信息技术与管理

出版时间:2005年  出版社:北京大学出版社  作者:Ronald L. Thompson,William L. Cats-Baril  页数:537  
Tag标签:无  

前言

  在当前经济全球化的背景下,中国经济的发展需要大量具备扎实理论功底、了解国际规则、能够适应国际竞争需要的优秀的经济管理人才,所以,大力开展双语教学,适当引进和借鉴国外优秀的原版教材,是加快中国经济管理教育步伐,使之走向国际化的一条捷径。为此,北京大学出版社与国外著名出版公司麦格劳-希尔教育出版公司和汤姆森学习出版集团合作推出了《经济与金融经典入门教材》和《管理学经典入门教材》两套系列丛书,这两套丛书的大部分均同时包含英文版和翻译版,主要针对本科层次,目前首先推出英文版(英文影印版/英文改编版)。丛书的筛选完全是本着“出新、出好、出精”的原则,均经过北京大学及国内其他著名高校相关学者的精心挑选,分别汇集了国外经济与金融和管理学领域的经典教材,称得上是一套优中选精的丛书。  鉴于外版教材大多篇幅过长,且其中某些内容不适合我国的教学实际需要,因而我们对部分所选图书进行了必要的删节,成为英文改编版。在选书和删节的过程中,我们得到了许多老师的大力支持和帮助,在此,我们对他们表示衷心的感谢:  北京大学光华管理学院:张一弛、张志学、杨云红、雷明、武常岐、张红霞、陆正飞、黄慧馨  中国人民大学:李先国、杨波、胡波  中国农业大学管理学院:陆娟  中山大学岭南学院:贾佳  天津财经大学财政系:张进昌  哈尔滨工业大学工商管理学院:张莉、李国鑫  这两套丛书是对国外原版教材的直接或删节后影印,由于各个国家政治、经济、文化背景的不同,对于书中所持观点还请广大读者在阅读过程中注意加以分析和鉴别。另外,我们在对原版图书进行删节、重新编排页码的同时,为了便于读者核对使用索引,仍保留了原书的页码,因此读者在阅读过程中可能会发现有跳页现象,而且由于删节,某些文中提到的页码或内容有可能无法找到,对于由此给读者带来的诸多不便,我们深表歉意,恳请您的谅解。  我们期望本套教材的出版可以对我国经济管理学科的教学,尤其是经济管理专业本科的教学有所裨益,能够对我国经济管理学科的发展有所贡献。  一套丛书的推出和不断完善离不开大家的支持和帮助,我们也欢迎所有关心中国经济管理学科教育和发展的专家和学者及广大读者,给我们提出宝贵的意见和建议,诚挚地希望您能向我们推荐您所接触到的国外优秀的经济管理类图书。

内容概要

  《信息技术与管理》较系统地介绍了管理信息系统的基础知识,包括管理信息系统导论、信息技术基础、信息系统在组织中的应用、信息系统资源的管理共四个部分的内容。《信息技术与管理》的最大特点是系统性和实践性,适合无理工科背景的学生使用且所介绍内容可操作性较强。

作者简介

  Ronald L. Thompson is Associate Professor of Managementin Wake Forest Universitys Babcock Graduate School ofManagement. He holds a Ph.D. from the Ivey School of BusinessAdministration at the University of Western Ontario (London,Canada) and was formerly on the faculties of the University ofVermont and the University of Calgary. Ron has published in avariety of academic journals and has served as an associate edi-tor for MIS Quarterly. He also has taught a wide range of stu-dents and has won awards for teaching excellence. Ron and hiswife Jen enjoy numerous outdoor activities, including biking,golf, and trying to keep up with their two dogs when hiking.William t. Cats-Baril is Associate Professor of ManagementInformation Systems in the School of Business Administrationat the University of Vermont. He holds a Ph.D. from theUniversity of Wisconsin-Madison. He has held a variety of visit-ing appointments including stays at INSEAD and the LondonSchool of Economics. Willy has published more than 30 articlesand book chapters on a variety of topics in information technol-ogy and decision making. He has taught a variety of audiencesaround the world ranging from first-year undergraduate stu-dents to senior executives and has received various awards forteaching excellence. He has an international consulting practice.A former waterpolo player for the Mexican national team, Willynow enjoys skiing, bicycling, trekking, and scuba diving.

