CHAPTER 10 MANAGING IT SYSTEMS Staying on Track. As the Business Environment Changes... Introduction Your IT systems will not take care of themselves.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Moral Character and Character Education
Steps to Success with Team National
1 Concurrency: Deadlock and Starvation Chapter 6.
1 UNIVERSITIES of AUSTRALASIA BENCHMARKING RISK MANAGEMENT BILL DUNNE DIRECTOR RISK MANAGEMENT UNSW. PROUDLY SPONSORED BY UNIMUTUAL.
AP STUDY SESSION 2.
1
Chapter 3 Demand and Behavior in Markets. Copyright © 2001 Addison Wesley LongmanSlide 3- 2 Figure 3.1 Optimal Consumption Bundle.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Processes and Operating Systems
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 3 CPUs.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1D - Dislocated Worker Chapter 9.
Create an Application Title 1A - Adult Chapter 3.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Wants.
Supported by 1 1 kids learn from people who care welcome! velkomin!
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Part Three Markets and Consumer Behavior
Site Safety Plans PFN ME 35B.
1. 2 Objectives Become familiar with the purpose and features of Epsilen Learn to navigate the Epsilen environment Develop a professional ePortfolio on.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
CHAPTER 10 CREDIT You’re in Charge
PP Test Review Sections 6-1 to 6-6
Bright Futures Guidelines Priorities and Screening Tables
Reporting and Interpreting Cost of Goods Sold and Inventory
CS 6143 COMPUTER ARCHITECTURE II SPRING 2014 ACM Principles and Practice of Parallel Programming, PPoPP, 2006 Panel Presentations Parallel Processing is.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
BEEF & VEAL MARKET SITUATION "Single CMO" Management Committee 18 April 2013.
Why Do You Want To Work For Us?
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Safety and Health Programs MODULE 7. 2©2006 TEEX Brainstorm  What makes a good safety and health program?  What does a good program do for you?
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
Indicator 1 – Number of Older Americans Indicator 2 – Racial and Ethnic Composition.
Prof.ir. Klaas H.J. Robers, January 16, 2013 Supervising a graduating student 1.
Analyzing Genes and Genomes
12 Financial Management 12-1 Financial Planning
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Chapter nine Value Chain Management: Functional Strategies for Competitive Advantage McGraw-Hill/Irwin Contemporary Management, 5/e Copyright © 2008 The.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Management Accounting: A Business Partner Chapter 16.
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
As the Business Environment Changes... Introduction Your IT systems will not take care of themselves - they must be managed. The MANAGEMENT OF AN IT SYSTEM.
Information Servives within Organization (DIT 203)
Presentation transcript:

CHAPTER 10 MANAGING IT SYSTEMS Staying on Track

As the Business Environment Changes... Introduction Your IT systems will not take care of themselves - they must be managed. The MANAGEMENT OF AN IT SYSTEM means providing an environment of stability without stagnation( ) and change without chaos for information, information technology, and knowledge workers. 10-2

YOUR FOCUS IN THIS CHAPTER l Managing Information l Managing Information Technology l Managing Knowledge Workers Introduction10-3

MANAGING INFORMATION l ROLE - Raw Material and Capital l ACCESS - Content, Time, and Form l SECURITY - Protecting IT Systems l PRIVACY - Personal Information Managing Information10-4

INFORMATION AS RAW MATERIAL Managing Information10-5 l Raw materials are the components from which a product is made. l The CIO of UPS says that package without information has no value.

INFORMATION AS CAPITAL Managing Information10-6 l Capital is a type of asset you use to produce a product or service. l Capital can also be sold or leased to others.

ACCESS TO THE RIGHT INFORMATION Managing Information10-7 l Information must not only be the information that you want, it must also be accurate and consistent. l For example, a textbook with no price, the wrong price, or two different prices impedes the purchasing process.

ACCESS TO INFORMATION AT THE RIGHT TIME Managing Information10-8 l Information must be available when you need it. l For example, you need to know the answers to an exam while you e taking the exam, not a week later.

ACCESS TO INFORMATION IN THE RIGHT FORM Managing Information10-9 l Information must be presented in a way that is understandable and useful. l For example, if you can read Japanese, a textbook in Japanese will not help you much.

INFORMATION SECURITY Managing Information10-10 l Information can be lost or damaged by mistake or on purpose. l What does it cost to replace information? See page 393. means protecting information from loss and damage.

BACKUP Managing Information10-11 The simplest and easiest way to protect your information is to make backups on one or more of the following media... l Floppy disks l Removable hard disks l CD-ROMs l Tape

Store Backups in a... Managing Information10-12 l Safe l Different building l Televault

Guard Against Information Theft... Managing Information10-13 by using one or more of three levels of application security. l Log-in passwords at the operating system level l Utilities that restrict access l Application-level security

GUARD AGAINST DANGER FROM OUTSIDE Managing Information10-14 l A VIRUS is a program which someone develops with malicious intent to harm an IT system. How do you get a virus? See page 395. l An INTERNET LOOPHOLE is an entry point into a company internal IT system from its Internet site.

PRIVACY OF INFORMATION Managing Information10-15 deals with the protection of personal information about employees, clients, or other individuals. The Supreme Court has defined privacy as the right to be let alone.

Privacy Conflict Between Employer and Employee Refers to... Managing Information10-16 l What can employers find out? See page 396. the employee right to privacy versus the company need to have information on its employees.

Employers Need Information on Employees to... Managing Information10-17 l Hire the best possible employees l Protect themselves from liability l Satisfy legislative demands

Privacy Conflict Between Business and Customers Refers to... l What can businesses find out? See page 397. Managing Information10-18 the customer right to privacy versus the company need to know about the customer in order to provide the customer moment of value.

Businesses Need Information on Customers to... Managing Information10-19 l Identify potential customers and tailor goods and services to their preferences. l Provide perfect service to customers.

MANAGING INFORMATION TECHNOLOGY Managing IT10-20 l Control of IT Components l Ergonomics l Disaster Recovery

Control of IT Means... Managing IT10-21 l Striving for interoperability l Keeping track of costs

INTEROPERABILITY Managing IT10-22 l The phone system has interoperability - you can connect any modem or answering machine to any phone line. also called standardization, means that IT equipment and software components are compatible.

COST CONTROL Managing IT10-23 l Repair l Inventory of spare parts l Software updates l Hardware updates PCs are expensive to operate because of such considerations as...

ERGONOMICS Managing IT10-24 is the study of how to design and arrange your workplace so that you can achieve maximum productivity and reduce discomfort and adverse health effects.

REPETITIVE STRAIN INJURY (RSI) Managing IT10-25 l RSI is the leading cause of injury, productivity loss, and financial strain on small businesses. l How do you avoid RSI? See page 402. l How much does RSI cost business? See page 402. also referred to as cumulative( ) trauma( ) disorder( ) (CTD), is characterized by headache, neckache, eyestrain, wrist pain, fatigue( ), and stress caused by repetitive actions.

A DISASTER RECOVERY PLAN Managing IT10-26 l Customers l Facilities l Knowledge workers l Business information l Computer equipment l Communications infrastructure is a plan for anticipating and recovering from undesirable events that cause loss and damage to your IT system. This plan should include consideration of...

MANAGING KNOWLEDGE WORKERS Managing Knowledge Workers10-27 l Telecommuting l Cultural Diversity l Ethics How important are knowledge workers to your business? See page 406.

TELECOMMUTING Managing Knowledge Workers10-28 Telecommuters are employees who don come into work everyday in the traditional sense. Setting up a telecommuting program requires careful management. You must consider: Why What Who How Where

The HY?of Telecommuting Managing Knowledge Workers10-29 l Increased productivity l Reduced costs l Retention of employees Telecommuting should be introduced for business reasons, such as...

The HAT?of Telecommuting Managing Knowledge Workers10-30 The best kind of jobs for telecommuting are those for which output is relatively self-contained such as the work of accountants, insurance claims processors, software developers, or sales representatives.

The HO?of Telecommuting Managing Knowledge Workers10-31 l Can produce results independently l Are self-starters l Can manage time well l Can balance work and home life The best candidates for telecommuting are knowledge workers who...

The OW?of Telecommuting Managing Knowledge Workers10-32 l Trust on the part of the supervisor l Accountability on the part of the employee l Clear policies on what is expected l Explicit assignment of costs l IT resources for the telecommuters A successful telecommuting program requires...

The HERE?of Telecommuting Managing Knowledge Workers10-33 l HOTELING - knowledge workers reserve space in advance. l MOTELING - space is allocated on a first- come-first-served basis. Two arrangements of central office space are possible for telecommuters.

CULTURAL DIVERSITY Managing Knowledge Workers10-34 is the difference in behavior and attitude between people from different cultures. Why worry about cultural diversity? See page 412.

CULTURE SHOCK Managing Knowledge Workers10-35 is the disorientation and confusion that you experience when you e accustomed to one culture and suddenly find yourself in another, where signals, behavior, and beliefs are different. Have you ever felt culture shock? See page 414.

Three Stages of Adjustment to a New Culture Managing Knowledge Workers10-36 l Isn that neat - differences are interesting. l Isn that stupid - differences are irritating. l It different, but it fine - differences are no longer remarkable.

ETHICS Managing Knowledge Workers10-37 are the sets of principles or standards that help guide behavior, actions, and choices. How can information be misused? See pages

Kohlberg Model of Ethical Development Has 3 Levels of Motivation Managing Knowledge Workers10-38 l PREADOLESCENT - fear of punishment. l ADOLESCENT - peer pressure. l ADULT - doing the ight?thing.

TO SUMMARIZE l Having an effective IT system involves managing information, IT components, and knowledge workers. l Managing information means: –Understanding the role of information –Providing access to the right information at the right time in the right form –Protecting IT systems from loss and damage, both malicious and unintentional –Protecting personal information on clients, employees, and others

TO SUMMARIZE l Managing information technology means: –Ensuring interoperability of IT components –Arranging IT components for maximum knowledge- worker productivity –Anticipating and planning for disaster

TO SUMMARIZE l Employees are the most important resource in any company. l Managing knowledge workers includes recognizing and accommodating differences in employees by such means as –Having a telecommuting program to allow varying work schedules –Recognizing cultural diversity –Establishing and maintaining an ethical work environment