ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب LOOSE LEAF BUSINESS DRIVEN INFORMATION SYSTEMS

دانلود کتاب سیستم های اطلاعاتی مبتنی بر برگ های سست

LOOSE LEAF BUSINESS DRIVEN INFORMATION SYSTEMS

مشخصات کتاب

LOOSE LEAF BUSINESS DRIVEN INFORMATION SYSTEMS

ویرایش: [7 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1260736652, 9781260736656 
ناشر: McGraw-Hill Education 
سال نشر: 2020 
تعداد صفحات: [701] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 31 Mb 

قیمت کتاب (تومان) : 33,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب LOOSE LEAF BUSINESS DRIVEN INFORMATION SYSTEMS به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب سیستم های اطلاعاتی مبتنی بر برگ های سست نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب سیستم های اطلاعاتی مبتنی بر برگ های سست

ویرایش هفتم سیستم‌های اطلاعاتی مبتنی بر کسب‌وکار ابتدا ابتکارات مختلف تجاری را مورد بحث قرار می‌دهد و در مرحله دوم چگونه فناوری از این ابتکارات پشتیبانی می‌کند. فرض این رویکرد منحصر به فرد این است که ابتکارات تجاری باید انتخاب های فناوری را هدایت کند. هر بحث ابتدا به نیازهای کسب و کار می پردازد و سپس به فناوری هایی می پردازد که این نیازها را پشتیبانی می کند. سیستم‌های اطلاعاتی مبتنی بر کسب‌وکار به گونه‌ای طراحی شده‌اند که به دانش‌آموزان این توانایی را بدهد که بفهمند چگونه فناوری اطلاعات می‌تواند نقطه قوت یک سازمان باشد.
ویرایش جدید سیستم‌های اطلاعاتی مبتنی بر کسب‌وکار در بحث‌های خود به‌روز است، مفاهیم را در قالبی قابل فهم ارائه می‌دهد و به دانش‌آموزان اجازه می‌دهد تا در یادگیری مشارکت فعال داشته باشند. ماهیت پویای فناوری اطلاعات به همه دانشجویان - به طور خاص، دانشجویان بازرگانی - نیاز دارد که از فناوری‌های فعلی و نوظهور آگاه باشند. دانش آموزان با موضوعات پیچیده ای روبرو هستند و برای درک و استفاده از مفاهیم در طول حرفه خود نیاز به توضیح واضح و مختصر دارند. با درگیر کردن دانشجویان با مطالعات موردی، تمرین‌ها، پروژه‌ها و سؤالات متعددی که مفاهیم را اجرا می‌کنند، سیستم‌های اطلاعاتی کسب‌وکار یک تجربه یادگیری منحصربه‌فرد برای اساتید و دانشجویان ایجاد می‌کند.


توضیحاتی درمورد کتاب به خارجی

The seventh edition of Business Driven Information Systems discusses various business initiatives first and how technology supports those initiatives second. The premise for this unique approach is that business initiatives should drive technology choices. Every discussion first addresses the business needs and then addresses the technology that supports those needs. Business Driven Information Systems is designed to give students the ability to understand how information technology can be a point of strength for an organization.
The new edition of Business Driven Information Systems is state of the art in its discussions, presents concepts in an easy-to-understand format, and allows students to be active participants in learning. The dynamic nature of information technology requires all students―more specifically, business students―to be aware of both current and emerging technologies. Students are facing complex subjects and need a clear, concise explanation to be able to understand and use the concepts throughout their careers. By engaging students with numerous case studies, exercises, projects, and questions that enforce concepts, Business Driven Information Systems creates a unique learning experience for both faculty and students.



