SlideShare a Scribd company logo
Chapter    14
          Using Technology to Manage
          Information
Learning Objectives

1   Distinguish between data and information     5   Discuss the security and ethical
    and explain the role of management               issues involving computer
    information systems in business.                 information systems.

2   List the components and different types of   6   Explain the steps that companies go
    information systems.                             through in anticipating, planning for,
                                                     and recovering from information
3   Outline how computer hardware and                system disasters.
    software are used to manage information.
                                                 7   Review current trends in information
4   Describe the networking and                      systems.
    telecommunications technology and types
    of computer networks.
Information Systems

s   Data– raw facts and figures
s   Information– knowledge gained from
    processing data
s   Information system– organized method for
    collecting, storing, and communicating
    information on operations
s   Chief information officer– executive
    responsible for directing information systems
    and operations
Components of Information Systems

s   Computer Hardware

s   Computer Software

s   Telecommunications and Computer Networks

s   Data Resource Management
Types of Information Systems
s   Operational Support Systems
    s   Transaction Processing System
    s   Process Control System


s   Management Support Systems
    s   Management Information System (MIS)
    s   Decision Support System (DSS)
    s   Executive Support System (ESS)
Computer Hardware

s   The tangible elements of a computer system
s   The components that store and process data,
    perform calculations
s   Input devices like the keyboard and mouse allow
    users to enter data and commands.
s   Storage and processing components consist of
    the hard drive and other storage components
    like flash drives.
Types of Computers

s   Desktop (personal)
    computers
s   Server
s   Mainframes
s   Supercomputers
s   Notebook computers
s   Handheld devices– PDAs
    and smart phones
Computer Software
s   Programs, routines, and computer
    languages that control a computer

s   Operating System
    s   Windows Operating System
    s   Mac Operating System

s   Application Software
    s   Microsoft PowerPoint
    s   Quicken
Computer Networks



s   The Internet
s   Local Area Networks (LAN)
s   Wide Area Networks (WAN)
s   Wireless Local Networks (Wi-Fi)
s   Intranets
s   Virtual Private Networks (VPN)
s   Voice over Internet Protocol (VoIP)
Security Issues

s   E-Crime
s   Computer Viruses
    s   Worms
    s   Trojan Horses
    s   Spyware
Ethical Issues
s   Use of information systems by employees
    and vendors:
    s   Personal use
    s   Privacy
s   Organizational use of information:
    s   Employment records
    s   Employee monitoring
    s   Customer data
Disaster Recovery and Backup

s   Natural Disasters
s   Power Failures           90% of firms that sustained

s   Equipment Malfunctions   a loss of critical data went

s   Software Glitches        out of business within two

s   Human Error              years.

s   Terrorist Attacks
s   The most basic
    precaution– backup.
Information Systems Trends
s   The Distributed Workforce
    s   Employees who work in virtual
        offices
s   Application Service
    Providers
    s   A firm that provides
        computers and application
        support
s   On Demand, Cloud, and
    Grid Computing
    s   Renting software time
Chapter 14: Information Technology

More Related Content

What's hot

INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
Sreedevi Santhosh
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
Daryl Conson
 
Information management
Information managementInformation management
Information management
Deepak John
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
Mark John Lado, MIT
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
Kaushik Panta
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
SaranSwathi1
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
CreatorsCircle
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
Freeform Dynamics
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
INFORMATION SYSTEM lecture
INFORMATION SYSTEM lectureINFORMATION SYSTEM lecture
INFORMATION SYSTEM lecture
Emmanuel Alimpolos
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-applSR NAIDU
 
Dstca
DstcaDstca
Dstca
ajay vj
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
JamesDempsey1
 
Info...group 3
Info...group 3Info...group 3
Info...group 3rubyjade
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
Masudur Rahman
 

What's hot (20)

INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Information management
Information managementInformation management
Information management
 
Data security
Data securityData security
Data security
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
INFORMATION SYSTEM lecture
INFORMATION SYSTEM lectureINFORMATION SYSTEM lecture
INFORMATION SYSTEM lecture
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Dstca
DstcaDstca
Dstca
 
Data Security
Data SecurityData Security
Data Security
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cis(11122223333)
Cis(11122223333)Cis(11122223333)
Cis(11122223333)
 
