table of contents - server runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of...

6
TABLEOF CONTENTS Preface xvi CHAPTER ONE The Information Age in Which YouLive: Changing the Face of Business OPENING CASE STUDY: DISRUPTIVE TECHNOLOGIES DISRUPT BLOCKBUSTER LATE FEES INTRODUCTION INFORMATION AS A KEY RESOURCE Data, Information, and Business Intelligence 6 Personal Dimensions of Information 6 OrganizationalDimensions of Information 8 PEOPLE AS THE KEY RESOURCE Information and TechnologyLiteracy 10 YourEthical Responsibilities 13 INFORMATION TECHNOLOGY AS A KEY RESOURCE Key TechnologyCategories 15 Ubiquitous Computing: Decentralized Computing, Shared Information, Mobile Computing, and a Whole Lot More 17 CREATING THE BUSINESS VISION FOR INFORMATION TECHNOLOGY TopLine versus Bottom Line 18 Databases in Support of Competitive Advantages 20 Supporting Decision Making for Competitive Advantage 21 Pursuing Major Business Initiatives for Competitive Advantage 24 Run, Grow,and Transform 25 INFORMATION TECHNOLOGY IN YOUR LIFE Your Career 26 Ethics, Security, and Privacy 27 Closing Case Study One: You and Your Information Closing Case Study Two: Technology Metrics- Measuring Efficiencyand Effectiveness Electronic Commerce: Using the Internet as a Tool to Find a Job viii 2 EXTENDED LEARNING MODULE A Computer Hardware and Software INTRODUCTION A QUICK TOUR OF TECHNOLOGY CATEGORIES OF COMPUTERS BY SIZE 3 4 Personal Digital Assistants (PDAs) 42 Tablet PCs 42 Notebook Computers 43 Desktop Computers 43 Minicomputers, Mainframe Computers, and Supercomputers 44 6 10 SOFTWARE:YOUR INTELLECTUALINTERFACE Application Software 45 System Software 48 14 HARDWARE:YOUR PHYSICALINTERFACE Common Input Devices 52 Common Output Devices 54 Common Storage Devices 56 cpa and RAM 59 Connecting the Hardware Outside to the Hardware Inside 61 18 CHAPTER TWO Major Business Initiatives: Gaining Competitive Advantage with IT OPENING CASE STUDY: BUSINESS INTELLIGENCE IS KEY TO THE SUCCESS OF THE MIAMI DOLPHINS INTRODUCTION 26 PORTER'SFIVEFORCESMODEL Buyer Power 73 Supplier Power 73 Threat of Substitute Products or Services 74 Threat of New Entrants 75 Rivalry among Existing Competitors 75 30 32 THEVALUE CHAIN Identifying ProcessesThat Add Value 77 Identifying ProcessesThat Reduce Value 77 36 SUPPLYCHAIN MANAGEMENT Strategic and Competitive Opportunities with SCM 80 IT Support for Supply Chain Management 81 38 39 40 42 45 51 70 71 72 72 76 78

Upload: dinhphuc

Post on 22-Apr-2018

222 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: TABLE OF CONTENTS - Server Runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of contents ix ... opening case study: krispy kreme-seven doughnuts for every man, woman,

TABLEOF CONTENTS

Preface xvi

CHAPTER ONE

The Information Age in Which YouLive:Changing the Face of Business

OPENING CASE STUDY: DISRUPTIVE TECHNOLOGIES

DISRUPT BLOCKBUSTER LATE FEES

INTRODUCTION

INFORMATION AS A KEY RESOURCE

Data, Information, and Business Intelligence 6PersonalDimensions of Information 6OrganizationalDimensions of Information 8

