2. Effects of IT
E-business – electronic business, replaced several jobs in certain sectors, but
created new ones.
Telemedicine – healthcare can be provided to people that are thousands of
miles away from doctors.
Privacy – ones right to determine how much information can be collected
about them.
Fairness in privacy – the data collected should only be used for its intended
purpose.
Occupational privacy – information that has to do with ones profession.
Informational privacy – ones personal information.
Financial privacy – ones financial data.
3. Cont.
Organizational privacy – trade secrets or activities that an organization does not want to be public.
Physical privacy – one’s physical body or medical information.
Gramm-Leach Bliley Act – financial institutions must handle peoples information with confidentiality.
Health Insurance Portability and Accountability Act of 1996 – one has a right to see and request a copy
of their medical records.
Children’s Online Privacy Protection Act (COPPA) – requires parental consent before collecting
information about children online.
USA PATRIOT Act – the FBI can track emails and website visiting without needing a subpoena.
Secure Socket Layer (SSL) – uses an encryption technology to allow communication between two
computers that can only be understood by those two computers.
HTTP – the protocol (procedure) used when visiting an unsecure website
4. Privacy
Proxy software – makes ones internet surfing anonymous.
Anti-phishing software – verifies websites that hide their URL.
File shredding – deleting a file off of a computer in a way that it
can’t be restored by any means.
Copyright – books, performances, music, artwork.
Industrial property – processes, designs, patents trademarks.
Purposes of intellectual property – monetary incentives, exclusive
rights, economic growth and progress of human beings.
5. Cont.
Types of Intellectual Property
1. Trademark – a symbol or sign that is unique and is used to identify a product or
company.
2. Industrial designs – how something is created (size, shape, process, materials etc.).
3. Trade secrets – a process, design etc. that is only protected until someone else knows
it.
4. Patents – exclusive rights for something for up to 20 years.
5. Copyright – protection of intellectual property that has no expiration date.
Open source – a software that has its source code open, this allows for changes to be
made to it by the public.
Open Source Initiative (OSI) – a nonprofit that was created in order to educate people
about open source and its benefits.
6. Teams
Virtual team – consists of people who communicate via the internet, while working
together
Friendship group- when multiple virtual teams communicate with one another.
Task group- formed when multiple people are working on a common task.
Interest group – a virtual group that shares an interest.
Command group – when the individuals working together are from the same department.
Global group – when team members come from all over the world.
Ergonomics – looks at how one’s computer is set up in order to reduce physical injury or
strain that can be caused by using a computer.
Work-Related Musculoskeletal Disorders (WMSDs) – which can be caused by long time
computer usage is the largest job related injury in the United States.
7. Cont.
Job design – lists all of the tasks one must perform for their job.
Globalization – different countries and governments coming
together to do business.
Factors That Led to Globalization
1. Multinational companies
2. Politics
3. Easier flow of information
4. IT outsourcing
5. Interdependence among countries
8. Cont.
Effects of Globalization
1. Increased living standards
2. Manufacturing and services globalized
3. More globalized finance and economics
4. Increased competition among businesses
5. Environmental impacts
6. Technological impacts
Outsourcing – when a company has an outside company provide a good or service that
normally would’ve been done in house.
Insourcing – when a company makes a process in house, that was normally outsourced.
9. Outsourcing and Insourcing
Advantages of
Outsourcing
More choices of services
Ability to stay competitive
Expansion & growth
Time zone advantages
New technology
Increased productivity
Disadvantages of
Outsourcing
Lag time
Language barriers
Loss of domestic jobs
Trade secrets can be
compromised (loss of
control)
Lack of ability to train your
staff
10. Cont.
Advantages of Insourcing
1. Creates domestic jobs
2. Boosts the domestic economy
3. Better quality
4. More control
3 Levels of Business Strategy
1. Organizational – the organization’s strategy as a whole
2. Business – each wing or divisions strategy (made up of several departments)
3. Departmental – each individual departments strategy
11. IT Careers
Computer programmer
Computer Scientist
Computer Hardware Engineer
Computer Software Engineer
Network manager
Network and Computer Systems Admin.
Manager of Technical Services
Messaging Administrator
Network Architect or Network Engineer
Computer Database
Administrator
Digital Media Specialist
Helpdesk Support specialist
Information Systems Manager
Lead Applications Developer
Systems Administrator
Systems Programmer
Technical Writer
Web Developer
Web Programmer
Applications architect
Business Systems Analysts
(BSA)
Chief Technology Officer (CTO)
Computer-Security Specialist
12. Cont.
The IT field is constantly changing due to new technology.
IT Certifications
1. Microsoft IT Certification
2. CompTIA (The Computer Information Technology Industry Association)
3. And many more
Levels of Economic Competition
1. Direct – when two goods perform the same function.
2. Indirect- occurs when two goods perform similar functions and can be
substituted for each other.
3. Budget –when a consumer has a budget.
13. Cont.
Other Types of Competition
Monopoly – when only one company has the means to
manufacture a good or provide a service.
