100% found this document useful (1 vote)
2K views57 pages

Using MIS 9th Edition - Ebook PDF Version All Chapter Instant Download

MIS

Uploaded by

matthepaice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views57 pages

Using MIS 9th Edition - Ebook PDF Version All Chapter Instant Download

MIS

Uploaded by

matthepaice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Download the full version of the ebook at

https://ebookmass.com

Using MIS 9th Edition – Ebook PDF Version

https://ebookmass.com/product/using-mis-9th-
edition-ebook-pdf-version/

Explore and download more ebook at https://ebookmass.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Using MIS 10th Edition, (Ebook PDF)

https://ebookmass.com/product/using-mis-10th-edition-ebook-pdf/

testbankdeal.com

Using MIS (10th Edition) 10th Edition (Ebook PDF)

https://ebookmass.com/product/using-mis-10th-edition-10th-edition-
ebook-pdf/

testbankdeal.com

Experiencing MIS – Ebook PDF Version

https://ebookmass.com/product/experiencing-mis-ebook-pdf-version/

testbankdeal.com

(eBook PDF) Using MIS 11th Edition by David M. Kroenke

https://ebookmass.com/product/ebook-pdf-using-mis-11th-edition-by-
david-m-kroenke/

testbankdeal.com
Introduction to 80×86 Assembly Language and Computer
Architecture – Ebook PDF Version

https://ebookmass.com/product/introduction-to-8086-assembly-language-
and-computer-architecture-ebook-pdf-version/

testbankdeal.com

Professional Cooking, 9th Edition – Ebook PDF Version

https://ebookmass.com/product/professional-cooking-9th-edition-ebook-
pdf-version/

testbankdeal.com

Campbell Biology: Concepts & Connections 9th Edition –


Ebook PDF Version

https://ebookmass.com/product/campbell-biology-concepts-
connections-9th-edition-ebook-pdf-version/

testbankdeal.com

Criminal Justice in Action 9th Edition – Ebook PDF Version

https://ebookmass.com/product/criminal-justice-in-action-9th-edition-
ebook-pdf-version/

testbankdeal.com

Essentials of Business Communication 9th Edition – Ebook


PDF Version

https://ebookmass.com/product/essentials-of-business-
communication-9th-edition-ebook-pdf-version/

testbankdeal.com
This page intentionally left blank
Using MIS
David M. Kroenke
Randall J. Boyle

N i N t h E d i t i o N

Boston Columbus Indianapolis New York San Francisco Amsterdam


Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Vice President, Business Publishing: Donna Battista Senior Art Director: Janet Slowik
Editor-in-Chief: Stephanie Wall Vice President, Director of Digital Strategy and Assessment:
Acquisitions Editor: Nicole Sam Paul Gentile
Development Editor: Laura Town Manager of Learning Applications: Paul DeLuca
Editorial Assistant: Olivia Vignone Digital Editor: Brian Surette
Vice President, Product Marketing: Maggie Moylan Director, Digital Studio: Sacha Laustsen
Director of Marketing, Digital Services and Products: Digital Studio Manager: Diane Lombardo
Jeanette Koskinas Digital Studio Project Manager: Regina DaSilva
Executive Field Marketing Manager: Adam Goldstein Digital Studio Project Manager: Alana Coles
Field Marketing Manager: Lenny Ann Raper Digital Studio Project Manager: Robin Lazrus
Product Marketing Assistant: Jessica Quazza Full-Service Project Management and Composition: Integra
Team Lead, Program Management: Ashley Santora Software Services, Pvt. Ltd.
Program Manager: Denise Weiss Interior and Cover Designer: Karen Quigley
Team Lead, Project Management: Jeff Holcomb Interior Illustrations: Simon Alicea
Project Manager: Karalyn Holland Cover Image: John Lund/Glow Images
Operations Specialist: Carol Melville Printer/Binder: Courier/Kendallville
Creative Director: Blair Brown Cover Printer: Phoenix Color/Hagerstown

Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related
graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is” without warranty of any
kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties
and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event
shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from
loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or
performance of information available from the services.

The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically
added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the
program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.

Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or
endorsed by or affiliated with the Microsoft Corporation.

Copyright © 2017, 2016, 2015 by Pearson Education, Inc. or its affiliates. All Rights Reserved. Manufactured in the United States of
America. This publication is protected by copyright, and permission should be obtained from the publisher prior to any prohibited reproduction,
storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise. For
information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights and Permissions
department, please visit www.pearsoned.com/permissions/.

Acknowledgments of third-party content appear on the appropriate page within the text.

PEARSON, ALWAYS LEARNING, and MYMISLAB™ are exclusive trademarks owned by Pearson Education, Inc. or its affiliates in the U.S. and/or
other countries.

Unless otherwise indicated herein, any third-party trademarks that may appear in this work are the property of their respective owners, and any
references to third-party trademarks, logos, or other trade dress are for demonstrative or descriptive purposes only. Such references are not intended
to imply any sponsorship, endorsement, authorization, or promotion of Pearson’s products by the owners of such marks, or any relationship
between the owner and Pearson Education, Inc. or its affiliates, authors, licensees, or distributors.

Library of Congress Cataloging-in-Publication Data


Kroenke, David M.
Using MIS / David Kroenke, Randy Boyle.—9 Edition.
pages cm
Revised edition of the authors’ Using MIS, 2015.
ISBN 978-0-13-410678-6—ISBN 0-13-410678-4
1. Management information systems. I. Boyle, Randall. II. Title.
III. Title: Using management information systems.
HD30.213.K76 2017
658.4’038011—dc23
2015030057

10 9 8 7 6 5 4 3 2 1

ISBN 10: 0-13-410678-4


ISBN 13: 978-0-13-410678-6
To C.J., Carter, and Charlotte
—David Kroenke

To Courtney, Noah, Fiona, and Layla


—Randy Boyle
Brief Contents
Describes how this course teaches four key
skills for business professionals. Defines MIS,
information systems, and information.
Describes characteristics, criteria for success,
Part 1: Why MIS? 1 and the primary purposes of collaboration.
Discusses components of collaboration IS and
1 The Importance of MIS 3 describes collaboration for communication
and content sharing. Illustrates use of Google
Drive, SharePoint, and other collaboration
2 Collaboration Information Systems 37 tools.
Describes reasons why organizations create
3 Strategy and Information Systems 83 and use information systems: to gain competi-
tive advantage, to solve problems, and to sup-
port decisions.
Describes the manager’s essentials of hard-
Part 2: Information Technology 113 ware and software technology. Discusses open
source, Web applications, mobile systems, and
BYOD policies.
4 Hardware, Software, and Mobile Systems 115 Explores database fundamentals, applica-
tions, modeling, and design. Discusses the
entity-relationship model. Explains the role
5 Database Processing 161 of Access and enterprise DBMS products.
Defines BigData and describes nonrelational
6 The Cloud 203 and NoSQL databases.
Explains why the cloud is the future. Describes
basic network technology that underlies the
cloud, how the cloud works, and how organiza-
Part 3: Using IS for Competitive Advantage 247 tions, including Falcon Security, can use the
cloud. Explains SOA and summarizes funda-
mental Web services standards.
7 Processes, Organizations, and Information Systems 249 Discusses workgroup, enterprise, and inter-
enterprise IS. Describes problems of informa-
tion silos and cross-organizational solutions.
8 Social Media Information Systems 291 Presents CRM, ERP, and EAI. Discusses ERP
vendors and implementation challenges.
9 Business Intelligence Systems 335 Describes components of social media IS
(SMIS) and explains how SMIS can contribute
to organizational strategy. Discusses the theory
of social capital and how revenue can be gen-
Part 4: Information Systems Management 383 erated using social media. Explains the ways
organizations can use ESN and manage the
risks of SMIS.
10 Information Systems Security 385 Describes business intelligence and knowledge
management, including reporting systems,
data mining, and social media-based knowl-
11 Information Systems Management 427
edge management systems.
Describes organizational response to infor-
12 Information Systems Development 455 mation security: security threats, policy, and
safeguards.
Describes the role, structure, and function of
The International Dimension 502 the IS department; the role of the CIO and CTO;
outsourcing; and related topics.
Application Exercises 520 Discusses the need for BPM and the BPM pro-
cess. Introduces BPMN. Differentiates between
Glossary 538 processes and information systems. Presents
SDLC stages. Describes agile technologies and
Index 555 scrum and discusses their advantages over the
SDLC.
ConTenTS

