Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.

Similar presentations


Presentation on theme: "Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright."— Presentation transcript:

1 Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002

2 Learning Objectives After reading this chapter, you should be able to:  Explain the role of information as a management resource  Describe six common information management technologies  Identify the primary factors involved in the design of information systems  State the ethical issues involved in information technologies 20.1

3 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Interrelated Criteria for Valuing Information Adapted from Figure 20.1 20.2 Quantity Timeliness Relevance Quality

4 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Information Management Technologies Internet Extranets Intranets Decision Support Systems Expert Systems Group Decision Support Systems Increased Information Management Capability 20.3

5 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Internet Access: 4 Primary Capabilities Telnet Electronic Mail (E-Mail) File Transfer Protocol World Wide Web 20.4

6 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Evolution in Information Needs Adapted from Figure 20.2 Data (raw facts and figures) Data analysis Useful information Decisions and actions Internally focused 20.5 Environment Externally focused

7 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Information Requirements by Decision Level Scope Aggregation level Time Horizon At Operational Level InformationCharacteristic Requirement Adapted from Table 20.1 At Strategic Level At Tactical Level Narrow, well defined Detailed Historical Broad Composite Future- oriented 20.6

8 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Information Requirement by Decision Level (cont.) Currency Frequency of use Type At Operational Level InformationCharacteristic Requirement Adapted from Table 20.1 At Strategic Level At Tactical Level Recent Continuous Quantitative Long term Periodic Qualitative & Quantitative 20.7

9 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Stages in Information Systems Development Adapted from Figure 20.3 Preliminary problem definition Conceptual design Detailed design Implementation Feedback 20.8

10 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Building Blocks for Effective Implementation of Information Systems 1. User Information 2. Top management support 3. Time and cost evaluation 6. Training and documentation 5. Thorough testing 4. Phased implementation 7. System backup Adapted from Figure 20.4 20.9

11 Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright © 2002 Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not use other people's intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you design 10. Thou shalt use a computer in ways that show consideration and respect for your fellow humans Adapted from Table 20.2 20.10


Download ppt "Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright."

Similar presentations


Ads by Google