2. Distinguish between data and information
and explain the role of management
information systems in business.
List the components and different types of
information systems.
Outline how computer hardware and
software are used to manage information.
Describe the networking and
telecommunications technology and types
of computer networks.
1
Learning Objectives
Discuss the security and ethical
issues involving computer
information systems.
Explain the steps that companies go
through in anticipating, planning for,
and recovering from information
system disasters.
Review current trends in information
systems.
2
3
4
5
6
7
3. Data– raw facts and figures
Information– knowledge gained from
processing data
Information system– organized method for
collecting, storing, and communicating
information on operations
Chief information officer– executive
responsible for directing information systems
and operations
Information Systems
5. Operational Support Systems
Transaction Processing System
Process Control System
Management Support Systems
Management Information System (MIS)
Decision Support System (DSS)
Executive Support System (ESS)
Types of Information Systems
6. The tangible elements of a computer system
The components that store and process data,
perform calculations
Input devices like the keyboard and mouse allow
users to enter data and commands.
Storage and processing components consist of
the hard drive and other storage components
like flash drives.
Computer Hardware
8. Programs, routines, and computer
languages that control a computer
Operating System
Windows Operating System
Mac Operating System
Application Software
Microsoft PowerPoint
Quicken
Computer Software
9. The Internet
Local Area Networks (LAN)
Wide Area Networks (WAN)
Wireless Local Networks (Wi-Fi)
Intranets
Virtual Private Networks (VPN)
Voice over Internet Protocol (VoIP)
Computer Networks
11. Use of information systems by employees
and vendors:
Personal use
Privacy
Organizational use of information:
Employment records
Employee monitoring
Customer data
Ethical Issues
12. Natural Disasters
Power Failures
Equipment Malfunctions
Software Glitches
Human Error
Terrorist Attacks
The most basic
precaution– backup.
Disaster Recovery and Backup
90% of firms that sustained
a loss of critical data went
out of business within two
years.
90% of firms that sustained
a loss of critical data went
out of business within two
years.
13. The Distributed Workforce
Employees who work in virtual
offices
Application Service
Providers
A firm that provides
computers and application
support
On Demand, Cloud, and
Grid Computing
Renting software time
Information Systems Trends