Professional Documents
Culture Documents
Full Download Ebook PDF Introduction To Information Systems People Technology and Processes 3rd Edition PDF
Full Download Ebook PDF Introduction To Information Systems People Technology and Processes 3rd Edition PDF
Wallace
Improving Results
A proven way to help individual students achieve the
goals that educators set for their course.
An Experienced Partner
From Pearson, a long-term partner with a true grasp
of the subject, excellent content, and an eye on the
future of education.
Introduction to
Information Systems
Patricia Wallace
www.pearsonhighered.com
ISBN-13: 978-0-13-463519-4
THIRD EDITION
ISBN-10: 0-13-463519-1
9 0 0 0 0
9 780134 635194
This page intentionally left blank
P
atricia Wallace’s career spans the fields of information technology, business
and management, and psychology, and she has held varied positions, includ-
ing head of information technology, faculty member, academic administra-
tor, and consultant. She recently retired from Johns Hopkins University, where she
was Senior Director, IT and Online Programs, at the Center for Talented Youth for
IS
Contents vii
14 years. Before joining Hopkins, Dr. Wallace served as Chief Information Strategies,
at the Robert H. Smith School of Business, University of Maryland, College Park. She
currently teaches in the Graduate School of the University of Maryland University
College, where she also served as the Associate Vice President and Chief Information
Officer for ten years. She earned her Ph.D. in psychology at the University of Texas
at Austin and holds an M.S. in Computer Systems Management. Dr. Wallace has
published 14 books, including The Internet in the Workplace: How New Technologies
Transform Work (2004) and The Psychology of the Internet (2016), several educa-
tional software programs, and numerous scholarly articles.
vii
CHAPTER
CHAPTER
1
2
Information Systems and People 2
CHAPTER
3 Information and Communications
Technologies: The Enterprise Architecture 62
CHAPTER
4 Databases and Data Warehouses 94
CHAPTER
5 Information Systems for the Enterprise 130
CHAPTER
6 The Web, Social Media, E-Commerce, and M-Commerce 164
CHAPTER
7 Business Intelligence and Decision Making 198
CHAPTER
8 Collaborating with Technology 228
CHAPTER
9 Knowledge Management and E-Learning 260
CHAPTER
10 Ethics, Privacy, and Security 294
CHAPTER
11 Systems Development and Procurement 328
CHAPTER
12 Project Management and Strategic Planning 358
Glossary 403
Index 411
ix
CHAPTER
1
Preface xxiii
Acknowledgments xxxi
Learning Objectives 2
Introduction 2
Information Systems in Action 4
Managing Operations 4
Supporting Customer Interactions 6
Making Decisions 6
Collaborating on Teams 7
Gaining Competitive Advantage 8
Improving Individual Productivity 8
The Nature of Information 8
What Makes Information Valuable? 9
The Components of an Information System 10
People 10
Technology 11
Processes 12
Data 14
Information Systems, the Discipline 14
Information Systems throughout the Organization 16
Information Systems in Business 17
Information Systems in Nonprofits and Government 17
Inside the IT Department 17
Collaborating on Information Systems 19
Improving Your Own Productivity 19
Promises, Perils, and Ethical Issues 21
Privacy Breaches and Amplification Effects 21
Online Simulation 22
Chapter Summary 23
Key Terms and Concepts 23
Chapter Review Questions 24
Projects and Discussion Questions 24
Application Exercises 25
EXCEL APPLICATION: STAFF Planning Spreadsheet 25
ACCESS APPLICATION: Information Systems in Business 26
Case Study #1 Nasdaq’s Information Challenges: Facebook’s Botched Public Opening and
High-Frequency Trading 26
Case Study #2 Breaking News: Twitter’s Growing Role in Emergencies and Disaster Communications 28
xi
CHAPTER
2 Information Systems and Strategy 32
Learning Objectives 32
Introduction 32
Porter’s Five Competitive Forces 34
Threat of New Entrants 35
Power of Buyers 36
Power of Suppliers 36
Threat of Substitutes 37
Rivalry Among Existing Competitors 38
Factors that Affect How the Five Forces Operate 38
Disruptive Technology and Innovations 38
Government Policies and Actions 40
Complementary Services and Products in the Ecosystem 40
Environmental Events and “Wildcards” 42
The Value Chain and Strategic Thinking 42
Extending the Value Chain: From Suppliers to the Firm to Customers 43
Benchmarking Components of the Value Chain 44
IT Benchmarks 44
Competitive Strategies in Business 46
The Role of Information Systems in Strategy 47
