Friday, December 26, 2008

Competition Policy or Management and Information Systems

Competition Policy: Theory and Practice

Author: Massimo Motta

Offering a complete analysis of antitrust (or competition policy) issues, this study is enhanced by frequent references to antitrust cases and a few fully developed case studies. Although it can be used as an economics textbook in graduate or advanced undergraduate courses, the book is equally accessible to lawyers, practitioners, and readers interested in antitrust issues, but unfamiliar with modern economics. Technical explanations of material are relegated to separate "technical" sections that can be skipped without losing continuity.



Book review:

Management and Information Systems: For the Information Age

Author: Stephen Haag

This text offers chapters that cover what instructors want students to know about MIS. The Extended Learning Modules (XLMs) show students what they can do with MIS. The instructor controls the mix by picking the chapters and XLMs to include in the course. A contemporary writing style and a wealth of examples engage students like no other MIS text.



Table of Contents:

Chapter One:

The Information Age in Which you Live: Changing the Face of Business

Extended Learning Module A:

Computer Hardware and Software

Chapter Two:

Major Business Initiatives: Gaining Competitive Advantage with IT

Extended Learning Module B:

The World Wide Web and the Internet

Chapter Three:

Database and Data Warehouses: Building Business Intelligence

Extended Learning Module C:

Designing Databases and Entity-Relationship Diagramming

Chapter Four:

Decision Support and Artificial Intelligence: Brainpower for Your Business

Extended Learning Module D:

Decision Analysis with Spreadsheet Software

Chapter Five:

Electronic Commerce: Strategies for the New Economy

Extended Learning Module E:

Network Basics

Chapter Six:

Systems Development: Phases, Tools, and Techniques

Extended Learning Module F:

Building a Web Page with HTML

Chapter Seven:

IT Infrastructures: Business-Driven Technology

Extended Learning Module G:

Object-Oriented Technologies

Chapter Eight:

Protecting People and Information: Threats and Safeguards

Extended Learning Module H:

Computer Crime and Forensics

Chapter Nine:

Emerging Trends and Technologies: Business, People, and Technology Tomorrow

Extended Learning Module I:

Building anE-Portfolio

Extended Learning Module J:

Implementing a Database with Microsoft Access

Extended Learning Module K:

Careers in Business

Glossary

Notes

Photo Credits

Index

No comments: