Management Information Systems, Moving Business Forward / Edition 1

Paperback (Print)
Rent from
(Save 75%)
Est. Return Date: 07/28/2015
Buy New
Buy New from
Buy Used
Buy Used from
(Save 38%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $2.71
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Paperback)
  • All (12) from $2.71   
  • New (3) from $92.89   
  • Used (9) from $2.71   


This new first edition from best-selling author Kelly Rainer, and highly respected coauthor, Hugh Watson, supports your teaching goals by allowing for maximum flexibility of coverage, and by engaging students with a tested pedagogical structure. Utilizing flexible Learning Units comprised of tightly coupled concepts and Student Activities, Rainer transports the student from passively learning about IS to doing IS in a realistic context. Plug IT In learning extensions enable instructors to introduce material of interest at their discretion. Plug IT In's cover such topics as project management, business processes, and information asset protection.
Read More Show Less

Product Details

  • ISBN-13: 9780470889190
  • Publisher: Wiley
  • Publication date: 1/18/2012
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 672
  • Product dimensions: 8.40 (w) x 10.70 (h) x 1.00 (d)

Table of Contents

Chapter 1 Introduction to Information Systems 2

1.1 Why Should I Study Information Systems? 5

1.2 Overview of Computer-Based Information Systems 12

1.3 How Does IT Impact Organizations? 22

1.4 Why Are Information Systems Important to Society? 25

Chapter 2 Organizational Strategy, Competitive Advantage, and Information Systems 42

2.1 Business Pressures, Organizational Responses, and IT Support 45

2.2 Competitive Advantage and Strategic Information Systems 56

2.3 Business–IT Alignment 63

Chapter 3 Data and Knowledge Management 80

3.1 Managing Data 83

3.2 The Database Approach 86

3.3 Database Management Systems 93

3.4 Data Warehouses and Data Marts 100

3.5 Knowledge Management 108

Chapter 4 Telecommunications and Networking 126

4.1 What Is a Computer Network? 129

4.2 Network Fundamentals 132

4.3 The Internet and the World Wide Web 139

4.4 Network Applications 145

Chapter 5 Business Intelligence 172

5.1 Managers and Decision Making 175

5.2 What Is Business Intelligence? 180

5.3 Business Intelligence Applications for Data Analysis 185

5.4 Business Intelligence Applications for Presenting Results 188

5.5 Business Intelligence in Action: Corporate Performance Management 194

Chapter 6 Ethics and Privacy 210

6.1 Ethical Issues 212

6.2 Privacy 218

Chapter 7 Information Security 236

7.1 Introduction to Information Security 238

7.2 Unintentional Threats to Information Systems 241

7.3 Deliberate Threats to Information Systems 245

7.4 What Companies Are Doing to Protect Information Resources 252

7.5 Information Security Controls 255

Chapter 8 Web 2.0 and Social Networks 280

8.1 Web 2.0 Underlying Technologies 282

8.2 Web 2.0 Applications 285

8.3 Categories of Web 2.0 Sites 292

Chapter 9 E-Business and E-Commerce 312

9.1 Overview of E-Business and E-Commerce 315

9.2 Business-to-Consumer (B2C) Electronic Commerce 321

9.3 Business-to-Business (B2B) Electronic Commerce 330

9.4 Electronic Payments 333

9.5 Ethical and Legal Issues in E-Business 337

Chapter 10 Wireless, Mobile Computing, and Mobile Commerce 354

10.1 Wireless Technologies 357

10.2 Wireless Computer Networks and Internet Access 363

10.3 Mobile Computing and Mobile Commerce 370

10.4 Pervasive Computing 378

10.5 Wireless Security 381

Chapter 11 Information Systems Within the Organization 398

11.1 Transaction Processing Systems 400

11.2 Functional Area Information Systems 402

11.3 Enterprise Resource Planning Systems 409

11.4 Reports 414

Chapter 12 Extending the Organization to Customers 428

12.1 Defi ning Customer Relationship Management 430

12.2 Operational Customer Relationship Management Systems 435

12.3 Analytical Customer Relationship Management Systems 440

12.4 Other Types of Customer Relationship Management Systems 441

Chapter 13 Extending the Organization Along the Supply Chain 458

13.1 Supply Chains 460

13.2 Supply Chain Management 463

13.3 Information Technology Support for Supply Chain Management 469

Chapter 14 Acquiring Information Systems and Applications 484

14.1 Planning for and Justifying IT Applications 486

14.2 Strategies for Acquiring IT Applications 491

14.3 The Traditional Systems Development Life Cycle 499

14.4 Alternative Methods and Tools for Systems Development 505

14.5 Vendor and Software Selection 509

Plug IT In 1 Business Processes and Business Process Management 525

PI1.1 Business Processes 525

PI1.2 Business Process Reengineering and Business Process Management 530

Plug IT In 2 Hardware and Software 535

Introduction 535

PI2.1 Introduction to Hardware 536

PI2.2 Introduction to Software 547

Plug IT In 3 Emerging Types of Enterprise Computing 561

PI3.1 Introduction 562

PI3.2 Server Farms 563

PI3.3 Virtualization 563

PI3.4 Grid Computing 565

PI3.5 Utility Computing 566

PI3.6 Cloud Computing 566

PI3.7 Emerging Software Trends 570

Plug IT In 4 Intelligent Systems 575

PI4.1 Introduction to Intelligent Systems 575

PI4.2 Expert Systems 578

PI4.3 Neural Networks 584

PI4.4 Fuzzy Logic 586

PI4.5 Genetic Algorithms 587

PI4.6 Intelligent Agents 588

Plug IT In 5 Project Management 595

PI5.1 Project Management for Information Systems Projects 595

PI5.2 The Project Management Process 598

PI5.3 The Project Management Body of Knowledge 600

Plug IT In 6 Protecting Your Information Assets 607

PI6.1 How to Protect Your Assets: The Basics 607

PI6.2 Behavioral Actions to Protect Your Information Assets 609

PI6.3 Computer-Based Actions to Protect Your Information Assets 613

Index 633

Read More Show Less

Customer Reviews

Average Rating 3
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted March 31, 2012

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)