Information Systems: Run, Grow, and Transform the Business 48
Information Strategies and Nonprofit Organizations 49
Fund-Raising 50
Volunteering 50
Information Strategies and Government 50
Does I.T. Matter? 51
Spending on Running, Growing, and Transforming 52
Leveling UP!: A Strategic Analysis 52
Online Simulation 53
Chapter Summary 54
Key Terms and Concepts 55
Chapter Review Questions 55
Projects and Discussion Questions 55
Application Exercises 56
EXCEL APPLICATION: IT Benchmarks 56
ACCESS APPLICATION: Telethon Call Reports 56
Case Study #1 Can GameStop Survive with Its Brick-and-Mortar Stores? 57
Case Study #2 The Battle for Net Neutrality 58
E-Project 1 Identifying Company Strategy with Online Financial Chart Tools 59
E-Project 2 Analyzing Media Download Times with Excel 59
Chapter Notes 60
CHAPTER
3 Information and Communications
Technologies: The Enterprise Architecture 62
Learning Objectives 62
Introduction 62
The Hardware 64
Input and Output 64
Processing 68
Storage 69
The Software 70
Types of Software 70
How Is Software Created? 72
Networks and Telecommunications 74
Transmission Media and Protocols 74
Networking Basics 76
Network Protocols 78
Strategy and Competition in Telecommunications 80
The Enterprise Architecture 81
Trends in Enterprise Architectures 81
Guiding the Enterprise Architecture 85
Online Simulation 86
Chapter Summary 87
Key Terms and Concepts 88
Chapter Review Questions 88
Projects and Discussion Questions 88
Application Exercises 89
EXCEL APPLICATION: Analyzing Growth in Computer Storage Capacities 89
ACCESS APPLICATION: Managing ICT Assets with a Database 89
Case Study #1 Google Glass and Wearable Technologies 90
Case Study #2 Rolling Out Its 4G Network, Sprint Corporation Competes with Rivals 91
E-Project 1 Voluntary Distributed Computing 92
E-Project 2 Using Excel to Analyze Cost Effectiveness for 4G Rollouts 92
Chapter Notes 93
CHAPTER
4 Databases and Data Warehouses 94
Learning Objectives 94
Introduction 94
The Nature of Information Resources 96
Structured, Unstructured, and Semi-Structured Information 96
Metadata 97
The Quality of Information 97
Managing Information: From Filing Cabinets to the Database 98
Tables, Records, and Fields 99
The Rise and Fall of File Processing Systems 100
Databases and Database Management Systems 102
The Ethical Factor: Ethical Issues in Database Design: The Case of Ethnic Identification 110
CHAPTER
5 Information Systems for the Enterprise 130
Learning Objectives 130
Introduction 130
Finance Management 132
Components of Financial Information Systems 132
Financial Reporting, Compliance, and Transparency 134
Human Capital Management 135
Components of Human Capital Management Systems 135
HCM Metrics 137
Managing the Supply Chain 138
Supply Chain Fundamentals 138
CHAPTER
6 The Web, Social Media, E-Commerce,
and M-Commerce 164
Learning Objectives 164
Introduction 164
Developing a Web Strategy 166
Choosing a Goal 166
Naming the Website 168
Building the Website 170
Website Design 170
CHAPTER
7 Business Intelligence and Decision Making 198
Learning Objectives 198
Introduction 198
Levels of Decision Making 200
Operational Level 200
Tactical Level 200
Strategic Level 201
Sources of Business Intelligence 202
Transactional Databases, Data Warehouses, and Internal Data Sources 202
External Data Sources and Big Data 202
CHAPTER
8 Collaborating with Technology 228
Learning Objectives 228
Introduction 228
The Evolution of Collaborative Technologies 230
Email Technology, Contacts, and Calendars 230
Discussion Forums 232
Instant Messaging and Texting 232
Group Decision Support Systems (GDSS) 235
Web Conferencing 235
Interactive Video 236
Shared Workspaces 237
Web 2.0 Collaborative Technologies 238
Blogs 238
Wikis 239
Social Networking 239
Microblogging 240
Virtual Worlds and Virtual Reality 241
Unified Communications 243
Capabilities for Unified Communications 243
Universal Dashboards 244
The Human Element and Collaborative Technologies 244
Psychological Characteristics of Online Environments 244
The Ethical Factor: Flash Mobs and Free Speech: Should Police Block Mobile Messaging Services? 246
CHAPTER
9 Knowledge Management and E-Learning 260
Learning Objectives 260
Introduction 260
The Nature of Intellectual Capital 262
Types of Intellectual Capital 262
Types of Knowledge 262
Managing Intellectual Capital 263
Knowledge Management Strategies and Technologies 264
Identify the Goal 264
Locate the Sources 264
Capture the Knowledge 267
Organize, Share, and Value Knowledge 268
Knowledge Management: Pitfalls and Promises 272
