table of contents - server runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of...
TRANSCRIPT
TABLEOF CONTENTS
Preface xvi
CHAPTER ONE
The Information Age in Which YouLive:Changing the Face of Business
OPENING CASE STUDY: DISRUPTIVE TECHNOLOGIES
DISRUPT BLOCKBUSTER LATE FEES
INTRODUCTION
INFORMATION AS A KEY RESOURCE
Data, Information, and Business Intelligence 6PersonalDimensions of Information 6OrganizationalDimensions of Information 8
PEOPLE AS THE KEY RESOURCE
Information and TechnologyLiteracy 10YourEthical Responsibilities 13
INFORMATION TECHNOLOGY AS A KEY RESOURCE
Key TechnologyCategories 15Ubiquitous Computing: Decentralized Computing,
Shared Information, Mobile Computing, and aWholeLot More 17
CREATING THE BUSINESS VISION FOR INFORMATION
TECHNOLOGY
TopLine versus Bottom Line 18Databases in Support of Competitive
Advantages 20Supporting DecisionMakingfor Competitive
Advantage 21Pursuing MajorBusiness Initiatives
for Competitive Advantage 24Run, Grow,and Transform 25
INFORMATION TECHNOLOGY IN YOUR LIFE
Your Career 26
Ethics, Security, and Privacy 27
Closing Case Study One: You andYour Information
Closing Case Study Two: Technology Metrics-Measuring Efficiencyand Effectiveness
Electronic Commerce: Using the Internetas a Tool to Find a Job
viii
2
EXTENDED LEARNING MODULE A
Computer Hardware and Software
INTRODUCTION
A QUICK TOUR OF TECHNOLOGY
CATEGORIES OF COMPUTERS BY SIZE
3
4
Personal Digital Assistants (PDAs) 42Tablet PCs 42
Notebook Computers 43
Desktop Computers 43
Minicomputers, Mainframe Computers, andSupercomputers 44
6
10
SOFTWARE:YOUR INTELLECTUALINTERFACE
Application Software 45
System Software 48
14
HARDWARE:YOUR PHYSICALINTERFACE
Common Input Devices 52
Common Output Devices 54
Common Storage Devices 56cpa and RAM 59
Connecting the Hardware Outside to theHardware Inside 61
18CHAPTER TWO
MajorBusiness Initiatives: GainingCompetitive Advantage with IT
OPENING CASE STUDY: BUSINESS INTELLIGENCE IS KEYTO THE SUCCESS OF THE MIAMI DOLPHINS
INTRODUCTION
26PORTER'SFIVEFORCESMODEL
Buyer Power 73Supplier Power 73
Threat of Substitute Products or Services 74
Threat of New Entrants 75
Rivalry among Existing Competitors 7530
32THEVALUECHAIN
Identifying ProcessesThat Add Value 77
Identifying ProcessesThat Reduce Value 77
36SUPPLYCHAIN MANAGEMENT
Strategic and Competitive Opportunitieswith SCM 80
IT Support for Supply Chain Management 81
38
39
40
42
45
51
70
71
72
72
76
78
Table of Contents ix
CUSTOMER RELATIONSHIP MANAGEMENT
Strategic and Competitive Opportunitieswith CRM 83
IT Support for CustomerRelationshipManagement 84
BUSINESS INTELLIGENCE
Strategic and Competitive Opportunitieswith BI 86
IT Support for Business Intelligence 87
INTEGRATED COLLABORATION ENVIRONMENTS
Strategic and Competitive Opportunitieswith ICEs 90
IT Support for Integrated CollaborationEnvironments 90
BACK TO THE BEGINNING
Closing Case Study One: If We Don't Have It,You Get It for Free
Closing Case Study Two: The Restaurant BusinessEats Up Business Intelligence
on Internet
EXTENDED LEARNING MODULE BThe World Wide Web and the Internet
INTRODUCTION
WORLD WIDE WEB
WebSites, Addresses, and Pages 104Understanding Addresses 105Using WebBrowserSoftware 106
SEARCH ENGINES
Usinga DirectorySearch Engine 108Usinga True Search Engine 110
INTERNET TECHNOLOGIES
The Internet Backbone 111Internet Servers 112Communications Protocols 113
CONNECTING TO THE INTERNET
Communications Software 115Telecommunications Hardware 116
CH PTER THREE
Databases and Data Warehouses: BuildingBusiness Intelligence
OPENING CASE STUDY: KRISPY KREME-SEVEN
DOUGHNUTS FOR EVERY MAN, WOMAN, AND CHILDIN THE UNITED STATES EVERY YEAR
81 INTRODUCTION
85
THE RELATIONALDATABASEMODEL
Collections of Information 126
Created with Logical Structures 126
With Logical Ties within the Information 128With Built-In Integrity Constraints 129
88
DATABASEMANAGEMENTSYSTEMTOOLS
DataDefinitionSubsystem 131Data Manipulation Subsystem 132Application Generation Subsystem 136Data Administration Subsystem 136
92
DATAWAREHOUSES AND DATA MINING
What Is a Data Warehouse? 140
What Are Data-Mining Tools? 141Data Marts: Smaller Data Warehouses 143
Data Mining as a CareerOpportunity 144ImportantConsiderationsin Usinga Data
Warehouse 14595
96INFORMATIONOWNERSHIP
100
Strategic Management Support 146The Sharing of Information with Responsibility 147Information Cleanliness 148
102
Closing Case Study One: Ben &Jerry's, Bigelow Teas,and Business Intelligence
Closing Case Study Two: Mining Dining Data
103
104
108
EXTENDED LEARNING MODULE C
Designing Databases and Entity-
Relationship Diagramming
INTRODUCTION
111 DESIGNING AND BUILDING A RELATIONAL DATABASE
114
Step 1: Defining Entity Classesand PrimaryKeys 163
Step 2: Defining Relationships among the EntityClasses 164
Step 3: Defining Information (Fields) for EachRelation 172
Step 4: Using a Data Definition Languageto Create Your Database 175
122C H PT ER FUR 178
Decision Support and Artificial
Intelligence: Brainpower for Your Business
123OPENING CASE STUDY: DECISION SUPPORT SYSTEM-
THE RESIDENT SECOND OPINION
124
126
130
140
146
150
152
157
160
161
161
179
x Table of Contents
INTRODUCTION 238
DECISIONS, DECISIONS,DECISIONS
How YouMake a Decision 181
Types of Decisions You Face 182
DECISIONSUPPORT SYSTEMS 183
Components of a Decision Support System 184
GEOGRAPHIC INFORMATION SYSTEMS
ARTIFICIAL INTELLIGENCE
EXPERT SYSTEMS
What Expert Systems Can and Can't Do 192
NEURAL NETWORKS AND FUZZY LOGIC
Inside a Neural Network 195
Fuzzy Logic 197
GENETIC ALGORITHMS
INTELLIGENT AGENTS
Information Agents 200Monitoring-and-SurveillanceAgents 201Data-MiningAgents 202UserAgents 203
MULTI-AGENT SYSTEMS AND AGENT-BASED MODELING 204
Ant Coloniesand Swarm Intelligence 204
Closing Case Study One: Shuttle Debris, Trees, andSniper Attacks
Closing Case Study Two: Using Neural Networks toCategorize People
on 216
EXTENDED LEARNING MODULE D 218
Decision Analysis with Spreadsheet Software
INTRODUCTION 219
LISTS
BASIC AUTOFILTER
CUSTOM AUTOFILTER
CONDITIONAL FORMATTING
PIVOT TABLES
BACK TO DECISION SUPPORT
AutoFilter 235
ConditionalFormatting 235Pivot Table 235
220
222
224
226
228
235
180
181
CH PTER FIVE
Electronic Commerce: Strategies for theNew Economy
OPENING CASE STUDY: IS AMERICA ONLINE (AOL)INCHING TOWARD BECOMING AN INTERNET BANK?
