Information Resource Management

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Organizing Information Technology Resources
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Chapter 12: Planning for Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Chapter 12 Strategies for Managing the Technology Infrastructure.
1 Chapter 7 IT Infrastructures Business-Driven Technology
E-Commerce: The Second Wave Fifth Annual Edition Chapter 12: Planning for Electronic Commerce.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 10 Managing the Delivery of Information Services.
Ch. 12 Planning for Electronic Commerce Kevin Lyles.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Organizing Information Technology Resources
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Invitation to Computer Science 5th Edition
Networks QUME 185 Introduction to Computer Applications.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Chapter 13 Information Technology Economics. Agenda IT Organization IT Productivity IT Benefits Data Center Economics.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Strategically Managing the HRM Function McGraw-Hill/Irwin ©2012 The McGraw-Hill Companies, All Rights Reserved.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 9  2000 by Prentice Hall. 9-1 Client/Server Computing.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Information Security Crisis Management Daryl Goodwin.
PRESENTATION ON ENTERPRISE RESOURCE PLANNING. TRAINING VENUE B-SQUARE SOLUTIONS PVT. LTD OKHLA INDUSTRIAL AREA, NEW DELHI  Set up in year 2000  Basically.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Chapter 8 Controlling Information Systems: IT Processes.
What Is Enterprise Computing?
Information Systems Security
Securing Information Systems
Principles of Information Systems Eighth Edition
Week 11 Organizing Information Technology Resources
Chapter 12: Planning for Electronic Commerce
ICT II Unit 6 Networking.
Chapter 19: Network Management
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Core Competencies Training for Supervisors
Information Systems Development
Discovering Computers 2010: Living in a Digital World Chapter 14
Core Competencies Training for Supervisors
Common Methods Used to Commit Computer Crimes
Managing the Delivery of Information Services
Electronic Records Management Program
Processing Integrity and Availability Controls
Firewalls.
MANAGEMENT INFORMATION SYSTEM MEHTAP PARLAK Industrial Engineering Department, Dokuz Eylul University, Turkey 1.
Unit 7 – Organisational Systems Security
IT INFRASTRUCTURES Business-Driven Technologies
Understanding Back-End Systems
Module 2 Topics Information technology governance: Organization and planning for IS.
Topics Module 5 Logical And Physical Design User Interface Design
King Saud University- College OF Applied Studies
Management Information Systems
6. Application Software Security
Enterprise Resource Planning Systems
Presentation transcript:

Information Resource Management Chapter 13 Information Resource Management

Chapter Objectives To fully appreciate the vulnerability organizations have to full or partial failure of their information systems. To understand the relevance of information systems and digital content as important corporate resources. To appreciate the role of information systems planning. To understand the importance of security and disaster recovery planning for protecting information resources.

Hershey’s Big Dud In 1999 Hershey implemented a $112 million dollar computer system. System was to automate and modernize everything. Within 2 months serious problems developed. Orders were delayed and competitors benefited. Hershey used “big bang” approach. Vendors cited complexity of the situation as the reason for system failure.

System Failures Examples of System failures. W.L. Gore & Associates Implemented HR system to tie together payroll, personnel, and benefits. 3.5 million in fees and charges. Fictional employees could not be deleted from the system. Whirlpool E-Bay

Corporate Resources I/T should be viewed as a corporate resource. Organizations need to invest in I/S. Organizations need to manage their I/S. Content should be viewed as a corporate resource. Data needs to be Captured Processed Stored Communicated

Organizational Assets Employees Loyal Customers Capital (money) Physical Assets Information systems Content (data and knowledge)

Information Systems Planning Business Strategy I/T Strategy I/T Portfolio I/S Planning is an on-going activity. Environmental issues. Technological changes.

Questions for I/S Planning Where are we? What are we doing? Where do we want to go? What are our competitors doing? What are customers asking for? How do we get there; that is what is the role of I/T in enabling the necessary capabilities to delivery what customers want better than the competition? When will it be done? Who will do it; do we have the necessary skills and resources internally to deliver what we need? How much will it cost? Does it make economic sense?

Management and I/S Information Systems as perceived by management. Infrastructure Transactional Informational Strategic (Competitive)

Organization of the Information Services Department What are the information management functions that need to be performed? Centralized or decentralized What is the best way to organize the information systems specialist to perform these functions?

Cost and Resource Management Information Systems have Tangible costs Intangible costs Methods to control costs of I/S vary. Chargeback allows the I/S department to charge business units for services rendered.

Typical Responsibilities for an Information Services Department Developing a comprehensive I/T strategy. Documenting, operating, and maintaining the existing inventory of corporate hardware, software, and information systems. Setting standards for telecommunications and installing and maintaining local and wide area networks. Developing, maintaining, and protecting organizational databases and critical applications. Evaluating, acquiring, and integrating new hardware and software products.

Typical Responsibilities for an Information Services Department Training and supporting internal customers. Developing procedures to negotiate with and oversee outside information systems consultants and vendors in the acquisition and development of new information technology and systems. Facilitating the transfer of technology across organizational units. Initiating and managing outsourcing vendor and service provider relationships.

Disaster Recovery Planning Disaster recovery plans have become more of a management priority now that more industries are more dependant on data. Includes all business systems. Need to identify all critical systems. Off-site storage is critical. Some businesses are pursuing business continuity planning, which covers all aspects needed to ensure that the business would be able to operate regardless of the disaster.

Process for Planning Off-Site Storage Analyzing and classifying data. Reviewing existing backup procedures. Selecting a storage vendor. Formalizing the schedules for routine removal of data to storage.

Sample Strategies for Backup & Recovery Strategy Description Replacement Suspend operations or revert to manual systems until new I/S is up and running. Cold site An off-site facility without a computer, able to serve as an alternate processing site. Reciprocal agreement Two companies with similar systems agree to let the other share their facilities if necessary. Hot site A free standing, fully equipped site used by multiple companies. Redundant system An identical, fully operational data center, typically in a separate geographical location.

When Disaster Strikes Assess damage. Get communications and application systems operational as soon as possible. Ensure appropriate employees are located and notified.

Systems Security Companies must protect themselves against natural disasters, vandalism, cyberterrorism, and internal sabotage. Viruses are a major source of computer systems failures. Viruses are transmitted electronically. Antiviral products are available. Human intelligence is a key component in system security.

Common Systems Vulnerabilities Default software installations: Operating systems and applications are often installed with extra features that users are unaware of and hence don’t monitor for security flaws. Accounts with no passwords: Computer passwords are easy to steal or guess using automate password testing procedures. Inadequate backups: Many companies back up data but don’t test to see if the backups are adequate. Too many open doors: Computer systems exchange data using connection points known as ports: Some companies leave ports open, creating opportunities for hackers.

Common Systems Vulnerabilities False addresses: Attackers try to hide their tracks by spoofing the addresses contained in packets of data that they send. Bad record keeping: I/S can log most activities but sometimes the record keeping function is not turned on. Logs are critical to discovering what happened in an attack. Vulnerable web programs: Common gateway interface programs (CGI scripts) are common in web pages. CGI scripts make it possible for a hacker to manipulate the OS of the server. E-mail attachments: Common vulnerability is email attachments that are executable program files containing viruses.