ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب MIS 9 - Management Information Systems

دانلود کتاب MIS 9 - سیستم های اطلاعات مدیریت

MIS 9 - Management Information Systems

مشخصات کتاب

MIS 9 - Management Information Systems

ویرایش: [9 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 9781337625999, 9781337625982 
ناشر: Cengage 
سال نشر: 2018 
تعداد صفحات: [371] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 68 Mb 

قیمت کتاب (تومان) : 46,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 6


در صورت تبدیل فایل کتاب MIS 9 - Management Information Systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب MIS 9 - سیستم های اطلاعات مدیریت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب MIS 9 - سیستم های اطلاعات مدیریت

سیستم های اطلاعات مدیریت را به روش خود با MIS بیاموزید! کتاب درسی مرجع آسان MIS محتوای درسی را از طریق فصل های جذاب بصری و همچنین کارت های مرور فصل ارائه می دهد که بهترین مطالب مرور را در یک ابزار مطالعه آماده ادغام می کند.


توضیحاتی درمورد کتاب به خارجی

Learn Management Information Systems YOUR Way with MIS! MIS�s easy-reference, textbook presents course content through visually engaging chapters as well as Chapter Review Cards that consolidate the best review material into a ready-made study tool.



فهرست مطالب

Title Page
Copyright Page
Brief Contents
Contents
PART 1
	Chapter 1: Information Systems: An Overview
		1-1 Computers Andinformation Systemsin Daily Life
			Smartphones Everywhere and for Everything
			A New Era of Marketing: YouTube
			Social Networking and the Vulnerability of Personal Information
		1-2 Computer Literacyand Informationliteracy
		1-3 The Beginning:Transaction-Processing systems
			Information Technologies at Domino’s Pizza
		1-4 Management Information Systems
		1-5 Major Components of an Information System
			1-5a Data
			1-5b Database
			1-5c Process
			1-5d Information
			1-5e Examples of Information Systems
		1-6 Using Informationsystems And Information Technologies
			1-6a The Importance of Information Systems
			Information Technologies at The Home Depot
			Human Resource Information Systems in Action
			Information Technologies at UPS
			1-6b Using Information Technologies for a Competitive Advantage
			Information Technologies at Walmart
			1-6c Porter’s Five Forces Model: Understanding the Business Environment
			Information Technologies at Netflix
			Digital Innovation in Retail Industry Using Information Technologies
		1-7 The It Job Market
			1-7a CTO/CIO
			1-7b Manager of Information Systems Services
			1-7c Systems Analyst
			1-7d Network Administrator
			1-7e Database Administrator
			1-7f Computer Programmer
			1-7g Webmaster
		1-8 Outlook For The Future
		Reviews and Discussions
		Projects
		Are You Ready to Move On?
		CASE STUDY 1-1 Using Information Technologies at Federal Express
		CASE STUDY 1-2 Mobile Technology: A Key Player for Future Shopping
	Chapter 2: Computers: TheMachines Behind Computing
		2-1 Defining A Computer
			2-1a Components of a Computer System
		2-2 The History Of Computer Hardware And Software
			IBM Watson: A Supercomputer with Artificial Intelligence Capabilities
		2-3 The Power Of Computers
			2-3b Accuracy
			2-3c Storage and Retrieval
		2-4 Computer Operations
			A Supercomputer in Your Pocket
			2-5 Input, Output, Andmemory Devices
				2-5a Input Devices
				Touchless Computing: The New Paradigm in User System Interface
				2-5b Output Devices
				A Popular Application of CloudStorage: Keeping Photos Online
			2-6 Classes Of Computers
				Popular iPad Business Applications
				2-6a Server Platforms: An Overview
				Ubiquitous Computing
			2-7 What Is Software?
				Office 365: Making Data and Applications Portable
				2-7a Operating System Software
				iOS: The Brain Behind Apple Devices
				2-7b Application Software
			2-8 Computer Languages
			Reviews and Discussions
			Projects
			Are You Ready to Move On?
			CASE STUDY 2-1 Become Your Own Banker
			CASE STUDY 2-2 iPads: New Productivity Tools for Service Workers
	Chapter 3: Database Systems,Data Warehouses, and Data Marts
		3-1 Databases
			3-1a Types of Data in a Database
			BI in Action: Law Enforcement
			3-1b Methods for Accessing Files
		3-2 Logical Database Design
			3-2a The Relational Model
		3-3 Components Of A Dbms
			3-3a Database Engine
			3-3b Data Definition
			3-3c Data Manipulation
			Graph Databases Move Relational Databases One Step Forward
			3-3d Application Generation
			3-3e Data Administration
		3-4 Recent Trends In Database Design And Use
			3-4a Data-Driven Web Sites
			3-4b Distributed Databases
			3-4c Object-Oriented Databases
		3-5 Data Warehouses
			Data Warehouse Applications at Marriott International
			3-5a Input
			3-5b ETL
		3-6 Data Marts
			Data Mining and the Airline Industry
		3-7 Business Analytics
			Mobile Analytics in Action: Airbnb
		3-8 The Big Data Era
			Predictive Analytics in Action
			3-8a Who Benefits from Big Data?
			Big Data in Action
			3-8b Tools and Technologies of Big Data
			3-8c Big Data Privacy Risks
		3-9 Database Marketing
			Database Marketing in Action:Caterpillar Corporation
			Reviews and Discussions
			Projects
			Are You Ready to Move On?
			CASE STUDY 3-1: Data Mining Helps Students Enroll in Courses with Higher Chances of Success
			CASE STUDY 3-2: Data Mining Tools at Pandora Radio
	Chapter 4: Personal, Legal, Ethical,and Organizational Issues of Information Systems
		4-1 Privacy Issues
			Social Networking Sitesand Privacy Issues
			Employee Monitoring: Improving Productivity or Invasion of Privacy
			4-1a E-mail
			4-1b Data Collection on the Web
			E-Mail and Corporate Data Leakage
			Facebook Experiments: Marketing Tools or Unethical Behavior?
		4-2 Ethical Issuesof Information Technologies
			Ten Commandments of Computer Ethics19
			4-2a Censorship
			Internet Censorship: A Global Problem
			4-2b Intellectual Property
			Software Piracy: A Global Problem
			4-2c Social Divisions and the Digital Divide
			Verizon’s Cybersquatting Suit
		4-3 The Impact Of information Technology in The Workplace
			The Digital Divide in Action
			4-3a Information Technology and Health Issues
			Health and Social Issues of Online Gaming
		4-4 Green Computing
		Reviews and Discussions
		Projects
		Are You Ready to Move On?
		CASE STUDY 4-1: Telecommuting with a New Twist
		CASE STUDY 4-2: Privacy and Other Legal Issues at Google
	Chapter 5: Protecting Information Resources
		5-1 Risks Associated with Information Technologies
			5-1a The Costs of Cyber Crime to the U.S. Economy
			5-1b Spyware and Adware
			5-1c Phishing, Pharming, Baiting, Quid ProQuo, SMiShing, and Vishing
			5-1d Keystroke Loggers
			5-1e Sniffing and Spoofing
			5-1f Computer Crime and Fraud
			Challenges of Insiders’ Threats
			Identity Theft at the Internal Revenue Service
			Types of Hackers
		5-2 Computer And Network Security: Basic Safeguards
			Nearly All Organizations Get Hacked
		5-3 Security Threats: An Overview
			5-3a Intentional Threats
			Protecting Against Data Theft and Data Loss
			Social Engineering Costs Ubiquiti Networks More Than $39 Million
		5-4 Security Measures and Enforcement: An Overview
			5-4a Biometric Security Measures
			Biometrics at Phoebe Putney Memorial Hospital
			5-4b Nonbiometric Security Measures
			5-4c Physical Security Measures
			5-4d Access Controls
			Lost and Stolen Laptops
			5-4e Virtual Private Networks
			5-4f Data Encryption
			5-4g E-Commerce Transaction Security Measures
			5-4h Computer Emergency Response Team
		5-5 Guidelines For A Comprehensive Security System
			Sarbanes-Oxley and Information Security
			5-5a Business Continuity Planning
		Reviews and Discussions
		Projects
		Are You Ready To Move On?
		CASE STUDY 5-1: Vulnerabilities of Medical Devices
		CASE STUDY 5-2: Security Breach at Yahoo!
PART 2
	Chapter 6: Data Communication: Delivering Information Anywhere and Anytime
		6-1 Defining Data Communication
			6-1a Why Managers Need to Know About Data Communication
			GoToMeeting: Example of an E-collaboration Tool
			Reviews and Discussions
			Projects
			Are You Ready to Move On?
			CASE STUDY 6-1: Data Communication at Walmart
			CASE STUDY 6-2: Protecting the Security and Privacy of Mobile Devices
		6-2 Basic Components Of A Data Communication System
			6-2a Sender and Receiver Devices
			6-2b Modems
			6-2c Communication Media
		6-3 Processing Configurations
			Google Invests in Communication Media
			6-3a Centralized Processing
			6-3b Decentralized Processing
			6-3c Distributed Processing
			6-3d Open Systems Interconnection Model
		6-4 Types of Networks
			6-4a Local Area Networks
			6-4b Wide Area Networks
			6-4c Metropolitan Area Networks
		6-5 Network Topologies
			6-5a Star Topology
			6-5b Ring Topology
			6-5c Bus Topology
			6-5d Hierarchical Topology
			6-5e Mesh Topology
		6-6 Major Networking Concepts
			6-6a Protocols
			6-6b Transmission Control Protocol/Internet Protocol
			6-6c Routing
			6-6d Routers
			6-6e Client/Server Model
		6-7 Wireless And Mobile Networks
			Mobile Computing and Mobile Apps
			6-7a Wireless Technologies
			6-7b Mobile Networks
		6-8 Wireless Security
			Privacy and Ethical Issues of Wireless Devices
		6-9 Convergence of Voice, Video, And Data
			Telepresence: A New Use of Data Communication and Convergence
		CASE STUDY 6-1: Data Communication at Walmart
		CASE STUDY 6-2: Protecting the Security and Privacy of Mobile Devices
	Chapter 7: The Internet, Intranets, and Extranets
		7-1 The Internet And The world Wide Web
			7-1a The Domain Name System
			Major Events in the Development of the Internet
			7-1b Types of Internet Connections
			What Is HTML?
		7-2 Navigational Tools, Search Engines, And Directories
			7-2a Navigational Tools
			7-2b Search Engines and Directories
		7-3 Internet Services
			7-3a E-Mail
			7-3b Newsgroups and Discussion Groups
			7-3c Instant Messaging
			7-3d Internet Telephony
		7-4 Web Applications
			7-4a Tourism and Travel
			7-4b Publishing
			7-4c Higher Education
			7-4d Real Estate
			7-4e Employment
			7-4f Financial Institutions
			7-4g Software Distribution
			7-4h Healthcare
			Electronic Health Records Pay Off for Kaiser Permanente
			7-4i Politics
			The Internet in 2020
		7-5 Intranets
			7-5a The Internet versus Intranets
			7-5b Applications of an Intranet
		7-6 Extranets
		7-7 New Trends: The Web 2.0 And Web 3.0 Eras
			7-7a Blogs
			7-7b Wikis
			LinkedIn: A Professional Social Networking Site
			7-7c Social Networking Sites
			7-7d Business Application of Social Networks
			7-7e RSS Feeds
			7-7f Podcasting
			Twitter: Real-time Networking with Your Followers
			7-7g The Internet2
		7-8 The Internet Of everything And Beyond
		The Internet of Everything in Action
		Reviews and Discussions
		Projects
		Are You Ready to Move On?
		CASE STUDY 7-1: Scotts Miracle-Gro’s Intranet: The Garden
		CASE STUDY 7-2: Social Networking in Support of Small Businesses
	Chapter 8: E-Commerce
		8-1 Defining E-Commerce
			8-1a The Value Chain and E-Commerce
			Twitter Helps Businesses Find Customers
			Showrooming and Webrooming
			8-1c Advantages and Disadvantages of E-Commerce
			The Home Depot Gets into E-Commerce
			8-1d E-Commerce Business Models
			E-Commerce in 2020
		8-2 Major Categoriesof E-Commerce
			8-2a Business-to-Consumer E-Commerce
			8-2b Business-to-Business E-Commerce
			8-2c Consumer-to-Consumer E-Commerce
			8-2d Consumer-to-Business E-Commerce
			8-2e Government and Nonbusiness E-Commerce
			8-2f Organizational or Intrabusiness E-Commerce
			E-Gov in Action: City of Denver, Colorado
		8-3 B2C E-Commerce Cycle
		8-4 B2B E-Commerce:A Second Look
			8-4a Major Models of B2B E-Commerce
			E-Procurement at Schlumberger
			B2B E-Commerce Growth and Best Practices
		8-5 Mobile And Voice-Based E-Commerce
			Mobile Commerce in Action: The Fast Food Restaurants
		8-6 E-Commerce Supporting Technologies
			8-6a Electronic Payment Systems
			Challenges in Using Mobile Payment Systems
			Mobile Marketing at Starbucks
			8-6c Mobile Marketing
			8-6d Search Engine Optimization
			Challenges in Using Digital Ads
		8-7 E-Commerce And Beyond: Social Commerce
			Social Commerce at Coca-Cola Company
		8-8 Hyper-Social Organizations
			Hyper-Social Organization in Action: Spotify
		8-9 Social Media Information Systems
		CASE STUDY 8-1: Widespread Applications of Mobile Ads
		CASE STUDY 8-2: Bridging the Gap Between E-Commerce and Traditional Commerce
	Chapter 9: Global Information Systems
		9-1 Why Go Global?
			Global Information Systems at Rohm & Haas
			9-1a E-Business: A Driving Force
			9-1b Growth of the Internet
			Making a Company Web Site Global
			9-1c The Rise of Non-English Speakers on the Internet
			9-1d Mobile Computing and Globalization
		9-2 Global Information Systems: An Overview
			9-2a Components of a Global Information System
			The Internet and Globalization in Action
			9-2b Requirements of Global Information Systems
			Video Conferencing Systems Support Globalization
			Globalization in Action: Alibaba
			9-2c Implementation of Global Information Systems
		9-3 Organizational Structures And Globali Nformation Systems
			9-3a Multinational Structure
			9-3b Global Structure
			9-3c International Structure
			9-3d Transnational Structure
			9-3e Global Information Systems Supporting Offshore Outsourcing
			Global Information System at FedEx
		9-4 Obstacles To Using Global Information Systems
			9-4a Lack of Standardization
			9-4b Cultural Differences
			9-4c Diverse Regulatory Practices
			9-4d Poor Telecommunication Infrastructures
			Privacy Law Differences between the United States and the European Union
			9-4e Lack of Skilled Analysts and Programmers
		CASE STUDY 9-1: Global Information Systems at Toyota Motor Company
		CASE STUDY 9-2: Information Technologies Support Global Supply Chain
PART 3
	Chapter 10: Building Successful Information Systems
		10-1 Systems Development Life Cycle: An Overview
		10-2 Phase 1: Planning
			10-2a Formation of the Task Force
			10-2b Feasibility Study
			A Feasible Project Becomes Unfeasible
		10-3 Phase 2: Requirements Gathering And Analysis
		10-4 Phase 3: Design
			10-4a Computer-Aided Systems Engineering
			10-4b Prototyping
		10-5 Phase 4: Implementation
			10-5a IT Project Management
			10-5b Request for Proposal
			Failed Order Management System at Avon
			10-5c Implementation Alternatives
		10-6 Phase 5: Maintenance
		10-7 New Trends In Systems Analysis And Design
			10-7a Service-Oriented Architecture
			10-7b Rapid Application Development
			10-7c Extreme Programming
			Extreme Programming in Action
			Agile Methodology at HomeAway, Inc.
			10-7d Agile Methodology
		CASE STUDY 10-1: Systems Development at SEB Latvia
		CASE STUDY 10-2: Crowdsourcing Pays Off
	Chapter 11: Enterprise Systems
		11-1 Supply Chain Management
			11-1a SCM Technologies
			Supply Chain Management at Coca-Cola Company
			Green SCM in Action: Walmart
			3D Printing in Action: the Medical Field
		11-2 Customer Relationship Management
			11-2a CRM Applications
			CRM at Delta Air Lines
			11-2b Personalization Technology
			Amazon’s Personalization Assists Sellers on Its Marketplace
		11-3 Knowledge Management
			Knowledge Management in Action
		11-4 Enterprise Resource Planning
