13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business
13-2 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Discuss the impacts information technology has had on the business world. Identify the IT resources businesses have at their disposal and how these resources are used. Describe the role of information systems, the different types of information systems, and how businesses use such systems.
13-3 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Identify the threats and risks information technology poses on businesses. Describe the ways in which businesses protect themselves from the threats and risks information technology poses.
13-4 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Impacts
13-5 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Portable Offices: Providing Remote Access to Instant Information
13-6 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Better Service by Coordinating Remote Deliveries
13-7 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Leaner, More Efficient Organizations
13-8 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Increased Collaboration
13-9 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Global Exchange
13-10 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving Management Processes
13-11 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing Flexibility for Customization
13-12 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing New Business Opportunities
13-13 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving the World and Our Lives
13-14 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Building Blocks: Business Resources
13-15 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall The Internet and Other Communication Resources
13-16 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Networks: System Architecture
13-17 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hardware and Software
13-18 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Information Systems: Harnessing the Competitive Power of IT
13-19 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Leveraging Information Resources: Data Warehousing and Data Mining
13-20 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Types of Information Systems
13-21 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Risks and Threats
13-22 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hackers
13-23 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Identity Theft
13-24 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Intellectual Property Theft
13-25 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Computer Viruses, Worms, and Trojan Horses
13-26 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
13-27 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Spam
13-28 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Protection Measures
13-29 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Unauthorized Access: Firewalls
13-30 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Identity Theft
13-31 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Infectious Intrusions: Anti-Virus Software
13-32 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Protecting Electronic Communications: Encryption Software
13-33 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Avoiding Spam and Spyware
13-34 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Ethical Concerns in IT
13-35 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Summary of Learning Objectives
13-36 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall