Addiction in Healthcare Professionals Notice, Reach Out, Save a Life.
Management Information Systems IS in the Life of Business Professionals Chapter 1.
-
date post
20-Dec-2015 -
Category
Documents
-
view
215 -
download
0
Transcript of Management Information Systems IS in the Life of Business Professionals Chapter 1.
Management Information SystemsManagement Information Systems
IS in the Life of Business Professionals
Chapter 1
2
This Could Happen to You
Marketing Director needs an information systemLack of knowledge will impede progress
Uncertainty will cause delays
Ignorance about technology leaves her at a disadvantage
3
Study Questions
Q1. What is an information system?
Q2. What is MIS?
Q3. How does IS differ from IT?
Q4. How do successful business people use IS?
Q5. What new opportunities for IS are developing today?
Q6. How can you create a strong password?
Q7. What is this class about?
4
Q1. What Is an Information System?
Group of components that interact to produce information
Five fundamental components of computer-based information systems:Computer hardware
Software
Data
Procedures
People
6
Q2. MIS
Management information systems
Development and use of information systems that help businesses achieve goals and objectives
Key elements:Development and use
Information systems
Business goals and objectives
7
Development and Use
You need to:Take an active role in order to insure that system will
meet your needs
Understand how they are constructed
Consider the user’s needs during development
Learn how to employ the system
Take into account ancillary functions Security
Backup
8
Achieving Business Goals
MIS aids businesses in achieving objectivesBusinesses themselves don’t do anything
People within the business act
MIS empowers users to reach goalsExist to assist business people
Need to be developed for right reason
9
Ask Questions
What will system do for you?
What is the purpose?
What will using it enable us to do?
What goal can we accomplish through its use?
Will it aid us in reaching our objectives?
10
Q3. IT
Information technologyMethods
Inventions
Standards
Products
Raw technologyHardware
Software
Data components
11
How Does IT Differ from IS?
IT alone will not help an organization achieve goals
IT must be embedded into an IS to help accomplish objectivesTechnology must be combined with people and
procedure components
IS will make IT useful
13
Gaining a Competitive Advantage
Think about IT and IS when you consider opportunities and problems
Create innovative applications using emerging technology
Do not need to be a technology developer
14
Q5. New Opportunities
Free data storage and free data transmissionGetty Images sells electronic pictures over the Internet.
Variable cost of production is zero
Revenue goes straight to bottom line
Media Partners produces automated online training and testing systems.
Variable cost of producing program essentially zero
Revenue goes straight to bottom line
17
Moore’s Law
“The number of transistors per square inch on an integrated chip doubles every 18 months.”The speed of a computer chip doubles every 18 months
Price/performance ratio of computers has fallen dramatically
Computers are smaller
Computers are less expensive
19
Q6. Security is Vital
Security is important in information systems
Passwords are necessaryShould be a strong password
Protect password from others
Practice proper etiquette
20
高強度密碼
微軟定義高強度密碼( Strong Password )應具有下列特徵:長度最少 7 個字不含帳戶名稱、真實姓名或公司名稱不論用的是哪種語言,不含字典裡有的「全字」與以前用過的密碼不同包含大小寫字體、數字和特殊字元(例如 ~ ! @; # $ % ^
& * ( ) _ + - = { } | [ ] \ : ” ’ < > ? , . / )
21
密碼成規
高強度密碼設定後就要好好保護
所謂合宜的密碼成規( Password Etiquette )就是說要如何正確處理以及對待這組密碼,是專業的一種態度行為:絕對不要寫下自己的密碼不要和別人共用密碼不要問別人的密碼是什麼不要把你的密碼告訴別人
22
Q7. This Class
Focus is on :Learning to use tools to accomplish a business purpose
Understanding both business and technology
Relating business to technology
Using technology to gain a competitive advantage
23
Applying IS to Help the Marketing Director (1)
Look for innovative applications of emerging technology
Work can be guided by the five components:Computer
Software
Data
Procedures
People
24
Applying IS to Help the Marketing Director (2)
Technology will continue to develop
Need to consider how technology can be used in other systems to accomplish goalsStop unauthorized access
Disseminate news
Security
25
Ethics Guide (1)
You overhear a conversation between a real estate agent and the couple competing with you to purchase a condoShould you listen?
Should you use the information you hear?
You receive the same information through an e-mail accidentally sent to your inboxShould you read the e-mail?
Should you use the information to your advantage?
26
Ethics Guide (2)
You sell computer software. A customer mistakenly sends you an internal e-mail that contains the maximum amount they can payDo you read the e-mail?
Do you use the information?
27
Ethics Guide (3)
A friend inadvertently e-mails you personal medical data. You read the e-mail and learn embarrassing information about the friendHow do you respond when the friend asks if you read the e-mail?
You are a network administrator with unrestricted access to mailing lists. You insert your e-mail address into several lists and receive confidential information. One e-mail shows that your best friend’s department is going to be eliminatedDo you warn him?