Part 1: Why MIS?

1: The IMPorTanCe of MIS 3

Q1-1 Why Is Introduction to MIS the Most Important Class in the


Business School? 5
The Digital Revolution 5
Evolving Capabilities 6
Moore’s Law 6
Metcalfe’s Law 7
Other Forces Pushing Digital Change 8
This Is the Most Important Class in the School of Business 8

Q1-2 How Will MIS Affect Me? 9


How Can I Attain Job Security? 9
How Can Intro to MIS Help You Learn Nonroutine Skills? 9
What Is the Bottom Line? 12

Q1-3 What Is MIS? 13


Components of an Information System 14
Management and Use of Information Systems 14
Achieving Strategies 15

Q1-4 How Can You Use the Five-Component Model? 16


The Most Important Component—You 16
All Components Must Work 16
• So What? Biggest IPO Ever: Alibaba 17
High-Tech Versus Low-Tech Information Systems 18
Understanding the Scope of New Information Systems 18
Components Ordered by Difficulty and Disruption 18

Q1-5 What Is Information? 19


Definitions Vary 19
Where Is Information? 19

Q1-6 What Are Necessary Data Characteristics? 20


Accurate 20
Timely 21
xii Contents

Relevant 21
Just Barely Sufficient 21
Worth Its Cost 21
• Ethics Guide: Ethics and Professional Responsibility 22

Q1-7 2026? 24
• Security Guide: Passwords and Password Etiquette 26
• Guide: Five-Component Careers 28
Case Study 1: zulily 33

2: CollaboraTIon InforMaTIon SySTeMS 37

Q2-1 What Are the Two Key Characteristics of Collaboration? 39


Importance of Effective Critical Feedback 40
Guidelines for Giving and Receiving Critical Feedback 40
Warning! 41

Q2-2 What Are Three Criteria for Successful Collaboration? 42


Successful Outcome 42
Growth in Team Capability 43
Meaningful and Satisfying Experience 43

Q2-3 What Are the Four Primary Purposes of Collaboration? 43


Becoming Informed 44
Making Decisions 44
Solving Problems 46
Managing Projects 46

Q2-4 What Are the Requirements for a Collaboration Information


System? 48
The Five Components of an IS for Collaboration 48
Primary Functions: Communication and Content Sharing 49

Q2-5 How Can You Use Collaboration Tools to Improve Team


Communication? 49

Q2-6 How Can You Use Collaboration Tools to Manage Shared


Content? 53
Shared Content with No Control 54
Shared Content with Version Management on Google Drive 55
• Ethics Guide: I Know What’s Better, Really 58
Shared Content with Version Control 60

Q2-7 How Can You Use Collaboration Tools to Manage Tasks? 62


Sharing a Task List on Google Drive 62
• So What? Augmented Collaboration 63
Sharing a Task List Using Microsoft SharePoint 64
Contents xiii

Q2-8 Which Collaboration IS is Right for Your Team? 66


Three Sets of Collaboration Tools 66
Choosing the Set for Your Team 67
Don’t Forget Procedures and People! 68

Q2-9 2026? 69
• Security Guide: Evolving Security 70
• Guide: Egocentric Versus Empathetic Thinking 72
Case Study 2: Eating Our Own Dog Food 76

3: STraTeGy and InforMaTIon SySTeMS 83

Q3-1 How Does Organizational Strategy Determine Information


Systems Structure? 85

Q3-2 What Five Forces Determine Industry Structure? 86

Q3-3 How Does Analysis of Industry Structure Determine Competitive


Strategy? 87
• Ethics Guide: Yikes! Bikes 88

Q3-4 How Does Competitive Strategy Determine Value Chain


Structure? 90
Primary Activities in the Value Chain 90
Support Activities in the Value Chain 91
Value Chain Linkages 91

Q3-5 How Do Business Processes Generate Value? 92

Q3-6 How Does Competitive Strategy Determine Business Processes


and the Structure of Information Systems? 94

Q3-7 How Do Information Systems Provide Competitive


Advantages? 95
Competitive Advantage via Products 95
• So What? Driving Strategy 96
Competitive Advantage via Business Processes 97
How Does an Actual Company Use IS to Create Competitive Advantages? 98
How Does This System Create a Competitive Advantage? 100

Q3-8 2026? 101


• Security Guide: Hacking Smart Things 102
• Guide: Your Personal Competitive Advantage 104
Case Study 3: The Amazon of Innovation 108
Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
xiv Contents

Part 2: Information Technology

4: hardWare, SofTWare, and MobIle


SySTeMS 115

Q4-1 What Do Business Professionals Need to Know About Computer


Hardware? 117
Hardware Components 118
Types of Hardware 118
Computer Data 119

Q4-2 How Can New Hardware Affect Competitive Strategies? 121


Internet of Things 121
Self-driving Cars 123
3D Printing 125

Q4-3 What Do Business Professionals Need to Know About Software? 127


What Are the Major Operating Systems? 127
Virtualization 130
Own Versus License 132
What Types of Applications Exist, and How Do Organizations Obtain Them? 132
What Is Firmware? 133

Q4-4 Is Open Source Software a Viable Alternative? 134


Why Do Programmers Volunteer Their Services? 134
How Does Open Source Work? 134
• So What? New from CES 2015 135
So, Is Open Source Viable? 137

Q4-5 What Are the Differences Between Native and Web Applications? 137
Developing Native Applications 137
Developing Web Applications 138
Which Is Better? 140

Q4-6 Why Are Mobile Systems Increasingly Important? 140


• Ethics Guide: Free Apps for Data 142
Hardware 144
Software 144
Data 145
Procedures 145
People 145

Q4-7 What Are the Challenges of Personal Mobile Devices at Work? 146
Advantages and Disadvantages of Employee Use of Mobile Systems at Work 146
Survey of Organizational BYOD Policy 147

Q4-8 2026? 148


• Security Guide: Anatomy of a Heartbleed 150
• Guide: Keeping Up to Speed 152
Case Study 4: The Apple of Your i 157
Contents xv

