Using Technology to Manage Information Chapter 14
LO 14.1 Distinguish between data and information, and explain the role of management information systems in business. LO 14.2 List the components and different types of information systems. LO 14.3 Outline how computer hardware and software are used to manage information. LO 14.4 Describe the networking and telecommunications technology and types of computer networks. Learning Objectives LO 14.5 Discuss the security and ethical issues involving computer information systems. LO 14.6 Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters. LO 14.7 Review the current trends in information systems.
Data: Raw facts and figures that may or may not be meaningful to a business decision Information: Knowledge gained from processing data Information system: An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence Chief information officer (CIO): The executive responsible for managing a firm’s information systems and related computer technologies Traditionally reports directly to the chief executive officer (CEO). Data, Information, and Information Systems
How is data different from information? a. Data is current; information is unchanging. b. Information is knowledge; data are the facts that can be converted to a usable form. c. Data is continuously collected but information is only collected sporadically. d. Information is more overwhelming than data. Test Your Knowledge
How is data different from information? a. Data is current; information is unchanging. b. Information is knowledge; data are the facts that can be converted to a usable form. c. Data is continuously collected but information is only collected sporadically. d. Information is more overwhelming than data. Answer: B Test Your Knowledge
Computer -based information systems: Information systems that use computer and related technologies to store information electronically in an organized, accessible manner Computer hardware Computer software Telecommunications and computer networks Data resource management Components and Types of Information Systems
Operational support systems Transaction processing system Process control system Management Support Systems Management information system (MIS) Decision support system (DSS) Executive support system (ESS) Expert system Types of Information Systems
A(n) _________ is a management support system that imitates human thinking through “if-then” rules. a. decision support system b. management information system c. executive support system d. expert system Test Your Knowledge
A(n) _________ is a management support system that imitates human thinking through “if-then” rules. a. decision support system b. management information system c. executive support system d. expert system Answer: D Test Your Knowledge
Hardware: All tangible, or physical, elements of a computer system Input devices are the components that store and process data, perform calculations The keyboard and mouse allow users to enter data and commands; storage and processing components consist of the hard drive and other storage components like flash drives. Output devices present results to users Monitors, printers transmit or display documents Computer Hardware
Types of computers Mainframes Supercomputers Midrange systems High-end network servers Personal computers Desktop, notebook (laptop) computers Tablets Hand-held devices PDAs, smartphones Computer Hardware
Software: A ll the programs, routines, and computer languages that control a computer and tell it how to operate Operating system Windows operating system Mac operating system Application Software Adobe Acrobat Microsoft PowerPoint Quicken Computer Software
The Internet Local area networks (LAN) Wide area networks (WAN) Wireless local networks (WiFi) Intranets Virtual private networks (VPN) Voice over Internet Protocol (VoIP) Computer Networks
A(n) _________ is a secure connections between two points on the Internet, using firewalls and programs that encrypt, or encode, data to make them more secure during transit. a. virtual private network (VPN) b. local area network (LAN) c. voice over Internet Protocol (VoIP) d. intranet Test Your Knowledge
A(n) _________ is a secure connections between two points on the Internet, using firewalls and programs that encrypt, or encode, data to make them more secure during transit. a. virtual private network (VPN) b. local area network (LAN) c. voice over Internet Protocol (VoIP) d. intranet Answer: A Test Your Knowledge
E-crime Malware Computer viruses Worms Botnet Trojan horses Spyware Security Issues affecting Information Systems
Use of information systems by employees and vendors Personal use Privacy Organizational use of information: Employment records Employee monitoring Customer data Ethical Issues affecting Information Systems
Natural disasters Power failures Equipment malfunctions Software glitches Human error Terrorist attacks The most basic precaution is routine backup of software and data, at the organizational and individual level. Disaster Recovery and Backup
The distributed workforce Employees who work in virtual offices Application service providers (ASP) An outside supplier that provides both the computers and the application support for managing an information system On-demand computing The use of software time from application providers; firms pay only for their usage of the software, not for purchasing or maintaining the software Cloud computing The use of powerful servers that store applications software and databases that users access by using any Internet- connected device, such as a PC or a smartphone Grid computing A network of smaller computers that run special software Information Systems Trends