Info...group 3
Info...group 3Info...group 3
Info...group 3
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 

Viewers also liked

Logistics and Information Technology
Logistics and Information TechnologyLogistics and Information Technology
Logistics and Information Technology
Alfonso Rojas
 
Logistics in the information age
Logistics in the information ageLogistics in the information age
Logistics in the information ageJatin Kathuria
 
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology ArchitectureICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
Mohammad Abdul Matin Emon
 
Use of technology in logistics
Use of technology in logisticsUse of technology in logistics
Top technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industryTop technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industry
Arindam Bakshi
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 

Viewers also liked (6)

Logistics and Information Technology
Logistics and Information TechnologyLogistics and Information Technology
Logistics and Information Technology
 
Logistics in the information age
Logistics in the information ageLogistics in the information age
Logistics in the information age
 
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology ArchitectureICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
 
Use of technology in logistics
Use of technology in logisticsUse of technology in logistics
Use of technology in logistics
 
Top technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industryTop technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industry
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 

Similar to Chapter 14: Information Technology

Chapter 14
Chapter 14Chapter 14
Chapter 14
Mahboob Ahmad
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
Aleeza Aziz
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
AjayKumar73315
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
NareshBabu285920
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1Jim Constantinou
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
Mohamed EL Zayat
 
Cyber security
Cyber securityCyber security
Cyber security
Ankush Verma
 
Explain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docxExplain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docx
intel-writers.com
 
INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMS
Jennifer De Julio
 
Information Technology for Business
Information Technology for BusinessInformation Technology for Business
Information Technology for Business
METHODIST COLLEGE OF ENGG & TECH
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systems
mrscjrobertson
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
Karl Kispert
 
Management information systems and cyber
Management information systems and cyberManagement information systems and cyber
Management information systems and cyber
Anjali
 
Mis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessMis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in business
Hassan Samoon
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and mis
Alsufaacademy
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information System
Nirajan Silwal
 

Similar to Chapter 14: Information Technology (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Components
ComponentsComponents
Components
 
Cyber security
Cyber securityCyber security
Cyber security
 
Explain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docxExplain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docx
 
INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMS
 
Information Technology for Business
Information Technology for BusinessInformation Technology for Business
Information Technology for Business
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systems
 
Information security
Information securityInformation security
Information security
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
MANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEMMANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEM
 
Management information systems and cyber
Management information systems and cyberManagement information systems and cyber
Management information systems and cyber
 
Mis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessMis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in business
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and mis
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information System
 

More from dmeyeravc

Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03dmeyeravc
 
Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02dmeyeravc
 
Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01dmeyeravc
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
dmeyeravc
 
Chapter 17: Financial Management
Chapter 17: Financial ManagementChapter 17: Financial Management
Chapter 17: Financial Management
dmeyeravc
 
Chapter 16: Financial System
Chapter 16: Financial SystemChapter 16: Financial System
Chapter 16: Financial System
dmeyeravc
 
Chapter 15: Accounting
Chapter 15: AccountingChapter 15: Accounting
Chapter 15: Accounting
dmeyeravc
 
Chapter 13: Promotion, Pricing
Chapter 13: Promotion, PricingChapter 13: Promotion, Pricing
Chapter 13: Promotion, Pricing
dmeyeravc
 
Chapter 11: Marketing
Chapter 11: MarketingChapter 11: Marketing
Chapter 11: Marketing
dmeyeravc
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
dmeyeravc
 
Chapter 8: Human Resources
Chapter 8: Human ResourcesChapter 8: Human Resources
Chapter 8: Human Resources
dmeyeravc
 
Chapter 7: Management
Chapter 7: ManagementChapter 7: Management
Chapter 7: Management
dmeyeravc
 
Chapter 6: Entrepreneurship
Chapter 6: EntrepreneurshipChapter 6: Entrepreneurship
Chapter 6: Entrepreneurship
dmeyeravc
 
Chapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus OrganizationChapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus Organization
dmeyeravc
 
Chapter 3: Economics
Chapter 3: EconomicsChapter 3: Economics
Chapter 3: Economics
dmeyeravc
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
dmeyeravc
 