5: daTabaSe ProCeSSInG 161

Q5-1 What Is the Purpose of a Database? 163

Q5-2 What Is a Database? 165


Relationships Among Rows 166
Metadata 167
• Ethics Guide: Querying Inequality? 168

Q5-3 What Is a Database Management System (DBMS)? 170


• So What? Not What the Data Says . . . 171

Q5-4 How Do Database Applications Make Databases More


Useful? 172
Traditional Forms, Queries, Reports, and Applications 174
Browser Forms, Reports, Queries, and Applications 175
Multi-user Processing 177

Q5-5 How Are Data Models Used for Database Development? 178
What Is the Entity-Relationship Data Model? 178

Q5-6 How Is a Data Model Transformed into a Database Design? 181


Normalization 182
Representing Relationships 183
Users’ Role in the Development of Databases 185

Q5-7 How Can Falcon Security Benefit from a Database System? 187

Q5-8 2026? 188


• Security Guide: Theft by SQL Injection 190
• Guide: Immanuel Kant, Data Modeler 192
Case Study 5: Searching for Pianos . . . 196

6: The CloUd 203

Q6-1 Why Is the Cloud the Future for Most Organizations? 205
What Is the Cloud? 205
Why Is the Cloud Preferred to In-House Hosting? 208
Why Now? 209
When Does the Cloud Not Make Sense? 209

Q6-2 What Network Technology Supports the Cloud? 209


• Ethics Guide: Cloudy Profit? 210
What Are the Components of a LAN? 212
Connecting Your LAN to the Internet 214

Q6-3 How Does the Cloud Work? 215


An Internet Example 215
Carriers and Net Neutrality 216
xvi Contents

Internet Addressing 216


Processing on a Web Server 218
Service-Oriented Architecture (SOA) 219
Protocols Supporting Web Services 222

Q6-4 How Do Organizations Use the Cloud? 225


Cloud Services from Cloud Vendors 225
Content Delivery Networks 226
Using Web Services Internally 227

Q6-5 How Can Falcon Security Use the Cloud? 227


SaaS Services at Falcon Security 227
PaaS Services at Falcon Security 228
IaaS Services at Falcon Security 228

Q6-6 How Can Organizations Use Cloud Services Securely? 229


Virtual Private Networks (VPNs) 229
Using a Private Cloud 230
Using a Virtual Private Cloud 231

Q6-7 2026? 232


• So What? Net Neutrality Enabled 233
• Security Guide: From Anthem to Anathema 236
• Guide: Is It Spying or Just Good Management? 238
Case Study 6: FinQloud Forever . . . Well, at Least for the Required
Interval . . . 243

Part 3: Using IS for Competitive


advantage

7: ProCeSSeS, orGanIzaTIonS, and


InforMaTIon SySTeMS 249

Q7-1 What Are the Basic Types of Processes? 251


How Do Structured Processes Differ from Dynamic Processes? 252
How Do Processes Vary by Organizational Scope? 252

Q7-2 How Can Information Systems Improve Process Quality? 255


How Can Processes Be Improved? 256
How Can Information Systems Improve Process Quality? 256

Q7-3 How Do Information Systems Eliminate the Problems of


Information Silos? 257
What Are the Problems of Information Silos? 257
How Do Organizations Solve the Problems of Information Silos? 259
An Enterprise System for Patient Discharge 259
Contents xvii

Q7-4 How Do CRM, ERP, and EAI Support Enterprise Processes? 260
The Need for Business Process Engineering 260
Emergence of Enterprise Application Solutions 261
Customer Relationship Management (CRM) 261
Enterprise Resource Planning (ERP) 263
• So What? Workflow Problems 264
• Ethics Guide: Dialing for Dollars 266
Enterprise Application Integration (EAI) 269

Q7-5 What Are the Elements of an ERP System? 270


Hardware 271
ERP Application Programs 271
ERP Databases 271
Business Process Procedures 272
Training and Consulting 272
Industry-Specific Solutions 274
Which Companies Are the Major ERP Vendors? 274

Q7-6 What Are the Challenges of Implementing and Upgrading


Enterprise Information Systems? 275
Collaborative Management 275
Requirements Gaps 275
Transition Problems 276
Employee Resistance 276
New Technology 276

Q7-7 How Do Inter-enterprise IS Solve the Problems of Enterprise


Silos? 277

Q7-8 2026? 278


• Security Guide: One-Stop Shopping 280
• Guide: ERP and the Standard, Standard Blueprint 282
Case Study 7: A Tale of Two Interorganizational IS 288

8: SoCIal MedIa InforMaTIon SySTeMS 291

Q8-1 What Is a Social Media Information System (SMIS)? 294


Three SMIS Roles 294
SMIS Components 296

Q8-2 How Do SMIS Advance Organizational Strategy? 298


Social Media and the Sales and Marketing Activity 299
Social Media and Customer Service 300
Social Media and Inbound and Outbound Logistics 300
Social Media and Manufacturing and Operations 300
Social Media and Human Resources 301

Q8-3 How Do SMIS Increase Social Capital? 301


What Is the Value of Social Capital? 302
xviii Contents

How Do Social Networks Add Value to Businesses? 303


Using Social Networking to Increase the Number of Relationships 303
• So What? Facebook for Organizations . . . and Machines 304
Using Social Networks to Increase the Strength of Relationships 305
Using Social Networks to Connect to Those with More Resources 306

Q8-4 How Do (Some) Companies Earn Revenue from Social Media? 307
You Are the Product 307
Revenue Models for Social Media 308
Does Mobility Reduce Online Ad Revenue? 309
• Ethics Guide: Synthetic Friends 310

Q8-5 How Do Organizations Develop an Effective SMIS? 312


Step 1: Define Your Goals 313
Step 2: Identify Success Metrics 313
Step 3: Identify the Target Audience 314
Step 4: Define Your Value 314
Step 5: Make Personal Connections 315
Step 6: Gather and Analyze Data 315

Q8-6 What Is an Enterprise Social Network (ESN)? 315


Enterprise 2.0 316
Changing Communication 316
Deploying Successful Enterprise Social Networks 317

Q8-7 How Can Organizations Address SMIS Security Concerns? 318


Managing the Risk of Employee Communication 318
Managing the Risk of Inappropriate Content 319

Q8-8 2026? 321


• Security Guide: Digital Is Forever 324
• Guide: Developing Your Personal Brand 326
Case Study 8: Sedona Social 330

9: bUSIneSS InTellIGenCe SySTeMS 335

Q9-1 How Do Organizations Use Business Intelligence (BI) Systems? 337


How Do Organizations Use BI? 338
What Are Typical BI Applications? 339

Q9-2 What Are the Three Primary Activities in the BI Process? 340
Using Business Intelligence to Find Candidate Parts 341

Q9-3 How Do Organizations Use Data Warehouses and Data Marts to


Acquire Data? 346
Problems with Operational Data 347
Data Warehouses Versus Data Marts 349
• Ethics Guide: Unseen Cyberazzi 350

Q9-4 How Do Organizations Use Reporting Applications? 352


Basic Reporting Operations 352
Contents xix

RFM Analysis 352


Online Analytical Processing (OLAP) 353

Q9-5 How Do Organizations Use Data Mining Applications? 356


Unsupervised Data Mining 356
Supervised Data Mining 357
Market-Basket Analysis 357
Decision Trees 359

