SlideShare a Scribd company logo
1 of 10
Information Systems
Management
               4/09/2013
Systems Management

• You are middle – top level
  management (Director of
  Marketing)

• How do you interact with IT
  personnel on a professional
  level?
The Security / Usability Quandary
Managing the IT Department

• Need to understand responsibilities
  and duties of IT department.

• Need to know about functions of IT
  department to be IS-savvy manager.

• Need to ensure functions of IT
  department are performed.
Functions of IT

1. Plan Information Systems
2. Develop Information Systems
3. Maintain Information Systems
4. Protect Information Systems
IT Organization
• Chief Information Officer (CIO)
   • Principal manager
   • Reports to CEO, COO, or CFO
• Chief Technology Officer (CTO)
   • Investigates new information
     systems technologies for
     possible application at
     organization
Managing Employees
Scenario:

•Suppose you are a manager at a company
that with a stated workplace computer use
policy.
•You notice that one of your employees has
been engaged in personal activities during
work.
•What do you do?
Managing Employees
Managing Employees
• How much should companies try to
  control and/or filter employee activity?
• Should companies allow
  telecommuting or working from home?
 Example: Marissa Mayer @ Yahoo!
• Should management crunch browsing,
  e-mail, and computer use data for job
  reviews?
Managing Employees
• How much should companies try to
  control and/or filter employee activity?
• Should companies allow
  telecommuting or working from home?
 Example: Marissa Mayer @ Yahoo!
• Should management crunch browsing,
  e-mail, and computer use data for job
  reviews?

More Related Content

Similar to MIS: Information Systems Management

Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
TEAM Informatics
 
Amit Sethi (Review 2) OCT
Amit Sethi (Review 2) OCTAmit Sethi (Review 2) OCT
Amit Sethi (Review 2) OCT
Amit Sethi
 
Information systems management
Information systems managementInformation systems management
Information systems management
UMaine
 
MANAGEMENT INFORMATION SYSTEM NFORMATION
MANAGEMENT INFORMATION SYSTEM NFORMATIONMANAGEMENT INFORMATION SYSTEM NFORMATION
MANAGEMENT INFORMATION SYSTEM NFORMATION
SAINATHYADAV11
 

Similar to MIS: Information Systems Management (20)

Km share point and semantik-va
Km   share point and semantik-vaKm   share point and semantik-va
Km share point and semantik-va
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Chap001
Chap001Chap001
Chap001
 
I Can't Find My Data & Documents
I Can't Find My Data & DocumentsI Can't Find My Data & Documents
I Can't Find My Data & Documents
 
E-HRM and HRIS
E-HRM and HRISE-HRM and HRIS
E-HRM and HRIS
 
IS Unit 3 in bca sem 5 sttudentt in computter
IS Unit 3 in bca sem 5 sttudentt in computterIS Unit 3 in bca sem 5 sttudentt in computter
IS Unit 3 in bca sem 5 sttudentt in computter
 
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
 
16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity16NTC Presentation on IT Maturity
16NTC Presentation on IT Maturity
 
S-25 HRIS.pptx
S-25 HRIS.pptxS-25 HRIS.pptx
S-25 HRIS.pptx
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptx
 
Amit Sethi (Review 2) OCT
Amit Sethi (Review 2) OCTAmit Sethi (Review 2) OCT
Amit Sethi (Review 2) OCT
 
marketing information system-chapter five
marketing information system-chapter five marketing information system-chapter five
marketing information system-chapter five
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Management Information System 3
Management Information System 3Management Information System 3
Management Information System 3
 
Information systems management
Information systems managementInformation systems management
Information systems management
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information system
 
An overview - Enterprise
An overview - EnterpriseAn overview - Enterprise
An overview - Enterprise
 
Helux Systems - Planning for SharePoint Governance
Helux Systems - Planning for SharePoint GovernanceHelux Systems - Planning for SharePoint Governance
Helux Systems - Planning for SharePoint Governance
 
MANAGEMENT INFORMATION SYSTEM NFORMATION
MANAGEMENT INFORMATION SYSTEM NFORMATIONMANAGEMENT INFORMATION SYSTEM NFORMATION
MANAGEMENT INFORMATION SYSTEM NFORMATION
 

