©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

CIS 429 Fall 2007 Review for Comprehensive Final.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
©2002, Pearson Education Canada 1.1 c h a p t e r 1 1 MANAGING THE DIGITAL FIRM: CANADA AND BEYOND CANADA AND BEYOND.
Marketing for Hospitality and Tourism, 3e©2003 Pearson Education, Inc. Philip Kotler, John Bowen, James MakensUpper Saddle River, NJ Chapter 16.
Security, Privacy, and Ethics Online Computer Crimes.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter Two Information Technologies: Concepts and Management.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Chapter9 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Using Advanced Information Technology to Increase Performance chapter eighteen McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All.
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE Computer Systems Business Applications.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 5 © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
The Office Procedures and Technology
Protecting People and Information: Threats and Safeguards
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
E-Marketing and Customer Relationship Management
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
Principles of Information Systems Eighth Edition
4-1 Technology – Impact on Our Lives Information technology– processes and applications that create new methods to solve problems, perform tasks, and manage.
BUSN 16 Managing Information and Technology: Finding New Ways to Learn and Link ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied.
Information Technology and E-Commerce: Managing Information, Knowledge, and Business Relationships © 2007 The McGraw-Hill Companies, Inc., All Rights.
Marketing Management Online marketing
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE 1 DEFINE KEY TERMS ●computer system ●hardware ●software.
Using Technology to Manage Information Chapter 14.
Chapter 14 © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Types of Electronic Infection
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Business-to-Business Authors: Authors: Mladenka Jakovljevic, Prof. Dr. Veljko Milutinovic,
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Foundations of Information Systems in Business
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Chapter 04 E-Marketing and Customer Relationship Management Part Two Using Technology for Customer Relationships in a Global Environment.
© 2012 Cengage Learning. All Rights Reserved. Objective 2.04 Understand applications and issues of technology SLIDE 1 Objective 2.00 Understand the nature.
1.Why it is important to study and understand information systems. 2.Distinguish data from information. 3.Name the components of an information system.
Principles of Information Systems Eighth Edition Chapter 1 An Introduction to Information Systems.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Principles of Information Systems Eighth Edition Chapter 1 An Introduction to Information Systems.
© 2007 Prentice Hall, Inc. All rights reserved.13–1 Chapter 13 Information Technology for Business.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
Copyright © 2011 by Nelson Education Ltd. 1 Chapter 17: MANAGING INFORMATION AND TECHNOLOGY Finding New Ways to Learn and Link.
Managing Windows Security
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Information Technology and E-Commerce
Presentation transcript:

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16 Managing Information and Technology: Finding New Ways to Learn and Link Explain the basic elements of computer technology—including hardware, software, and networks—and describe key trends in each area Discuss the reasons for the increasing popularity of cloud computing Describe how data becomes information and how decision support systems can provide high- quality information that helps managers make better decisions

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16 Managing Information and Technology: Finding New Ways to Learn and Link Explain how Internet-based technologies have changed business-to-consumer and business-to- business commerce Describe the problems posed by the rapid changes in Internet-based technologies, and explain ways to address these problems

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Hardware and Software 4 Physical components used to collect, input, store, and process data and to display and distribute information Hardware Programs that provide instructions to a computer so that it can perform a desired task System software: Performs the critical functions necessary to operate a computer at the most basic level Applications software: Helps users perform a desired task Horizontal applications software Vertical applications software Software

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Computer Based Technologies: Smaller, Simpler, Swifter Network of networks, consisting of many smaller networks operating under a common set of protocols to communicate with each other Broadband Internet connection: Capacity to transmit large amounts of data very quickly Internet New generation of Internet technology based on fiber-optic cable Noncommercial network - Uses high-speed connectivity to improve education, research, and collaboration Internet2 Private network that makes documents accessible to employees of a single firm Intranet Limited access to certain areas of the intranet to external clients Extranet 5

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Role of the IT Department ■ Differs from one company to another  Implements key decisions about the technologies the firm will use  Maintains an organization’s information resources and provides technical support to employees 6

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Cloud computing: Sky’s the limit ■ Supplements or replaces internally owned computer resources using:  Internet-based storage capacity  Processing power  Computer applications ■ Accesses innumerable computing resources with little investment 7

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Cloud computing: Sky’s the limit ■ Eliminates the problem of excess capacity ■ Collaboration among employees and business partners ■ Parallel computing - Helps in data processing 8

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Web-link: Cisco ■ The link details on Cisco’s Cloud and Systems Management Technology /netmgtsw/technology.html 9

