ebook download (eBook PDF) Experiencing MIS 9th Edition all chapter

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 43

(eBook PDF) Experiencing MIS 9th

Edition
Go to download the full and correct content document:
https://ebooksecure.com/product/ebook-pdf-experiencing-mis-9th-edition-3/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Experiencing MIS 7th Edition (eBook PDF)

http://ebooksecure.com/product/experiencing-mis-7th-edition-
ebook-pdf/

(eBook PDF) Experiencing MIS, 7th Edition Global


Edition

http://ebooksecure.com/product/ebook-pdf-experiencing-mis-7th-
edition-global-edition/

Experiencing MIS 7th Edition GLOBAL edition (eBook PDF)

http://ebooksecure.com/product/experiencing-mis-7th-edition-
global-edition-ebook-pdf/

(Original PDF) Experiencing MIS Australia 4e By David


Kroenke

http://ebooksecure.com/product/original-pdf-experiencing-mis-
australia-4e-by-david-kroenke/
(eBook PDF) Experiencing MIS 7th Edition by David M.
Kroenke

http://ebooksecure.com/product/ebook-pdf-experiencing-mis-7th-
edition-by-david-m-kroenke/

(Original PDF) Experiencing MIS 8th Edition by David M.


Kroenke

http://ebooksecure.com/product/original-pdf-experiencing-mis-8th-
edition-by-david-m-kroenke/

(Original PDF) Experiencing MIS, 5th Canadian Edition


by David M. Kroenke

http://ebooksecure.com/product/original-pdf-experiencing-mis-5th-
canadian-edition-by-david-m-kroenke/

(eBook PDF) Using MIS 9th Edition by David M. Kroenke

http://ebooksecure.com/product/ebook-pdf-using-mis-9th-edition-
by-david-m-kroenke/

MIS 9: Management Information Systems 9th Edition


Hossein Bidgoli - eBook PDF

https://ebooksecure.com/download/mis-9-management-information-
systems-ebook-pdf/
To C. J., Carter, and Charlotte
—David Kroenke

To Courtney, Noah, Fiona, Layla, and Henry


—Randy Boyle
Contents Overview
Experiencing MIS offers basic topic coverage of MIS in its 12 chapters and more in-
depth, expanded coverage in its chapter extensions. This modular organization allows
you to pick and choose among those topics. Here chapter extensions are shown below
the chapters to which they are related. You will preserve continuity if you use each of
the 12 chapters in sequence. In most cases, a chapter extension can be covered any time
in the course after its related chapter. You need not use any of the chapter extensions
if time is short.

viii
Brief Contents
Part 1 Why MIS? 1 CE 10 Collaborative Information
Systems for Student Projects 499
1 The Importance of MIS 3
8 Processes, Organizations,
CE 1 Introduction to Microsoft and Information Systems 197
Excel 2019 347
CE 11 Enterprise Resource
2 Organizational Strategy, Planning (ERP) Systems 519
Information Systems, and
Competitive Advantage 29 CE 12 Supply Chain Management 533

3 Business Intelligence Systems 55 9 Social Media Information


Systems 227
CE 2 Artificial Intelligence
and Automation 369 CE 13 Enterprise Social Networks
and Knowledge Management 541
CE 3 Database Marketing 383

CE 4 Reporting Systems and OLAP 391


Part 4 Information Systems
Management 259
Part 2 Information Technology 81 10 Information Systems
Security 261
4 Hardware and Software 83
CE 14 Data Breaches 555
CE 5 Mobile Systems 403
11 Information Systems
5 Database Processing 117 Management 295
CE 6 Database Design 419 CE 15 International MIS 567

CE 7 Using Microsoft Access 2019 433 12 Information Systems


Development 319
CE 8 Using Excel and Access
Together 453 CE 16 Systems Development Project
Management 585
6 The Cloud 147
CE 17 Agile Development 597
CE 9 Network and Cloud Technology 481
CE 18 Business Process Management 607
Part 3 Using IS for Competitive
Advantage 175
7 Collaboration Information Systems for
Decision Making, Problem
Solving, and Project Management 177
ix
This page is intentionally left blank
Contents
Preface
About the Authors
xx
xxix
2 Organizational Strategy, Information
Systems, and Competitive Advantage 29
Part 1 Why MIS? 1 1. How Does Organizational Strategy Determine
Information Systems Structure? 31
1 The Importance of MIS 3 2. What Five Forces Determine Industry Structure? 31
3. How Does Analysis of Industry Structure
1. Why Is Introduction to MIS the Most Important
Determine Competitive Strategy? 33
Class in the Business School? 5
4. How Does Competitive Strategy Determine
The Digital Revolution 5
Value Chain Structure? 33
Evolving Capabilities 6
Primary Activities in the Value Chain 34
Moore’s Law 6
Support Activities in the Value Chain 35
Metcalfe’s Law 7
Value Chain Linkages 35
Other Forces Pushing Digital Change 7
5. How Do Business Processes Generate Value? 36
This Is the Most Important Class in the School
How Best Bikes Works 36
of Business 8
The Existing Best Bikes Process 36
2. How Will MIS Affect Me? 9
How Best Bikes Processes Must Change to
How Can I Attain Job Security? 9
Support 3D Printing 38
How Can Intro to MIS Help You Learn Nonroutine
6. How Does Competitive Strategy Determine
Skills? 9
Business Processes and the Structure of Information
3. Why Are MIS-Related Jobs in High Demand? 11 Systems? 39
What Is the Bottom Line? 13 7. How Do Information Systems Provide Competitive
4. What Is MIS? 13 Advantages? 40
■■ So What?: A Is for Alphabet 14 Competitive Advantage Via Products 41
Components of an Information System 15 ■■ So What?: Amazon Eats Whole Foods 42
Management and Use of Information Systems 15 Competitive Advantage Via Business Processes 44
Achieving Strategies 16 How Can an Organization Use IS to Create Competitive
5. What Is Information? 17 Advantages? 44
Definitions Vary 17 How Does This System Create a Competitive Advantage? 45
Where Is Information? 17 How does the knowledge in this chapter help you? 45

6. What Data Characteristics Are Necessary ■■ Ethics Guide: The Lure of Love Bots 46
for Quality Information? 18 ■■ Career Guide 47
Accurate 18 Active Review 48 • Key Terms and Concepts 49 • End of
Timely 19 Chapter Questions 49 • Collaboration Exercise 2 50 • Case
Study 2 51 • Endnotes 53
Relevant 19
Just Barely Sufficient 19
3 Business Intelligence Systems 55
Worth Its Cost 19
How does the knowledge in this chapter help you? 20 1. How Do Organizations Use Business
Intelligence (BI) Systems? 57
■■ Ethics Guide: Ethics and Professional Responsibility 20
How Do Organizations Use BI? 57
■■ Career Guide: Five-Component Careers 22
What Are Typical Uses for Business Intelligence? 58
Active Review 23 • Key Terms and Concepts 24 • End of Chapter
Questions 24 • Collaboration Exercise 1 25 • Case Study 1 26 2. What Are the Three Primary Activities in the BI Process? 60
• Endnotes 27 Using Business Intelligence to Find Candidate Parts 60

