【正文】
petitive advantage。 customer/supplier intimacy。Management Information System Review SummaryCONTENTSPART 1: Organizations, Management, and the Networked Enterprise 1I. Information Systems in Global Business Today 11. How are information systems transforming business and what is their relationship to globalization? 12. Why are information systems so essential for running and managing a business today? 13. What exactly is an information system? How does it work? What are its management, organization, and technology ponents? 14. What are plementary assets? Why are plementary assets essential for ensuring that information systems provide genuine value for an organization? 15. What academic disciplines are used to study information systems? How does each contribute to an understanding of information systems? What is a sociotechnical systems perspective? 2II. Global Ebusiness and Collaboration 21. What are business processes? How are they related to information systems? 22. How do systems serve the different management groups in a business? 23. How do systems that link the enterprise improve organizational performance? 24. Why are systems for collaboration and teamwork so important and what technologies do they use? 35. What is the role of the information systems function in a business? 3III. Information Systems, Organizations, and Strategy 31. Which features of organizations do managers need to know about to build and use information systems successfully? What is the impact of information systems on organizations? 32. How does Porter’s petitive forces model help panies develop petitive strategies using information systems? 33. How do the value chain and value web models help businesses identify opportunities for strategic information system applications? 44. How do information systems help businesses use synergies, core petencies, and networkbased strategies to achieve petitive advantage? 45. What are the challenges posed by strategic information systems and how should they be addressed? 4IV. Ethical and Social Issues in Information Systems 41. What ethical, social, and political issues are raised by information systems? 42. What specific principles for conduct can be used to guide ethical decisions? 53. Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? 54. How have information systems affected everyday life? 5PART 2: Information Technology Infrastructure 5V. IT Infrastructure and Emerging Technologies 51. What is IT infrastructure and what are its ponents? 52. What are the stages and technology drivers of IT infrastructure evolution? 53. What are the current trends in puter hardware platforms? 64. What are the current trends in software platforms? 65. What are the challenges of managing IT infrastructure and management solutions? 6VI. Foundations of Business Intelligence: Databases and Information Management 71. What are the problems of managing data resources in a traditional file environment and how are 7they solved by a database management system? 72. What are the major capabilities of DBMS and why is a relational DBMS so powerful? 73. What are some important database design principles? 74. What are the principal tools and technologies for accessing information from databases to 7improve business performance and decision making? 75. Why are information policy, data administration, and data quality assurance essential for managing the firm’s data resources? 8VII. Telemunications, the Internet, and Wireless Technology 81. What are the principal ponents of telemunications networks and key networking technologies? 82. What are the main telemunications transmission media and types of networks? 83. How do the Internet and Internet technology work, and how do they support munication 9and ebusiness? 94. What are the principal technologies and standards for wireless networking, munication, 9and Internet access? 95. Why are radio frequency identification (RFID) and wireless sensor networks valuable for business? 9VIII. Securing Information Systems 101. Why are information systems vulnerable to destruction, error, and abuse? 102. What is the business value of security and control? 103. What are the ponents of an organizational framework for security and control? 104. What are the most important tools and technologies for safeguarding information resources? 10PART 3: Key System Applications for the Digital Age 11IX. Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 111. How do enterprise systems help businesses achieve operational excellence? 112. How do supply chain management systems coordinate planning, production, and logistics with suppliers? 113. How do customer relationship management systems help firms achieve customer intimacy? 114. What are the challenges posed by enterprise applications? 115. How are enterprise applications used in platforms for new crossfunctional services? 12X. Emerce: Digital Markets, Digital Goods 121. What are the unique features of emerce, digital markets, and digital goods? 122. What are the principal emerce business and revenue models? 123. How has emerce transformed marketing? 124. How has emerce affected businesstobusiness transactions? 125. What is the role of mmerce in business, and what are the most important mmerce applications? 126. What issues must be addressed when building an emerce Web site? 13XI. Managing Knowledge 131. What is the role of knowledge management and knowledge management programs in business? 132. What types of systems are used for enterprisewide knowledge management and how do they provide value for businesses? 133. What are the major types of knowledge work systems and how do they provide value for firms? 134. What are the business benefits of using int