Management Information Systems

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

© Prentice Hall CHAPTER 15 Managing the IS Function.
Information Systems Management
Information Systems Management Chapter "I Don’t Know Anything About Doing Business In India.” Copyright © 2014 Pearson Education, Inc. Publishing.
© Pearson Prentice Hall 2009
Chapter 11 Information Systems Management
Control and Accounting Information Systems
Chapter 12: Planning for Electronic Commerce
Chapter 8 Information Systems Development & Acquisition
Lesson 1 – NETWORKING INS AND OUTS Understanding Networking: The corporate perspective Understanding Networking jobs OVERVIEW.
Chapter 12: Planning for Electronic Commerce Electronic Commerce, Seventh Annual Edition.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter Extension 17 Small-Scale Systems Development © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
© 2007 Prentice Hall, Inc.1 Using Management Information Systems David Kroenke Information Systems Management Chapter 10.
Information Systems in Organizations
E-Commerce: The Second Wave Fifth Annual Edition Chapter 12: Planning for Electronic Commerce.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 10 Managing the Delivery of Information Services.
Management Information Systems: Classic Models and New Approaches Chapter 17.
JOBS IN IT.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Chapter 2 Introduction to Computer User Support
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
1. 2 Technology in Action Technology in Focus: Careers in IT Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Technology Professionals Overview and Job Roles Mr. Gallagan.
Introduction to Business Organisations
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
The Purchasing Function
Chapter 11 Information Systems Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Information Systems Management
Information Systems Development
Chapter 2: Introduction to Computer User Support
Information Systems Planning
Organizing Information Technology Resources
Marketing of Information Security Products. The business case for Information Security Management.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
PRELIM NOTES. Managing Information Resources & Technologies To serve customers well… companies need to be proficient in half a dozen key areas: reduced.
David Kroenke Information Systems Management Chapter 10 © 2007 Prentice Hall, Inc. 1.
Objective 1.01 Understand the purpose and the functions of business 1.01 Purpose and Functions of Business.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Introduction to Computers Lesson 12A. home Information System A mechanism that helps people collect, store, organize and use information.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 11 Information Systems Management. Q1:What are the responsibilities of the IS department? Q2:How is the IS department organized? Q3: What are.
Chapter 2: Introduction to Computer User Support.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Information Systems Management
Principles of Information Systems, Sixth Edition Information Systems in Organizations Chapter 2.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 12 Implementation and Maintenance
Chapter 11 Information Systems Management. Dee wanted to restrict access to blog –Easiest way was to put it on Emerson’s server –Needed permission and.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 11 Information Systems Management Read this unit prior to the presentation.
[] FHF Management Is... A process designed to achieve an organization’s objectives by using its resources effectively & efficiently in a changing environment.
Panayiotis Christodoulou. Objectives  •How historical changes in computer technology have affected computer use  •Ways to classify end users  •Computing.
FHF Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 15 Telecommunication Department Management.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
«My future profession»
Week 11 Organizing Information Technology Resources
Chapter 12: Planning for Electronic Commerce
Managing the Delivery of Information Services
The IT Environment Section 3 ICA11v1.0
Using MIS 2e Chapter 11 Information Systems Management
© Pearson Prentice Hall 2009
E-Commerce and Economic Forces
Management Information Systems: Classic Models and New Approaches
Chapter # 2 Ethics for IT workers & IT Users
Information Systems Management
Presentation transcript:

Management Information Systems Chapter 11 Information Systems Management

This Could Happen to You Dee wants to restrict access to blog Easiest way is to put it on Emerson’s server Needed permission and help of IT department Used manager to force submission Exposed Emerson to enormous security risk Consultant could have misused system Dee didn’t understand the problems Different approach could have elicited more supportive response Interact in a more effective way

Study Questions Q1. Why do you need to know about the IT department? Q2. What are the responsibilities of the IT department? Q3. How is the IT department organized? Q4. What IS-related job positions exist? Q5. How do organizations decide how much to spend on IT? Q6. What are your rights and responsibilities?

