Using Technology to Manage Information
-
Upload
jeremy-boyle -
Category
Documents
-
view
44 -
download
2
description
Transcript of Using Technology to Manage Information
![Page 1: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/1.jpg)
Using Technology to Manage Information
Chapter
14
![Page 2: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/2.jpg)
Distinguish between data and information and explain the role of management information systems in business.
List the components and different types of information systems.
Outline how computer hardware and software are used to manage information.
Describe the networking and telecommunications technology and types of computer networks.
1
Learning Objectives
Discuss the security and ethical issues involving computer information systems.
Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters.
Review current trends in information systems.
2
3
4
5
6
7
![Page 3: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/3.jpg)
Data– raw facts and figures Information– knowledge gained from processing data
Information system– organized method for collecting, storing, and communicating information on operations
Chief information officer– executive responsible for directing information systems and operations
Information Systems
![Page 4: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/4.jpg)
Computer Hardware
Computer Software
Telecommunications and Computer Networks
Data Resource Management
Components of Information Systems
![Page 5: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/5.jpg)
Operational Support Systems Transaction Processing System Process Control System
Management Support Systems Management Information System (MIS) Decision Support System (DSS) Executive Support System (ESS)
Types of Information Systems
![Page 6: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/6.jpg)
The tangible elements of a computer system
The components that store and process data, perform calculations
Input devices like the keyboard and mouse allow users to enter data and commands.
Storage and processing components consist of the hard drive and other storage components like flash drives.
Computer Hardware
![Page 7: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/7.jpg)
Desktop (personal) computers
Server Mainframes Supercomputers Notebook computers Handheld devices– PDAs and smart phones
Types of Computers
![Page 8: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/8.jpg)
Programs, routines, and computer languages that control a computer
Operating System Windows Operating System Mac Operating System
Application Software Microsoft PowerPoint Quicken
Computer Software
![Page 9: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/9.jpg)
The Internet Local Area Networks (LAN) Wide Area Networks (WAN) Wireless Local Networks (Wi-Fi)
Intranets Virtual Private Networks (VPN) Voice over Internet Protocol (VoIP)
Computer Networks
![Page 10: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/10.jpg)
E-Crime Computer Viruses
Worms Trojan Horses Spyware
Security Issues
![Page 11: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/11.jpg)
Use of information systems by employees and vendors: Personal use Privacy
Organizational use of information: Employment records Employee monitoring Customer data
Ethical Issues
![Page 12: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/12.jpg)
Natural Disasters Power Failures Equipment Malfunctions
Software Glitches Human Error Terrorist Attacks The most basic precaution– backup.
Disaster Recovery and Backup
90% of firms that
sustained a loss of
critical data went
out of business
within two years.
90% of firms that
sustained a loss of
critical data went
out of business
within two years.
![Page 13: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/13.jpg)
The Distributed Workforce Employees who work in virtual offices
Application Service Providers A firm that provides computers and application support
On Demand, Cloud, and Grid Computing Renting software time
Information Systems Trends
![Page 14: Using Technology to Manage Information](https://reader036.fdocuments.us/reader036/viewer/2022062304/56812ea9550346895d944766/html5/thumbnails/14.jpg)