PEOPLE AS THE KEY RESOURCE

Information and TechnologyLiteracy 10YourEthical Responsibilities 13

INFORMATION TECHNOLOGY AS A KEY RESOURCE

Key TechnologyCategories 15Ubiquitous Computing: Decentralized Computing,

Shared Information, Mobile Computing, and aWholeLot More 17

CREATING THE BUSINESS VISION FOR INFORMATION

TECHNOLOGY

TopLine versus Bottom Line 18Databases in Support of Competitive

Advantages 20Supporting DecisionMakingfor Competitive

Advantage 21Pursuing MajorBusiness Initiatives

for Competitive Advantage 24Run, Grow,and Transform 25

INFORMATION TECHNOLOGY IN YOUR LIFE

Your Career 26

Ethics, Security, and Privacy 27

Closing Case Study One: You andYour Information

Closing Case Study Two: Technology Metrics-Measuring Efficiencyand Effectiveness

Electronic Commerce: Using the Internetas a Tool to Find a Job

viii

2

EXTENDED LEARNING MODULE A

Computer Hardware and Software

INTRODUCTION

A QUICK TOUR OF TECHNOLOGY

CATEGORIES OF COMPUTERS BY SIZE

3

4

Personal Digital Assistants (PDAs) 42Tablet PCs 42

Notebook Computers 43

Desktop Computers 43

Minicomputers, Mainframe Computers, andSupercomputers 44

6

10

SOFTWARE:YOUR INTELLECTUALINTERFACE

Application Software 45

System Software 48

14

HARDWARE:YOUR PHYSICALINTERFACE

Common Input Devices 52

Common Output Devices 54

Common Storage Devices 56cpa and RAM 59

Connecting the Hardware Outside to theHardware Inside 61

18CHAPTER TWO

MajorBusiness Initiatives: GainingCompetitive Advantage with IT

OPENING CASE STUDY: BUSINESS INTELLIGENCE IS KEYTO THE SUCCESS OF THE MIAMI DOLPHINS

INTRODUCTION

26PORTER'SFIVEFORCESMODEL

Buyer Power 73Supplier Power 73

Threat of Substitute Products or Services 74

Threat of New Entrants 75

Rivalry among Existing Competitors 7530

32THEVALUECHAIN

Identifying ProcessesThat Add Value 77

Identifying ProcessesThat Reduce Value 77

36SUPPLYCHAIN MANAGEMENT

Strategic and Competitive Opportunitieswith SCM 80

IT Support for Supply Chain Management 81

38

39

40

42

45

51

70

71

72

72

76

78

Page 2: TABLE OF CONTENTS - Server Runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of contents ix ... opening case study: krispy kreme-seven doughnuts for every man, woman,

Table of Contents ix

CUSTOMER RELATIONSHIP MANAGEMENT

Strategic and Competitive Opportunitieswith CRM 83

IT Support for CustomerRelationshipManagement 84

BUSINESS INTELLIGENCE

Strategic and Competitive Opportunitieswith BI 86

IT Support for Business Intelligence 87

INTEGRATED COLLABORATION ENVIRONMENTS

Strategic and Competitive Opportunitieswith ICEs 90

IT Support for Integrated CollaborationEnvironments 90

BACK TO THE BEGINNING

Closing Case Study One: If We Don't Have It,You Get It for Free

Closing Case Study Two: The Restaurant BusinessEats Up Business Intelligence

on Internet

EXTENDED LEARNING MODULE BThe World Wide Web and the Internet

INTRODUCTION

WORLD WIDE WEB

WebSites, Addresses, and Pages 104Understanding Addresses 105Using WebBrowserSoftware 106

SEARCH ENGINES

Usinga DirectorySearch Engine 108Usinga True Search Engine 110

INTERNET TECHNOLOGIES

The Internet Backbone 111Internet Servers 112Communications Protocols 113

CONNECTING TO THE INTERNET

Communications Software 115Telecommunications Hardware 116

CH PTER THREE

Databases and Data Warehouses: BuildingBusiness Intelligence

OPENING CASE STUDY: KRISPY KREME-SEVEN

DOUGHNUTS FOR EVERY MAN, WOMAN, AND CHILDIN THE UNITED STATES EVERY YEAR

81 INTRODUCTION

85

THE RELATIONALDATABASEMODEL

Collections of Information 126

Created with Logical Structures 126

With Logical Ties within the Information 128With Built-In Integrity Constraints 129