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Data to Information - Vital transformation Raw facts and figures a firm collects which becomes: Information: When processed, organized, and presented in a way that makes them useful to a decision maker Data Files of related data organized according to a logical system and stored in a computer- accessible storage media Database 10

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Characteristics of Good Information AccurateRelevant TimelyUnderstandable Secure 11

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Information Technology to Improve Decision Making 12 Give managers access to large amounts of data and the processing power to convert it into high-quality information quickly and efficiently Decision support systems Help businesses discover subtle and complex relationships hidden in their data Business intelligence systems

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Information Technology to Improve Decision Making Large, organization-wide database that provides a centralized location for storing data from both the organization’s own databases and external sources Data warehouse Uses powerful statistical and mathematical techniques to analyze vast amounts of data to identify useful information that had been hidden Data mining Guides the manager through the decision-making process Expert system 13

Reality TV Video Slide 14 ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part _kelly/videos/16wemeanbusiness.html

© iStockphoto.com / DNY59 ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. ■ How can information technology benefit the operations of Dr. Lou’s Spinal Fit practice? ■ Given the current state of Spinal Fit’s information technology usage, would cloud computing be a viable approach for Dr. Lou to pursue? 15

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Dynamics of E-commerce ■ Marketing, buying, selling, and servicing of products over a network or Internet  Business-to-consumer or B2C e-commerce: Businesses and final consumers interact  Business-to-business or B2B e-commerce: Businesses buy from and sell to other businesses 16

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Exhibit Key Differences between B2C and B2B E-Commerce 17

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Web 2.0 ■ Interactive and collaborative e-commerce with customers to:  Forge stronger relationships  Create a richer, more interesting, and useful experience  Encourage collaboration ■ Enterprise Use of Web 2.0 technologies within organizations 18

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Advertising on the Internet 19 ■ B2C companies have large target markets ■ Use opt-in as an advertising medium  Opt-in - Messages that the receiver has explicitly chosen to receive  Less expensive

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Viral Marketing ■ Getting customers to communicate a firm’s message to friends, family, and colleagues ■ Increases consumer awareness of a product ■ Use of social networking 20

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Handling Payments Electronically ■ Transactions are made secure by transmit payment information using a secure socket layer or SSL protocol ■ Cybermediary: Internet-based company that specializes in the secure electronic transfer of funds ■ Electronic bill presentment and payment: Bills are sent to customers via 21

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Information Technology in the B2B Market ■ B2B transactions result in long-term supply chain relationships ■ E-marketplaces: Provide a platform for B2B markets to interact  Reduce time, effort, and cost of doing business for both buyers and sellers  Smaller firms can afford to participate as connections between firms are not required 22

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Information Technology in the B2B Market  Easy contact and negotiation leading to a best fit  Additional services provided ■ Radio frequency identification (RFID): Improves efficiency of supply chains  Information can be used to help track goods and other resources as they move through a supply chain 23

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Threats in Internet and IT Software that is created and distributed with malicious intent Malware Software that installs itself on a computer without permission and then tracks the computer’s behavior Spyware Install themselves on computers without the users’ knowledge and spread by attaching to other files that are transferred between computers Computer viruses Independent programs that can spread across computer networks without being attached to other files Worms 24

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Steps for Protection against IT Threats ■ Perform regular backups ■ Install high-quality antivirus software ■ Update your operating system regularly ■ Do not open unknown messages ■ Do not download files from illegitimate websites 25

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Spam, Phishing, and Pharming Unsolicited commercial s, sent to a lot of people whether they are interested in the product or not Spam Common use of spam and phishers send s that appear to come from a legitimate business Phishing Uses fake websites to trick people into divulging personal information Pharming 26

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Hackers ■ Skilled computer users who can gain unauthorized access to others computers ■ Firewalls: Uses hardware or software to create a barrier, preventing unwanted messages from entering a computer system 27

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Ethical and Legal Issues ■ Personal privacy eroded through tracking of customer behavior ■ Intellectual property: Products that result from creative and intellectual efforts  Piracy of intellectual property - Reproducing and distributing copyrighted work without obtaining permission from the owner 28

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Web-link: Target - Identity Protection Guide ■ The link has guidelines by Target regarding measures to be taken in the instance of identity theft identity-safeguards 29

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Explain the basic elements of computer technology—including hardware, software, and networks—and describe key trends in each area Discuss the reasons for the increasing popularity of cloud computing Describe how data becomes information and how decision support systems can provide high- quality information that helps managers make better decisions

©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Explain how Internet-based technologies have changed business-to-consumer and business-to- business commerce Describe the problems posed by the rapid changes in Internet-based technologies, and explain ways to address these problems