SlideShare a Scribd company logo
Chapter 1
Managers: Key to
Information
Technology Results
What is IT?
Information Technology includes all tools that capture, store, process,
exchange, and use information.
Field of IT includes:
computer hardware
Software
Networks
Databases
IT infrastructure – an organization’s defined set of IT hardware, software
and network
IT support organization – the staff people who will plan, implement,
operate and support IT
*organizations IT infrastructure must be integrated with employees and
procedures to build and support IS
Function of IT
Decision Support System (DSS)
- employs models and analytic tools to help users gain insights
into data, draw conclusions from the data and make recommendations
- can provide ‘what if’ analysis
Example: buyer might use DSS to analyze supplier bids and select the
least expensive provider for raw materials
E-learning systems
- encompass a number of computer enhanced learning
techniques, including computer-based simulation, multimedia CD-ROMs,
web based learning materials, hypermedia, podcats and Webcasts
Example: Whirpools ‘Virtual University’
Network IT
Web conferencing
- uses IT to conduct meetings or presentations in which
participants are connected via Internet
 Screen sharing- the most basic form of web conference – each
participant sees whatever is on the presenter’s screen, be it a
spreadsheet, legal document, artwork, blueprint, or MRI image
Types of Web Conferencing
1. Web Casting – audio and video information is broadcast from the
presenter to participants
2. Webinar – a live internet presentation that supports interactive
communications between presenter and the audience
Example: Cerner’s corp. (sales, mktg. & technology workers)
Network IT
3. Wiki – Hawaiian for fast
- a website that allows users to edit and change its content
easily and rapidly
- enables individual members of a workgroup or project team
to collaborate on a document, spreadsheet, or software application
without having to send the materials back and forth.
Example: Creative team of MWW Group (public relations mktg.)
4. Electronic corporate directories
- used in a large organizations to find the right person with
whom to collaborate on an issue or opportunity
Example: IBM’s Blue Pages
Network IT
IBM’s Blue page
*consists of three components
 Database of information about employees’ skills, knowledge areas, &
experience
search engine and
collaboration features that connect employees and facilitate the
sharing of information
Enterprise IT
Transaction Processing System (TPS)
- captures data for company transactions and other key events and
updates the firm’s records, which are maintained in electronic files or
databases.
Example: Organizations order processing (order entry, shipment
planning, shipment execution, inventory control and accounts
receivable)
Enterprise Resource Planning (ERP)
- group of computer programs with a common database that a firm uses
to plan, manage and control its routine business operations
- shared database
Enterprise IT
Interorganizational Information Systems
- support the flow of data among organizations to achieve shared
goals
*Electronic Data Interchange (EDI)
-one type of Interorganizational Information Systems
-Supports the direct, computer-to-computer transfer of information in
the form of predefined electronic documents
- dictate which data is required for each type of document and which
data is optional
The roles of managers Vis-a-Vis IT
Three critical responsibilities of managers
1. Identifying Appropriate IT Opportunities
- the most important consideration is what organizations are getting out
of their investment in IT, not how much they are investing in IT
2. Smoothing the way for its successful introduction and adoption
- Managers must be able to overcome the ‘resistance’ so the new IT
system is accepted and used throughout the organization
The roles of managers Vis-a-Vis IT
Reason to resist change Explanation
Parochial self interests Some people are more concerned with
the change on themselves than with how
it might improve the organization
Misunderstanding Some people have misconceptions or
lack information about change
Low tolerance to change Some people require security and
stability in their work
Different assessments of the situation Some people disagree about the reasons
for the change or do not support the
process
Four reasons people resist change
ThephasesandstagesoftheChangemanagementContinuum
Model
Phase Goal Stage Description
Inform Make people aware of the
change and why it is
occurring
Contact Person first becomes aware that
change is to take place
Awareness Person has basic knowledge of the
phase
Understanding Person comprehends nature and intent
of change and how he/she will be
affected
Educate People recognize impact of
change on them and their
way of working
Positive perception Persons develop positive dispositions
toward the change
Adoption Change has demonstrated a positive
impact on the organization
Institutionalism Change is durable and has been
formally incorporated into routine
operating procedures of organization
Commit The change is fully accepted
and has become part of
everyday life
Internalization People are highly committed to change
because it matches their interests,
goals, and values
The roles of managers Vis-a-Vis IT
Key Factors of IT acceptance and usage
Factor Definition
Performance Belief that using the system will
help job performance
Effort expectancy Degree of ease associated with the
use of the system
Social influence Degree of belief that important
company officials want employee
to use the system
Facilitating Conditions Belief that an organizational and
technical infrastructure exists to
support the system
The roles of managers Vis-a-Vis IT
3. Mitigating its associated risks
IT RISKS EXAMPLE
Inability to continue operations due to a
natural disaster or accident
Fire destroys IT resources at corporate headquarters
Inability to continue operations due to a
deliberate attack on IT assets
Hackers carry out denial-of-service attack on organization’s
website
Compromise of confidential data about
organizational plans, products o services
Senior executive loses laptop containing critical data
Compromise of personal, private data
about employee or customers
Hackers access and download customer data, including account
numbers
Violation of legally mandated procedures
for controlling IT assets
IT system controls are inadequate to meet specific SOX
guidelines for maintaining the integrity of financial data
Violation of the organization’s defined
procedures and or accounting practices
IT system controls are circumvented by granting access to
inappropriate people to adjust finished product inventory
accounts
Loss of physical IT assets Theft of computers from corporate training facility
Inappropriate use of IT resources that
places firm in a compromising position
Employees use corporate email to disseminate sexually explicit
material; firm is subjected to a sexual harassment lawsuit
Inappropriate use of IT resources that
reduces worker productivity
Employees waste time at work visiting websites that are not
related to their work
END OF SLIDE

More Related Content

What's hot

Introduction to the Computer-Based Information System
Introduction to the Computer-Based Information SystemIntroduction to the Computer-Based Information System
Introduction to the Computer-Based Information System
Fathur Rohman
 
Cbis
CbisCbis
Types, purposes and applications of information systems
Types, purposes and applications of information systemsTypes, purposes and applications of information systems
Types, purposes and applications of information systems
Mary May Porto
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
rayutchea
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
SHANTO-MARIAM UNIVERSITY OF CREATIVE AND TECHNOLOGY
 
Management Information System Complete Guide and Notes by muhammad Khurram ba...
Management Information System Complete Guide and Notes by muhammad Khurram ba...Management Information System Complete Guide and Notes by muhammad Khurram ba...
Management Information System Complete Guide and Notes by muhammad Khurram ba...
Muhammad Khurram Baig
 
Chap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technologyChap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technology
Memoona Qadeer
 
Management information system
Management information systemManagement information system
Management information system
vivekdabe
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
uday sharma
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
khairulanuarhasan
 
Know the features and functions of information systems
Know the features and functions of information systemsKnow the features and functions of information systems
Know the features and functions of information systems
Rajesh Khadka
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information Systems
Manuel Ardales
 
Mis9 ch03 ppt (2)
Mis9 ch03 ppt (2)Mis9 ch03 ppt (2)
Mis9 ch03 ppt (2)
Taniya Malik
 
Mis 1 Chapter
Mis 1 ChapterMis 1 Chapter
Mis 1 Chapter
Nimisha Walecha
 
Information system
Information systemInformation system
Cbis
CbisCbis
Management information system Unit 1
Management information system Unit 1Management information system Unit 1
Management information system Unit 1
Sharda University Greater Noida
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
Trinity Dwarka
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
shaylor_swift
 

What's hot (19)

Introduction to the Computer-Based Information System
Introduction to the Computer-Based Information SystemIntroduction to the Computer-Based Information System
Introduction to the Computer-Based Information System
 
Cbis
CbisCbis
Cbis
 
Types, purposes and applications of information systems
Types, purposes and applications of information systemsTypes, purposes and applications of information systems
Types, purposes and applications of information systems
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Management Information System Complete Guide and Notes by muhammad Khurram ba...
Management Information System Complete Guide and Notes by muhammad Khurram ba...Management Information System Complete Guide and Notes by muhammad Khurram ba...
Management Information System Complete Guide and Notes by muhammad Khurram ba...
 
