Solution Manual for Business Driven Information Systems 3rd Edition by Baltzan

Original price was: $35.00.Current price is: $26.50.

Solution Manual for Business Driven Information Systems 3rd Edition by Baltzan Digital Instant Download

Category:

This is completed downloadable of Solution Manual for Business Driven Information Systems 3rd Edition by Baltzan

Product Details:

  • ISBN-10 ‏ : ‎ 0073376825
  • ISBN-13 ‏ : ‎ 978-0073376820
  • Author:  Paige Baltzan

Business Driven Information Systems story: Business Driven Information Systems discusses various business initiatives first and how technology supports those initiatives second. The premise for this unique approach is that business initiatives should drive technology choices. Every discussion first addresses the business needs and then addresses the technology that supports those needs. This text provides the foundation that will enable students to achieve excellence in business, whether they major in operations management, manufacturing, sales, marketing, finance, human resources, accounting, or virtually any other business discipline. Business Driven Information Systems is designed to give students the ability to understand how information technology can be a point of strength for an organization.

 

Table of Content:

  1. PART 1 INFORMATION SYSTEMS ARE BUSINESS
  2. CHAPTER 1 BUSINESS INFORMATION SYSTEMS
  3. OPENING CASE STUDY Google: king of search (and therefore information)
  4. SECTION 1.1 // INFORMATION SYSTEMS IN BUSINESS
  5. Business in the information age
  6. Information technology versus information systems
  7. Data, information, business intelligence and knowledge
  8. Data
  9. Information
  10. Business intelligence
  11. Knowledge
  12. Common functional areas in an organisation
  13. A systems-thinking approach to information technology
  14. IT resources
  15. People: IT cultures
  16. People: roles and responsibilities in information technology
  17. The IS team
  18. The gap between business personnel and IT personnel
  19. Fundamental information systems in business
  20. Transaction processing systems
  21. Decision support systems
  22. Strategic support systems
  23. SECTION 1.2 // BUSINESS STRATEGY
  24. Identifying competitive advantages
  25. Porter’s Five Forces Model—evaluating industry attractiveness
  26. Buyer power
  27. Supplier power
  28. Threat of substitute products or services
  29. Threat of new entrants
  30. Rivalry among existing competitors
  31. Using the Five Forces Model to analyse the airline industry
  32. Porter’s three generic strategies—choosing a business focus
  33. Value chain analysis—executing business strategies
  34. Value creation
  35. Global IT
  36. Business in the global environment
  37. CLOSING CASE STUDIES
  38. Closing Case Study 1.1: e-Exam trial at CQU
  39. Closing Case Study 1.2: Apple—complications made simple
  40. Critical business thinking
  41. Apply your knowledge
  42. CHAPTER 2 A BRAVE NEW CONNECTED WORLD
  43. OPENING CASE STUDY Disruptive technologies shape the world
  44. SECTION 2.1 // OUR CONNECTED WORLD
  45. The Web changed the world
  46. The Internet changed business
  47. Benefits of a connected world
  48. Sharing resources
  49. Providing opportunities
  50. Reducing travel
  51. Challenges of a connected world
  52. Security
  53. Legal issues
  54. Social, ethical and political issues
  55. SECTION 2.2 // THE INTERNET AND THE WEB: A TECHNOLOGY REVOLUTION
  56. Disruptive and sustaining technologies
  57. Disruptive versus sustaining technology
  58. A Web evolution
  59. Web 1.0
  60. Web 2.0
  61. Content sharing through open sourcing
  62. User-generated content
  63. Collaboration inside the organisation
  64. Collaboration outside the organisation
  65. Networking communities with Web 2.0 technologies
  66. Web 2.0, social media and business
  67. Blogs
  68. Wikis
  69. Web 3.0
  70. The semantic Web
  71. The Internet of Things
  72. CLOSING CASE STUDIES
  73. Closing Case Study 2.1: Like us on Facebook! The rise of social business innovation
  74. Closing Case Study 2.2: Barcelona Smart City
  75. Critical business thinking
  76. Apply your knowledge
  77. CHAPTER 3 e-BUSINESS AND MOBILE BUSINESS
  78. OPENING CASE STUDY Paywalls and the business future of newspapers
  79. SECTION 3.1 // E-BUSINESS
  80. Advantages of e-business
  81. Expanding global reach
  82. Opening new markets
  83. Reducing costs
  84. Improving operations
  85. Improving effectiveness
  86. e-Business models
  87. Business-to-business (B2B)
  88. Business-to-consumer (B2C)
  89. Consumer-to-business (C2B)
  90. Consumer-to-consumer (C2C)
  91. e-Business forms and revenue-generating strategies
  92. Organisational strategies for e-business
  93. Marketing/sales
  94. Financial services
  95. Procurement
  96. Customer service
  97. Intermediaries
  98. e-Business tools used to connect and communicate
  99. Measuring e-business success
  100. Website metrics
  101. Web analytics
  102. e-Business challenges and benefits
  103. Protecting consumers
  104. Leveraging existing systems
  105. Increasing liability
  106. Providing security
  107. Adhering to taxation rules
  108. Trends in e-business: e-government and m-business
  109. e-Government
  110. SECTION 3.2 // MOBILITY: THE BUSINESS VALUE OF A WIRELESS WORLD
  111. m-Business: supporting ‘anywhere’ business
  112. Benefits of business mobility
  113. Enhances mobility
  114. Provides immediate data access
  115. Increases location and monitoring capability
  116. Improves workflow
  117. Provides mobile business opportunities
  118. Provides an alternative to wiring
  119. Challenges of business mobility
  120. Protecting against theft
  121. Protecting wireless connections
  122. CLOSING CASE STUDIES
  123. Closing Case Study 3.1: Grocery shopping online
  124. Closing Case Study 3.2: Shoes of Prey
  125. Critical business thinking
  126. Apply your knowledge
  127. CHAPTER 4 DECISIONS AND PROCESSES
  128. OPENING CASE STUDY Content streaming on demand
  129. SECTION 4.1 // DECISION-MAKING SYSTEMS
  130. Decision making
  131. The decision-making process
  132. Decision-making essentials
  133. Operational
  134. Managerial
  135. Strategic
  136. Metrics: measuring success
  137. Efficiency and effectiveness metrics
  138. The interrelationship between efficiency and effectiveness MIS metrics
  139. Benchmarking—baseline metrics
  140. Visualisation
  141. The future: artificial intelligence
  142. Expert systems
  143. Neural networks
  144. Genetic algorithms
  145. Intelligent agents
  146. Virtual reality
  147. SECTION 4.2 // BUSINESS PROCESSES
  148. Evaluating business processes
  149. Support: changing business processes with MIS
  150. Business process improvement
  151. Business process re-engineering
  152. Business process management
  153. Is BPM for business or IT?
  154. BPM risks and rewards
  155. Business process modelling
  156. The future: business process modelling and management
  157. CLOSING CASE STUDIES
  158. Closing Case Study 4.1: True confessions—of an airline revenue manager
  159. Closing Case Study 4.2: Using virtual reality to improve business decisions
  160. Critical business thinking
  161. Apply your knowledge
  162. PART 2 ESSENTIALS OF INFORMATION SYSTEMS
  163. CHAPTER 5 TECHNICAL FUNDAMENTALS
  164. OPENING CASE STUDY Supercell: concentrates on games not infrastructure
  165. SECTION 5.1 // HARDWARE AND SOFTWARE BASICS
  166. The business benefits of a solid MIS infrastructure
  167. Hardware basics
  168. Central processing unit
  169. Primary storage
  170. Secondary storage
  171. Input devices
  172. Output devices
  173. Communication devices
  174. Computer categories
  175. Software basics
  176. System software
  177. Application software
  178. SECTION 5.2 // COMMUNICATION NETWORKS
  179. Networks
  180. Network components
  181. Architecture
  182. Topology
  183. Protocols
  184. Media
  185. Network types
  186. Local area network (LAN)
  187. Wide area network (WAN)
  188. Metropolitan area network (MAN)
  189. Wireless networks
  190. Network transmission speeds
  191. Broadband connection types
  192. Network security
  193. Network providers
  194. Networks and mobile phones
  195. Addressing privacy concerns around RFID and LBS
  196. CLOSING CASE STUDIES
  197. Closing Case Study 5.1: Everything to do with IT changes all the time: keeping up after you graduate
  198. Closing Case Study 5.2: Advanced computing infrastructure may lower the price of your next cuppa
  199. Critical business thinking
  200. Apply your knowledge
  201. CHAPTER 6 SYSTEMS DEVELOPMENT AND PROJECT MANAGEMENT
  202. OPENING CASE STUDY Australia Post: staying relevant in the e-business era
  203. SECTION 6.1 // DEVELOPING ENTERPRISE APPLICATIONS
  204. Developing software
  205. The systems development life cycle
  206. Traditional software development methodology
  207. Waterfall methodology
  208. Agile software development methodologies
  209. Implementing agile methodologies
  210. Developing successful software
  211. Having unclear or missing business requirements
  212. Poor communication between management and the development team
  213. Inadequate project management
  214. Skipping SDLC phases
  215. Changing technology
  216. Catering for the cost of finding errors in the SDLC
  217. SECTION 6.2 // PROJECT MANAGEMENT
  218. Managing software development projects
  219. The triple constraint
  220. Project participants
  221. Choosing strategic projects
  222. Understanding project planning
  223. Project charter
  224. Project plan
  225. Managing projects
  226. Managing people
  227. Managing communications
  228. Managing change
  229. Outsourcing projects
  230. Outsourcing benefits
  231. Outsourcing challenges
  232. CLOSING CASE STUDIES
  233. Closing Case Study 6.1: Why do large government IT projects fail? HealthSMART project lets Victorian health services down
  234. Closing Case Study 6.2: myki: an integrated travel card for Victoria
  235. Critical business thinking
  236. Apply your knowledge
  237. CHAPTER 7 ENTERPRISE ARCHITECTURE AND SECURITY
  238. OPENING CASE STUDY Sony hack stops the world: well, Sony’s world
  239. SECTION 7.1 // ENTERPRISE ARCHITECTURE
  240. The business benefits of solid enterprise architecture
  241. Supporting operations: information architecture
  242. Backup and recovery
  243. Disaster recovery
  244. Business continuity planning
  245. Supporting change: infrastructure architecture
  246. Accessibility
  247. Availability
  248. Maintainability
  249. Portability
  250. Reliability
  251. Scalability
  252. Usability
  253. Supporting the environment: sustainable enterprise architecture
  254. Cluster computing
  255. Grid computing
  256. Cloud computing
  257. Virtualisation
  258. Making enterprise architecture green(er)
  259. Increased electronic waste
  260. Increased energy consumption
  261. Increased carbon emissions
  262. SECTION 7.2 // ENTERPRISE SECURITY
  263. Protecting intellectual assets
  264. The first line of defence: people
  265. The second line of defence: technology
  266. People: authentication and authorisation
  267. Data: prevention and resistance
  268. Attacks: detection and response
  269. Hackers and viruses
  270. Preventing viruses on a mobile device
  271. CLOSING CASE STUDIES
  272. Closing Case Study 7.1: Developing an enterprise-wide architecture within Insurance Australia Group
  273. Closing Case Study 7.2: Migration to Google docs: Bleeding Technology Pty Ltd
  274. Critical business thinking
  275. Apply your knowledge
  276. PART 3 ENTERPRISE INFORMATION SYSTEMS
  277. CHAPTER 8 QUALITY DATA AND BUSINESS INTELLIGENCE
  278. OPENING CASE STUDY Chupa Chups: how sweet it is
  279. SECTION 8.1 // DATA, INFORMATION AND DATABASES
  280. The business value of high-quality information
  281. Information type—transactional or analytical
  282. Information timeliness
  283. Information quality
  284. Information governance
  285. Storing data
  286. Storing data elements: entities and attributes
  287. Keys to data
  288. The business benefits of a relational database
  289. Increased flexibility
  290. Increased scalability and performance
  291. Reduced information redundancy
  292. Increased information integrity (quality)
  293. Increased information security
  294. Integrating information among multiple databases
  295. Integration tools
  296. The drawback of not integrating databases
  297. Data warehousing
  298. Multidimensional analysis
  299. Information cleansing or scrubbing
  300. SECTION 8.2 BUSINESS INTELLIGENCE (BI)
  301. Data mining
  302. Data mining tools
  303. Cluster analysis
  304. Statistical analysis
  305. Association detection
  306. Big data
  307. Relationship between data warehousing and data mining
  308. Business intelligence (BI)
  309. Business benefits of BI
  310. BI software/tools
  311. Data management tools
  312. Data discovery tools
  313. Reporting tools
  314. BI, business analytics and data science: similar but different
  315. CLOSING CASE STUDIES
  316. Closing Case Study 8.1: XBRL and business information supply chains: enhancing business-to-government reporting
  317. Closing Case Study 8.2: Data-driven innovation (DDI)—set to lead the way!
