Introduction to Information Systems (Record no. 22677)

MARC details
000 -LEADER
fixed length control field 05718nam a22003257a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20131031182915.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131031b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118063347 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (WaSeSS)ssj0000703211
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
-- UCULIB
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/038011
Edition number 23
Item number RAI
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Rainer, R. Kelly
Fuller form of name (Rex Kelly)
210 10 - ABBREVIATED TITLE
Abbreviated title Introduction to Information sSystems
245 10 - TITLE STATEMENT
Title Introduction to Information Systems
Medium [electronic resource] :
Remainder of title supporting and transforming business /
Statement of responsibility, etc R. Kelly Rainer, Jr., Casey G. Cegielski.
250 ## - EDITION STATEMENT
Edition statement 4th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xiv,466p. :
Other physical details ill; some (col);
Dimensions 25cm
500 ## - GENERAL NOTE
General note Includes index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Chapter 1 Introduction to Information Systems 1.1 Why Should I Study Information Systems?1.2 Overview of Computer-Based Information Systems1.3 How Does IT Impact Organizations?1.4 Importance of Information Systems to SocietyChapter 2 Organizational Strategy, Competitive Advantage, and Information Systems2.1 Business Processes2.2 Business process reengineering and business process management2.3 Business Pressures, Organizational Responses, and Information Technology Support2.4 Competitive Advantage and Strategic Information Systems2.5 Business - Information Technology AlignmentChapter 3 Ethics and Privacy3.1 Ethical Issues3.2 PrivacyChapter 4 Information Security4.1 Introduction to Information Security4.2 Unintentional Threats to Information Systems4.3 Deliberate Threats to Information Systems4.4 What Organizations Are Doing to Protect Information Resources4.5 Information Security ControlsChapter 5 Data and Knowledge Management 5.1 Managing Data5.2 The Database Approach5.3 Database Management Systems5.4 Data Warehousing 5.5 Knowledge ManagementChapter 6 Networks 6.1 What Is a Computer Network? 6.2 Network Fundamentals 6.3 The Internet and the World Wide Web 6.4 Network ApplicationsChapter 7 E-Business and E-Commerce 7.1 Overview of E-Business and E-Commerce 7.2 Business-to-Consumer (B2C) Electronic Commerce 7.3 Business-to-Business (B2B) Electronic Commerce 7.4 Electronic Payments 7.5 Ethical and Legal Issues in E-BusinessChapter 8 Wireless, Mobile Computing, and Mobile Commerce 8.1 Wireless Technologies 8.2 Wireless Computer Networks and Internet Access 8.3 Mobile Computing and Mobile Commerce 8.4 Pervasive Computing 8.5 Wireless SecurityChapter 9 Web 2.0 and Social Networks9.1 Web 2.0 Underlying Technologies9.2 Web 2.0 Applications9.3 Categories of Web 2.0 SitesChapter 10 Information Systems within the Organization 10.1 Transaction Processing Systems 10.2 Functional Area Information Systems 10.3 Enterprise Resource Planning Systems 10.4 ReportsChapter 11 Customer Relationship Management and Supply Chain Management 11.1 Defining Customer Relationship Management 11.2 Operational Customer Relationship Management Systems 11.3 Analytical Customer Relationship Management Systems 11.4 Other Types of Customer Relationship Management Systems 11.5 Supply Chains 11.6 Supply Chain Management 11.7 Information Technology Support for Supply Chain Management Chapter 12 Business Intelligence 12.1 Managers and Decision Making 12.2 What Is Business Intelligence? 12.3 Business Intelligence Applications for Data Analysis 12.4 Business Intelligence Applications for Presenting Results 12.5 Business Intelligence in Action: Corporate Performance ManagementChapter 13 Acquiring Information Systems and Applications 13.1 Planning for and Justifying IT Applications 13.2 Strategies for Acquiring IT Applications 13.3 The Traditional Systems Development Life Cycle 13.4 Alternative Methods and Tools for Systems Development 13.5 Vendor and Software SelectionTechnology Guide 1 Hardware TG 1.1 IntroductionTG 1.2 Strategic Hardware IssuesTG 1.3 Computer HierarchyTG 1.4 Input and Output TechnologiesTG 1.5 The Central Processing Unit Technology Guide 2 Software. TG 2.1 Introduction to SoftwareTG 2.2 Software IssuesTG 2.3 Systems SoftwareTG 2.4 Application SoftwareTechnology Guide 3 Emerging Types of Enterprise Computing TG 3.1 Introduction TG 3.2 Server Farms TG 3.3 Virtualization TG 3.4 Grid Computing TG 3.5 Utility Computing TG 3.6 Cloud Computing TG 3.7 Emerging Software TrendsTechnology Guide 4 Intelligent Systems TG4.1 Introduction to Intelligent SystemsTG4.2 Expert SystemsTG4.3 Neural NetworksTG4.4 Fuzzy LogicTG4.5 Genetic AlgorithmsTG4.6 Intelligent AgentsTechnology Guide 5 Protecting Your Information Assets TG 5.1 Introduction TG 5.2 Behavioral Actions to Protect Your Information Assets TG 5.3 Computer-Based Actions to Protect Your Information AssetsGlossary. Index.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access License restrictions may limit access.
520 ## - SUMMARY, ETC.
Summary, etc "Rainer & Cegielski's new edition of Introduction to Information Systems: Enabling and Transforming Business includes updated coverage, refined cases, more illustrations, and a new "Weekly Updates" resource. Its concise chapters, many cases and examples, and online quizzing provide smooth and straightforward information and provide many hands-on activities. In general, the text is more engaging, compelling and relevant with a broader table of contents, pedagogically innovative structure, integrated activities, Excel and Access projects, and integration with WileyPLUS"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Information Technology.
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cegielski, Casey G.
773 #0 - HOST ITEM ENTRY
Title Safari Technical Books (Current File)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.columbia.edu/cgi-bin/cul/resolve?clio9879737">http://www.columbia.edu/cgi-bin/cul/resolve?clio9879737</a>
Public note Full text available from Safari Technical Books (Current File)
910 ## - USER-OPTION DATA (OCLC)
User-option data Library of Congress record
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Mbale College Library Mbale College Library Closed Access l Short Loan 31.10.2013   658.4/038011 RAI 6050 Mbale 31.10.2013 31.10.2013 Books
        Mbale College Library Mbale College Library Open Access / General collection 31.10.2013   658.4/038011 RAI 6048 Mbale 31.10.2013 31.10.2013 Books
        Mbale College Library Mbale College Library Open Access / General collection 31.10.2013   658.4/038011 RAI 6049 Mbale 31.10.2013 31.10.2013 Books