书籍目录

1 Introduction to InformationTechnology and ManagementIntroduction 2Tech Talk: Information Technology 2Information Technology Issues 3Tech Talk: Capacity 4Tech Talk: information TechnologyInfrastructure 6The Music Industry: 1999-2001 7Tech Talk: Instant Messaging and Chat 9Industry Stakeholders 9Major Themes of the Book 12Organizational Responsiveness 12Competitive Strategy 13Business Brief 1.1: Fidelity Sharpens ItsTechnological Edge 15Global Perspective 16Business Brief 1.2: AOL to Unveil ChinaVenture 17Ethical Issues 18Business Brief 1.3: Big Bro Is EyeingYour E-Mail 18Impact on Careers 19Tech Talk: HyperText kinks 19Tech Talk: System Interface 20Framework for the Book 21Summary 23Case Assignment: Watch Your Speed 25Reflections Case: The Rosetta Disk 26Foundations of InformationTechnology 292 Software and Hardware 31Introduction 32Performance Criteria 34Performance Trade-Offs 35Tech Talk: Moores Law 35Software 38Systems Software 39Business Brief 2.1: Microsoft Uses Fee Code 42Application Software 43Hardware 47Software Horror Stories 47Business Brief 2.2: Buggy Software 48Software Tips! 48Input Devices: Accepting Data 48Tech Talk: Computer Sizes 49System Unit and Motherboard 51Processor and Main Memory:Processing Data 54Tech Talk: Measuring Data and StorageCapacity 55Tech Talk: Measuring Internal ClockSpeed 56Tech Talk: Measuring the Speed of ExecutingInstructions 56Business Brief 2.3: Chip Breakthrough 57Computer Design 58Secondary Storage: Storing Data 58Tech Talk: Measuring Time 58Output Devices: Presenting Data 61Hardware Tips! 63Hardware Horror Stories 64Concluding Comments 64Summary 65Case Assignment I: Factory of the Future? 68Case Assignment I1: Pull the Plug onKaZaA? 69Reflections Case: Virtual Immortality 703 Content Management 72Introduction 73NextCard, Inc. 73Data Representation 73File Access 75Transaction Processing 78Database Processing 80Data Capture and Processing 82Content as a Corporate Resource 83Business Brief 3.1: Keeping Tabs on the81ood Bank 84Database Organization-RelationalModel 84Maintaining Data in a Database 86Retrieving Information from aRelational Database 87Advanced Database QueryInterfaces 88Presenting Information from a Database 90Business Brief 3.2: Giving the Web a Voice 91Performance Criteria for DatabaseManagement Systems 92Object-Oriented Database Model 93Object-Relational Database Management Systems 94Data Warehouses 94Business Brief 3.3: BB~T 97Data Mining 98Business Brief 3.4: E.piphany? 102Additional Data Management Issues 102Distributed Databases 102Data Security 103Summary 104Case Assignment: DoubleClick 106Reflections Case: The Genome Project 108Practicum Case Assignment: Green[andCommercial Rentals 109Technical Note 1: Data Modeling andEntity-Relationship Diagrams 112Creating a Data Model 117Moving from a Data Model to a DatabaseDesign 1174 Telecommunications and Networking 120Introduction 121Organizational Communication 122Formal and Informal Communication 122Communication Dyads 123Business Brief 4.1: Phony Press ReleaseLands Hoaxer in Jail 124Distortion in OrganizationalCommunication 125Types of Distortion 126Information Overload 129Business Brief 4.2: Slowed to a Dead HaR 130Analog and Digital DataRepresentation 130Telecommunications 131The Changing Face ofTelecommunications 133Tech Talk: Data Channels 134Protocols 136ISDN 136DSL 136Tech Talk: Data Transfer Rates 137Cable Modems 137T-Carrier System 138Frame Relay 139Fast Ethernet 139Wireless 139Business Brief 4.3: China BuildsTelecommunications Infrastructure 142Networks 142Components of a LAN 144LAN Protocols t47LAN Topologies 148Intranets and Extranets 148Network Horror Stories 152Summary 153Case Assignment: Guerrilla WirelessNetworking for the Masses 155Reflections Case: Ubiquitous Computing 1575 The internet and Electronic Commerce 160Introduction 161Evolution of the Intemet 162Intemet Building Blocks 164Internet Addressing 164Electronic Mail, Newsgroups, List Services 165Telnet and Ftp 166World Wide Web 167Company Example: NextCard 168Additional Internet Technologies 170Markup Languages 170Dynamically Generated Web Pages 172Web Portals 174Search Engines 175Intelligent Agents 175Industry Example: Brokerage 176Business Opportunities 179Business-to-Consumer 179Business-Based Markets 180Business Brief 5.1: Plugged-in Fans Buy Hot Tickets in Web Presales 181Consumer-Based Markets 181Business-to-Business 182Business Brief 5.2: Selling Backpacks on the Web Is Harder Than It Looks 183The Mobile Internet 184Internet Technologies and Business Operations 186Intemet Issues 186Security 187Privacy 189Consumer Protection 189Censorship 190Business Brief 5.3: U.S. Firms Concerned about Global Legal Pact 191Intellectual Property Rights 191Interactive Activities 192Summary 194Case Assignment: Wireless Banking Strategy 196O rganizational Uses of InformationSystems 1996 information Systems and Organizational Competition 201Introduction 202Components of an Information System 202Purpose 202Roles 203Procedures 204Content 205Information Technology 206Competition and Strategy 207Business Brief 6.1: Mr. Cozzette Buys a Computer 210Understanding Strategy 211SWOT Analysis 212The Value Chain 212Business Brief 6.2: General Motors: From Bricks to Clicks 215Porters Five-Forces Model 216Case Example: Marshall Industries 219Management Objectives for Information Systems 221Competitive Vulnerabilities 225Positioning the I/T Organization 225Managing Emerging Technologies 226Summary 229Case Assignment I: Demco Uses I/T to Help Customers 231Case Assignment Il: Pollution Solutions (A): One Persons Waste...2327 information Systems and7 Organizational Responsiveness 236Introduction 237A Framework to Achieve OrganizatiOnal Responsiveness 239Organizations as Systems 239The Elements of Organizational Responsiveness 241Inputs 242Business Brief 7.1: Border Delays Slow Production 243Outputs 243Transformation Process 245Business Brief 7.2: Customer Support-- ParTech 246Business Brief 7.3: I/T Can TransformOperations: The Russell Corporation 248The Dynamics of Organizational Responsiveness 249Homeostasis 249Forecasting 251Business Brief 7.4: In Hindsight 253Feedback 254Environmental Scanning 257Open versus Closed Systems 259Buffers 260Summary 262Case Assignment I: Wal-Mart TrumpsMoores Law 264Case Assignment I1: Creative Aerospace, Inc. 2658 Information Systems and Organizational Decision Making 268Introduction 269Managerial Functions 269Traditional Scheme for ClassifyingInformation Systems 272Decision Making in Management 273The Realities of Decision Making 274Alternative Views of Management 275The Limitations of Rationality 278Using Information Systems to Improve Decision Making 282Controlling 282Automating Decisions 284Supporting Complex Decisions 285Augmenting Knowledge 286Business Brief 8.1: Computers as Complexity Busters: Id Like Next Friday Off 287Business Brief 8.2: Keeping the Engine Tuned 289Knowledge Management 291Business Brief 8.3: Tapping Knowledge at P fx G 292Strategic Planning 292Group Decision Making 293Business Brief 8.4: WebDAV Protocol Comes of Age 295Summary 296Case Assignment I: Wisconsin Department of Health and Social Services 297Case Assignment I1: The Norris Company(B): Sherrys Day at the Office 2989 Organizational Use ofInformation Systems 302Introduction 303Organizations and Organizational Structure 303Business Functions 304Accounting 305Finance 305Marketing and Sales 306Production and OperationsManagement 307Customer Support 308Human Resource Management 308Information Services 308Business Processes 309Process View of an Organization 312Business Brief 9.1: National and Provincial Building Society 314Information Systems to Support Organizational Processes 315The Virtual Organization 317Business Brief 9.2: Networks as Distortion Busters 319Cautions on the Use of I/T 319Information Systems and Regulatory Issues 320Bad Timing 320Waking a Sleeping Giant 320Cultural Issues Matter 321Vulnerability to Systems Failure 322Ethical Vulnerabilities 323Business Brief 9.3: Happy Birthday to You 324Business Brief 9.4: Internet Privacy 325Establish and Enforce Written Policies on Ethics and the Use of I/T 325Summary 328Case Assignment I: Anchoring Logistics in Technology 329Case Assignment Ii: When Affairs of the Heart Raise I/T Privacy issues 331Module II Case: Dakin Farm (A): Mail-OrderProcessing 333Managing Information SystemsResources 33910 Business Process Management and Enterprise Systems 341Introduction 342Organizational Strategies and Business Processes 344Business Process Automation 344Business Process Improvement and Transformation 346Principles of Business Process Improvement 346Example of Business Process Improvement 349Principles of Business Process Transformation 350Example of Business Process Transformation 351Business Brief 10.1: The Axe Can Be Sharp:The Ultimate in Process Transformation 353Information Systems and Process Management 353Enterprise Information Systems 354Enterprise Resource Planning and Enterprise Systems 355Issues in Implementing Enterprise Systems 357Business Brief 10.2: Answering Customers with CRM 358Business Brief 10.3: Integrating Purchasing with ERP 360Summary 361Case Assignment I: The Limited Curtails Fraud 363Case Assignment Il: Lehigh Valley Hospital Gets a New Backbone 36411 Information Systems Development 366Introduction 367Roles in Information Systems Development 369The Systems Development Process 369Structured Development versus Object- Oriented Development 370Object-Oriented Techniques 371Step 1. Project Planning (Define Goals and Objectives) 371Step 2. Analysis (Define Information Requirements) 374Step 3. Generation and Evaluation of Alternatives 376Design Strategies: Build, Buy, or Outsource 380Step 4. Designing the Chosen Alternative 380Business Brief 11.1: Ski Conditions Ideal after I/S Integration 381Step 5. Implementation 384Business Brief 11.2: Powering a Peacock 386Step 6. Maintenance and Operations 388CASE Tools 389Alternative Development Techniques 390End-User Development 391Rapid Application Development 392Operational Vulnerabilities 393Business Brief 11.3: Application Development Life Cycle Gets an ASP Angle 394Effective Project Management 395Summary 396Case Assignment I: Intelligent Electronics 399Case Assignment il: Great Sports! 400Technical Note 2: Structured Analysisand Design Techniques 403Structured Tools and Techniques 403Sample Case: Westward Ho 403Data Flow Diagrams 404Westward Ho: Operations 405DFDs: The Context Diagram 406DFDs: The System-Level Diagram 406DFDs: Lower-Level Diagrams 408Diagraming Conventions 409Data Models and Data Dictionaries 409Structured Design 410Structured Programming , 412Summary 412External Information SystemsSourcing 414Introduction 41512 Buying Packaged Software 415Outsourcing 420Business Brief 12.1: Problems for Rich-ConSteel 421Service Providers 423Application Service Provider 423Business Brief 12.2: Spin-off SeesOutsourcing as Key to Success 424Management Services Provider 426Web Services 428SelectiveSourcing 431Summary 432Case Assignment I: Miller ElectricCase Assignment ii: Outsourcing in theRetail Sector 43613Information ResourceManagement 438Introduction 439Hersheys Biggest Dud 439Spot Shortages 439The Mars Option 440The Project 440Big-Bang Approach 441Not an Isolated Instance 442Information Systems as a CorporateResource 443Content as a Corporate Resource 444Information Systems Planning 445Organization of the InformationServices Department 447Cost and Resource Management 449Business Brief 13.1: Charge ThoseUsers 450Disaster Recovery Planning 451Business Brief 13.2: Recreating Years of Files,One Application at a Time 452Systems Security 455Business Brief 13.3: IBM Moves to PlugHoles in Disaster Recovery 456Summary 458Case Assignment I: Pollution Solutions (C):When It Rains... 460Case Assignment Il: Disaster Recovery atVermont Mutual 461Module iii Case: Dakin Farm (B): Whats Next? 46414 Information Technology: Emerging and Future Issues 472Introduction 473Organizational Management 474Employment and Entrepreneurship 476Business Brief 14.1:Just-Not-in-Time 477Business Brief 14.2: Amid Record Profits,Companies Continue Layoffs 478Ethical, Security, and International Issues 480Business Brief 14.3: The Cyber-Surveillance Bill and You 481Cyberterrorism 482Semantic Hacking: Who Can You Believe? 482Business Brief 14.4: Cyberterrorism 483Business Brief 14.5: Want a New Credit Card Number? 484Business Brief 14.6: Semantic Hacking 485Summary 490Case Assignment I: The Parable of the Pizza Parlor 490Case Assignment I1: South Korea: A Nation of Digital Guinea Pigs 492Case Assignment III: ArtificialIntelligence 493Glossary 495Index 516

章节摘录

  Summary  Organizational communication is the sharing of information related to an organizational activity between two or more individuals or organizational units. Sharing of information implies the collection, analysis, and transmission of information. Therefore, organizational communication may be thought of as a process. A communication network is made of a series of communication dyads. A dyad consists of a sender (source), a receiver, a message delivered through a channel(s), a medium connecting the sender and the receiver, and (optionally) feedback from the receiver to the sender. The communication process consists of the sender collecting data, encoding the data to form a message, and sending the message to the receiver, who decodes it. In many instances, the receiver acknowledges receipt of the message through some form of feedback. Communication distortion is the transformation of the meaning of a message by intentionally or unintentionally altering its content. This transformation includes any instance where information gets lost or destroyed, is modified or altered in a misleading manner, is sent to the wrong place, arrives late, or cannot be understood by the receiver. In many instances, communication distortion may be prevented through the appropriate use of information technology. Telecommunications can be thought of as the transmission of a message across a distance. Telecommunication technology can be used to facilitate communications between organizational members, or between organizational members and external parties such as customers and suppliers. One common example is the use of the public telephone system to carry a voice conversation between two or more people. Data traffic over networks such as the Internet continues to increase dramatically. To respond to the needs of the increased data traffic, telecommunications providers (e.g., local and long-distance telephone companies) need to transform the telecommunications infrastructure in which they have invested over the last 100 years. Basically, they need to transform a circuit-switched network designed to carry analog voice traffic to a packet-switched network designed and optimized for data communication that carries voice communication as just another data type. The term bandwidth is generally used to describe the capacity of a communications medium, and more specifically how fast content flows. In digital systems, bandwidth is expressed as data bits per second (bps). In analog systems (e.g., analog wireless telephones using radio frequencies), bandwidth is measured as the difference between the lowest frequency and the highest frequency used. As a way of classifying the capacity of different channels, the terms narrowband, wideband, and broadband often are used. Narrowband is typically used for a medium that offers transmission speeds of 64 kbps or less. For media offering rates between 64 kbps and 1.544 Mbps, the term wideband is used. Broadband is typically used to describe media offering transmission rates of 1.544 Mbps or higher.

图书封面

图书标签Tags

评论、评分、阅读与下载


    信息技术与管理 PDF格式下载


用户评论 (总计0条)

 
 

 

250万本中文图书简介、评论、评分,PDF格式免费下载。 第一图书网 手机版

京ICP备13047387号-7