Information Systems: A Manager's Guide to Harnessing Technology
[Author removed at request of original publisher]
Computers & Technology
Information Systems: A Manager's Guide to Harnessing Technology
The publisher has enabled DRM protection, which means that you need to use the BookFusion iOS, Android or Web app to read this eBook. This eBook cannot be used outside of the BookFusion platform.

Information Systems: A Manager’s Guide to Harnessing Technology is intended for use in undergraduate and/or graduate courses in Management Information Systems and Information Technology.
ISBN: 978-1-946135-12-4

Title Page
Table Of Contents
Publisher Information
About the Author
Chapter 1: Setting the Stage: Technology and the Modern Enterprise
1.1 Tech’s Tectonic Shift: Radically Changing Business Landscapes
1.2 It’s Your Revolution
1.3 Geek Up—Tech Is Everywhere and You’ll Need It to Thrive
1.4 The Pages Ahead
Chapter 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners from Losers
2.1 Introduction
2.2 Powerful Resources
2.3 Barriers to Entry, Technology, and Timing
2.4 Key Framework: The Five Forces of Industry Competitive Advantage
Chapter 3: Zara: Fast Fashion from Savvy Systems
3.2 Don’t Guess, Gather Data
3.3 Moving Forward
3.1 Introduction
Chapter 4: Netflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits
4.1 Introduction
4.2 Tech and Timing: Creating Killer Assets
4.3 From Atoms to Bits: Opportunity or Threat?
Chapter 5: Moore’s Law: Fast, Cheap Computing and What It Means for the Manager
5.1 Introduction
5.2 The Death of Moore’s Law?
5.3 Bringing Brains Together: Supercomputing and Grid Computing
5.4 E-waste: The Dark Side of Moore’s Law
Chapter 6: Understanding Network Effects
6.1 Introduction
6.2 Where’s All That Value Come From?
6.3 One-Sided or Two-Sided Markets?
6.4 How Are These Markets Different?
6.5 Competing When Network Effects Matter
Chapter 7: Peer Production, Social Media, and Web 2.0
7.4 Electronic Social Networks
7.5 Twitter and the Rise of Microblogging
7.6 Other Key Web 2.0 Terms and Concepts
7.7 Prediction Markets and the Wisdom of Crowds
7.8 Crowdsourcing
7.9 Get SMART: The Social Media Awareness and Response Team
7.1 Introduction
7.2 Blogs
7.3 Wikis
Chapter 8: Facebook: Building a Business from the Social Graph
8.1 Introduction
8.2 What’s the Big Deal?
8.3 The Social Graph
8.4 Facebook Feeds—Ebola for Data Flows
8.5 Facebook as a Platform
8.6 Advertising and Social Networks: A Work in Progress
8.7 Privacy Peril: Beacon and the TOS Debacle
8.8 Predators and Privacy
8.9 One Graph to Rule Them All: Facebook Takes Over the Web
8.10 Is Facebook Worth It?
Chapter 9: Understanding Software: A Primer for Managers
9.1 Introduction
9.2 Operating Systems
9.3 Application Software
9.4 Distributed Computing
9.5 Writing Software
9.6 Total Cost of Ownership (TCO): Tech Costs Go Way beyond the Price Tag
Chapter 10: Software in Flux: Partly Cloudy and Sometimes Free
10.2 Open Source
10.3 Why Open Source?
10.4 Examples of Open Source Software
10.5 Why Give It Away? The Business of Open Source
10.6 Cloud Computing: Hype or Hope?
10.7 The Software Cloud: Why Buy When You Can Rent?
10.8 SaaS: Not without Risks
10.9 The Hardware Cloud: Utility Computing and Its Cousins
10.10 Clouds and Tech Industry Impact
10.11 Virtualization: Software That Makes One Computer Act Like Many
10.12 Make, Buy, or Rent
10.1 Introduction
Chapter 11: The Data Asset: Databases, Business Intelligence, and Competitive Advantage
11.1 Introduction
11.2 Data, Information, and Knowledge
11.3 Where Does Data Come From?
11.4 Data Rich, Information Poor
11.5 Data Warehouses and Data Marts
11.6 The Business Intelligence Toolkit
11.7 Data Asset in Action: Technology and the Rise of Wal-Mart
11.8 Data Asset in Action: Harrah’s Solid Gold CRM for the Service Sector
Chapter 12: A Manager’s Guide to the Internet and Telecommunications
12.1 Introduction
12.2 Internet 101: Understanding How the Internet Works
12.3 Getting Where You’re Going
12.4 Last Mile: Faster Speed, Broader Access
Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else)
13.1 Introduction
13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?
13.3 Where Are Vulnerabilities? Understanding the Weaknesses
13.4 Taking Action
Chapter 14: Google: Search, Online Advertising, and Beyond
14.1 Introduction
14.2 Understanding Search
14.3 Understanding the Increase in Online Ad Spending
14.4 Search Advertising
14.5 Ad Networks—Distribution beyond Search
14.6 More Ad Formats and Payment Schemes
14.7 Customer Profiling and Behavioral Targeting
14.8 Profiling and Privacy
14.9 Search Engines, Ad Networks, and Fraud
14.10 The Battle Unfolds
Please share your supplementary material!
The book hasn't received reviews yet.
You May Also Like
Sociology: Understanding and Changing the Social World
[Author removed at request of original publisher]
Sociology: Understanding and Changing the Social World
Writing for Success
[Author removed at request of original publisher]
Writing for Success
Principles of Marketing
[Author removed at request of original publisher]
Principles of Marketing
Principles of Economics
[Author removed at request of original publisher]
Principles of Economics
Organizational Behavior
[Author removed at request of original publisher]
Organizational Behavior
Introduction to Psychology
[Author removed at request of original publisher]
Introduction to Psychology
Information Systems for Business and Beyond
David T. Bourgeois, Ph.D.
Information Systems for Business and Beyond
Principles of Macroeconomics
[Author removed at request of original publisher]
Principles of Macroeconomics