Pure or perfect – when there are several companies that
have the means to manufacture a good or provide a service
Factors Effecting Competition
1. New technology
2. Production costs
3. Unit selling prices
14. Knowledge Management
Implicit knowledge (tacit) – is gained through observation or
experience and is not stored on computers.
Explicit knowledge (formal) – is communicated and obtained in a
systematic format and stored on computers.
Knowledge Management – the strategies used to collect, analyze,
interpret and store knowledge.
4 W’s of Knowledge Management – where, who, when, what type
Push technology – collects information from inside and outside
sources through the use of a product or service (ex. BackWeb or
PointCast)
Pull technology – when knowledge is collected from outside sources.
15. Cont.
Databases – where information is stored.
Software tools- are used to help simplify the KM process.
Network communities – allow people to communicate issues
or information regarding KM.
Data mining
Enterprise Content Management (ECM) – the strategies that
are put into place to acquire, organize and deliver
documents that are related to an organization.
16. Computer Security
Black-hat hackers – hackers with malicious intent.
White-hat hackers – hackers with the intent of exposing flaws in a company's system (no malicious
intent).
Script kiddies – use software or a program to hack (they don’t actually know how to hack)
Viruses – a computer program that can damage a computer's software, hardware or data.
Trojan Horses- a virus that looks like a useful program, but causes damage to the computer.
Encryption viruses- makes personal folders or files unable to be read.
Worms- a program that travels between networks (eventually finding a host which it causes damage
to)
Boot-sector viruses – can damage a computer upon it “booting up” or turning on.
Script Viruses – cause damage to a computer through a series of program statements.
17. Cont.
Macro viruses – a virus that replaces a computers normal macro.
Logic bombs- a virus that will be enabled when its conditions (logic) are met.
Denial-of-service attacks – makes a computer program or function unavailable
for the user.
Association for Computing Machinery (ACM) – creates computer ethics.
According to the ACM it is both illegal and unethical to hack into or spread
viruses on computers.
Software piracy – the intentional copying, sale or alteration of a copyrighted
software.
Intellectual property rights- the rights of a creator of a piece of work.
Information privacy rights – a person or company has the right to determine
what information about them is able to be collected or used.
18. Cont.
Use of Computer Access Controls (Physical Security) – security surrounding the building
or room in which a computer is stored.
Hardware security – logins or passwords.
Cryptographic techniques – makes information being transferred between two computers
harder to intercept.
Biometric devices – use a body part to authorize/identify a use (finger print, palm
scanner, eye scanner etc.)
Chain of trust techniques – a seal of authenticity.
Firewall hardware devices- a router that keeps unused ports closed when on the internet.
Software firewall- closes open ports from attackers when on the internet.
Anti-virus software – protects a computer from viruses.
19. Cont.
Back ups – protect a computer and can restore it to its
“back up” condition.
Anti-spyware- protects a computer from spyware
programs.
Anti-spam software – protects against “junk” mail
20. Strategy
Business Process Reengineering (BRP) – studying business strategy, organizational
hierarchy and IS systems in order to improve business performance.
Databases – store information.
Wireless Communication Devices – make it possible to communicate with anyone,
despite their location.
AutoCAD software – helps redesign products.
AutoCAM software – helps make changes to the manufacturing process.
Decision support systems (DSS)- help make decisions.
Electronic data interchange (EDI) software – reduces transaction costs by monitoring
electronic data.
Expert systems – give employees the ability to perform tasks.
21. Cont.
Enterprise resource planning (ERP) – allows employees to share information in a central location.
Customer resource management (CRM) – helps to increase customer satisfaction.
Supply chain management (SCM) – helps manage the interactions from when a good is still raw
materials to when it is delivered to the final consumer.
Total quality management (TQM) – helps redesign products to increase their quality.
Automatic ID and tracking – helps locate/track products.
Three Types of Business Processes
1. Management – involves planning and administering tasks. (Project management)
2. Operational – planning and administering specific tasks. (manufacturing and purchasing)
3. Supporting – help the management and operational processes work. (accounting/human resources)
22. Cont.
Business Process Modeling (BPM) – the act of analyzing
and modifying business processes to make them more
efficient.
The business process – start, inputs, process, outputs, end.
Quality control (QC) – makes sure that the raw materials
used to create a product are up to par.
Line graphs – have lines connecting the dots.
Scatter plots – don’t have lines connecting the dots.
Run charts – show a processes performance for a period of
time.
23. Cont.
Pareto charts – eliminating a small problem leads to great gains
Checklists – used to keep track of things or processes that must be done in
order to complete a task.
Check sheets –used to collect data.
Flowcharts – a graphical picture of a process.
B2B – business between two businesses.
B2C – business between a business and a consumer.
C2C – business between two consumers.
Licensed software – bought and downloaded for a single fee.
Hosted software – not downloaded and one pays a periodic usage fee.