فهرست مطالب

Cover
Title
Copyright
Dedication
Brief Contents
Contents
Connect
Preface
Walkthrough
Acknowledgments
About the Author
module 1 Business Driven MIS
	CHAPTER 1 Management Information Systems: Business Driven MIS
		opening case study: The Fourth Industrial Revolution: The Backdoor to Reengineering Reality
		Section 1.1 Business Driven MIS
		COMPETING IN THE INFORMATION AGE
			Data
			Information
			Business Intelligence
			Knowledge
		THE CHALLENGE OF DEPARTMENTAL COMPANIES AND THE MIS SOLUTION
			The MIS Solution
			Systems Thinking
			MIS Department Roles and Responsibilities
		Section 1.2 Business Strategy
		IDENTIFYING COMPETITIVE ADVANTAGES
		SWOT ANALYSIS: UNDERSTANDING BUSINESS STRATEGIES
		THE FIVE FORCES MODEL—EVALUATING INDUSTRY ATTRACTIVENESS
			Buyer Power
			Supplier Power
			Threat of Substitute Products or Services
			Threat of New Entrants
			Rivalry among Existing Competitors
			Analyzing the Airline Industry
		THE THREE GENERIC STRATEGIES—CHOOSING A BUSINESS FOCUS
		VALUE CHAIN ANALYSIS—EXECUTING BUSINESS STRATEGIES
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
	CHAPTER 2 Decisions and Processes: Value Driven Business
		opening case study: The Future of Work
		Section 2.1 Decision Support Systems
		MAKING ORGANIZATIONAL BUSINESS DECISIONS
			The Decision-Making Process
			Decision-Making Essentials
		MEASURING ORGANIZATIONAL BUSINESS DECISIONS
			Efficiency and Effectiveness Metrics
		USING MIS TO MAKE BUSINESS DECISIONS
			Operational Support Systems
			Managerial Support Systems
			Strategic Support Systems
		USING AI TO MAKE BUSINESS DECISIONS
			Machine Learning
			Neural Networks
			Virtual Reality
		Section 2.2 Business Processes
		MANAGING BUSINESS PROCESSES
			Business Process Modeling
		USING MIS TO IMPROVE BUSINESS PROCESSES
			Operational Business Processes—Automation
			Managerial Business Processes—Streamlining
			Strategic Business Processes—Reengineering
		DATA MINING
			Data Mining Process Model
			Data Mining Analysis Techniques
			Data Mining Modeling Techniques for Predictions
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
	CHAPTER 3 Ebusiness: Electronic Business Value
		opening case study: The Warby Parker Way
		Section 3.1 Web 1.0: Ebusiness
		DISRUPTIVE TECHNOLOGY
			Disruptive versus Sustaining Technology
			The Internet and World Wide Web—The Ultimate Business Disruptors
		WEB 1.0: THE CATALYST FOR EBUSINESS
			Expanding Global Reach
			Opening New Markets
			Reducing Costs
			Improving Effectiveness
		THE FOUR EBUSINESS MODELS
			Business-to-Business (B2B)
			Business-to-Consumer (B2C)
			Consumer-to-Business (C2B)
			Consumer-to-Consumer (C2C)
			Ebusiness Forms and Revenue-Generating Strategies
			Ebusiness Fraud
		EBUSINESS TOOLS FOR CONNECTING AND COMMUNICATING
			Email
			Instant Messaging
			Podcasting
			Videoconferencing
			Web Conferencing
			Content Management Systems
		Section 3.2 Web 2.0: Business 2.0
		WEB 2.0: ADVANTAGES OF BUSINESS 2.0
			Content Sharing through Open Sourcing
			User-Contributed Content
			Collaboration Inside the Organization
			Collaboration Outside the Organization
		NETWORKING COMMUNITIES WITH BUSINESS 2.0
			Social Tagging
		BUSINESS 2.0 TOOLS FOR COLLABORATING
			Blogs
			Wikis
			Mashups
		WEB 3.0: DEFINING THE NEXT GENERATION OF ONLINE BUSINESS OPPORTUNITIES
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
	CHAPTER 4 Ethics and Information Security: MIS Business Concerns
		opening case study: Cambridge Analytica: Illegal Data Scraping
		Section 4.1 Ethics
		INFORMATION ETHICS
			Information Does Not Have Ethics, People Do
		DEVELOPING INFORMATION MANAGEMENT POLICIES
			Ethical Computer Use Policy
			Information Privacy Policy
			Acceptable Use Policy
			Email Privacy Policy
			Social Media Policy
			Workplace MIS Monitoring Policy
		Section 4.2 Information Security
		PROTECTING INTELLECTUAL ASSETS
			Hackers: A Dangerous Threat to Business
			Viruses: A Dangerous Threat to Business
		THE FIRST LINE OF DEFENSE—PEOPLE
		THE SECOND LINE OF DEFENSE—TECHNOLOGY
			People: Authentication and Authorization
			Data: Prevention and Resistance
			Attack: Detection and Response
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
module 2 Technical Foundations of MIS
	CHAPTER 5 Infrastructures: Sustainable Technologies
		opening case study: Envision 2030: 17 Goals to Transform the World for Persons with Disabilities
		Section 5.1 MIS Infrastructures
		THE BUSINESS BENEFITS OF A SOLID MIS INFRASTRUCTURE
		SUPPORTING OPERATIONS: INFORMATION MIS INFRASTRUCTURE
			Backup and Recovery Plan
			Disaster Recovery Plan
			Business Continuity Plan
		SUPPORTING CHANGE: AGILE MIS INFRASTRUCTURE
			Accessibility
			Availability
			Maintainability
			Portability
			Reliability
			Scalability
			Usability
		Section 5.2 Building Sustainable MIS Infrastructures
		MIS AND THE ENVIRONMENT
			Increased Electronic Waste
			Increased Energy Consumption
			Increased Carbon Emissions
		SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS INFRASTRUCTURE
			Grid Computing
			Virtualized Computing
			Cloud Computing
			Public Cloud
			Private Cloud
			Community Cloud
			Hybrid Cloud
		UTILITY COMPUTING
			Infrastructure as a Service (IaaS)
			Software as a Service (SaaS)
			Platform as a Service (PaaS)
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
	CHAPTER 6 Data: Business Intelligence
		opening case study: Bitcoin
		Section 6.1 Data, Information, and Databases
		DATA QUALITY
			Data Type: Transactional and Analytical
			Data Timeliness
			Data Quality
			Data Governance
		STORING DATA USING A RELATIONAL DATABASE MANAGEMENT SYSTEM
			Storing Data Elements in Entities and Attributes
			Creating Relationships through Keys
			Coca-Cola Relational Database Example
		USING A RELATIONAL DATABASE FOR BUSINESS ADVANTAGES
			Increased Flexibility
			Increased Scalability and Performance
			Reduced Data Redundancy
			Increased Data Integrity (Quality)
			Increased Data Security
		Section 6.2 Data Warehouse and Blockchain
		BUSINESS INTELLIGENCE
			The Problem: Data Rich, Information Poor
			The Solution: Data Aggregation
		DATA WAREHOUSE
			Data Analysis
			Data Lake
			Data Cleansing or Scrubbing
			Data Visualization
		BLOCKCHAIN: DISTRIBUTED COMPUTING
			How Blockchains Work
			Blockchain Advantages
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
	CHAPTER 7 Networks: Mobile Business
		opening case study: Disrupting the Taxi: Uber
		Section 7.1 Connectivity: The Wireless World
		OVERVIEW OF A CONNECTED WORLD
		WIRELESS NETWORKS
		WIRELESS NETWORK CATEGORIES
			Personal Area Networks
			Wireless LANs
			Wireless MANs
			Wireless WAN—Cellular Communication System
			Wireless WAN—Satellite Communication System
		PROTECTING WIRELESS NETWORKS
		Section 7.2 Mobility: The Business Value of a Wireless World
		MOBILE ENTERPRISE MANAGEMENT
			Mobile Device Management
			Mobile Application Management
			Mobile Information Management
		BUSINESS APPLICATIONS OF WIRELESS TECHNOLOGIES
			Radio-Frequency Identification (RFID)
			Global Positioning System (GPS)
			Geographic Information System (GIS)
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
module 3 Enterprise MIS
	CHAPTER 8 Enterprise Applications: Business Communications
		opening case study: Blockchain Disrupting the Supply Chain
		Section 8.1 Supply Chain Management
		BUILDING A CONNECTED CORPORATION THROUGH INTEGRATIONS
			Integration Tools
		SUPPLY CHAIN MANAGEMENT
			Blockchain Revamping the Supply Chain
		TECHNOLOGIES REINVENTING THE SUPPLY CHAIN
			3D Printing Supports Procurement
			RFID Supports Logistics
			Drones Support Logistics
			Robotics Supports Materials Management
