SlideShare una empresa de Scribd logo
1 de 16
Chapter 15 Using Technology to Manage Information Learning Goals Distinguish between data and information and explain the role of management information systems in business. Identify and briefly describe the different types of information system programs. Describe the hardware and software used in managing information. Identify how software can help businesspeople. Explain the importance of special network technologies. List the ways that companies can protect themselves from computer crimes. Explain how companies anticipate, plan for, and  recover from information  system disasters. 1 2 3 4 5 6 7
MANAGEMENT INFORMATION SYSTEMS Data  Raw facts and figures that may or may not be relevant to  a business decision. Information  Knowledge gained from processing data. Management information system (MIS)  Organized method  for providing past, present, and projected information on  internal operations as well as external intelligence to  support decision making. •  Usually headed by a  chief information officer  who reports directly to the CEO. •  Generally assists multiple departments throughout an organization.
Databases Database  Centralized integrated collection of data resources. •  Data available online:  Census Bureau ,  Bureau of Labor Statistics . •  Commercial online services, such as  LexisNexis  and  Infotrac . Business Intelligence •  Data mining  or  business intelligence  Using computer-based technology to retrieve and evaluate data in a database to identify useful trends.  •  C an help create customer profiles, pinpoint reasons for customer loyalty, analyze the impact of pricing changes, and forecast sales.
INFORMATION SYSTEMS FOR DECISION MAKING Decision Support System Decision support system (DSS)  Information system that quickly provides relevant data to help businesspeople make decisions and choose courses of action. Executive Support Systems •  System that allows top managers to access a firm ’s  primary databases. Expert Systems •  Computer program that imitates human thinking through complicated  sets of  “i f-then”  r ules.
Trends in Information Systems Local Area and Wide Area Networks •  Local area networks (LANs)  Computer networks that connect machines within limited areas, such as a building or several buildings near one another.  •  Wide area networks (WANS)  Tie larger geographical regions together by using telephone lines and microwave and satellite transmission. Expert Systems •  Computer program that imitates human thinking through complicated sets of  “i f-then”  r ules. Wi-Fi  Wireless network that connects various devices and allows them to communicate with one another through radio waves. How  Wi - Fi  works
Application Service Providers and On-Demand Computing Application service provider (ASP)  Specialist in providing both the computers and the application support for managing information systems for clients. •  Allows buyer to focus on core business functions. •  On-demand computing  Firms essentially rent software time from  application providers and pay only for their usage of the software.
COMPUTER HARDWARE AND SOFTWARE •  Computers have become indispensable as they have gotten more powerful and less expensive. Types of Computer Hardware •  Hardware  All tangible elements of a computer system —t he input devices, the components that store and process data and perform required calculations, and the output devices that present the results to information users. •  Minicomputer  An intermediate-size computer , m ore compact and less expensive than a mainframe but also somewhat slower and with less memory. •  Handheld devices  Personal digital assistant (PDA) and smart phones.
 
