Using Technology to Manage Information Chapter 13.

Slides:



Advertisements
Similar presentations
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Advertisements

8.
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Copyright © 2004 South-Western. All rights reserved.18–1 Learning Goals components ways computers contribute challenges of managing today’s information.
All Organizations Need to Share and Communicate Information...
Chapter 7 e-Business Systems.
Chapter 5: Logistics Information Systems pp Data. Communications. Tools. E-Commerce & Logistics.
9 C H A P T E R Transaction Processing and Enterprise Resource Planning Systems.
Introduction to Hospitality, Fourth Edition John Walker ©2006 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Chapter 18 Hospitality.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
The Office Procedures and Technology
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Part VII: Special Topics Introduction to Business 3e 18 Copyright © 2004 South-Western. All rights reserved. Using Information Technology.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Principles of Information Systems, Sixth Edition Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
Computer Networks S3 Prepared by May Lau
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE 1 DEFINE KEY TERMS ●computer system ●hardware ●software.
Chapter 14 Enterprise Computing.
Using Technology to Manage Information Chapter 14.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
Introduction to Computers Lesson 12A. home Information System A mechanism that helps people collect, store, organize and use information.
Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION INFORMATION SYSTEMS IN HOSPITALITY INDUSTRIES Chapter 12.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 1 Information Systems in Business.
1 California State University, Fullerton Chapter 1 Information Systems in Business.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Using Technology to Manage Information
Functional/Departmental Interdependence Wrap-up Chapter.
history, hardware, software, safety, and computer ethics
Chapter 8 Transaction Processing Systems. Agenda OLD transaction processing systems Innovative IT applications SAP R/3.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Chapter 8 Managing Operations. Key Points in Chapter 8 Outsourcing IS Functions Outsourcing IS Functions Security in the Internet Age Security in the.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
© Prentice Hall, 2005Excellence in Business, Revised Edition Chapter Fundamentals of Information Management, the Internet, and E-Commerce.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Kingdom of Saudi Arabia Ministry of Higher Education Al-Imam Muhammad Ibn Saud Islamic University College of Computer and Information Sciences 1 Chapter.
Management Information Systems, 4 th Edition 1 I. Sharing Information Systems Vertical market –A market in which the goods of one business are used as.
Chapter 8: Computers and the Media Center Amy Coffey September 30, 2002 ETEC 579 Dr. Jason Lee Davis.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
What Is Enterprise Computing?
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
Chapter 7 e-Business Systems.
ניהול מערכות המידע הלוגיסטיות
NETWORK SECURITY.
Chapter 13 Security and Ethical Challenges.
ACCOUNTING INFORMATION SYSTEMS
King Saud University- College OF Applied Studies
Chapter 8: Managing Media
King Saud University- College OF Applied Studies
Online Learning.
Copyright 2005 Prentice- Hall, Inc.
Information Technology and E-Commerce
Presentation transcript:

Using Technology to Manage Information Chapter 13

I. Computer Networks A. Local area networks (LAN) –connects computers at one site –people can share hardware & software B. Wide area networks (WAN) –connects computers at different sites by phone, satellite, or microwave

II. Uses of Computers A. Computational models 1. Statistical analysis 2. Optimization models (linear programming) 3. “What if” analysis B. Data processing systems 1. Accuracy, speed, space, flexibility C. Inter-organizational systems 1. Electronic data interchange systems (EDI)

III. Business Information Systems A. Transaction Processing systems 1. Batch processing 2. Online processing (real-time processing) B. Management Support Systems 1. Information reporting systems 2. Decision support systems 3. Expert systems

C. Business applications - payroll, record keeping, inventory control, scheduling, order processing D. Limitations of current packages 1. Modify the company’s business procedures to fit an existing package 2. Customize an existing application 3. Build an entirely new application

An Integrated Information System Expert systems Information reporting system Internal data sources Internal database Suggested decisions Transaction processing system External data sources Decision support systems Possible solutions Executive information systems External database

IV. Managing Info Technology A. Technology planning coordination of executives, IT managers, & area managers B. Protecting computers & information 1. data security (unauthorized access and use, security breaches, deliberate damage, computer virus) 2. preventing problems - installing fixes to prevent future worms or viruses from harming hardware or software 3. privacy of information - finding a balance between collecting info and protecting individual consumer rights

V. The Future of the Internet A. Lack of central authority B. Lack of underlying organization C. Network performance D. Individual performance

VI. Trends in Technology  Information appliances  palmtops, web phones  smarter household appliances include:  washers with dirt sensors  refrigerators with adaptable defrost  microwaves & refrigerators that ‘know’ what is inside by scanning bar codes (Source: Consumer Reports, Jan. 2000, p. 18)