This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Prototyping, Page Ref: 428 • Why organizations build their own IS systems, Page Ref: 431 • Benchmarking program, Page Ref: 435 • Ongoing management, Page Ref: 440 • End-users, p. 440 • Database management systems, Page Ref: 443 • Computer literacy, Page Ref: 455 • Digital divide, Page Ref: 457 • Computer ethics, page Ref: 458 • Identity theft, Page Ref: 459 • Data integrity, Page Ref: 461 • Spam, Page Ref: 463 Recommendation: Pay attention for Information and enterprise systems (ie: supply chain management, knowledge management system, enterprise resource planning); network (LAN, WAN, router, etc); security, ethics, etc. Furthermore, review study guides for test1, test2, test3...
View Full Document
This note was uploaded on 09/21/2011 for the course ISOM 3263 taught by Professor Staff during the Spring '08 term at University of Central Oklahoma.
- Spring '08