Presentation is loading. Please wait.

Presentation is loading. Please wait.

Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.

Similar presentations


Presentation on theme: "Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement."— Presentation transcript:

1

2 Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement available here http://www.flatworldknowledge.com/legal. No part of this work may be used, modified, or reproduced in any form or by any means except as expressly permitted under the License Agreement.

3 EXPLORING BUSINESS V. 2.0 By Karen Collins

4 CHAPTER 15 MANAGING INFORMATION AND TECHNOLOGY

5 LEARNING OBJECTIVES Define IS and identify the tasks of the IS manager Explain how IS managers capture, store, and analyze data Discuss ways IS can be designed Describe information systems for networked computers Explain how 4 networking technologies communicate Identify/discuss challenges of e-commerce

6 DATA VERSUS INFORMATION DATAINFORMATION Unprocessed factsData that has been processed, or turned into some useful form.

7 INFORMATION SYSTEM MANAGEMENT Chief Information Officer Chief Technology Officer Information Managers: –Determine information needs –Collect data –Convert data into information –Direct information

8 DIFFERING INFORMATION NEEDS Top Managers –Planning –Setting Objectives –Strategic Decisions Middle Managers –Allocate Resources –Oversee Activities First-Line Managers –Supervise Employees –Oversee Daily Operations –Coordinate Activities

9 INFORMATION NEEDS AND FLOWS

10 NEED TO SHARE INFORMATION Integrated IT Enterprise Resource Planning System

11 ERP SYSTEM

12 DATA AND DATABASES Databases Data Warehouse Data Mining –Customer Behavior –Customer Relationship Management

13 DATA MINING PROCESS

14 TYPES OF INFORMATION SYSTEMS OPERATIONS SUPPORT Transaction Processing Process Control Design and Production MANAGEMENT SUPPORT Management information Decision support Executive information ARTIFICIAL INTELLIGENCE Expert Face-recognition

15 TRANSACTION PROCESSING SYSTEM

16 DESIGN AND PRODUCTION SYSTEMS Computer-Aided Design Computer-Aided Manufacturing Computer-Integrated Manufacturing Flexible Manufacturing

17 DECISION SUPPORT SYSTEMS

18 COMPUTER NETWORKS Applications Software Local-Area Network Wide-Area Network

19 LOCAL AREA NETWORK

20 DATA COMMUNICATION NETWORKS Internet –Internet Service Providers –World Wide Web/Browsers Intranets Extranets TRANSMIT DIGITAL DATA FROM ONE COMPUTER TO ANOTHER USING WIRED AND WIRELESS COMMUNICATION CHANNELS

21 CLOUD COMPUTING Applications of cloud computing: –Software-as-a Service (SssA): Gives companies access to a large assortment of software packages. –Infrastructure-as-a-Service (IaaS): Provides users with hardware, including servers, equipment and disk space. –Platform-as-a-Service (PaaS): Provide services that enable users to develop customized web applications. PERFORMING COMPUTER TASKS USING SERVICES PROVIDED OVER THE INTERNET

22 CLOUD COMPUTING ADVANTAGESDISADVANTAGES Cost savings Speed of Delivery Scalable Employees Can Be Mobile Information Technology Staff Disruption in Internet Service Security Service Provider System Crash

23 TECHNOLOGY OF THE WEB Web Pages Web Sites Webmaster Home Page Uniform Resource Locator Web Server Search Engine

24 INTRANETS/EXTRANETS INTRANET A private network using technologies available only to employees. FIREWALL Software that controls access to an intranet. EXTRANET Intranet partially available to certain parties outside the organization

25 EXTRANET YOUR DATABASES

26 E-COMMERCE CONDUCTING BUSINESS OVER THE INTERNET

27 BUSINESS USES OF THE INTERNET Presenting Information Selling Products Distributing Digital Products Acquiring Goods/Services Virtual Company

28 ELECTRONIC DATA INTERCHANGE

29 SECURITY ISSUES IN ELECTRONIC COMMUNICATION Data Security Malicious Programs Spoofing Revenue Theft Risks to Customers Malicious Programs: –Viruses –Worms –Trojan Horses Revenue theft: –Denial of Service –Piracy

30 RISKS TO CUSTOMERS Credit-Card Theft Password Theft Invasion of Privacy

31 COOKIES

32 SECURITY AND BUILDING TRUST ENCRYPTION Process of encoding data so only individuals or computers armed with a secret key can decode it. CERTIFICATE AUTHORITY A third party verifies the identity of the responding computer and sends the user a certificate of trust in the site.

33 CAREERS IN INFORMATION MANAGEMENT Chief Information Officer Chief Technology Officer


Download ppt "Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement."

Similar presentations


Ads by Google