Download presentation
Presentation is loading. Please wait.
Published byBarbra Hart Modified over 9 years ago
1
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business
2
13-2 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Discuss the impacts information technology has had on the business world. Identify the IT resources businesses have at their disposal and how these resources are used. Describe the role of information systems, the different types of information systems, and how businesses use such systems.
3
13-3 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Learning Objectives After reading this chapter, you should be able to: Identify the threats and risks information technology poses on businesses. Describe the ways in which businesses protect themselves from the threats and risks information technology poses.
4
13-4 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Impacts
5
13-5 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Portable Offices: Providing Remote Access to Instant Information
6
13-6 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Better Service by Coordinating Remote Deliveries
7
13-7 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Creating Leaner, More Efficient Organizations
8
13-8 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Increased Collaboration
9
13-9 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Enabling Global Exchange
10
13-10 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving Management Processes
11
13-11 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing Flexibility for Customization
12
13-12 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Providing New Business Opportunities
13
13-13 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Improving the World and Our Lives
14
13-14 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Building Blocks: Business Resources
15
13-15 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall The Internet and Other Communication Resources
16
13-16 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Networks: System Architecture
17
13-17 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hardware and Software
18
13-18 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Information Systems: Harnessing the Competitive Power of IT
19
13-19 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Leveraging Information Resources: Data Warehousing and Data Mining
20
13-20 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Types of Information Systems
21
13-21 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Risks and Threats
22
13-22 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Hackers
23
13-23 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Identity Theft
24
13-24 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Intellectual Property Theft
25
13-25 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Computer Viruses, Worms, and Trojan Horses
26
13-26 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
27
13-27 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Spam
28
13-28 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall IT Protection Measures
29
13-29 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Unauthorized Access: Firewalls
30
13-30 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Identity Theft
31
13-31 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Preventing Infectious Intrusions: Anti-Virus Software
32
13-32 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Protecting Electronic Communications: Encryption Software
33
13-33 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Avoiding Spam and Spyware
34
13-34 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Ethical Concerns in IT
35
13-35 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Summary of Learning Objectives
36
13-36 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.