Search
- Filter Results
- Location
- Classification
- Include attachments
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/03%3A_Software/3.05%3A_SummarySoftware is categorized as system software like operating systems, utility programs, and application software. Productivity software is a subset of application software that provides basic business fu...Software is categorized as system software like operating systems, utility programs, and application software. Productivity software is a subset of application software that provides basic business functionality to a personal computer: word processing, spreadsheets, and presentations. An ERP system is a software application with a centralized database that is implemented across the entire organization.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/01%3A_What_an_Information_System_is/1.03%3A_The_Evolution_and_Role_of_Information_SystemsWe describe a brief history of the evolution of the Information system from the 1930s to today.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/01%3A_What_an_Information_System_is/1.05%3A_SummaryKey developments include mainframe computers in the 1950s-60s, personal computers in the 1970s-80s, networking and the Internet in the 1980s-90s, Web 2.0 and mobile computing in the 2000s, and emergin...Key developments include mainframe computers in the 1950s-60s, personal computers in the 1970s-80s, networking and the Internet in the 1980s-90s, Web 2.0 and mobile computing in the 2000s, and emerging technologies like AI and the metaverse today.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/06%3A_Information_Systems_Security/6.09%3A_SummaryThere are different types of attackers, including amateurs attacking for fun and prestige, hacktivists hacking for a political cause, and professional hackers attacking for profit. The vulnerable netw...There are different types of attackers, including amateurs attacking for fun and prestige, hacktivists hacking for a political cause, and professional hackers attacking for profit. The vulnerable networks are PC and server business networks and the thousands of computers on the Internet of Things. With vigilant governance and coordination between security staff, management, employees, and technical controls, companies can build resilience against today's ever-evolving cyber risks.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/04%3A_Data_and_DatabasesThis chapter explores how organizations use information systems to turn data into information and knowledge to be used for competitive advantage. We will discuss how different types of data are captur...This chapter explores how organizations use information systems to turn data into information and knowledge to be used for competitive advantage. We will discuss how different types of data are captured and managed, different types of databases, and how individuals and organizations use them.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/09%3A_The_People_in_Information_System/9.07%3A_Information-Systems_Users__Types_of_UsersIn this section, we look at the information systems' users, the largest and the most important group.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/07%3A_Leveraging_Information_Systems_for_Strategic_Advantage/7.01%3A_IntroductionWe will look at the value IT can bring to an organization
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/10%3A_Information_Systems_Development/10.04%3A_Implementation_MethodologiesThis section discussed various implementation methodologies and how to manage the change process.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/04%3A_Data_and_Databases/4.10%3A_Enterprise_DatabasesEnterprise databases help thousands of users at one time.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/09%3A_The_People_in_Information_System/9.08%3A_SummaryThis chapter has reviewed the many different categories of individuals - from the front-line help-desk workers to system analysts to chief information officer(CIO) -who make up the people component of...This chapter has reviewed the many different categories of individuals - from the front-line help-desk workers to system analysts to chief information officer(CIO) -who make up the people component of information systems. The world of information technology is changing so fast that new roles are being created all the time, and roles that have existed for decades are being phased out.
- https://biz.libretexts.org/Courses/Canada_College/Management_Information_Systems_Remix/09%3A_The_People_in_Information_System/9.03%3A_Information-Systems_Operations_and_AdministrationIn this section, we look at the group of information-systems professionals involved in the day-to-day operations and IT administration.