Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.

Slides:



Advertisements
Similar presentations
© 2001 Business & Information Systems 2/e1 Chapter 1 Information Systems in Business.
Advertisements

Organizing Information Technology Resources
Preparing the System Proposal Chapter 13 Topics: –Systems proposal –Determining hardware needs –Determining software needs –Decision to rent, lease, or.
Overview of IS Controls, Auditing, and Security Fall 2005.
1 Chapter 10 Organizing Information Technology Resources.
1 SYS366 Week 1 - Lecture 2 How Businesses Work. 2 Today How Businesses Work What is a System Types of Systems The Role of the Systems Analyst The Programmer/Analyst.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
7.2 System Development Life Cycle (SDLC)
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 11 Management Decision Making.
Chapter 10 Managing the Delivery of Information Services.
Objectives Explain the key role of a systems analyst in business
Chapter 3 Applications Software: Getting the Work Done.
Introduction to Systems Analysis and Design
Chapter Lead Black Slide © 2001 Business & Information Systems 2/e.
JOBS IN IT.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Chapter 1 Introduction to Computer User Support
Information Systems Why Do People Need Information?
Slide 11-1 Chapter 11 Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Organizing Information Technology Resources
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 10 Business Operations.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Final Coverage Topic 4: INFORMATION RESOURCES and INFORMATION SYSTEMS By Dr. Faustino Reyes.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
Using Technology to Manage Information Chapter 14.
SCSC 311 Information Systems: hardware and software.
Introduction to Computers Lesson 12A. home Information System A mechanism that helps people collect, store, organize and use information.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 1 Information Systems in Business.
1 California State University, Fullerton Chapter 1 Information Systems in Business.
DIT614 ~ Customer Support & Work skills CHAPTER 1 Introduction to End User Computing Prepared By : Suraya Alias.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
© 2003 Prentice Hall, Inc.1-1 Chapter 1 Information Systems: The Big Picture Information Systems Today Leonard Jessup and Joseph Valacich.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Module 4: Systems Development Chapter 14: Design And Implementation.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Copyright (c) 2003 by Prentice Hall Chapter 2 Applications Software: Getting the Work Done Computers: Tools for an Information Age BSM025 Computers.
System Users and Developers
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
For More Tutorials ACC 210 WEEK 1 DQ 1  How does information flow between departments at your organizations? Why do some organizations.
Essential Standard 2.00 Understand the nature of business. 1.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Welcome to the ICT Department Unit 3_5 Security Policies.
Managing Information Systems and Technology
Principles of Information Systems Eighth Edition
Using Technology to Manage Information
Managing the Delivery of Information Services
Computer-Based Processing: Developing an Audit Assessment Approach
Computers Tools for an Information Age
Computers Tools for an Information Age
Computers Tools for an Information Age
Presentation transcript:

Lead Black Slide

© 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e3 Our Agenda Planning for Information Systems and Technology Acquiring Information Technology Organizing Information Systems Activities Controlling and Securing Information Systems

© 2001 Business & Information Systems 2/e4 Our Agenda (cont’d.) The Effects of Information Technology on Employment Ethical Management of Information Systems and Technology

© 2001 Business & Information Systems 2/e5 Learning Objectives Identify several factors that should be considered in planning for information systems and technology. Describe common sources for acquiring information technology. Describe the traditional organizational structure of an information systems department.

© 2001 Business & Information Systems 2/e6 Learning Objectives (cont’d.) List the specialized personnel needed for World Wide Web and electronic commerce support. Identify methods used by organizations to control and secure their information systems.

© 2001 Business & Information Systems 2/e7 Learning Objectives (cont’d.) Describe different forms of computer crime and ways of preventing them. List several effects of information technology on employment.

© 2001 Business & Information Systems 2/e8 Planning for Information Systems and Technology Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e9 Planning for Information Systems and Technology The planning activity involves determining what should be done. Planning for information systems and technology involves determining what systems will be developed and what technology will be used in the future.

© 2001 Business & Information Systems 2/e10 Planning for Information Systems and Technology (cont’d.) The planning horizon can involve varying amounts of time. Operational planning – a few weeks to a few months. Tactical planning – several months to a few years Strategic planning – several years to a decade or more

© 2001 Business & Information Systems 2/e11 Planning for Information Systems and Technology (cont’d.) Planning involves evaluating risk. Risk is often related to three factors: 1.Size of the system development project. 2.Familiarity of the business with information technology used in the new system. 3.Amount of structure in the systems development process.

© 2001 Business & Information Systems 2/e12 Planning for Information Systems and Technology (cont’d.) Planning what information systems should be developed and what technology should be used involves selecting an application portfolio. An application portfolio is a description of what systems will be developed, and when, as well as an assessment of the risk associated with each system.

© 2001 Business & Information Systems 2/e13 Acquiring Information Technology Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e14 Acquiring Information Technology Five categories of information technology to be purchased: Hardware Software Networks Data management Personnel and training

© 2001 Business & Information Systems 2/e15 Hardware Computer hardware can be purchased from a number of sources. They include: Computer manufacturers Distributors Retail stores Value added resellers

© 2001 Business & Information Systems 2/e16 Software Software can be developed from scratch, purchased as a package, or purchased and then modified. Sources include: Developed or modified In-house programmers Contract programmers

© 2001 Business & Information Systems 2/e17 Software (cont’d.) Purchased Computer manufacturers Software companies Retail stores Value added resellers

© 2001 Business & Information Systems 2/e18 Networks Technology for networks can be acquired from a number of sources. They include: Network companies Computer manufacturers Software companies Value added resellers Telecommunications companies Value added network companies

© 2001 Business & Information Systems 2/e19 Data Management Acquiring data management technology first requires a decision about the basic approach to data management. Sources include: Computer manufacturers Software companies Database software companies

© 2001 Business & Information Systems 2/e20 Personnel and Training Managers can select personnel from inside the organization or hire from the outside. Training departments with full-time instructors provide courses and other forms of training. Computer Based Training (CBT) software is used to train users online.

