Presentation is loading. Please wait.

Presentation is loading. Please wait.

13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Similar presentations


Presentation on theme: "13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business."— Presentation transcript:

1 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business

2 13-2 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Discuss the impacts information technology has had on the business world. Identify the IT resources businesses have at their disposal and how these resources are used. Describe the role of information systems, the different types of information systems, and how businesses use such systems.

3 13-3 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Identify the threats and risks information technology poses on businesses. Describe the ways in which businesses protect themselves from the threats and risks information technology poses.

4 13-4 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Impacts

5 13-5 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Portable Offices: Providing Remote Access to Instant Information

6 13-6 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Better Service by Coordinating Remote Deliveries

7 13-7 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Leaner, More Efficient Organizations

8 13-8 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Increased Collaboration

9 13-9 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Global Exchange

10 13-10 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving Management Processes

11 13-11 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing Flexibility for Customization

12 13-12 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing New Business Opportunities

13 13-13 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving the World and Our Lives

14 13-14 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Building Blocks: Business Resources

15 13-15 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall The Internet and Other Communication Resources

16 13-16 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Networks: System Architecture

17 13-17 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hardware and Software

18 13-18 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Information Systems: Harnessing the Competitive Power of IT

19 13-19 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Leveraging Information Resources: Data Warehousing and Data Mining

20 13-20 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Types of Information Systems

21 13-21 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Risks and Threats

22 13-22 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hackers

23 13-23 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Identity Theft

24 13-24 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Intellectual Property Theft

25 13-25 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Computer Viruses, Worms, and Trojan Horses

26 13-26 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall

27 13-27 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Spam

28 13-28 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Protection Measures

29 13-29 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Unauthorized Access: Firewalls

30 13-30 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Identity Theft

31 13-31 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Infectious Intrusions: Anti-Virus Software

32 13-32 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Protecting Electronic Communications: Encryption Software

33 13-33 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Avoiding Spam and Spyware

34 13-34 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Ethical Concerns in IT

35 13-35 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Summary of Learning Objectives

36 13-36 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall


Download ppt "13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business."

Similar presentations


Ads by Google