Types of Computer Software Software  Set of instructions that tell the computer hardware what to do. •  Operating system  The software that controls the basic workings of a computer system is its operating system.  •  More than 80 percent of personal computers use a version of Microsoft ’s  Windows operating system.  •  Application software  A program that performs the specific tasks that the user wants to carry out.  •  Examples:  Oracle Supply Chain Management Suite ,  Microsoft Excel ,  Adobe Acrobat , and  QuickBooks .
HOW COMPUTERS HELP BUSINESSPEOPLE •  Enhanced speed and quantity of information available improves the speed and effectiveness of decision making.  •  Computers make accurate, unbiased data available to everyone.  •  Information-sharing capabilities support team decision making at low levels of an organization ’s  hierarchy. •  Example: Great Harvest International’s internal Web site,  Breadboard , contains internal company news and information. •  Can allow multiple users to collaborate on reports and other projects from different locations.
Enterprise Resource Planning System Enterprise resources planning (ERP) system  Information system that collects, processes, and provides information about an organization ’s  various functions. Word Processing Word processing  Software that uses a computer to input, store, retrieve, edit, and print various types of documents. •  Desktop publishing  Computer technology that allows users to design and produce attractively formatted printed material themselves rather than hiring professionals. Spreadsheets Spreadsheet  Software package that creates the computerized equivalent of an accountant ’s  work- sheet, allowing the user to manipulate variables and see the impact of alternative decisions on operating results.
Electronic Mail •  Popular programs include Microsoft Outlook, Outlook Express, and Eudora. •  Instant messaging  allows users to create private chat rooms with other individuals on their personal lists.  Presentation Graphics Presentation software  Computer program that includes graphics and tools to produce a variety of charts, graphs, and pictures. Multimedia and Interactive Media •  Technologies that integrate two or more types of media.
INTRANETS, VIRTUAL PRIVATE NETWORKS, AND VoIP Intranets Intranet  A computer network that links employees and other authorized users. •  Firewall  Software or hardware that blocks outside users from accessing an intranet without a valid password. Virtual Private Networks •  Virtual private networks  Secure connections between two points on the Internet. VoIP •  VoIP  Voice over Internet protocol; special software that transmits phone conversations over the Internet, rather than through telephone lines. •  Example:  Skype
PROTECTING INFORMATION SYSTEMS E-Crime •  Common types of e-crimes:  •  Changing or inventing data to produce inaccurate or misleading information.  •  Modifying computer programs to create false information or illegal transactions or to insert viruses.  •  Unauthorized people accessing computer systems for other reasons. •  According to a recent survey of IT professionals and managers:  •  70 percent of respondents reported at least one e-crime. •  The total cost of these crimes was estimated at $700 million. •  Equipment theft has become easier as computer hardware  becomes smaller.
Computer Viruses, Worms, Trojan Horses, and Spyware •  Computer virus  Program that secretly attaches itself to other programs (called hosts) and changes them or destroys data.  •  Spreads as users install infected software on their systems or exchange files with others.  •  Worm  A small piece of software that exploits a security hole in a network to replicate itself.  •  Trojan horse  A program that claims to do one thing, but in reality does something else, usually something malicious.  •  Spyware  Software that covertly gathers user information through the user ’s  Internet connection without his or her knowledge, usually for advertising purposes. •  All of them can infect, in addition to computers, handheld devices  such as cell phones. Example of computer protection software:   Norton Internet Security
DISASTER RECOVERY AND BACKUP •  Natural disasters, power failures, equipment malfunctions, software glitches, human error, and terrorist attacks can disrupt computer systems. •  Companies use disaster recovery planning  to d ecide how to prevent system failures and continue operations if computer systems fail. •  Most basic precaution is routinely backing up software and data . •  Some companies offer data backup and disaster recovery services. •  Example: Jacksonville-based PSS/World protected its business during Hurrican Katrina by contracting with  SunGard Availability Services .

Más contenido relacionado

La actualidad más candente

It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Enterprise information infrastructure
Enterprise information infrastructureEnterprise information infrastructure
Enterprise information infrastructureJunaid Muzaffar
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018Fizaril Amzari Omar
 
COMPUTERS ALL AROUND US
COMPUTERS ALL AROUND USCOMPUTERS ALL AROUND US
COMPUTERS ALL AROUND USEllian Canoog
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technologydmeyeravc
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoMark John Lado, MIT
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information SystemsThomas Mon
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
 
Summary chapter 4: Programs and Apps
Summary chapter 4: Programs and AppsSummary chapter 4: Programs and Apps
Summary chapter 4: Programs and AppsMiko Mochi
 
Information management 2
Information management 2Information management 2
Information management 2Self-employed
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and componentsmrmwood
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
9626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 119626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 11Anthi Aristotelous
 
ITM220 J. Galusha Kronke psi1 stppt03 revised with voice
ITM220 J. Galusha Kronke psi1 stppt03 revised with voiceITM220 J. Galusha Kronke psi1 stppt03 revised with voice
ITM220 J. Galusha Kronke psi1 stppt03 revised with voicejgalusha
 
General Purpose Mainframe and Minicomputer Era
General Purpose Mainframe and Minicomputer EraGeneral Purpose Mainframe and Minicomputer Era
General Purpose Mainframe and Minicomputer EraPathmaraj Pathmanathan
 

La actualidad más candente (20)

It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Enterprise information infrastructure
Enterprise information infrastructureEnterprise information infrastructure
Enterprise information infrastructure
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018
 
COMPUTERS ALL AROUND US
COMPUTERS ALL AROUND USCOMPUTERS ALL AROUND US
COMPUTERS ALL AROUND US
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technology
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
 
M.i.s I.T infrastructure
M.i.s I.T infrastructure M.i.s I.T infrastructure
M.i.s I.T infrastructure
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
Summary chapter 4: Programs and Apps
Summary chapter 4: Programs and AppsSummary chapter 4: Programs and Apps
Summary chapter 4: Programs and Apps
 
IT infrastructure and platforms
IT infrastructure and platformsIT infrastructure and platforms
IT infrastructure and platforms
 
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging TechnologiesIT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging Technologies
 
Information management 2
Information management 2Information management 2
Information management 2
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
Roadmap for Desktop Support's Future
Roadmap for Desktop Support's FutureRoadmap for Desktop Support's Future
Roadmap for Desktop Support's Future
 
9626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 119626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 11
 
ITM220 J. Galusha Kronke psi1 stppt03 revised with voice
ITM220 J. Galusha Kronke psi1 stppt03 revised with voiceITM220 J. Galusha Kronke psi1 stppt03 revised with voice
ITM220 J. Galusha Kronke psi1 stppt03 revised with voice
 
General Purpose Mainframe and Minicomputer Era
General Purpose Mainframe and Minicomputer EraGeneral Purpose Mainframe and Minicomputer Era
General Purpose Mainframe and Minicomputer Era
 

Destacado

6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systemskhairulanuarhasan
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information systemRohit Kumar
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technologymegat zainurul anuar
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems pptShobhit Sharma
 
Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentSamudin Kassan
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsVR Talsaniya
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information SystemsManuel Ardales
 

Destacado (10)

Information system and information technology
Information system and information technologyInformation system and information technology
Information system and information technology
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems ppt
 
Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information Systems
 

Similar a Cb12e basic ppt ch15

ERP - Complete Syllabus - 4 June 2023.pptx
ERP - Complete Syllabus - 4 June 2023.pptxERP - Complete Syllabus - 4 June 2023.pptx
ERP - Complete Syllabus - 4 June 2023.pptxMuhammadZeeshan347767
 
Basic concepts of computing.pptx
Basic concepts of computing.pptxBasic concepts of computing.pptx
Basic concepts of computing.pptxAlexFaure3
 
Information technology Infrastructure
Information technology Infrastructure Information technology Infrastructure
Information technology Infrastructure huma sh
 
Lecture 5 - Software and it's types.pdf.
Lecture 5 - Software and it's types.pdf.Lecture 5 - Software and it's types.pdf.
Lecture 5 - Software and it's types.pdf.samgamingofficial01
 
Information systems, course project
Information systems, course projectInformation systems, course project
Information systems, course projectJoseph Attakorah
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyKunal Agrawal
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1Jim Constantinou
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01drussell54
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
Introductoin of computer hardware and software
Introductoin of computer hardware and softwareIntroductoin of computer hardware and software
Introductoin of computer hardware and softwareUttara University
 

Similar a Cb12e basic ppt ch15 (20)

MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
ERP - Complete Syllabus - 4 June 2023.pptx
ERP - Complete Syllabus - 4 June 2023.pptxERP - Complete Syllabus - 4 June 2023.pptx
ERP - Complete Syllabus - 4 June 2023.pptx
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
Basic concepts of computing.pptx
Basic concepts of computing.pptxBasic concepts of computing.pptx
Basic concepts of computing.pptx
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Information technology Infrastructure
Information technology Infrastructure Information technology Infrastructure
Information technology Infrastructure
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
R18 unit-1-tk-part-1-technologies in research
R18 unit-1-tk-part-1-technologies in researchR18 unit-1-tk-part-1-technologies in research
R18 unit-1-tk-part-1-technologies in research
 
Lecture 5 - Software and it's types.pdf.
Lecture 5 - Software and it's types.pdf.Lecture 5 - Software and it's types.pdf.
Lecture 5 - Software and it's types.pdf.
 
Information systems, course project
Information systems, course projectInformation systems, course project
Information systems, course project
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Lecture-3-02112021-013630pm.pdf
Lecture-3-02112021-013630pm.pdfLecture-3-02112021-013630pm.pdf
Lecture-3-02112021-013630pm.pdf
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
Introductoin of computer hardware and software
Introductoin of computer hardware and softwareIntroductoin of computer hardware and software
Introductoin of computer hardware and software
 

Más de Eric

Cb12e basic ppt ch03
Cb12e basic ppt ch03Cb12e basic ppt ch03
Cb12e basic ppt ch03Eric
 
Cb12e basic ppt ch17
Cb12e basic ppt ch17Cb12e basic ppt ch17
Cb12e basic ppt ch17Eric
 
Cb12e basic ppt ch16
Cb12e basic ppt ch16Cb12e basic ppt ch16
Cb12e basic ppt ch16Eric
 
Cb12e basic ppt ch14
Cb12e basic ppt ch14Cb12e basic ppt ch14
Cb12e basic ppt ch14Eric
 
Cb12e basic ppt ch13
Cb12e basic ppt ch13Cb12e basic ppt ch13
Cb12e basic ppt ch13Eric
 
Cb12e basic ppt ch12
Cb12e basic ppt ch12Cb12e basic ppt ch12
Cb12e basic ppt ch12Eric
 
Cb12e basic ppt ch11
Cb12e basic ppt ch11Cb12e basic ppt ch11
Cb12e basic ppt ch11Eric
 
Cb12e basic ppt ch09
Cb12e basic ppt ch09Cb12e basic ppt ch09
Cb12e basic ppt ch09Eric
 
Cb12e basic ppt ch10
Cb12e basic ppt ch10Cb12e basic ppt ch10
Cb12e basic ppt ch10Eric
 
Cb12e basic ppt ch08
Cb12e basic ppt ch08Cb12e basic ppt ch08
Cb12e basic ppt ch08Eric
 
Cb12e basic ppt ch07
Cb12e basic ppt ch07Cb12e basic ppt ch07
Cb12e basic ppt ch07Eric
 
Cb12e basic ppt ch06
Cb12e basic ppt ch06Cb12e basic ppt ch06
Cb12e basic ppt ch06Eric
 
Cb12e basic ppt ch05
Cb12e basic ppt ch05Cb12e basic ppt ch05
Cb12e basic ppt ch05Eric
 
Cb12e basic ppt ch04
Cb12e basic ppt ch04Cb12e basic ppt ch04
Cb12e basic ppt ch04Eric
 
Cb12e basic ppt ch02
Cb12e basic ppt ch02Cb12e basic ppt ch02
Cb12e basic ppt ch02Eric
 
Cb123 basic ppt ch18
Cb123 basic ppt ch18Cb123 basic ppt ch18
Cb123 basic ppt ch18Eric
 
Cb12e basic ppt ch01
Cb12e basic ppt ch01Cb12e basic ppt ch01
Cb12e basic ppt ch01Eric
 

Más de Eric (17)

Cb12e basic ppt ch03
Cb12e basic ppt ch03Cb12e basic ppt ch03
Cb12e basic ppt ch03
 
Cb12e basic ppt ch17
Cb12e basic ppt ch17Cb12e basic ppt ch17
Cb12e basic ppt ch17
 
Cb12e basic ppt ch16
Cb12e basic ppt ch16Cb12e basic ppt ch16
Cb12e basic ppt ch16
 
Cb12e basic ppt ch14
Cb12e basic ppt ch14Cb12e basic ppt ch14
Cb12e basic ppt ch14
 
Cb12e basic ppt ch13
Cb12e basic ppt ch13Cb12e basic ppt ch13
Cb12e basic ppt ch13
 
Cb12e basic ppt ch12
Cb12e basic ppt ch12Cb12e basic ppt ch12
Cb12e basic ppt ch12
 
