Download - Technology
David Wilson
Angela Devenney
Brittany Matheny
Brien Mccoy
Using Technology to Manage Information
IT is used as communication tool to:Share information between staff, suppliers, and
consumers. 1970’s Information Technology was know as DP. Data VS. Information. 1980’s Business Tech (BT) introduced tools like
atm’s and voicemailThen after the 1980’s (BT) was know as (IT)
information tech.CIO helps businesses use tech for communication
(G1) The Role of Information Technology
Allows for online paying and orderingHow it changed the entertainment
industry:40 year ago you had to go to a movie
theaterAllows for video orderingAllows for downloading on computer,
iPod, or cell phoneBroke time and location barrier
NASDAQ
(G1) How Information Technology Changes Businesses
Knowledge makes info usefulBusiness Intelligence – software
applications that analyze an organization’s raw data
BI changes traditional flow of info:Used to train workersProvides insights
(G1) Move Toward Business Intelligence
Business process informationPhysical world ObservationBiological dataPublic dataData that indicates personal
references or intention
(G2) Types of Information
The usefulness of management information depends on four characteristicsQualityCompletenessTimelinessRelevance
(G2) Managing Information
Tips for organizing E-mail and electron filesUse your e-mail program’s
organizing toolsUse consistent file namesUse online backup servicesUse desktop search software
(G2) Organizing E-mail and electronic files
Data Warehouse:Stores data on a single subject over
timePurpose is to get data out
Data Mining:Looking for hidden patterns and
relationships among data
(G2) Sorting and Mining Data
The road to knowledge
Network of computer networks
Was a one to one communication tool
Now it is a one to many broadcast tool
(G3) The Internet
Companywide network, closed to public access
Keeps unwanted sources outUses firewallsAllows for interactive apps
(G3) Intranet
Broader version of an IntranetAllows for data sharing which
encourages collaboration between companies
Good for:Same information accessProcessing ordersInvoicespayments
(G3) Extranet
Secure system used with extranetsReserved solely for the networkIssues with Dedicated lines:
Expensive limit extranet useOften too time consuming
(G3) Dedicated Lines
Private data networkCreates secure connections or
tunnelsAdvantages of (VPNs):
Same capabilities as extranetsCheaper than extranetsAllows for on-demand networkingKeeps corporate networks secure
(G3) Virtual Private Networks
Make information available in one place
Gives users access to their area of the intranet
Advantages:Centralizes informationServes as entry pointAllows access according to one’s
role
(G3) Enterprise Portals
Allows a continuous connect to the internet
Sends and receives:VideoVoiceData files
(G3)Broadband Technology
Runs 22000 times faster than today’s internet
Supports heavy duty appsKey element
very-high-speed backbone network service vBNS
Helps remote medical specialistsOver 325 member universities
(G3) Internet2
Social NetworkingInexpensive way to get exposureTools for collaboration between businesses and
consumersWeb 2.0
Tools used to build social and business connection
Share information & collaborate on projects online
ExamplesYouTube, Twitter, My space, facebook
(G3)Social Networking & Web 2.0
Hardware includes: computers mobile phonesPrinterScannersfax’s PDA’s
CUTTING THE CORDToday most experts would agree that people are
moving away from just using their PC’s to connect. Nowadays people are also using Iphones, netbooks, blackberry’s, etc.
(G4) The Enabling Technology: Hardware
Computer Networks:Connect people to people and people to dataAllow companies & people to save time &
moneyHave drawbacks, maintaining a fleet of PC’s
is expensive, also you lose productivity every time you update, troubleshoot, or train a new employee how to use it
Some companies are now looking for other options
One option is hybrid of mainframe & network computing
(G4) The Enabling Technology: Hardware
Thin client networksSoftware changes & upgrades need to be made only
on the server, so cost can be reduced by 20%Rent software & hardware access
Virtualization & Cloud ComputingProcess that allows networked computer to run
multiple operating systems & programs through one central computer at the same time
Allows for virtualization but helps with limiting amount of data share
Often sold for a monthly fee
(G4) The Enabling Technology: Hardware
Turn Technology off when not in use
Buy programs like surveyor, which shut down computers in a office at the push of a button
(G4) Green It
Computer software tells the computer what to doShareware
CopyrightedDistributed free of charge but user usually sends a
fee to he developer if the program meets their needsPublic Domain Software
Free for the taking without any feesBusiness people use software for writing
Word processorsSpread sheetsFiling and retrieving datagraphics
(G5) Software
Human Resource IssuesTelecommuting has many different advantages:
The company can save resourcesEasy of use for the employeeOften increases productivityGreat for parents that have children or people with
disabilitiesDisadvantages:
Less personal contact and confrontationDon’t know when to turn off workSometimes part time alternative
(G6) Effects of Information Technology on Management
NanobotsPeople who are given the freedom to
meet the organization’s goals on their own time and schedule
Often given a project with a certain budget and time deadline, and are left alone to take the task on
Biggest difficulty is finding the right person for the job
(G6) Effects of information Technology on Management
Security IssuesViruses
Pieces of programming code inserted into other programming that usually lies dormant until triggered to cause some unexpected event
Antivirus protection is essentialPhishing
Scammers often embellish an e-mail message with a stolen logo for a well-recognized brand such as eBay, PayPal, or Citibank
Scammers use phrases such as “Account Activation Required”, or “Your account will be cancelled if you do not verify”
When the user clicks on it, the scammer can steal personal and private information
(G6) Effects of information Technology on Management
Other threats include:Copyright laws being violatedSexual and racial harassmentCyber terrorism
Terrorist hackers could shut down the entire communications, money supply, electricity, and transportation systems
In 2002 there was a powerful electronic attack that crippled 9 of the 13 computers that manage internet traffic globally
(G6) Effects of Information Technology on Management
Privacy IssuesMany company managers scan employee e-
mail regularly (it is legal)Hackers can trap and read your emailMakes easier to do unnecessary snoopingCookies:
Pieces of information that the browser sends back to the server whenever you return to that web site
Tracks your movementSpyware can be installed on your computer without
your knowledge
(G6) Effects of information Technology on Management
Stability IssuesBeing error free
Hershey company’s $115 million dollar new computer system disrupted shipments one Halloween and caused a 12% deficit that quarter
Combination of human error, computer error, malfunctioning software, and an overly complex marriage of software, hardware, and networking equipment
Management must face all of these challenges within the company in order to maintain a strong, growing company
(G6) Effects of Information Technology on Management