Q9-6 How Do Organizations Use BigData Applications? 360


MapReduce 360
• So What? BI for Securities Trading? 361
Hadoop 362

Q9-7 What Is the Role of Knowledge Management Systems? 363


What Are Expert Systems? 364
What Are Content Management Systems? 365
What Are the Challenges of Content Management? 365
What Are Content Management Application Alternatives? 366
How Do Hyper-Social Organizations Manage Knowledge? 367
Hyper-Social KM Alternative Media 367
Resistance to Knowledge Sharing 368

Q9-8 What Are the Alternatives for Publishing BI? 368


Characteristics of BI Publishing Alternatives 368
What Are the Two Functions of a BI Server? 369

Q9-9 2026? 370


• Security Guide: Semantic Security 372
• Guide: Data Mining in the Real World 374
Case Study 9: Hadoop the Cookie Cutter 379

Part 4: Information Systems


Management

10: InforMaTIon SySTeMS SeCUrITy 385

Q10-1 What Is the Goal of Information Systems Security? 388


The IS Security Threat/Loss Scenario 388
What Are the Sources of Threats? 389
What Types of Security Loss Exist? 390
Goal of Information Systems Security 392

Q10-2 How Big Is the Computer Security Problem? 393

Q10-3 How Should You Respond to Security Threats? 394

Q10-4 How Should Organizations Respond to Security Threats? 396


• So What? New from Black Hat 2014 397
xx Contents

Q10-5 How Can Technical Safeguards Protect Against Security


Threats? 399
Identification and Authentication 399
• Ethics Guide: Securing Privacy 400
Single Sign-on for Multiple Systems 402
Encryption 402
Firewalls 403
Malware Protection 404
Design for Secure Applications 406

Q10-6 How Can Data Safeguards Protect Against Security Threats? 406

Q10-7 How Can Human Safeguards Protect Against Security


Threats? 407
Human Safeguards for Employees 407
Human Safeguards for Nonemployee Personnel 409
Account Administration 410
Systems Procedures 411
Security Monitoring 412

Q10-8 How Should Organizations Respond to Security Incidents? 413

Q10-9 2026? 414


• Security Guide: EMV to the Rescue 416
• Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts 418
Case Study 10: Hitting the Target 422

11: InforMaTIon SySTeMS


ManaGeMenT 427

Q11-1 What Are the Functions and Organization of the IS


Department? 429
How Is the IS Department Organized? 430
Security Officers 431
What IS-Related Job Positions Exist? 431

Q11-2 How Do Organizations Plan the Use of IS? 433


Align Information Systems with Organizational Strategy 433
• So What? Managing the IS Department 434
Communicate IS Issues to the Executive Group 435
Develop Priorities and Enforce Them Within the IS Department 435
Sponsor the Steering Committee 435

Q11-3 What Are the Advantages and Disadvantages of


Outsourcing? 435
• Ethics Guide: Privacy Versus Productivity: The BYOD Dilemma? 436
Outsourcing Information Systems 438
International Outsourcing 439
What Are the Outsourcing Alternatives? 440
What Are the Risks of Outsourcing? 440
Contents xxi

Q11-4 What Are Your User Rights and Responsibilities? 443


Your User Rights 443
Your User Responsibilities 444

Q11-5 2026? 444


• Security Guide: Selling Privacy 446
• Guide: Is Outsourcing Fool’s Gold? 448
Case Study 11: iApp$$$$ 4 U 452

12: InforMaTIon SySTeMS


develoPMenT 455

Q12-1 How Are Business Processes, IS, and Applications


Developed? 457
How Do Business Processes, Information Systems, and Applications Differ and
Relate? 458
Which Development Processes Are Used for Which? 459

Q12-2 How Do Organizations Use Business Process Management


(BPM)? 460
Why Do Processes Need Management? 461
What Are BPM Activities? 462

Q12-3 How Is Business Process Modeling Notation (BPMN) Used to


Model Processes? 463
Need for Standard for Business Processing Notation 464
Documenting the As-Is Business Order Process 465

Q12-4 What Are the Phases in the Systems Development Life


Cycle (SDLC)? 467
Define the System 468
• Ethics Guide: Estimation Ethics 470
Determine Requirements 472
Design System Components 474
System Implementation 474
Maintain System 476

Q12-5 What Are the Keys for Successful SDLC Projects? 477
Create a Work Breakdown Structure 477
Estimate Time and Costs 477
Create a Project Plan 478
Adjust Plan via Trade-offs 480
Manage Development Challenges 481

Q12-6 How Can Scrum Overcome the Problems of the SDLC? 483
What Are the Principles of Agile Development Methodologies? 483
• So What? Using This Knowledge for Your Number-One Priority 484
What Is the Scrum Process? 485
How Do Requirements Drive the Scrum Process? 487
xxii Contents

Q12-7 2026? 489


• Security Guide: Psst. There’s Another Way, You Know . . . 492
• Guide: The Final, Final Word 494
Case Study 12: When Will We Learn? 499

The International Dimension 502


Application Exercises 520
Glossary 538
Index 555
Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
PrefaCe

In Chapter 1, we claim that MIS is the most important class in the business curriculum. That’s a
bold statement, and every year we ask whether it remains true. Is there any discipline having a
greater impact on contemporary business and government than IS? We continue to doubt there
is. Every year brings important new technology to organizations, and many of these organizations
respond by creating innovative applications that increase productivity and otherwise help them
accomplish their strategies.
Over the past year, we’ve seen the largest IPO in history ($25 billion) come from e-commerce
giant Alibaba. Amazon revealed that it’s using an army of Kiva robots to increase productivity in
its fulfillment centers by 50 percent. And we’ve seen an unprecedented flurry of IoT smart devices
aimed at personal, home, and automobile automation services hit the market. It seems like every
industry is running full tilt toward the smart door. Technology is fundamentally changing the
way organizations operate. It’s forcing them to be more productive, innovative, and adaptable.
Even innovations that we’ve known about for several years took big leaps forward this year.
MakerBot made huge strides in 3D printing by introducing new composite filaments that can
print materials that look just like wood, metal, and stone—not just plastics. Mercedes-Benz was
the hit of CES 2015 when it debuted its new driverless F 015 car with saloon-style doors, complete
touch-screen interface, and front-room seating. And Google announced it was deploying 25 of its
driverless cars around Mountain View, California, starting in summer 2015.
Large-scale data breaches were a major problem again this year. eBay, Home Depot, JP
Morgan Chase, and Anthem all suffered enormous data losses. Sony Pictures lost more than 100
TB of confidential corporate data, and Apple lost hundreds of explicit celebrity photos to hackers.
And these are just a fraction of the total number of organizations affected this year.
In addition, normal revisions were needed to address emergent technologies such as cloud-
based services, mobile devices, innovative IS-based business models like that at zulily, changes in
organizations’ use of social media, and so on.
More sophisticated and demanding users push organizations into a rapidly changing future—
one that requires continual adjustments in business planning. To participate, our graduates need
to know how to apply emerging technologies to better achieve their organizations’ strategies.
Knowledge of MIS is critical. And this pace continues to remind us of Carrie Fisher’s statement
“The problem with instantaneous gratification is that it’s just not fast enough.”