Cb12e basic ppt ch11
Cb12e basic ppt ch11Cb12e basic ppt ch11
Cb12e basic ppt ch11
 
Cb12e basic ppt ch09
Cb12e basic ppt ch09Cb12e basic ppt ch09
Cb12e basic ppt ch09
 
Cb12e basic ppt ch10
Cb12e basic ppt ch10Cb12e basic ppt ch10
Cb12e basic ppt ch10
 
Cb12e basic ppt ch08
Cb12e basic ppt ch08Cb12e basic ppt ch08
Cb12e basic ppt ch08
 
Cb12e basic ppt ch07
Cb12e basic ppt ch07Cb12e basic ppt ch07
Cb12e basic ppt ch07
 
Cb12e basic ppt ch06
Cb12e basic ppt ch06Cb12e basic ppt ch06
Cb12e basic ppt ch06
 
Cb12e basic ppt ch05
Cb12e basic ppt ch05Cb12e basic ppt ch05
Cb12e basic ppt ch05
 
Cb12e basic ppt ch04
Cb12e basic ppt ch04Cb12e basic ppt ch04
Cb12e basic ppt ch04
 
Cb12e basic ppt ch02
Cb12e basic ppt ch02Cb12e basic ppt ch02
Cb12e basic ppt ch02
 
Cb123 basic ppt ch18
Cb123 basic ppt ch18Cb123 basic ppt ch18
Cb123 basic ppt ch18
 
Cb12e basic ppt ch01
Cb12e basic ppt ch01Cb12e basic ppt ch01
Cb12e basic ppt ch01
 

Cb12e basic ppt ch15

  • 1. Chapter 15 Using Technology to Manage Information Learning Goals Distinguish between data and information and explain the role of management information systems in business. Identify and briefly describe the different types of information system programs. Describe the hardware and software used in managing information. Identify how software can help businesspeople. Explain the importance of special network technologies. List the ways that companies can protect themselves from computer crimes. Explain how companies anticipate, plan for, and recover from information system disasters. 1 2 3 4 5 6 7
  • 2. MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures that may or may not be relevant to a business decision. Information Knowledge gained from processing data. Management information system (MIS) Organized method for providing past, present, and projected information on internal operations as well as external intelligence to support decision making. • Usually headed by a chief information officer who reports directly to the CEO. •  Generally assists multiple departments throughout an organization.
  • 3. Databases Database Centralized integrated collection of data resources. •  Data available online: Census Bureau , Bureau of Labor Statistics . •  Commercial online services, such as LexisNexis and Infotrac . Business Intelligence •  Data mining or business intelligence Using computer-based technology to retrieve and evaluate data in a database to identify useful trends. • C an help create customer profiles, pinpoint reasons for customer loyalty, analyze the impact of pricing changes, and forecast sales.
  • 4. INFORMATION SYSTEMS FOR DECISION MAKING Decision Support System Decision support system (DSS) Information system that quickly provides relevant data to help businesspeople make decisions and choose courses of action. Executive Support Systems •  System that allows top managers to access a firm ’s primary databases. Expert Systems •  Computer program that imitates human thinking through complicated sets of “i f-then” r ules.
  • 5. Trends in Information Systems Local Area and Wide Area Networks •  Local area networks (LANs) Computer networks that connect machines within limited areas, such as a building or several buildings near one another. •  Wide area networks (WANS) Tie larger geographical regions together by using telephone lines and microwave and satellite transmission. Expert Systems •  Computer program that imitates human thinking through complicated sets of “i f-then” r ules. Wi-Fi Wireless network that connects various devices and allows them to communicate with one another through radio waves. How Wi - Fi works
  • 6. Application Service Providers and On-Demand Computing Application service provider (ASP) Specialist in providing both the computers and the application support for managing information systems for clients. •  Allows buyer to focus on core business functions. •  On-demand computing Firms essentially rent software time from application providers and pay only for their usage of the software.
  • 7. COMPUTER HARDWARE AND SOFTWARE •  Computers have become indispensable as they have gotten more powerful and less expensive. Types of Computer Hardware •  Hardware All tangible elements of a computer system —t he input devices, the components that store and process data and perform required calculations, and the output devices that present the results to information users. •  Minicomputer An intermediate-size computer , m ore compact and less expensive than a mainframe but also somewhat slower and with less memory. •  Handheld devices Personal digital assistant (PDA) and smart phones.
  • 8.  
  • 9. Types of Computer Software Software Set of instructions that tell the computer hardware what to do. • Operating system The software that controls the basic workings of a computer system is its operating system. •  More than 80 percent of personal computers use a version of Microsoft ’s Windows operating system. • Application software A program that performs the specific tasks that the user wants to carry out. •  Examples: Oracle Supply Chain Management Suite , Microsoft Excel , Adobe Acrobat , and QuickBooks .
  • 10. HOW COMPUTERS HELP BUSINESSPEOPLE •  Enhanced speed and quantity of information available improves the speed and effectiveness of decision making. • Computers make accurate, unbiased data available to everyone. •  Information-sharing capabilities support team decision making at low levels of an organization ’s hierarchy. • Example: Great Harvest International’s internal Web site, Breadboard , contains internal company news and information. •  Can allow multiple users to collaborate on reports and other projects from different locations.
  • 11. Enterprise Resource Planning System Enterprise resources planning (ERP) system Information system that collects, processes, and provides information about an organization ’s various functions. Word Processing Word processing Software that uses a computer to input, store, retrieve, edit, and print various types of documents. •  Desktop publishing Computer technology that allows users to design and produce attractively formatted printed material themselves rather than hiring professionals. Spreadsheets Spreadsheet Software package that creates the computerized equivalent of an accountant ’s work- sheet, allowing the user to manipulate variables and see the impact of alternative decisions on operating results.
  • 12. Electronic Mail •  Popular programs include Microsoft Outlook, Outlook Express, and Eudora. •  Instant messaging allows users to create private chat rooms with other individuals on their personal lists. Presentation Graphics Presentation software Computer program that includes graphics and tools to produce a variety of charts, graphs, and pictures. Multimedia and Interactive Media •  Technologies that integrate two or more types of media.
  • 13. INTRANETS, VIRTUAL PRIVATE NETWORKS, AND VoIP Intranets Intranet A computer network that links employees and other authorized users. •  Firewall Software or hardware that blocks outside users from accessing an intranet without a valid password. Virtual Private Networks •  Virtual private networks Secure connections between two points on the Internet. VoIP • VoIP Voice over Internet protocol; special software that transmits phone conversations over the Internet, rather than through telephone lines. •  Example: Skype
  • 14. PROTECTING INFORMATION SYSTEMS E-Crime •  Common types of e-crimes: •  Changing or inventing data to produce inaccurate or misleading information. • Modifying computer programs to create false information or illegal transactions or to insert viruses. • Unauthorized people accessing computer systems for other reasons. •  According to a recent survey of IT professionals and managers: •  70 percent of respondents reported at least one e-crime. • The total cost of these crimes was estimated at $700 million. •  Equipment theft has become easier as computer hardware becomes smaller.
  • 15. Computer Viruses, Worms, Trojan Horses, and Spyware • Computer virus Program that secretly attaches itself to other programs (called hosts) and changes them or destroys data. •  Spreads as users install infected software on their systems or exchange files with others. •  Worm A small piece of software that exploits a security hole in a network to replicate itself. • Trojan horse A program that claims to do one thing, but in reality does something else, usually something malicious. • Spyware Software that covertly gathers user information through the user ’s Internet connection without his or her knowledge, usually for advertising purposes. •  All of them can infect, in addition to computers, handheld devices such as cell phones. Example of computer protection software: Norton Internet Security
  • 16. DISASTER RECOVERY AND BACKUP •  Natural disasters, power failures, equipment malfunctions, software glitches, human error, and terrorist attacks can disrupt computer systems. •  Companies use disaster recovery planning to d ecide how to prevent system failures and continue operations if computer systems fail. •  Most basic precaution is routinely backing up software and data . •  Some companies offer data backup and disaster recovery services. • Example: Jacksonville-based PSS/World protected its business during Hurrican Katrina by contracting with SunGard Availability Services .