SlideShare a Scribd company logo
1 of 14
Chapter    14
          Using Technology to Manage
          Information
Learning Objectives

1   Distinguish between data and information     5   Discuss the security and ethical
    and explain the role of management               issues involving computer
    information systems in business.                 information systems.

2   List the components and different types of   6   Explain the steps that companies go
    information systems.                             through in anticipating, planning for,
                                                     and recovering from information
3   Outline how computer hardware and                system disasters.
    software are used to manage information.
                                                 7   Review current trends in information
4   Describe the networking and                      systems.
    telecommunications technology and types
    of computer networks.
Information Systems

s   Data– raw facts and figures
s   Information– knowledge gained from
    processing data
s   Information system– organized method for
    collecting, storing, and communicating
    information on operations
s   Chief information officer– executive
    responsible for directing information systems
    and operations
Components of Information Systems

s   Computer Hardware

s   Computer Software

s   Telecommunications and Computer Networks

s   Data Resource Management
Types of Information Systems
s   Operational Support Systems
    s   Transaction Processing System
    s   Process Control System


s   Management Support Systems
    s   Management Information System (MIS)
    s   Decision Support System (DSS)
    s   Executive Support System (ESS)
Computer Hardware

s   The tangible elements of a computer system
s   The components that store and process data,
    perform calculations
s   Input devices like the keyboard and mouse allow
    users to enter data and commands.
s   Storage and processing components consist of
    the hard drive and other storage components
    like flash drives.
Types of Computers

s   Desktop (personal)
    computers
s   Server
s   Mainframes
s   Supercomputers
s   Notebook computers
s   Handheld devices– PDAs
    and smart phones
Computer Software
s   Programs, routines, and computer
    languages that control a computer

s   Operating System
    s   Windows Operating System
    s   Mac Operating System

s   Application Software
    s   Microsoft PowerPoint
    s   Quicken
Computer Networks



s   The Internet
s   Local Area Networks (LAN)
s   Wide Area Networks (WAN)
s   Wireless Local Networks (Wi-Fi)
s   Intranets
s   Virtual Private Networks (VPN)
s   Voice over Internet Protocol (VoIP)
Security Issues

s   E-Crime
s   Computer Viruses
    s   Worms
    s   Trojan Horses
    s   Spyware
Ethical Issues
s   Use of information systems by employees
    and vendors:
    s   Personal use
    s   Privacy
s   Organizational use of information:
    s   Employment records
    s   Employee monitoring
    s   Customer data
Disaster Recovery and Backup

s   Natural Disasters
s   Power Failures           90% of firms that sustained

s   Equipment Malfunctions   a loss of critical data went

s   Software Glitches        out of business within two

s   Human Error              years.

s   Terrorist Attacks
s   The most basic
    precaution– backup.
Information Systems Trends
s   The Distributed Workforce
    s   Employees who work in virtual
        offices
s   Application Service
    Providers
    s   A firm that provides
        computers and application
        support
s   On Demand, Cloud, and
    Grid Computing
    s   Renting software time
Chapter 14: Information Technology

More Related Content

What's hot

INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
Sreedevi Santhosh
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
SR NAIDU
 
Info...group 3
Info...group 3Info...group 3
Info...group 3
rubyjade
 

What's hot (20)

INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Information management
Information managementInformation management
Information management
 
Data security
Data securityData security
Data security
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
INFORMATION SYSTEM lecture
INFORMATION SYSTEM lectureINFORMATION SYSTEM lecture
INFORMATION SYSTEM lecture
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Dstca
DstcaDstca
Dstca
 
Data Security
Data SecurityData Security
Data Security
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cis(11122223333)
Cis(11122223333)Cis(11122223333)
Cis(11122223333)
 
Info...group 3
Info...group 3Info...group 3
Info...group 3
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 

Viewers also liked

Logistics in the information age
Logistics in the information ageLogistics in the information age
Logistics in the information age
Jatin Kathuria
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 

Viewers also liked (6)

Logistics and Information Technology
Logistics and Information TechnologyLogistics and Information Technology
Logistics and Information Technology
 
Logistics in the information age
Logistics in the information ageLogistics in the information age
Logistics in the information age
 
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology ArchitectureICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
 
Use of technology in logistics
Use of technology in logisticsUse of technology in logistics
Use of technology in logistics
 
Top technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industryTop technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industry
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 

Similar to Chapter 14: Information Technology

Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1
Jim Constantinou
 

Similar to Chapter 14: Information Technology (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Components
ComponentsComponents
Components
 
Cyber security
Cyber securityCyber security
Cyber security
 
Explain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docxExplain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docx
 
INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMS
 
Information Technology for Business
Information Technology for BusinessInformation Technology for Business
Information Technology for Business
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systems
 
Information security
Information securityInformation security
Information security
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
MANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEMMANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEM
 
Management information systems and cyber
Management information systems and cyberManagement information systems and cyber
Management information systems and cyber
 
Mis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessMis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in business
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and mis
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information System
 

More from dmeyeravc (18)

Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03
 
Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02
 
Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01
 
Ch01
Ch01Ch01
Ch01
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
 
Chapter 17: Financial Management
Chapter 17: Financial ManagementChapter 17: Financial Management
Chapter 17: Financial Management
 
Chapter 16: Financial System
Chapter 16: Financial SystemChapter 16: Financial System
Chapter 16: Financial System
 
Chapter 15: Accounting
Chapter 15: AccountingChapter 15: Accounting
Chapter 15: Accounting
 
Chapter 13: Promotion, Pricing
Chapter 13: Promotion, PricingChapter 13: Promotion, Pricing
Chapter 13: Promotion, Pricing
 
Chapter 11: Marketing
Chapter 11: MarketingChapter 11: Marketing
Chapter 11: Marketing
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
 
Chapter 8: Human Resources
Chapter 8: Human ResourcesChapter 8: Human Resources
Chapter 8: Human Resources
 
Chapter 7: Management
Chapter 7: ManagementChapter 7: Management
Chapter 7: Management
 
Chapter 6: Entrepreneurship
Chapter 6: EntrepreneurshipChapter 6: Entrepreneurship
Chapter 6: Entrepreneurship
 
Chapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus OrganizationChapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus Organization
 
Chapter 3: Economics
Chapter 3: EconomicsChapter 3: Economics
Chapter 3: Economics
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
 
Chapter 1: Global Environment
Chapter 1: Global EnvironmentChapter 1: Global Environment
Chapter 1: Global Environment
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 

Chapter 14: Information Technology

  • 1. Chapter 14 Using Technology to Manage Information
  • 2. Learning Objectives 1 Distinguish between data and information 5 Discuss the security and ethical and explain the role of management issues involving computer information systems in business. information systems. 2 List the components and different types of 6 Explain the steps that companies go information systems. through in anticipating, planning for, and recovering from information 3 Outline how computer hardware and system disasters. software are used to manage information. 7 Review current trends in information 4 Describe the networking and systems. telecommunications technology and types of computer networks.
  • 3. Information Systems s Data– raw facts and figures s Information– knowledge gained from processing data s Information system– organized method for collecting, storing, and communicating information on operations s Chief information officer– executive responsible for directing information systems and operations
  • 4. Components of Information Systems s Computer Hardware s Computer Software s Telecommunications and Computer Networks s Data Resource Management
  • 5. Types of Information Systems s Operational Support Systems s Transaction Processing System s Process Control System s Management Support Systems s Management Information System (MIS) s Decision Support System (DSS) s Executive Support System (ESS)
  • 6. Computer Hardware s The tangible elements of a computer system s The components that store and process data, perform calculations s Input devices like the keyboard and mouse allow users to enter data and commands. s Storage and processing components consist of the hard drive and other storage components like flash drives.
  • 7. Types of Computers s Desktop (personal) computers s Server s Mainframes s Supercomputers s Notebook computers s Handheld devices– PDAs and smart phones
  • 8. Computer Software s Programs, routines, and computer languages that control a computer s Operating System s Windows Operating System s Mac Operating System s Application Software s Microsoft PowerPoint s Quicken
  • 9. Computer Networks s The Internet s Local Area Networks (LAN) s Wide Area Networks (WAN) s Wireless Local Networks (Wi-Fi) s Intranets s Virtual Private Networks (VPN) s Voice over Internet Protocol (VoIP)
  • 10. Security Issues s E-Crime s Computer Viruses s Worms s Trojan Horses s Spyware
  • 11. Ethical Issues s Use of information systems by employees and vendors: s Personal use s Privacy s Organizational use of information: s Employment records s Employee monitoring s Customer data
  • 12. Disaster Recovery and Backup s Natural Disasters s Power Failures 90% of firms that sustained s Equipment Malfunctions a loss of critical data went s Software Glitches out of business within two s Human Error years. s Terrorist Attacks s The most basic precaution– backup.
  • 13. Information Systems Trends s The Distributed Workforce s Employees who work in virtual offices s Application Service Providers s A firm that provides computers and application support s On Demand, Cloud, and Grid Computing s Renting software time