Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.

Slides:



Advertisements
Similar presentations
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Advertisements

©2002, Pearson Education Canada 1.1 c h a p t e r 1 1 MANAGING THE DIGITAL FIRM: CANADA AND BEYOND CANADA AND BEYOND.
Internet, Intranet and Extranets
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-business Infrastructure
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Copyright 2007 Wiley & Sons, Inc. Chapter 11 COURSE INTRODUCTION  LECTURER INTRODUCE HIM OR HERSELF  LECTURER EXPLAIN SAP AND MP  LECTURER EXPLAIN THE.
Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 1 Moore’s Law.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Discovering Computers 2010
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 13 Information Technology for Business.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Living in a Digital World Discovering Computers 2010.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Chapter 14 Enterprise Computing.
C8- Securing Information Systems
Using Technology to Manage Information Chapter 14.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
Using Technology to Manage Information
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
1.less than 3 million. 2.less than 10 million. 3.over 23 million. 4.over 100 million. 5.Not sure In the U.S., the number of managers that rely on Information.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
© Prentice Hall, 2005Excellence in Business, Revised Edition Chapter Fundamentals of Information Management, the Internet, and E-Commerce.
PowerPoint Presentation by Charlie Cook The University of West Alabama Business Essentials Ronald J. Ebert Ricky W. Griffin Managing Information 55 6e.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
1 Enterprise Requirement Planning For Manufacturing.
IT and Network Organization Ecommerce. IT and Network Organization OPTIMIZING INTERNAL COLLABORATIONS IN NETWORK ORGANIZATIONS.
Managing Information and Technology Exploring Business Class 11 Tuesday 10/4/11.
Using Technology to Manage Information Chapter 13.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.
Chapter 1: Explore the Network
What Is Enterprise Computing?
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
Managing Information Systems and Communications Technology
Introduction to Information Systems
INFORMATION SYSTEMS SECURITY and CONTROL
Copyright 2005 Prentice- Hall, Inc.
Information Technology and E-Commerce
Information Technology and E-Commerce
Presentation transcript:

Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology

Exploring Business 2.0 © 2012 Flat World Knowledge Chapter Objectives 1.Distinguish between data and information. 2.Define information system (IS) and identify the tasks of the information systems manager. 3.Explain how IS managers capture, store, and analyze data. 4.Discuss ways in which an IS can be designed to meet the needs of individuals at various organizational levels.

Exploring Business 2.0 © 2012 Flat World Knowledge Chapter Objectives 5.Describe the main systems for sharing information through networked computers. 6.Define cloud computing and identify its advantages and disadvantages. 7.Explain how four networking technologies—the Internet, the World Wide Web, intranets, and extranets—make data communication possible. 8.Identify and discuss challenges faced by companies engaged in e-commerce. 9.Identify career opportunities in information management.

Exploring Business 2.0 © 2012 Flat World Knowledge Data versus Information “…data: unprocessed facts.” “…information: data that have been processed, or turned into some useful form.”

Exploring Business 2.0 © 2012 Flat World Knowledge Information System “…the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company- wide activities.”

Exploring Business 2.0 © 2012 Flat World Knowledge IS Management  Chief Information Officer  Chief Technology Officer  Information Managers Determine information needs Collect data Convert data into information Direct information

Exploring Business 2.0 © 2012 Flat World Knowledge Differing Information Needs  Top Managers Planning Setting Objectives Strategic Decisions  Middle Managers Allocate Resources Oversee Activities  First-Line Managers Supervise Employees Oversee Daily Operations Coordinate Activities

Exploring Business 2.0 © 2012 Flat World Knowledge Information Needs and Flows

Exploring Business 2.0 © 2012 Flat World Knowledge Need To Share Information z Integrated IT z Enterprise Resource Planning System

Exploring Business 2.0 © 2012 Flat World Knowledge ERP System

Exploring Business 2.0 © 2012 Flat World Knowledge Data and Databases 5 Databases 5 Data Warehouse 5 Data Mining Customer Behavior

Exploring Business 2.0 © 2012 Flat World Knowledge Data Mining Process

Exploring Business 2.0 © 2012 Flat World Knowledge Types Of Information Systems Operations Support Transaction Processing Process Control Design & Production Management Support Management information Decision support Executive information Artificial Intelligence Expert Face-Recognition

Exploring Business 2.0 © 2012 Flat World Knowledge Transaction Processing System

Exploring Business 2.0 © 2012 Flat World Knowledge Design And Production Systems  Computer-Aided Design  Computer-Aided Manufacturing  Computer-Integrated Manufacturing  Flexible Manufacturing

Exploring Business 2.0 © 2012 Flat World Knowledge Decision Support Systems

Exploring Business 2.0 © 2012 Flat World Knowledge Executive Information Systems “…provides ready access to strategic information that’s customized to … and presented in a convenient format..”

