Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.

Slides:



Advertisements
Similar presentations
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Advertisements

Chapter 9: Privacy, Crime, and Security
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-business Infrastructure
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Business Systems Chapter 7.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Information Technologies: Concepts and Management
Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 1 Moore’s Law.
13 chapter Business Essentials, 7 th Edition Ebert/Griffin © 2009 Pearson Education, Inc. Information Technology for Business Instructor Lecture PowerPoints.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 13 Information Technology for Business.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 12 Managing Information Systems and Communications.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Living in a Digital World Discovering Computers 2010.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
Chapter 14 Enterprise Computing.
Using Technology to Manage Information Chapter 14.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Using Technology to Manage Information
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
1.less than 3 million. 2.less than 10 million. 3.over 23 million. 4.over 100 million. 5.Not sure In the U.S., the number of managers that rely on Information.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
© Prentice Hall, 2005Excellence in Business, Revised Edition Chapter Fundamentals of Information Management, the Internet, and E-Commerce.
Chapter Nineteen Understanding Information and e-Business.
PowerPoint Presentation by Charlie Cook The University of West Alabama Business Essentials Ronald J. Ebert Ricky W. Griffin Managing Information 55 6e.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
1 Enterprise Requirement Planning For Manufacturing.
IT and Network Organization Ecommerce. IT and Network Organization OPTIMIZING INTERNAL COLLABORATIONS IN NETWORK ORGANIZATIONS.
Managing Information and Technology Exploring Business Class 11 Tuesday 10/4/11.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.
What Is Enterprise Computing?
Computers Are Your Future
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
Exam 1 Terminology Review
Managing Information Systems and Communications Technology
Introduction to Information Systems
Copyright 2005 Prentice- Hall, Inc.
Information Technology and E-Commerce
Information Technology and E-Commerce
Presentation transcript:

Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement available here No part of this work may be used, modified, or reproduced in any form or by any means except as expressly permitted under the License Agreement.

EXPLORING BUSINESS V. 2.0 By Karen Collins

CHAPTER 15 MANAGING INFORMATION AND TECHNOLOGY

LEARNING OBJECTIVES Define IS and identify the tasks of the IS manager Explain how IS managers capture, store, and analyze data Discuss ways IS can be designed Describe information systems for networked computers Explain how 4 networking technologies communicate Identify/discuss challenges of e-commerce

DATA VERSUS INFORMATION DATAINFORMATION Unprocessed factsData that has been processed, or turned into some useful form.

INFORMATION SYSTEM MANAGEMENT Chief Information Officer Chief Technology Officer Information Managers: –Determine information needs –Collect data –Convert data into information –Direct information

DIFFERING INFORMATION NEEDS Top Managers –Planning –Setting Objectives –Strategic Decisions Middle Managers –Allocate Resources –Oversee Activities First-Line Managers –Supervise Employees –Oversee Daily Operations –Coordinate Activities

INFORMATION NEEDS AND FLOWS

NEED TO SHARE INFORMATION Integrated IT Enterprise Resource Planning System

ERP SYSTEM

DATA AND DATABASES Databases Data Warehouse Data Mining –Customer Behavior –Customer Relationship Management

DATA MINING PROCESS

TYPES OF INFORMATION SYSTEMS OPERATIONS SUPPORT Transaction Processing Process Control Design and Production MANAGEMENT SUPPORT Management information Decision support Executive information ARTIFICIAL INTELLIGENCE Expert Face-recognition

TRANSACTION PROCESSING SYSTEM

DESIGN AND PRODUCTION SYSTEMS Computer-Aided Design Computer-Aided Manufacturing Computer-Integrated Manufacturing Flexible Manufacturing

DECISION SUPPORT SYSTEMS

COMPUTER NETWORKS Applications Software Local-Area Network Wide-Area Network

LOCAL AREA NETWORK

DATA COMMUNICATION NETWORKS Internet –Internet Service Providers –World Wide Web/Browsers Intranets Extranets TRANSMIT DIGITAL DATA FROM ONE COMPUTER TO ANOTHER USING WIRED AND WIRELESS COMMUNICATION CHANNELS

CLOUD COMPUTING Applications of cloud computing: –Software-as-a Service (SssA): Gives companies access to a large assortment of software packages. –Infrastructure-as-a-Service (IaaS): Provides users with hardware, including servers, equipment and disk space. –Platform-as-a-Service (PaaS): Provide services that enable users to develop customized web applications. PERFORMING COMPUTER TASKS USING SERVICES PROVIDED OVER THE INTERNET

CLOUD COMPUTING ADVANTAGESDISADVANTAGES Cost savings Speed of Delivery Scalable Employees Can Be Mobile Information Technology Staff Disruption in Internet Service Security Service Provider System Crash

TECHNOLOGY OF THE WEB Web Pages Web Sites Webmaster Home Page Uniform Resource Locator Web Server Search Engine

INTRANETS/EXTRANETS INTRANET A private network using technologies available only to employees. FIREWALL Software that controls access to an intranet. EXTRANET Intranet partially available to certain parties outside the organization

EXTRANET YOUR DATABASES

E-COMMERCE CONDUCTING BUSINESS OVER THE INTERNET

BUSINESS USES OF THE INTERNET Presenting Information Selling Products Distributing Digital Products Acquiring Goods/Services Virtual Company

ELECTRONIC DATA INTERCHANGE

SECURITY ISSUES IN ELECTRONIC COMMUNICATION Data Security Malicious Programs Spoofing Revenue Theft Risks to Customers Malicious Programs: –Viruses –Worms –Trojan Horses Revenue theft: –Denial of Service –Piracy

RISKS TO CUSTOMERS Credit-Card Theft Password Theft Invasion of Privacy

COOKIES

SECURITY AND BUILDING TRUST ENCRYPTION Process of encoding data so only individuals or computers armed with a secret key can decode it. CERTIFICATE AUTHORITY A third party verifies the identity of the responding computer and sends the user a certificate of trust in the site.

CAREERS IN INFORMATION MANAGEMENT Chief Information Officer Chief Technology Officer