The book now also includes:
John Ward is Emeritus Professor at Cranfield University, School of Management. He was previously Professor of Strategic Information Systems and Director of the Information Systems Research Centre. Prior to joining Cranfield, he worked in industry for 15 years and continues to be a consultant to a number of major organizations. As well as publishing many papers and articles, he is co-author of the book Strategic Planning for Information Systems. He is a Fellow of the Chartered Institute of Management Accountants and has served two terms as President of the UK Academy for Information Systems.
Elizabeth Daniel is Professor of Information Management and Associate Dean of Research and Scholarship at the Open University Business School (OUBS). Prior to joining OUBS in 2005, she worked in the IS Research Centre at Cranfield School of Management. Elizabeth’s research has addressed a number of areas including benefits management and IS in marketing and supply chains. Recent work has included studies of home-based online businesses and the uses of consumer and employee data. She has published many papers in leading academic journals and a number of management reports.
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
Coverage IncludesHighlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding “Information as a Service” and “Info 2.0,” the information delivery side of Web 2.0
For courses in MIS.
Help your students master the most important business course they'll take
Technology is rapidly changing the way organizations do business–and knowledge of MIS is critical to keeping up. Comprehensive and up-to-date, Using MIS shows students how organizations use information systems to solve business problems every day. The tenth edition now includes new content on using virtual reality and artificial intelligence, along with 11 new Career Guides, five new Ethics Guides, and five new Security Guides.
Also available with MyLab MIS
MyLabTM MIS is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Within its structured environment, students practice what they learn, test their understanding, and pursue a personalized study plan that helps them better absorb course material and understand difficult concepts.
Note: You are purchasing a standalone product; MyLab does not come packaged with this content. Students, if interested in purchasing this title with MyLab, ask your instructor for the correct package ISBN and Course ID. Instructors, contact your Pearson representative for more information.
If you would like to purchase both the physical text and MyLab, search for:
A Mother clings to power whilst her Daughter screams murder.
An estranged Son is coming home.
A bloody family saga sprawling decades is about to reach its conclusion.
Everything is about to change.
A Queen masterminds the murder of her Husband and takes the throne with her new lover. Her Daughter, Electra, grows up in the grip of a cruel regime, swearing revenge. Her Son Orestes, exiled as a boy and raised in the arms of the rebels, waits to embark on a holy mission to reclaim his country.
Two decades later a twist of fate brings Brother and Sister together; united by hate but divided by faith. With the country on the brink of civil war, the most powerful family in the Kingdom are torn apart from the inside as their dark past once again becomes the present.
The revolution will be televised, but are The Gods watching?
DumbWise reinvent the murderous Greek myth of power and prophecy as a lyrical modern epic with a live punk-rock score.
Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.
Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.Provides clear direction on how to meet new business demands on the security professionalGuides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the programCovers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each