
Information Systems
by Richard T. Watson
Publisher: Global Text Project 2007
Number of pages: 308
Description:
This textbook will teach students how to exploit IS
in a technology-rich environment. It will emphasize why, no matter what their major, information and
communications technologies (ICT) are, and increasingly will be, a critical element in their personal success and the success of their organizations. In other words, they need to be introduced to concepts, principles, methods, and
procedures that will be valuable to them for years to come in thinking about existing organization systems,
proposing new systems, and working with IS professionals in implementing new systems.
Download or read it online for free here:
Download link
(8.3MB, PDF)
Similar books
Strategies for Sustaining Digital Librariesby K. Skinner, M. Halbert - Emory University Digital Library
This monograph is a report of early efforts to establish digital libraries as experimental projects and ongoing services consistent with the practices of print-based libraries. Contributions of leaders in major digital libraries are included.
(17568 views)
Introduction to Controlled Vocabularies: Terminologies for Art, Architecture, and Other Cultural Worksby Patricia Harpring - Getty Research Institute
This book is a guide to building controlled vocabulary tools, cataloging and indexing cultural materials with terms and names from controlled vocabularies, and using vocabularies in search engines and databases to enhance discovery and retrieval.
(8614 views)
Mastering the Information Age: Solving Problems With Visual Analyticsby Daniel Keim, et al. - Eurographics Association
The aim is to create a research roadmap that outlines the current state of visual analytics across many disciplines, and to describe the next steps to foster a strong visual analytics community, thus enabling the development of advanced applications.
(9312 views)
Validating RDF Databy Jose E. Labra Gayo, et al. - Morgan & Claypool
RDF and Linked Data have broad applicability across many fields. Requirements for detecting bad data differ across tasks, but nearly all involve some form of data validation. This book introduces data validation and describes its practical use.
(6453 views)