		Section 8.2 Customer Relationship Management and Enterprise Resource Planning
		CUSTOMER RELATIONSHIP MANAGEMENT
			Evolution of CRM
			The Power of the Customer
			Measuring CRM Success
		OPERATIONAL AND ANALYTICAL CRM
			Marketing and Operational CRM
			Sales and Operational CRM
			Customer Service and Operational CRM
			Analytical CRM
		ENTERPRISE RESOURCE PLANNING
			The Evolution of ERP
			Core ERP Components
			Extended ERP Components
			Measuring ERP Success
		ORGANIZATIONAL INTEGRATION WITH ERP
			On-Premise ERP
			Cloud ERP
			Hybrid ERP
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
	CHAPTER 9 Systems Development and Project Management: Corporate Responsibility
		opening case study: Let My People Go Surfing: The Education of a Reluctant Businessman
		Section 9.1 Developing Enterprise Applications
		THE SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
			Phase 1: Planning
			Phase 2: Analysis
			Phase 3: Design
			Phase 4: Development
			Phase 5: Testing
			Phase 6: Implementation
			Phase 7: Maintenance
		SOFTWARE DEVELOPMENT METHODOLOGY: THE WATERFALL
		AGILE SOFTWARE DEVELOPMENT METHODOLOGIES
			Rapid Application Development (RAD) Methodology
			Extreme Programming Methodology
			Rational Unified Process (RUP) Methodology
			Scrum Methodology
		Section 9.2 Project Management
		USING PROJECT MANAGEMENT TO DELIVER SUCCESSFUL PROJECTS
			Unclear or Missing Business Requirements
			Skipped Phases
			Changing Technology
			The Cost of Finding Errors in the SDLC
			Balance of the Triple Constraint
		PRIMARY PROJECT PLANNING DIAGRAMS
		OUTSOURCING PROJECTS
			Outsourcing Benefits
			Outsourcing Challenges
		Learning Outcome Review
		Key Terms
		Review Questions
		Closing Case One
		Closing Case Two
		Critical Business Thinking
		Apply Your Knowledge Business Projects
		Ayk Application Projects
appendices
	APPENDIX A Hardware and Software Basics
		INTRODUCTION
		HARDWARE BASICS
			Central Processing Unit
			Primary Storage
			Secondary Storage
			Input Devices
			Output Devices
			Communication Devices
		COMPUTER CATEGORIES
		SOFTWARE BASICS
			System Software
			Application Software
			Distributing Application Software
		Key Terms
		Apply Your Knowledge
	APPENDIX B Networks and Telecommunications
		INTRODUCTION
		NETWORK BASICS
		ARCHITECTURE
			Peer-to-Peer Networks
			Client/Server Networks
		TOPOLOGY
		PROTOCOLS
			Ethernet
			Transmission Control Protocol/Internet Protocol
		MEDIA
			Wire Media
			Wireless Media
		Key Terms
		Apply Your Knowledge
	APPENDIX C Designing Databases
		INTRODUCTION
		THE RELATIONAL DATABASE MODEL
			Entities and Attributes
			Type of Attributes
			Business Rules
		DOCUMENTING ENTITY-RELATIONSHIP DIAGRAMS
			Basic Entity Relationships
			Relationship Cardinality
		RELATIONAL DATA MODEL AND THE DATABASE
			From Entities to Tables
			Logically Relating Tables
		Key Terms
		Apply Your Knowledge
	APPENDIX D Emerging Trends and Technologies
		INTRODUCTION
		TRENDS SHAPING OUR FUTURE
			The World’s Population Will Double in the Next 40 Years
			People in Developed Countries Are Living Longer
			The Growth in Information Industries Is Creating a Knowledge-Dependent Global Society
			The Global Economy Is Becoming More Integrated
			The Economy and Society Are Dominated by Technology
			Pace of Technological Innovation Is Increasing
			Time Is Becoming One of the World’s Most Precious Commodities
		TECHNOLOGIES SHAPING OUR FUTURE
			The Digital Mesh
			Smart Machines
			The New IT Reality
		Key Terms
		Apply Your Knowledge
	APPENDIX E Connectivity: The Business Value of a Networked World
		OVERVIEW OF A CONNECTED WORLD
			Network Categories
			Network Providers
			Network Access Technologies
			Network Protocols
			Network Convergence
		BENEFITS OF A CONNECTED WORLD
		Key Terms
		Apply Your Knowledge
Apply Your Knowledge
Glossary
Notes
Index




نظرات کاربران