Download presentation
Presentation is loading. Please wait.
Published byErik Reed Modified over 9 years ago
1
Chapter 16:Managing Information and Technology
2
Basic element of computer technology Hardware: input, store, and organize data System software: performs functions necessary to operate a computer. Application Software: Helps user perform a task.
3
Networks Internet: Network of networks WWW: only 25% of traffic Broadband: 62% have access Internet2: high-tech internet Education, research, and collaboration
4
Cloud computing Internet based storage Significant benefits Saves space on computer Access anywhere Businesses are using cloud now.
5
Data and Information Critical for business decisions Current state of business, competitive environment, market trends Data: facts and figures that are collected, lack context Information: Processed data that is used in meaningful way. Accurate Relevant Timely Understandable Secure
6
Technology and Decision Making Decision support system: Gives managers large amounts of data, converted to high quality data. Business intelligence systems: discover subtle and complex relationships hidden in data. Expert system: Helps managers make better decisions in areas that lack expertise Devise program to mimic managers approach Asks a series of questions
7
E-Commerce Marketing, buying, and selling products over a network. B2C E-commerce- selling to a final customer Itunes, buy stocks Large target market Small transaction size B2B E commerce- sell supplies, components, machinery or services to other busniness. Much larger volume of e-commerce. Potentially large transaction
8
E-Commerce Web 2.0- Interactive features, creates richer, more interesting experience for customers. Forged stronger relationships Advertisement on Internet: Growing rapidly Important part of marketing strategy Viral marketing- get customers to communicate a firm’s message. E-marketplaces- buyers and sellers can communicate and conduct businesses. Radio frequency identification- stores info on a microchip that can transmit the info when in range of a specia reader.
9
Challenges and Security Malware- software that is distributed for malicious intent Spyware-tracks computer behavior Computer Viruses- can erase data and destroy your computer Worms- Can spread on its own. Spam- unsolicited emails. Phishing- appear to come from legit banks, try to obtain personal information Pharming-Fake websites with intent to get personal information Hackers- try to gain unauthorized access to the computer of others. Firewalls help prevent hackers by using hardware to create barriers.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.