Presentation is loading. Please wait.

Presentation is loading. Please wait.

PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.

Similar presentations


Presentation on theme: "PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not."— Presentation transcript:

1 PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Harnessing the Power of Information Technology and the Internet

2 1.Discuss technology tools and information systems. 2.Describe potential risks associated with information systems and list steps a supervisor can take to protect employee and customer data. 3.Describe technology’s impact on productivity. 4.Discuss computer monitoring and surveillance programs organizations are using to track employees. 5.Discuss common Internet resources, the impact they have on individuals and companies, and steps to get started using them. 6.Identify strategies to leverage technology, information systems, and the Internet for positive results. 1.Discuss technology tools and information systems. 2.Describe potential risks associated with information systems and list steps a supervisor can take to protect employee and customer data. 3.Describe technology’s impact on productivity. 4.Discuss computer monitoring and surveillance programs organizations are using to track employees. 5.Discuss common Internet resources, the impact they have on individuals and companies, and steps to get started using them. 6.Identify strategies to leverage technology, information systems, and the Internet for positive results. Learning Objectives © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–2

3 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–3 Technology and Information Systems at Work TechnologyTechnology  All the tools and ideas available for extending the natural physical and mental reach of humankind.  Electronics, robots, imaging, and communication. Computer Information SystemsComputer Information Systems  Are the combination of data input, processing, and output for end users inside and outside the organization.  Must validated to assure that input, processing, and output components are working properly.

4 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–4 1.How can computer information systems be used by supervisors to increase efficiency and effectiveness? 2.What are the potential risks to the organization by introducing these?

5 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–5 Protecting Information Systems Computer CrimeComputer Crime  Is using computer technology to steal or cause harm to another person or company. Computer Viruses Hardware Theft Internal Theft of Data External Hacking Potential Risks to Information Systems

6 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–6 Protecting Information Systems (cont’d) How to Reduce the Risks Require the use of strong passwords Limit employee access to information Practice safe computing when opening email and surfing the web Establish and follow information security policies and procedures Require employees to log out Encrypt critical and confidential data Training, Training, Training

7 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–7 Information Technology’s Impact on Productivity IT’s Positive Impact on ProductivityIT’s Positive Impact on Productivity  Reduction in inventory expenses  Improved customer service  Greater access to information  Use of robots on routine, remote, or risky jobs IT’s Negative Impact on ProductivityIT’s Negative Impact on Productivity  Distractions and risks of electronic messaging  Stress of constant connection to the job  Questionable quality of internet-sourced information  Rapid obsolescence and the learning curve

8 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–8 1.What can you do to minimize the negative impact e- mail has on your personal productivity and the productivity of others? 2.Brainstorm with your classmates—what do you think will be the next revolutionary technology to impact personal productivity in the workplace?

9 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–9 Monitoring Employees Issues in Employee MonitoringIssues in Employee Monitoring  Invasion of employee privacy  Corporate spying  Violation of civil liberties Employer Surveillance PracticesEmployer Surveillance Practices  Monitoring website connection and surfing  Review of employee e-mail  Video surveillance  Monitoring keystrokes and time on computer  Use of GPS to track location of employees

10 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–10 1.Do you think this an infringement of employee privacy rights? Explain. 2.In your view, what are the general boundaries for a fair and reasonable company Internet use policy? eTelemetry, which provides tech departments with network monitoring services, came out with a new version of hardware that some might consider creepy. It gives managers desktop access to details about the online activities of the people they supervise—data previously reserved for IT. The hardware lets managers set up e-mails to alert them when a worker has been surfing excessively, view which sites employees have visited that day, and compare individuals’ bandwidth use.

11 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–11 The Impact of the Internet Private and Company Blogs Reference and Search Sites Social and Business Networking Sites Video Sharing Sites Internet Resources and Activities That Affect How Supervisors Work

12 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–12 1.How can you use blogging, social networking, and/or video sharing to be a more effective supervisor? 2.What are some of the drawbacks to using these tools in the workplace?

13 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–13 Leveraging Information Technology for Positive Results Performance Evaluation Software Telecommuting Technology IT Tools for Supervisors Company Intranets

14 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–14 1.What are a few examples of ways you can use your company intranet to communicate more effectively with your employees? 2.How else can you use the Internet, a company intranet, or blogs to have a positive impact on team building?

15 © 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.14–15 TERMS TO UNDERSTAND blog computer crime computer information systems computer virus employee data theft encryption external hacking intranet reference sites social network sites technology


Download ppt "PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not."

Similar presentations


Ads by Google