Download presentation
Presentation is loading. Please wait.
Published byBlake Stafford Modified over 8 years ago
2
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement available here http://www.flatworldknowledge.com/legal. No part of this work may be used, modified, or reproduced in any form or by any means except as expressly permitted under the License Agreement.
3
EXPLORING BUSINESS V. 2.0 By Karen Collins
4
CHAPTER 15 MANAGING INFORMATION AND TECHNOLOGY
5
LEARNING OBJECTIVES Define IS and identify the tasks of the IS manager Explain how IS managers capture, store, and analyze data Discuss ways IS can be designed Describe information systems for networked computers Explain how 4 networking technologies communicate Identify/discuss challenges of e-commerce
6
DATA VERSUS INFORMATION DATAINFORMATION Unprocessed factsData that has been processed, or turned into some useful form.
7
INFORMATION SYSTEM MANAGEMENT Chief Information Officer Chief Technology Officer Information Managers: –Determine information needs –Collect data –Convert data into information –Direct information
8
DIFFERING INFORMATION NEEDS Top Managers –Planning –Setting Objectives –Strategic Decisions Middle Managers –Allocate Resources –Oversee Activities First-Line Managers –Supervise Employees –Oversee Daily Operations –Coordinate Activities
9
INFORMATION NEEDS AND FLOWS
10
NEED TO SHARE INFORMATION Integrated IT Enterprise Resource Planning System
11
ERP SYSTEM
12
DATA AND DATABASES Databases Data Warehouse Data Mining –Customer Behavior –Customer Relationship Management
13
DATA MINING PROCESS
14
TYPES OF INFORMATION SYSTEMS OPERATIONS SUPPORT Transaction Processing Process Control Design and Production MANAGEMENT SUPPORT Management information Decision support Executive information ARTIFICIAL INTELLIGENCE Expert Face-recognition
15
TRANSACTION PROCESSING SYSTEM
16
DESIGN AND PRODUCTION SYSTEMS Computer-Aided Design Computer-Aided Manufacturing Computer-Integrated Manufacturing Flexible Manufacturing
17
DECISION SUPPORT SYSTEMS
18
COMPUTER NETWORKS Applications Software Local-Area Network Wide-Area Network
19
LOCAL AREA NETWORK
20
DATA COMMUNICATION NETWORKS Internet –Internet Service Providers –World Wide Web/Browsers Intranets Extranets TRANSMIT DIGITAL DATA FROM ONE COMPUTER TO ANOTHER USING WIRED AND WIRELESS COMMUNICATION CHANNELS
21
CLOUD COMPUTING Applications of cloud computing: –Software-as-a Service (SssA): Gives companies access to a large assortment of software packages. –Infrastructure-as-a-Service (IaaS): Provides users with hardware, including servers, equipment and disk space. –Platform-as-a-Service (PaaS): Provide services that enable users to develop customized web applications. PERFORMING COMPUTER TASKS USING SERVICES PROVIDED OVER THE INTERNET
22
CLOUD COMPUTING ADVANTAGESDISADVANTAGES Cost savings Speed of Delivery Scalable Employees Can Be Mobile Information Technology Staff Disruption in Internet Service Security Service Provider System Crash
23
TECHNOLOGY OF THE WEB Web Pages Web Sites Webmaster Home Page Uniform Resource Locator Web Server Search Engine
24
INTRANETS/EXTRANETS INTRANET A private network using technologies available only to employees. FIREWALL Software that controls access to an intranet. EXTRANET Intranet partially available to certain parties outside the organization
25
EXTRANET YOUR DATABASES
26
E-COMMERCE CONDUCTING BUSINESS OVER THE INTERNET
27
BUSINESS USES OF THE INTERNET Presenting Information Selling Products Distributing Digital Products Acquiring Goods/Services Virtual Company
28
ELECTRONIC DATA INTERCHANGE
29
SECURITY ISSUES IN ELECTRONIC COMMUNICATION Data Security Malicious Programs Spoofing Revenue Theft Risks to Customers Malicious Programs: –Viruses –Worms –Trojan Horses Revenue theft: –Denial of Service –Piracy
30
RISKS TO CUSTOMERS Credit-Card Theft Password Theft Invasion of Privacy
31
COOKIES
32
SECURITY AND BUILDING TRUST ENCRYPTION Process of encoding data so only individuals or computers armed with a secret key can decode it. CERTIFICATE AUTHORITY A third party verifies the identity of the responding computer and sends the user a certificate of trust in the site.
33
CAREERS IN INFORMATION MANAGEMENT Chief Information Officer Chief Technology Officer
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.