Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.
For undergraduate and graduate courses in business. Understanding The Vast And Expanding Field of E-Commerce Laudon's E-Commerce 2016: Business, Technology, Society emphasizes three driving forces behind the expanding field of e-commerce: technology change, business development, and social issues. A conceptual framework uses the templates of many modern-day companies to further demonstrate the differences and complexities in e-commerce today. An in-depth investigation of companies such as Uber, Pinterest, and Apple kick-off the course while preparing students for real-life scenarios. In the Twelfth Edition, Laudon and Traver add new or update existing case studies to match developments in the e-commerce field as they exist in today's tech world. They built in additional video cases for each chapter, making the material even more accessible to students as they prepare for their future roles in business.
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
This text emerges out of the need to share information and knowledge on the research and practices of using multimedia in various educational settings. It discusses issues relating to planning, designing and development of interactive multimedia, offering research data.
A balanced and holistic approach to business analytics 'Business Analytics', teaches the fundamental concepts of the emerging field of business analytics and provides vital tools in understanding how data analysis works in today's organizations. Students will learn to apply basic business analytics principles, communicate with analytics professionals, and effectively use and interpret analytic models to make better business decisions.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. What You Will LearnDiscover information safeguard methodsImplement end-to-end information securityManage risk associated with information securityPrepare for audit with associated roles and responsibilitiesIdentify your information riskProtect your information assetsWho This Book Is For Security professionals who implement and manage a security framework or security controls within their organization. This book can also be used by developers with a basic knowledge of security concepts to gain a strong understanding of security standards for an enterprise.
Mobile technologies have been used in higher education for many years. They provide good solutions for teaching and learning and make learning available anywhere and anytime. This book includes six sections: design, development, adoption, collaboration, evaluation and future of mobile teaching and learning technology in higher education. It includes different projects and practices in higher education across different countries. The book provides in-depth background information and cases studies in high technology teaching and learning and future expectations for new technology in higher education. The variety of projects and programs running in different country helps boost innovation and discussion in future projects and practices. It also provide guidelines for future design and development of mobile applications for higher education.
Based on the authors' market-leading E-Commerce. Business. Technology. Society., this brief book offers the same thought-provoking and current content but in a brief format. E-Commerce Essentials emphasizes the three major driving forces behind E-commerce--technology change, business development, and social issues--to provide a coherent conceptual framework for understanding the field.
The authors utilize their years of working with companies on IT management / strategy to provide students with a practical look at the evolution of IT in business. The use of examples that highlight what the real world has in store. Over 80 cases are featured throughout its entirety, so students can see how real companies have used IT in the past, the present, and how they may use IT in the future. IT is changing so rapidly that it is difficult time staying current. This text includes the most recent information and statistics. Two major developments that have been added are: The concept of mobile computing for on-demand, real-time needs and Changes in the business world itself such as, international trade, national and global security, Cybercrime, outsourcing and off-shoring, corporate malfeasance, terrorism, and regional conflicts. This book also provides students with an historical walkthrough of IT management to see how the use of IT has evolved in business. The lessons learned in the text can be applied to future jobs opportunities. This text works well in an EMBA program or a graduate class where many of the students are also working professionals, as well as providing a reference for students after they graduate.