ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Business driven information systems

دانلود کتاب سیستم های اطلاعاتی مبتنی بر تجارت

Business driven information systems

مشخصات کتاب

Business driven information systems

ویرایش: 3. ed. 
نویسندگان:   
سری:  
ISBN (شابک) : 9780071314565, 0073376825 
ناشر: McGraw-Hill Irwin 
سال نشر: 2012 
تعداد صفحات: 496 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 76 مگابایت 

قیمت کتاب (تومان) : 35,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Business driven information systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب سیستم های اطلاعاتی مبتنی بر تجارت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب سیستم های اطلاعاتی مبتنی بر تجارت

نمای کلی داستان سیستم‌های اطلاعاتی مبتنی بر کسب‌وکار: سیستم‌های اطلاعاتی مبتنی بر کسب‌وکار ابتدا ابتکارات تجاری مختلف را مورد بحث قرار می‌دهد و در مرحله دوم چگونه فناوری از این ابتکارات پشتیبانی می‌کند. فرض این رویکرد منحصر به فرد این است که ابتکارات تجاری باید انتخاب های فناوری را هدایت کند. هر بحث ابتدا به نیازهای کسب و کار می پردازد و سپس به فناوری هایی می پردازد که این نیازها را پشتیبانی می کند. این متن پایه‌ای را فراهم می‌کند که دانش‌آموزان را قادر می‌سازد تا به برتری در تجارت دست یابند، خواه در مدیریت عملیات، تولید، فروش، بازاریابی، امور مالی، منابع انسانی، حسابداری یا تقریباً هر رشته تجاری دیگری باشند. سیستم های اطلاعاتی مبتنی بر کسب و کار طراحی شده است تا به دانش آموزان این توانایی را بدهد که بفهمند چگونه فناوری اطلاعات می تواند نقطه قوت یک سازمان باشد.


توضیحاتی درمورد کتاب به خارجی

Overview Business Driven Information Systems story: Business Driven Information Systems discusses various business initiatives first and how technology supports those initiatives second. The premise for this unique approach is that business initiatives should drive technology choices. Every discussion first addresses the business needs and then addresses the technology that supports those needs. This text provides the foundation that will enable students to achieve excellence in business, whether they major in operations management, manufacturing, sales, marketing, finance, human resources, accounting, or virtually any other business discipline. Business Driven Information Systems is designed to give students the ability to understand how information technology can be a point of strength for an organization.



فهرست مطالب

Title
Contents
1 Management Information Systems: Business Driven MIS
	Opening Case Study: The World Is Flat: Thomas Friedman
	Section 1.1 Business Driven MIS
	COMPETING IN THE INFORMATION AGE
	Data
	Information
	Business Intelligence
	Knowledge
	THE CHALLENGE: DEPARTMENTAL COMPANIES
	THE SOLUTION: MANAGEMENT INFORMATION SYSTEMS
	MIS Department Roles and Responsibilities
	Section 1.2 Business Strategy
	IDENTIFYING COMPETITIVE ADVANTAGES
	THE FIVE FORCES MODEL—EVALUATING INDUSTRY ATTRACTIVENESS
	Buyer Power
	Supplier Power
	Threat of Substitute Products or Services
	Threat of New Entrants
	Rivalry among Existing Competitors
	Analyzing the Airline Industry
	THE THREE GENERIC STRATEGIES—CHOOSING A BUSINESS FOCUS
	VALUE CHAIN ANALYSIS—EXECUTING BUSINESS STRATEGIES
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Apple—Merging Technology, Business, and Entertainment
	Closing Case Two: Major League Baseball—The Real Competitive Advantages
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
2 Decisions and Processes: Value Driven Business
	Opening Case Study: Political Micro-Targeting: What Decision Support Systems Did for Barack Obama
	Section 2.1 Decision Support Systems
	MAKING BUSINESS DECISIONS
	The Decision-Making Process
	Decision-Making Essentials
	METRICS: MEASURING SUCCESS
	Efficiency and Effectiveness Metrics
	The Interrelationship Between Efficiency and Effectiveness MIS Metrics
	SUPPORT: ENHANCING DECISION MAKING WITH MIS
	Operational Support Systems
	Managerial Support Systems
	Strategic Support Systems
	THE FUTURE: ARTIFICIAL INTELLIGENCE
	Expert Systems
	Neural Networks
	Genetic Algorithms
	Intelligent Agents
	Virtual Reality
	Section 2.2 Business Processes
	EVALUATING BUSINESS PROCESSES
	MODELS: MEASURING PERFORMANCE
	SUPPORT: CHANGING BUSINESS PROCESSES WITH MIS
	Improving Operational Business Processes—Automation
	Improving Managerial Business Processes—Streamlining
	Improving Strategic Business Processes—Reengineering
	THE FUTURE: BUSINESS PROCESS MANAGEMENT
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Defense Advanced Research Project Agency (DARPA) Grand Challenge
	Closing Case Two: Second Life: Succeeding in Virtual Times
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
3 Ebusiness: Electronic Business Value
	Opening Case Study: Social Media and Ashton Kutcher
	Section 3.1 WEB 1.0: EBusiness
	DISRUPTIVE TECHNOLOGIES AND WEB 1.0
	Disruptive versus Sustaining Technology
	The Internet and World Wide Web—The Ultimate Business Disruptors
	Web 1.0: The Catalyst for Ebusiness
	ADVANTAGES OF EBUSINESS
	Expanding Global Reach
	Opening New Markets
	Reducing Costs
	Improving Operations
	Improving Effectiveness
	EBUSINESS MODELS
	Business-to-Business (B2B)
	Business-to-Consumer (B2C)
	Consumer-to-Business (C2B)
	Consumer-to-Consumer (C2C)
	Ebusiness Forms and Revenue-Generating Strategies
	EBUSINESS TOOLS FOR CONNECTING AND COMMUNICATING
	Email
	Instant Messaging
	Podcasting
	Videoconferencing
	Web Conferencing
	Content Management Systems
	THE CHALLENGES OF EBUSINESS
	Identifying Limited Market Segments
	Managing Consumer Trust
	Ensuring Consumer Protection
	Adhering to Taxation Rules
	Section 3.2 WEB 2.0: Business 2.0
	WEB 2.0: ADVANTAGES OF BUSINESS 2.0
	Content Sharing Through Open Sourcing
	User-Contributed Content
	Collaboration Inside the Organization
	Collaboration Outside the Organization
	NETWORKING COMMUNITIES WITH BUSINESS 2.0
	Social Tagging
	BUSINESS 2.0 TOOLS FOR COLLABORATING
	Blogs
	Wikis
	Mashups
	THE CHALLENGES OF BUSINESS 2.0
	Technology Dependence
	Information Vandalism
	Violations of Copyright and Plagiarism
	WEB 3.0: DEFINING THE NEXT GENERATION OF ONLINE BUSINESS OPPORTUNITIES
	Egovernment: The Government Moves Online
	Mbusiness: Supporting Anywhere Business
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: BBC Taps Web 3.0 for New Music Site
	Closing Case Two: Amazon.com—Not Your Average Bookstore
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