Why This Ninth Edition?


The changes in this ninth edition are listed in Table 1. Substantial changes were made in Chapter 1
to strengthen the argument that MIS is the most important course in the business curriculum. The
chapter now looks at the Digital Revolution and the exponential change happening to technology. It
discusses how digital devices are changing due to increased processing power (Moore’s Law), connec-
tivity (Metcalfe’s Law), network speed (Nielsen’s Law), and storage capacity (Kryder’s Law). It then
gives examples of how new technology creates entirely new types of businesses and forces existing
businesses to change the way they operate.
Chapter 1 also includes new salary data projections from the Bureau of Labor Statistics
through 2022. These salary projections cover pay ranges for typical information systems jobs,
general business occupations, and managerial-level positions.
xxiii
xxiv Preface

Table 1: ChanGeS In The nInTh edITIon


Chapter Change Chapter Change
1 New Falcon Security Part 1 introduction 6 Added discussion of new net neutrality regulations
1 New Falcon Security chapter introduction 6 Added discussion about personal area networks
1 New So What? Feature: Biggest IPO Ever: Alibaba (PANs) and Bluetooth

1 Updated industry statistics throughout the chapter 6 Updated statistics and AWS offerings

1 New Q1-1 covering the Information Age, Digital 7 Updated ERP vendor rankings and comments
Revolution, and power of exponential change 7 Added new technology as a fifth implementation
1 New discussion about the forces pushing digital challenge
change: Bell’s Law, Moore’s Law, Metcalfe’s Law, 7 Added discussion of the effect of mobility, security
Nielsen’s Law, and Kryder’s Law threats, and the Internet of Things on enterprise
1 New Q1-2 looking at the way changes in technology applications in a new 2026? discussion
will affect student’s future job security 8 New Ethics Guide: Synthetic Friends
1 New statistics about projected technology job 8 New Security Guide: Digital Is Forever
growth from BLS 8 New discussion about the use of social media in
1 Combined discussion about MIS, IS, and IT recruiting
1 Updated 2026? discussion in Q1-7 8 Expanded discussion of social capital using a
2 New Falcon Security chapter introduction YouTube channels example

2 New So What? Feature: Augmented Collaboration 8 Expanded discussion of mobile ad spending

2 New Security Guide: Evolving Security 8 Updated social media statistics throughout the
chapter
2 Updated terms Microsoft Lync to Skype for
Business, Google Grid to Google Drive, Microsoft 9 Included latest CEO surveys on the importance
Web Apps to Microsoft Office Online, SkyDrive to of BI
OneDrive, Hotmail to Outlook.com 9 Replaced predictive policing example with reporting
2 Updated instructions and images for Google Drive application in medicine