Exploring Business 2.0 © 2012 Flat World Knowledge Artificial Intelligence  Artificial Intelligence Applications Expert Systems Face-Recognition Technology The science of developing computer systems that can mimic human behavior

Exploring Business 2.0 © 2012 Flat World Knowledge Computer Networks h Applications Software h Local-Area Network h Wide-Area Network

Exploring Business 2.0 © 2012 Flat World Knowledge Local Area Network

Exploring Business 2.0 © 2012 Flat World Knowledge Cloud Computing “… performing computer tasks using services provided over the Internet”

Exploring Business 2.0 © 2012 Flat World Knowledge Application of Cloud Computing Companies can contract for various cloud computing services. These include: –Software-as-a Service (SssA) Gives companies access to a large assortment of software packages –Infrastructure-as-a-Service (IaaS) Provides users with hardware, including servers, network equipment and disk space –Platform-as-a-Service (PaaS) Provide services that enable users to develop customized web applications

Exploring Business 2.0 © 2012 Flat World Knowledge Advantages of Cloud Computing Advantages of Cloud Computing 1.Cost savings 2.Speed of Delivery 3.Scalable 4.Employees Can Be Mobile 5.Information Technology Staff

Exploring Business 2.0 © 2012 Flat World Knowledge Disadvantages of Cloud Computing 1.Disruption in Internet Service 2.Security 3.Service Provider System Crash

Exploring Business 2.0 © 2012 Flat World Knowledge Data Communication Networks : Internet Internet Service Providers World Wide Web/Browsers : Intranets : Extranets “…transmit digital data… from one computer to another using...wired and wireless communication channels.”

Exploring Business 2.0 © 2012 Flat World Knowledge Technology Of The Web  Web Pages  Web Sites  Webmaster  Home Page  Uniform Resource Locator  Web Server  Search Engine

Exploring Business 2.0 © 2012 Flat World KnowledgeIntranets/Extranets Intranet “…a private network using… technologies… available only to employees....” Firewall Software that controls access to an Intranet Extranet “…intranet… partially available to certain parties outside the organization.”

Exploring Business 2.0 © 2012 Flat World KnowledgeExtranet

E-Commerce “…conducting business over the Internet...”

Exploring Business 2.0 © 2012 Flat World Knowledge Business Uses Of The Internet  Presenting Information  Selling Products  Distributing Digital Products  Acquiring Goods/Services  Virtual Company

Exploring Business 2.0 © 2012 Flat World Knowledge Electronic Data Interchange & Value-Added

Exploring Business 2.0 © 2012 Flat World Knowledge Security Issues In Electronic Communication  Data Security  Malicious Programs  Spoofing  Revenue Theft  Risks to Customers

Exploring Business 2.0 © 2012 Flat World Knowledge Malicious Programs  Viruses  Worms  Trojan Horses

Exploring Business 2.0 © 2012 Flat World Knowledge Types Of Revenue Theft  Denial of Service  Piracy

Preventing Unwanted Intruders Firewalls: –Act as a gatekeeper –Inspects and screens all incoming messages to prevent unwanted intruders –Regulates outgoing traffic to preventing employees from sending out confidential data Exploring Business 2.0 © 2012 Flat World Knowledge

Risks To Customers  Credit-Card Theft  Password Theft  Invasion of Privacy

Exploring Business 2.0 © 2012 Flat World Knowledge How Cookies Work

Exploring Business 2.0 © 2012 Flat World Knowledge Shoring Up Security And Building Trust Encryption “…process of encoding data so...only individuals (or computers) armed with a secret code (or key) can decode it.” Certificate Authority “…a third party… verifies the identity of the responding computer and sends you a digital certificate stating that it trusts the site.”

Exploring Business 2.0 © 2012 Flat World Knowledge Careers In Information Management Requirement for entry-level IS jobs: –Bachelor’s degree with information systems major –Can supplement with minors in computer science or a business area

Exploring Business 2.0 © 2012 Flat World Knowledge Careers In Information Management Management path or Technical path Senior Officers: Chief Information Officer and Chief Technology Officer