全部版块 我的主页
论坛 新商科论坛 四区(原工商管理论坛) 商学院
833 3
2019-03-16
分享information system management入门好书<Getting the Most Out of Information Systems: A Manager's Guide
附件列表
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

全部回复
2019-3-16 15:43:43
肖荣华 发表于 2019-3-16 15:41
分享information system management入门好书&amp;lt;span style=&amp;quot;em;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Getting the  ...
Getting the Most Out of Information Systems: A Manager\'s Guide<br>
v. 1.1<br>
Table of Contents<br>
About the Author<br>
Acknowledgments<br>
Dedication<br>
Preface<br>
Chapter 1: Setting the Stage: Technology and the Modern Enterprise<br>
Tech’s Tectonic Shift: Radically Changing Business Landscapes<br>
It’s Your Revolution<br>
Geek Up—Tech Is Everywhere and You’ll Need It to Thrive<br>
The Pages Ahead<br>
Chapter 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners from Losers<br>
Introduction<br>
Powerful Resources<br>
Barriers to Entry, Technology, and Timing<br>
Key Framework: The Five Forces of Industry Competitive Advantage<br>
Chapter 3: Zara: Fast Fashion from Savvy Systems<br>
Introduction<br>
Don’t Guess, Gather Data<br>
Moving Forward<br>
Chapter 4: Netflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits<br>
Introduction<br>
Tech and Timing: Creating Killer Assets<br>
From Atoms to Bits: Opportunity or Threat?<br>
Chapter 5: Moore’s Law: Fast, Cheap Computing and What It Means for the Manager<br>
Introduction<br>
The Death of Moore’s Law?<br>
Bringing Brains Together: Supercomputing and Grid Computing<br>
E-waste: The Dark Side of Moore’s Law<br>
Chapter 6: Understanding Network Effects<br>
Introduction<br>
Where’s All That Value Come From?<br>
One-Sided or Two-Sided Markets?<br>
How Are These Markets Different?<br>
Competing When Network Effects Matter<br>
Chapter 7: Peer Production, Social Media, and Web 2.0<br>
Introduction<br>
Blogs<br>
Wikis<br>
Electronic Social Networks<br>
Twitter and the Rise of Microblogging<br>
Other Key Web 2.0 Terms and Concepts<br>
Prediction Markets and the Wisdom of Crowds<br>
Crowdsourcing<br>
Get SMART: The Social Media Awareness and Response Team<br>
Chapter 8: Facebook: Building a Business from the Social Graph<br>
Introduction<br>
What’s the Big Deal?<br>
The Social Graph<br>
Facebook Feeds—Ebola for Data Flows<br>
Facebook as a Platform<br>
Advertising and Social Networks: A Work in Progress<br>
Privacy Peril: Beacon and the TOS Debacle<br>
Predators and Privacy<br>
One Graph to Rule Them All: Facebook Takes Over the Web<br>
Is Facebook Worth It?<br>
Chapter 9: Understanding Software: A Primer for Managers<br>
Introduction<br>
Operating Systems<br>
Application Software<br>
Distributed Computing<br>
Writing Software<br>
Total Cost of Ownership (TCO): Tech Costs Go Way beyond the Price Tag<br>
Chapter 10: Software in Flux: Partly Cloudy and Sometimes Free<br>
Introduction<br>
Open Source<br>
Why Open Source?<br>
Examples of Open Source Software<br>
Why Give It Away? The Business of Open Source<br>
Cloud Computing: Hype or Hope?<br>
The Software Cloud: Why Buy When You Can Rent?<br>
SaaS: Not without Risks<br>
The Hardware Cloud: Utility Computing and Its Cousins<br>
Clouds and Tech Industry Impact<br>
Virtualization: Software That Makes One Computer Act Like Many<br>
Make, Buy, or Rent<br>
Chapter 11: The Data Asset: Databases, Business Intelligence, and Competitive Advantage<br>
Introduction<br>
Data, Information, and Knowledge<br>
Where Does Data Come From?<br>
Data Rich, Information Poor<br>
Data Warehouses and Data Marts<br>
The Business Intelligence Toolkit<br>
Data Asset in Action: Technology and the Rise of Wal-Mart<br>
Data Asset in Action: Harrah’s Solid Gold CRM for the Service Sector<br>
Chapter 12: A Manager’s Guide to the Internet and Telecommunications<br>
Introduction<br>
Internet 101: Understanding How the Internet Works<br>
Getting Where You’re Going<br>
Last Mile: Faster Speed, Broader Access<br>
Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else)<br>
Introduction<br>
Why Is This Happening? Who Is Doing It? And What’s Their Motivation?<br>
Where Are Vulnerabilities? Understanding the Weaknesses<br>
Taking Action<br>
Chapter 14: Google: Search, Online Advertising, and Beyond<br>
Introduction<br>
Understanding Search<br>
Understanding the Increase in Online Ad Spending<br>
Search Advertising<br>
Ad Networks—Distribution beyond Search<br>
More Ad Formats and Payment Schemes<br>
Customer Profiling and Behavioral Targeting<br>
Profiling and Privacy<br>
Search Engines, Ad Networks, and Fraud<br>
The Battle Unfolds
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2019-3-16 21:01:20
谢谢分享
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2019-3-17 07:59:32
肖荣华 发表于 2019-3-16 15:41
分享information system management入门好书
感谢分享!
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

栏目导航
热门文章
推荐文章

说点什么

分享

扫码加好友,拉您进群
各岗位、行业、专业交流群