Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.

Slides:



Advertisements
Similar presentations
Chapter 1: Information Technology
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
© Prentice Hall CHAPTER 15 Managing the IS Function.
Gaining a Competitive Advantage
Chapter 1: The Context of SA&D Methods
Chapter 1 Foundations of Information Systems in Business.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER YOUR FUTURE AND INFORMATION TECHNOLOGY.
Your Future and Information Technology
Chapter 1 - Managing in the Digital World
Globalization Copyright © 2010 Pearson Education, Inc. publishing as Prentice Hall.
International MIS Chapter Extension 18. ce18-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
Creating Value through Human Resources Chapter 1.
What Is Computer Ethics?
Computer Ethics – The Ten Commandments
Issues in Implementing Technology in Schools
Computer ethics.
Human Resource Management Gaining a Competitive Advantage
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Computers Are Your Future Tenth Edition Chapter 10: Careers & Certification Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Computer Information Systems. Overview  What is Information Systems (IS)?  Computer Information Systems (CIS) Major  Careers in CIS/IT.
Copyright © 2014 Pearson Education, Inc. 1 Brad N Greenwood MIS2101 Chapter 1 - Managing in the Digital World.
International MIS International Dimension. ID-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
CHAPTER 10 Technology Issues.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Information Systems Today: Managing in the Digital World “You can’t just ask people what they want and then try to give it to them. By the time you.
Business Ethics Why should business ethics concern you?
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
© 2003 Prentice Hall, Inc.1-1 Chapter 1 Information Systems: The Big Picture Information Systems Today Leonard Jessup and Joseph Valacich.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
© 2003 Prentice Hall, Inc.1-1 Chapter 1 Information Systems: The Big Picture Information Systems Today Leonard Jessup and Joseph Valacich.
Information Systems in Organizations 1.1 The Modern Organization is a system and set of processes.
Copyright © 2016 – Curt Hill Globalization What cause it? What challenges and opportunities are provided?
Information Systems in Organizations 1.1 The Modern Organization is a system and set of processes.
Copyright © 2016 – Curt Hill The Digital World Understanding the challenges of this world.
1-1 Human Resource Management: Gaining a Competitive Advantage HRM.
Copyright © 2016 Pearson Education, Inc.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Information Systems in Organizations 1.1 The Modern Organization is a system and set of processes.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 6/21/ The iPad is Apple’s latest gadget.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 7/9/ The iPad is Apple’s latest gadget.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
MGMT 452 Corporate Social Responsibility
The Legal System and Ethics in Information Security
CHAPTER 1 Human Resource Management in Organizations
Information Technology
Presentation transcript:

Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in the Digital World

Copyright © 2014 Pearson Education, Inc. 2 Information is a Valuable Resource

Copyright © 2014 Pearson Education, Inc. 3 Five IT Megatrends in the Information Age

Copyright © 2014 Pearson Education, Inc. 4 Five IT Megatrends in the Information Age: Big Data IDC estimated that in 2011, 1.8 zettabytes of data were generated and consumed How much is 1.8 zettabytes? 1.8 trillion gigabytes, or the equivalent of 57 billion 32GB iPads (IDC, 2011) This number is forecast to grow by 50 times by 2020

Copyright © 2014 Pearson Education, Inc. 5 Five IT Megatrends in the Information Age: Consumerization of IT Consumerization may be the most significant trend affecting organizational IT personnel – Today’s employees bring their own devices to work – Initially used for s / social networking Now used for other important tasks such as enterprise resource planning – Creates security concerns – Opens up new opportunities

Copyright © 2014 Pearson Education, Inc. 6 Opportunities of Operating in the Digital World Falling Transportation Costs – Shipping a bottle of wine from Australia to Europe merely costs a few cents Falling Telecommunication Costs – These have helped create shared perspectives of behavior, desirable goods, and even forms of government Reaching Global Markets Accessing a Global Labor Pool – Highly skilled or low cost labor pools exist in many countries which are now economically accessible

Copyright © 2014 Pearson Education, Inc. 7 The Components of Information Systems Five Components of Information Systems: – People – Telecommunications – Hardware – Data – Software

Copyright © 2014 Pearson Education, Inc. 8 People: The Builders, Managers, and Users of Information Systems An ecosystem of Users, Builders, Managers, and those who study information systems As the use of information systems grows, so does the need for dedicated IS professionals Growing demand focused on those with advanced and/or unique skills

Copyright © 2014 Pearson Education, Inc. 9 IS Positions Rank Among the Best Jobs in America RankCareerJob Growth (10-year forecast)Median Pay 1Software developer32%$82,400 2Physical therapist30%$75,900 3Financial adviser30%$93,900 4Civil engineer24%$74,700 5Marketing specialist28%$52,200 6Management consultant24%$111,000 7IT consultant20%$96,500 8Database administrator20%$86,600 9Financial analyst20%$62,600 10Environmental engineer31%$81,200

Copyright © 2014 Pearson Education, Inc. 10 Organizations: The Context of Information Systems Information Systems can help organizations – Be more productive and profitable – Gain competitive advantage – Reach more customers – Improve service to their customers This holds true for all types of organizations— professional, social, religious, educational, and governmental

Copyright © 2014 Pearson Education, Inc. 11 Computer ethics “Describes the moral issues and standards of conduct as they pertain to the use of information systems” Collecting and analyzing user data may have negative impacts – Social decay – Increased consumerism – Loss of privacy

Copyright © 2014 Pearson Education, Inc. 12 The Need for a Code of Ethical Conduct: Computer Ethics Institute Guidelines The guidelines prohibit: – Using a computer to harm others – Interfering with other people’s computer work – Snooping in other people’s files – Using a computer to steal – Using a computer to bear false witness – Copying or using proprietary software without paying for it – Using other’s resources without authorization or compensation – Appropriating other people’s intellectual output The guidelines recommend: – Review social consequences of programs and systems you design – Use computers in ways that show consideration and respect for others

Copyright © 2014 Pearson Education, Inc. 13 The Digital Divide Many people are being left behind in the information age – Strong linkage between computer literacy and a person’s ability to compete in the information age – People in rural communities, the elderly, people with disabilities, and minorities lag behind national averages for Internet access and computer literacy – The challenges in overcoming the digital divide are even greater in developing countries