INTRODUCTION
187
189
E-COMMERCE BUSINESS MODELS
UNDERSTAND YOUR BUSINESS, PRODUCTS, SERVICES,AND CUSTOMERS190
193
WhoAre Your Customers? 244
What Is the Value of Your Products andServices as Perceived by Your Customers? 245
FIND CUSTOMERS AND ESTABLISH RELATIONSHIPS
197
200
Business to Consumer 250
Businessto Business 252
MOVE MONEY EASILY AND SECURELY
Business to ConsumerPayment Systems 254
Business to Business Payment Systems 256
Security: ThePervading Concern 258
THE BROADENING OF E-GOVERNMENT
210
Government to Government
(G2G, intra-G2G) 262Government to Business 262
Government to Consumer 263
International Government to Government
(inter-G2G) 264
Government Spending on InformationTechnology 264
211
Closing CaseStudy One: When You're Big, You Can BeYour Own B2B E-Marketplace
Closing Case Study Two: Toting the E-Commerce Linewith eBags
Your
on Internet
EXTENDED LEARNING MODULE E
NetworkBasics(on CD)
CH PTER SIX
Systems Development: Phases, Tools,and Techniques
OPENINGCASE STUDY:MERCEDES-BENZONLINEBUILT-TO-ORDERTRUCKS
INTRODUCTION
239
240
242
244
250
254
261
267
269
274
276
278
279
280
Table of Contents xi
THE SYSTEMS DEVELOPMENTLIFECYCLE
Phase 1: Planning 280
Phase 2: Analysis 282
Phase 3: Design 283
Phase 4: Development 284
Phase 5: Testing 285Phase 6: Implementation 286Phase 7: Maintenance 286
SYSTEMS DEVELOPMENT METHODOLOGIES
WaterfallMethodology 288RapidApplicationDevelopmentMethodology 288Extreme Programming Methodology 289Agile Methodology 290
OUTSOURCING
Outsourcing Options 293The Advantages and Disadvantages of
Outsourcing 295
Business Process Outsourcing (BPO) 297
PROTOTYPING
ThePrototyping Process 300The Advantages of Prototyping 301The Disadvantages of Prototyping 301
END-USER DEVELOPMENT
WhichApplications for IT to Offload 303The Right Toolfor the Job 303
Closing Case Study One: Getting SoftwareDevelopment Right
Closing Case Study Two: ToOutsource or Notto Outsource
on
EXTENDED LEARNING MODULE F
Building a WebPage with HTML (on CD)
CH PTER SEVEN 316
Enterprise Infrastructure and Integration:Building the Dynamic Enterprise
OPENING CASE STUDY; ONE VIEW
FOR DEL MONTE FOODS
INTRODUCTION
ENTERPRISE SYSTEMS
What Are Enterprise Systems? 318
Enterprise ResourcePlanning (ERP) Systems 320
TheEvolution of ERPSystems 323ERP Vendorsand Market Trends 324
280 DEVELOPING AGILE IT SYSTEMS
Availability 326Accessibility 326Reliability 327Scalability 327
F/~xibility 327Performance 327
CapacityPlanning 328
287 INFORMATION SYSTEMS INFRASTRUCTURE
Why Architecture Matters 330
Why Infrastructure Matters 330
290
INFORMATION TECHNOLOGY INFRASTRUCTURE 332
Decentralized Infrastructure 332CentralizedInfrastructure 333Distributed Infrastructure 334Client/Server Infrastructure 334OtherTypesof Infrastructures 335TheInfrastructure Investment 336Supportingan IT Infrastructure 337Real WorldIT Infrastructures 338
298
302
INTEGRATING THE ENTERPRISE
Why Integration Is Necessary 340Motivesfor Integration 341Benefits of Integration 342Integration Obstacles 342
Closing Case Study One: Linux Supportsan Infrastructure
305Closing Case Study Two: Netflix-Transforming theEntertainment Industry
306
on Internet311
314EXTENDED LEARNING MODULE G
Object-Oriented Technologies (on CD)
CH PTER EIGHT
Protecting Peopleand Information:Threats and Safeguards
317
318
OPENINGCASESTUDY:THEY KNOW ABOUT96 PERCENTOF AMERICAN HOUSEHOLDS
INTRODUCTION
ETHICS318
TwoFactors That Determine How You DecideEthical Issues 357
Guidelines for Ethical Computer System Use 358
Intellectual Property 359
326
328
339
344
345
349
352
354
355
356
356
xii Table of Contents
PRIVACY 425
Privacy and Other Individuals 362
Identity Theft 362
Privacy and Employees 364
Privacy and Consumers 367Privacy and Government Agencies 371
Laws on Privacy 373
SECURITY
Security and Employees 374
Security and Outside Threats 376
Security Precautions 378
Closing CaseStudy One: Cautionary Talesof Indiscreet E-Mail
Closing Case Study Two: The Problem ofInformation Protection
Electronic Commerce: Making Travel
Arrangements on the Internet
EXTENDED LEARNING MODULE HComputer Crime and Forensics
INTRODUCTION
COMPUTERCRIME
Outside the Organization 392
WebDefacing 399
ThePlayers 400
Inside the Organization 403
COMPUTERFORENSICS
The Collection Phase 405
TheAnalysis Phase 408
RECOVERYAND INTERPRETATION
Places to Look for Useful Information 409
Waysof Hiding Information 412
WHO NEEDSCOMPUTERFORENSICINVESTIGATORS?