			ERP Streamlines Operations at Naghi Group
		CASE STUDY 11-1: ERP at Johns Hopkins Institutions
		CASE STUDY 11-2: CRM at Starbucks
	Chapter 12: Management Support Systems
		12-1 Types Of Decisions In An Organization
			12-1a Phases of the Decision-Making Process
		12-2 Decision Support Systems
			12-2a Components of a Decision Support System
			12-2b DSS Capabilities
			12-2c Roles in the DSS Environment
			12-2d Costs and Benefits of Decision Support Systems
		12-3 Executive Information Systems
			12-3a Reasons for Using EISs
			12-3b Avoiding Failure in Designand Use of EISs
			12-3c EIS Packages and Tools
			Executive Information Systems at Hyundai Motor Company
		12-4 Group Support Systems
			Microsoft Office SharePoint Server: A New Type of Groupware
			12-4a Groupware
			Groupware and Health IT
			12-4b Electronic Meeting Systems
			Remote Collaboration with Google Apps for Work
			New Generations of Electronic Meeting Systems
			12-4c Advantages and Disadvantages of GSSs
		12-5 Geographic Information Systems
			12-5a GIS Applications
			GISs for Fighting Disease
		12-6 Guidelines For Designing A Management Support System
		CASE STUDY 12-1: UPS Deploys Routing Optimization with a Big Payoff
		CASE STUDY 12-2: GPS Technology and Analytics Combat Crimes
	Chapter 13: Intelligent Information Systems
		13-1 What Is Artificial Intelligence?
			13-1a AI Technologies Supporting Decision Making
			Computers Understanding Common Sense
			13-1b Robotics
		13-2 Expert Systems
			Medical Robotics in Action
			13-2a Components of an Expert System
			13-2b Uses of Expert Systems
			Expert Systems in Baltimore County Police Department
			13-2c Criteria for Using Expert Systems
			13-2d Criteria for Not Using Expert Systems
			13-2e Advantages of Expert Systems
		13-3 Case-Based Reasoning
		13-4 Intelligent Agents
			13-4a Shopping and Information Agents
			13-4b Personal Agents
			13-4c Data-Mining Agents
			Intelligent Agents in Action
			13-4d Monitoring and Surveillance Agents
		13-5 Fuzzy Logic
			13-5a Uses of Fuzzy Logic
		13-6 Machine Learning
			Fuzzy Logic in Action
			Neural Networks in Microsoft and the Chicago Police Department
		13-7 Genetic Algorithms
		13-8 Natural-Language Processing
		13-9 Integrating Ai Technologies Into Decision Support Systems
			NLP in Action: The Healthcare Industry
		13-10 Contextual Computing: Making Mobile Devices Smarter
			AI Technologies for Decision Making
			Contextual Computing in Action
		CASE STUDY 13-1: AI-Based Software Helps Businesses Better Understand Customers
		CASE STUDY 13-2: NLP: Making a Smartphone Smarter
	Chapter 14: Emerging Trends, Technologies, and Applications
		14-1 Trends In Software And Service Distribution
			14-1a Pull and Push Technologies
			14-1b Application Service Providers
		14-2 Virtual Reality
			14-2a Types of Virtual Environments
			14-2b Components of a Virtual Reality System
			14-2c CAVE
			14-2d Virtual Reality Applications
			Virtual Reality at Lockheed Martin
			14-2e Obstacles in Using VR Systems
			14-2f Virtual Worlds
			14-2g Augmented Reality
		14-3 Radio Frequency Identification: An Overview
			14-3a RFID Applications
			Coca-Cola Company Uses RFID-Based Dispensers for Generating Business Intelligence
		14-4 Quick Response Codes
			QR Codes in Action
		14-5 Biometrics: A Second Look
			Face Recognition Technology in Action
		14-6 Trends In Networking
			14-6b WiMAX
			14-6c Bluetooth
			14-6d Grid Computing
			14-6e Utility (On-Demand) Computing
			14-6f Cloud Computing
			Cloud Computing in Support of Small Businesses
			Edge Computing in Action
		14-7 Nanotechnology
		14-8 Blockchain Technology And Cryptocurrency
		CASE STUDY 14-1: Cloud Computing at Intercontinental Hotels Group (IHG)
		CASE STUDY 14-2: RFID at Macy’s Department Store
Endnotes
Index




نظرات کاربران