管理信息系统双语教学大纲内容摘要:

ept of conversion 简单应用 : Listening and understanding the related audio material 综合应用: Case discussion Module 6: Inter, extra, and intra 一. Inter as a business tool. This topic defines Inter technologies and identifies the advantages and disadvantages of the Inter as a business tool. 二. Use of the Inter to streamline operations. This topic describes how an anization can use the Inter to streamline its operations to improve the productivity and effectiveness of its people and procedures. 三. Technologies to support groups and group work. This topic defines groupware technology. You read about local and distance synchronous and asynchronous groupware. You also look at how to use groupware technology to support knowledge management. 四. Intra and extra. This topic defines intra and extra technologies and describes their advantages and disadvantages. 五. Strategic uses of Inter technologies. This topic outlines how the Inter can be used from a strategic stance. You learn some lessons and strategies for succeeding in ebusiness. 六. Case study and discussion 考核要求 简单应用 : Listening and understanding the related audio material 综合应用: Case discussion Module 7: Electronic merce and EDI 一. Ebusiness, emerce, and eservice. This topic defines ebusiness, emerce, electronic data interchange (EDI), electronic funds transfer (EFT), and eservice. You read about the different business models for ebusiness and the drivers of ebusiness. A multimedia terminology map explains the landscape of ebusiness. 二. Ebusiness opportunities and challenges. This topic outlines the lessons learned from the dot explosion in the late 1990s. You learn about the challenges and opportunities brought by the Inter that affect existing and new businesses. 三. Planning emerce operations. In this topic, you consider the strategic and tactical decisions that must be made when an anization prepares to do business online. 四. Funding issues. This topic covers the securing of funds for emerce ventures, explaining the different pricing and payment models for goods and services in emerce. 五. Security, privacy, taxation, and jurisdictional issues. This topic introduces security and privacy concepts in ebusiness operations and the methods to ensure security in transaction processing. You read about taxation and jurisdictional issues that are present in emerce. Fraud files, a QuickTime media presentation by Industry Canada, is included. (It will take approximately two minutes [on broadband] to load.) 六. Case study and discussion 考核要求 简单应用 : Listening and understanding the related audio material 综合应用: Case discussion Module 8: Managing telemunications and works 一. Overview of telemunications. This topic describes a basic munications model. You read about analog and digital signals transmitted across a work, channels that support telemunications, protocols that govern a munications work and the hardware and software devices that are needed to implement a telemunications work. 二. Strategic uses of telemunications. This topic briefly describes the strategic benefits of munications and the interoperability of working technologies. 三. Network basics. This topic explains the different types of works and the benefits and limitations of working. You also read about enterprise working, focusing on clientserver puting. 四. Trends in work management. This topic provides a summary of the trends in work management. You briefly survey historical trends, then look at user demands and the centralization of application processes. 五. Network security issues. In this topic, you learn about the work security measures that anizations must take. You also read about work authentication and access, types of channels in work design, and encryption schemes. 六. Planning and managing wireless works. This topic identifies the management considerations when planning for wireless working. You study the benefits and limitations of wireless working, the different wireless options, and planning for the implementation. 七. Case study and discussion 考核要求 识记: Basic munications model, types of works, work topology 综合应用: Case discussion Module 9: IT operational and security issues 一. Outsourcing and outsourcing models. This topic defines outsourcing and the different outsourcing models, such as ASP. You study the benefits and limitations of outsourcing information systems and the factors to consider when negotiating outsourcing contracts. Living it, a video interview with a CGA practitioner who has IS expertise, is included. 二. IS security: Threats and vulnerability. This topic describes the physical and electronic threats, and intentional and unintentional threats, to the security of information systems. You also read about a manager39。 s role in systems security. 三. Dealing with security threats. This topic provides the measures that you can take to minimalize security risks. You will also read about disaster recovery and security monitoring. 四. Role of auditing in IS Security. This topic briefly describes security。
阅读剩余 0%
本站所有文章资讯、展示的图片素材等内容均为注册用户上传(部分报媒/平媒内容转载自网络合作媒体),仅供学习参考。 用户通过本站上传、发布的任何内容的知识产权归属用户或原始著作权人所有。如有侵犯您的版权,请联系我们反馈本站将在三个工作日内改正。