Chapter 1: Global Environment
Chapter 1: Global EnvironmentChapter 1: Global Environment
Chapter 1: Global Environment
dmeyeravc
 

More from dmeyeravc (18)

Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03
 
Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02
 
Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01
 
Ch01
Ch01Ch01
Ch01
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
 
Chapter 17: Financial Management
Chapter 17: Financial ManagementChapter 17: Financial Management
Chapter 17: Financial Management
 
Chapter 16: Financial System
Chapter 16: Financial SystemChapter 16: Financial System
Chapter 16: Financial System
 
Chapter 15: Accounting
Chapter 15: AccountingChapter 15: Accounting
Chapter 15: Accounting
 
Chapter 13: Promotion, Pricing
Chapter 13: Promotion, PricingChapter 13: Promotion, Pricing
Chapter 13: Promotion, Pricing
 
Chapter 11: Marketing
Chapter 11: MarketingChapter 11: Marketing
Chapter 11: Marketing
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
 
Chapter 8: Human Resources
Chapter 8: Human ResourcesChapter 8: Human Resources
Chapter 8: Human Resources
 
Chapter 7: Management
Chapter 7: ManagementChapter 7: Management
Chapter 7: Management
 
Chapter 6: Entrepreneurship
Chapter 6: EntrepreneurshipChapter 6: Entrepreneurship
Chapter 6: Entrepreneurship
 
Chapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus OrganizationChapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus Organization
 
Chapter 3: Economics
Chapter 3: EconomicsChapter 3: Economics
Chapter 3: Economics
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
 
Chapter 1: Global Environment
Chapter 1: Global EnvironmentChapter 1: Global Environment
Chapter 1: Global Environment
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Chapter 14: Information Technology

  • 1. Chapter 14 Using Technology to Manage Information
  • 2. Learning Objectives 1 Distinguish between data and information 5 Discuss the security and ethical and explain the role of management issues involving computer information systems in business. information systems. 2 List the components and different types of 6 Explain the steps that companies go information systems. through in anticipating, planning for, and recovering from information 3 Outline how computer hardware and system disasters. software are used to manage information. 7 Review current trends in information 4 Describe the networking and systems. telecommunications technology and types of computer networks.
  • 3. Information Systems s Data– raw facts and figures s Information– knowledge gained from processing data s Information system– organized method for collecting, storing, and communicating information on operations s Chief information officer– executive responsible for directing information systems and operations
  • 4. Components of Information Systems s Computer Hardware s Computer Software s Telecommunications and Computer Networks s Data Resource Management
  • 5. Types of Information Systems s Operational Support Systems s Transaction Processing System s Process Control System s Management Support Systems s Management Information System (MIS) s Decision Support System (DSS) s Executive Support System (ESS)
  • 6. Computer Hardware s The tangible elements of a computer system s The components that store and process data, perform calculations s Input devices like the keyboard and mouse allow users to enter data and commands. s Storage and processing components consist of the hard drive and other storage components like flash drives.
  • 7. Types of Computers s Desktop (personal) computers s Server s Mainframes s Supercomputers s Notebook computers s Handheld devices– PDAs and smart phones
  • 8. Computer Software s Programs, routines, and computer languages that control a computer s Operating System s Windows Operating System s Mac Operating System s Application Software s Microsoft PowerPoint s Quicken
  • 9. Computer Networks s The Internet s Local Area Networks (LAN) s Wide Area Networks (WAN) s Wireless Local Networks (Wi-Fi) s Intranets s Virtual Private Networks (VPN) s Voice over Internet Protocol (VoIP)
  • 10. Security Issues s E-Crime s Computer Viruses s Worms s Trojan Horses s Spyware
  • 11. Ethical Issues s Use of information systems by employees and vendors: s Personal use s Privacy s Organizational use of information: s Employment records s Employee monitoring s Customer data
  • 12. Disaster Recovery and Backup s Natural Disasters s Power Failures 90% of firms that sustained s Equipment Malfunctions a loss of critical data went s Software Glitches out of business within two s Human Error years. s Terrorist Attacks s The most basic precaution– backup.
  • 13. Information Systems Trends s The Distributed Workforce s Employees who work in virtual offices s Application Service Providers s A firm that provides computers and application support s On Demand, Cloud, and Grid Computing s Renting software time