Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc. 2002. All rights reserved. Irwin/McGraw-Hill.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Organizing Information Technology Resources
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Enterprise e-Business Systems.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 12: Planning for Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Chapter 12 Strategies for Managing the Technology Infrastructure.
1 Chapter 7 IT Infrastructures Business-Driven Technology
E-Commerce: The Second Wave Fifth Annual Edition Chapter 12: Planning for Electronic Commerce.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 10 Managing the Delivery of Information Services.
BUSINESS DRIVEN TECHNOLOGY
Lecture 15 Chapter 8 Organizing and Leading the IT Function.
Managing Projects
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
IT CAREERS Prepared by: Careene McCallum-Rodney. Computer Technician  Computer technicians:  install,  repair,  maintain,  and analyze many different.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Slide 11-1 Chapter 11 Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Organizing Information Technology Resources
McGraw-Hill/Irwin Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved Chapter 14 Enterprise Resource Planning Systems.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Invitation to Computer Science 5th Edition
IT infrastructure Introduction Tehran university Mahdi Faghihi 2012 In The Name of God.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Networks QUME 185 Introduction to Computer Applications.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Chapter 13 Information Technology Economics. Agenda IT Organization IT Productivity IT Benefits Data Center Economics.
Strategically Managing the HRM Function McGraw-Hill/Irwin ©2012 The McGraw-Hill Companies, All Rights Reserved.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Copyright ©2005 by South-Western, a division of Thomson Learning. All rights reserved Chapter 17 1 Information Management Systems MANAGEMENT Meeting and.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
1 Enterprise Requirement Planning For Manufacturing.
Chapter 9  2000 by Prentice Hall. 9-1 Client/Server Computing.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Information Security Crisis Management Daryl Goodwin.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Chapter 8 Controlling Information Systems: IT Processes.
What Is Enterprise Computing?
Chapter 12: Planning for Electronic Commerce
Core Competencies Training for Supervisors
Information Systems Development
Discovering Computers 2010: Living in a Digital World Chapter 14
Core Competencies Training for Supervisors
Managing the Delivery of Information Services
Information Resource Management
IT INFRASTRUCTURES Business-Driven Technologies
Understanding Back-End Systems
Management Information Systems
6. Application Software Security
Presentation transcript:

Chapter 13 Information Resource Management The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill

2 Chapter Objectives To fully appreciate the vulnerability organizations have to full or partial failure of their information systems. To understand the relevance of information systems and digital content as important corporate resources. To appreciate the role of information systems planning. To understand the importance of security and disaster recovery planning for protecting information resources.

3 Hershey’s Big Dud In 1999 Hershey implemented a $112 million dollar computer system. System was to automate and modernize everything. –Within 2 months serious problems developed. –Orders were delayed and competitors benefited. –Hershey used “big bang” approach. –Vendors cited complexity of the situation as the reason for system failure.

4 Corporate Resources I/T should be viewed as a corporate resource. –Organizations need to invest in I/S. –Organizations need to manage their I/S. Content should be viewed as a corporate resource. –Data needs to be Captured Processed Stored Communicated

5 Organizational Assets Employees Loyal Customers Capital (money) Physical Assets Information systems Content (data and knowledge)

6 Information Systems Planning 1.Business Strategy 2.I/T Strategy 3.I/T Portfolio –I/S Planning is an on-going activity. Environmental issues. Technological changes.

7 Questions for I/S Planning Where are we? What are we doing? Where do we want to go? What are our competitors doing? What are customers asking for? How do we get there; that is what is the role of I/T in enabling the necessary capabilities to delivery what customers want better than the competition? When will it be done? Who will do it; do we have the necessary skills and resources internally to deliver what we need? How much will it cost? Does it make economic sense?

8 Management and I/S Information Systems as perceived by management. –Infrastructure –Transactional –Informational –Strategic (Competitive)

9 Organization of the Information Services Department What are the information management functions that need to be performed? –Centralized or decentralized What is the best way to organize the information systems specialist to perform these functions?

10 Cost and Resource Management Information Systems have –Tangible costs –Intangible costs Methods to control costs of I/S vary. –Chargeback allows the I/S department to charge business units for services rendered.

11 Typical Responsibilities for an Information Services Department Developing a comprehensive I/T strategy. Documenting, operating, and maintaining the existing inventory of corporate hardware, software, and information systems. Setting standards for telecommunications and installing and maintaining local and wide area networks. Developing, maintaining, and protecting organizational databases and critical applications. Evaluating, acquiring, and integrating new hardware and software products.

12 Typical Responsibilities for an Information Services Department Training and supporting internal customers. Developing procedures to negotiate with and oversee outside information systems consultants and vendors in the acquisition and development of new information technology and systems. Facilitating the transfer of technology across organizational units. Initiating and managing outsourcing vendor and service provider relationships.

13 Disaster Recovery Planning Disaster recovery plans have become more of a management priority now that more industries are more dependant on data. –Includes all business systems. –Need to identify all critical systems. –Off-site storage is critical. Some businesses are pursuing business continuity planning, which covers all aspects needed to ensure that the business would be able to operate regardless of the disaster.

14 Process for Planning Off-Site Storage 1.Analyzing and classifying data. 2.Reviewing existing backup procedures. 3.Selecting a storage vendor. 4.Formalizing the schedules for routine removal of data to storage.

15 Sample Strategies for Backup & Recovery StrategyDescription ReplacementSuspend operations or revert to manual systems until new I/S is up and running. Cold siteAn off-site facility without a computer, able to serve as an alternate processing site. Reciprocal agreement Two companies with similar systems agree to let the other share their facilities if necessary. Hot siteA free standing, fully equipped site used by multiple companies. Redundant systemAn identical, fully operational data center, typically in a separate geographical location.

16 When Disaster Strikes 1.Assess damage. 2.Get communications and application systems operational as soon as possible. 3.Ensure appropriate employees are located and notified.

17 Systems Security Companies must protect themselves against natural disasters, vandalism, cyberterrorism, and internal sabotage. –Viruses are a major source of computer systems failures. Viruses are transmitted electronically. Antiviral products are available. Human intelligence is a key component in system security.

18 Common Systems Vulnerabilities Default software installations: Operating systems and applications are often installed with extra features that users are unaware of and hence don’t monitor for security flaws. Accounts with no passwords: Computer passwords are easy to steal or guess using automate password testing procedures. Inadequate backups:Many companies back up data but don’t test to see if the backups are adequate. Too many open doors: Computer systems exchange data using connection points known as ports: Some companies leave ports open, creating opportunities for hackers.

19 Common Systems Vulnerabilities False addresses: Attackers try to hide their tracks by spoofing the addresses contained in packets of data that they send. Bad record keeping: I/S can log most activities but sometimes the record keeping function is not turned on. Logs are critical to discovering what happened in an attack. Vulnerable web programs: Common gateway interface programs (CGI scripts) are common in web pages. CGI scripts make it possible for a hacker to manipulate the OS of the server. attachments: Common vulnerability is attachments that are executable program files containing viruses.