xi
xii Contents

3. How Do Organizations Use Data Warehouses Active Review 110 • Key Terms and Concepts 110 • End of
and Data Marts to Acquire Data? 63 Chapter Questions 111 • Collaboration Exercise 4 111 • Case
Study 4 112 • Endnotes 114
Problems with Operational Data 65
Data Warehouses Versus Data Marts 66 5 Database Processing 117
4. What Are Three Techniques for Processing BI Data? 67
1. Why Do You Need to Know About Databases? 119
Reporting Analysis 67
Reasons for Learning Database Technology 119
Data Mining Analysis 68
What Is the Purpose of a Database? 119
Big Data 69
2. What Is a Database? 121
5. What Are the Alternatives for Publishing BI? 71
Relationships Among Rows 122
Characteristics of BI Publishing Alternatives 71
Metadata 123
■■ So What?: Geofencing for Business? 72
3. What Is a Database Management System (DBMS)? 124
What Are the Two Functions of a BI Server? 73
■■ So What?: Slick Analytics 125
How does the knowledge in this chapter help you? 74
4. How Do Database Applications Make Databases
■■ Ethics Guide: MIS-diagnosis 74
More Useful? 128
■■ Career Guide 76 Traditional Forms, Queries, Reports, and
Active Review 76 • Key Terms and Concepts 77 • End of Applications 128
Chapter Questions 77 • Collaboration Exercise 3 77 • Case
Browser Forms, Reports, Queries, and Applications 130
Study 3 78 • Endnotes 80
Multiuser Processing 131

Part 2 Information Technology 81 5. How Can eHermes Benefit from a Database System? 132
6. What Are Nontraditional DBMS Products? 133
4 Hardware and Software 83 Need to Store New Data Types Differently 133
Need for Faster Processing Using Many Servers 134
1. What Do Business Professionals Need to Know About
Computer Hardware? 85 Nontraditional DBMS Types 134
Hardware Components 85 Will These New Products Replace the Relational Model? 134
Types of Hardware 85 What Do Nonrelational DBMS Mean for you? 135
Computer Data 86 How does the knowledge in this chapter help you? 135

2. How Can New Hardware Affect Competitive ■■ Ethics Guide: Mining at Work 135
Strategies? 89 ■■ Career Guide 137
The Internet of Things 89 Active Review 138 • Key Terms and Concepts 138 • End of
Digital Reality Devices 90 Chapter Questions 139 • Collaboration Exercise 5 140 • Case
Study 5 140 • Endnotes 145
Self-Driving Cars 93

6
■■ So What?: New from CES 2019 95
The Cloud 147
3D Printing 96
Cryptocurrencies 96 1. Why Is the Cloud the Future for Most Organizations? 148
3. What Do Business Professionals Need to Know About Cloud Computing 149
Software? 97 Why Do Organizations Prefer the Cloud? 150
What Are the Major Operating Systems? 99 When Does the Cloud Not Make Sense? 152
Virtualization 101 2. How Do Organizations Use the Cloud? 153
Owning Versus Licensing 103 Resource Elasticity 153
What Types of Applications Exist, and How Do Pooling Resources 154
Organizations Obtain Them? 103 Over the Internet 154
What Is Firmware? 104 Cloud Services from Cloud Vendors 155
4. Is Open Source Software a Viable Alternative? 105 Content Delivery Networks 157
Why Do Programmers Volunteer Their Services? 105 Using Web Services Internally 159
How Does Open Source Work? 106 3. How Can eHermes Use the Cloud? 160
So, Is Open Source Viable? 107 SaaS Services at eHermes 160
How does the knowledge in this chapter PaaS Services at eHermes 160
help you? 107
IaaS Services at eHermes 161
■■ Ethics Guide: Free Apps for Data 107 4. How Can Organizations Use Cloud
■■ Career Guide 109 Services Securely? 161
Contents xiii

Virtual Private Network (VPN) 161 How Do Processes Vary by Organizational


Using a Private Cloud 162 Scope? 200
Using a Virtual Private Cloud 164 2. How Can Information Systems Improve
■■ So What?: IRS Systems Overtaxed 164 Process Quality? 202
How Can Processes Be Improved? 203
5. What Does the Cloud Mean for Your Future? 165
How Can Information Systems Improve
How does the knowledge in this chapter help you? 167
Process Quality? 203
■■ Ethics Guide: Reverse Engineering Privacy 168
3. How Do Enterprise Systems Solve the Problems
■■ Career Guide 169 of Departmental Silos? 204
Active Review 170 • Key Terms and Concepts 171 • End of
What Are the Problems of Information Silos? 204
Chapter Questions 171 • Collaboration Exercise 6 171 • Case
Study 6 172 • Endnotes 173 How Do Organizations Solve the Problems
of Information Silos? 206
An Enterprise System for Patient Discharge 207
Part 3 Using IS for Competitive 4. How Do CRM, ERP, and EAI Support Enterprise
Advantage 175 Processes? 207

7 Collaboration Information Systems The Need for Business Process Engineering 208
Emergence of Enterprise Application Solutions 208
for Decision Making, Problem
Customer Relationship Management (CRM) 209
Solving, and Project Management 177
■■ So What?: Digital Dining 210
1. What Are the Two Key Characteristics of Enterprise Resource Planning (ERP) 211
Collaboration? 179
Enterprise Application Integration (EAI) 212
Importance of Constructive Criticism 179
5. What Are the Challenges of Implementing
Guidelines for Giving and Receiving Constructive and Upgrading Enterprise Information Systems? 213
Criticism 181
6. How Do Inter-Enterprise IS Solve the Problems
Warning! 181 of Enterprise Silos? 215
2. What Are Three Criteria for Successful Collaboration? 182 How does the knowledge in this chapter help you? 217
Successful Outcome 182 ■■ Ethics Guide: Paid Deletion 217
Growth in Team Capability 182
■■ Career Guide 218
Meaningful and Satisfying Experience 183
Active Review 219 • Key Terms and Concepts 220 • End
3. What Are the Four Primary Purposes of Collaboration? 183 of Chapter Questions 220 • Collaboration Exercise 8 220 •
Becoming Informed 184 Case Study 8 223 • Endnotes 225
Making Decisions
Solving Problems
184
186
9 Social Media Information Systems 227
Managing Projects 186 1. What Is a Social Media Information System (SMIS)? 229
■■ So What?: Future of the Gig Economy 188 Three SMIS Roles 229
4. What Are the Components and Functions of a SMIS Components 232
Collaboration Information System? 189 2. How Do SMIS Advance Organizational Strategy? 234
The Five Collaboration System Components 189 Social Media and the Sales and Marketing
Primary Functions: Communication and Content Activity 234
Sharing 190 Social Media and Customer Service 235
How does the knowledge in this chapter help you? 191 Social Media and Inbound and Outbound Logistics 235
■■ Ethics Guide: Big Brother Wearables 191 Social Media and Manufacturing and Operations 236
■■ Career Guide 192 Social Media and Human Resources 236
Active Review 193 • Key Terms and Concepts 193 • End of ■■ So What?: Enhanced Golf Fan 237
Chapter Questions 194 • Collaboration Exercise 7 194 • Case 3. How Do SMIS Increase Social Capital? 238
Study 7 194 • Endnotes 196
What Is the Value of Social Capital? 239

8 Processes, Organizations, and How Do Social Networks Add Value to


Businesses? 240
Information Systems 197
Using Social Networking to Increase the Number
1. What Are the Basic Types of Processes? 199 of Relationships 240
How Do Structured Processes Differ From Dynamic Using Social Networks to Increase the Strength
Processes? 199 of Relationships 240
xiv Contents

