The Challenges Ahead Chapter 14 Information Systems Management In Practice 6E McNurlin & Sprague.
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
Transcript of Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
![Page 1: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/1.jpg)
Managing Operations
Chapter 8
Information Systems Management In Practice 6E
McNurlin & Sprague
![Page 2: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/2.jpg)
2
Introduction
![Page 3: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/3.jpg)
3
What Are Operations?
Why Talk About Operations?
Solving Operational Problems
Operational Measures
The Importance of Good Management
![Page 4: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/4.jpg)
4
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
![Page 5: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/5.jpg)
5
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
![Page 6: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/6.jpg)
6
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
![Page 7: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/7.jpg)
7
What’s New in Operations?
1. Companies Have Cleaned Their Operational House
2. More Operations Managers are Managing Outward
3. Operations are Being Simplified
4. Certain Operations are Being Offloaded
![Page 8: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/8.jpg)
8
Outsourcing IS Functions
![Page 9: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/9.jpg)
9
Outsourcing IS Functions
![Page 10: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/10.jpg)
10
Outsourcing IS Functions
Managing Outsourcing
CASE EXAMPLE: Eastman Kodak Company
CASE EXAMPLE: Honda Motor Company
![Page 11: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/11.jpg)
11
Information SecurityViruses
Insider Abuse
Laptop Theft
System Penetration
Denial of Service
Unauthorized Access
Theft of Proprietary Info
Financial Fraud
Telecom Fraud
Sabotage
Telecom Eavesdropping
Active Wiretapping
![Page 12: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/12.jpg)
12
Information Security
1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks7. Trojan horse programs 8. Viruses9. Spoofing
![Page 13: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/13.jpg)
13
Security’s Five Pillars
1. Authentication
2. Identification
3. Privacy
4. Integrity
5. Nonrepudiation
![Page 14: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/14.jpg)
14
Information SecurityAntivirus Software
Firewalls
Physical Security
Access Control
Intrusion Detection
Encrypted Files
Encrypted Login
Reuseable Passwords
Digital IDs
PCMCIA
Biometrics
![Page 15: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/15.jpg)
15
Business Continuity
Safeguarding people during a disaster
Documenting business procedures
Giving employees the tools and space to handle personal issues
![Page 16: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/16.jpg)
16
Business Continuity
Using Internal Resources
Using External Resources
CASE EXAMPLE: Household International
![Page 17: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/17.jpg)
17
Conclusion
Managing Inward vs. Managing Outward
![Page 18: Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649f515503460f94c74114/html5/thumbnails/18.jpg)
18
PART II Discussion Case
Managing Information Security on a Shoestring Budget