Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.

Slides:



Advertisements
Similar presentations
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Advertisements

©2002, Pearson Education Canada 1.1 c h a p t e r 1 1 MANAGING THE DIGITAL FIRM: CANADA AND BEYOND CANADA AND BEYOND.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-business Infrastructure
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Business Systems Chapter 7.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Information Technologies: Concepts and Management
Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 1 Moore’s Law.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 13 Information Technology for Business.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Living in a Digital World Discovering Computers 2010.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
Chapter 14 Enterprise Computing.
Using Technology to Manage Information Chapter 14.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Using Technology to Manage Information
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT Chuck Williams.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
1.less than 3 million. 2.less than 10 million. 3.over 23 million. 4.over 100 million. 5.Not sure In the U.S., the number of managers that rely on Information.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
© Prentice Hall, 2005Excellence in Business, Revised Edition Chapter Fundamentals of Information Management, the Internet, and E-Commerce.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Managing Information and Technology Exploring Business Class 11 Tuesday 10/4/11.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Adeyl Khan, Faculty, BBA, NSU 1. IT refers to the resources used by an organization to manage information that it needs in order to carry out its mission.
© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.
What Is Enterprise Computing?
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
Chapter 17 Risks, Security and Disaster Recovery
Exam 1 Terminology Review
Managing Information Systems and Communications Technology
Chapter 9 e-Commerce Systems McGraw-Hill/Irwin
Copyright 2005 Prentice- Hall, Inc.
Information Technology & Knowledge Management
Information Technology and E-Commerce
Information Technology and E-Commerce
Presentation transcript:

Managing Information And Technology

Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers capture, store, and analyze data 3.Discuss ways IS can be designed 4.Describe information systems for networked computers 5.Explain how 4 networking technologies communicate 6.Identify/discuss challenges of e-commerce 7.Identify careers in information management

Data V. Information “…data- unprocessed facts.” “…information- data that have been processed, or turned into some useful form.”

Information System “…the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company- wide activities.”

IS Management  Chief Information Officer  Chief Technology Officer  Information Managers Determine information needs Collect data Convert data into information Direct information

Differing Information Needs  Top Managers Planning Setting Objectives Strategic Decisions  Middle Managers Allocate Resources Oversee Activities  First-Line Managers Supervise Employees Oversee Daily Operations Coordinate Activities

Information Needs and Flows

Need To Share Information z Integrated IT z Enterprise Resource Planning System

ERP System

Data and Databases 5 Databases 5 Data Warehouse 5 Data Mining Customer Behavior Customer Relationship Management

Data Mining Process

Types Of Information Systems  Operations Support Transaction Processing Process Control Design & Production  Management Support  Decision Support  Executive Information  Artificial Intelligence Expert Face-Recognition

Transaction Processing System

Design And Production Systems  Computer-Aided Design  Computer-Aided Manufacturing  Computer-Integrated Manufacturing  Flexible Manufacturing

Decision Support Systems

Executive Information Systems  Artificial Intelligence Expert Systems Face-Recognition Technology “…senior managers [need] ready access to strategic information that’s customized to their needs... In a convenient format.”

Computer Networks h Applications Software h Local-Area Network h Wide-Area Network

Local Area Network

Data Communication Networks : Internet Internet Service Providers World Wide Web/Browsers : Intranets : Extranets “…transmit digital data… from one computer to another using...wired and wireless communication channels.”

Technology Of The Web  Web Pages  Web Sites  Webmaster  Home Page  Uniform Resource Locator  Web Server  Search Engine

Intranets/Extranets Intranet – “…a private network using… technologies… available only to employees....” Firewall – Software that controls access to an Intranet Extranet – “…intranet… partially available to certain parties outside the organization.”

Extranet

E-Commerce “…conducting business over the Internet...”

Business Uses Of The Internet  Presenting Information  Selling Products  Distributing Digital Products  Acquiring Goods/Services  Virtual Company

Electronic Data Interchange & Value-Added

Security Issues In Electronic Communication  Data Security  Malicious Programs  Spoofing  Revenue Theft  Risks to Customers

Malicious Programs  Viruses  Worms  Trojan Horses

Types Of Revenue Theft  Denial of Service  Piracy - Firewalls

Risks To Customers  Credit-Card Theft  Password Theft  Invasion of Privacy

How Cookies Work

Shoring Up Security And Building Trust Encryption – “…process of encoding data so...only individuals (or computers) armed with a secret code (or key) can decode it.” Certificate Authority – “…a third party… verifies the identity of the responding computer and sends you a digital certificate stating that it trusts the site.”

Careers In Information Management  Chief Information Officer  Chief Technology Officer