|
关于我们
书单推荐 更多 新书推荐 更多 |
管理信息系统:数智赋能与SAP模式 读者对象:教师、学生 ![]()
本书涵盖了管理信息系统的各个方面,包括信息系统概述,组织、内外部机制与信息系统,数字商业
模式、转型工具与战略,数字空间中的社会伦理,IT 基础设施,数智化的信息管理,通信互联网技术,信息
系统安全,企业应用,电子商务及数字化市场分析,软件机器人、流程自动化与RPA,商务智能与决策,
以及信息系统建设等内容。
通过系统的学习,学生能够深入了解信息系统在企业中的重要作用、技术架构及实际应用,为今后的
学习和工作打下坚实的基础。
唐秋鸿
---------------------------- 唐秋鸿,博士,高级实验师,广西大学MBA导师,硕士生导师,广西科技项目评估中心评估专家,SAP学术与教育工作委员会委员。曾在IT企业担任过SAP管理顾问、ORACLE数据库专家、研发总监。主要研究方向为管理信息系统、大数据与电商创业、跨国复杂信息系统等。
第1 章 信息系统概述 ························· 1
1.1 信息系统在企业中的重要性 ·········· 3
1.1.1 信息技术革新与商业
模式变革 ························· 3
1.1.2 数智化给全球商业带来的
挑战和机遇 ······················ 4
1.2 信息系统的概念及研究视角 ·········· 5
1.2.1 技术视角 ························· 6
1.2.2 可供性视角 ······················ 8
1.2.3 管理视角 ························· 8
1.2.4 经济视角 ························ 10
1.2.5 社会心理视角 ·················· 10
1.3 信息系统学习方法 ····················· 12
1.3.1 系统科学方法 ·················· 12
1.3.2 计算机科学方法 ··············· 13
1.3.3 管理科学方法 ·················· 13
1.3.4 行为科学方法 ·················· 13
1.3.5 本书的方法 ····················· 13
思考与练习 ····································· 14
第2 章 组织、内外部机制与信息
系统 ······································ 16
2.1 组织 ······································· 19
2.1.1 组织的概念 ····················· 19
2.1.2 组织属性 ························ 20
2.2 内外部机制 ······························ 23
2.2.1 内外部机制的概念 ············ 23
2.2.2 协同运行机制 ·················· 24
2.2.3 动力机制和约束机制 ········· 28
2.2.4 冲突解决机制 ·················· 29
2.2.5 社会趋同机制 ·················· 31
2.2.6 合法性机制 ····················· 32
2.3 信息系统对组织的影响 ·············· 33
2.3.1 对组织分工、层级和
结构的影响 ···················· 33
2.3.2 对组织政治及文化的
影响 ····························· 35
2.3.3 对组织环境的影响 ··········· 37
2.4 组织相关的各类信息系统 ··········· 38
2.5 信息系统与组织绩效 ················· 41
2.5.1 经济与管理绩效 ·············· 41
2.5.2 文化绩效 ······················· 41
2.5.3 社会绩效 ······················· 42
2.5.4 符号资本绩效 ················· 42
思考与练习 ···································· 43
第3 章 数字商业模式、转型工具
与战略 ·································· 44
3.1 数字商业模式的构成及特性 ········ 46
3.1.1 数字商业模式构成 ··········· 46
3.1.2 数字化企业 ···················· 49
3.1.3 生态系统 ······················· 50
3.1.4 信息系统的战略目标 ········ 52
3.2 信息化战略制定 ······················· 54
3.2.1 PEST 分析 ······················ 54
3.2.2 波特五力模型 ················· 55
3.2.3 SWOT 分析 ···················· 56
3.2.4 基于信息系统的
竞争战略 ······················· 57
3.3 数字化转型工具 ······················· 58
3.3.1 数字化转型战略工具 ········ 58
3.3.2 组织架构与团队建设
工具 ····························· 58
3.3.3 技术应用工具 ················· 593.3.4 风险管理工具 ·················· 59
3.3.5 绩效评估工具 ·················· 60
3.4 信息系统应如何应对挑战 ············ 60
3.4.1 应不断更新和改进信息
系统,以保持竞争优势 ······ 60
3.4.2 信息技术目标应与企业
战略目标匹配 ·················· 60
3.4.3 进行战略变革管理 ············ 61
思考与练习 ····································· 61
第4 章 数字空间中的社会伦理 ·········· 62
4.1 信息系统引发的商业伦理问题 ······ 64
4.1.1 商业伦理的概念 ··············· 64
4.1.2 信息时代的伦理变革 ········· 66
4.1.3 信息系统引发的商业
伦理问题 ························ 67
4.2 数字空间及其中的社会伦理
风险 ······································· 70
4.2.1 数字空间 ························ 71
4.2.2 数字空间的社会伦理
风险 ······························ 72
4.3 数字空间中的隐私监控与
商业伦理 ································· 73
4.3.1 隐私监控 ························ 73
4.3.2 数字空间中的用户
数据隐私和安全 ··············· 74
4.3.3 如何解决隐私监控与
商业伦理之间的矛盾 ········· 75
4.3.4 信息系统隐私保护 ············ 76
4.3.5 信息系统隐私相关的
法律依据 ························ 77
思考与练习 ····································· 79
第5 章 IT 基础设施 ·························· 80
5.1 IT 基础设施概述 ······················· 82
5.2 IT 基础设施的组成 ···················· 82
5.3 IT 基础设施的发展趋势 ·············· 89
思考与练习 ····································· 91
第6 章 数智化的信息管理 ················ 92
6.1 数据库 ··································· 94
6.1.1 概述 ····························· 94
6.1.2 组成与关键技术 ············· 105
6.1.3 应用 ···························· 126
6.2 云计算 ·································· 128
6.2.1 概述 ···························· 128
6.2.2 组成与关键技术 ············· 133
6.2.3 应用 ···························· 140
6.3 大数据 ·································· 146
6.3.1 概述 ···························· 146
6.3.2 组成与关键技术 ············· 151
6.3.3 应用 ···························· 155
6.4 人工智能 ······························· 157
6.4.1 概述 ···························· 158
6.4.2 组成与关键技术 ············· 163
6.4.3 应用 ···························· 180
思考与练习 ··································· 189
第7 章 通信互联网技术 ··················· 190
7.1 通信网络概述 ························· 192
7.1.1 通信网络的概念和
作用 ···························· 192
7.1.2 通信网络的分类和
结构 ···························· 192
7.1.3 通信网络的组成 ············· 194
7.2 互联网技术 ···························· 195
7.2.1 网络爬虫 ······················ 195
7.2.2 RFID 技术 ····················· 197
7.2.3 区块链技术 ··················· 199
7.2.4 5G 技术 ························ 200
7.3 互联网技术的管理价值 ············· 202
7.3.1 网络爬虫的应用价值 ······· 202
7.3.2 RFID 技术的应用价值 ······ 203
7.3.3 区块链技术的管理应用 ···· 204
7.3.4 5G 技术的商业价值 ········· 206
7.4 SAP HANA 工作台实验 ············· 207
7.4.1 SAP HANA 工作台 ·········· 2077.4.2 连接到SAP HANA
系统 ···························· 208
思考与练习 ··································· 213
第8 章 信息系统安全 ······················ 214
8.1 信息安全概述 ························· 216
8.1.1 信息安全的基本概念 ······· 216
8.1.2 信息安全问题产生的
根源与现状 ··················· 217
8.1.3 信息安全的主要威胁 ······· 218
8.1.4 信息安全的法治视角
与思考 ························· 219
8.2 信息安全技术 ························· 221
8.2.1 信息保密技术 ················ 221
8.2.2 安全防护技术 ················ 224
8.2.3 安全基础支撑技术 ·········· 226
8.3 信息安全管理 ························· 226
8.3.1 信息安全管理体系 ·········· 226
8.3.2 信息安全风险管理 ·········· 226
8.3.3 信息安全管理体系建设 ···· 228
8.3.4 信息安全管理体系度量 ···· 228
8.4 SAP HANA 信息安全管理
实验 ····································· 228
8.4.1 信息安全保密技术 ·········· 228
8.4.2 SAP HANA 用户角色
管理 ···························· 230
8.4.3 授权 ···························· 234
思考与练习 ··································· 239
第9 章 企业应用 ····························· 240
9.1 企业应用概述 ························· 242
9.1.1 企业应用的定义和
分类 ···························· 242
9.1.2 企业应用的结构和
组成部分 ······················ 242
9.1.3 企业应用的优势 ············· 244
9.2 企业资源计划(ERP)系统 ······· 245
9.2.1 ERP 系统的定义和功能 ···· 245
9.2.2 ERP 系统的架构和模块 ···· 247
9.2.3 ERP 系统的发展历程
和趋势 ························· 248
9.3 供应链管理(SCM)系统 ·········· 249
9.3.1 SCM 系统的定义和
作用 ···························· 249
9.3.2 SCM 系统的架构和
模块 ···························· 250
9.3.3 SCM 系统的发展历程
和趋势 ························· 251
9.4 客户关系管理(CRM)系统 ······· 252
9.4.1 CRM 系统的定义和
作用 ···························· 252
9.4.2 CRM 系统的架构和
模块 ···························· 254
9.4.3 CRM 系统的发展历程
和趋势 ························· 255
9.5 人力资源管理(HRM)系统 ······· 256
9.5.1 HRM 系统的定义
和作用 ························· 256
9.5.2 HRM 系统的架构
和模块 ························· 257
9.5.3 HRM 系统的发展历程
和趋势 ························· 258
思考与练习 ··································· 259
第10 章 电子商务及数字化
市场分析 ··························· 260
10.1 电子商务概述 ························ 262
10.1.1 电子商务的概念 ············ 262
10.1.2 电子商务的特征 ············ 262
10.1.3 电子商务的分类 ············ 265
10.2 电子商务实现盈利的关键 ········· 267
10.2.1 客户细分 ····················· 267
10.2.2 价值主张 ····················· 268
10.2.3 渠道通路 ····················· 269
10.2.4 客户关系 ····················· 270
10.2.5 收入来源 ····················· 270
10.2.6 核心资源 ····················· 272
10.2.7 关键业务 ····················· 27310.2.8 重要伙伴 ···················· 273
10.2.9 成本结构 ···················· 274
10.3 电子商务相关营销理论 ··········· 275
10.3.1 4P 理论 ······················· 275
10.3.2 4C 理论 ······················ 276
10.3.3 4I 理论 ······················· 277
10.3.4 4D 理论 ······················ 279
10.4 SAP 的电子商务模式 ·············· 281
10.4.1 SAP Commerce Cloud ····· 281
10.4.2 SAP Recommerce ·········· 282
10.4.3 SAP Ariba ··················· 282
10.4.4 SAP Fieldglass ·············· 283
10.4.5 SAP Business AI ············ 284
10.5 SAP 电子商务技术应用案例 ····· 285
思考与练习 ··································· 287
第11 章 软件机器人、流程
自动化与RPA ··················· 288
11.1 概述 ··································· 290
11.1.1 软件机器人概述 ··········· 290
11.1.2 流程自动化概述 ··········· 293
11.1.3 RPA 概述 ···················· 297
11.2 相关技术 ····························· 300
11.2.1 软件机器人相关技术 ····· 300
11.2.2 流程自动化相关技术 ····· 303
11.2.3 RPA 相关技术 ·············· 304
11.3 管理应用 ····························· 306
11.3.1 软件机器人的应用 ········ 306
11.3.2 流程自动化的应用 ········ 307
11.3.3 RPA 的应用 ················· 308
思考与练习 ··································· 313
第12 章 商务智能与决策 ················· 315
12.1 商务智能概述 ······················· 317
12.1.1 商务智能的起源 ··········· 317
12.1.2 商务智能的核心概念 ····· 317
12.1.3 商务智能系统的架构 ····· 318
12.2 商务智能与商业分析 ··············· 319
12.2.1 商业分析概述 ··············· 319
12.2.2 商务智能在商业
分析中的作用 ··············· 320
12.2.3 商务智能与商业分析的
关系 ··························· 321
12.3 商务智能分析方法 ·················· 322
12.3.1 数据挖掘方法 ··············· 322
12.3.2 机器学习方法 ··············· 323
12.3.3 数据仓库与数据挖掘
方法 ··························· 323
12.3.4 决策支持系统方法 ········· 324
12.4 商务智能可视化 ····················· 325
12.4.1 商务智能可视化的
概念 ··························· 325
12.4.2 商务智能可视化工具
和技术 ························ 325
12.4.3 商务智能可视化在
决策中的应用 ··············· 326
思考与练习 ··································· 327
第13 章 信息系统建设····················· 328
13.1 信息系统业务流程优化 ············ 330
13.1.1 信息系统业务流程
优化概述 ····················· 330
13.1.2 信息系统业务流程
优化的理论基础 ············ 331
13.1.3 信息系统业务流程
优化的技术趋势 ············ 332
13.2 业务流程优化的相关方法 ········· 333
13.2.1 系统化改造法 ··············· 333
13.2.2 六西格玛管理 ··············· 334
13.2.3 精益管理 ····················· 335
13.3 信息系统业务流程实施案例 ······ 336
思考与练习 ··································· 339
参考文献 ··········································· 340
附录 ·················································· 341
你还可能感兴趣
|

书单推荐 




