© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.

Slides:



Advertisements
Similar presentations
1 CHAPTER 13 Information Technology for Business Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Internet, Intranet and Extranets
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Business Essentials, 8th Edition Ebert/Griffin
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
13 chapter Business Essentials, 7 th Edition Ebert/Griffin © 2009 Pearson Education, Inc. Information Technology for Business Instructor Lecture PowerPoints.
Basic Data Communication
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Noor Al-Hareqi.
Communications & Networks
1 NETWORKS AND COMMUNICATIONS Chapter Four. Communications Computer communication describes a process in which two or more computers or devices transfer.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
The Office Procedures and Technology
13 chapter Business Essentials, 7 th Edition Ebert/Griffin © 2009 Pearson Education, Inc. Information Technology for Business Instructor Lecture PowerPoints.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 12 Managing Information Systems and Communications.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Business Essentials 9e Ebert/Griffin Information Technology for Business chapter thirteen.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Unit 1—Computer Basics Lesson 7 Networks.
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
Exploring the Network.
Using Technology to Manage Information Chapter 14.
NETWORKS.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
© Prentice Hall, 2007Excellence in Business, 3eChapter Business at the Speed of Light: Information Technology and E-Commerce.
Living Online Module Lesson 23 — Networks and Telecommunication
Using Technology to Manage Information
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
1 Chapter 8 Communications & Networks. Objectives Overview Discuss the purpose of the components required for successful communications Describe these.
PowerPoint Presentation by Charlie Cook The University of West Alabama Business Essentials Ronald J. Ebert Ricky W. Griffin Managing Information 55 6e.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Business Essentials 9e Ebert/Griffin Information Technology for Business chapter thirteen.
Chapter 1: Explore the Network
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2015 Pearson Education, Inc # Information Technology (IT) for Business.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
Chapter 1: Explore the Network
Information Technology (IT) for Business
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Edited by : Noor Al-Hareqi
Using Technology to Manage Information
Chapter 1: Explore the Network
Information Technology (IT) for Business
BUS 211 Principle of Business Management
Edited by : Noor Al-Hareqi
Information Technology (IT) for Business
Edited by : Noor Al-Hareqi
Information Technology for Business
Copyright 2005 Prentice- Hall, Inc.
By Hussein Alhashimi.
Information Technology and E-Commerce
Information Technology (IT) for Business
Presentation transcript:

© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business

© 2007 Prentice Hall, Inc. All rights reserved.13–2 L E A R N I N G O U T C O M E S After reading this chapter, you should be able to: Discuss the impacts information technology has had on the business world. Identify the IT resources businesses have at their disposal and how these resources are used. Describe the role of information systems, the different type of information systems, and how businesses use such systems. Identify the threats and risks information technology poses on businesses. Describe the ways in which businesses protect themselves from the threats and risks information technology poses.

© 2007 Prentice Hall, Inc. All rights reserved.13–3 What in It for Me? By understanding this chapter’s discussion on the impact of technology on business, you’ll have a clearer picture of:  How technology is used by and affects business  How, as an employee, manager, or consumer, you can use technology to your best advantage

© 2007 Prentice Hall, Inc. All rights reserved.13–4 IT Basics Information Technology (IT)  The various appliances and devices for creating, storing, exchanging, and using information in diverse modes, including visual images, voice, multimedia, and business data E-commerce (Electronic commerce)  The use of the Internet and other electronic means for retailing and business-to-business transactions

© 2007 Prentice Hall, Inc. All rights reserved.13–5 IT Impacts Creating Portable Offices  Providing remote access to instant information Enabling Better Service  Coordinating remote deliveries Creating Leaner, More Efficient Organizations  Allowing more work and customer satisfaction to be accomplished with fewer people Enabling Increased Collaboration  Using collaboration software and other IT communication devices

© 2007 Prentice Hall, Inc. All rights reserved.13–6 IT Impacts (cont’d) Enabling Global Exchange  Fostering collaboration on a worldwide scale Improving Management Processes  Using enterprise resource planning (ERP) to change the nature of the management process Providing Flexibility for Customization  Creating new manufacturing capabilities that offer customers greater variety (mass customization) and faster delivery cycles

© 2007 Prentice Hall, Inc. All rights reserved.13–7 IT Impacts (cont’d) Providing New Business Opportunities  Creating entirely new businesses where none existed before Improving the World and Our Lives  Advancing medical and diagnostic techniques

© 2007 Prentice Hall, Inc. All rights reserved.13–8 IT Building Blocks: Business Resources Internet  A gigantic system of interconnected computers of more than 100 million computers in over 100 countries World Wide Web  A standardized code for accessing information and transmitting data over the Internet

© 2007 Prentice Hall, Inc. All rights reserved.13–9 IT Building Blocks: Business Resources (cont’d) Intranets  Private internal information networks accessible only by employees Extranets  Allow outsiders limited access to internal information networks

© 2007 Prentice Hall, Inc. All rights reserved.13–10 IT Building Blocks: Business Resources (cont’d) Electronic Conferencing  Allows groups of people to communicate simultaneously from various locations via , phone, or video  Data conferencing  Video conferencing VSAT Satellite Communications  Satellite-based private network for voice, video, and data transmissions

© 2007 Prentice Hall, Inc. All rights reserved.13–11 Networks: System Architecture Computer Network  A group of two or more computers linked together by some form of cabling (fiber-optic, coaxial, or twisted wire) or by wireless technology to share data or resources such as a printer Client-Server Network Client-Server Network  Clients  The laptop or desktop computers through which users make requests for information or resources  Servers  The computers that provide the services shared by users

© 2007 Prentice Hall, Inc. All rights reserved.13–12 Types of Networks Wide Area Networks (WANs)   Computers linked over long distances Local Area Networks (LANs)  Computers linked in a smaller area, such as all of a firm’s computers within a single building Wireless Networks  Use airborne electronic signals to link computers and devices  BlackBerry system

© 2007 Prentice Hall, Inc. All rights reserved.13–13 Types of Networks (cont’d) Wi-Fi (Wireless Fidelity)  An access point that forms its own small network Wireless LAN or WLAN  A wireless local area network  WiMax (Worldwide Interoperability for Microwave Access)

© 2007 Prentice Hall, Inc. All rights reserved.13–14 Hardware and Software Hardware  Physical components such as laptops, desktops, handheld computers, keyboards, monitors, system units, and printers Software  System software  Application (productivity) software  Groupware

© 2007 Prentice Hall, Inc. All rights reserved.13–15 Information Systems: Harnessing the Competitive Power of IT Data  Raw facts and figures Information  The meaningful, useful interpretation of data Information System (IS)  A system that uses IT resources and enables managers to turn data into information for use in decision making  Information system managers  Information system managers operate the systems used for gathering, organizing, and distributing information

© 2007 Prentice Hall, Inc. All rights reserved.13–16 Leveraging Information Resources Data Warehousing  The collection, storage, and retrieval of data in electronic files Data Mining  The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information

© 2007 Prentice Hall, Inc. All rights reserved.13–17 Types of Information Systems Information Systems for Knowledge Workers  Provides resources to create, store, use, and transmit new knowledge for useful applications Information Systems for Managers  Management information systems (MIS)  Provide reports, schedules, plans, and budgets that can then be used for making decisions  Decision support systems (DSS)  Interactive systems that create virtual business models and test them with different data to see how they respond

© 2007 Prentice Hall, Inc. All rights reserved.13–18 IT Risks and Threats Hackers  Cybercriminals who gain unauthorized access to a computer or network, either to steal information, money, or property or to tamper with data  Wireless mooching  Denial of service (DOS) attacks Identity Theft  Stealing of personal information to get loans, credit cards, or other monetary benefits by impersonating the victim  Phishing  Pharming

© 2007 Prentice Hall, Inc. All rights reserved.13–19 IT Risks and Threats (cont’d) Intellectual Property Theft  Theft of a product of the mind—something produced by the intellect, with great expenditure of human effort—that has commercial value Computer Viruses, Worms, and Trojan Horses  Malicious programs that, once installed, can shut down a computer system Spyware  Software that transmits stolen personal information Spam  Widely broadcast, unsolicited

© 2007 Prentice Hall, Inc. All rights reserved.13–20 IT Protection Measures Preventing Unauthorized Access  Firewalls  Security systems with special software or hardware devices designed to keep computers safe from hackers  Components for filtering messages:  Security policy  Router

© 2007 Prentice Hall, Inc. All rights reserved.13–21 IT Protection Measures Preventing Identity Theft  Fair and Accurate Credit Transactions Act of 2005 Preventing Viruses  Anti-virus software

© 2007 Prentice Hall, Inc. All rights reserved.13–22 IT Protection Measures (cont’d) Protecting Electronic Communications  Encryption software   Works by locking an message to a unique code number (digital fingerprint) for each computer so only that computer can open and read the message Avoiding Spam and Spyware  Anti-spyware software  CAN-SPAM Act of 2006