How Colleges Work: The Cybernetics of Academic Organization and Leadership
Author: Robert Birnbaum
One of the best theoretical and applied analyses of university academic organization and leadership in print. This book is significant because it is not only thoughtfully developed and based on careful reading of the extensive literature on leadership and governance, but it is also deliberately intAnded to enable the author to bridge the gap between theories of organization, on one hand, and practical application, on the other.
Journal of Higher Education
Book review: Principles of Metal Manufacturing Processes or Understanding Macroeconomic Theory
Management Information Systems, Sixth Edition
Author: Effy Oz
With a clear emphasis on the business and management elements of information technology, Management Information Systems, Sixth Edition continues to be the ideal resource for upper-level business students and MBA students. Updated to include the latest information technologies, practices, and trends, this book uses more real-world examples and case studies than ever before, providing skills and knowledge that are easily transferable to the business world. From overviews of the information age to online business and business intelligence, readers will gain a sound balance of the technical and business elements of information technology.
Table of Contents:
Part 1: The Information Age1. Business Information Systems: An Overview
2. Strategic Uses of Information Systems
3. Business Functions and Supply Chains
Part 2: Information Technology
4. Business Hardware
5. Business Software
6. Business Networks and Telecommunications
7. Databases and Data Warehouses
Part 3: Web-Enabled Commerce
8. The Web-Enabled Enterprise
9. Challenges of Global Information Systems
Part 4: Decision Support and Business Intelligence
10. Decision Support and Expert Systems
11. Business Intelligence and Knowledge Management
Part Five: Planning, Acquisition, and Controls
12. Systems Planning and Development
13. Choices in Systems Acquisition
14. Risks, Security, and Disaster Recovery
No comments:
Post a Comment