Information Systems: A Manager's Guide to Harnessing Technology
Copyright -- Information Systems: A Manager's Guide to Harnessing Technology
I. Chapter 01 Setting the Stage: Technology and the Modern Enterprise
1.1 Setting the Stage: Technology and the Modern Enterprise
1.2 It’s Your Revolution
1.3 Geek Up - Tech Is Everywhere and You’ll Need It to Thrive
1.4 What is Open Source?
1.5 The Pages Ahead
II. Chapter 02 Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners from Losers
2.1 Introduction
2.2 Powerful Resources
2.3 Barriers to Entry, Technology, and Timing
2.4 Key Framework: The Five Forces of Industry Competitive Advantage
III. Chapter 09 Understanding Software: A Primer for Managers
9.1 Introduction
9.2 Operating Systems
9.3 Application Software
9.4 Distributed Computing
9.5 Writing Software
9.6 Total Cost of Ownership (TCO): Tech Costs Go Way beyond the Price Tag
IV. Chapter 05 Moore’s Law: Fast, Cheap Computing and What It Means for the Manager
5.1 Introduction
5.2 The Death of Moore’s Law?
5.3 Bringing Brains Together: Supercomputing and Grid Computing
5.4 E-waste: The Dark Side of Moore’s Law
V. Chapter 12 A Manager’s Guide to the Internet and Telecommunications
12.1 Introduction
12.2 Internet 101: Understanding How the Internet Works
12.3 Getting Where You’re Going
12.4 Last Mile: Faster Speed, Broader Access
VI. Chapter 03 Zara and Amazon
3.1 Introduction
3.2 Don’t Guess, Gather Data
3.3 Moving Forward
3.4 Amazon
VII. Chapter 07 Peer Production, Social Media, and Web 2.0
7.1 Introduction
7.2 Blogs
7.3 Wikis
7.4 Electronic Social Networks
7.5 Twitter and the Rise of Microblogging
7.6 Other Key Web 2.0 Terms and Concepts
7.7 Prediction Markets and the Wisdom of Crowds
7.8 Crowdsourcing
7.9 Get SMART: The Social Media Awareness and Response Team
VIII. Chapter 08 Facebook: Building a Business from the Social Graph
8.1 Introduction
8.2 What’s the Big Deal?
8.3 The Social Graph
8.4 Facebook Feeds—Ebola for Data Flows
8.5 Facebook as a Platform
8.6 Advertising and Social Networks: A Work in Progress
8.7 Privacy Peril: Beacon and the TOS Debacle
8.8 Predators and Privacy
8.9 One Graph to Rule Them All: Facebook Takes Over the Web
8.10 Is Facebook Worth It?
IX. Chapter 15 The Sharing Economy
15.1 The Sharing Economy
X. Chapter 10 Software in Flux: Partly Cloudy and Sometimes Free
10.1 Introduction
10.2 Open Source
10.3 Why Open Source?
10.4 Examples of Open Source Software
10.5 Why Give It Away? The Business of Open Source
10.6 Cloud Computing: Hype or Hope?
10.7 The Software Cloud: Why Buy When You Can Rent?
10.8 SaaS: Not without Risks
10.9 The Hardware Cloud: Utility Computing and Its Cousins
10.10 Clouds and Tech Industry Impact
10.11 Virtualization: Software That Makes One Computer Act Like Many
10.12 Make, Buy, or Rent
XI. Chapter 11 The Data Asset: Databases, Business Intelligence, and Competitive Advantage
11.1 Introduction
11.2 Data, Information, and Knowledge
11.3 Where Does Data Come From?
11.4 Data Rich, Information Poor
11.5 Data Warehouses and Data Marts
11.6 The Business Intelligence Toolkit
11.7 Data Asset in Action: Technology and the Rise of Wal-Mart
11.8 Data Asset in Action: Harrah’s Solid Gold CRM for the Service Sector
XII. Chapter 06 Understanding Network Effects
6.1 Introduction
6.2 Where’s All That Value Come From?
6.3 One-Sided or Two-Sided Markets
6.4 How Are These Markets Different?
6.5 Competing When Network Effects Matter
XIII. Chapter 14 Google: Search, Online Advertising, and Beyond
14.1 Introduction
14.2 Understanding Search
14.3 Understanding the Increase in Online Ad Spending
14.4 Search Advertising
14.5 Ad Networks—Distribution beyond Search
14.6 More Ad Formats and Payment Schemes
14.7 Customer Profiling and Behavioral Targeting
14.8 Profiling and Privacy
14.9 Search Engines, Ad Networks, and Fraud
14.10 The Battle Unfolds
XIV. Chapter 04 Netflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits
4.1 Introduction
4.2 Tech and Timing: Creating Killer Assets
4.3 From Atoms to Bits: Opportunity or Threat?
XV. Chapter 13 Information Security: Barbarians at the Gateway (and Just About Everywhere Else)
13.1 Introduction
13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?
13.3 Where Are Vulnerabilities? Understanding the Weaknesses
13.4 Taking Action
XVI. Chapter 16 Disruptive Technologies 2
16.1 Disruptive Technologies
What are Disruptive Technologies?
XVII. Chapter 17 Artificial Intelligence
17.1 What is Artificial Intelligence
17.2 More about AI
17.3 Is using AI Infringement of copyright?
Textbook Chapter References & Attributions
AI at PSU: https://aiai.psu.edu/
Information Systems: The Manager's Guide to Harnessing Technology Copyright © 2015 by Julie Meyer, MSIT is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.