88

DATABASEMANAGEMENTSYSTEMTOOLS

DataDefinitionSubsystem 131Data Manipulation Subsystem 132Application Generation Subsystem 136Data Administration Subsystem 136

92

DATAWAREHOUSES AND DATA MINING

What Is a Data Warehouse? 140

What Are Data-Mining Tools? 141Data Marts: Smaller Data Warehouses 143

Data Mining as a CareerOpportunity 144ImportantConsiderationsin Usinga Data

Warehouse 14595

96INFORMATIONOWNERSHIP

100

Strategic Management Support 146The Sharing of Information with Responsibility 147Information Cleanliness 148

102

Closing Case Study One: Ben &Jerry's, Bigelow Teas,and Business Intelligence

Closing Case Study Two: Mining Dining Data

103

104

108

EXTENDED LEARNING MODULE C

Designing Databases and Entity-

Relationship Diagramming

INTRODUCTION

111 DESIGNING AND BUILDING A RELATIONAL DATABASE

114

Step 1: Defining Entity Classesand PrimaryKeys 163

Step 2: Defining Relationships among the EntityClasses 164

Step 3: Defining Information (Fields) for EachRelation 172

Step 4: Using a Data Definition Languageto Create Your Database 175

122C H PT ER FUR 178

Decision Support and Artificial

Intelligence: Brainpower for Your Business

123OPENING CASE STUDY: DECISION SUPPORT SYSTEM-

THE RESIDENT SECOND OPINION

124

126

130

140

146

150

152

157

160

161

161

179

Page 3: TABLE OF CONTENTS - Server Runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of contents ix ... opening case study: krispy kreme-seven doughnuts for every man, woman,

x Table of Contents

INTRODUCTION 238

DECISIONS, DECISIONS,DECISIONS

How YouMake a Decision 181

Types of Decisions You Face 182

DECISIONSUPPORT SYSTEMS 183

Components of a Decision Support System 184

GEOGRAPHIC INFORMATION SYSTEMS

ARTIFICIAL INTELLIGENCE

EXPERT SYSTEMS

What Expert Systems Can and Can't Do 192

NEURAL NETWORKS AND FUZZY LOGIC

Inside a Neural Network 195

Fuzzy Logic 197

GENETIC ALGORITHMS

INTELLIGENT AGENTS

Information Agents 200Monitoring-and-SurveillanceAgents 201Data-MiningAgents 202UserAgents 203

MULTI-AGENT SYSTEMS AND AGENT-BASED MODELING 204

Ant Coloniesand Swarm Intelligence 204

Closing Case Study One: Shuttle Debris, Trees, andSniper Attacks

Closing Case Study Two: Using Neural Networks toCategorize People

on 216

EXTENDED LEARNING MODULE D 218

Decision Analysis with Spreadsheet Software

INTRODUCTION 219

LISTS

BASIC AUTOFILTER

CUSTOM AUTOFILTER

CONDITIONAL FORMATTING

PIVOT TABLES

BACK TO DECISION SUPPORT

AutoFilter 235

ConditionalFormatting 235Pivot Table 235

220

222

224

226

228

235

180

181

CH PTER FIVE

Electronic Commerce: Strategies for theNew Economy

OPENING CASE STUDY: IS AMERICA ONLINE (AOL)INCHING TOWARD BECOMING AN INTERNET BANK?

INTRODUCTION

187

189

E-COMMERCE BUSINESS MODELS

UNDERSTAND YOUR BUSINESS, PRODUCTS, SERVICES,AND CUSTOMERS190

193

WhoAre Your Customers? 244

What Is the Value of Your Products andServices as Perceived by Your Customers? 245

FIND CUSTOMERS AND ESTABLISH RELATIONSHIPS

197

200

Business to Consumer 250

Businessto Business 252

MOVE MONEY EASILY AND SECURELY

Business to ConsumerPayment Systems 254

Business to Business Payment Systems 256

Security: ThePervading Concern 258

THE BROADENING OF E-GOVERNMENT

210

Government to Government

(G2G, intra-G2G) 262Government to Business 262

Government to Consumer 263

International Government to Government

(inter-G2G) 264

Government Spending on InformationTechnology 264

211

Closing CaseStudy One: When You're Big, You Can BeYour Own B2B E-Marketplace

Closing Case Study Two: Toting the E-Commerce Linewith eBags

Your

on Internet

EXTENDED LEARNING MODULE E

NetworkBasics(on CD)

