Business Information Systems

by Elizabeth Hardcastle
Ratings:
( 36 )
54 pages
Language:
 English
This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.
This is a free eBook for students
Sign up for free access
Download free textbooks as PDF or read online. Less than 15% adverts
 
Free 30-day trial
Business subscription free for the first 30 days, then $5.99/mo
Latest eBooks
Description
Content

This textbook provides an overview of business information systems and provides definitions for the different systems used in companies.

  1. Defining Information Systems
    1. Defining Data and Information
    2. Defining Systems
    3. Defining Information Systems
    4. Business Information Systems
    5. Types of business information system
  2. Hardware
    1. Input devices
    2. Central Processing Unit (CPU)
    3. Internal and External Memory
    4. Output devices
    5. Major categories of computers
  3. Software
    1. Systems software
    2. Application software
  4. Database Systems
    1. Organising data in a database
    2. Database Software
    3. Retrieving Data from a Database
  5. Networks
    1. Network components
  6. The Internet and World-Wide Web
    1. Web-Enabled Business
    2. Intranets and extranets
    3. The World Wide Web
    4. Web browsers and servers
    5. E-business
    6. E-commerce
  7. Acquiring Information Systems
    1. Bespoke development
    2. Off-the-shelf software
    3. End-user-developed software
    4. Factors affecting software acquisition
  8. Developing Information Systems
    1. The traditional waterfall model
    2. The systems development lifecycle
  9. Systems Development Methodologies
    1. SSADM
    2. Rapid applications development (RAD)
    3. The Capability Maturity Model
  10. Information Systems Security
    1. Security Threats to Information Systems
    2. Reducing the Threat to Information Systems
    3. Types of controls
    4. Techniques for controlling information systems
    5. Security Threats to Internet services