出版時間:2005年 出版社:北京大學(xué)出版社 作者:Ronald L. Thompson,William L. Cats-Baril 頁數(shù):537
Tag標(biāo)簽:無
前言
在當(dāng)前經(jīng)濟(jì)全球化的背景下,中國經(jīng)濟(jì)的發(fā)展需要大量具備扎實(shí)理論功底、了解國際規(guī)則、能夠適應(yīng)國際競爭需要的優(yōu)秀的經(jīng)濟(jì)管理人才,所以,大力開展雙語教學(xué),適當(dāng)引進(jìn)和借鑒國外優(yōu)秀的原版教材,是加快中國經(jīng)濟(jì)管理教育步伐,使之走向國際化的一條捷徑。為此,北京大學(xué)出版社與國外著名出版公司麥格勞-希爾教育出版公司和湯姆森學(xué)習(xí)出版集團(tuán)合作推出了《經(jīng)濟(jì)與金融經(jīng)典入門教材》和《管理學(xué)經(jīng)典入門教材》兩套系列叢書,這兩套叢書的大部分均同時包含英文版和翻譯版,主要針對本科層次,目前首先推出英文版(英文影印版/英文改編版)。叢書的篩選完全是本著“出新、出好、出精”的原則,均經(jīng)過北京大學(xué)及國內(nèi)其他著名高校相關(guān)學(xué)者的精心挑選,分別匯集了國外經(jīng)濟(jì)與金融和管理學(xué)領(lǐng)域的經(jīng)典教材,稱得上是一套優(yōu)中選精的叢書。 鑒于外版教材大多篇幅過長,且其中某些內(nèi)容不適合我國的教學(xué)實(shí)際需要,因而我們對部分所選圖書進(jìn)行了必要的刪節(jié),成為英文改編版。在選書和刪節(jié)的過程中,我們得到了許多老師的大力支持和幫助,在此,我們對他們表示衷心的感謝: 北京大學(xué)光華管理學(xué)院:張一弛、張志學(xué)、楊云紅、雷明、武常岐、張紅霞、陸正飛、黃慧馨 中國人民大學(xué):李先國、楊波、胡波 中國農(nóng)業(yè)大學(xué)管理學(xué)院:陸娟 中山大學(xué)嶺南學(xué)院:賈佳 天津財經(jīng)大學(xué)財政系:張進(jìn)昌 哈爾濱工業(yè)大學(xué)工商管理學(xué)院:張莉、李國鑫 這兩套叢書是對國外原版教材的直接或刪節(jié)后影印,由于各個國家政治、經(jīng)濟(jì)、文化背景的不同,對于書中所持觀點(diǎn)還請廣大讀者在閱讀過程中注意加以分析和鑒別。另外,我們在對原版圖書進(jìn)行刪節(jié)、重新編排頁碼的同時,為了便于讀者核對使用索引,仍保留了原書的頁碼,因此讀者在閱讀過程中可能會發(fā)現(xiàn)有跳頁現(xiàn)象,而且由于刪節(jié),某些文中提到的頁碼或內(nèi)容有可能無法找到,對于由此給讀者帶來的諸多不便,我們深表歉意,懇請您的諒解?! ∥覀兤谕咎捉滩牡某霭婵梢詫ξ覈?jīng)濟(jì)管理學(xué)科的教學(xué),尤其是經(jīng)濟(jì)管理專業(yè)本科的教學(xué)有所裨益,能夠?qū)ξ覈?jīng)濟(jì)管理學(xué)科的發(fā)展有所貢獻(xiàn)。 一套叢書的推出和不斷完善離不開大家的支持和幫助,我們也歡迎所有關(guān)心中國經(jīng)濟(jì)管理學(xué)科教育和發(fā)展的專家和學(xué)者及廣大讀者,給我們提出寶貴的意見和建議,誠摯地希望您能向我們推薦您所接觸到的國外優(yōu)秀的經(jīng)濟(jì)管理類圖書。
內(nèi)容概要
《信息技術(shù)與管理》較系統(tǒng)地介紹了管理信息系統(tǒng)的基礎(chǔ)知識,包括管理信息系統(tǒng)導(dǎo)論、信息技術(shù)基礎(chǔ)、信息系統(tǒng)在組織中的應(yīng)用、信息系統(tǒng)資源的管理共四個部分的內(nèi)容?!缎畔⒓夹g(shù)與管理》的最大特點(diǎn)是系統(tǒng)性和實(shí)踐性,適合無理工科背景的學(xué)生使用且所介紹內(nèi)容可操作性較強(qiáng)。
作者簡介
Ronald L. Thompson is Associate Professor of Managementin Wake Forest Universitys Babcock Graduate School ofManagement. He holds a Ph.D. from the Ivey School of BusinessAdministration at the University of Western Ontario (London,Canada) and was formerly on the faculties of the University ofVermont and the University of Calgary. Ron has published in avariety of academic journals and has served as an associate edi-tor for MIS Quarterly. He also has taught a wide range of stu-dents and has won awards for teaching excellence. Ron and hiswife Jen enjoy numerous outdoor activities, including biking,golf, and trying to keep up with their two dogs when hiking.William t. Cats-Baril is Associate Professor of ManagementInformation Systems in the School of Business Administrationat the University of Vermont. He holds a Ph.D. from theUniversity of Wisconsin-Madison. He has held a variety of visit-ing appointments including stays at INSEAD and the LondonSchool of Economics. Willy has published more than 30 articlesand book chapters on a variety of topics in information technol-ogy and decision making. He has taught a variety of audiencesaround the world ranging from first-year undergraduate stu-dents to senior executives and has received various awards forteaching excellence. He has an international consulting practice.A former waterpolo player for the Mexican national team, Willynow enjoys skiing, bicycling, trekking, and scuba diving.
書籍目錄
1 Introduction to InformationTechnology and ManagementIntroduction 2Tech Talk: Information Technology 2Information Technology Issues 3Tech Talk: Capacity 4Tech Talk: information TechnologyInfrastructure 6The Music Industry: 1999-2001 7Tech Talk: Instant Messaging and Chat 9Industry Stakeholders 9Major Themes of the Book 12Organizational Responsiveness 12Competitive Strategy 13Business Brief 1.1: Fidelity Sharpens ItsTechnological Edge 15Global Perspective 16Business Brief 1.2: AOL to Unveil ChinaVenture 17Ethical Issues 18Business Brief 1.3: Big Bro Is EyeingYour E-Mail 18Impact on Careers 19Tech Talk: HyperText kinks 19Tech Talk: System Interface 20Framework for the Book 21Summary 23Case Assignment: Watch Your Speed 25Reflections Case: The Rosetta Disk 26Foundations of InformationTechnology 292 Software and Hardware 31Introduction 32Performance Criteria 34Performance Trade-Offs 35Tech Talk: Moores Law 35Software 38Systems Software 39Business Brief 2.1: Microsoft Uses Fee Code 42Application Software 43Hardware 47Software Horror Stories 47Business Brief 2.2: Buggy Software 48Software Tips! 48Input Devices: Accepting Data 48Tech Talk: Computer Sizes 49System Unit and Motherboard 51Processor and Main Memory:Processing Data 54Tech Talk: Measuring Data and StorageCapacity 55Tech Talk: Measuring Internal ClockSpeed 56Tech Talk: Measuring the Speed of ExecutingInstructions 56Business Brief 2.3: Chip Breakthrough 57Computer Design 58Secondary Storage: Storing Data 58Tech Talk: Measuring Time 58Output Devices: Presenting Data 61Hardware Tips! 63Hardware Horror Stories 64Concluding Comments 64Summary 65Case Assignment I: Factory of the Future? 68Case Assignment I1: Pull the Plug onKaZaA? 69Reflections Case: Virtual Immortality 703 Content Management 72Introduction 73NextCard, Inc. 73Data Representation 73File Access 75Transaction Processing 78Database Processing 80Data Capture and Processing 82Content as a Corporate Resource 83Business Brief 3.1: Keeping Tabs on the81ood Bank 84Database Organization-RelationalModel 84Maintaining Data in a Database 86Retrieving Information from aRelational Database 87Advanced Database QueryInterfaces 88Presenting Information from a Database 90Business Brief 3.2: Giving the Web a Voice 91Performance Criteria for DatabaseManagement Systems 92Object-Oriented Database Model 93Object-Relational Database Management Systems 94Data Warehouses 94Business Brief 3.3: BB~T 97Data Mining 98Business Brief 3.4: E.piphany? 102Additional Data Management Issues 102Distributed Databases 102Data Security 103Summary 104Case Assignment: DoubleClick 106Reflections Case: The Genome Project 108Practicum Case Assignment: Green[andCommercial Rentals 109Technical Note 1: Data Modeling andEntity-Relationship Diagrams 112Creating a Data Model 117Moving from a Data Model to a DatabaseDesign 1174 Telecommunications and Networking 120Introduction 121Organizational Communication 122Formal and Informal Communication 122Communication Dyads 123Business Brief 4.1: Phony Press ReleaseLands Hoaxer in Jail 124Distortion in OrganizationalCommunication 125Types of Distortion 126Information Overload 129Business Brief 4.2: Slowed to a Dead HaR 130Analog and Digital DataRepresentation 130Telecommunications 131The Changing Face ofTelecommunications 133Tech Talk: Data Channels 134Protocols 136ISDN 136DSL 136Tech Talk: Data Transfer Rates 137Cable Modems 137T-Carrier System 138Frame Relay 139Fast Ethernet 139Wireless 139Business Brief 4.3: China BuildsTelecommunications Infrastructure 142Networks 142Components of a LAN 144LAN Protocols t47LAN Topologies 148Intranets and Extranets 148Network Horror Stories 152Summary 153Case Assignment: Guerrilla WirelessNetworking for the Masses 155Reflections Case: Ubiquitous Computing 1575 The internet and Electronic Commerce 160Introduction 161Evolution of the Intemet 162Intemet Building Blocks 164Internet Addressing 164Electronic Mail, Newsgroups, List Services 165Telnet and Ftp 166World Wide Web 167Company Example: NextCard 168Additional Internet Technologies 170Markup Languages 170Dynamically Generated Web Pages 172Web Portals 174Search Engines 175Intelligent Agents 175Industry Example: Brokerage 176Business Opportunities 179Business-to-Consumer 179Business-Based Markets 180Business Brief 5.1: Plugged-in Fans Buy Hot Tickets in Web Presales 181Consumer-Based Markets 181Business-to-Business 182Business Brief 5.2: Selling Backpacks on the Web Is Harder Than It Looks 183The Mobile Internet 184Internet Technologies and Business Operations 186Intemet Issues 186Security 187Privacy 189Consumer Protection 189Censorship 190Business Brief 5.3: U.S. Firms Concerned about Global Legal Pact 191Intellectual Property Rights 191Interactive Activities 192Summary 194Case Assignment: Wireless Banking Strategy 196O rganizational Uses of InformationSystems 1996 information Systems and Organizational Competition 201Introduction 202Components of an Information System 202Purpose 202Roles 203Procedures 204Content 205Information Technology 206Competition and Strategy 207Business Brief 6.1: Mr. Cozzette Buys a Computer 210Understanding Strategy 211SWOT Analysis 212The Value Chain 212Business Brief 6.2: General Motors: From Bricks to Clicks 215Porters Five-Forces Model 216Case Example: Marshall Industries 219Management Objectives for Information Systems 221Competitive Vulnerabilities 225Positioning the I/T Organization 225Managing Emerging Technologies 226Summary 229Case Assignment I: Demco Uses I/T to Help Customers 231Case Assignment Il: Pollution Solutions (A): One Persons Waste...2327 information Systems and7 Organizational Responsiveness 236Introduction 237A Framework to Achieve OrganizatiOnal Responsiveness 239Organizations as Systems 239The Elements of Organizational Responsiveness 241Inputs 242Business Brief 7.1: Border Delays Slow Production 243Outputs 243Transformation Process 245Business Brief 7.2: Customer Support-- ParTech 246Business Brief 7.3: I/T Can TransformOperations: The Russell Corporation 248The Dynamics of Organizational Responsiveness 249Homeostasis 249Forecasting 251Business Brief 7.4: In Hindsight 253Feedback 254Environmental Scanning 257Open versus Closed Systems 259Buffers 260Summary 262Case Assignment I: Wal-Mart TrumpsMoores Law 264Case Assignment I1: Creative Aerospace, Inc. 2658 Information Systems and Organizational Decision Making 268Introduction 269Managerial Functions 269Traditional Scheme for ClassifyingInformation Systems 272Decision Making in Management 273The Realities of Decision Making 274Alternative Views of Management 275The Limitations of Rationality 278Using Information Systems to Improve Decision Making 282Controlling 282Automating Decisions 284Supporting Complex Decisions 285Augmenting Knowledge 286Business Brief 8.1: Computers as Complexity Busters: Id Like Next Friday Off 287Business Brief 8.2: Keeping the Engine Tuned 289Knowledge Management 291Business Brief 8.3: Tapping Knowledge at P fx G 292Strategic Planning 292Group Decision Making 293Business Brief 8.4: WebDAV Protocol Comes of Age 295Summary 296Case Assignment I: Wisconsin Department of Health and Social Services 297Case Assignment I1: The Norris Company(B): Sherrys Day at the Office 2989 Organizational Use ofInformation Systems 302Introduction 303Organizations and Organizational Structure 303Business Functions 304Accounting 305Finance 305Marketing and Sales 306Production and OperationsManagement 307Customer Support 308Human Resource Management 308Information Services 308Business Processes 309Process View of an Organization 312Business Brief 9.1: National and Provincial Building Society 314Information Systems to Support Organizational Processes 315The Virtual Organization 317Business Brief 9.2: Networks as Distortion Busters 319Cautions on the Use of I/T 319Information Systems and Regulatory Issues 320Bad Timing 320Waking a Sleeping Giant 320Cultural Issues Matter 321Vulnerability to Systems Failure 322Ethical Vulnerabilities 323Business Brief 9.3: Happy Birthday to You 324Business Brief 9.4: Internet Privacy 325Establish and Enforce Written Policies on Ethics and the Use of I/T 325Summary 328Case Assignment I: Anchoring Logistics in Technology 329Case Assignment Ii: When Affairs of the Heart Raise I/T Privacy issues 331Module II Case: Dakin Farm (A): Mail-OrderProcessing 333Managing Information SystemsResources 33910 Business Process Management and Enterprise Systems 341Introduction 342Organizational Strategies and Business Processes 344Business Process Automation 344Business Process Improvement and Transformation 346Principles of Business Process Improvement 346Example of Business Process Improvement 349Principles of Business Process Transformation 350Example of Business Process Transformation 351Business Brief 10.1: The Axe Can Be Sharp:The Ultimate in Process Transformation 353Information Systems and Process Management 353Enterprise Information Systems 354Enterprise Resource Planning and Enterprise Systems 355Issues in Implementing Enterprise Systems 357Business Brief 10.2: Answering Customers with CRM 358Business Brief 10.3: Integrating Purchasing with ERP 360Summary 361Case Assignment I: The Limited Curtails Fraud 363Case Assignment Il: Lehigh Valley Hospital Gets a New Backbone 36411 Information Systems Development 366Introduction 367Roles in Information Systems Development 369The Systems Development Process 369Structured Development versus Object- Oriented Development 370Object-Oriented Techniques 371Step 1. Project Planning (Define Goals and Objectives) 371Step 2. Analysis (Define Information Requirements) 374Step 3. Generation and Evaluation of Alternatives 376Design Strategies: Build, Buy, or Outsource 380Step 4. Designing the Chosen Alternative 380Business Brief 11.1: Ski Conditions Ideal after I/S Integration 381Step 5. Implementation 384Business Brief 11.2: Powering a Peacock 386Step 6. Maintenance and Operations 388CASE Tools 389Alternative Development Techniques 390End-User Development 391Rapid Application Development 392Operational Vulnerabilities 393Business Brief 11.3: Application Development Life Cycle Gets an ASP Angle 394Effective Project Management 395Summary 396Case Assignment I: Intelligent Electronics 399Case Assignment il: Great Sports! 400Technical Note 2: Structured Analysisand Design Techniques 403Structured Tools and Techniques 403Sample Case: Westward Ho 403Data Flow Diagrams 404Westward Ho: Operations 405DFDs: The Context Diagram 406DFDs: The System-Level Diagram 406DFDs: Lower-Level Diagrams 408Diagraming Conventions 409Data Models and Data Dictionaries 409Structured Design 410Structured Programming , 412Summary 412External Information SystemsSourcing 414Introduction 41512 Buying Packaged Software 415Outsourcing 420Business Brief 12.1: Problems for Rich-ConSteel 421Service Providers 423Application Service Provider 423Business Brief 12.2: Spin-off SeesOutsourcing as Key to Success 424Management Services Provider 426Web Services 428SelectiveSourcing 431Summary 432Case Assignment I: Miller ElectricCase Assignment ii: Outsourcing in theRetail Sector 43613Information ResourceManagement 438Introduction 439Hersheys Biggest Dud 439Spot Shortages 439The Mars Option 440The Project 440Big-Bang Approach 441Not an Isolated Instance 442Information Systems as a CorporateResource 443Content as a Corporate Resource 444Information Systems Planning 445Organization of the InformationServices Department 447Cost and Resource Management 449Business Brief 13.1: Charge ThoseUsers 450Disaster Recovery Planning 451Business Brief 13.2: Recreating Years of Files,One Application at a Time 452Systems Security 455Business Brief 13.3: IBM Moves to PlugHoles in Disaster Recovery 456Summary 458Case Assignment I: Pollution Solutions (C):When It Rains... 460Case Assignment Il: Disaster Recovery atVermont Mutual 461Module iii Case: Dakin Farm (B): Whats Next? 46414 Information Technology: Emerging and Future Issues 472Introduction 473Organizational Management 474Employment and Entrepreneurship 476Business Brief 14.1:Just-Not-in-Time 477Business Brief 14.2: Amid Record Profits,Companies Continue Layoffs 478Ethical, Security, and International Issues 480Business Brief 14.3: The Cyber-Surveillance Bill and You 481Cyberterrorism 482Semantic Hacking: Who Can You Believe? 482Business Brief 14.4: Cyberterrorism 483Business Brief 14.5: Want a New Credit Card Number? 484Business Brief 14.6: Semantic Hacking 485Summary 490Case Assignment I: The Parable of the Pizza Parlor 490Case Assignment I1: South Korea: A Nation of Digital Guinea Pigs 492Case Assignment III: ArtificialIntelligence 493Glossary 495Index 516
章節(jié)摘錄
Summary Organizational communication is the sharing of information related to an organizational activity between two or more individuals or organizational units. Sharing of information implies the collection, analysis, and transmission of information. Therefore, organizational communication may be thought of as a process. A communication network is made of a series of communication dyads. A dyad consists of a sender (source), a receiver, a message delivered through a channel(s), a medium connecting the sender and the receiver, and (optionally) feedback from the receiver to the sender. The communication process consists of the sender collecting data, encoding the data to form a message, and sending the message to the receiver, who decodes it. In many instances, the receiver acknowledges receipt of the message through some form of feedback. Communication distortion is the transformation of the meaning of a message by intentionally or unintentionally altering its content. This transformation includes any instance where information gets lost or destroyed, is modified or altered in a misleading manner, is sent to the wrong place, arrives late, or cannot be understood by the receiver. In many instances, communication distortion may be prevented through the appropriate use of information technology. Telecommunications can be thought of as the transmission of a message across a distance. Telecommunication technology can be used to facilitate communications between organizational members, or between organizational members and external parties such as customers and suppliers. One common example is the use of the public telephone system to carry a voice conversation between two or more people. Data traffic over networks such as the Internet continues to increase dramatically. To respond to the needs of the increased data traffic, telecommunications providers (e.g., local and long-distance telephone companies) need to transform the telecommunications infrastructure in which they have invested over the last 100 years. Basically, they need to transform a circuit-switched network designed to carry analog voice traffic to a packet-switched network designed and optimized for data communication that carries voice communication as just another data type. The term bandwidth is generally used to describe the capacity of a communications medium, and more specifically how fast content flows. In digital systems, bandwidth is expressed as data bits per second (bps). In analog systems (e.g., analog wireless telephones using radio frequencies), bandwidth is measured as the difference between the lowest frequency and the highest frequency used. As a way of classifying the capacity of different channels, the terms narrowband, wideband, and broadband often are used. Narrowband is typically used for a medium that offers transmission speeds of 64 kbps or less. For media offering rates between 64 kbps and 1.544 Mbps, the term wideband is used. Broadband is typically used to describe media offering transmission rates of 1.544 Mbps or higher.
圖書封面
圖書標(biāo)簽Tags
無
評論、評分、閱讀與下載