© 2001 Business & Information Systems 2/e21 Organizing Information Systems Activities Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e22 Organizing Information Systems Activities Centralized versus decentralized management. Both management structures have advantages. Centralized is more economical with no duplication of personnel. Decentralized provides better response to user needs due to their proximity.

© 2001 Business & Information Systems 2/e23 Organizing Information Systems Activities (cont’d.) In a centralized management structure, decisions related to the information systems and technology are made by a single, centrally located group of managers.

© 2001 Business & Information Systems 2/e24 Organizing Information Systems Activities (cont’d.) In a decentralized management structure, decisions related to the information systems and technology are made by managers working in local departments or groups.

© 2001 Business & Information Systems 2/e25 Information Systems Organizational Structure Department may be called Information Systems (IS), Management Information Systems (MIS), Information Technology (IT), or something similar. Headed by an information systems manager, sometimes called a Chief Information Officer (CIO).

© 2001 Business & Information Systems 2/e26 Information Systems Organizational Structure (cont’d.) Traditional organization of an information systems department: Systems department Operations department Technical support department End-user support department WWW and electronic commerce support

© 2001 Business & Information Systems 2/e27 Systems Department Concerned with developing and maintaining information systems. Staff includes: Systems analysts Programmers, sometimes called application programmers Programmer/Analyst when a person performs both functions

© 2001 Business & Information Systems 2/e28 Operations Department Concerned with operating the computer and network equipment needed in information systems. Staff includes: Computer operators Data entry operators

© 2001 Business & Information Systems 2/e29 Technical Support Department Provides assistance in technical specialties to other areas. Staff includes: Database administrator System programmers Network analysts Network administrators

© 2001 Business & Information Systems 2/e30 End-user Support Department Helps users develop and use computer applications, mainly on personal computers. Staff includes: Personal computer analysts Help desk operators Technical trainers

© 2001 Business & Information Systems 2/e31 WWW and Electronic Commerce Support People involved in Web and e-commerce support are often part of the system development area in the information systems department. Staff includes: Webmaster Web programmers Multimedia developers E-commerce project manager

© 2001 Business & Information Systems 2/e32 Controlling and Securing Information Systems Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e33 Controlling and Securing Information Systems Information system controls Application controls – designed to ensure that the application processes all data correctly and produces the desired output. Input controls Data validation Output controls Storage controls Processing controls

© 2001 Business & Information Systems 2/e34 Controlling and Securing Information Systems (cont’d.) Hardware controls Error-checking hardware Parity bits Duplicate or redundant hardware RAID disk system – Redundant Array of Inexpensive Disks Fault-tolerant computer systems Uninterruptible Power Supply – UPS

© 2001 Business & Information Systems 2/e35 Controlling and Securing Information Systems (cont’d.) Failure recovery procedures Backup and recovery procedures Disaster recovery plan Information system security Physical security Electronic security

© 2001 Business & Information Systems 2/e36 Controlling and Securing Information Systems (cont’d.) Preventing computer crime requires special forms of security. Common computer crimes include: Theft of money Theft of data Theft and destruction of hardware Illegal copying of software Destruction of data and software

© 2001 Business & Information Systems 2/e37 The Effects of Information Technology on Employment Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e38 The Effects of Information Technology on Employment The effects of information technology on employment include: Displaced employees Changing patterns of work Employee health

© 2001 Business & Information Systems 2/e39 Ethical Management of Information Systems and Technology Managing Information Systems and Technology

© 2001 Business & Information Systems 2/e40 Ethical Management of Information Systems and Technology Ethical issues include: Privacy – what information should remain confidential Accuracy – is the information accurate Property – who owns the information Access – who needs to have access to the information

© 2001 Business & Information Systems 2/e41 Managing Information Systems and Technology Key Terms

© 2001 Business & Information Systems 2/e42 Key Terms Application Portfolio Application Programmer Chief Information Officer (CIO) Computer-Based Training (CBT) Computer Operator Data Entry Operator E-commerce Project Manager Fault-Tolerant Computer System Hacker Help Desk Help Desk Operator Information Center Information Systems Manager Multimedia Developer

© 2001 Business & Information Systems 2/e43 Key Terms (cont’d.) Network Analyst (Administrator) Personal Computer Analyst Planning Horizon Programmer/Analyst Public Domain Software Shareware Site License Software License Agreement Software Piracy System Programmer Technical Trainer UPS Value Added Reseller (VAR) Virus

© 2001 Business & Information Systems 2/e44 Key Terms (cont’d.) Webmaster Web Programmer

© 2001 Business & Information Systems 2/e45 Summary Planning for Information Systems and Technology Acquiring Information Technology Organizing Information Systems Activities Controlling and Securing Information Systems

© 2001 Business & Information Systems 2/e46 Summary (cont’d.) The Effects of Information Technology on Employment Ethical Management of Information Systems and Technology

Final Black Slide