CH PTER SIX

Systems Development: Phases, Tools,and Techniques

OPENINGCASE STUDY:MERCEDES-BENZONLINEBUILT-TO-ORDERTRUCKS

INTRODUCTION

239

240

242

244

250

254

261

267

269

274

276

278

279

280

Page 4: TABLE OF CONTENTS - Server Runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of contents ix ... opening case study: krispy kreme-seven doughnuts for every man, woman,

Table of Contents xi

THE SYSTEMS DEVELOPMENTLIFECYCLE

Phase 1: Planning 280

Phase 2: Analysis 282

Phase 3: Design 283

Phase 4: Development 284

Phase 5: Testing 285Phase 6: Implementation 286Phase 7: Maintenance 286

SYSTEMS DEVELOPMENT METHODOLOGIES

WaterfallMethodology 288RapidApplicationDevelopmentMethodology 288Extreme Programming Methodology 289Agile Methodology 290

OUTSOURCING

Outsourcing Options 293The Advantages and Disadvantages of

Outsourcing 295

Business Process Outsourcing (BPO) 297

PROTOTYPING

ThePrototyping Process 300The Advantages of Prototyping 301The Disadvantages of Prototyping 301

END-USER DEVELOPMENT

WhichApplications for IT to Offload 303The Right Toolfor the Job 303

Closing Case Study One: Getting SoftwareDevelopment Right

Closing Case Study Two: ToOutsource or Notto Outsource

on

EXTENDED LEARNING MODULE F

Building a WebPage with HTML (on CD)

CH PTER SEVEN 316

Enterprise Infrastructure and Integration:Building the Dynamic Enterprise

OPENING CASE STUDY; ONE VIEW

FOR DEL MONTE FOODS

INTRODUCTION

ENTERPRISE SYSTEMS

What Are Enterprise Systems? 318

Enterprise ResourcePlanning (ERP) Systems 320

TheEvolution of ERPSystems 323ERP Vendorsand Market Trends 324

280 DEVELOPING AGILE IT SYSTEMS

Availability 326Accessibility 326Reliability 327Scalability 327

F/~xibility 327Performance 327

CapacityPlanning 328

287 INFORMATION SYSTEMS INFRASTRUCTURE

Why Architecture Matters 330

Why Infrastructure Matters 330

290

INFORMATION TECHNOLOGY INFRASTRUCTURE 332

Decentralized Infrastructure 332CentralizedInfrastructure 333Distributed Infrastructure 334Client/Server Infrastructure 334OtherTypesof Infrastructures 335TheInfrastructure Investment 336Supportingan IT Infrastructure 337Real WorldIT Infrastructures 338

298

302

INTEGRATING THE ENTERPRISE

Why Integration Is Necessary 340Motivesfor Integration 341Benefits of Integration 342Integration Obstacles 342

Closing Case Study One: Linux Supportsan Infrastructure

305Closing Case Study Two: Netflix-Transforming theEntertainment Industry

306

on Internet311

314EXTENDED LEARNING MODULE G

Object-Oriented Technologies (on CD)

CH PTER EIGHT

Protecting Peopleand Information:Threats and Safeguards

317

318

OPENINGCASESTUDY:THEY KNOW ABOUT96 PERCENTOF AMERICAN HOUSEHOLDS

INTRODUCTION

ETHICS318

TwoFactors That Determine How You DecideEthical Issues 357

Guidelines for Ethical Computer System Use 358

Intellectual Property 359

326

328

339

344

345

349

352

354

355

356

356

Page 5: TABLE OF CONTENTS - Server Runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of contents ix ... opening case study: krispy kreme-seven doughnuts for every man, woman,

xii Table of Contents

PRIVACY 425

Privacy and Other Individuals 362

Identity Theft 362

Privacy and Employees 364

Privacy and Consumers 367Privacy and Government Agencies 371

Laws on Privacy 373

SECURITY

Security and Employees 374

Security and Outside Threats 376

Security Precautions 378

Closing CaseStudy One: Cautionary Talesof Indiscreet E-Mail

Closing Case Study Two: The Problem ofInformation Protection

Electronic Commerce: Making Travel

Arrangements on the Internet

EXTENDED LEARNING MODULE HComputer Crime and Forensics

INTRODUCTION

COMPUTERCRIME

Outside the Organization 392

WebDefacing 399

ThePlayers 400

Inside the Organization 403

COMPUTERFORENSICS

The Collection Phase 405

TheAnalysis Phase 408

RECOVERYAND INTERPRETATION

Places to Look for Useful Information 409

Waysof Hiding Information 412

WHO NEEDSCOMPUTERFORENSICINVESTIGATORS?

Proactive Computer Forensic Education forProblem Prevention 415

Reactive Computer Forensicsfor IncidentResponse 416

A Day in the Life of a Computer ForensicExpert 417

C HAP T ERN I N E 422

Emerging Trends and Technologies:Business, People, and TechnologyTomorrow

. OPENINGCASESTUDY:THE FUTURE:TECHNOLOGYOUT,PRINGLESIN 423

INTRODUCTION

361 THE CHANGING INTERNET

Software-as-a-Service 425Push, Not Pull, Technologiesand

Personalization 426

Voiceover Internet Protocol (VoIP) 428

374

PHYSIOLOGICALINTERACTION

Automatic SpeechRecognition 429

Virtual Reality 429CaveAutomatic Virtual Environments 431

Biometrics 432

383

INCREASINGPORTABILITYAND MOBILITY

Digital Cash 436

Wearable Computers 437

Multi-State CPUsand Holographic StorageDevices 438384

388

THE WIRelESS ARENA

TheNext Generation of Cell PhoneTechnology 439

RFID (Radio Frequency Identification) 440

390 MOST IMPORTANTCONSIDERATIONS

TheNecessityof Technology 443

Closing the Great Digital Divide 443

Technologyfor the Betterment of Society 444

Exchanging Privacy for Convenience 444Ethics, Ethics, Ethics 445

391

392

403

Closing CaseStudy One: Wildseed-A Cell Phonefor Every Fashion

Closing Case Study Two: T2C-Not Another NewE-Commerce Business Model

409

Electronic Commerce:Continuing YourEducation Through the Internet

415

EXTENDED LEARNING MODULE I

Building an E-Portfolio

INTRODUCTION

THE ELECTRONIC JOB MARKET-EXTENDINGYOUR REACH

CONVERGENCEOF ONLINE NETWORKINGAND RESUMEDEVELOPMENT

Start to Network 457

Perform a Self-Assessment 459Research Careers,Industries, and Companies 459

RESUMEBUILDING-A LIFELONGPROCESS

Content, Content, Content 462Electronic File Formats 467

What Is the Right Resume Style? 472

424

428

435

439

442

446

448

452

454

455

455

457

461

Page 6: TABLE OF CONTENTS - Server Runninggralib.hcmuns.edu.vn/sachmoi/2007/05-07/1mana.pdf · table of contents ix ... opening case study: krispy kreme-seven doughnuts for every man, woman,

Table of Contents xiii

DEVELOPING YOUR JOB SEARCH E-PORTFOLIO

Self-Promotion 473

Give Them What They Want 474The Shape of an E-Portfolio 475E-Gallery 475

WEB DESIGNCONSIDERATIONS

Basic WebDesign Principles 476

Design Your Homepage 481

PREPARINGWEBCONTENT

HTML versus Generated Code 485

Test, Test, Test 488

EXTENDED LEARNING MODULE J

Implementing a Database with MicrosoftAccess (on CD)

473

476

484

494

EXTENDED LEARNING MODULE K

Careersin Business (on CD)

496

EXTENDED LEARNING MODULE L 498

Building Web Sites with FrontPage (on CD)

EXTENDED LEARNING MODULE M 500

Programming in Excel with VBA (on CD)

526

540

547

548