Using Social Networks to Connect to Those Systems Procedures 284


with More Resources 242 Security Monitoring 285
4. How Do (Some) Companies Earn Revenue 8. How Should Organizations Respond to
from Social Media? 243 Security Incidents? 286
You Are the Product 243 How does the knowledge in this chapter help you? 287
Revenue Models for Social Media 244 ■■ Ethics Guide: Web Recording Everything 287
Does Mobility Reduce Online Ad Revenue? 245 ■■ Career Guide 289
5. How Can Organizations Address SMIS Active Review 290 • Key Terms and Concepts 290 •
Security Concerns? 246 End of Chapter Questions 291 • Collaboration
Managing the Risk of Employee Communication 247 Exercise 10 291 • Case Study 10 292 • Endnotes 293
Managing the Risk of Inappropriate Content 247
11 Information Systems Management 295
6. Where Is Social Media Taking Us? 250
How does the knowledge in this chapter 1. What Are the Functions and Organization
help you? 251 of the IS Department? 297
■■ Ethics Guide: Synthetic Friends 251 How Is the IS Department Organized? 297
■■ Career Guide 252 Security Officers 299
Active Review 253 • Key Terms and Concepts 254 • End of What IS-Related Job Positions Exist? 299
Chapter Questions 254 • Collaboration Exercise 9 254 • 2. How Do Organizations Plan the Use of IS? 301
Case Study 9 255 • Endnotes 257 Align Information Systems with Organizational
Strategy 301
Part 4 Information Systems Communicate IS Issues to the Executive Group 302
Management 259 Develop Priorities and Enforce Them Within
the IS Department 302
10 Information Systems Security 261 Sponsor the Steering Committee 302
1. What Is the Goal of Information Systems 3. What Are the Advantages and Disadvantages
Security? 263 of Outsourcing? 303
The IS Security Threat/Loss Scenario 263 Outsourcing Information Systems 303
What Are the Sources of Threats? 265 ■■ So What?: Poor Data Management at Facebook 304

What Types of Security Loss Exist? 266 International Outsourcing 306


Goal of Information Systems Security 268 What Are the Outsourcing Alternatives? 307
2. How Big Is the Computer Security Problem? 268 What Are the Risks of Outsourcing? 308
3. How Should You Respond to Security Threats? 270 4. What Are Your User Rights and Responsibilities? 310
4. How Should Organizations Respond to Security Your User Rights 310
Threats? 272 Your User Responsibilities 311
■■ So What?: Largest! Data! Breach! Ever! 273 How does the knowledge in this chapter help you? 312
5. How Can Technical Safeguards Protect ■■ Ethics Guide: Training Your Replacement 312
Against Security Threats? 274
■■ Career Guide 313
Identification and Authentication 274 Active Review 314 • Key Terms and Concepts 315 • End of
Single Sign-on for Multiple Systems 275 Chapter Questions 315 • Collaboration Exercise 11 315 • Case
Encryption 275 Study 11 316 • Endnotes 318

Firewalls
Malware Protection
277
277
12 Information Systems
Development 319
Design for Secure Applications 279
6. How Can Data Safeguards Protect 1. What Is Systems Development? 321
Against Security Threats? 279 2. Why Is Systems Development Difficult
Legal Safeguards for Data 280 and Risky? 322
7. How Can Human Safeguards Protect The Difficulty of Requirements Determination 322
Against Security Threats? 280 Changes in Requirements 323
Human Safeguards for Employees 281 Scheduling and Budgeting Difficulties 323
Human Safeguards for Nonemployee Personnel 283 Changing Technology 324
Account Administration 283 Diseconomies of Scale 324
Contents xv

Is It Really So Bleak? 324 Procedure Design 332


3. What Are the Five Phases of the SDLC? 325 Design of Job Descriptions 333
4. How Is System Definition Accomplished? 326 7. How Is an Information System Implemented? 333
Define System Goals and Scope 326 System Testing 333
Assess Feasibility 327 System Conversion 334
Form a Project Team 327 8. What Are the Tasks for System Maintenance? 335
5. What Is the Users’ Role in the Requirements 9. What Are Some of the Problems With the SDLC? 336
Phase? 328 The SDLC Waterfall 336
Determine Requirements 328 Requirements Documentation Difficulty 337
Approve Requirements 329 Scheduling and Budgeting Difficulties 337
Role of a Prototype 329 How does the knowledge in this chapter help you? 337
6. How Are the Five Components Designed? 330 ■■ Ethics Guide: Engineered Slowdown 338
Hardware Design 330 ■■ Career Guide: Developing Your Personal Brand 339
■■ So What?: Banking on IoT 330 Active Review 341 • Key Terms and Concepts 341 • End of
Software Design 332 Chapter Questions 342 • Collaboration Exercise 12 342 • Case
Study 12 343 • Endnotes 345
Database Design 332

Chapter Extensions

Chapter Extension 1: Machine Learning 378


IBM’s Watson 379
Introduction to Microsoft Active Review 381 • Key Terms and Concepts 381 • End of
Excel 2019 347 Chapter Questions 381 • Endnotes 382

1. What Is a Spreadsheet? 347


2. How Do You Get Started with Excel? 348 Chapter Extension 3:
3. How Can You Enter Data? 351 Database Marketing 383
Key in the Data 351
1. What Is a Database Marketing Opportunity? 383
Let Excel Add the Data Using a Pattern 352
2. How Does RFM Analysis Classify Customers? 384
4. How Can You Insert and Delete Rows and Columns
3. How Does Market-Basket Analysis Identify
and Change Their Size? 356
Cross-Selling Opportunities? 385
5. How Can You Format Data? 359
4. How Do Decision Trees Identify Market
6. How Can You Create a (Simple) Formula? 360 Segments? 386
7. How Can You Print Results? 364 A Decision Tree for Student Performance 387
Active Review 366 • Key Terms and Concepts 367 • End
of Chapter Questions 367
A Decision Tree for Loan Evaluation 388
Active Review 389 • Key Terms and Concepts 390 • End of
Chapter Questions 390 • Endnotes 390
Chapter Extension 2:
Artificial Intelligence and Automation 369 Chapter Extension 4:
1. Why Is Artificial Intelligence Important? 369 Reporting Systems and OLAP 391
Advances in AI 370
1. How Do Reporting Systems Enable People
2. How Will AI and Automation Affect Organizations? 371 to Create Information? 391
Benefits of Automated Labor 372 2. What Are the Components and Characteristics
3. How Will AI Affect Me? 374 of Reporting Systems? 394
Unwanted Dirty Jobs 374 Report Type 394
Retraining and Retooling 375 Report Media 395
Surviving a Shifting Workplace 375 Report Mode 396
4. What Is the Goal of AI? 376 3. How Are Reports Authored, Managed, and
Integrated Enabler of Other Technology 376 Delivered? 396
5. How Does AI Work? 378 Report Authoring 396
xvi Contents

Report Management 396 Active Review 431 • Key Terms and Concepts 432 • End of
Report Delivery 397 Chapter Questions 432 • Endnote 432

