Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Chapter 1: The Context of SA&D Methods
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Issues in Implementing Technology in Schools
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Organizational Cultures and Cultural Diversity
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
McGraw-Hill© 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
The Evolution of Management
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Chapter 8 Fundamentals of Decision Making Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Chapter 7 Planning and Strategy Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
Chapter 17 Managing Work Teams Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002.
Organizational Change and Learning
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Chapter 9 Planning and Decision Aids Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
The Legal System and Ethics in Information Security
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Presentation transcript:

Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002

Learning Objectives After reading this chapter, you should be able to:  Explain the role of information as a management resource  Describe six common information management technologies  Identify the primary factors involved in the design of information systems  State the ethical issues involved in information technologies 20.1

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Interrelated Criteria for Valuing Information Adapted from Figure Quantity Timeliness Relevance Quality

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Information Management Technologies Internet Extranets Intranets Decision Support Systems Expert Systems Group Decision Support Systems Increased Information Management Capability 20.3

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Internet Access: 4 Primary Capabilities Telnet Electronic Mail ( ) File Transfer Protocol World Wide Web 20.4

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Evolution in Information Needs Adapted from Figure 20.2 Data (raw facts and figures) Data analysis Useful information Decisions and actions Internally focused 20.5 Environment Externally focused

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Information Requirements by Decision Level Scope Aggregation level Time Horizon At Operational Level InformationCharacteristic Requirement Adapted from Table 20.1 At Strategic Level At Tactical Level Narrow, well defined Detailed Historical Broad Composite Future- oriented 20.6

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Information Requirement by Decision Level (cont.) Currency Frequency of use Type At Operational Level InformationCharacteristic Requirement Adapted from Table 20.1 At Strategic Level At Tactical Level Recent Continuous Quantitative Long term Periodic Qualitative & Quantitative 20.7

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Stages in Information Systems Development Adapted from Figure 20.3 Preliminary problem definition Conceptual design Detailed design Implementation Feedback 20.8

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Building Blocks for Effective Implementation of Information Systems 1. User Information 2. Top management support 3. Time and cost evaluation 6. Training and documentation 5. Thorough testing 4. Phased implementation 7. System backup Adapted from Figure

Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not use other people's intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you design 10. Thou shalt use a computer in ways that show consideration and respect for your fellow humans Adapted from Table