Information Systems: Creating Business Value
When a business devotes resources to its information systems, it expects a positive return on its investment. So should you.
You are about to invest your own time and effort in your Information Systems Course. With Huber, Piercy, and McKeown's Information Systems: Creating Business Value, you can expect to be prepared to succeed in the modern business world. This book shows you the value of investing in IS for your career and for today's organizations.
Table of Contents
Chapter 1. Introduction to Information Systems.
Chapter 2. Fundamentals of Information Technology.
Chapter 3. Doing Knowledge Work to Create Business Value.
PART TWO: THE ORGANIZATIONAL PERSPECTIVE.
Chapter 4. Business Fundamentals and IT Strategy.
Chapter 5. IT for the Organization.
Chapter 6. Creating Connected Solutions Through IS.
PART THREE: THE BUSINESS PARTNER PERSPECTIVE.
Chapter 7. E-Commerce for Consumers and Organizations.
Chapter 8. E-Commerce Technologies.
Chapter 9. The Connected Enterprise: Business Partnering and Protecting.
A. The Details of IT Hardware.
B. The Details of Software.
C. The Details of Networking.
D. The Details of SQL, Logical Modeling, and XML.
Sign up now »
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTTechnical Business AnalystNSW
- FTR&D EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
It’s time for midsize companies to start thinking differently about infrastructure. This white paper provides a brief overview of cloud computing, explains how midsize companies can benefit, and describes the ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia