information tech - Reading
Session Topic: Major Business Initiatives Required Readings : Chapter 2 Chapter 2 individual assignment Student Learning Outcomes: 1. Define supply chain management (SCM) systems and describe their strategic and competitive opportunities. 2. Define customer relationship management (CRM) systems and describe their strategic and competitive opportunities. 3. Explain the significance of enterprise resource planning (ERP) software as the integration of functional software systems. 4. Define social media and describe a few of its many dimensions that make it important in the business world. INDIVIDUAL / GROUP ASSIGNMENT #: TITLE PAGE 1 OF 2 TEAM NAME (FOR TEAM ASSIGNMENTS ONLY) Information Technology MASY1-GC1240-200 Fall 2020 Instructor: Sam Chapper [Student Name / Team Name] [Individual / Group] Assignment # Submitted on: Weekday, Month DD, YYYY Submitted by (For team assignments only): Student name Student name Student name Student name Student name Assignment: Restate the assignment in full (just paste it in from the NYU Classes Assignment page or whatever source in which it is provided). INDIVIDUAL / GROUP ASSIGNMENT #: TITLE PAGE 2 OF 2 TEAM NAME (FOR TEAM ASSIGNMENTS ONLY) <Delete this paragraph when delivering the assignment> (Assignment content starts here with the title) Content starts here, please review sections below for instructions. <Delete section ends> <Delete these paragraphs when delivering the assignment> Page Header: Do not forget to modify the header to include the assignment number and tittle. <Delete section ends> <Delete these paragraphs when delivering the assignment> General instructions  Individual assignments should not be longer than one page.  The list of references may be on a second page.  If you feel you need to go longer than one page, please remember that we practice standard business writing rules. That means you should have either a separate Executive Summary page or a summary section at the top of the first page of your assignment followed by the details of the paper. The summary could consist of a brief paragraph or a few bulleted points. This is done so that one can quickly learn the main points of your paper and only have to go further if something is unclear. The instructor, of course, will read your entire paper.  Remember to use subheads.  Have your responses follow the sequence of the assignment so that you make it easy to read and are sure you do not leave anything out.  All work should be in Times New Roman font, 11-point type, single or double spaced (Contact your instructor if you have to use word processing software that does NOT include Times New Roman or the equivalent).  Do NOT adjust any of the margins, or other settings in this template. The instructor will change them back to the template defaults and measure the length of your content accordingly. <Delete section ends> <Delete this paragraph when delivering the assignment> 1. Cite Sources Used a. Use of APA format is mandatory. For more information on APA format, see http://owl.english.purdue.edu/owl/resource/560/02/ or http://library.williams.edu/citing/styles/apa.php. b. Please provide citations within the text, along with a list of references used. 2. Plagiarism – For more information about plagiarism, consult https://www.sps.nyu.edu/homepage/student-experience/policies-and-procedures.html#Graduate1 or www.plagiarism.org. <Delete section ends> <Delete this paragraph when delivering the assignment> References Do not forget to provide the list of references used. It can be added on a separate page, and it does not count towards the page limit. <Delete section ends> http://www.plagiarism.org/ https://www.sps.nyu.edu/homepage/student-experience/policies-and-procedures.html#Graduate1 http://library.williams.edu/citing/styles/apa.php http://owl.english.purdue.edu/owl/resource/560/02/ Information Technology MASY1-GC1240-200 Fall 2020 Instructor: Sam Chapper [Student Name / Team Name] [Individual / Group] Assignment # Confirming Pages Less managing. More teaching. Greater learning. INSTRUCTORS GET: • Interactive Applications – book-specific interactive assignments that require students to APPLY what they’ve learned. • Simple assignment management, allowing you to spend more time teaching. • Auto-graded assignments, quizzes, and tests. • Detailed Visual Reporting where student and section results can be viewed and analyzed. • Sophisticated online testing capability. • A filtering and reporting function that allows you to easily assign and report on materials that are correlated to accreditation standards, learning outcomes, and Bloom’s taxonomy. • An easy-to-use lecture capture tool. Would you like your students to show up for class more prepared? (Let’s face it, class is much more fun if everyone is engaged and prepared…) Want ready-made application-level interactive assignments, student progress reporting, and auto-assignment grading? (Less time grading means more time teaching…) Want an instant view of student or class performance relative to learning objectives? (No more wondering if students understand…) Need to collect data and generate reports required for administration or accreditation? (Say goodbye to manually tracking student learning outcomes…) Want to record and post your lectures for students to view online? INSTRUCTORS... With McGraw-Hill's Connect® MIS, haa7685X_fm_i-xxxv.indd ihaa7685X_fm_i-xxxv.indd i 12/20/11 9:29 PM12/20/11 9:29 PM Confirming Pages Want an online, searchable version of your textbook? Wish you could reference your textbook online while you’re doing your assignments? Want to get more value from your textbook purchase? Think learning MIS should be a bit more interesting? Connect® Plus MIS eBook If you choose to use Connect™ Plus MIS, you have an affordable and searchable online version of your book integrated with your other online tools. Connect® Plus MIS eBook offers features like: • Topic search • Direct links from assignments • Adjustable text size • Jump to page number • Print by section Check out the STUDENT RESOURCES section under the Connect® Library tab. Here you’ll find a wealth of resources designed to help you achieve your goals in the course. You’ll find things like quizzes, PowerPoints, and Internet activities to help you study. Every student has different needs, so explore the STUDENT RESOURCES to find the materials best suited to you. haa7685X_fm_i-xxxv.indd iihaa7685X_fm_i-xxxv.indd ii 12/20/11 9:29 PM12/20/11 9:29 PM Confirming Pages Management Information Systems FOR THE INFORMATION AGE NINTH EDITION Stephen Haag DANIELS COLLEGE OF BUSINESS UNIVERSITY OF DENVER Maeve Cummings KELCE COLLEGE OF BUSINESS PITTSBURG STATE UNIVERSITY haa7685X_fm_i-xxxv.indd iiihaa7685X_fm_i-xxxv.indd iii 12/26/11 5:37 PM12/26/11 5:37 PM Confirming Pages MANAGEMENT INFORMATION SYSTEMS FOR THE INFORMATION AGE Published by McGraw-Hill/Irwin, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY, 10020. Copyright © 2013, 2010, 2008, 2007, 2005, 2004, 2002, 2000, 1998 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Some ancillaries, including electronic and print components, may not be available to customers outside the United States. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 DOW/DOW 1 0 9 8 7 6 5 4 3 2 ISBN 978-0-07-337685-1 MHID 0-07-337685-X Vice president and editor-in-chief: Brent Gordon Editorial director: Paul Ducham Executive director of development: Ann Torbert Senior sponsoring editor: Anke Weekes Senior development editor: Trina Hauger Editorial coordinator: Jonathan Thornton Vice president and director of marketing: Robin J. Zwettler Marketing director: Amee Mosley Vice president of editing, design, and production: Sesha Bolisetty Senior manager, publishing services: Mary Conzachi Senior buyer: Carol A. Bielski Senior designer: Mary Kazak Sander Senior photo research coordinator: Keri Johnson Media project manager: Suresh Babu , Hurix Systems Pvt, Ltd. Media project manager: Joyce J. Chappetto Cover design: Laurie Entringer Cover image: © itestro-Fotolia.com Typeface: 11/13 Bulmer MT Compositor: Laserwords Private Limited Printer: R. R. Donnelley Library of Congress Cataloging-in-Publication Data Haag, Stephen. Management information systems for the information age / Stephen Haag, Maeve Cummings. — 9th ed. p. cm. Includes index. ISBN 978-0-07-337685-1 (alk. paper) ISBN 0-07-337685-X (alk. paper) 1. Management information systems. 2. Information technology. I. Cummings, Maeve. II. Title. T58.6.H18 2013 658.4’038011—dc23 2011049557 www.mhhe.com haa7685X_fm_i-xxxv.indd ivhaa7685X_fm_i-xxxv.indd iv 12/20/11 9:29 PM12/20/11 9:29 PM Confirming Pages D E D I C AT I O N For my wife Pam: Conqueror of cancer in 2011. My hero. S t e p h e n H a a g To Don Viney who showed me in my darkest hour that there can be life after death. M a e v e C u m m i n g s haa7685X_fm_i-xxxv.indd vhaa7685X_fm_i-xxxv.indd v 12/20/11 9:29 PM12/20/11 9:29 PM Confirming Pages vi B R I E F TA B L E O F C O N T E N T S C H A P T E R O N E 2 The Information Age in Which You Live: Changing the Face of Business C H A P T E R T W O 34 Major Business Initiatives: Gaining Competitive Advantage with IT C H A P T E R T H R E E 64 Databases and Data Warehouses: Supporting the Analytics-Driven Organization C H A P T E R F O U R 96 Analytics, Decision Support, and Artificial Intelligence: Brainpower for Your Business C H A P T E R F I V E 126 Electronic Commerce: Strategies for the New Economy C H A P T E R S I X 158 Systems Development: Phases, Tools, and Techniques C H A P T E R S E V E N 194 Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise C H A P T E R E I G H T 224 Protecting People and Information: Threats and Safeguards C H A P T E R N I N E 256 Emerging Trends and Technologies: Business, People, and Technology Tomorrow P R O J E C T S 286 Group Projects Electronic Commerce Projects EXTENDED LEARNING MODULE A 322 Computer Hardware and Software EXTENDED LEARNING MODULE B 350 The World Wide Web and the Internet EXTENDED LEARNING MODULE C 370 Designing Databases and Entity-Relationship Diagramming EXTENDED LEARNING MODULE D (OFFICE 2010 VERSION) 386 Decision Analysis with Spreadsheet Software EXTENDED LEARNING MODULE D (OFFICE 2007 VERSION) (on OLC) Decision Analysis with Spreadsheet Software EXTENDED LEARNING MODULE E 408 Network Basics EXTENDED LEARNING MODULE F (on OLC) Building a Web Page with HTML EXTENDED LEARNING MODULE G (on OLC) Object-Oriented Technologies EXTENDED LEARNING MODULE H 436 Computer Crime and Digital Forensics EXTENDED LEARNING MODULE I (on OLC) Building an E-Portfolio EXTENDED LEARNING MODULE J (OFFICE 2010 VERSION) 472 Implementing a Database with Microsoft Access EXTENDED LEARNING MODULE J (OFFICE 2007 VERSION) (on OLC) Implementing a Database with Microsoft Access EXTENDED LEARNING MODULE K (on OLC) Careers in Business EXTENDED LEARNING MODULE L (on OLC) Building Web Sites with FrontPage EXTENDED LEARNING MODULE M (on OLC) Programming in Excel with VBA haa7685X_fm_i-xxxv.indd vihaa7685X_fm_i-xxxv.indd vi 12/20/11 9:29 PM12/20/11 9:29 PM Confirming Pages vii TA B L E O F C O N T E N T S C H A P T E R O N E The Information Age in Which You Live: Changing the Face of Business 3 OUTRAGEOUS INDUSTRY TRANSFORMATION: CELL PHONES DOOM PHONE REVENUES FOR HOTELS 3 INTRODUCTION 4 MIS RESOURCE NO 1: INFORMATION 5 Defining Information Quality 8 Considering Information from an Organizational Perspective 8 MIS RESOURCE NO 2: PEOPLE 10 Technology Literacy 11 Information Literacy 11 Your Ethical Responsibilities 12 MIS RESOURCE NO 3: INFORMATION TECHNOLOGY 13 Key Technology Categories 13 FINANCIAL IMPACT OF IT: BREAK-EVEN ANALYSIS 15 Reducing Fixed Costs 16 Reducing Variable Costs 17 Increasing Revenue 18 INDUSTRY IMPACT OF IT: PORTER’S FIVE FORCES MODEL 19 Buyer Power 19 Supplier Power 20 Threat of Substitute Products or Services 21 Threat of New Entrants 21 Rivalry among Existing Competitors 22 STRATEGY IMPACT OF IT: PORTER (AGAIN) AND RGT 23 Overall Cost Leadership 23 Differentiation 24 Focus 24 Summary: Student Learning Outcomes Revisited 26 CLOSING CASE STUDY ONE: THE SOCIAL MEDIA MEGAPHONE: TRANSPARENT LIFE INTENSIFIED 27 CLOSING CASE STUDY TWO: GOOGLE AND APPLE KNOW WHERE YOU ARE, MAYBE 29 KEY TERMS AND CONCEPTS 30 SHORT-ANSWER QUESTIONS 31 ASSIGNMENTS AND EXERCISES 31 DISCUSSION QUESTIONS 32 Chapter Projects 32 C H A P T E R T W O Major Business Initiatives: Gaining Competitive Advantage with IT 35 OUTRAGEOUS INDUSTRY TRANSFORMATION: DEATH OF A TRAVEL AGENT 35 INTRODUCTION 36 SUPPLY CHAIN MANAGEMENT 36 Strategic and Competitive Opportunities with SCM 38 IT Support for Supply Chain Management 39 CUSTOMER RELATIONSHIP MANAGEMENT 40 Strategic and Competitive Opportunities with CRM 42 IT Support for Customer Relationship Management 42 ENTERPRISE RESOURCE PLANNING—BRINGING IT ALL TOGETHER 45 The Evolution of ERP Systems 47 ERP Functionality 48 ERP Software for Market Size 50 SOCIAL MEDIA 51 Social Networking 52 Social Shopping 54 Social Playing 54 Social “Saving the World” 55 Social Locationing 56 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 58 CLOSING CASE STUDY ONE: COCA-COLA IS EVERYTHING: SCM, CRM, ERP, SOCIAL MEDIA, YOU NAME IT 59 CLOSING CASE STUDY TWO: THE BUSINESS OF SOCIAL MEDIA AND MAKING THE ROI CASE 60 KEY TERMS AND CONCEPTS 61 SHORT-ANSWER QUESTIONS 62 ASSIGNMENTS AND EXERCISES 62 haa7685X_fm_i-xxxvi.indd viihaa7685X_fm_i-xxxvi.indd vii 12/28/11 4:24 PM12/28/11 4:24 PM Confirming Pages viii Table of Contents C H A P T E R F O U R Analytics, Decision Support, and Artificial Intelligence: Brainpower for Your Business 97 OUTRAGEOUS INDUSTRY TRANSFORMATION: ONLINE LEARNING 97 INTRODUCTION 98 DECISIONS AND DECISION SUPPORT 98 Decisions 98 Decision Support Systems 101 GEOGRAPHIC INFORMATION SYSTEMS 103 DATA-MINING TOOLS AND MODELS 104 Predictive Analytics 105 Text Analytics 108 Endless Analytics 109 ARTIFICIAL INTELLIGENCE 110 Expert Systems 110 Neural Networks and Fuzzy Logic 111 Genetic Algorithms 113 AGENT-BASED TECHNOLOGIES 114 Intelligent Agents 114 Multi-Agent Systems 115 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 118 CLOSING CASE STUDY ONE: CRYSTAL BALL, CLAIRVOYANT, FORTUNE TELLING . . . CAN PREDICTIVE ANALYTICS DELIVER THE FUTURE? 119 CLOSING CASE STUDY TWO: DECISION SUPPORT IS GOOD FOR YOUR HEALTH 121 KEY TERMS AND CONCEPTS 122 SHORT-ANSWER QUESTIONS 123 ASSIGNMENTS AND EXERCISES 123 DISCUSSION QUESTIONS 124 Chapter Projects 125 C H A P T E R F I V E Electronic Commerce: Strategies for the New Economy 127 OUTRAGEOUS INDUSTRY TRANSFORMATION: ADVERTISING DOLLARS GO WHERE THE EYES ARE 127 INTRODUCTION 128 E-COMMERCE BUSINESS MODELS 128 Business to Business (B2B) E-Commerce 129 Business to Consumer (B2C) E-Commerce 130 DISCUSSION QUESTIONS 63 Chapter Projects 63 C H A P T E R T H R E E Databases and Data Warehouses: Supporting the Analytics-Driven Organization 65 OUTRAGEOUS INDUSTRY TRANSFORMATION: DID YOU KNOW CDS COME FROM DEAD DINOSAURS? 