Page 10 -
P. 10
Contents 9
Review Summary 268 • Key Terms 269 • Review Questions 269 • Discussion
Questions 270 • Hands-On MIS Projects 270 • Video Cases 272 • Collaboration
and Teamwork Project 272
◆ Case Study: Lego: Embracing Change by Combining BI with a Flexible
Information System 273
Chapter 7 Telecommunications, the Internet, and Wireless
Technology 276
◆ Opening Case: RFID and Wireless Technology Speed Up Production at
Continental Tires 277
7.1 Telecommunications and Networking in Today’s Business World 279
Networking and Communication Trends 279 • What Is a Computer
Network? 280 • Key Digital Networking Technologies 282
7.2 Communications Networks 285
Signals: Digital vs. Analog 285 • Types of Networks 286 • Transmission
Media and Transmission Speed 287
7.3 The Global Internet 288
What Is the Internet? 288 • Internet Addressing and Architecture 288
◆ Interactive Session: Organizations The Battle over Net Neutrality 292
Internet Services and Communication Tools 293
◆ Interactive Session: Management Monitoring Employees on Networks:
Unethical or Good Business? 296
The Web 298
7.4 The Wireless Revolution 307
Cellular Systems 307 • Wireless Computer Networks and Internet
Access 308 • RFID and Wireless Sensor Networks 310
Learning Track Modules: LAN Topologies, Broadband Network Services and
Technologies, Cellular System Generations, Wireless Applications for Customer
Relationship Management, Supply Chain Management, and Healthcare, Web
2.0 313
Review Summary 314 • Key Terms 315 • Review Questions 315 • Discussion
Questions 316 • Hands-On MIS Projects 316 • Video Cases 317 • Collaboration
and Teamwork Project 317
◆ Case Study: Apple, Google, and Microsoft Battle for Your Internet
Experience 318
Chapter 8 Securing Information Systems 322
◆ Opening Case: You’re on LinkedIn? Watch Out! 323
8.1 System Vulnerability and Abuse 325
Why Systems Are Vulnerable 325 • Malicious Software: Viruses, Worms,
Trojan Horses, and Spyware 328 • Hackers and Computer Crime 330 •
Internal Threats: Employees 335 • Software Vulnerability 335
◆ Interactive Session: Organizations Stuxnet and the Changing Face of
Cyberwarfare 336
8.2 Business Value of Security and Control 338
MIS13_StudentEdition_Global.indd 9 1/17/2013 2:39:28 PM