4. How Are OLAP Reports Dynamic? 398


Active Review 400 • Key Terms and Concepts 401 • End of Chapter Extension 7:
Chapter Questions 401
Using Microsoft Access 2019 433
Chapter Extension 5: 1. How Do You Create Tables? 433
Mobile Systems 403 Starting Access 434
Creating Tables 434
1. What Are Mobile Systems? 403
2. How Do You Create Relationships? 438
2. Why Are Mobile Systems Important? 403
3. How Do You Create a Data Entry Form? 441
Hardware 404
4. How Do You Create Queries Using the Query
Software 404 Design Tool? 444
Data 405 5. How Do You Create a Report? 446
Procedures 406 Active Review 451 • End of Chapter Questions 452
People 406
3. How Do Native and Web-based Mobile Chapter Extension 8:
Applications Compare? 407
Using Excel and Access Together 453
Developing Native Mobile Applications 407
Developing Web Mobile Applications 408 1. Why Use Excel and Access Together? 453
Which Is Better? 409 2. What Is Import/Export? 454
4. What Characterizes Quality Mobile User Import/Export of Text Data 454
Experiences? 409 Import/Export of Excel and Access Data 457
Feature Content 410 3. How Can You Create Charts with Excel? 458
Use Context-Sensitive Chrome 410 Creating a Pie Chart 458
Provide Animation and Lively Behavior 411 Creating a Column Chart 460
Design to Scale and Share 411 4. How Can You Create Group Totals in Access? 460
Use the Cloud 412 5. How Can You Use Excel to Graph Access Data? 466
5. What Are the Challenges of Personal Mobile 6. How Can You Use Access to Report Excel Data? 469
Devices at Work? 413 7. How Can You Combine Excel and Access to
Advantages and Disadvantages of Employee Use Analyze Data? 474
of Mobile Systems at Work 414 Active Review 478 • Key Terms and Concepts 479 • End of
Survey of Organizational BYOD Policy 415 Chapter Questions 479 • Endnote 479
Active Review 416 • Key Terms and Concepts
Chapter Questions 417 • Endnotes 417
417 • End of
Chapter Extension 9:
Network and Cloud Technology 481
Chapter Extension 6: 1. What Is a Computer Network? 481
Database Design 419 2. What Are the Components of a LAN? 482
1. Who Will Volunteer? 419 Connecting Your LAN to the Internet 484
2. How Are Database Application Systems 3. How Does the Internet Work? 485
Developed? 420 The Internet and the U.S. Postal System 485
3. What Are the Components of the Entity-Relationship Step 1: Assemble Package (Packets) 485
Data Model? 421 Step 2: Put Name on Package (Domain Names) 486
Entities 421 Step 3: Look Up Address (IP Address) 486
Relationships 422 Step 4: Put Address on Package (IP Address
4. How Is a Data Model Transformed into a Database on Packet) 487
Design? 424 Step 5: Put Registered Mail Sticker on
Normalization 424 Package (TCP) 488
Representing Relationships 426 Step 6: Ship Package (Packets Transported by
5. What Is the Users’ Role? 428 Carriers) 488
6. Who Will Volunteer? (Continued) 429 4. How Do Web Servers Support the Cloud? 489
Contents xvii

Three-Tier Architecture 490 3. How Are ERP Systems Implemented


Watch the Three Tiers in Action! 490 and Upgraded? 526
Service-Oriented Architecture (SOA) 491 4. What Types of Organizations Use ERP? 527
Internet Protocols 494 ERP by Industry Type 527
TCP/IP Protocol Architecture 494 ERP by Organization Size 527
Active Review 497 • Key Terms and Concepts 497 • End of International ERP 528
Chapter Questions 498 • Endnote 498
5. How Do the Major ERP Vendors Compare? 528
ERP Market Leaders 528
Chapter Extension 10: ERP Products 529
ERP in the Future 531
Collaborative Information Systems Active Review 531 • Key Terms and Concepts 532 • End of
for Student Projects 499 Chapter Questions 532 • Endnotes 532

1. What Are the IS Requirements for Student


Project Collaborations? 499 Chapter Extension 12:
Required Features 499 Supply Chain Management 533
Nice-to-Have Features 500
1. What Are Typical Inter-Enterprise Processes? 533
Collaboration Tool Characteristics 500
2. What Is a Supply Chain? 534
2. How Can You Use Collaboration Tools to
Improve Team Communication? 501 3. What Factors Affect Supply Chain
Performance? 535
3. How Can You Use Collaboration Tools to
Share Content? 503 4. How Does Supply Chain Profitability Differ
from Organizational Profitability? 536
Shared Content with No Control 505
5. What Is the Bullwhip Effect? 537
Shared Content with Version Management
on Google Drive 505 6. How Do Information Systems Affect Supply
Chain Performance? 538
Shared Content with Version Control 507
Active Review 539 • Key Terms and Concepts 539 • End of
4. How Can You Use Collaboration Tools to Chapter Questions 540 • Endnotes 540
Manage Tasks? 510
Sharing a Task List on Google Drive 511 Chapter Extension 13:
Sharing a Task List Using Microsoft
SharePoint 512 Enterprise Social Networks and
5. Which Collaboration Information System Is Knowledge Management 541
Right for Your Team? 513 1. How Do Organizations Develop an
The Minimal Collaboration Tool Set 513 Effective SMIS? 541
The Good Collaboration Tool Set 513 Step 1: Define Your Goals 542
The Comprehensive Collaboration Tool Set 514 Step 2: Identify Success Metrics 542
Choosing the Set for Your Team 515 Step 3: Identify the Target Audience 543
Don’t Forget Procedures and People! 515 Step 4: Define Your Value 543
Active Review 516 • Key Terms and Concepts 517 • End of
Step 5: Make Personal Connections 544
Chapter Questions 517 • Endnotes 517
Step 6: Gather and Analyze Data 544

Chapter Extension 11: 2. What Is an Enterprise Social Network (ESN)? 545


Enterprise 2.0 545
Enterprise Resource Planning (ERP) Changing Communication 546
Systems 519 Deploying Successful Enterprise Social
Networks 546
1. What Is the Purpose of ERP Systems? 519
3. What Are the Benefits of Knowledge
2. What Are the Elements of an ERP Solution? 522
Management? 547
Hardware 522
4. What Are Expert Systems? 548
Software: ERP Application Programs 523
5. What Are Content Management Systems? 549
Data: ERP Databases 523
What Are the Challenges of Content Management? 550
Procedures: Business Process Procedures 524
What Are Content Management Application
People: Training and Consulting 524 Alternatives? 550
xviii Contents

Active Review 551 • Key Terms and Concepts 552 • End of Cultural Norms 579
Chapter Questions 552 • Endnotes 552 5. What Are the Challenges of International IS

Chapter Extension 14:


Management? 579
Why Is International Information Systems
Data Breaches 555 Development More Challenging? 579
What Are the Challenges of International
1. What Is a Data Breach? 555
Project Management? 580
Why Do Data Breaches Happen? 556
What Are the Challenges of International IS
2. How Do Data Breaches Happen? 557 Management? 582
Hitting Target 557 Active Review 583 • Key Terms and Concepts 583 • End of
How Did They Do It? 557 Chapter Questions 584 • Endnotes 584

The Damage 558


3. How Should Organizations Respond Chapter Extension 16:
to Data Breaches? 559
Respond Quickly 559 Systems Development Project
Plan for a Data Breach 560 Management 585
Be Honest about the Breach 560
1. Why Is Formalized Project Management Necessary? 585
4. What Are the Legal Consequences of
2. What Are the Trade-Offs in Requirements,
a Data Breach? 560
Cost, and Time? 586
5. How Can Data Breaches Be Prevented? 562
3. What Are the Dimensions of Project Management? 587
6. What Is Your Role in IS Security? 563
4. How Does a Work Breakdown Structure
Strong Passwords 563 Drive Project Management? 589
Password Etiquette 564 5. What Is the Biggest Challenge for Planning
Active Review 564 • Key Terms and Concepts 565 • End of
a Systems Development Project? 592
Chapter Questions 565 • Endnotes 565
6. What Are the Biggest Challenges for Managing

Chapter Extension 15: a Systems Development Project?


7. What Is the Single Most Important Task
593

International MIS 567 for Users on a Systems Development Project? 594


Active Review 595 • Key Terms and Concepts 596 • End of
1. How Does the Global Economy Affect Chapter Questions 596 • Endnotes 596
Organizations and Processes? 567
How Does the Global Economy Change the Chapter Extension 17:
Competitive Environment? 568
How Does the Emerging Global Economy Change Agile Development 597
Competitive Strategy? 569 1. Why Is the SDLC Losing Credibility? 597
How Does the Global Economy Change Value 2. What Are the Principles of Agile Development
Chains and Business Processes? 571 Methodologies? 598
2. What Are the Characteristics of International 3. What Is the Scrum Process? 600
IS Components? 571
Scrum Essentials 600
What’s Required to Localize Software? 572
When Are We Done? 601
IBM’s Watson Learns Korean 573
Key Roles 602
What Are the Problems and Issues of Global Databases? 573
4. How Do Requirements Drive the Scrum Process? 602
What Are the Challenges of International
Creating Requirements Tasks 603
Enterprise Applications? 574
Scheduling Tasks 603
3. How Do Inter-Enterprise IS Facilitate
Globalization? 575 Committing to Finish Tasks 604

How Do Global Information Systems Affect Hocus-Pocus? 604


Active Review 604 • Key Terms and Concepts 605 • End of
Supply Chain Profitability? 575
Chapter Questions 605 • Endnotes 605
What IS the Economic Effect of Global Manufacturing? 576
How Does Social Media Affect International Business? 576
Chapter Extension 18:
4. What Are the Security Challenges of
International IS? 577 Business Process Management 607
Legal Environment 577 1. Why Do Organizations Need to Manage
Physical Security 578 Business Processes? 607
Contents xix

A Sample Ordering Business Process 607 5 How Is BPM Practiced in the Real World? 616
Why Does This Process Need Management? 608 Defining the Process Problem 616
2. What Are the Stages of Business Process Designing the New Process 618
Management (BPM)? 610 Create Process Components 618
3. How Do Business Processes and Information Implement New Processes 618
Systems Relate? 611 Active Review 619 • Key Terms and Concepts 619 • End of
4. Which Come First: Business Processes Chapter Questions 620
or Information Systems? 613
Business Processes First 613 Application Exercises 621

Information System First 614 Glossary 639


Another Factor: Off-the-Shelf Software 614 Index 653
And the Answer Is ... 615
Preface
In Chapter 1, we claim that MIS is the most important class The reviews for digital reality devices from early adopt-
in the business curriculum. That’s a bold statement, and ev- ers are glowing. These devices will create entirely new types
ery year we ask whether it remains true. Is there any dis- of companies and could change the way people live, work,
cipline having a greater impact on contemporary business shop, and entertain themselves.
and government than IS? We continue to doubt there is. In addition to changing the ways individuals live and
Every year brings important new technology to organiza- gather data, recent innovations are changing the way com-
tions, and many of these organizations respond by creating panies work, too. For example, over the past year Amazon
innovative applications that increase productivity and help experienced tremendous success using Kiva robots in its ful-
them accomplish their strategies. fillment centers. It expanded use of these robots to dozens
Over the past year, we’ve seen long-discussed innova- of warehouses around the world. These 200,000 Kiva robots
tions take big leaps forward. Self-driving vehicles made have reduced operating costs by 20 percent ($22 million per
huge strides over the past year. Uber, Tesla Motors, and warehouse); they have also reduced click-to-ship times by
Waymo (Google) logged millions of autonomous miles. 75 percent.2 If Amazon rolls out these robots to all of its 110
Nearly all other automobile manufacturers are running warehouses, it could save billions. Technology—in this case,
full-tilt to turn their traditional cars into fully autonomous an automated workforce—is fundamentally changing the
smart cars. A recent study by Intel estimates self-driving ve- way organizations operate. It’s enabling them to be more
hicle services will be worth $7 trillion by 2050.1 Consider productive, innovative, and adaptable.
what will happen when Amazon starts formal adoption of Of course, not all of this year’s technology news has
the self-driving trucks they’re currently testing. It could re- been good. Large-scale data breaches continue to be a ma-
duce shipping costs by 80 percent! jor problem. In 2018, some of the largest data breaches
At the annual Consumer Electronics Show (CES) in included Marriot International (500M accounts), Under
2018, Toyota announced an autonomous concept vehicle Armour (150M accounts), and Twitter (330M accounts).
named the e-Palette that the company believes will fulfill And 2019 looks to be even worse. We’ve already seen losses
a role in an emerging mobility as a service (MaaS) market. by First American Corp (885M accounts), Facebook (540M
By mid-2019, Subaru, Suzuki Motor Corp., Mazda Motor accounts), Exactis (340M accounts), and Quora (100M ac-
Corp., Isuzu Motors, and Toyota had all invested in a joint counts).3 Overall, businesses accounted for 66 percent of
venture to utilize the e-Palette platform. stolen accounts. And these are just a fraction of the total
This year, roll-up TVs were a hit at CES. Harley- number of organizations affected this year.
Davidson showed off its new all-electric motorcycle This edition of the text has been updated for these
named LiveWire; it can go 0 to 60 in 3.5 seconds, travel developments as well as normal revisions that address
200 miles on a single charge, and use a power regenera- emergent technologies like artificial intelligence, machine
tion mode to slow the motorcycle. There were also a gag- learning, cloud-based services, and so on.
gle of smart devices like Jabra’s smart headphones. The All of these changes highlight the fact that more so-
adaptive headphones are powered by an AI that adapts phisticated and demanding users push organizations into
to the environment they’re in. They analyze the sounds in a rapidly changing future—one that requires continual
the environment and adjust their noise-canceling abilities adjustments in business planning. In order to participate
automatically. Businesses see the potential value in smart in this business environment, our graduates need to know
devices such as these. They also recognize the need to col- how to apply emerging technologies to better achieve their
lect, store, and analyze the data these devices generate. As organizations’ strategies. Knowledge of MIS is critical to
a result, jobs in analytics, business intelligence, and Big this endeavor. And this pace continues to remind us of
Data are all in high demand right now. Carrie Fisher’s statement, “The problem with instantaneous
Digital reality (sometimes called virtual reality) has re- gratification is that it’s just not fast enough.”
ally taken off. Microsoft showed off its second-generation
device named Hololens 2, which will be released in late 2019.
Google also showed off a demo of its device named Magic Why This Ninth Edition?
Leap, but received a lukewarm reception. Expectations are To reiterate the preface of earlier editions, we believe it is
high for Magic Leap considering that investors have put a exceedingly important to make frequent adaptations to this
record-breaking $4.5 billion into this secretive startup. text because of the delays associated with long textbook

xx
Preface xxi

Table 1 Changes in the Ninth Edition


Chapter Description of Change
1 New eHermes introduction
New and updated charts for CPU and data storage growth
New job sector comparison statistics
Discussion of the MIS skills gap
Updated BLS job statistics for business and MIS occupations
New collaboration exercise (creating a collaboration system)
New section on Information (1-5)
New section on data characteristics (1-6)
New case study (Pluralsight)
2 New eHermes introduction
Chapter content moved up from Chapter 3
New So What? Guide (Amazon Eats Whole Foods)
Added discussion of first and second mover advantages
Added discussion of business processes, BPM, repositories, and activities
Updated Amazon case study
New Career Guide (Senior Learning and Development Specialist)
New Collaboration Exercise (Singing Valley Resort)
New discussion about business process modeling (2-5)
3 New eHermes introduction
Chapter content moved up from Chapter 9
New So What? Guide (Geofencing for Businesses)
Updated Access 2019 images
4 New eHermes introduction
New So What? Guide (New from CES 2019)
New Career Guide (Senior Software Engineer)
Added discussion about cryptocurrencies, Bitcoin, blockchain, and phablets (4-2)
Updated industry statistics throughout the chapter
5 New eHermes introduction
New Ethics Guide (Mining at Work)
New Career Guide (Principal Data Engineer)
New section 5-7 discussing databases at eHermes
Updated images and statistics throughout the chapter
Updated Excel and Access 2019 images
6 New eHermes introduction
New So What? Guide (IRS Systems Overtaxed)
New Ethics Guide (Reverse Engineering Privacy)
Updated industry statistics throughout the chapter
Updated section 6-3 discussing eHermes using the cloud
New Case Study (Salesforce.com)
Updated discussion about telemedicine
New MyLab MIS question about AWS offerings and eHermes
7 New Chapter on Collaboration Information Systems
7-1 What Are the Two Key Characteristics of Collaboration?
7-2 What Are Three Criteria for Successful Collaboration?
7-3 What Are the Four Primary Purposes of Collaboration?
7-4 What Are the Components and Functions of a Collaboration Information System?
New So What? Guide (Future of the Gig Economy)
New Career Guide (Senior Product Manager)
New Ethics Guide (Big Brother Wearables)
xxii Preface

Table 1 Changes in the Ninth Edition (continued )


Chapter Description of Change
New Case Study (Airbnb)
New collaboration exercise
8 New ARES Systems introduction
New discussion on structured versus dynamic processes (8-1)
New discussion of workgroup, enterprise, and inter-enterprise processes (8-1)
New discussion of process efficiency versus process effectiveness (8-2)
New discussion of enterprise application solutions (8-4)
New So What? Guide (Digital Dining)
New Career Guide (Platform Engineer)
9 New Career Guide (Social Media Marketing)
New Case Study (LinkedIn)
New discussion about Geofencing
Updated collaboration exercise
Updated industry statistics and charts throughout the chapter
Updated discussion about the future of social media (9-6)
10 New So What? Guide (Largest! Data! Breach! Ever!)
New Ethics Guide (Web Recording Everything)
New industry statistics and charts throughout the chapter
New discussion about legal safeguards for data including PCI DSS, GLBA, and HIPAA
11 New So What? Guide (Poor Data Management at Facebook)
New Career Guide (Data Governance Officer)
Updated industry statistics and charts throughout the chapter
12 New Ethics Guide (Engineered Slowdown)
New charts and statistics about agile and scrum use
Chapter
Extensions Description of Change
Appl Ex Updated data files
Updated Microsoft Office 2019 compliant files and chapter images
New exercise about Microsoft AI applications Fetch! and How-Old
New exercise about networking commands ping and ipconfig
New exercise about Recuva file recovery
New exercise about Microsoft MakeCode application development
CE1 Chapter content and images updated to Microsoft Excel 2019
CE2 Updated chapter statistics and charts
CE5 Updated mobile statistics
Removed references to depreciated Microsoft charms
CE6 Chapter content and images updated to Microsoft Access 365
CE7 Chapter content and images updated to Microsoft Access 365
CE8 Chapter content and images updated to Microsoft Access 365 and Microsoft Excel 2019
Updated chapter project instructions
CE9 Updated discussion about ICANN and net neutrality
Updated chapter statistics
CE10 New Microsoft Whiteboard example
Updated Google Drive images
Updated SharePoint images
CE11 Updated chapter statistics about ERP leaders and ERP adoption
CE13 Updated chapter statistics and ESN example using Cummins
CE14 Updated data breach statistics and charts
New section on user role in IS security (CE14-6)
New chart showing the most commonly used weak passwords
Preface xxiii

Chapter Description of Change


CE15 Updated statistics about international Internet access (fixed and mobile)
New discussion of the General Data Protection Regulation (GDPR) law
Updated statistics related to spoken languages
Updated examples of bribery and asset seizure
CE18 Updated images for Microsoft Project Professional 2019

Updated statistics and charts related to agile and scrum usage

revision cycles. Text materials we develop in April of one edition’s Chapter 1 and Chapter 2. Content in Chapter 8 was
year are published in January of the next year and are first also expanded to include more discussion about processes in
used by students in September—a minimum 17-month systems. We hope this new organization of chapters will make
delay. the presentation of the chapters flow more naturally.
For some areas of study, a year and a half may not seem Chapters 1 through 6 begin with a new discussion of
long because little changes in that amount of time. But in MIS, eHermes, a startup that provides mobile shopping expe-
entire companies can be founded and then sold for billions of riences using self-driving vehicles. Chapters 7 through
dollars in just a few years. YouTube, for example, was founded 12 continue to be introduced by the discussion of ARES
in February 2005 and then sold in November 2006 to Google Systems, a cloud-based augmented-reality exercise startup.
for $1.65B (21 months). And that wasn’t just a one-time fluke. In addition to motivating the chapter material, both case
Facebook Inc. started in 2004, led the social media revolution, scenarios provide numerous opportunities for students to
and became a public company currently (as of mid-2019) val- practice one of Chapter 1’s key skills: “Assess, evaluate, and
ued at $551B. That’s a whopping $36B in growth per year for apply emerging technology to business.”
15 years! MIS changes fast—very fast. We hope this new edi- This edition also continues to focus on teaching ethics.
tion is the most up-to-date MIS textbook available. Every Ethics Guide asks students to apply Immanuel Kant’s
The changes in this ninth edition are listed in Table 1. categorical imperative, Bentham and Mill’s utilitarianism,
The chapter on Business Intelligence Systems was pulled or both to the business situation described in the guide. We
forward to Chapter 3 because of the increased importance hope you find the ethical considerations rich and deep with
of these systems to all businesses. Every large tech com- these exercises. The categorical imperative is introduced in the
pany has spent considerable resources acquiring artificial Ethics Guide in Chapter 1 (pages 20–21), and utilitarianism is
intelligence (AI) companies in the past ten years, including introduced in the Ethics Guide in Chapter 2 (pages 46–47).
Google ($3.9 billion), Amazon ($871 million), Apple ($786), As shown in Table 1, additional changes were made to
Intel ($776), and Microsoft ($690).4 And that’s not counting every chapter, including eight new So What? features, five
additional internal investments. AI and machine learning new Ethics Guides, seven new Career Guides, and four new
are becoming core parts of these companies’ competitive chapter cases. Numerous changes were made throughout
advantage. Some of the highest-paying jobs are in AI, busi- the chapters in an attempt to keep them up-to-date. MIS
ness analytics, Big Data, and data mining. moves fast, and to keep the text current, we checked every
Even consumers are being affected. Consumers are inter- fact, data point, sentence, and industry reference for obso-
acting with AIs like Alexa, Google, and Siri in their homes on lescence and replaced them as necessary.
a daily basis. Machine learning is being used to make person-
alized recommendations for online shoppers. It’s also being
used to create automated Gmail replies, optimize Uber ar- Structure, Organization,
rival times, and identify which songs you’ll want to listen to.
A new chapter on Collaboration Information Systems and Appearance of This Text
(Chapter 7) was added to Part 3 (MIS in Organizations) Teaching today is a very different endeavor than it was
because it focuses on systems in organizations, much like years ago. Students have many more distractions and de-
Chapters 8 and 9 do. MIS professors who reviewed the book mands on their time. They are quick to tune in and quick
said they assign a lot of group work and that they wanted to tune out, so much so that someone compared their atten-
content to help their students work more effectively within tion spans to those of Labrador Retriever puppies. We can
their groups. Chapter Extension 10 covers collaboration lament that fact, but we can’t change it. What we can do is
software options that students can use to manage their as- to meet students where they are and creatively attempt to
signed projects. obtain their engagement.
To make room for the new chapter, the content from the We designed this text with that hope and goal in mind.
previous edition’s Chapter 2 was split and integrated into this Every feature of this book is designed to make it easy for
xxiv Preface

students to engage with the content, not by watering it make it easier for students to open this book and continue to
down but rather, we hope, by making it interesting and rel- read it, interesting and engaging art and photos have been
evant to them. This text is not an encyclopedia; it attempts used. In every instance, however, we have insisted that the photo
to teach essential topics well. It does so by providing op- or art be related to the topic under discussion; these photos are not
portunities for students to actively engage with the content, simply eye candy. Pearson allows us to personally review and
by providing features to help students better manage their approve every photo and art exhibit in this text. We believe
study time, and by having an appearance that makes it easy a good book does not have to appear boring, but all art must
for students to pick up and start. be relevant.

Active Engagement Features for Engaging


The structure of this edition of Experiencing MIS provides
many opportunities for active engagement. Each chapter in-
the Student
cludes a So What? feature that contains exercises and ques- Experiencing MIS was written to make it impossible for read-
tions for students to answer to demonstrate the relevancy of ers of this text to miss the importance of MIS in business.
the chapter’s material to them. Each chapter also contains The text is designed to be approachable, easy to use, some-
an Ethics Guide that looks at the ethical implications of the times humorous, with an upbeat and in-your-face attitude,
chapter content. These can be used for small in-class exer- but always with the goal of underlining the importance of
cises. Finally, this edition contains 39 application exercises. MIS to all businesspeople in the 21st century.
An important part of making the text approachable was
choosing a modular design. The text consists of 12 short
Facilitate Student Study chapters along with 18 supplemental discussions, called
chapter extensions.
Today’s students were reared in an environment of constant
The modular nature of this text is discussed in more de-
stimulation and channel surfing, and it seems nearly impos-
tail later in this preface.
sible for many students to focus on a single topic for more
than a few minutes. Again, we can wish it otherwise, but
short attention spans are students’ and our reality. And re- Emphasis on Collaboration
cent research does seem to substantiate students’ claim that, As with previous editions, this text emphasizes collabo-
except for texting in class, students can multitask in class ration. It is one of Reich’s key skills for the 21st-century
without problem.5 professional, as described in Chapter 1. We believe we
This text is structured to accommodate today’s stu- need not only to require our students to collaborate but
dents’ learning styles. First, to help students manage their also to teach them key skills for doing so. Chapter 7 and
time, it is organized around questions. The learning objec- Chapter Extension 10 present collaboration techniques
tives for each chapter or chapter extension are presented as and collaboration information systems, respectively. Each
a list of questions. Each major heading of the material is one chapter also includes a collaboration exercise at the end
of those questions, and the end of the chapter or extension of the chapter.
includes an Active Review in which students are asked to Additionally, Pearson Education is sponsoring
demonstrate their learning of the answer to each question. Microsoft SharePoint for student use. At your request,
Students should study until they can answer the questions; Pearson will set up a SharePoint site collection that your
that may be 5 minutes or 5 hours, but their job is to answer students can use when responding to the collaboration ex-
those questions. This technique, from Marilla Svinicki’s re- ercises at the end of each chapter. Students need nothing
search, vastly helps students manage their study time.6 more than a browser to participate. See your Pearson sales
You can also use the questions to structure class sessions representative for more information.
or at least parts of those sessions. You can open class by ask-
ing students to “do the questions.” Go around the room and
Opening Scenarios for Parts
call on someone to answer a question or part of one.
Second, students learn more when they are emotion- and Chapters
ally engaged in the material. The purpose of the vignettes Each part and each chapter opens with a scenario intended
that introduce each chapter is to raise student emotion; to get students involved emotionally. We want students to
their purpose is to cause students to care about the chapter mentally place themselves in the situation and to realize
material. that this situation—or something like it—could happen to
Third, 82 percent of students in the business school pre- them. Each scenario sets up the chapter’s content and pro-
fer visual learning to auditory (voice or word) learning.7 To vides an obvious example of why the chapter is relevant to
Another random document with
no related content on Scribd:
Eileen saw that he and his sled and Jinx, the wheel dog had gone
through the ice while Sate and the rest of the team were straining
every muscle to the breaking limit to keep from being dragged down
into the icy waters behind them. The pole that Bill had taken the
precaution to carry saved him from going under but try as he would
he could not get out.
Running back at top speed Jack had the situation sized up long
before he reached the scene of disaster. When he was within a
dozen feet of the team he made a mighty slide, as a man sliding for
home with three on bases, and drawing his hunting knife from its
sheath at the same time, the instant he came alongside the last dog
he cut the traces. Relieved of the mighty weight so suddenly the
team fell headlong forward and sprawled about on the ice; at the
same moment the sled, with over half of the moosehide sacks of
gold on it, and Jinx, the wheel dog, dropped to the bottom of the
river. Jack then helped Bill out and on getting back to the former’s
team they made an air line for the shore.
It would add nothing to the gayety of the world to relate what Jack
said to Bill and Bill said to Jack and what both of them said about the
loss of their vast fortune so soon after they had found it. Eileen was
the peace maker and she told them they still had enough gold to
keep them forever and ever (she had never lived in New York) and
that the loss of the gold mattered not a whit as long as Bill had been
saved. And both of the boys came to think that she had the right
view of it at that.
The result of the dreadful mishap was a pow-wow in which it was
resolved first, that they couldn’t afford to take any further chances on
the last ice with either Eileen or the remainder of their treasure,
second, that spring was altogether too far advanced to make any
further attempt to get to Fort Yukon with their remaining sled, and
third, that they must mark the spot where the gold went down so that
they could recover it when conditions were more favorable.
“The only thing for us to do now,” declared Jack, “is to camp right
here until the first water and then build a boat or a raft and float on
down to Fort Yukon, which is some seventy miles from here. In the
meantime we’ll build up a cairn of rocks on each side of the river and
in a line with the sunken yellow stuff so that when we do come back
we’ll know right where it is.”
“An’ one good thing no one else ’ull ever guess out where it is,”
philosophized Bill.
The boys made a fairly comfortable camp and set about building a
raft of spruce logs which they lashed together with rawhide thongs.
When this was done and they could get across the river they built up
a great pile of rocks on either side of it but well back from the shore.
Before another moon rolled round they were ready to make a fresh
start down the river.
“What about these huskies here,” asked Bill, who always kept his
weather-eye open for the welfare of their dogs even though they
didn’t have any more use for them.
“We’ll turn them loose and they’ll follow us along the shore all
right,” replied Jack, and so that little matter was settled.
They loaded the remaining sacks of gold, their outfit and
provisions, of which precious little was left, onto the raft. In the
middle they had built up a platform of saplings for Eileen to sit on to
the thoughtful end that when the raft struck the rapids and took a
notion to dive, like a submarine, the water would not wash over and
wet her.
Then Eileen took her seat on the platform, Jack stood on the front
end and Bill on the diagonal corner of the rear end and with their
long poles they pushed their treasure float off shore. As Jack had
said, the huskies followed them and they kept as close to the edge of
the river as they could, barking and howling furiously as they ran
along.
It took very little effort on the part of the boys to steer the raft and
none at all to keep it moving as the current was augmented all along
by rivulets and streams from the melting snows. Where the river was
wide and the water shallow the raft sailed gently along but where the
channel was narrow the boys had to do some tall maneuvering to
keep it from getting swamped.
The rapids, of which there were many, were their despair. When
the ungainly craft struck these eddying currents it pitched and rolled
about like a piece of cork and the little crew had to hang on to it for
dear life. In this exciting fashion they covered the rest of the distance
down the Big Black River. Just before they came to the mouth where
it empties into the Porcupine River the bed made a sharp descent
and the water rushed down it in a mighty torrent.
There was a bend in the river ahead of them and this too they
successfully navigated, but a rock, that projected out of the water,
and which was directly in their course, proved their undoing. Jack
managed to get his pole on it and brought all of his strength to bear
to keep the raft clear of it, but the weight and the momentum were
too great and a corner struck it with such force that Eileen and the
boys were thrown bodily into the water.
It was well for them that they were good swimmers and after a
struggle with the swift current all of them landed on the shore like
bags of wet rags. Then the huskies covered with mud and rending
the air with their vocal organs swarmed round them.
Never in all his life had Jack felt more like crying. He could stand
any kind of bodily pain but with all of their gold gone he suffered
exquisite mental torture. Many a prospector in the early days had
killed himself for less bad luck. Bill seemed to be not all there for he
acted queerly and talked about the little “boidies” that were singing in
the trees, the “bloomin’” flowers that bloomed in the spring, and other
like idiotic fancies that hadn’t anything to do with the case, tra, la.
“THE UNGAINLY CRAFT PITCHED AND ROLLED ABOUT LIKE A PIECE OF
CORK.”

Eileen was the only one who had kept her wits about her. She
reasoned with the boys, or at least she tried to; she told them how
very, very, lucky they were in that for the second time none of them
were drowned, and as for the gold it was a blessed good thing it was
all gone, she said, for it only brought bad luck.
Bill looked at her as she spoke these consoling words in a funny
kind of way, as though he’d just got out of a merry-go-round and
didn’t quite know where he was.
“Eileen,” he managed to say, blinking at her; “I wouldn’t even let a
perliceman talk that way to me. If you was me pard, Jack here, I’d
make you put up your dooks, see.”
Eileen laughed as if either he, or what he had said, was a great
joke, and what’s more, she laughed out loud—the first time since
they had known her. Then Jack laughed, and Bill, not to be left out in
the cold, joined them with his hearty guffaw. And there the three of
them sat on a fallen tree, water soaked, bedraggled, dead broke and
as miserable as possible, laughing fit to kill.
Having had experience in losing things, including a few mere
sacks of gold and a lot of provisions when his sled went down, Bill
had insisted before they embarked on their raft that they should each
carry a day’s rations strapped to their backs. Building a big fire they
dried their clothes and had their drop of tea and bit of pemmican and
after that they felt much better, and quit laughing.
The huskies fared very much a la Mother Hubbard’s dog, which is
to say that the cupboard was bare and so the poor brutes had none,
no, not even a piece of fish to eat.
“Well, one good thing,” said Bill, whose pemmican had revived
him again, “we won’t have to mark this blarsted spot where the last
bit of our gold was dumped for I’d know that rock if I saw it a
thousand miles off Fire Island.”
Jack and Eileen took a good look at the projecting finger which
wouldn’t get out of the way of their raft, and they agreed with Bill that
it was a monument of misfortune which having once been run into
could never be forgotten.
As they were only twenty some odd miles from Fort Yukon these
youngsters started out to walk there, or “hoof it” as Bill so inelegantly
expressed it. They had not gone more than a couple of miles when
they came upon—no, it couldn’t be, and yet there it was—their raft
beached on the shore and on it there still remained three of the
moosehide sacks of gold.
As Jack had often told Bill conditions are largely a matter of mind
and truly it seemed so. For see you now, when they first stumbled on
the pit of gold in Carscadden’s cabin they were not nearly as elated
as one would have thought they’d be. Then when they lost the sled
load of gold, though they were still millionaires, they were as sore at
heart and mad at each other as they could be. When they lost all of
their treasure and were dead-broke they laughed, and now having
recovered three sacks of it they simply went wild with joy. Can you
beat it?
It was a remarkable trio of youngsters that landed from their raft at
Fort Yukon on that never-to-be-forgotten day in July. At any rate so
said the inhabitants of that burg. Hoboes couldn’t have looked more
disreputable. And the huskies were all there too, mean, lean and dog
dirty.
The crowd at the landing that gathered round this motley little
group scarce knew what to make of it, they felt so sorry for these
woe-be-gone “kids.” But when they saw Bill take two moosehide
sacks filled with something that was tremendously heavy under his
arms and Jack take another and third one on his shoulder, the half-
breed girl trudging along between them and their teams of huskies
sticking as close to them as they could get without being stepped on,
their mute sorrow changed to open expressions of surprise. Here
was something to talk about to the end of time.
“Moosehide sacks filled with gold! by jimminy!” blurted out an old
timer.
“An’ them kids found it where we couldn’t,” exclaimed another
bitterly.
And so on, and so on.
They went over to the Crystal Hotel and while Bill stood guard
over what was left of their treasure, Jack took Eileen across the
street to the New York Emporium and there they outfitted themselves
and Bill for the trip down to St. Michaels. When they next appeared
in public there had been a great transformation for Eileen was a
brand new girl and Jack and Bill were almost themselves again.
Eileen, as pretty as ever an Irish lass and an Indian maid blended
into one could be, had her hair done up, wore a blue traveling dress,
a sailor hat and, cross my criss cross, she had on stockings and
shoes, which latter, let it be whispered, she would willingly have
traded for a pair of old moccasins.
The boys were clean, well groomed and had their hair cut. They
wore real store clothes—all wool suits that looked as if the price tag
on them had been marked up to $7.65 from $5.67. When they
walked their shoes squeaked at every step like a duck having its
neck wrung. They were rich, genial and willing to talk on any subject
they didn’t know anything about, but of the moosehide sacks filled
with gold, they said never a word.
Yet, with all their good humor the boys were ready to pull the
triggers of their six-guns on the bat of an eyelid should any one get
the idea in his head that he was going to relieve them of their
treasure. And they guarded Eileen with the same jealous care.
A week’s run on the steamboat down the Yukon landed them at
St. Michael, and once there they shipped their sacks of gold by
express through to New York City when a part of their great
responsibility was lifted from their minds. In a month’s time Jack and
Bill were back where they had started from, while Eileen was being
petted and pampered by the swelldom of Montclair.

THE END
*** END OF THE PROJECT GUTENBERG EBOOK JACK HEATON,
GOLD SEEKER ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set
forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or
determine the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.

You might also like