chapter 14: information technology
DESCRIPTION
14th editionTRANSCRIPT
Using Technology to Manage Information
Chapter
14
Distinguish between data and information and explain the role of management information systems in business.
List the components and different types of information systems.
Outline how computer hardware and software are used to manage information.
Describe the networking and telecommunications technology and types of computer networks.
1
Learning Objectives
Discuss the security and ethical issues involving computer information systems.
Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters.
Review current trends in information systems.
2
3
4
5
6
7
Data– raw facts and figures Information– knowledge gained from processing data
Information system– organized method for collecting, storing, and communicating information on operations
Chief information officer– executive responsible for directing information systems and operations
Information Systems
Computer Hardware
Computer Software
Telecommunications and Computer Networks
Data Resource Management
Components of Information Systems
Operational Support Systems Transaction Processing System Process Control System
Management Support Systems Management Information System (MIS) Decision Support System (DSS) Executive Support System (ESS)
Types of Information Systems
The tangible elements of a computer system
The components that store and process data, perform calculations
Input devices like the keyboard and mouse allow users to enter data and commands.
Storage and processing components consist of the hard drive and other storage components like flash drives.
Computer Hardware
Desktop (personal) computers
Server Mainframes Supercomputers Notebook computers Handheld devices– PDAs and smart phones
Types of Computers
Programs, routines, and computer languages that control a computer
Operating System Windows Operating System Mac Operating System
Application Software Microsoft PowerPoint Quicken
Computer Software
The Internet Local Area Networks (LAN) Wide Area Networks (WAN) Wireless Local Networks (Wi-Fi)
Intranets Virtual Private Networks (VPN) Voice over Internet Protocol (VoIP)
Computer Networks
E-Crime Computer Viruses
Worms Trojan Horses Spyware
Security Issues
Use of information systems by employees and vendors: Personal use Privacy
Organizational use of information: Employment records Employee monitoring Customer data
Ethical Issues
Natural Disasters Power Failures Equipment Malfunctions
Software Glitches Human Error Terrorist Attacks The most basic precaution– backup.
Disaster Recovery and Backup
90% of firms that
sustained a loss of
critical data went
out of business
within two years.
90% of firms that
sustained a loss of
critical data went
out of business
within two years.
The Distributed Workforce Employees who work in virtual offices
Application Service Providers A firm that provides computers and application support
On Demand, Cloud, and Grid Computing Renting software time
Information Systems Trends