13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Slides:



Advertisements
Similar presentations
1 CHAPTER 13 Information Technology for Business Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Business Essentials, 8th Edition Ebert/Griffin
Chapter 10 Privacy and Security McGraw-Hill
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
12-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 12 Pricing, Distributing, and Promoting Products.
Chapter 1: Information Systems and People Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
1-2 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 1 The U.S. Business Environment.
13 chapter Business Essentials, 7 th Edition Ebert/Griffin © 2009 Pearson Education, Inc. Information Technology for Business Instructor Lecture PowerPoints.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
13 chapter Business Essentials, 7 th Edition Ebert/Griffin © 2009 Pearson Education, Inc. Information Technology for Business Instructor Lecture PowerPoints.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Business Essentials 9e Ebert/Griffin Information Technology for Business chapter thirteen.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
5-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 5 Business Management.
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
4-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 4 The Global Context of Business.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
PowerPoint Presentation by Charlie Cook The University of West Alabama Business Essentials Ronald J. Ebert Ricky W. Griffin Managing Information 55 6e.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Business Essentials 9e Ebert/Griffin Information Technology for Business chapter thirteen.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Chapter 1: Explore the Network
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2015 Pearson Education, Inc # Information Technology (IT) for Business.
Security and Ethics Safeguards and Codes of Conduct.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall. Section 1.3 Complex Numbers Quadratic Equations in the Complex Number System.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.
The Inverse Trigonometric Functions (Continued)
Section 9.1 Polar Coordinates
Section R.8 nth Roots; Rational Exponents
Chapter 5 Electronic Commerce | Security
Managing Information Systems and Communications Technology
Section 2.4 Circles Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Technology
Chapter 5 Electronic Commerce | Security
Section 8.3 The Law of Cosines
Chapter 9 E-Commerce Security and Fraud Protection
Section 11.8 Linear Programming
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Mathematical Models: Building Functions
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Networking for Home and Small Businesses – Chapter 8
Quadratic Equations in the Complex Number System
Information Technology for Business
Properties of Rational Functions
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Information Technology
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
The Inverse Trigonometric Functions (Continued)
Privacy, Security, and Ethics
Presentation transcript:

13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business

13-2 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Discuss the impacts information technology has had on the business world. Identify the IT resources businesses have at their disposal and how these resources are used. Describe the role of information systems, the different types of information systems, and how businesses use such systems.

13-3 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Identify the threats and risks information technology poses on businesses. Describe the ways in which businesses protect themselves from the threats and risks information technology poses.

13-4 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Impacts

13-5 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Portable Offices: Providing Remote Access to Instant Information

13-6 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Better Service by Coordinating Remote Deliveries

13-7 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Leaner, More Efficient Organizations

13-8 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Increased Collaboration

13-9 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Global Exchange

13-10 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving Management Processes

13-11 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing Flexibility for Customization

13-12 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing New Business Opportunities

13-13 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving the World and Our Lives

13-14 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Building Blocks: Business Resources

13-15 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall The Internet and Other Communication Resources

13-16 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Networks: System Architecture

13-17 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hardware and Software

13-18 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Information Systems: Harnessing the Competitive Power of IT

13-19 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Leveraging Information Resources: Data Warehousing and Data Mining

13-20 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Types of Information Systems

13-21 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Risks and Threats

13-22 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hackers

13-23 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Identity Theft

13-24 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Intellectual Property Theft

13-25 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Computer Viruses, Worms, and Trojan Horses

13-26 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall

13-27 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Spam

13-28 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Protection Measures

13-29 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Unauthorized Access: Firewalls

13-30 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Identity Theft

13-31 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Infectious Intrusions: Anti-Virus Software

13-32 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Protecting Electronic Communications: Encryption Software

13-33 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Avoiding Spam and Spyware

13-34 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Ethical Concerns in IT

13-35 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Summary of Learning Objectives

13-36 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall