Essentials of MIS (11th Edition)
Kenneth C. Laudon
Format: PDF / Kindle (mobi) / ePub
For undergraduate and graduate MIS courses.
This in-depth look at how today's businesses use information technologies is part of a complete learning package that includes the core text and extensive supplemental online materials. The core text consists of 12 chapters with hands-on projects covering the most essential topics in MIS. An important part of the core text is the Video Case Study and Instructional Video Package: 24 video case studies (2 per chapter) plus 16 instructional videos that illustrate business uses of information systems, explain new technologies, and explore concepts. Videos are keyed to the topics of each chapter.
Teaching and Learning Experience
This program will provide a better teaching and learning experience—for you and your students. Here’s how:
- Personalize learning with MyMISLab—the online homework, tutorial, and assessment program that fosters learning within and beyond the classroom.
- Cover the most essential topics in MIS using an integrated framework for describing and analyzing information systems.
- Connect classroom knowledge to everyday life by showing information systems composed of people, organization, and technology elements, reinforced in student projects and case studies.
Note: You are purchasing a standalone product; MyMISLab does not come packaged with this content. If you would like to purchase both the physical text and MyMISLab search for ISBN-10: 013380688X/ISBN-13: 9780133806885. That package includes ISBN-10: 0133576841/ISBN-13: 9780133576849 and ISBN-10: 0133581780/ISBN-13: 9780133581782.
¿MyMISLab is not a self-paced technology and should only be purchased when required by an instructor.
social consequences of systems, considering individual, social, and political responses. Balancing Power: Center Versus Periphery An early fear of the computer age was that huge, centralized mainframe computers would centralize power in the nation’s capital, resulting in a Big Brother society, as was suggested in George Orwell’s novel 1984. The shift toward highly decentralized computing, coupled with an ideology of empowerment of thousands of workers, and the decentralization of decision making
Latin American Citizens, and the National Association for the Advancement of Colored People. These efforts, in tandem with private and state efforts, are intended to give parents and students the skills to use technology responsibly. Still, the FCC will also continue its efforts to improve the availability of computing devices for all Americans. The gap between whites and minorities in technology ownership is still significant. Sixty-five percent of all Americans have broadband access, but the
business functions and entities for your business, your next job is to describe exactly how you want your employees to perform these functions. What specific tasks do you want your sales personnel to perform, in what order, and on what schedule? What steps do you want production employees to follow as they transform raw resources into finished products? How will customer orders be fulfilled? How will vendor bills be paid? The actual steps and tasks that describe how work is organized in a
for collaboration. • List and describe the various types of collaboration and social business tools. 2-5 What is the role of the information systems function in a business? • Describe how the information systems function supports a business. • Compare the roles played by programmers, systems analysts, information systems managers, the chief information officer (CIO), chief security officer (CSO), and chief knowledge officer (CKO). Chapter 2: Global E-business and Collaboration 69 Discussion
yourself what constitutes proper legal and ethical conduct. Although these major instances of failed ethical and legal judgment were not masterminded by information systems departments, information systems were instrumental in many of these frauds. In many cases, the perpetrators of these crimes artfully used financial reporting information systems to bury their decisions from public scrutiny in the vain hope they would never be caught. We deal with the issue of control in information systems in