3 New Falcon Security chapter introduction 9 Updated parts analysis example to remove AllRoad
Parts and keep the example anonymous
3 New So What? Feature: Driving Strategy
9 New So What? exercise about BI for securities
3 New Security Guide: Hacking Smart Things trading
3 New five forces, value chain, and business process 9 Updated Web trends, HD Insight description, and
examples using Falcon Security 2026? discussion
3 Updated statistics in the chapter and Amazon case 10 New So What? Feature: New from Black Hat 2014
study
10 New Security Guide: EMV to the Rescue
4 New Falcon Security chapter introduction
10 New discussion of notable APTs
4 New So What? Feature: New from CES 2015
10 Updated security statistics and figures throughout
4 New Ethics Guide: Free Apps for Data the chapter
4 Updated industry statistics throughout 10 New discussion of ransomware
4 New discussion about augmented reality hardware 10 New discussion of recent large-scale data breaches
4 Updated developments in 3D printing, self-driving 11 New Security Guide: Selling Privacy
cars, and IoT
11 New Ethics Guide: Privacy Versus Productivity: The
4 Updated terms Internet Explorer to Edge, Windows BYOD Dilemma
8 to Windows 10
11 Updated IS jobs, descriptions, and salary data
5 New Falcon Security chapter introduction
12 New So What? Feature: Using This Knowledge for
5 New justification for learning database technology Your Number-One Priority
5 Updated E-R notation for minimum cardinality to 12 Revised 2026? discussion
conform to contemporary usage
Appl Ex New exercise using open source software
5 New Q5-7 about the possibility of Falcon Security (LibreOffice)
maintaining video metadata in a database
Appl Ex New exercise using software to compress and
5 New discussion of NewSQL and in-memory DBMS encrypt files (7-Zip)
5 New Collaboration Exercise International New discussion of localization using IBM’s Watson
6 New Falcon Security chapter introduction Dimension
6 New So What? Feature: Net Neutrality Enabled International Expanded discussion of EU’s “right to be forgotten”
Dimension law
6 New Security Guide: From Anthem to Anathema
Random documents with unrelated
content Scribd suggests to you:
Hilton, Pte. H.
Hindle, Pte. A.
Hodgkinson, Pte. J. C.
Hodgson, Pte. D. T.
Hodson, Pte. W.
Holden, Pte. J.
Holden, Pte. S. H.
Holdworth, Pte. N.
Holgate, Pte. T.
Holland, Pte. E. P.
Holland, Pte. J.
Holt, Pte. G.
Holt, Pte. H.
Hook, Sgt. A.
Hoolahan, Pte. J. H.
Horrocks, Pte. W.
Horsfield, Pte. W.
Houghton, Pte. R. C.
Howarth, Pte. J. C.
Howarth, Pte. J. E.
Howarth, Pte. R.
Howarth, Pte. R.
Howarth, Pte. W.
Howorth, Pte. O.
Hughes, Pte. H.
Hunter, Pte. W.
Hutchings, Pte. W.
Ingham, Pte. J. H.
Jackson, Pte. R. W.
Johnson, L.-Sgt. G.
Johnston, Pte. J. W.
Jones, L.-Sgt. H.
Kay, Pte. H.
Kay, L.-Sgt. W.
Kennerley, L.-Cpl. W.
Kent, L.-Sgt. G.
Kenyon, L.-Sgt. G.
Keown, Pte. C.
Kershaw, Pte. W.
Key, Pte. W.
Killean, Pte. J.
Killean, Pte. J.
Kirkman, Sgt. S.
Lane, Pte. C.
Law, Pte. G.
Lawless, Pte. F. G.
Laycock, Pte. E.
Leatherbarrow, Pte. E.
Leaver, Pte. A.
Lee, Pte. H.
Lee, Pte. T. W.
Leonard, Pte. G.
Leyland, Pte. F.
Lightbown, Pte. J.
Livesey, C.Sgt.-Mjr. P.
Lockett, Pte. H.
Lockett, Pte. T. W.
Lord, Pte. E.
Lord, C.Q.M.Sgt. G. H.
Lowe, Pte. C.
Lowe, Pte. R. J.
Lucas, Pte. J.
Lynch, Pte. M.
Magnall, Sgt. J.
Maloney, Pte. J.
Marsden, Pte. J.
Marsland, Pte. H.
Maschiter, Pte. R.
Maslin, Pte. W.
Masterson, Pte. J.
Mather, Pte. W.
Maymond, Pte. F.
McClelland, Pte. J. H.
McDonald, Pte. M.
McGrath, Pte. G. H.
McHugh, Sgt. P.
Messenger, Pte. J.
Metcalf, Pte. W.
Mills, Pte. D. H.
Milner, Pte. J. H.
Mitchell, Pte. O. J.
Molloy, Dmr. S.
Moore, Pte. G.
Moore, Pte. T.
Moore, Pte. W.
Moran, Pte. W.
Morgan, Pte. H.
Morton, Sgt. J.
Murgatroyd, Pte. F.
Murphy, Pte. J.
Murphy, Pte. W.
Murray, Pte. G.
Nightingale, Pte. M.
Ninness, Pte. J.
Nuttall, Pte. H.
Nutter, Pte. W.
O’Brien, Pte. D.
Orr, Pte. J.
Owen, Pte. H.
Parkin, Pte. G. R.
Parkinson, Pte. T.
Parkinson, Pte. T.
Parkinson, Pte. W. F.
Payne, Sgt. R.
Peach, Pte. J.
Pearce, Pte. C.
Pearson, Pte. J. E.
Pedley, Pte. W.
Pennington, Pte. C.
Pettifer, Pte. W. S.
Pickles, Pte. A.
Pickup, Pte. J. J.
Pickup, Pte. R.
Piercy, Pte. H. A.
Pilkington, Pte. A. V.
Pinder, Pte. J. E.
Pinder, Pte. R.
Powell, Pte. T.
Pratt, Cpl. W.
Procter, Pte. E.
Proctor, Pte. H.
Proctor, Pte. J. H.
Pyle, Pte. G. S.
Quinn, Pte. S.
Ralston, Cpl. P.
Rawstron, Pte. F.
Redman, Pte. H.
Reed, Pte. J.
Richardson, Pte. C.
Rickard, Pte. H.
Riley, Pte. E.
Riley, Pte. J. H.
Riley, Pte. W.
Riley, Pte. W.
Robertshaw, Pte. R.
Robinson, L.-Cpl. J.
Robinson, Pte. J.
Robinson, Pte. R.
Robinson, Pte. W.
Rothwell, Pte. R. H.
Rowley, Pte. H.
Rushton, Sgt. F. W.
Rushton, Pte. H.
Sargeant, Pte. C. W.
Saunders, Pte. A.
Savage, Pte. J.
Scales, Pte. W. T.
Scott, Pte. A.
Scott, Pte. H.
Sellings, Pte. E. V.
Shapcott, Pte. A.
Shapcott, Dmr. W.
Sharples, Pte. J.
Simpson, Pte. J.
Sisson, Pte. J.
Slater, Pte. L.
Smallshaw, Pte. W. T.
Smith, Pte. E.
Smith, Pte. R.
Smith, Pte. R.
Smithies, Pte. R.
Snape, Pte. J. H.
Sockett, L.-Cpl. J.
Spencer, Pte. J. S.
Stanton, Pte. M.
Starkie, Pte. H.
Starmer, Pte. H.
Steele, Pte. A.
Stride, Pte. G. H.
Stott, Pte. J. T.
Sugden, C.Sgt.-Mjr. J. W.
Sutcliffe, Cpl. H.
Sykes, Pte. D.
Tattersall, Pte. T. A.
Tattersall, Pte. W.
Taylor, Pte. F.
Taylor, Cpl. F. J.
Taylor, Pte. J.
Teasdale, L.-Sgt. J. F.
Thompson, Pte. C. F.
Thornber, Pte. B.
Thornber, L.-Cpl. W.
Thornton, Pte. T.
Thorpe, Pte. T.
Thwaites, Pte. T.
Tillotson, Pte. W.
Tomlinson, Pte. J.
Towers, Pte. H.
Towler, Pte. E.
Townsend, Pte. A.
Truman, Pte. F.
Turner, Sgt. S.
Usher, Pte. J.
Wadsworth, C.Q.M.Sgt. A.
Wall, Pte. G.
Walker, Pte. J.
Walker, Pte. W.
Walmsley, Pte. J.
Walton, Pte. J. E.
Walton, Pte. R.
Ward, Sgt. A.
Ward, Pte. F.
Ward, Pte. W.
Watson, Pte. J.
Watson, Pte. O.
Weston, Pte. J. E.
Whipp, Pte. J.
Whisker, Pte. H.
Whitehead, Pte. A.
Whitehead, Pte. J.
Whitehead, Pte. J. W.
Whittaker, Pte. F.
Wilkinson, Sgt. J., D.C.M.
Williamson, Pte. J.
Wilson, Pte. P.
Wilson, Pte. R.
Winder, Pte. R.
Wollett, Pte. G.
Wolstenholme, Sgt. H.
Woodhead, Pte. L.
Wormwell, Pte. J.
Worsfold, Pte. W. C.
Wright, Pte. E.
Yates, Pte. G.

1/9 BATTALION MANCHESTER REGIMENT


Officers

Anderson, Mjr. W. J.
Archbutt, Mjr. W. H.
Hilton, Mjr. A.
Hamer, Capt. F.
Sugden, Capt. H.
Cooke, Lieut. C. E., M.C.
Marsden, Lieut. P. S.
Porter, Lieut. S.
Wade, Lieut. J. M.
Dearnaley, 2nd Lieut. I.
Dixon, 2nd Lieut. H. F.
Freedman, 2nd Lieut. B.
Hudson, 2nd Lieut. A. H.
Jones, 2nd Lieut. F.
Robson, 2nd Lieut. J. M.
Stringer, 2nd Lieut. A. E.
Woodhouse, 2nd Lieut. P. A.

Other Ranks

Adshead, Pte. W.
Andrew, Pte. J. W.
Appleby, Cpl. J. E.
Ashcroft, L.-Cpl. T.
Atkin, Pte. B.
Bailey, Pte. M.
Ballagher, Pte. J.
Ballard, Pte. F.
Bardsley, Pte. J.
Barker, Pte. J.
Barker, Pte. M.
Barker, Pte. W.
Barrett, L.-Cpl. H.
Bates, Pte. J.
Bell, Pte. G.
Bell, Pte. J.
Bennett, Pte. H.
Bennett, Pte. J.
Bertenshaw, L.-Cpl. J.
Birchall, C.Sgt.-Mjr. W.
Blaize, Pte. T.
Blandford. L.-Cpl. J.
Bolter, Cpl. H.
Booth, Pte. A.
Booth, Pte. C.
Booth, Pte. C.
Bourne, Pte. W.
Bowker, Pte. E.
Bown, Pte. F.
Bradbury, Pte. H.
Bradbury, Pte. W.
Brady, Pte. J.
Braithwaite, Sgt. N. D.
Brammall, Pte. W.
Bridge, Pte.
Broadbent, Pte. J.
Brough, Pte. J.
Brown, Pte. J. H.
Buckley, Pte. S.
Burgess, L.-Cpl. A.
Burgess, Pte. R.
Burke, L.-Cpl. W.
Butler, Pte. T.
Cain, Pte. G. F.
Campbell, Pte. R.
Carr, Pte. T. A.
Chadderton, Pte. E.
Chadwick, Pte. H.
Chapman, Pte. J.
Christian, Pte. H.
Clarkson, Pte. F.
Clegg, Pte. H.
Clegg, Pte. W.
Coffey, Pte. J.
Connolly, Pte. J. H.
Cooke, Dmr. H.
Cooper, Pte. J. H.
Crane, Pte. J.
Crompton, L.-Cpl. J.
Cuppello, Cpl. J.
Cusick, Pte. B.
Daley, Pte. J.
Daley, Pte. J. W.
Doran, Pte. T.
Downs, Pte. J.
Dyson, Pte. F.
Earle, Sgt. H.
Earnshaw, L.-Cpl. E.
Elliott, Pte. H.
Evans, Pte. T.
Eyre, Sgt. G.
Farnley, Pte. J.
Favier, Pte. F.
Fielding, Pte. T.
Finiucane, Pte.
Finnigan, Pte. J.
Foden, Pte. W. S.
Forrester, Pte. W. B.
Foster, Pte. R.
Garside, Pte. E.
Garside, Pte. H.
Garside, Pte. P.
Gaskell, Pte. T.
Gee, Pte. A.
Gee, Pte. J.
Gibson, Cpl. C.
Gibson, Cpl. H.
Gibson, L.-Cpl. H.
Gibson, Cpl. R.
Godding, Pte. A. V.
Gorman, Pte. T.
Green, Pte. A.
Green, Pte. E.
Green, Pte. H.
Green, L.-Cpl. S.
Gregory, Pte. H.
Gunnell, Pte. F.
Hague, Pte. A.
Hague, Pte. J.
Hall, Pte. T.
Hall, Pte. T.
Hamer, Pte. W. H.
Handley, Cpl. R.
Hanley, Pte. W.
Hanson, Pte. F.
Hardman, Pte. T.
Hare, Pte. A.
Harling, Pte. A. G.
Harrison, Pte. H.
Harrison, Pte. T.
Haughton, Pte. G.
Heinemann, Pte. E.
Heginbottom, Pte. J.
Herod, L.-Cpl. G.
Hibbert, Pte. E.
Higgins, Pte. C.
Higham, L.-Sgt. T.
Hodgkiss, Pte. E.
Hollingworth, L.-Cpl. J.
Hopkins, Pte. H.
Howard, Pte. J.
Hudson, Pte. G. W.
Hughes, Cpl. J.
Hughes, Pte. T.
Humphreys, Pte. C. H.
Illingworth, Sgt. H.
Jackson, Pte. F.
Jenkinson, Pte. J.
Jenneys, Pte. J. W.
Jevons, Pte. J. W.
Jones, Pte. A.
Jones, Pte. E.
Jones, Pte. F.
Jones, Pte. J.
Jones, Pte. O.
Jubb, Pte. J.
Kellett, Pte. S.
Kelly, Pte. E.
Kenyon, Pte. H.
Kerr, Pte. J.
Kerrick, Pte. H. H.
Lawton, Sgt. J.
Lawton, Pte. J.
Lee, Pte. F.
Lee, Sgt. T. H.
Leech, Pte. W.
Leech, Pte. W.
Lewis, Pte. A.
Lilley, Pte. W.
Lindley, Pte. J.
Lomas, Sgt. T.
Lord, Pte. H.
Lord, Pte. S.
Love, Pte. J.
Lunn, Pte. H.
Margreave, Pte. E.
Markham, Pte. J.
Marland, Dmr. A.
Martin, Pte. J.
Martyn, Pte. E.
Mason, L.-Cpl. W.
Massey, L.-Cpl. G.
Mather, Pte. S.
Mather, Pte. W.
Matthews, Cpl. H.
McClusky, Pte. R.
McDonald, Pte. J.
McDonnell, Pte. F.
Metcalfe, Pte. A.
Millar, Pte. L. S.
Mitcheson, Cpl. W.
Molyneaux, Pte. A.
Morris, Pte. J. H.
Moss, Pte. T.
Mycock, Pte. F.
Nally, Pte. W.
Newton, Pte. E.
Newton, Pte. H.
Nicholson, Pte. P.
Noonan, Pte. G.
Norman, Pte. T.
Nuttall, Pte. W.
O’Connor, Pte. J. J.
Ogden, Pte. H.
Ogden, Pte. S.
Oldfield, L.-Cpl. F.
Pearson, Pte. S.
Penny, Pte. T.
Portington, Pte. T.
Postle, Pte. W.
Potter, Pte. H.
Potts, Pte. W.
Poulston, Pte. P.
Pridham, Pte. W.
Rawlings, Pte. B.
Redfern, Pte. M.
Reyner, Pte. J.
Ridings, Pte. P.
Robinson, Pte. E.
Robson, Pte. G.
Rogan, Pte. M.
Rowbottom, Pte. J.
Ryder, Pte. J.
Ryding, Pte. H.
Schofield, Pte. R.
Sellers, Pte. J.
Sellers, Pte. J. E.
Shatwell, Pte. B.
Shepherd, Pte. F.
Sheridan, Pte. A.
Shuttleworth, Pte. W.
Sidebottom, Pte. H.
Sinclair, Pte. W.
Skirvin, Pte. E.
Smith, Pte. A.
Smith, Pte. C.
Smith, Pte. E.
Smith, Pte. F.
Smith, Pte. F.
Smith, Pte. I.
Smith, Pte. J.
Smith, Pte. J. W.
Smith, Pte. T.
Smith, Cpl. W.
Snape, Pte. A.
Speddings, Pte. J.
Spurrett, Cpl. A.
Stelfox, Pte. S.
Stevens, Pte. S.
Stones, Pte. P.
Stott, Pte. R.
Strutt, Pte. S.
Summersgill, Pte. J.
Swain, Pte. J. E.
Travis, Pte. J.
Taylor, Sgt. J.
Taylor, Pte. P.
Tetlow, Pte. J.
Thomas, Pte. R. A. L.
Thompson, Pte. B.
Thompson, Pte. H.
Thompson, Pte. J.
Tilbury, Pte. P.
Tindall, Pte. J.
Townley, Pte. W.
Turner, Pte. C.
Varey, Pte. R.
Walker, Pte. G. H.
Walker, Pte. G. H.
Walker, Pte. J.
Walker, Pte. J.
Walker, Pte. J.
Walley, Pte. S.
Watson, Pte. P.
Watson, Pte. S.
Welford, Pte. C. J.
Wilde, Cpl. J.
Wilde, Pte. J.
Williamson, Pte. E.
Wilshaw, Pte. J.
Wood, Pte. H.
Worsley, Pte. G.
Wrigley, Pte. A.
Wyatt, Dmr. F.

1/10 BATTALION MANCHESTER REGIMENT

Officers

Lewis, Lt.-Col. R. P.
Baird, Capt. L. B.
Owen, Capt. G. W.
Speelman, Capt. H. L. I.
Cook, Lieut. F. E.
Cooper, Lieut. C. M.
Clegg, Lieut. J.
Clegg, Lieut. J. H.
Griffiths, Lieut. F. N. G.
Norris, Lieut. W. J.
Shaw, Lieut. W. D.
Thorley, Lieut. G.
Ashcroft, 2nd Lieut. R. G. L.
Elliott, 2nd Lieut. F. P.
Emmott, 2nd. Lieut. J. B.
Gregory, 2nd Lieut. S.
Kirk, 2nd Lieut. T.
Nevinson, 2nd Lieut. H. K. B.
Stott, 2nd Lieut. J.
Wilson, 2nd Lieut. T. L.

