Page 11 -
P. 11

10    Contents


                                     Legal and Regulatory Requirements for Electronic Records
                                     Management  338 • Electronic Evidence and Computer Forensics  339
                              8.3    Establishing a Framework for Security and Control  340
                                     Information Systems Controls  340 • Risk Assessment  341 • Security
                                     Policy  342 • Disaster Recovery Planning and Business Continuity
                                     Planning  343 • The Role of Auditing  344
                              8.4    Technologies and Tools for Protecting Information Resources  345
                                     Identity Management and Authentication  345 • Firewalls, Intrusion
                                     Detection Systems, and Antivirus Software  347 • Securing Wireless
                                     Networks  349 • Encryption and Public Key Infrastructure  349 • Ensuring
                                     System Availability  350 • Security Issues for Cloud Computing and the
                                     Mobile Digital Platform  352 • Ensuring Software Quality  353
                              ◆  Interactive Session: Technology  MWEB Business: Hacked  354
                              Learning Track Modules: The Booming Job Market in IT Security, The Sarbanes-
                              Oxley Act, Computer Forensics, General and Application Controls for Information
                              Systems, Management Challenges of Security and Control, Software Vulnerability
                              and Reliability  356
                              Review Summary  357 • Key Terms  358 • Review Questions  358 • Discussion
                              Questions  359 • Hands-On MIS Projects  360 • Video Cases  361 • Collaboration
                              and Teamwork Project  361
                              ◆  Case Study:  Information Security Threats and Policies in Europe  362





        Part Three  Key System Applications for the Digital Age  365


        Chapter 9             Achieving Operational Excellence and Customer Intimacy:
                              Enterprise Applications  366

                              ◆  Opening Case:  Technology Helps Nvidia Anticipate the Future  367
                              9.1    Enterprise Systems  369
                                     What Are Enterprise Systems?  369 • Enterprise Software  370 • Business
                                     Value of Enterprise Systems  371
                              9.2    Supply Chain Management Systems  372
                                     The Supply Chain  372 • Information Systems and Supply Chain
                                     Management  374 • Supply Chain Management Software  376 • Global
                                     Supply Chains and the Internet  376
                              ◆ Interactive Session: Organizations  DP World Takes Port Management to the
                                Next Level with RFID  377
                                     Business Value of Supply Chain Management Systems  379
                              9.3    Customer Relationship Management Systems  381
                                     What Is Customer Relationship Management?  381 • Customer Relationship
                                     Management Software  382 • Operational and Analytical CRM  386 •
                                     Business Value of Customer Relationship Management Systems  386
                              9.4    Enterprise Applications: New Opportunities and Challenges  387
                                     Enterprise Application Challenges  387 • Next-Generation Enterprise
                                     Applications  388










   MIS13_StudentEdition_Global.indd   10                                                                      1/17/2013   2:39:28 PM
   6   7   8   9   10   11   12   13   14   15   16