1-1 Managing Information Technology
1-2 Information ●What information do businesses keep and use? ●What information have you been exposed to today?
1-3 INFORMATION ●An organizational resource and tool –e.g. McDonalds, Walmart, Target –Can you name others? ●A resource that must be managed carefully ●Associated costs for production, distribution, security, storage, and retrieval
1-4 INFORMATION ●Global explosion ●Global accessibility –Internet –Private networks ●Often considered “intellectual property” ●Managed by information systems ●Often considered a strategic differentiator –Facebook –Google –Apple –Target
1-5 Information Technology ●Resources used to manage information –Computers, networks, phones, fax, etc. ●Often distinction between IT and systems development (IS)
1-6 Useful Information ●Accurate –How accurate do you need it? –What’s the cost of an error? ●Timely –Out of date may mean not accurate ●Complete –Do you see the total picture? ●Relevant –Companies often collect lots of data that is not relevant
1-7 Need to Control Information ●Get more data than can process –Used data mining ●Need to control it –Check data entering the system “Garbage in, garbage out.” –Check data in work flows –Check data leaving the organization
1-8 Information Users ●First level managers ●Middle managers ●Executive management ●Knowledge workers –Text distinguishes functional areas vs. knowledge workers –Others do not make this distinction
1-9 Information Systems ●Transaction Processing Systems (TPS) ●Office Automation Systems (OAS) –Work flows, MS Office ●Management Information Systems (MIS) –Provide reports, schedules, budgets ●Decision Support Systems (DSS) –Analyze problems. How much to make, order, enter new markets … ●Enterprise Resource Planning Systems (ERP) –Large, integrated systems for orders, inventory, accounting, payroll, … ●Executive Support Systems (ESS) –High level analysis ●Expert Systems and AI –E.g. loan approval, medical diagnosis
1-10 Internet ●Internet and intranet ●Need to have outside access ●Need to protect corporate information ●Security –Firewalls –Separate networks –Mail filters –Backups –Technology-People-Policy tradeoff
1-11 Threat Natural Unintentional Intentional Outsider ¨ fires ¨ floods ¨ earthquakes ¨ hurricanes ¨ extreme heat ¨ extreme cold ¨ software bugs ¨ system overloads ¨ hardware failures ¨ poorly trained administrators ¨ errors and accidents ¨ uniformed, unmotivated incompetent custodians Insider hacker - spy fraud organized crime competitor ¨ disgruntled employee ¨ former employee ¨ contract employee The Threat Tree
1-12 Managing Information Systems ●Determine needs (requirements) –Hardware (incl. performance) –Software –Networking –Staff ●Integrate ●Document & Train ●Test ●Evaluate and monitor –Needs change