Other Ranks

Adams, L.-Cpl. R.
Addyman, Dmr. W.
Allen, Pte. H. S.
Alty, Pte. H.
Ambrose, Pte. G. G.
Anderson, Pte. H.
Anderton, Pte. J. C.
Andrew, Pte. S.
Arundale, Pte. J.
Ashton, Pte. P.
Ashton, Pte. W.
Aspen, Pte. A.
Aspin, L.-Cpl. J.
Bailey, Pte. A.
Bailey, Pte. H.
Bailey, Pte. H.
Bailey, L.-Cpl. J.
Bairstow, Pte. S.
Bakewell, Pte. H.
Bamford, Pte. J.
Bannister, Pte. C.
Bannister, Pte. H. S.
Bardsley, Pte. J.
Bardsley, Pte. J.
Barker, Pte. A.
Barker, L.-Cpl. C.
Barlow, Pte. J.
Barnes, Pte. J.
Barratt, Pte. S.
Bates, Pte. E.
Bates, Pte. J.
Bayley, Pte. G.
Beaumont, L.-Cpl. T. E.
Beever, Pte. B.
Belshaw, Pte. J.
Belshaw, Pte. W. H.
Bennett, Pte. A. E.
Berry, Pte. J. L.
Betterley, Pte. G.
Biram, L.-Cpl. H.
Black, Dmr. T.
Blains, L.-Cpl. T.
Blainey, Pte. D.
Bliss, L.-Cpl. J.
Bocking, Pte. W.
Booth, Pte. S.
Bould, Pte. J.
Bowden, Sgt. F.
Bowman, Pte. J.
Boxwell, L.-Cpl. J. D.
Boyd, Pte. W.
Boyle, Cpl. J.
Bradley, Pte. H.
Brennan, Pte. F.
Brierley, Pte. J.
Briggs, Pte. H.
Brooks, Pte. W. G.
Brown, Pte. E.
Brown, Pte. E.
Brown, Pte. G.
Brownbill, Pte. R.
Buckley, Cpl. J. N.
Buckley, Pte. W.
Burke, Pte. J. C.
Burgess, Pte. J.
Burgess, Pte. R.
Bushell, Pte. C.
Byrne, Pte. J.
Cadman, Pte. J.
Calvert, Pte. H.
Carrington, Pte. E.
Carter, Pte. W.
Cartledge, Pte. G.
Chadwick, Pte. M.
Chappell, Pte. J.
Chandley, Pte. G.
Charleswood, Pte. J.
Charnley, Pte. J. E.
Cheetham, Pte. T.
Chester, Pte. H.
Claber, L.-Cpl. T.
Claber, Pte. T.
Clark, Pte. H.
Claney, Pte. J.
Clarkson, Pte. J.
Clegg, Pte. H.
Clegg, Pte. P.
Clegg, Pte. P.
Clutton, Sgt. H.
Coates, Pte. J.
Coleman, Cpl. J.
Coles, L.-Cpl. C. E. J.
Collinge, Pte. H.
Connolly, Pte. A.
Cook, Pte. W.
Cook, Pte. G. H.
Cookes, Pte. C. C.
Cooper, Pte. J.
Coppins, Pte. F. J.
Cotterell, Pte. R. L.
Coyne, Pte. R.
Crawshaw, Pte. G.
Creek, Pte. L.
Crewe, L.-Cpl. T. H.
Crompton, Pte. R.
Crossley, Pte. F.
Culshaw, Pte. R.
Currie, Pte. J.
Currie, Pte. W.
Dalton, Pte. A.
Daly, Pte. J.
Darlington, Pte. E.
Davies, Pte. M. H. J.
Dawes, Pte. J. W.
Dean, Dmr. C.
Dinkwater, Sgt. E.
Dobson, Pte. W.
Dodgson, Pte. F.
Doran, Pte. J.
Drabble, Pte. F.
Drayton, Pte. G.
Dunkerley, C.Sgt. Mjr. F.
Dyson, Pte. T.
Dyson, Pte. W.
Eastwood, Pte. H.
Edwards, Pte. R.
Ellery, Pte. A.
Elson, Pte. E.
Elson, Pte. T.
Etchells, Pte. F.
Etchells, Pte. J.
Evans, L.-Cpl. J.
Ewers, Pte. G.
Exley, Pte. H.
Fallows, L.-Cpl. S.
Fannon, Pte. T.
Finlan, Pte. H. A.
Finney, Pte. A.
Fitton, Pte. E.
Fitton, Pte. J.
Fitzgerald, Pte. G.
Fizzard, Pte. A.
Fleetham, Cpl. G.
Fletcher, Pte. A.
Fletcher, Pte. J. E.
Fletcher, Pte. J. W.
Fletcher, Pte. L.
Foden, Pte. S. B.
Ford, Pte. J.
Francis, Cpl. F.
Frost, L.-Cpl. W.
Gales, L.-Cpl. M. H.
Gardiner, Sgt. J.
Gibson, Pte. W.
Gledhill, Pte. H. C.
Goldsby, Pte. J.
Goodier, Pte. J.
Goodier, Pte. W.
Gorbett, L.-Cpl. F.
Grady, L.-Cpl. A.
Greaves, Pte. A.
Greaves, Pte. L.
Greaves, Pte. W.
Green, Pte. J. A.
Greenwood, Pte. F.
Greenwood, Cpl. J.
Greenwood, Pte. W.
Gregson, L.-Cpl. J. H.
Grundy, Pte. H. B.
Hadfield, Cpl. F.
Hadfield, Pte. J. W.
Hadfield, Pte. J. A.
Hadfield, Pte. W.
Hague, Pte. A.
Hague, Pte. G.
Hague, Pte. T.
Hall, Pte. J.
Hallam, Pte. J.
Hardman, L.-Cpl. S.
Hargreaves, Pte. A.
Hargreaves, Pte. F.
Harrison, Pte. J.
Harrison, L.-Cpl. S. H.
Harrop, L.-Cpl. J.
Hayes, Pte. G.
Healey, Pte. D.
Henthorn, Pte. H.
Hewitt, Pte. W.
Heywood, Pte. R. W.
Highton, Pte. H.
Hilton, Cpl. J.
Hinchcliffe, Sgt. H.
Hitchen, Pte. A.
Holden, Pte. J.
Holden, Pte. S.
Holland, Pte. H.
Holmes, Pte. E.
Holmes, Pte. J. E.
Holt, Pte. W.
Holt, Pte. G.
Hornby, Pte. W.
Horton, L.-Cpl. E. M.
Howard, Pte. C.
Howard, Pte. O.
Hoyle, Pte. F.
Hufton, Sgt. W.
Humphreys, Pte. J. C. R.
Hutchins, Pte. E.
Huxley, Pte. H.
Isherwood, Pte. J.
Jackson, Pte. H.
Jackson, Pte. J.
Jackson, Pte. J.
Jackson, Pte. J. W.
Johnson, Sgt. E.
Johnson, Pte. J. J.
Jones, L.-Cpl. E.

You might also like