Chap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technologyChap 17 managing information systems and communication technology
Chap 17 managing information systems and communication technology
 
Management information system
Management information systemManagement information system
Management information system
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
 
Know the features and functions of information systems
Know the features and functions of information systemsKnow the features and functions of information systems
Know the features and functions of information systems
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information Systems
 
Mis9 ch03 ppt (2)
Mis9 ch03 ppt (2)Mis9 ch03 ppt (2)
Mis9 ch03 ppt (2)
 
Mis 1 Chapter
Mis 1 ChapterMis 1 Chapter
Mis 1 Chapter
 
Information system
Information systemInformation system
Information system
 
Cbis
CbisCbis
Cbis
 
Management information system Unit 1
Management information system Unit 1Management information system Unit 1
Management information system Unit 1
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
 

Similar to Ch1

MIS - UNIT I.pptx
MIS - UNIT I.pptxMIS - UNIT I.pptx
MIS - UNIT I.pptx
ArulPandian12
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
Raphael Wanjiku
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docx
Amdework Belay
 
wk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdfwk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdf
feetshoemart
 
decision support system in management information
decision support system in management informationdecision support system in management information
decision support system in management information
milkesa13
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Heru Ramadhon
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
Neelam Rawat
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
07Deeps
 
PIS Lecture notes principal of information systems
PIS Lecture notes principal of information systemsPIS Lecture notes principal of information systems
PIS Lecture notes principal of information systems
ShukraShukra
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
Ram Dutt Shukla
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information Systems
Ram Dutt Shukla
 
MA-26-AIS-Notes.ppt
MA-26-AIS-Notes.pptMA-26-AIS-Notes.ppt
MA-26-AIS-Notes.ppt
CristinaClemenso
 
AIS-CHAPTER-1.ppt
AIS-CHAPTER-1.pptAIS-CHAPTER-1.ppt
AIS-CHAPTER-1.ppt
ShanelleCamral
 
AIS-CHAPTER-1.ppt
AIS-CHAPTER-1.pptAIS-CHAPTER-1.ppt
AIS-CHAPTER-1.ppt
ShanelleCamral
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
ssusera4df42
 
Lectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwertyLectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwerty
Ceazar Nell Ambulo
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
PierreAngelaSalonga
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdf
Yihune Ephrem
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
sparkeyrob
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 

Similar to Ch1 (20)

MIS - UNIT I.pptx
MIS - UNIT I.pptxMIS - UNIT I.pptx
MIS - UNIT I.pptx
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docx
 
wk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdfwk3 reply to prof.I need help with this question below a 200 words.pdf
wk3 reply to prof.I need help with this question below a 200 words.pdf
 
decision support system in management information
decision support system in management informationdecision support system in management information
decision support system in management information
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
PIS Lecture notes principal of information systems
PIS Lecture notes principal of information systemsPIS Lecture notes principal of information systems
PIS Lecture notes principal of information systems
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information Systems
 
MA-26-AIS-Notes.ppt
MA-26-AIS-Notes.pptMA-26-AIS-Notes.ppt
MA-26-AIS-Notes.ppt
 
AIS-CHAPTER-1.ppt
AIS-CHAPTER-1.pptAIS-CHAPTER-1.ppt
AIS-CHAPTER-1.ppt
 
AIS-CHAPTER-1.ppt
AIS-CHAPTER-1.pptAIS-CHAPTER-1.ppt
AIS-CHAPTER-1.ppt
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Lectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwertyLectures 2-and-3-questions.qwerty
Lectures 2-and-3-questions.qwerty
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdf
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Ch1

  • 1. Chapter 1 Managers: Key to Information Technology Results
  • 2. What is IT? Information Technology includes all tools that capture, store, process, exchange, and use information. Field of IT includes: computer hardware Software Networks Databases IT infrastructure – an organization’s defined set of IT hardware, software and network IT support organization – the staff people who will plan, implement, operate and support IT *organizations IT infrastructure must be integrated with employees and procedures to build and support IS
  • 3. Function of IT Decision Support System (DSS) - employs models and analytic tools to help users gain insights into data, draw conclusions from the data and make recommendations - can provide ‘what if’ analysis Example: buyer might use DSS to analyze supplier bids and select the least expensive provider for raw materials E-learning systems - encompass a number of computer enhanced learning techniques, including computer-based simulation, multimedia CD-ROMs, web based learning materials, hypermedia, podcats and Webcasts Example: Whirpools ‘Virtual University’
  • 4. Network IT Web conferencing - uses IT to conduct meetings or presentations in which participants are connected via Internet  Screen sharing- the most basic form of web conference – each participant sees whatever is on the presenter’s screen, be it a spreadsheet, legal document, artwork, blueprint, or MRI image Types of Web Conferencing 1. Web Casting – audio and video information is broadcast from the presenter to participants 2. Webinar – a live internet presentation that supports interactive communications between presenter and the audience Example: Cerner’s corp. (sales, mktg. & technology workers)
  • 5. Network IT 3. Wiki – Hawaiian for fast - a website that allows users to edit and change its content easily and rapidly - enables individual members of a workgroup or project team to collaborate on a document, spreadsheet, or software application without having to send the materials back and forth. Example: Creative team of MWW Group (public relations mktg.) 4. Electronic corporate directories - used in a large organizations to find the right person with whom to collaborate on an issue or opportunity Example: IBM’s Blue Pages
  • 6. Network IT IBM’s Blue page *consists of three components  Database of information about employees’ skills, knowledge areas, & experience search engine and collaboration features that connect employees and facilitate the sharing of information
  • 7. Enterprise IT Transaction Processing System (TPS) - captures data for company transactions and other key events and updates the firm’s records, which are maintained in electronic files or databases. Example: Organizations order processing (order entry, shipment planning, shipment execution, inventory control and accounts receivable) Enterprise Resource Planning (ERP) - group of computer programs with a common database that a firm uses to plan, manage and control its routine business operations - shared database
  • 8. Enterprise IT Interorganizational Information Systems - support the flow of data among organizations to achieve shared goals *Electronic Data Interchange (EDI) -one type of Interorganizational Information Systems -Supports the direct, computer-to-computer transfer of information in the form of predefined electronic documents - dictate which data is required for each type of document and which data is optional
  • 9. The roles of managers Vis-a-Vis IT Three critical responsibilities of managers 1. Identifying Appropriate IT Opportunities - the most important consideration is what organizations are getting out of their investment in IT, not how much they are investing in IT 2. Smoothing the way for its successful introduction and adoption - Managers must be able to overcome the ‘resistance’ so the new IT system is accepted and used throughout the organization
  • 10. The roles of managers Vis-a-Vis IT Reason to resist change Explanation Parochial self interests Some people are more concerned with the change on themselves than with how it might improve the organization Misunderstanding Some people have misconceptions or lack information about change Low tolerance to change Some people require security and stability in their work Different assessments of the situation Some people disagree about the reasons for the change or do not support the process Four reasons people resist change
  • 11. ThephasesandstagesoftheChangemanagementContinuum Model Phase Goal Stage Description Inform Make people aware of the change and why it is occurring Contact Person first becomes aware that change is to take place Awareness Person has basic knowledge of the phase Understanding Person comprehends nature and intent of change and how he/she will be affected Educate People recognize impact of change on them and their way of working Positive perception Persons develop positive dispositions toward the change Adoption Change has demonstrated a positive impact on the organization Institutionalism Change is durable and has been formally incorporated into routine operating procedures of organization Commit The change is fully accepted and has become part of everyday life Internalization People are highly committed to change because it matches their interests, goals, and values
  • 12. The roles of managers Vis-a-Vis IT Key Factors of IT acceptance and usage Factor Definition Performance Belief that using the system will help job performance Effort expectancy Degree of ease associated with the use of the system Social influence Degree of belief that important company officials want employee to use the system Facilitating Conditions Belief that an organizational and technical infrastructure exists to support the system
  • 13. The roles of managers Vis-a-Vis IT 3. Mitigating its associated risks IT RISKS EXAMPLE Inability to continue operations due to a natural disaster or accident Fire destroys IT resources at corporate headquarters Inability to continue operations due to a deliberate attack on IT assets Hackers carry out denial-of-service attack on organization’s website Compromise of confidential data about organizational plans, products o services Senior executive loses laptop containing critical data Compromise of personal, private data about employee or customers Hackers access and download customer data, including account numbers Violation of legally mandated procedures for controlling IT assets IT system controls are inadequate to meet specific SOX guidelines for maintaining the integrity of financial data Violation of the organization’s defined procedures and or accounting practices IT system controls are circumvented by granting access to inappropriate people to adjust finished product inventory accounts Loss of physical IT assets Theft of computers from corporate training facility Inappropriate use of IT resources that places firm in a compromising position Employees use corporate email to disseminate sexually explicit material; firm is subjected to a sexual harassment lawsuit Inappropriate use of IT resources that reduces worker productivity Employees waste time at work visiting websites that are not related to their work