22 Irwin/Mcgraw-Hill © The McGraw-Hill Companies, Inc., 2000 Information Technology for Human Resources.

Slides:



Advertisements
Similar presentations
Yuma Pacific-Southwest Section, AIHA
Advertisements

HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Companies can suffer numerous problems due to poor management of resources and careless decisions. In real-world decision- making, many organizations lack.
Auditing Computer-Based Information Systems
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point.
ADMINISTRATION Sources of Information REVISION – BLOCK 6.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Source: Hudson, N.R. (2006). Management practice in dietetics (2nd ed.). Belmont: Thomson Wadsworth Information Management FCS 485.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Introduction and Setup.
Computing ESSENTIALS     Copyright 2003 The McGraw-Hill Companies, Inc CHAPTER Information Technology, the Internet, and You computing ESSENTIALS.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
INTERNET and CODE OF CONDUCT
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Electronic Business Systems
Chapter 10 Productivity Center and Utilities McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
Irwin/McGraw-Hill Copyright © 2001, The McGraw-Hill Companies, Inc. All rights reserved. I n t r o d u c t i o n t o I n f o r m a t i o n S y s t e m.
Chapter 4 Intranets and Extranets. 2 OBJECTIVES What is Intranet? Software Applications Architecture of software and Intranet Extranets.
Internet.
Copyright © 2008 Pearson Education Canada Human Resources Management and Technology (by Julie Bulmash) Dessler & Cole Human Resources Management in Canada.
MethodECMS © כל הזכויות שמורות. Methoda Computers Ltd 2 MethodECMS  MethodECMS is a proactive package that enables the establishment.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
C h a p t e r PART ONE - INTRODUCTION AND EQUAL EMPLOYMENT OPPORTUNITY Information Technology for Human Resources 2.
Monitoring Employees on Networks: Unethical or Good Business?
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall EDI and the Internet Oz – Foundations of Electronic Commerce © 2002 Prentice Hall.
ACM 511 Introduction to Computer Networks. Computer Networks.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Electronic Exchange of Drinking Water Lab Data Presented by: Mike Matsko NJDEP Exchange Network Users Meeting April 18, 2006.
AUDIT IN COMPUTERIZED ENVIRONMENT
Human Resources in the Electronic Age. Chapter 2 HR and the World Wide Web Some important HR websites – US Department of Labor Bureau of Labor Statistics.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Productivity Center and Utilities.
Chapter7 TELECOMMUNICATIONS AND NETWORKS. Content e-Business Systems – Cross-Functional Enterprise Applications – Enterprise Application Integration –
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Lesson 2: Workplace Digital Communication
Johnathan Stewart Computer Information. -a system for sending messages from one individual to another via telecommunications links between computers.
©2007 by the McGraw-Hill Companies, Inc. All rights reserved. 2/e PPTPPT.
Electronic Data Interchange
Internet addresses By Toni Grey & Rashida Swan HTTP Stands for HyperText Transfer Protocol Is the underlying stateless protocol used by the World Wide.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
The information systems lifecycle Far more boring than you ever dreamed possible!
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
ATTENDANCE MANAGEMENT SYSTEM. PRODUCT DESCRIPTION Attendance Management System: is a user-friendly, flexible and full featured employee attendance management.
Welcome to the ICT Department Unit 3_5 Security Policies.
HRIS( Human Resource Information System)
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
UNIT V Security Management of Information Technology.
Information Technology. *At Home *In business *In Education *In Healthcare Computer Uses.
Information Technology
What is a Firewall?.
Chapter 17 Risks, Security and Disaster Recovery
Electronic Records Management Program
Computing in the Modern World Unit 4
Network Types & Speed Learning Objectives:
ERM Systems.
VPN What, where, who, why when?.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
EDI Systems What They Are and Why They Matter
Presentation transcript:

22 Irwin/Mcgraw-Hill © The McGraw-Hill Companies, Inc., 2000 Information Technology for Human Resources

2-2 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Types of Internet Resources Conversational resources Conversational resources Reference resources Reference resources

2-3 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Internet and Intranet Internet - the world’s largest computer network enabling users to do such things as send messages and transfer files Internet - the world’s largest computer network enabling users to do such things as send messages and transfer files Intranet - a private network that uses Internet software and standards Intranet - a private network that uses Internet software and standards

2-4 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Human Resource Information System HRIS - a database system that contains all relevant human resource information and provides facilities for maintaining and accessing these data. HRIS - a database system that contains all relevant human resource information and provides facilities for maintaining and accessing these data.

2-5 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Some uses of an HRIS clerical applications clerical applications applicant search expenditures applicant search expenditures risk management risk management training management and experiences training management and experiences financial planning financial planning succession analysis and planning succession analysis and planning regulation compliance regulation compliance

2-6 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Output Function of an HRIS Selecting a population segment for further evaluation based on selected criteria Selecting a population segment for further evaluation based on selected criteria Performing calculations on the selected population Performing calculations on the selected population Providing a report on the selected population Providing a report on the selected population

2-7 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Some Issues To Evaluate an HRIS Compare the time spent on data entry to the benefits of the reports generated Compare the time spent on data entry to the benefits of the reports generated Compare the system’s response time for data entry and inquiry Compare the system’s response time for data entry and inquiry Examine the system’s capabilities Examine the system’s capabilities Is it an interfaced or integrated payroll system Is it an interfaced or integrated payroll system Does the system generate the proper type of information Does the system generate the proper type of information

2-8 Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 2000 Data Security Issues Investigate, evaluate, and train employees on security issues Investigate, evaluate, and train employees on security issues Develop a code of conduct Develop a code of conduct Require nondisclosure agreements Require nondisclosure agreements Encrypt confidential files Encrypt confidential files Adopt a team-oriented approach Adopt a team-oriented approach Use low-tech security devices too Use low-tech security devices too