Chapter 14 Using Technology to Manage Information
Learning Objectives1 Distinguish between data and information 5 Discuss the security and ethical and explain the role of management issues involving computer information systems in business. information systems.2 List the components and different types of 6 Explain the steps that companies go information systems. through in anticipating, planning for, and recovering from information3 Outline how computer hardware and system disasters. software are used to manage information. 7 Review current trends in information4 Describe the networking and systems. telecommunications technology and types of computer networks.
Information Systemss Data– raw facts and figuress Information– knowledge gained from processing datas Information system– organized method for collecting, storing, and communicating information on operationss Chief information officer– executive responsible for directing information systems and operations
Components of Information Systemss Computer Hardwares Computer Softwares Telecommunications and Computer Networkss Data Resource Management
Types of Information Systemss Operational Support Systems s Transaction Processing System s Process Control Systems Management Support Systems s Management Information System (MIS) s Decision Support System (DSS) s Executive Support System (ESS)
Computer Hardwares The tangible elements of a computer systems The components that store and process data, perform calculationss Input devices like the keyboard and mouse allow users to enter data and commands.s Storage and processing components consist of the hard drive and other storage components like flash drives.
Types of Computerss Desktop (personal) computerss Servers Mainframess Supercomputerss Notebook computerss Handheld devices– PDAs and smart phones
Computer Softwares Programs, routines, and computer languages that control a computers Operating System s Windows Operating System s Mac Operating Systems Application Software s Microsoft PowerPoint s Quicken
Computer Networkss The Internets Local Area Networks (LAN)s Wide Area Networks (WAN)s Wireless Local Networks (Wi-Fi)s Intranetss Virtual Private Networks (VPN)s Voice over Internet Protocol (VoIP)
Security Issuess E-Crimes Computer Viruses s Worms s Trojan Horses s Spyware
Ethical Issuess Use of information systems by employees and vendors: s Personal use s Privacys Organizational use of information: s Employment records s Employee monitoring s Customer data
Disaster Recovery and Backups Natural Disasterss Power Failures 90% of firms that sustaineds Equipment Malfunctions a loss of critical data wents Software Glitches out of business within twos Human Error years.s Terrorist Attackss The most basic precaution– backup.
Information Systems Trendss The Distributed Workforce s Employees who work in virtual officess Application Service Providers s A firm that provides computers and application supports On Demand, Cloud, and Grid Computing s Renting software time