65 INTRODUCTION 66 THE RELATIONAL DATABASE MODEL 68 Collections of Information 68 Created with Logical Structures 68 With Logical Ties within the Information 70 With Built-In Integrity Constraints 71 DATABASE MANAGEMENT SYSTEM TOOLS 72 Data Definition Subsystem 73 Data Manipulation Subsystem 74 Application Generation Subsystem 77 Data Administration Subsystem 77 DATA WAREHOUSES AND DATA MINING 79 What Is a Data Warehouse? 79 The Tool Set of the Analytics Professional 81 The Analytics Life Cycle 83 Data Marts: Smaller Data Warehouses 84 Important Considerations in Using a Data Warehouse 85 INFORMATION OWNERSHIP 86 Strategic Management Support 86 Sharing Information with Responsibility 87 Information Cleanliness 87 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 88 CLOSING CASE STUDY ONE: WHEN MAKING A DATABASE OF PUBLIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE BAD 89 CLOSING CASE STUDY TWO: WHEN MAKING A DATABASE OF PRIVATE AND COMPANY-STRATEGIC INFORMATION AVAILABLE TO THE PUBLIC CAN BE GOOD 90 KEY TERMS AND CONCEPTS 91 SHORT-ANSWER QUESTIONS 92 ASSIGNMENTS AND EXERCISES 92 DISCUSSION QUESTIONS 93 Chapter Projects 94 haa7685X_fm_i-xxxvi.indd viiihaa7685X_fm_i-xxxvi.indd viii 12/28/11 4:28 PM12/28/11 4:28 PM Confirming Pages Table of Contents ix COMPONENT-BASED DEVELOPMENT 167 Rapid Application Development Methodology 167 Extreme Programming Methodology 168 Agile Methodology 170 Service-Oriented Architecture—An Architecture Perspective 170 SELFSOURCING (END-USER DEVELOPMENT) 170 The Selfsourcing Process 171 The Advantages of Selfsourcing 172 Potential Pitfalls and Risks of Selfsourcing 173 Which Applications for IT to Offload 173 The Right Tool for the Job 174 PROTOTYPING 174 The Prototyping Process 175 The Advantages of Prototyping 177 The Disadvantages of Prototyping 177 OUTSOURCING 178 The Outsourcing Process 180 The Service Level Agreement 182 Geopolitical Outsourcing Options 182 The Advantages and Disadvantages of Outsourcing 184 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 185 CLOSING CASE STUDY ONE: THE GOOD-ENOUGH TECHNOLOGY ECONOMY 186 CLOSING CASE STUDY TWO: TABLETS TAKE THEIR PLACE IN THE PC MARKET 187 KEY TERMS AND CONCEPTS 189 SHORT-ANSWER QUESTIONS 189 ASSIGNMENTS AND EXERCISES 190 DISCUSSION QUESTIONS 191 Chapter Projects 192 C H A P T E R S E V E N Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise 195 OUTRAGEOUS INDUSTRY TRANSFORMATION: MONEY WILL ALWAYS BE MONEY 195 INTRODUCTION 196 Customers 196 End Users 197 Software Development 198 Information Needs 198 Hardware Requirements 198 Consumer to Business (C2B) E-Commerce 130 Consumer to Consumer (C2C) E-Commerce 131 UNDERSTAND YOUR BUSINESS, PRODUCTS, SERVICES, AND CUSTOMERS 132 Who Are Your Customers? 132 What Is the Value of Your Products and Services as Perceived by Your Customers? 132 FIND CUSTOMERS AND ESTABLISH RELATIONSHIPS 137 Business to Consumer 137 Business to Business 139 MOVE MONEY EASILY AND SECURELY 140 Business to Consumer Payment Systems 140 Business to Business Payment Systems 142 Security: The Pervading Concern 143 E-BUSINESS TRENDS 144 Long-Tail Economics 145 Crowdsourcing 146 Virtual Goods 147 Mobile Commerce 148 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 149 CLOSING CASE STUDY ONE: WHEN YOU’RE BIG, YOU CAN BE YOUR OWN B2B E-MARKETPLACE 151 CLOSING CASE STUDY TWO: THE MOBILE COMMERCE EXPLOSION 153 KEY TERMS AND CONCEPTS 154 SHORT-ANSWER QUESTIONS 155 ASSIGNMENTS AND EXERCISES 155 DISCUSSION QUESTIONS 156 Chapter Projects 156 C H A P T E R S I X Systems Development: Phases, Tools, and Techniques 159 OUTRAGEOUS INDUSTRY TRANSFORMATION: CAMERAS USE FILM? 159 INTRODUCTION 160 INSOURCING AND THE SYSTEMS DEVELOPMENT LIFE CYCLE 160 Phase 1: Planning 162 Phase 2: Analysis 163 Phase 3: Design 164 Phase 4: Development 164 Phase 5: Testing 165 Phase 6: Implementation 165 Phase 7: Maintenance 166 haa7685X_fm_i-xxxvi.indd ixhaa7685X_fm_i-xxxvi.indd ix 12/28/11 4:30 PM12/28/11 4:30 PM Confirming Pages x Table of Contents SECURITY 244 Security and Employees 244 Security and Outside Threats 245 Security Precautions 247 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 249 CLOSING CASE STUDY ONE: SEXTING NOW ALMOST COMMONPLACE 250 CLOSING CASE STUDY TWO: SONY REELS FROM MULTIPLE HACKER ATTACKS 252 KEY TERMS AND CONCEPTS 253 SHORT-ANSWER QUESTIONS 253 ASSIGNMENTS AND EXERCISES 253 DISCUSSION QUESTIONS 254 Chapter Projects 255 C H A P T E R N I N E Emerging Trends and Technologies: Business, People, and Technology Tomorrow 257 OUTRAGEOUS INDUSTRY TRANSFORMATION: THERE IS NO LONGER ONE IN EVERY TOWN 257 INTRODUCTION 258 THE CHANGING INTERNET 259 Personal Software-as-a-Service 259 Push, Not Pull, Technologies and Personalization 260 F2b2C: A New E-Commerce Business Model 261 Voice over Internet Protocol (VoIP) 262 Web 3.0 (Is Web 2.0 Already Old?) 262 E-Society 264 PHYSIOLOGICAL INTERACTION 264 Automatic Speech Recognition 264 Virtual Reality 265 Cave Automatic Virtual Environments 265 Haptic Interfaces 266 Biometrics 267 THE WIRELESS ARENA 270 The Next Generation of Smartphone Technology 270 RFID (Radio Frequency Identification) 271 PURE TECHNOLOGY 274 Nanotechnology 274 Multi-State CPUs 275 Holographic Storage Devices 275 HARDWARE AND SOFTWARE INFRASTRUCTURE 199 Enterprise Resource Planning (ERP) Revisited 199 Supporting Network Infrastructures 201 Cloud Computing: No Infrastructure at All 203 IT SUCCESS METRICS 209 Efficiency and Effectiveness Metrics 209 Web-centric Metrics 211 Call Center Metrics 212 BUSINESS CONTINUITY PLANNING 212 Phase 1: Organizational Strategic Plan 213 Phase 2: Analysis 213 Phase 3: Design 214 Phase 4: Implementation 214 Phase 5: Testing 215 Phase 6: Maintenance 215 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 216 CLOSING CASE STUDY ONE: PUBLIC “PERSONAL” CLOUDS 218 CLOSING CASE STUDY TWO: DENVER HEALTH OPERATES WITH A PRIVATE CLOUD AND THIN CLIENTS 219 KEY TERMS AND CONCEPTS 220 SHORT-ANSWER QUESTIONS 221 ASSIGNMENTS AND EXERCISES 221 DISCUSSION QUESTIONS 222 Chapter Projects 222 C H A P T E R E I G H T Protecting People and Information: Threats and Safeguards 225 OUTRAGEOUS INDUSTRY TRANSFORMATION: TRANSFORMATIONS IN MEDICINE MEAN BETTER LIVES 225 INTRODUCTION 226 ETHICS 226 Two Factors That Determine How You Decide Ethical Issues 228 Intellectual Property 229 PRIVACY 231 Privacy and Other Individuals 231 Identity Theft 232 Privacy and Employees 235 Privacy and Consumers 238 Privacy and Government Agencies 241 Laws on Privacy 243 haa7685X_fm_i-xxxvi.indd xhaa7685X_fm_i-xxxvi.indd x 12/28/11 4:36 PM12/28/11 4:36 PM Confirming Pages Table of Contents xi EXTENDED LEARNING MODULE B 350 The World Wide Web and the Internet INTRODUCTION 351 WORLD WIDE WEB 352 Web Sites, Addresses, and Pages 352 Understanding Addresses 353 Using Web Browser Software 354 SEARCH ENGINES 356 WEB 2.0 357 Wikis 357 Social Networking Sites 358 Blogs 358 RSS Feeds 359 Podcasting 359 INTERNET TECHNOLOGIES 359 The Internet Backbone 359 Internet Servers 360 Communications Protocols 360 CONNECTING TO THE INTERNET 362 Communications Software 362 Telecommunications Hardware 363 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 365 KEY TERMS AND CONCEPTS 366 SHORT-ANSWER QUESTIONS 367 ASSIGNMENTS AND