The Human Element: Why Share Knowledge? 272
Incentives for Knowledge Sharing 272
The Ethical Factor: Knowledge Sharing in Fast-Paced Industries: The Case of Formula One Racing 273
CHAPTER
10 Ethics, Privacy, and Security 294
Learning Objectives 294
Introduction 294
Ethics 296
Ethical Frameworks 296
Ethics and the Law 296
Ethical Issues and Information and Communications Technologies 297
Information Ethics 298
Intellectual Property and Digital Rights Management 298
Plagiarism 300
Privacy 301
Trading Privacy for Convenience and Freebies 302
Anonymity 303
Surveillance 304
“The Right to Be Forgotten” 305
Information Security 306
Risk Management 306
Identifying Threats 306
The Ethical Factor: Ethical Dilemmas in a Distributed Denial of Service Attack 309
CHAPTER
11 Systems Development and Procurement 328
Learning Objectives 328
Introduction 328
Systems Development Life Cycle 330
Planning 330
Analysis 331
Design Phase 333
Development Phases 335
Testing Phase 336
Implementation 337
Maintenance 338
Software Development Strategies 339
The Ethical Factor: Developing Systems That Promote Ethical Decision Making and Social Responsibility 340
CHAPTER
12 Project Management and Strategic Planning 358
Learning Objectives 358
Introduction 358
What is a Project? 360
Projects Versus Processes 360
The Triple Constraint: Time, Cost, and Scope 361
Project Management 361
The Five Project Management Processes 362
The Role of the Project Manager 365
Case Study #2 Enabling the Sharing Economy: The Case of Uber Technologies 393
Case Study #3 Apple: Can the Company Pull Off Another Disruptive Innovation? 396
Glossary 403
Index 411
Chapter-Specific Changes
CHAPTER 1: Information Systems and People
New key term introduces the Internet of Things, a subject that receives expanded atten-
tion in this edition
Updated tables showing social network usage
Updated table showing important MIS research topics
New information on Google’s Project Loon, to bring Internet access to developing coun-
tries
Updated information on recent data breaches
Updated case studies on Nasdaq and Twitter with current information and recent sources
xxiii
OREGON.
“Gov. L. F. Grover:
“W. H. Effinger,
“A. Noltner,
“C. P. Bellinger.”
“We want to see you particularly on account of despatches from the East.
“William Strong,
“C. P. Bellinger,
“S. H. Reed,
“W. W. Thayer,
“C. E. Bronaugh.”
Also the following cipher despatch sent from Portland, Oregon, on
the 28th day of November, 1876, to New York City:
“Portland, November 28, 1876.
J. H. N. Patrick.
“James K. Kelly.”
Of which, when the key was discovered, the following was found to
be the true intent and meaning:
“Portland, November 28, 1876.
J. H. N. Patrick.
“James K. Kelly.”
C. E. Tilton.”
“I shall decide every point in the case of post-office elector in favor of the highest
Democratic elector, and grant certificate accordingly on morning of 6th instant.
Confidential.
Governor.”
“Funds from New York will be deposited to your credit here to-morrow when
bank opens. I know it. Act accordingly. Answer.
W. C. Griswold.”
[No signature.]
“No. How soon will Governor decide certificate? If you make obligation
contingent on the result in March, it can be done, and slightly if necessary.”
[No signature.]
“Governor all right without reward. Will issue certificate Tuesday. This is a
secret. Republicans threaten if certificate issued to ignore Democratic claims and
fill vacancy, and thus defeat action of Governor. One elector must be paid to
recognize Democrat to secure majority. Have employed three lawyers, editor of
only Republican paper as one lawyer, fee $3,000. Will take $5,000 for Republican
elector; must raise money; can’t make fee contingent. Sail Saturday. Kelly and
Bellinger will act. Communicate with them. Must act promptly.”
[No signature].
“J. H. N. Patrick.”
Kountze Bros.”
[No signature.]
“Is your matter certain? There must be no mistake. All depends on you. Place no
reliance on any favorable report from three southward. Sonetter. Answer quick.”
[No signature.]
“Glory to God! Hold on to the one vote in Oregon! I have one hundred thousand
men to back it up!
“Corse.”
Wm. P. Frye.
O. D. Conger.
E. G. Lapham.
Leave was given to Mr. Knott to present his individual views, also
to Mr. Butler (the full committee consisting of Messrs. Knott,
Lynde, Harris, of Virginia, Hartridge, Stenger, McMahon,
Culberson, Frye, Butler, Conger, Lapham.)
The question being on the resolution reported by the committee, it
was agreed to—yeas 235, nays 14, not voting 42.
The Hayes Administration.