  318. Critical business thinking
  319. Apply your knowledge
  320. CHAPTER 9 ENTERPRISE INFORMATION SYSTEMS: ERP AND SCM
  321. OPENING CASE STUDY Still sick after $1.25 billion: Queensland Health ERP
  322. SECTION 9.1 // ENTERPRISE RESOURCE PLANNING (ERP)
  323. ERP fundamentals
  324. The evolution of ERP
  325. ERP components
  326. Core ERP components
  327. Extended ERP components
  328. e-Business
  329. Business intelligence (BI)
  330. Supply chain management (SCM)
  331. Customer relationship management (CRM)
  332. Integrating ERP
  333. ERP metrics
  334. Choosing ERP software
  335. Challenges of ERP
  336. The future of ERP
  337. SECTION 9.2 // SUPPLY CHAIN MANAGEMENT (SCM)
  338. Supply chain fundamentals
  339. Seven principles of SCM
  340. The benefits of SCM
  341. Improved visibility
  342. Improve collaboration
  343. Increased profitability
  344. SCM metrics
  345. The challenges of SCM
  346. The future of SCM
  347. Cloud computing and SCM
  348. CLOSING CASE STUDIES
  349. Closing Case Study 9.1: GoPro goes into the cloud
  350. Closing Case Study 9.2: ERP system takes ATE tankers to the next level
  351. Critical business thinking
  352. Apply your knowledge
  353. CHAPTER 10 ENTERPRISE INFORMATION SYSTEMS: CRM AND COLLABORATION SYSTEMS
  354. OPENING CASE STUDY Bosch—power from the people
  355. SECTION 10.1 // CUSTOMER RELATIONSHIP MANAGEMENT (CRM)
  356. CRM fundamentals
  357. Phases in CRM
  358. Types of CRM
  359. Operational CRM
  360. Analytical CRM
  361. Collaborative CRM
  362. The benefits of CRM
  363. CRM metrics
  364. The challenges of CRM
  365. The future of CRM
  366. SECTION 10.2 // COLLABORATION SYSTEMS AND TECHNOLOGIES
  367. What is collaboration?
  368. Collaborators
  369. Collaboration systems
  370. Knowledge management systems
  371. Content management systems
  372. Workflow management systems
  373. Groupware systems
  374. Collaboration technologies
  375. File storage and sharing
  376. Email
  377. Wikis
  378. Instant messaging
  379. Conferencing
  380. Social networking analysis
  381. CLOSING CASE STUDIES
  382. Closing Case Study 10.1: Creating enterprise resource planning (ERP) software beautifully
  383. Closing Case Study 10.2: CRM systems: giving customers that uncanny valley feeling
  384. Critical business thinking
  385. Apply your knowledge
  386. PART 4 BUSINESS AND TRANSFORMATION
  387. CHAPTER 11 ETHICS, PRIVACY, SOCIAL MEDIA AND FUTURE TRENDS
  388. OPENING CASE STUDY Bitcoin: a currency revolution?
  389. SECTION 11.1 // ETHICS AND PRIVACY
  390. Information ethics
  391. Information does not have ethics; people do
  392. Privacy in the information age: an overview
  393. Privacy in Australia
  394. Developing information management policies
  395. Ethical computer use policy
  396. Information privacy policy
  397. Acceptable use policy
  398. Internet use policy
  399. Email privacy policy
  400. Anti-spam policy
  401. Social media use in business
  402. Workplace monitoring policy
  403. Monitoring technologies
  404. Protecting privacy: handling personal information
  405. Privacy statements
  406. Third-party privacy programs
  407. Global information privacy issues
  408. Europe
  409. The United States
  410. Cloud computing and trans-border privacy considerations
  411. SECTION 11.2 // SOCIAL MEDIA
  412. Social media and today’s business
  413. Managing social media
  414. SECTION 11.3 // FUTURE TRENDS
  415. Reasons to watch trends
  416. Trends shaping the future of business
  417. The world’s population projected to be 9 billion by 2050
  418. People in developed countries are living longer
  419. Advances in communication technologies are changing the way we live and work
  420. The growth in information industries is creating a knowledge-dependent global society
  421. The global economy is becoming more integrated
  422. The economy and society are dominated by technology
  423. The pace of technological innovation is increasing
  424. Time is becoming one of the world’s most precious commodities
  425. CLOSING CASE STUDIES
  426. Closing Case Study 11.1: The Facebook experiment: legal—yes, but ethical?
  427. Closing Case Study 11.2: Privacy, copyright and online piracy of Dallas Buyers Club
  428. Critical business thinking
  429. Apply your knowledge
  430. PART 5 EXPAND YOUR KNOWLEDGE MODULES
  431. ABOUT THE MODULES
  432. GLOSSARY
  433. INDEX