Harold W. Webb, Ph.D.
Linda A. Webb, MBA

The Impact of the Information Age
Information Storage: Data, Databases, and Business Intelligence
Information Access: Networked Computing
Business Processes: The Power Users of Information Systems
Securing Data
Appendix: Basic Computer Concepts

Abstract: The purpose of this course is to provide a manager with an overall view of information systems.

Chapter 1 discusses information changes in the workplace and organizational changes such as virtual teams. Then a review of business systems such as decision support systems and executive information systems is provided. Finally, CRM systems and supply chain management systems are discussed.

In Chapter 2 data, databases and data storage are discussed. Data design basics such as insertion anomaly, update anomaly and deletion aanomaly are reviewed. Database management systems and business intelligence tools such as digital dashboards, data mining and business performance management are discussed.

Chapter 3 is all about network computing. Local area networks, client/server networks and wide area networks are reviewed, with particular emphasis on the internet. Then communications media for networking such as wired and wireless communication is discussed.

Chapter 4 reviews business processes–the primary users of business systems. Enterprise Resource Planning (ERP) systems are discussed in detail, coupled with Customer Relationship Management (CRM) systems. The chapter ends with a review of collaboration systems–structured and unstructured.

Chapter 5 focuses on data security. The control of data from a privacy, accuracy and property rights perspective is discussed. This is followed by a review of data security threats such as human intervention plus natural and man-made disasters. Elements of a data security program such as hardware, software, and data safeguards are reviewed.