Chapter 16:Managing Information and Technology
Basic element of computer technology Hardware: input, store, and organize data System software: performs functions necessary to operate a computer. Application Software: Helps user perform a task.
Networks Internet: Network of networks WWW: only 25% of traffic Broadband: 62% have access Internet2: high-tech internet Education, research, and collaboration
Cloud computing Internet based storage Significant benefits Saves space on computer Access anywhere Businesses are using cloud now.
Data and Information Critical for business decisions Current state of business, competitive environment, market trends Data: facts and figures that are collected, lack context Information: Processed data that is used in meaningful way. Accurate Relevant Timely Understandable Secure
Technology and Decision Making Decision support system: Gives managers large amounts of data, converted to high quality data. Business intelligence systems: discover subtle and complex relationships hidden in data. Expert system: Helps managers make better decisions in areas that lack expertise Devise program to mimic managers approach Asks a series of questions
E-Commerce Marketing, buying, and selling products over a network. B2C E-commerce- selling to a final customer Itunes, buy stocks Large target market Small transaction size B2B E commerce- sell supplies, components, machinery or services to other busniness. Much larger volume of e-commerce. Potentially large transaction
E-Commerce Web 2.0- Interactive features, creates richer, more interesting experience for customers. Forged stronger relationships Advertisement on Internet: Growing rapidly Important part of marketing strategy Viral marketing- get customers to communicate a firm’s message. E-marketplaces- buyers and sellers can communicate and conduct businesses. Radio frequency identification- stores info on a microchip that can transmit the info when in range of a specia reader.
Challenges and Security Malware- software that is distributed for malicious intent Spyware-tracks computer behavior Computer Viruses- can erase data and destroy your computer Worms- Can spread on its own. Spam- unsolicited s. Phishing- appear to come from legit banks, try to obtain personal information Pharming-Fake websites with intent to get personal information Hackers- try to gain unauthorized access to the computer of others. Firewalls help prevent hackers by using hardware to create barriers.