4 Ethics and Information Security: MIS Business Concerns
	Opening Case Study: E-Espionage
	Section 4.1 Ethics
	INFORMATION ETHICS
	Information Does Not Have Ethics, People Do
	DEVELOPING INFORMATION MANAGEMENT POLICIES
	Ethical Computer Use Policy
	Information Privacy Policy
	Acceptable Use Policy
	Email Privacy Policy
	Social Media Policy
	Workplace Monitoring Policy
	Section 4.2 Information Security
	PROTECTING INTELLECTUAL ASSETS
	Security Threats Caused by Hackers and Viruses
	THE FIRST LINE OF DEFENSE—PEOPLE
	THE SECOND LINE OF DEFENSE—TECHNOLOGY
	People: Authentication and Authorization
	Data: Prevention and Resistance
	Attack: Detection and Response
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Banks Banking on Security
	Closing Case Two: Hacker Hunters
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
	module
	Technical Foundations of MIS
5 Infrastructures: Sustainable Technologies
	Opening Case Study: Pandora’s Music Box
	Section 5.1 MIS Infrastructures
	THE BUSINESS BENEFITS OF A SOLID MIS INFRASTRUCTURE
	SUPPORTING OPERATIONS: INFORMATION MIS INFRASTRUCTURE
	Backup and Recovery Plan
	Disaster Recovery Plan
	Business Continuity Plan
	SUPPORTING CHANGE: AGILE MIS INFRASTRUCTURE
	Accessibility
	Availability
	Maintainability
	Portability
	Reliability
	Scalability
	Usability
	Section 5.2 Building Sustainable MIS Infrastructures
	MIS AND THE ENVIRONMENT
	Increased Electronic Waste
	Increased Energy Consumption
	Increased Carbon Emissions
	SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS INFRASTRUCTURE
	Grid Computing
	Cloud Computing
	Virtualized Computing
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: UPS Invests $1 Billion to Go Green
	Closing Case Two: Turning Ewaste into Gold
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
6 Data: Business Intelligence
	Opening Case Study: Business Intelligence Software’s Time Is Now
	Section 6.1 Data, Information, and Databases
	THE BUSINESS BENEFITS OF HIGH-QUALITY INFORMATION
	Information Type: Transactional and Analytical
	Information Timeliness
	Information Quality
	Information Governance
	STORING INFORMATION IN A RELATIONAL DATABASE MANAGEMENT SYSTEM
	Storing Data Elements in Entities and Attributes
	Creating Relationships Through Keys
	USING A RELATIONAL DATABASE FOR BUSINESS ADVANTAGES
	Increased Flexibility
	Increased Scalability and Performance
	Reduced Data Redundancy
	Increased Information Integrity (Quality)
	Increased Information Security
	DRIVING WEBSITES WITH DATA
	Section 6.2 Business Intelligence
	THE BUSINESS BENEFITS OF DATA WAREHOUSING
	PERFORMING BUSINESS ANALYSIS WITH DATA MARTS
	Multidimensional Analysis
	Information Cleansing or Scrubbing
	UNCOVERING TRENDS AND PATTERNS WITH DATA MINING
	Cluster Analysis
	Association Detection
	Statistical Analysis
	SUPPORTING DECISIONS WITH BUSINESS INTELLIGENCE
	The Problem: Data Rich, Information Poor
	The Solution: Business Intelligence
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Data Visualization: Stories for the Information Age
	Closing Case Two: Zillow
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
7 Networks: Mobile Business
	Opening Case Study: The Ironman
	Section 7.1 Connectivity: The Business Value of a Neworked World
	OVERVIEW OF A CONNECTED WORLD
	Network Categories
	Network Providers
	Network Access Technologies
	Network Protocols
	Network Convergence
	BENEFITS OF A CONNECTED WORLD
	Sharing Resources
	Providing Opportunities
	Reducing Travel
	CHALLENGES OF A CONNECTED WORLD
	Security
	Social, Ethical, and Political Issues
	Section 7.2 Mobility: The Business Value of a Wireless World
	WIRELESS NETWORK CATEGORIES
	Personal Area Networks
	Wireless LANs
	Wireless MANs
	Wireless WAN—Cellular Communication System
	Wireless WAN—Satellite Communication System
	BUSINESS APPLICATIONS OF WIRELESS NETWORKS
	Radio-Frequency Identification (RFID)
	Global Positioning System (GPS)
	Geographic Information Systems (GIS)
	Location-Based Services (LBS)
	BENEFITS OF BUSINESS MOBILITY
	Enhances Mobility
	Provides Immediate Data Access
	Increases Location and Monitoring Capability
	Improves Work Flow
	Provides Mobile Business Opportunities
	Provides Alternative to Wiring
	CHALLENGES OF BUSINESS MOBILITY
	Protecting Against Theft
	Protecting Wireless Connections
	Preventing Viruses on a Mobile Device
	Addressing Privacy Concerns with RFID and LBS
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Wireless Bikes
	Closing Case Two: Google Latitude
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
	module
	Enterprise MIS
8 Enterprise Applications: Business Communications
	Opening Case Study: Zappos Is Passionate for Customers
	Section 8.1 Supply Chain Management
	BUILDING A CONNECTED CORPORATION THROUGH INTEGRATIONS
	Integration Tools
	SUPPLY CHAIN MANAGEMENT
	THE BENEFITS OF SCM
	Improved Visibility
	Increased Profitability
	THE CHALLENGES OF SCM
	THE FUTURE OF SCM
	Section 8.2 Customer Relationship Management and Enterprise Resource Planning
	CUSTOMER RELATIONSHIP MANAGEMENT
	THE BENEFITS OF CRM
	Evolution of CRM
	Operational and Analytical CRM
	Marketing and Operational CRM
	Sales and Operational CRM
	Customer Service and Operational CRM
	Analytical CRM
	Measuring CRM Success
	THE CHALLENGES OF CRM
	THE FUTURE OF CRM
	ENTERPRISE RESOURCE PLANNING
	THE BENEFITS OF ERP
	Core ERP Components
	Extended ERP Components
	Measuring ERP Success
	THE CHALLENGES OF ERP
	THE FUTURE OF ENTERPRISE SYSTEMS: INTEGRATING SCM, CRM, AND ERP
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Can Customer Loyalty Be a Bad Thing?
	Closing Case Two: Got Milk? It’s Good for You—Unless It’s Contaminated!
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
9 Systems Development and Project Management: Corporate Responsibility
	Opening Case Study: Getting Your Project On Track
	Section 9.1 Developing Enterprise Applications
	DEVELOPING SOFTWARE
	THE SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
	TRADITIONAL SOFTWARE DEVELOPMENT METHODOLOGY: THE WATERFALL
	AGILE SOFTWARE DEVELOPMENT METHODOLOGIES
	Rapid Application Development (RAD) Methodology
	Extreme Programming Methodology
	Rational Unified Process (RUP) Methodology
	Scrum Methodology
	DEVELOPING SUCCESSFUL SOFTWARE
	Unclear or Missing Business Requirements
	Skipping Phases
	Changing Technology
	The Cost of Finding Errors in the SDLC
	Section 9.2 Project Management
	MANAGING SOFTWARE DEVELOPMENT PROJECTS
	The Triple Constraint
	Project Participants
	CHOOSING STRATEGIC PROJECTS
	UNDERSTANDING PROJECT PLANNING
	MANAGING PROJECTS
	Managing People
	Managing Communications
	Managing Change
	OUTSOURCING PROJECTS
	Outsourcing Benefits
	Outsourcing Challenges
	Learning Outcome Review
	Opening Case Questions
	Key Terms
	Review Questions
	Closing Case One: Disaster at Denver International Airport
	Closing Case Two: Reducing Ambiguity in Business Requirements
	Critical Business Thinking
	Entrepreneurial Challenge
	Apply Your Knowledge Business Projects
	AYK Application Projects
APPENDIX A Hardware and Software Basics
	INTRODUCTION
	HARDWARE BASICS
	Central Processing Unit
	Primary Storage
	Secondary Storage
	Input Devices
	Output Devices
	Communication Devices
	COMPUTER CATEGORIES
	SOFTWARE BASICS
	System Software
	Application Software
	Key Terms
	Apply Your Knowledge
APPENDIX B Networks and Telecommunications
	INTRODUCTION
	NETWORK BASICS
	ARCHITECTURE
	Peer-to-Peer Networks
	Client/Server Networks
	TOPOLOGY
	PROTOCOLS
	Ethernet
	Transmission Control Protocol/Internet Protocol
	MEDIA
	Wire Media
	Wireless Media
	Key Terms
	Apply Your Knowledge
APPENDIX C Designing Databases
	INTRODUCTION
	THE RELATIONAL DATABASE MODEL
	Entities and Attributes
	BUSINES RULES
	DOCUMENTING ENTITY RELATIONSHIP DIAGRAMS
	Basic Entity Relationships
	Relationship Cardinality
	RELATIONAL DATA MODEL AND THE DATABASE
	From Entities to Tables
	Logically Relating Tables
	Key Terms
	Apply Your Knowledge
Technology Plug-In Overview
Apply Your Knowledge
Glossary
Notes
Credits
Index




نظرات کاربران