Q1. Why Do You Need to Know about the IT Department? Need to understand the responsibilities and duties of the IT department More effective consumer Obtain services, equipment, and systems needed Need to know about functions of IT department to be IS-savvy Better understand how to integrate disparate companies or offices Can raise IT issues early in merger or acquisition Better understand needs of IT department in supporting new initiatives

Q2. What Are the Responsibilities of the IT Department? Plan for information systems and IT infrastructure Develop and adapt information systems and IT infrastructure Maintain information systems and operate and maintain IT infrastructure Protect infrastructure and data

Plan for Information Systems Further organization’s competitive strategy Align activities with primary goals and objectives of organization Adapt infrastructure and systems to new goals Assess new technologies to determine possible applications Agile enterprise Organizations that can adapt quickly to changes in external factors

Develop and Adapt Information Systems IT department must create, develop, and adapt information systems Create and adapt infrastructure Computer networks, servers, data centers, data warehouses, data marts Create systems infrastructures E-mail, VPN, instant messaging, blogs, net meetings Specify standard computer systems

Maintain Information Systems and Infrastructures Operate and maintain infrastructure Networks and servers must be monitored, tuned, and repaired System outages are expensive Respond to threats to infrastructure

Protect Infrastructure and Data from Threats Threats to infrastructure and data from: Human error and mistakes Malicious human activity Natural events and disasters IT department helps organizations manage risk Identify potential threats Estimate financial and other risks Specify safeguards Determine which level of risk to assume

Q3. How Is the IT Department Organized? (1) Chief Information Officer (CIO) Principal manager Reports to CEO, COO, or CFO Technology office Head: Chief Technology Officer (CTO) Investigates new information systems technologies for possible application at organization Operations Manages computing infrastructure

How Is the IT Department Organized? (2) Development Manages process of creating new information systems Maintains existing system Outsourcing relations Handles affairs with outsourced systems Data administration staff functions Establishes data standards and data management practices and policies

典型高階主管呈報關係圖

Q4. What IS-Related Job Positions Exist? Systems analyst Programmer PQA test engineer Technical writer User support representative Computer technician Network administrator Consultant Sales Small-scale project manager Large-scale project manager Database administrator CIO CTO

和資訊產業有相關性的工作 (1)

和資訊產業有相關性的工作 (1)

Position Requirements Most positions require business knowledge Many require university degrees Most require good verbal and writing skills Think dual majors with IS! Accounting Marketing Management

Guide: Jumping Aboard the Bulldozer Recent media reports blame overseas outsourcing on US job loss Real culprit is increased productivity because of information technology Creative destruction Unneeded jobs removed No new hiring Be a business professional Use technology and information systems to help the organization Define yourself more generally

Q5. How Do Organizations Decide How Much to Spend on IT? Analyze costs and benefits of system Estimate dollar costs Value tangible benefits Lifetime value of customers lost by not having support system Anticipated customer support cost savings Value intangible benefits Value of email system Compute costs and tangible benefits to see if project is justified If not, then compute intangibles

Q6. What Are Your Rights? Rights include: Having resources to perform work proficiently Having reliable network and Internet services Secure computing environment Participating in requirements meeting for applications Reliable systems development and maintenance Prompt attention to problems, concerns and complaints Effective training

What Are Your Responsibilities? Responsibilities include: Learning basic computer skills and techniques Following security and backup procedures Using computer resources in a manner consistent with employer’s policies Making no unauthorized hardware modifications Installing only authorized programs Installing computer patches and fixes Treating informational systems workers professionally

資訊系統使用者的權利與義務

Ethics Guide: Using the Corporate Computer (1) Computers, e-mail, and the Internet are to be used primarily for official company business. Small amounts of personal email can be exchanged with friends and family, and occasional usage of the Internet is permitted, but such usage should be limited and never interfere with your work You are a manager at a company with the above policy. You find out that an employee has been: Playing computer games during work hours Playing computer games before and after work Responding to e-mails from an ill parent Watching DVDs during lunch and breaks Sending e-mails to plan a party that mostly involves people from work

Ethics Guide: Using the Corporate Computer (2) Paying personal bills online Paying personal bills online when traveling on company business Buying an airplane ticket for an ill parent over the Internet Changing the content of a personal Web site Changing the content of a personal business Web site Buying an airplane ticket for a personal vacation over the Internet Sending e-mails to plan a party that mostly involves no one from work Searching the Web for a new car Reading the news on CNN.com Checking the stock market over the Internet Bidding on items for personal use on eBay Selling personal items on eBay

How Does Knowledge from This Chapter Help You at Emerson or DSI? How does this knowledge help you at Emerson: Understand the need to protect network infrastructure Suggest alternatives Hire bonded consultant Puzzling situation at DSI: Sole IT person can not perform all jobs Users are performing some of the work Some jobs are not getting done No one seems to be thinking strategically about IS