EXERCISES 367 EXTENDED LEARNING MODULE C 370 Designing Databases and Entity-Relationship Diagramming INTRODUCTION 371 DESIGNING AND BUILDING A RELATIONAL DATABASE 371 Step 1: Define Entity Classes and Primary Keys 373 Step 2: Define Relationships among the Entity Classes 374 Step 3: Define Information (Fields) for Each Relation 380 Step 4: Use a Data Definition Language to Create Your Database 383 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 383 KEY TERMS AND CONCEPTS 384 SHORT-ANSWER QUESTIONS 384 ASSIGNMENTS AND EXERCISES 385 MOST IMPORTANT CONSIDERATIONS 275 The Necessity of Technology 276 Closing the Great Digital Divide 276 Technology for the Betterment of Society 276 Exchanging Privacy for Convenience 276 Ethics, Ethics, Ethics 277 Making Predictions 277 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 278 CLOSING CASE STUDY ONE: JUST HOW BIG IS THE IMPACT OF TECHNOLOGY ON SOCIETY? 280 CLOSING CASE STUDY TWO: SMARTPHONES AND THE GREAT DIGITAL DIVIDE 282 KEY TERMS AND CONCEPTS 283 SHORT-ANSWER QUESTIONS 283 ASSIGNMENTS AND EXERCISES 284 DISCUSSION QUESTIONS 284 Chapter Projects 285 EXTENDED LEARNING MODULE A 322 Computer Hardware and Software A QUICK TOUR OF TECHNOLOGY 323 CATEGORIES OF COMPUTERS BY SIZE 325 Smartphones 325 Tablet PCs, Slates, and E-Readers 325 Notebook Computers 325 Desktop Computers 326 Minicomputers, Mainframe Computers, and Supercomputers 327 SOFTWARE: YOUR INTELLECTUAL INTERFACE 328 Application Software 328 System Software 331 HARDWARE: YOUR PHYSICAL INTERFACE 333 Common Input Devices 334 Common Output Devices 336 Common Storage Devices 338 CPU and RAM 340 Connecting the Hardware Outside to the Hardware Inside 342 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 345 KEY TERMS AND CONCEPTS 346 SHORT-ANSWER QUESTIONS 348 ASSIGNMENTS AND EXERCISES 348 haa7685X_fm_i-xxxv.indd xihaa7685X_fm_i-xxxv.indd xi 12/20/11 9:29 PM12/20/11 9:29 PM Confirming Pages xii Table of Contents CLASSIFYING NETWORKS BY DISTANCE 414 LANs, WANs, and MANs 414 INTERNET 415 Bandwidth 415 Internet Connection Types 416 Voice over IP 421 NETWORK COMMUNICATIONS MEDIA 422 Wired Communications Media 422 Wireless Communications Media 423 NETWORK SECURITY 426 Principles of Computer Security 426 Firewalls and Intrusion Detection Systems 427 Encrypted Communications: SSL and Virtual Private Networks 428 Other Security Threats: Malware 429 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 430 KEY TERMS AND CONCEPTS 432 SHORT-ANSWER QUESTIONS 432 ASSIGNMENTS AND EXERCISES 433 EXTENDED LEARNING MODULE F (on OLC) Building a Web Page with HTML F.1 INTRODUCTION F.2 HYPERTEXT MARKUP LANGUAGE (HTML) F.3 Working with and Viewing Your Web Site Locally F.4 BASIC TEXT FORMATTING F.5 CREATING HEADINGS F.6 ADJUSTING TEXT COLOR F.7 ADJUSTING TEXT SIZE F.8 CHANGING THE BACKGROUND COLOR F.9 ADDING LINKS TO A WEB SITE F.10 Links to Other Web Sites or Pages F.10 Links to Downloadable Files F.11 Links to E-Mail F.11 ADDING IMAGES F.12 Sizing Images F.12 Positioning Images F.13 USING A TEXTURED BACKGROUND F.14 CREATING AND USING LISTS F.15 Numbered Lists F.15 Unnumbered Lists F.16 EXTENDED LEARNING MODULE D 386 Decision Analysis with Spreadsheet Software INTRODUCTION 387 LISTS 388 BASIC FILTER 390 CUSTOM FILTER 392 CONDITIONAL FORMATTING 394 PIVOT TABLES 396 GOAL SEEK 402 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 404 KEY TERMS AND CONCEPTS 405 ASSIGNMENTS AND EXERCISES 405 EXTENDED LEARNING MODULE D (on OLC) Decision Analysis with Spreadsheet Software D.1 INTRODUCTION D.2 LISTS D.3 BASIC FILTER D.5 CUSTOM FILTER D.7 CONDITIONAL FORMATTING D.9 PIVOT TABLES D.11 BACK TO DECISION SUPPORT D.18 Filter D.18 Conditional Formatting D.18 Pivot Table D.18 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED D.19 KEY TERMS AND CONCEPTS D.19 ASSIGNMENTS AND EXERCISES D.19 EXTENDED LEARNING MODULE E 408 Network Basics INTRODUCTION 409 Basic Principles of Networks 409 HOME NETWORKS 410 Network Cards in Each Computer 410 Wired and Wireless Transmission Media 410 Home Internet Service and Broadband Routers 411 Network Software 412 NETWORK COMPONENTS 412 Switches 412 Routers 413 haa7685X_fm_i-xxxvi.indd xiihaa7685X_fm_i-xxxvi.indd xii 12/28/11 4:43 PM12/28/11 4:43 PM Confirming Pages Table of Contents xiii EXTENDED LEARNING MODULE H 436 Computer Crime and Digital Forensics INTRODUCTION 437 COMPUTER CRIME 438 Outside the Organization 438 Web Defacing 445 Cyber War 446 The Players 446 DIGITAL FORENSICS 448 The Collection Phase 449 The Analysis Phase 453 Analytics in Forensics 458 Anti-Forensics 460 WHO NEEDS DIGITAL FORENSICS INVESTIGATORS? 463 Proactive Digital Forensics Education for Problem Prevention 464 Reactive Digital Forensics for Incident Response 465 A Day in the Life 465 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED 467 KEY TERMS AND CONCEPTS 468 SHORT-ANSWER QUESTIONS 469 ASSIGNMENTS AND EXERCISES 469 EXTENDED LEARNING MODULE I (on OLC) Building an E-Portfolio I.1 INTRODUCTION I.2 THE ELECTRONIC JOB MARKET—EXTENDING YOUR REACH I.2 CONVERGENCE OF ONLINE NETWORKING AND RÉSUMÉ DEVELOPMENT I.4 Start to Network I.4 Perform a Self-Assessment I.5 Research Careers, Industries, and Companies I.7 RÉSUMÉ BUILDING—A LIFELONG PROCESS I.7 Content, Content, Content I.7 Electronic File Formats I.11 What Is the Right Résumé Style? I.16 DEVELOPING YOUR JOB SEARCH E-PORTFOLIO I.17 Self-Promotion I.18 Give Them What They Want I.18 The Shape of an E-Portfolio I.19 E-Gallery I.20 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED F.18 KEY TERMS AND CONCEPTS F.19 SHORT-ANSWER QUESTIONS F.19 ASSIGNMENTS AND EXERCISES F.19 EXTENDED LEARNING MODULE G (on OLC) Object-Oriented Technologies G.1 INTRODUCTION G.2 TRADITIONAL TECHNOLOGY APPROACH G.2 Information View G.2 Procedure View G.3 OBJECT-ORIENTED TECHNOLOGY APPROACH G.4 Information and Procedure Views Combined G.4 Object-Oriented Approach and the Real World G.5 FIVE PRIMARY CONCEPTS OF OBJECT-ORIENTED TECHNOLOGIES G.5 Information G.5 Procedures G.6 Classes G.6 Objects G.7 Messages G.8 How the Five Primary Concepts Interact G.8 REAL-WORLD OBJECT-ORIENTED EXAMPLES G.9 THREE FUNDAMENTAL PRINCIPLES OF OBJECT-ORIENTED TECHNOLOGIES G.10 Inheritance G.10 Encapsulation G.12 Polymorphism G.13 PUTTING IT ALL TOGETHER: A BUSINESS EXAMPLE G.14 Eighteen Months to Get a New Product to Market G.14 Inventory Control G.16 Scalability and Expandability G.16 TYPES OF OBJECT-ORIENTED TECHNOLOGIES G.17 Object-Oriented Programming Languages G.18 Object-Oriented Database Systems G.18 Object-Oriented Technologies and Client/Server Environments G.18 The Future of Object-Oriented Technologies G.20 SUMMARY: STUDENT LEARNING OUTCOMES REVISITED G.20 KEY TERMS AND CONCEPTS G.21 SHORT-ANSWER QUESTIONS G.21 ASSIGNMENTS AND EXERCISES G.22 haa7685X_fm_i-xxxvi.indd xiiihaa7685X_fm_i-xxxvi.indd xiii 12/28/11 4:52 PM12/28/11 4:52 PM Confirming Pages xiv Table of Contents INTRODUCTION J.2 SOLOMON ENTERPRISES DATABASE J.3 Implementing the Structure of the Solomon Enterprises Database J.5 Implementing the Raw Material Relation Structure J.7 Implementing the Concrete Type Relation Structure J.9 Implementing the Bill of Material Relation Structure J.10 DEFINING RELATIONSHIPS WITHIN THE SOLOMON ENTERPRISES DATABASE J.12 ENTERING INFORMATION INTO THE SOLOMON DATABASE J.15 Changing the Structure of Information in Relations J.18 …
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident