Logo Dark Logo BIT Studyroom
  • Semester One Ⅰ ↗
  • Semester two Ⅱ ↗
  • Semester three Ⅲ ↗
  • Semester Four Ⅳ ↗
  • Semester Five Ⅴ ↗
  • Semester Six Ⅵ ↗
Announcements About
CTRL K
    GitHub
    CTRL K
      • About
      • Security, Ethical, Privacy and Other Challenge
      • Index
      • Index
      • Index
      • Index
      • Index
      • Index
      • Announcements
      • IT1106 Information Systems
      • IT1206 Computer Systems
      • IT1506 Fundamentals of Mathematics
      • Semester One(Ⅰ)
      • T1406 Introduction to Programming
      • About

      IT1106 Information Systems

      Information System Concepts and Technologies

      [1.1] Information System Concepts
      [1.2] Managing Information in the Digital World
      [1.3] Computer-Based Information Systems
      [1.4] Information Technology infrastructure in an organization
      [1.5] Components of Information System Infrastructure

      Information Systems for Organizations and Globalization

      [2.1] Organizations and Information Systems
      [2.2] Information Technology Investments in Organizations
      [2.3] Global Information Systems Strategies

      Electronic and Mobile Commerce

      [3.1] An Introduction to Electronic Commerce
      [3.2] An Introduction to Mobile Commerce
      [3.3] Advantages of Electronic and Mobile Commerce
      [3.4] Electronic and Mobile Commerce Applications
      [3.5] Strategies for Successful E-Commerce and M-Commerce
      [3.6] Technology Infrastructure Required to Support E-Commerce and M-Commerce

      Electronic Business Systems

      [4.1] Organizational Structure and Information Systems
      [4.2] Functional Information Systems
      [4.3] Cross-Functional Systems

      Specialized Systems and New Technologies

      [5.1] Business Intelligence (BI) Systems
      [5.2] Assistive Technology Systems

      Information system Acquisition

      [6.1] IS Acquisition Process
      [6.2] Valuing Information Systems Acquisition
      [6.3] IS Acquisition Options
      [6.4] Sourcing Methods

      Security, Ethical, Privacy and Other Challenge

      [7.1] Ethical Issues in Data Handling
      [7.2] Privacy Issues
      [7.3] Information System Security
      [7.4] Ergonomics


      Developed and maintained by dilshaner.com
      All *Video contents on this website is released into the public domain. You are free to use, modify, and reuse the content without restriction. While attribution is appreciated, it is not required. Powered by Hextdra