgets
IS Ethics
Information Privacy
Intellectual Property
The Need for a Code of Ethical Conduct
Industry Analysis: Business Career Outlook
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Apple
Case 2: Healthcare IS
References
2: Gaining Competitive Advantage Through Information Systems
Managing in the Digital World: Startups and New Business Models
Enabling Organizational Strategy through Information Systems
Organizational Decision-Making Levels
Organizational Functional Areas
Information Systems for Automating: Doing Things Faster
Information Systems for Organizational Learning: Doing Things Better
Information Systems for Supporting Strategy: Doing Things Smarter
Identifying Where to Compete: Analyzing Competitive Forces
Identifying How to Compete: Choosing a Generic Strategy
Identifying How to Compete: Resources and Capabilities
Green IT: The Electric Navy
Identifying How to Compete: Analyzing the Value Chain
The Role of Information Systems in Value Chain Analysis
The Technology/Strategy Fit
Business Models in the Digital World
Who's Going Mobile: Digital Nomads
Revenue Models in the Digital World
When Things Go Wrong: The Pains of Uber in China
Platform-Based Business Models and the Sharing Economy
Service-Based Business Models
Ethical Dilemma: The Ethics of the Sharing Economy
Valuing Innovations
The Need for Constant IS Innovation
Successful Innovation Is Difficult
Open Innovation
Organizational Requirements for Innovation
Coming Attractions: The CITE Project
The Innovation Process
Security Matters: The Bangladesh SWIFT Theft
Startups and Crowdfunding
Industry Analysis: Education
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Groupon
Case 2: Streaming Video
References
3: Managing the Information Systems Infrastructure and Services
Managing in the Digital World: From Google to Alphabet
The IS Infrastructure
Who's Going Mobile: Mobile Payments Are Transforming Developing Countries
Applications and Databases Supporting Business Processes
Ethical Dilemma: Putting People’s Lives Online
IS Infrastructure Components
Hardware
System Software
Storage
Coming Attractions: Making Death Optional?
Networking
Green IT: Alphabet Renewables
Data Centers
Issues Associated with Managing the IS Infrastructure
Rapid Obsolescence and Shorter IT Cycles
Big Data and Rapidly Increasing Storage Needs
Demand Fluctuations
Increasing Energy Needs
Cloud Computing
When Things Go Wrong: Old and Dirty Energy Drives Global Internet Growth
What Is Cloud Computing?
Managing the Cloud
Advanced Cloud Applications
Security Matters: Car Hacking
Green Computing
Industry Analysis: Movie Industry
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: A Catalyst for Innovation: Amazon Web Services
Case 2: The Dark Web
References
4: Enabling Business-To-Consumer Electronic Commerce
Managing in the Digital World: Taobao and the World of E-Commerce
E-Commerce and E-Government
Types of Electronic Commerce
E-Government
E-Finance
Business-To-Consumer E-Commerce
Coming Attractions: The AI Hedge Fund
E-Tailing: Capabilities and Opportunities
Benefits of E-Tailing
Ethical Dilemma: The Ethics of Reputation Management
Drawbacks of E-Tailing
Electronic Commerce Websites and Internet Marketing
Designing Websites to Meet Online Consumers’ Needs
Security Matters: Too Small to Be Hacked?
Internet Marketing
When Things Go Wrong: Buying Likes
Mobile Commerce, Consumer-To-Consumer EC, and Consumer-To-Business EC
C2C EC
C2B EC
Securing Payments and Navigating Legal Issues in EC
Securing Payments in the Digital World
Green IT: Green Online Shopping
Who's Going Mobile: Mobile Payments
Legal Issues in EC
Industry Analysis: Retailing
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Web Analytics
Case 2: Rocket Internet—Cloning Business Models
References
5: Enhancing Organizational Communication and Collaboration Using Social Media
Managing in the Digital World: Facebook
The Need for Communication and Collaboration
Virtual Teams
Groupware
Videoconferencing
Green IT: Green IT Fueling Renewable Energy
Intranets and Employee Portals
The Evolving Web
Coming Attractions: Dissolvable Electronics
Evolving Web Capabilities
Evolving Social Interaction
The Evolving Workspace
Future Web Capabilities
Social Media and the Enterprise
Enhancing Communication Using Social Media
Enhancing Cooperation with Social Media
Security Matters: Terrorism Is Winning the Social Media Battle
Enhancing Collaboration with Social Media
Who's Going Mobile: Going SoLoMo: Yelp
Enhancing Connection with Social Media
Ethical Dilemma: Anonymity, Trolling, and Cyberharassment
Managing Social Media Applications in the Enterprise
Organizational Issues
When Things Go Wrong: Crowdfunding Failures
Downsides and Dangers of using Social Media Applications
Industry Analysis: Online Travel
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Living in a Bubble: Facebook, Newsfeeds, and Journalism
Case 2: Like Farming and Clickbait
References
6: Enhancing Business Intelligence Using Big Data and Analytics
Managing in the Digital World: Intelligence Through Drones
Enhancing Organizational Decision Making
Why Organizations Need Business Intelligence and Advanced Analytics
Green IT: Big Data, Internet of Things, and Analytics Fuel Greener Facilities
Databases: Providing Inputs into Business Intelligence and Advanced Analytics
When Things Go Wrong: Twitter Fever—Look Before You Tweet
Coming Attractions: Emotion Aware Gaming
Business Intelligence and Advanced Analytics
Business Intelligence
Who's Going Mobile: Identifying Malaria Hotspots
Advanced Analytics
Ethical Dilemma: Orwellian Internet of Things
Security Matters: Hacktivists Versus Fembots: The Ashley Madison Case
Knowledge Management and Geographic Information Systems
Knowledge Management Systems
Geographic Information Systems
Industry Analysis: Healthcare
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: NSA: National Surveillance Agency?
Case 2: Gathering Social Intelligence
References
7: Enhancing Business Processes Using Enterprise Information Systems
Managing in the Digital World: Amazon.com
Core Business Processes and Organizational Value Chains
Core Business Processes
Organizational Activities Along the Value Chain
Green IT: Why Your Enterprise Systems Should Be in the Cloud
Value Systems: Connecting Multiple Organizational Value Chains
Enterprise Systems
The Rise of Enterprise Systems
Supporting Business Processes
Ethical Dilemma: Too Much Intelligence? RFID and Privacy
Coming Attractions: The Internet of Things Will Transform ERP and Organizations
Enterprise Resource Planning
Responding to Compliance and Regulatory Demands
Choosing an ERP System
Security Matters: To Update or Not to Update, That Shouldn’t Be the Question
Enabling Business Processes Using ERP Core Components
ERP Installation
ERP Limitations
Achieving Enterprise System Success
Who's Going Mobile: Big ERP Systems Embracing Small Mobile Devices
Secure Executive Sponsorship
Get Help from Outside Experts
Thoroughly Train Users
Take a Multidisciplinary Approach to Implementations
Evolve the Implementation
When Things Go Wrong: Software Error Frees Prisoners Early and Is Linked to Killings
Industry Analysis: The Automobile Industry
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Software as a Service: ERP by the Hour
Case 2: Amazon’s Order Fulfillment, Automation, and Technological Unemployment
References
8: Strengthening Business-to-Business Relationships via Supply Chain and Customer Relationship Management
Managing in the Digital World: Walmart
Supply Chain Management
What is a Supply Chain?
Business-to-Business Electronic Commerce: Exchanging Data in Supply Networks
Managing Complex Supply Networks
Benefits of Effectively Managing Supply Chains
Optimizing the Supply Chain Through Supply Chain Management
When Things Go Wrong: SpaceX Rocket Failure due to Supply Chain Failure
Developing an SCM Strategy
Green IT: Nike’s Green Supply Chain
Supply Chain Planning
Supply Chain Execution
Supply Chain Visibility and Analytics
Customer Relationship Management
Coming Attractions: Augmenting Supply Chain Success
Security Matters: Disclosing the Customer Data of the Most Vulnerable
Developing a CRM Strategy
Architecture of a CRM System
Who's Going Mobile: Developing a Mobile CRM App for Customers
Ethical Dilemma: When Algorithms Discriminate
Ethical Concerns with CRM
Industry Analysis: Manufacturing
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Supply Chain Havoc
Case 2: Efficiently Delivering Products Over the “Last Mile”
References
9: Developing and Acquiring Information Systems
Managing in the Digital World: The Maker Movement
Making the Business Case
Business Case Objectives
The Productivity Paradox
Making a Successful Business Case
Green IT: Project Natick—Microsoft’s Underwater Data Centers
Coming Attractions: Harvesting Human Energy
Presenting the Business Case
Ethical Dilemma: Ethical App Development
The Systems Development Process
Custom Versus Off-the-Shelf Software
Open Source Software
Systems Integration: Combining Custom, Open Source, and Off-the-Shelf Systems
IS Development in Action
The Role of Users in the Systems Development Process
Systems Development Controls
Steps in the Systems Development Process
Who's Going Mobile: Creating Mobile Apps
Phase 1: Systems Planning and Selection
Phase 2: Systems Analysis
Phase 3: Systems Design
Phase 4: Systems Implementation and Operation
Repeating the SDLC: Systems Maintenance
Security Matters: Mobile Cybercrime
Other Approaches to Designing and Building Systems
Acquiring Information Systems
External Acquisition
When Things Go Wrong: Top Security Threats
Outsourcing Systems Development
Industry Analysis: Broadcasting
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Next Generation Identification: FBI, ICE Databases Expand and Join Forces
Case 2: Big Data, Hadoop, Map Reduce
References
10: Securing Information Systems
Managing in the Digital World: Not So “Anonymous”—Activists, Hacktivists, or Just Plain Criminals?
Computer Crime
Hacking and Cracking
Types of Computer Criminals and Crimes
Green IT: Anonymous Protests the Killing of Dolphins and Whales in Japan
Computer Viruses and Other Destructive Code
When Things Go Wrong: The Bug That Almost Killed the Internet
Cyberharassment, Cyberstalking, and Cyberbullying
Software Piracy
Cybersquatting
Laws Against Computer Crime
Cyberwar and Cyberterrorism
Who's Going Mobile: Backdoors in Every Mobile Phone?
Cyberwar
Cyberterrorism
Ethical Dilemma: Ethics and Cyberwar: Just Because We Can, Should We?
Managing Information Systems Security
Assessing Risks
Developing a Security Strategy
Implementing Controls and Training
Security Matters: Back to the Future: Analog May Be the Future of Securing Critical Infrastructure
Coming Attractions: Can You Become Your Password?
Monitoring Security
Industry Analysis: Cybercops Track Cybercriminals
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Application Exercises
Team Work Exercise
Answers to the Self-Study Questions
Case 1: Stopping Insider Threats: Edward Snowden and the NSA
Case 2: China’s Great (Fire) Wall
References
Technology Briefing: Foundations of Information Systems Infrastructure
Foundational Topics in IS Hardware
Input Technologies
Processing: Transforming Inputs into Outputs
Output Technologies
Foundational Topics in IS Software
System Software
Programming Languages and Development Environments
Foundational Topics in Networking
Evolution of Computer Networking
Types of Networks
Packet Switching
Network Standards and Protocols
Network Technologies
The Internet
Foundational Topics in Database Management
Relational Database Design
Advanced Database Models
Key Points Review
Key Terms
Review Questions
Self-Study Questions
Problems and Exercises
Answers to the Foundational Hardware Self-Study Questions
Answers to the Foundational Software Self-Study Questions
Answers to the Foundational Networking Self-Study Questions
Answers to the Foundational Database Self-Study Questions
References
Acronyms
Glossary
Name Index
Organization Index
Subject Index
Back Cover