Proactive Computer Forensic Education forProblem Prevention 415
Reactive Computer Forensicsfor IncidentResponse 416
A Day in the Life of a Computer ForensicExpert 417
C HAP T ERN I N E 422
Emerging Trends and Technologies:Business, People, and TechnologyTomorrow
. OPENINGCASESTUDY:THE FUTURE:TECHNOLOGYOUT,PRINGLESIN 423
INTRODUCTION
361 THE CHANGING INTERNET
Software-as-a-Service 425Push, Not Pull, Technologiesand
Personalization 426
Voiceover Internet Protocol (VoIP) 428
374
PHYSIOLOGICALINTERACTION
Automatic SpeechRecognition 429
Virtual Reality 429CaveAutomatic Virtual Environments 431
Biometrics 432
383
INCREASINGPORTABILITYAND MOBILITY
Digital Cash 436
Wearable Computers 437
Multi-State CPUsand Holographic StorageDevices 438384
388
THE WIRelESS ARENA
TheNext Generation of Cell PhoneTechnology 439
RFID (Radio Frequency Identification) 440
390 MOST IMPORTANTCONSIDERATIONS
TheNecessityof Technology 443
Closing the Great Digital Divide 443
Technologyfor the Betterment of Society 444
Exchanging Privacy for Convenience 444Ethics, Ethics, Ethics 445
391
392
403
Closing CaseStudy One: Wildseed-A Cell Phonefor Every Fashion
Closing Case Study Two: T2C-Not Another NewE-Commerce Business Model
409
Electronic Commerce:Continuing YourEducation Through the Internet
415
EXTENDED LEARNING MODULE I
Building an E-Portfolio
INTRODUCTION
THE ELECTRONIC JOB MARKET-EXTENDINGYOUR REACH
CONVERGENCEOF ONLINE NETWORKINGAND RESUMEDEVELOPMENT
Start to Network 457
Perform a Self-Assessment 459Research Careers,Industries, and Companies 459
RESUMEBUILDING-A LIFELONGPROCESS
Content, Content, Content 462Electronic File Formats 467
What Is the Right Resume Style? 472
424
428
435
439
442
446
448
452
454
455
455
457
461
Table of Contents xiii
DEVELOPING YOUR JOB SEARCH E-PORTFOLIO
Self-Promotion 473
Give Them What They Want 474The Shape of an E-Portfolio 475E-Gallery 475
WEB DESIGNCONSIDERATIONS
Basic WebDesign Principles 476
Design Your Homepage 481
PREPARINGWEBCONTENT
HTML versus Generated Code 485
Test, Test, Test 488
EXTENDED LEARNING MODULE J
Implementing a Database with MicrosoftAccess (on CD)
473
476
484
494
EXTENDED LEARNING MODULE K
Careersin Business (on CD)
496
EXTENDED LEARNING MODULE L 498
Building Web Sites with FrontPage (on CD)
EXTENDED LEARNING MODULE M 500
Programming in Excel with VBA (on CD)
526
540
547
548