Table Of Contents — Information Systems: A Manager's Guide to Harnessing Technology
Contents
- Publisher Information
- Chapter 1: Setting the Stage: Technology and the Modern Enterprise
- 1.1 Tech’s Tectonic Shift: Radically Changing Business Landscapes
- 1.2 It’s Your Revolution
- 1.3 Geek Up—Tech Is Everywhere and You’ll Need It to Thrive
- 1.4 The Pages Ahead
- Chapter 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners from Losers
- 2.1 Introduction
- 2.2 Powerful Resources
- 2.3 Barriers to Entry, Technology, and Timing
- 2.4 Key Framework: The Five Forces of Industry Competitive Advantage
- Chapter 3: Zara: Fast Fashion from Savvy Systems
- 3.1 Introduction
- 3.2 Don’t Guess, Gather Data
- 3.3 Moving Forward
- Chapter 4: Netflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits
- 4.1 Introduction
- 4.2 Tech and Timing: Creating Killer Assets
- 4.3 From Atoms to Bits: Opportunity or Threat?
- Chapter 5: Moore’s Law: Fast, Cheap Computing and What It Means for the Manager
- 5.1 Introduction
- 5.2 The Death of Moore’s Law?
- 5.3 Bringing Brains Together: Supercomputing and Grid Computing
- 5.4 E-waste: The Dark Side of Moore’s Law
- Chapter 6: Understanding Network Effects
- 6.1 Introduction
- 6.2 Where’s All That Value Come From?
- 6.3 One-Sided or Two-Sided Markets?
- 6.4 How Are These Markets Different?
- 6.5 Competing When Network Effects Matter
- Chapter 7: Peer Production, Social Media, and Web 2.0
- 7.1 Introduction
- 7.2 Blogs
- 7.3 Wikis
- 7.4 Electronic Social Networks
- 7.5 Twitter and the Rise of Microblogging
- 7.6 Other Key Web 2.0 Terms and Concepts
- 7.7 Prediction Markets and the Wisdom of Crowds
- 7.8 Crowdsourcing
- 7.9 Get SMART: The Social Media Awareness and Response Team
- Chapter 8: Facebook: Building a Business from the Social Graph
- 8.1 Introduction
- 8.2 What’s the Big Deal?
- 8.3 The Social Graph
- 8.4 Facebook Feeds—Ebola for Data Flows
- 8.5 Facebook as a Platform
- 8.6 Advertising and Social Networks: A Work in Progress
- 8.7 Privacy Peril: Beacon and the TOS Debacle
- 8.8 Predators and Privacy
- 8.9 One Graph to Rule Them All: Facebook Takes Over the Web
- 8.10 Is Facebook Worth It?
- Chapter 9: Understanding Software: A Primer for Managers
- 9.1 Introduction
- 9.2 Operating Systems
- 9.3 Application Software
- 9.4 Distributed Computing
- 9.5 Writing Software
- 9.6 Total Cost of Ownership (TCO): Tech Costs Go Way beyond the Price Tag
- Chapter 10: Software in Flux: Partly Cloudy and Sometimes Free
- 10.1 Introduction
- 10.2 Open Source
- 10.3 Why Open Source?
- 10.4 Examples of Open Source Software
- 10.5 Why Give It Away? The Business of Open Source
- 10.6 Cloud Computing: Hype or Hope?
- 10.7 The Software Cloud: Why Buy When You Can Rent?
- 10.8 SaaS: Not without Risks
- 10.9 The Hardware Cloud: Utility Computing and Its Cousins
- 10.10 Clouds and Tech Industry Impact
- 10.11 Virtualization: Software That Makes One Computer Act Like Many
- 10.12 Make, Buy, or Rent
- Chapter 11: The Data Asset: Databases, Business Intelligence, and Competitive Advantage
- 11.1 Introduction
- 11.2 Data, Information, and Knowledge
- 11.3 Where Does Data Come From?
- 11.4 Data Rich, Information Poor
- 11.5 Data Warehouses and Data Marts
- 11.6 The Business Intelligence Toolkit
- 11.7 Data Asset in Action: Technology and the Rise of Wal-Mart
- 11.8 Data Asset in Action: Harrah’s Solid Gold CRM for the Service Sector
- Chapter 12: A Manager’s Guide to the Internet and Telecommunications
- 12.1 Introduction
- 12.2 Internet 101: Understanding How the Internet Works
- 12.3 Getting Where You’re Going
- 12.4 Last Mile: Faster Speed, Broader Access
- Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else)
- 13.1 Introduction
- 13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?
- 13.3 Where Are Vulnerabilities? Understanding the Weaknesses
- 13.4 Taking Action
- Chapter 14: Google: Search, Online Advertising, and Beyond
- 14.1 Introduction
- 14.2 Understanding Search
- 14.3 Understanding the Increase in Online Ad Spending
- 14.4 Search Advertising
- 14.5 Ad Networks—Distribution beyond Search
- 14.6 More Ad Formats and Payment Schemes
- 14.7 Customer Profiling and Behavioral Targeting
- 14.8 Profiling and Privacy
- 14.9 Search Engines, Ad Networks, and Fraud
- 14.10 The Battle Unfolds
- Please share your supplementary material!