More from Jonathan Coleman

More from Jonathan Coleman (11)

MIS: Information Systems Development
MIS: Information Systems DevelopmentMIS: Information Systems Development
MIS: Information Systems Development
 
MIS: Project Management Systems
MIS: Project Management SystemsMIS: Project Management Systems
MIS: Project Management Systems
 
Online Branding
Online BrandingOnline Branding
Online Branding
 
Networks
NetworksNetworks
Networks
 
Business Internet
Business InternetBusiness Internet
Business Internet
 
Global Information Systems
Global Information SystemsGlobal Information Systems
Global Information Systems
 
Organizational Strategy
Organizational StrategyOrganizational Strategy
Organizational Strategy
 
Mis And You
Mis And YouMis And You
Mis And You
 
Database Management
Database ManagementDatabase Management
Database Management
 
Business processes
Business processesBusiness processes
Business processes
 
Hardware Systems
Hardware SystemsHardware Systems
Hardware Systems
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

MIS: Information Systems Management

  • 2. Systems Management • You are middle – top level management (Director of Marketing) • How do you interact with IT personnel on a professional level?
  • 3. The Security / Usability Quandary
  • 4. Managing the IT Department • Need to understand responsibilities and duties of IT department. • Need to know about functions of IT department to be IS-savvy manager. • Need to ensure functions of IT department are performed.
  • 5. Functions of IT 1. Plan Information Systems 2. Develop Information Systems 3. Maintain Information Systems 4. Protect Information Systems
  • 6. IT Organization • Chief Information Officer (CIO) • Principal manager • Reports to CEO, COO, or CFO • Chief Technology Officer (CTO) • Investigates new information systems technologies for possible application at organization
  • 7. Managing Employees Scenario: •Suppose you are a manager at a company that with a stated workplace computer use policy. •You notice that one of your employees has been engaged in personal activities during work. •What do you do?
  • 9. Managing Employees • How much should companies try to control and/or filter employee activity? • Should companies allow telecommuting or working from home? Example: Marissa Mayer @ Yahoo! • Should management crunch browsing, e-mail, and computer use data for job reviews?
  • 10. Managing Employees • How much should companies try to control and/or filter employee activity? • Should companies allow telecommuting or working from home? Example: Marissa Mayer @ Yahoo! • Should management crunch browsing, e-mail, and computer use data for job reviews?

Editor's Notes

  1. Need to understand responsibilities and duties of IT department To be more effective consumer To obtain services, equipment, and systems needed Need to know about functions of IT department to be IS-savvy manager To better understand how to integrate disparate companies or offices To raise IT issues early in merger or acquisition To better understand needs of IT department in supporting new initiatives Manager of small company needs to ensure functions of IT department are performed Plan for information systems and IT infrastructure Align IT activities with organization’s primary goals and objectives Assess new technology that might advance goals Adapt IT infrastructure and systems to new business goals 2. Develop and adapt information systems IT department must create, develop, and adapt information systems Create and adapt infrastructure Computer networks, servers, data centers, data warehouses, data marts Create systems infrastructures Email, VPN, instant messaging, blogs, net meetings Specify standard computer systems 3. Maintain Information Systems infrastructures Operate and maintain infrastructure Networks and servers must be monitored, tuned, and repaired System outages are expensive Respond to threats to infrastructure 4. Protect infrastructure and data from threats Threats to infrastructure and data from: Human error and mistakes Malicious human activity Natural events and disasters IT department helps organizations manage risk Identify potential threats Estimate financial and other risks Specify safeguards Determine which level of risk to assume
  2. Need to understand responsibilities and duties of IT department To be more effective consumer To obtain services, equipment, and systems needed Need to know about functions of IT department to be IS-savvy manager To better understand how to integrate disparate companies or offices To raise IT issues early in merger or acquisition To better understand needs of IT department in supporting new initiatives Manager of small company needs to ensure functions of IT department are performed Plan for information systems and IT infrastructure Align IT activities with organization’s primary goals and objectives Assess new technology that might advance goals Adapt IT infrastructure and systems to new business goals 2. Develop and adapt information systems IT department must create, develop, and adapt information systems Create and adapt infrastructure Computer networks, servers, data centers, data warehouses, data marts Create systems infrastructures Email, VPN, instant messaging, blogs, net meetings Specify standard computer systems 3. Maintain Information Systems infrastructures Operate and maintain infrastructure Networks and servers must be monitored, tuned, and repaired System outages are expensive Respond to threats to infrastructure 4. Protect infrastructure and data from threats Threats to infrastructure and data from: Human error and mistakes Malicious human activity Natural events and disasters IT department helps organizations manage risk Identify potential threats Estimate financial and other risks Specify safeguards Determine which level of risk to assume
  3. Need to understand responsibilities and duties of IT department To be more effective consumer To obtain services, equipment, and systems needed Need to know about functions of IT department to be IS-savvy manager To better understand how to integrate disparate companies or offices To raise IT issues early in merger or acquisition To better understand needs of IT department in supporting new initiatives Manager of small company needs to ensure functions of IT department are performed Plan for information systems and IT infrastructure Align IT activities with organization’s primary goals and objectives Assess new technology that might advance goals Adapt IT infrastructure and systems to new business goals 2. Develop and adapt information systems IT department must create, develop, and adapt information systems Create and adapt infrastructure Computer networks, servers, data centers, data warehouses, data marts Create systems infrastructures Email, VPN, instant messaging, blogs, net meetings Specify standard computer systems 3. Maintain Information Systems infrastructures Operate and maintain infrastructure Networks and servers must be monitored, tuned, and repaired System outages are expensive Respond to threats to infrastructure 4. Protect infrastructure and data from threats Threats to infrastructure and data from: Human error and mistakes Malicious human activity Natural events and disasters IT department helps organizations manage risk Identify potential threats Estimate financial and other risks Specify safeguards Determine which level of risk to assume
  4. “ Computers, email, and the Internet are to be used primarily for official company business. Small amounts of personal email can be exchanged with friends and family, and occasional usage of the Internet is permitted, but such usage should be limited and never interfere with your work.” Playing computer games during work hours Playing computer games before and after work hours Responding to emails from an ill parent Watching DVDs during lunch and breaks Sending emails to plan a party that mostly involves people from work Sending emails to plan a party that mostly involves no one from work Searching the Web for a new car Reading the news on CNN.com Checking the stock market over the Internet Bidding on items for personal use on eBay Selling personal items on eBay Paying personal bills online Paying personal bills online when traveling on company business Buying an airplane ticket for an ill parent over the Internet Changing the content of a personal Web site Changing the content of a personal business Web site Buying an airplane ticket for a personal vacation over the Internet Installing personal software on a company computer (Kindle Reader, Google Drive, etc.)
  5. “ Computers, email, and the Internet are to be used primarily for official company business. Small amounts of personal email can be exchanged with friends and family, and occasional usage of the Internet is permitted, but such usage should be limited and never interfere with your work.” Playing computer games during work hours Playing computer games before and after work hours Responding to emails from an ill parent Watching DVDs during lunch and breaks Sending emails to plan a party that mostly involves people from work Sending emails to plan a party that mostly involves no one from work Searching the Web for a new car Reading the news on CNN.com Checking the stock market over the Internet Bidding on items for personal use on eBay Selling personal items on eBay Paying personal bills online Paying personal bills online when traveling on company business Buying an airplane ticket for an ill parent over the Internet Changing the content of a personal Web site Changing the content of a personal business Web site Buying an airplane ticket for a personal vacation over the Internet
  6. “ Computers, email, and the Internet are to be used primarily for official company business. Small amounts of personal email can be exchanged with friends and family, and occasional usage of the Internet is permitted, but such usage should be limited and never interfere with your work.” Playing computer games during work hours Playing computer games before and after work hours Responding to emails from an ill parent Watching DVDs during lunch and breaks Sending emails to plan a party that mostly involves people from work Sending emails to plan a party that mostly involves no one from work Searching the Web for a new car Reading the news on CNN.com Checking the stock market over the Internet Bidding on items for personal use on eBay Selling personal items on eBay Paying personal bills online Paying personal bills online when traveling on company business Buying an airplane ticket for an ill parent over the Internet Changing the content of a personal Web site Changing the content of a personal business Web site Buying an airplane ticket for a personal vacation over the Internet